WorldWideScience

Sample records for security policies procedures

  1. Information security policies and procedures a practitioner's reference

    CERN Document Server

    Peltier, Thomas R

    2004-01-01

    INFORMATION SECURITY POLICIES AND PROCEDURES Introduction Corporate Policies Organizationwide (Tier 1) Policies Organizationwide Policy Document Legal Requirements Duty of Loyalty Duty of Care Other Laws and Regulations Business Requirements Where to Begin? Summary Why Manage This Process as a Project? Introduction First Things First: Identify the Sponsor Defining the Scope of Work Time Management Cost Management Planning for Quality Managing Human Resources Creating a Communications Plan Summary Planning and Preparation Introduction Objectives of Policies, Stand

  2. Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.

    Science.gov (United States)

    Trinkaus-Randall, Gregor

    1998-01-01

    Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…

  3. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  4. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  5. Information Security - Data Loss Prevention Procedure

    Science.gov (United States)

    The purpose of this procedure is to extend and provide specificity to the Environmental Protection Agency (EPA) Information Security Policy regarding data loss prevention and digital rights management.

  6. Formalizing physical security procedures

    NARCIS (Netherlands)

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  7. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  8. 12 CFR 551.140 - What policies and procedures must I maintain and follow for securities transactions?

    Science.gov (United States)

    2010-01-01

    ... for securities transactions in which you act as agent for the buyer and seller (crossing of buy and... personal securities trading reports described at § 551.150, if the officer or employee: (1) Makes investment recommendations or decisions for the accounts of customers; (2) Participates in the determination...

  9. Cyber security policy guidebook

    CERN Document Server

    Bayuk, nifer L; Rohmeyer, l; Sachs, cus; Schmidt, frey; Weiss, eph

    2012-01-01

    This book is a taxonomy and thesaurus of current cybersecurity policy issues, including a thorough description of each issue and a corresponding list of pros and cons with respect to identified stances on each issue. It documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. Without using technical jargon, the book emphasizes the importance of critical and analytical thinking when making policy decisions.  It also equips the reader with descriptions of the impact of specific policy ch

  10. Human security policy challenges

    Directory of Open Access Journals (Sweden)

    Andrew Morton

    2008-10-01

    Full Text Available All evidence points towards climate- and environmentallyinduced migration becoming one of the major policychallenges of this century. Adequate planning for andmanagement of this phenomenon will be critical forhuman security.

  11. Security Force Assistance: Cases and Policy

    Science.gov (United States)

    2018-02-02

    theory , cases, and policy implications presented. 3 Methods, Assumptions, and Procedures The analytical narrative method was used to test the...underlying theory --developed separately as a principal-agent model with capacity building in the DwP project. These two cases were chosen as part...the following implications for U.S. national security policy: o Use aid to create incentives , especially via conditionality. Avoid apolitical

  12. Acquisition Policy and Procedures Program

    National Research Council Canada - National Science Library

    2001-01-01

    This Instruction establishes policies, responsibilities, and procedures for the procurement of goods and services to include supplies, equipment, publications, furniture, and information technology...

  13. Analyzing Security-Enhanced Linux Policy Specifications

    National Research Council Canada - National Science Library

    Archer, Myla

    2003-01-01

    NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for security policies and a Flask-like architecture with a security server for enforcing policies defined in the language...

  14. US-Africa Security Policy

    DEFF Research Database (Denmark)

    Møller, Nicolai Stahlfest

    This paper will discuss the United States security policy towards Africa based on the National Security Strategy from 2006 and the founding of US Africa Command, the new military combatant command that is supposed to unify US military efforts on the African continent. The paper will discuss whether...... AFRICOM and US actions in Africa could be seen as a true (newfound) American interest in Africa or whether actions that are considered low-key and low-budget in Washington are to be regarded as a true asymmetry because African states regard US action as important and significant. The paper will explain...

  15. Security Economics and European Policy

    Science.gov (United States)

    Anderson, Ross; Böhme, Rainer; Clayton, Richard; Moor, Tyler

    In September 2007, we were awarded a contract by the European Network and Information Security Agency (ENISA) to investigate failures in the market for secure electronic communications within the European Union, and come up with policy recommendations. In the process, we spoke to a large number of stakeholders, and held a consultative meeting in December 2007 in Brussels to present draft proposals, which established most had wide stakeholder support. The formal outcome of our work was a detailed report, “Security Economics and the Internal Market”, published by ENISA in March 2008. This paper presents a much abridged version: in it, we present the recommendations we made, along with a summary of our reasoning.

  16. Development and analysis of security policies in security enhanced Android

    OpenAIRE

    Rimando, Ryan A.

    2012-01-01

    Approved for public release; distribution is unlimited. This thesis examines Security Enhanced Android. Both its policy and its additional security features are explored. The policy is examined in depth, providing a better understanding of the security provided by SE Android. We analyze the default SE Android policy. We identify a potential weakness and change the policy to facilitate control over communication channels. A proof-of-concept set of applications is developed to demonstrate ho...

  17. European Union security policy through strategic culture

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2014-01-01

    Full Text Available In this paper, we shall pay attention to the security policy of the European Union, through the strategic culture, starting from the existing various options for cooperation in the field of security and defense. Our goal is to look at the implementation of the Strategic Culture of the European Union (EU SK, research ways to improve the international position of the Union and its impact on policy cooperation and trust with other collectives. Analysis of flexible cooperation between the European Union, as well as access to special procedures in the field of security and defense policy, we will follow the ambition and capacity in implementing the same. Paper aims to introduce the idea of the European Union, which allows its members to rationally consider and check the box of options available to decision makers. In this regard, the EU seeks to build its own armed forces to protect the association of interests-investment terms. Reviewing and understanding the strategic culture of the EU by countries that are not its members can be seen as reasons for strengthening the capacity of the Union for the realization of the impact of the global security as well as predicting its future steps.

  18. Energy security and national policy

    International Nuclear Information System (INIS)

    Martin, W.F.

    1987-01-01

    To achieve an energy secure future, energy cannot be viewed as an isolated concern. It is part and parcel of a nation's economic, social, and political context. In the past important implications for the economy and national security have been ignored. Crash programs to deal with oil shortages in the seventies, crashed. In the eighties, oil surplus has been enjoyed. The energy situation could be quite different in the nineties. Statistics on energy supply and consumption of oil, coal, natural gas and electricity from nuclear power show that much progress has been made worldwide. However, about half of the world's oil will come from the Persian Gulf by 1995. Continued low oil prices could raise US imports to 60% of consumption by 1995. Persian Gulf tensions serve as reminders of the link between energy policy and national security policy. Energy policy must be based on market forces and concerns for national security. Strategic oil reserves will expand along with the availability of domestic oil and gas resources. Increased attention to conservation, diversification of energy resources, and use of alternative fuels can help reduce imports. Continued high-risk long term research and development is needed. Improved technology can reduce environmental impacts. Global markets need global cooperation. Energy has emerged as an important aspect of East-West relations. Europeans need to diversify their sources of energy. The soviets have proposed expanded collaboration in magnetic fusion science. A series of initiatives are proposed that together will ensure that economies will not become overly dependent on a single source of energy

  19. Security Policy Alignment: A Formal Approach

    NARCIS (Netherlands)

    Pieters, Wolter; Dimkov, T.; Pavlovic, Dusko

    2013-01-01

    Security policy alignment concerns the matching of security policies specified at different levels in socio-technical systems, and delegated to different agents, technical and human. For example, the policy that sales data should not leave an organization is refined into policies on door locks,

  20. Considerations When Including Students with Disabilities in Test Security Policies. NCEO Policy Directions. Number 23

    Science.gov (United States)

    Lazarus, Sheryl; Thurlow, Martha

    2015-01-01

    Sound test security policies and procedures are needed to ensure test security and confidentiality, and to help prevent cheating. In this era when cheating on tests draws regular media attention, there is a need for thoughtful consideration of the ways in which possible test security measures may affect accessibility for some students with…

  1. Staffing Policy for Solving the Information Security

    Directory of Open Access Journals (Sweden)

    A. I. Tolstoy

    2012-06-01

    Full Text Available Determining staffing policy implementation of information security tasks is given. The basic requirements that must be taken into account when developing policies are defined. The policy framework is determined and recommendations for the design of such policies are formulated. Requirements for the implementation of the policy are defined.

  2. Iran's Security Policy in the Post-Revolutionary Era

    National Research Council Canada - National Science Library

    Byman, Daniel

    2001-01-01

    This report assesses Iran's security policy. It examines broad drivers of Iran's security policy, describes important security institutions, explores decisionmaking, and reviews Iran's relations with key countries...

  3. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  4. Information Security Policy Modeling for Network Security Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Sergeevich Chernyavskiy

    2014-12-01

    Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.

  5. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  6. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    This document includes the US Nuclear Regulatory Commission`s (NRC`s or Commission`s) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC`s policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees` health and safety, the common defense and security, and the environment.

  7. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    International Nuclear Information System (INIS)

    1998-05-01

    This document includes the US Nuclear Regulatory Commission's (NRC's or Commission's) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC's policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees' health and safety, the common defense and security, and the environment

  8. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  9. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases......, small modification of the security requirement might lead to substantial changes in a number of modules within a large mobile distributed system. Indeed, security is a crosscutting concern which can spread to many business modules within a system, and is difficult to be integrated in a modular way....... This dissertation explores the principles of adding challenging security policies to existing systems with great flexibility and modularity. The policies concerned cover both classical access control and explicit information flow policies. We built our solution by combining aspect-oriented programming techniques...

  10. Information security policy development for compliance

    CERN Document Server

    Williams, Barry L

    2013-01-01

    Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control. Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, the book will he

  11. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2006-01-01

    .... but provides the strong security guarantees of modern languages such as Java. A second avenue of language-based work explored a general class of policy enforcement mechanism based on in-line reference monitors (IRM...

  12. Guide to National Security Policy and Strategy

    National Research Council Canada - National Science Library

    Bartholomees, Jr, J. B

    2006-01-01

    ...: Theory of War and Strategy and National Security Policy and Strategy. The result for this book is the expansion of the block on strategic theory and the introduction of a block on specific strategic issues...

  13. Japan's National Security: Structures, norms, and policies

    International Nuclear Information System (INIS)

    Katzenstein, P.J.; Okawara, N.

    1993-01-01

    Japan's national security policy has two distinctive aspects that deserve analysis. First, Japan's definition of national security goes far beyond traditional military notions. National security is viewed in comprehensive terms that also include economic and political dimensions. The second feature of Japan's security policy worth explanation is a distinctive mixture of flexibility and rigidity in the process of policy adaptation to change: flexibility on issues of economic security, rigidity on issues of military security, and flexibility combined with rigidity on issues of political security. With the end of the Cold War and changes in the structure of the international system, it is only natural that we ask whether and how Japan's national security policy will change as well. Optimists insist that the Asian balance of power and the US-Japan relationship will make Japan aspire to be a competitive, noninterventionist trading state that heeds the universal interest of peace and profit rather than narrow aspirations for national power. Pessimists warn us instead that the new international system will finally confirm Herman Kahn's prediction of 1970: Japan will quickly change to the status of a nuclear superpower, spurred perhaps by what some see as a dangerous rise of Japanese militarism in the 1970s and 1980s

  14. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  15. Energy supply security and foreign policy

    International Nuclear Information System (INIS)

    2006-05-01

    The title memo has been sent to the Dutch Lower House. This memo reflects the response of the cabinet to the advice on Energetic Foreign Policy of the Dutch Advisory Council on International Affairs (AIV) and the Dutch Energy Council (AER). Moreover, the development of foreign policy with respect to energy supply security is depicted. [mk] [nl

  16. 21 CFR 203.34 - Policies and procedures; administrative systems.

    Science.gov (United States)

    2010-04-01

    ... distribution security and audit system, including conducting random and for-cause audits of sales... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Policies and procedures; administrative systems...; administrative systems. Each manufacturer or authorized distributor of record that distributes drug samples shall...

  17. The European Security and Defence Policy

    DEFF Research Database (Denmark)

    Adler-Nissen, Rebecca

    2009-01-01

    The European Security and Defence Policy (ESDP), which is the operational military and civilian dimension of the Common Foreign and Security Policy (CFSP), is today one of the most dynamic areas of the European Union. However, it is only recently that the EU has acquired explicit military decision....... The Union is thus gradually emerging as an important player on the international scene, with a strategic vision, as well as diplomatic, civilian and military crisis-management instruments that complement the existing economic, commercial, humanitarian and development policies on which the EU has hitherto...... built its reputation as a ‘soft power'. Despite its rapid development, many still regard the EU as weak and ineffi cient when it comes to security and defence policy. Moreover, the EU struggles with internal divisions and has a strained relationship with NATO. Nonetheless, there are good reasons...

  18. Energy security and climate policy. Assessing interactions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-03-28

    World energy demand is surging. Oil, coal and natural gas still meet most global energy needs, creating serious implications for the environment. One result is that CO2 emissions, the principal cause of global warming, are rising. This new study underlines the close link between efforts to ensure energy security and those to mitigate climate change. Decisions on one side affect the other. To optimise the efficiency of their energy policy, OECD countries must consider energy security and climate change mitigation priorities jointly. The book presents a framework to assess interactions between energy security and climate change policies, combining qualitative and quantitative analyses. The quantitative analysis is based on the development of energy security indicators, tracking the evolution of policy concerns linked to energy resource concentration. The 'indicators' are applied to a reference scenario and CO2 policy cases for five case-study countries: The Czech Republic, France, Italy, the Netherlands, and the United Kingdom. Simultaneously resolving energy security and environmental concerns is a key challenge for policy makers today. This study helps chart the course.

  19. Directed Security Policies: A Stateful Network Implementation

    Directory of Open Access Journals (Sweden)

    Cornelius Diekmann

    2014-05-01

    Full Text Available Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.

  20. US oil policy and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-05-01

    Although the energy dependence reached its historical maximum and will continue to increase for the next 20 years, the USA keep their oil policy. For the economist this policy is reasonable because of the poor room for the US imports reduction costs. To explain these conclusions the author discusses on the following topics: the links between the oil dependence and the energy security, the oil policy after Reagan, the oil policy evolution - or no evolution - facing the increasing dependency and the Cheney report. (A.L.B.)

  1. Food security policies in India and China

    DEFF Research Database (Denmark)

    Yu, Wusheng; Elleby, Christian; Zobbe, Henrik

    2015-01-01

    dependence on price-based measures causes relatively larger and more volatile fiscal burdens, thereby likely making it more vulnerable in dealing with similar events in the future. These findings have important implications for food policy and food security in the two countries in the future.......Food insecurity is a much more serious concern in India than China. In addition to income and poverty differences, we argue in this paper that differences in food policies can further explain the different food security outcomes across the two countries. First, India mostly uses price-based input...

  2. 76 FR 15368 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-03-21

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... security devices and procedures to discourage robberies, burglaries, and larcenies, and to assist in the...

  3. 76 FR 30243 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-05-24

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures.... Title of Proposal: Minimum Security Devices and Procedures. OMB Number: 1550-0062. Form Number: N/A... respect to the installation, maintenance, and operation of security devices and procedures to discourage...

  4. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  5. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Modelling mobility aspects of security policies

    NARCIS (Netherlands)

    Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J.; Barthe, G.; Burdy, L.; Huisman, Marieke; Lanet, J.-L.; Muntean, T.

    Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of

  7. The Flask Security Architecture: System Support for Diverse Security Policies

    Science.gov (United States)

    2006-01-01

    Flask microkernel -based operating sys­ tem, that successfully overcomes these obstacles to pol- icy flexibility. The cleaner separation of mechanism and...other object managers in the system to en- force those access control decisions. Although the pro­ totype system is microkernel -based, the security...mecha­ nisms do not depend on a microkernel architecture and will easily generalize beyond it. The resulting system provides policy flexibility. It sup

  8. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  9. Information security policy: contributions from internal marketing for its effectiveness

    Directory of Open Access Journals (Sweden)

    Cristiane Ellwanger

    2012-06-01

    Full Text Available Protecting sources of information has become a great challenge to the organizations, due to the advance of the information technologies, the integration between them and the constant stream of information that flows through the communication networks. The establishment of an Information Security Policy – PSI may resolve a part of the problems related to security, but it cannot totally solve them, since the human resources present in the internal environment of the organizations may spoil the effectiveness of the PSI. Given the importance of the human aspects in the context of the information security, the present work discusses the use of internal marketing as a management strategy in order to obtain or reestablish the commitment of the users to the principles defined in the PSI, and demonstrates, through an experimental research, the impact of using internal marketing techniques to the effectiveness of that policy. The results of this experiment make quantitatively evident how relevant the use of these techniques may be in order to have the procedures described in the PSI actually carried out by the users, and demonstrates a 402,4% increase in the support to the information security policy, considering the procedures indicated in the PSI that were totally executed.

  10. Security Clearances and the Protection of National Security Information: Law and Procedures

    National Research Council Canada - National Science Library

    Cohen, Sheldon

    2000-01-01

    ... designed to protect National Security information. The report provides an authoritative compendium for lawyers, security officers and for managers of corporations who must deal with the legal and procedural aspects of security clearances...

  11. Library Operations Policies and Procedures, Volume 2. Central Archive for Reusable Defense Software (CARDS)

    Science.gov (United States)

    1994-02-28

    use and customize those policies and procedures applicable to the implementor’s situation. It is not the intent of this manual to restrict the library...improvements. Pare 10 ka•- V •DkI U Release Manager The Release Manager provides franchisees with media copies of existing libraries, as needed. Security...implementors, and potential library franchisees . Security Team The Security Team assists the Security Officer with security analysis. Team members are

  12. Reviewing and reforming policy in health enterprise information security

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2001-08-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center, TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG), examined military policies and regulations relating to computer-based information systems and medical records management. Using a system of templates and matrices created for the purpose, P3WG identified gaps and discrepancies in DoD and service compliance with the proposed Health Insurance Portability and Accountability Act (HIPAA) Security Standard. P3WG represents an unprecedented attempt to coordinate policy review and revision across all military health services and the Office of Health Affairs. This method of policy reform can identify where changes need to be made to integrate health management policy and IT policy in to an organizational policy that will enable compliance with HIPAA standards. The process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains.

  13. Modeling Security-Enhanced Linux Policy Specifications for Analysis (Preprint)

    National Research Council Canada - National Science Library

    Archer, Myla; Leonard, Elizabeth; Pradella, Matteo

    2003-01-01

    Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...

  14. Alignment of Organizational Security Policies -- Theory and Practice

    NARCIS (Netherlands)

    Dimkov, T.

    2012-01-01

    To address information security threats, an organization defines security policies that state how to deal with sensitive information. These policies are high-level policies that apply for the whole organization and span the three security domains: physical, digital and social. One example of a

  15. 33 CFR 157.415 - Bridge resource management policy and procedures.

    Science.gov (United States)

    2010-07-01

    ... HOMELAND SECURITY (CONTINUED) POLLUTION RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK... Petroleum Oils § 157.415 Bridge resource management policy and procedures. (a) Not later than February 1...

  16. STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA

    Directory of Open Access Journals (Sweden)

    CRISTINA-MARIA RĂDULESCU

    2015-12-01

    Full Text Available The Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and distribute enormous amounts of personal data and therefore, are concerned about their unauthorized use or their use in other purposes than intended by third parties in order to gain unauthorized access to them. There are more examples of cyber criminal activities, such as: hacking, software piracy, passwords attack, service prohibition attacks, scamming, etc. Such fears led to the editing of protection policies meant to secure personal data and to develop some mechanisms to ensure the reliability and confidentiality of electronic information. Security measures include access control devices, installation of firewalls and intrusion detection devices, of some security procedures to identify and authenticate authorized users of network systems. Such mechanisms constitute the core of this study. We will also analyze security and confidentiality policy of personal data of Google Inc.

  17. Measuring Efficacy of Information Security Policies : A Case Study of UAE based company

    OpenAIRE

    Qureshi, Muhammad Sohail

    2012-01-01

    Nowadays information security policies are operative in many organizations. Currently few organizations take the pain of verifying the efficacy of these policies. Different standards and procedures exist about methods of measuring efficacy of information security policies. Choosing and implementing them depends mainly on the key performance indicators (KPIs) and key risk indicators (KRIs) of any particular organization. This thesis is a case study of an organization in United Arab Emirates (U...

  18. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  19. Information systems security policies: a survey in Portuguese public administration

    OpenAIRE

    Lopes, Isabel Maria; Sá-Soares, Filipe de

    2010-01-01

    Information Systems Security is a relevant factor for present organizations. Among the security measures, policies assume a central role in literature. However, there is a reduced number of empirical studies about the adoption of information systems security policies. This paper contributes to mitigate this flaw by presenting the results of a survey in the adoption of Information System Security Policies in Local Public Administration in Portugal. The results are discussed in light of literat...

  20. University Policies and Procedures on Sexual Harassment.

    Science.gov (United States)

    McIntyre, Jerilyn S.

    Sexual harassment complaints are challenges to the abuse of power in certain kinds of communicative relationships, and sexual harassment policies and procedures are ways of defining the responsible exercise of power and providing the means to address grievances that result from irresponsible and potentially harmful uses of power in those…

  1. 12 CFR 208.61 - Bank security procedures.

    Science.gov (United States)

    2010-01-01

    ... procedures for opening and closing for business and for the safekeeping of all currency, negotiable...; the cost of the security devices; other security measures in effect at the banking office; and the... directors on the implementation, administration, and effectiveness of the security program. (e) Reserve...

  2. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  3. Nuclear Cyber Security Issues and Policy Recommendations

    International Nuclear Information System (INIS)

    Lee, Cheol-Kwon; Lee, Dong-Young; Lee, Na-Young; Hwang, Young-Soo

    2015-01-01

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities

  4. Nuclear Cyber Security Issues and Policy Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Cheol-Kwon; Lee, Dong-Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Na-Young; Hwang, Young-Soo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities.

  5. Windscale inquiry and policy-making procedures

    Energy Technology Data Exchange (ETDEWEB)

    Von Moltke, K

    1978-07-01

    Policy decisions on the development and installation of nuclear facilities often strain both the time and human resources of a country, some countries having taken steps to involve the national government in specific siting decisions and shifting the constitutional balance in response to popular dissent. Challenges to nuclear facilities could be met by limiting the scope of intervenors and the use of judicial review. The 100-day Windscale Inquiry in the United Kingdom represents the most costly review any country has had of a specific nuclear policy and has international implications. A chronology of the inquiry illustrates how the debate evolved into a vote on whether nuclear energy should be developed at all and effectively cut off other avenues of recourse. The traditional procedures for planning are shown to be inadequate for setting nuclear energy policy without the intervention of Parliament. 18 references.

  6. Security policies and trust in ubiquitous computing.

    Science.gov (United States)

    Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand

    2008-10-28

    Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

  7. Economics of international energy security policy

    International Nuclear Information System (INIS)

    Paik, I.K.

    1992-01-01

    Because there is no inexpensive substitute for crude oil and petroleum products at the present time, an oil supply disruption inevitably leads to higher oil prices and economic losses. Wealth transfer to oil producing nations, reduced output increased unemployment and inflation. For these reasons, major oil-consuming countries currently have in place various oil emergency response measures to protect themselves from adverse economic consequences of oil supply disruptions: stockpiling emergency oil reserves to augment supplies, if necessary, in an emergency; and lowering oil demand through non-price mechanisms. The main purpose of this paper is to show that while, supply enhancement and demand reduction could have the same effect on oil prices in the event of an oil supply shortfall, they may have significantly different effects on the economies. Section I discusses the principal oil emergency response measures of the members of the International Energy Agency (IEA) -- emergency oil stockpiles and demand restraint -- and their policies for implementing the measures. Section II describes the analytical method used to perform comparative economic analysis of releasing emergency stocks and restraining demand in an oil emergency. Section III presents quantitative results of the analysis, and Section IV, conclusions of the analytical results and their energy security policy implications

  8. European security and defense policy and its implications for Turkey

    OpenAIRE

    Özköse, Ö Faruk

    2002-01-01

    Cataloged from PDF version of article. The “European Security and Defense Policy” is an evolving process. Since the Maastricht Treaty (1991), the European Union members have been trying to constitute a common security and defense policy within the framework of Common Foreign and Security Policy, second pillar of the European Union. The efforts to create “separable but not separate” European forces within NATO have increased speed in the last years and changed direction towar...

  9. Three Essays on Information Security Policies

    Science.gov (United States)

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  10. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  11. Assessment of LANL transportation policies and procedures

    International Nuclear Information System (INIS)

    Danna, J.G.; Jennrich, E.A.; Lund, D.M.; Davis, K.D.; Hoevemeyer, S.S.

    1991-04-01

    In order to determine whether activities related to the transportation of waste at Los Alamos National Laboratory (LANL) were being conducted in accordance with DOE policy, requirements stated in applicable DOE Orders were reviewed and compared with LANL policies and procedures described in the Administrative Requirements and the On-Site Transportation Manual. The following DOE Orders were determined to pertain to waste transportation and thus reviewed to identify requirements for which LANL is responsible for satisfying: Order 5820.2A Radioactive Waste Management; Order 1540.1 Materials Transportation and Traffic Management; and Order 5480.3 Safety Requirements for the Packaging and Transportation of Hazardous Materials, Hazardous Substances, and Hazardous Wastes. The LANL On-Site Transportation Manual and the Administrative Requirements contained in the LANL Environment, Safety, and Health Manual were reviewed to verify that each of the requirements identified through the review of the Orders and 10 CFR Part 71 were being satisfied. The following Administrative Requirements were considered in this task: Shipment of Radioactive Materials; Radioactive Liquid Waste; Low-Level Radioactive Solid Waste; Chemical, Hazardous, and Mixed Waste; Polychlorinated Biphenyls; and Transuranic (TRU) Solid Waste

  12. ESCAPE. Energy Security and ClimAte Policy Evaluation

    International Nuclear Information System (INIS)

    Kessels, J.R.; Bakker, S.J.A.

    2005-05-01

    Climate change and energy supply security policy are currently not integrated in most countries, despite possible synergies. The ESCAPE approach suggests that linking climate change policy with security of energy supply could improve climate change policy at both a national and international level. The report explores the interaction between policies of energy security and climate change and the options of inclusion of energy security issues into national and international post-2012 climate negotiations. It emphasises the importance of the US in this regard and takes a close look at US energy policy documents. It appears that current US energy policy is not directed towards reducing its reliance on imported fossil fuel, even though the government has a strong preference for this. This study shows that measures to reduce import dependency are mostly synergetic with climate policy and gives some options that can be implemented. On an international level, linkages of energy security into post-2012 climate policy may be possible in sectoral bottom-up approaches or technology frameworks. As well, inclusion of a security of supply criterion in international emission trading instruments may provide potential benefits

  13. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  14. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  15. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  16. Competing policy packages and the complexity of energy security

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Saunders, Harry

    2014-01-01

    To underscore both the diversity and severity of energy security tradeoffs, this study examines five different energy security policy packages—five distinct strategies aimed at reducing oil dependence, enhancing energy affordability, expanding access to modern energy services, responding to climate change, and minimizing the water intensity of energy production. It identifies both compelling synergies and conflicts between each of the five strategies. The central value of the study is that it turns on its head the widely accepted notion of a “portfolio approach” or “all of the above” strategy to energy policymaking. To make this case, the article begins by elucidating the complexity and multidimensionality of energy security as a concept. It then introduces our five energy security policy packages to illustrate how some energy security objectives complement each other whereas others counteract each other. It concludes by noting that energy security is not an absolute state, and that achieving it only “works” by prioritizing some dimensions, or policy goals and packages, more than others. - Highlights: • Energy security is a complex, multidimensional concept. • Policy packages aimed at achieving energy security often conflict with each other. • Energy security only “works” by prioritizing some dimensions more than others

  17. External dimension of Ukraine’s security policy

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2015-07-01

    Full Text Available Investigation of the external dimension of security policy of Ukraine is stipulated for the need to analyse the current state of relations with organizations such as the Organization for Security and Co-operation in Europe and The Collective Security Treaty Organization, and relations within the Common European Security and Defence Policy. Ukraine’s European Integration means inclusion in the global space security with countries that it shares common values and principles. It does not exclude the collaboration with the countries that belong to other systems of collective security in the scope that is appropriate to basic national interests of Ukraine. It is proved that the activities of the OSCE Special Monitoring Mission is an important contribution to the process of peaceful conflict resolution, and helps to develop democratic principles and foundations of foreign policy. It is determined that the further development of the constructive cooperation between the EU advisory mission under CSDP will provide an opportunity to improve and increase the security of national borders from external threats and challenges, and help to accelerate the process of integration into the European security space. The attention is paid to the fact that, taken into consideration the state of relations with Russia, the further cooperation with the Collective Security Treaty Organization (CSTO may adversely affect the overall security situation in Ukraine and lead to further tension with Russia today.

  18. 32 CFR 14.3 - Policies and procedures.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Policies and procedures. 14.3 Section 14.3... QUALIFICATION OF CIVILIAN DEFENSE COUNSEL § 14.3 Policies and procedures. (a) Application procedures. (1... the subject of any sanction or disciplinary action by any court, bar, or other competent governmental...

  19. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ...) and the North Atlantic Treaty Organization (NATO). Polish security policy and strategy is shaped by its geographical location, which places Poland in NATO's main strategic area opposite the Russian Federation and Belarus...

  20. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ... goals to eliminate current threats and risks such as terrorism. As far as Poland is concerned, its priority is to be an active leader in improving common security policy within the boundaries of the European Union (EU...

  1. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  2. Using the social security system to deliver housing policy

    OpenAIRE

    Cheung, Louise, Gee Wing

    2016-01-01

    This thesis examines the interaction between housing policy and the social security benefits that support housing costs. Analysis concerns the extent and type of State intervention in housing, thus explaining the dynamic between State and individual responsibility in housing policy. This thesis involves an exploration of the different treatment of the owner-occupied and the rented housing sectors, with reference to the social security benefits which fund ongoing housing costs. This thesis see...

  3. Agriculture development and food security policy in Eritrea - An ...

    African Journals Online (AJOL)

    Agriculture development and food security policy in Eritrea - An analysis. ... per cent of its total food needs and in poor years, it produces no more than 25 per cent. ... food security by introducing modern technology, irrigation, terracing, soil and ...

  4. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2005-01-01

    .... One avenue of language-based work produced Cyclone, a type-safe variant of C. The Cyclone language retains the familiar syntax and semantics of C code, but provides the strong security guarantees of modem languages such as Java...

  5. An Integrative Behavioral Model of Information Security Policy Compliance

    Directory of Open Access Journals (Sweden)

    Sang Hoon Kim

    2014-01-01

    Full Text Available The authors found the behavioral factors that influence the organization members’ compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members’ attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1 the study is expected to play a role of the baseline for future research about organization members’ compliance with the information security policy, (2 the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3 the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training

  6. An integrative behavioral model of information security policy compliance.

    Science.gov (United States)

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing

  7. Position paper: A generic approach for security policies composition

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario; Nielson, Flemming

    2012-01-01

    When modelling access control in distributed systems, the problem of security policies composition arises. Much work has been done on different ways of combining policies, and using different logics to do this. In this paper, we propose a more general approach based on a 4-valued logic, that abst...

  8. Globally reasoning about localised security policies in distributed systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario

    In this report, we aim at establishing proper ways for model checking the global security of distributed systems, which are designed consisting of set of localised security policies that enforce specific issues about the security expected. The systems are formally specified following a syntax......, defined in detail in this report, and their behaviour is clearly established by the Semantics, also defined in detail in this report. The systems include the formal attachment of security policies into their locations, whose intended interactions are trapped by the policies, aiming at taking access...... control decisions of the system, and the Semantics also takes care of this. Using the Semantics, a Labelled Transition System (LTS) can be induced for every particular system, and over this LTS some model checking tasks could be done. We identify how this LTS is indeed obtained, and propose an alternative...

  9. The Political Economy of Carbon Securities and Environmental Policy

    DEFF Research Database (Denmark)

    Polborn, Sarah

    The costs of the current suboptimal carbon abatement policy are likely in the range of 3 to 6 trillion 2005 US dollars. Using methods from the political economy of environmental policy, the paper develops a new carbon abatement policy instrument, carbon securities. A carbon security entitles its...... owner to a ?xed proportion of ex ante unknown total emissions. This creates an additional group of stakeholders on the side of the issue that has traditionally been underrepresented. The advantages over existing systems include an equilibrium carbon price closer to the social optimum, a more predictable...

  10. Family Economic Security Policies and Child and Family Health.

    Science.gov (United States)

    Spencer, Rachael A; Komro, Kelli A

    2017-03-01

    In this review, we examine the effects of family economic security policies (i.e., minimum wage, earned income tax credit, unemployment insurance, Temporary Assistance to Needy Families) on child and family health outcomes, summarize policy generosity across states in the USA, and discuss directions and possibilities for future research. This manuscript is an update to a review article that was published in 2014. Millions of Americans are affected by family economic security policies each year, many of whom are the most vulnerable in society. There is increasing evidence that these policies impact health outcomes and behaviors of adults and children. Further, research indicates that, overall, policies which are more restrictive are associated with poorer health behaviors and outcomes; however, the strength of the evidence differs across each of the four policies. There is significant diversity in state-level policies, and it is plausible that these policy variations are contributing to health disparities across and within states. Despite increasing evidence of the relationship between economic policies and health, there continues to be limited attention to this issue. State policy variations offer a valuable opportunity for scientists to conduct natural experiments and contribute to evidence linking social policy effects to family and child well-being. The mounting evidence will help to guide future research and policy making for evolving toward a more nurturing society for family and child health and well-being.

  11. Development and Analysis of Security Policies in Security Enhanced Android

    Science.gov (United States)

    2012-12-01

    by Tresys Technology [32]. The suite contains tools for SE policy creation, management, and analysis. Apol provides a graphical interface for...runs under a predefined platform user: system, nfc , radio, etc. The third and fourth checks simply deal with different user strings, with fixed...system user id to the system domain and their application directories to system_data_file. Similarly, applications under the nfc and radio user id

  12. Energy security of supply under EU climate policies

    International Nuclear Information System (INIS)

    Groenenberg, H.; Wetzelaer, B.J.H.W.

    2006-12-01

    The implications of various climate policies for the security of supply in the EU-25 were investigated. The security of supply was quantified using the Supply/Demand (S/D) Index. This index aggregates quantitative information on a country's energy system into one single figure. It takes a value between 0 and 100, with higher values indicating a more secure energy system. The S/D Index was calculated for the year 2020 based on the information in a series of policy scenarios, including a baseline (S/D Index 50.7), an energy efficiency scenario (53.8), two renewable energy scenarios (52.6 and 53.3) and two scenarios with combined policies (55.9 and 55.6).The S/D Index proved a useful indicator for assessing the implications of climate policies for the security of supply. As climate policies become more stringent, CO2 index fall, and the S/D index increases. The magnitude of the changes in the two indices is not always similar however. Major falls in CO2 indices in the order of 20% for two scenarios with combined energy efficiency and renewable energy polices lead to less noteworthy improvements in the associated S/D indices. Nevertheless, this combination of policies leads to the greatest improvements in the security of supply

  13. Elements of ESA's policy on space and security

    Science.gov (United States)

    Giannopapa, Christina; Adriaensen, Maarten; Antoni, Ntorina; Schrogl, Kai-Uwe

    2018-06-01

    In the past decade Europe has been facing rising security threats, ranging from climate change, migrations, nearby conflicts and crises, to terrorism. The demand to tackle these critical challenges is increasing in Member States. Space is already contributing, and could further contribute with already existing systems and future ones. The increasing need for security in Europe and for safety and security of Europe's space activities has led to a growing number of activities in ESA in various domains. It has also driven new and strengthened partnerships with security stakeholders in Europe. At the European level, ESA is collaborating closely with the main European institutions dealing with space security. In addition, as an organisation ESA has evolved to conduct security-related projects and programmes and to address the threats to its own activities, thereby securing the investments of the Member States. Over the past years the Agency has set up a comprehensive regulatory framework in order to be able to cope with security related requirements. Over the past years, ESA has increased its exchanges with its Member States. The paper presents main elements of the ESA's policy on space and security. It introduces the current European context for space and security, the European goals in this domain and the specific objectives to which the Agency intends to contribute. Space and security in the ESA context is set out under two components: a) security from space and b) security in space, including the security of ESA's own activities (corporate security and the security of ESA's space missions). Subsequently, ESA's activities are elaborated around these two pillars, composed of different activities conducted in the most appropriate frameworks and in coordination with the relevant stakeholders and shareholders.

  14. Verification of Security Policy Enforcement in Enterprise Systems

    Science.gov (United States)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  15. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  16. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  17. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  18. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  19. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  20. National Security Implications of Global Warming Policy

    Science.gov (United States)

    2010-03-01

    Although numerous historical examples demonstrate how actual climate change has contributed to the rise and fall of powers, global warming , in and of...become convinced that global warming is universally bad and humans are the primary cause, political leaders may develop ill-advised policies restricting

  1. Group Policy Fundamentals, Security, and the Managed Desktop

    CERN Document Server

    Moskowitz, Jeremy

    2010-01-01

    The ultimate Group Policy guide-now updated for Windows 7 and Server 2008 R2!. IT and network administrators can streamline their Windows Server management tasks by using Group Policy tools to automate or implement rules, processes, or new security across the enterprise. In this comprehensive guide, Microsoft Group Policy MVP Jeremy Moskowitz thoroughly explores Group Policy across all Windows platforms, including the latest on Windows 7 and Server 2008 R2. If you're a Windows network administrator managing scores of users and computers, you need this essential reference on your desk.: Covers

  2. Development of an Internet Security Policy for health care establishments.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  3. Household Food Security Policy Analysis A System Dynamics Perspective

    Directory of Open Access Journals (Sweden)

    Isdore Paterson Guma

    2015-08-01

    Full Text Available Household food security FS is complex and requires multiple stakeholder intervention. Systemic approach aids stakeholders to understand the mechanisms and feedback between complexities in food security providing effective decision making as global resource consumption continues to grow. The study investigated food security challenges and a system dynamics model was developed for evaluating policies and intervention strategies for better livelihood at household level. Dynamic synthesis methodology questionnaires and interview guide were used to unearth food security challenges faced by households. A causal loop diagram was drawn. The model demonstrates a balance between food stock seeds preserved seeds for sale and consumption from crop harvest throughout the food cycles. This research makes contribution to the literature by evaluating dynamic synthesis methodology and FS policy discussions from a feedback point of view.

  4. Security Policy for a Generic Space Exploration Communication Network Architecture

    Science.gov (United States)

    Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.

    2016-01-01

    This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  5. The Evolution of the European Security Policy

    Directory of Open Access Journals (Sweden)

    Vasilica Negrut

    2010-06-01

    Full Text Available The process of development of the European Union’s security dimension has known a spectacular evolution in the past years, passing from political consultation to establishing objectives, then commonactions and positions; at a practical level, the Petersburg measures, carried on initially by the Western European Union as an armed branch of the European Union, have been replaced by actions of implication ofthe Union in managing some conflicts. The Lisbon Treaty confirms the commitments of the member states and mentions the fact that the European Union will dispose of the necessary measures for the defense of its objectives and to contribute to world peace and stability.

  6. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  7. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  8. Obtaining Knowledge for Innovation: Benefits and Harms of Procedures for Managing Information Security

    Directory of Open Access Journals (Sweden)

    José Geraldo Pereira Barbosa

    2012-06-01

    Full Text Available The research reported in this article aims to describe how the processes of information security used in a manufacturing and packaging paper company influenced the attainment of knowledge on two innovations. The study was conducted through field research, using interviews, narratives, direct observation and thematic analysis for data collection and data processing. The research started from the assumption that even considering the importance of managing information security and its benefits to an organization, the processes of logical security, and physical access controls, would undermine the process of obtaining and transference of knowledge required by innovations. It was observed the presence of five instruments of physical and logical security: "confidentiality", "general control of protection", "antivirus", "backups" and "facility security procedures" which did not interfere negatively in obtaining knowledge. The single barrier identified for the transfer of knowledge was the lack of absorptive capacity of knowledge workers. Therefore, the case describes a situation where a clearly and consistent information security policy allowed the obtaining and transferring of knowledge necessary for innovation. In other words, the assumption of the research was rejected by the findings.

  9. Features of modern security policy UK political parties

    Directory of Open Access Journals (Sweden)

    A. V. Stalovierova

    2015-12-01

    Full Text Available The security policy of the British coalition government of D. Cameron (2010-2015 is summarized; it’s been proved that political forces of Tory and Liberal Democrat should have compromised to carry out unanimous course in the scope of national security, and the problems of the security strategy on parliamentary elections in 2015 are analyzed, particularly the comparative analysis of the modern safety strategy of leading British parties is exercised. Under conditions of the appearance of new challenges and threats, transformation of international safety system, the questions of safety policy often become the object of attention of the British community and experts. The absence of cross-party consensus on most terms of safety strategy of the United Kingdom during the election campaign in 2015 makes the discussion about perspectives of the British safety policy still more urgent. During the election campaign there was no unity on any aspect of security subject between parties. First of all, Labourists, Liberal Democrats, Scottish National Party and Green Party made a statement about readiness to develop cooperation with the EU and the Conservatives and the UK Independence Party were on the side of the Eurosceptics. The opinions of the parties were also divided on military operations abroad, financing and force level. In terms of one-party government and presence of majority in the House of Commons, the Conservatives have opportunities to realize their own vision of British safety policy.

  10. Automated procedure for performing computer security risk analysis

    International Nuclear Information System (INIS)

    Smith, S.T.; Lim, J.J.

    1984-05-01

    Computers, the invisible backbone of nuclear safeguards, monitor and control plant operations and support many materials accounting systems. Our automated procedure to assess computer security effectiveness differs from traditional risk analysis methods. The system is modeled as an interactive questionnaire, fully automated on a portable microcomputer. A set of modular event trees links the questionnaire to the risk assessment. Qualitative scores are obtained for target vulnerability, and qualitative impact measures are evaluated for a spectrum of threat-target pairs. These are then combined by a linguistic algebra to provide an accurate and meaningful risk measure. 12 references, 7 figures

  11. European Energy Policy and Its Effects on Gas Security

    Science.gov (United States)

    Radu, Victorita Stefana Anda

    The goal of this study is to examine the effects of the energy policies of the European Union (EU) on its gas security in the period 2006 to 2016. While energy security is often given a broad meaning, this paper focuses on its external dimension: the EU?s relations with external gas suppliers. It is grounded on four pillars drawing from the compounded institutionalist and liberal theoretical frameworks: regulatory state, rational-choice, external governance, and regime effectiveness. The research question was investigated through a qualitative methodology with two main components: a legislative analysis and four case studies representing the main gas supply options--Russia, North African exporting countries, Norway, and liquefied natural gas (LNG). They highlighted that the EU framed the need for gas security mainly in the context of political risks associated with Russian gas supply, but it almost never took into account other equally important risks. Moreover, the research revealed two main issues. First, that the deeper and the more numerous EU?s energy policies were, the bigger was the magnitude of the effect. Specifically, competitiveness and infrastructure policies had the largest magnitude, while the sustainability and security of supply policies had the smallest effect. Second, EU energy policies only partially diminished the economic and political risks in relation to foreign gas suppliers. To conclude, to a certain extent the EU?s efforts made a positive contribution to the external dimension of the EU?s gas security, but the distinguishing trait remains that there is no consistency in terms of the magnitude of the effect and its nature.

  12. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  13. The Faroe Islands’ Security Policy in a Process of Devolution

    Directory of Open Access Journals (Sweden)

    Beinta í Jákobsstovu

    2012-12-01

    Full Text Available Since the late 1990s there has been a remarkable change in the institutional context of safety and security policies for the Faroes. The end of the Cold War led to a reduction in the strategic importance of, and military presence in, the islands. However, today Faroese sea and air space is increasingly exposed to heavy civilian traffic due to expected oil production as well as new sailing routes from the High North. The Faroese government is in a process, nearly completed, of taking over the full responsibility for societal security policy, a field it used to share with the Danish state authorities. In April 2002, the Faroese authorities took over the responsibility for SAR in Faroese sea territory and established a MRCC Center in Tórshavn. A new civic security law was passed by Løgtingið (the parliament in May 2012. This article discusses micro-states’ options in the international arena; provides a brief overview of the history of Faroese security policy; and discusses the present and future challenges involved in assuring protection and rescue services for the Faroese region of the North Atlantic.

  14. The French nuclear policy. A model for security policy in North-East Asia

    International Nuclear Information System (INIS)

    Choe, K.

    1998-01-01

    Between the end of the second world war and the collapse of the Berlin wall, the French diplomacy was based on the nuclear policy in a solid and coherent way. This nuclear policy was an 'incarnation' of the national security conception, allowing France to recover its political, military and economical rank on the international scene. The most important characteristic of the French nuclear policy concerns the commercialization of the nuclear energy which aims to ensuring the national security through the building up of a financial, technological and political 'reserve'. In front of the domination of the USA and USSR during the cold war era, NE Asia had a similar geostrategic configuration as Western Europe. It concerns in particular the massive application of nuclear energy for both military and industrial purposes. The bases of the security policy in this region refers to the real use of the nuclear weapon by the USA against Japan in 1945. The French nuclear policy may be considered as a model for the building of the security policy of NE Asia, in particular through the commercialization of the nuclear technology between the countries in concern. This nuclear approach would allow the countries of these region to change their present day national defense policy into an economical and military cooperation. (J.S.)

  15. International Security, Development, and Human Rights: Policy Conversion or Conflict?

    Directory of Open Access Journals (Sweden)

    Miao-ling Lin Hasenkamp

    2012-04-01

    Full Text Available This article uses an institutional network governance approach to explore the overlapping dimension of the policy fields between security, development, and human rights, reflected in the US and German provincial reconstruction teams (PRTs in Afghanistan. The past two decades have witnessed a gradually changing paradigm in academic and policy debates regarding the questions of the normative basis of world order and possibilities for tackling imminent threats to security and peace (i.e. intra-state armed conflicts, failed states, terrorism, poverty, and deepening inequality. The introduction of concepts such as “human security” and “the right to humanitarian intervention/responsibility to protect (R2P” as well as critical examinations of peace-, nation-, and state-building missions (PNSB have led to a relativist tendency of state sovereignty and a changing attitude regarding how to address the intersection of security, development, and human rights. Despite this shift, the policy commitments to integrating these policy considerations remain puzzling. How have they been redefined, conceptualized, and put into practice? I argue that an integrated conceptual approach has facilitated the redefinition of common policy goals, principles, and the mobilization of resources. At the same time, civil and military cooperation, as demonstrated in the multifunctional work of PRTs, has been Janus-headed—permanently caught in an ongoing tension between the war on terror and short-term stability operation on the one hand and long-term durable peace and development on the other. The misunderstanding of its interim character, the dynamics of Afghan environment, the blurring of policy lines, and the differences between national PRT models have made it difficult to systematically assess the efficiency and legitimacy of each policy frame and program.

  16. BASES OF PUBLIC POLICY FORMATION DIRECTED AT ENSURING BUDGET SECURITY

    Directory of Open Access Journals (Sweden)

    S. Onishchenko

    2015-03-01

    Full Text Available In the article the priorities and public policies that can improve the safety level of the budget of Ukraine have been grounded. Attention on the problems of imbalance and deficiency trends accumulation of public debt has been focused. The detailed analysis of the budget deficit of the European community to further research the main problems of fiscal security has been carried out. The formation of the concept of budget policy should include long-term and medium-term priorities of the state priorities areas have been concluded. Budget policy on public debt must deal with interrelated issues of debt bondage and effective use of public credit, promote economic growth with respect safe level and structure of public debt have been emphasized by author. Debt policy as part of fiscal policy under certain conditions can be a powerful tool to intensify investment and innovation processes in society, promote economic and social development. The reorientation of fiscal policy to address current problems through debt and use it as the basis of investment and innovation development provides an effective public debt management is designed to reduce state budget expenditures on its servicing and repayment, optimizing the scope and structure of debt according to economic growth. The role of debt policy in modern terms increases is clearly subordinate to and consistent with long-term goals and priorities of fiscal policy. There is an urgent development and implementation of effective mechanisms for investing borrowed resources, increasing the efficiency of public investment, including the improvement of organizational, financial, legal and controls. Strategically budget security guarantees only competitive economy, which can be constructed only by recovery and accelerated development of promising sectors of the national economy in the presence of a balanced budget policy. Now there is a tendency to implement only measures to stabilize the political and socio

  17. Visa Security Policy: Roles of the Departments of State and Homeland Security

    Science.gov (United States)

    2011-06-30

    Cong., 2nd sess., April 20, 1950. 13 8 U.S.C. 1104 . 14 8 U.S.C. 1201. AILA InfoNet Doc. No. 11071267. (Posted 07/12/11) Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS automated

  18. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  19. Policy revision in health enterprise information security: P3WG final report

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2003-05-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center (TATRC), TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG) examined military policies and regulations relating to computer-based information systems and medical records management. Using an interdisciplinary and interservice QA approach they compared existing military policies with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to identify gaps and discrepancies. The final report, including a plain English explanation of the individual standards and relevance to the Department of Defense (DoD), a comparative analysis and recommendations, will feed in to the security management process and HIPAA implementation efforts at multiple levels within the DoD. In light of High Reliability Theory, this process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains, building consensus on key policy reforms among military stakeholders across different disciplines, levels of command hierarchy and services.

  20. Information security policies for governmental organisations, the minimum criteria

    CSIR Research Space (South Africa)

    Ngobeni, SJ

    2009-07-01

    Full Text Available and retention of documents. 18) Incident response. The policy discusses issues concerning how an organisation responds quickly and effectively to a system or network security breach [13]. 19) Contingency planning. The policy needs to address contingency... _ 17. Document destruction and retention X _ X X 18. Incident response X X X X 19. Contingency planning X _ X X 20. Telecommuting and mobile computing _ _ X _ 21. Intrusion Detection Systems X X X X From Table 1 it can be detained that not all...

  1. Security Policies from a Spatial Perspective: the Case of Honduras

    Directory of Open Access Journals (Sweden)

    Lirio del Carmen Gutiérrez Rivera

    2014-06-01

    Full Text Available Public insecurity became a central issue for many Hondurans in the late 1990s, as crime, delinquency and homicide increased significantly in the isthmus. Honduras had the second highest homicide rate (35.1 per 100,000 in the region after El Salvador (50.2. per 100,000 . This social violence triggered insecurity and fear, which was further accompanied by the overall perception that the state was unable of relieving or protecting the population. This article looks at the failed attempts of the Honduran state to stop social violence and to control youth gang expansion by focusing on the security policies Cero Tolerancia (Zero Tolerance, Mano Dura (Iron Fist and the Ley Antimaras (Anti-Gang Law. It understands security policies as territorial strategies that attempt to reduce social violence and impose control.

  2. A View of Food Security through A Policy Coherent Lens

    DEFF Research Database (Denmark)

    Robertson, Aileen

    2014-01-01

    Member States “Food and nutrition security exists when all people at all times have physical, social and economic access to food, which is safe and consumed in sufficient quantity and quality to meet their dietary needs and food preferences, and is supported by an environment of adequate sanitation...... by increasing availability, affordability and consumption of biodiverse, safe, nutritious foods aligned with dietary recommendations and environmental sustainability.  Given that the number of chronically undernourished (stunted) could double over next 15 years, the Post-2015 Agenda and its Poverty Reduction......The term “food and nutrition security” reflects the multisector collaboration needed between those working with food security and nutrition security. The term expresses an integrated development goal to help guide implementation of policy and cost-effective programmatic action: As agreed by FAO...

  3. 10 CFR 95.19 - Changes to security practices and procedures.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Changes to security practices and procedures. 95.19 Section 95.19 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND..., also to the Director, Division of Security Operations, Office of Nuclear Security and Incident Response...

  4. WRR-Policy Brief 6 : Big data and security policies: serving security, protecting freedom

    NARCIS (Netherlands)

    Broeders, Dennis; Schrijvers, Erik; Hirsch Ballin, Ernst

    2017-01-01

    Big Data analytics in national security, law enforcement and the fight against fraud can reap great benefits for states, citizens and society but require extra safeguards to protect citizens’ fundamental rights. This requires new frameworks: a crucial shift is necessary from regulating the phase of

  5. China's Quest for Energy; Impact upon Foreign and Security Policy

    International Nuclear Information System (INIS)

    Kiesow, Ingolf

    2004-11-01

    Contrary to Chinese intentions, the proportion of China's imports coming from potentially unstable countries is steadily increasing. As a response, China tries to diversify its sources of import and to own the oil when loaded in an export harbour. In spite of very high costs and political problems, China tries to import oil and gas from owned fields in Central Asia through pipelines. In the case of China, the competition is evident on the highest international level. Especially with Japan, this tends to make already previously sensitive relations deteriorate. China has territorial disputes with several neighbouring countries that are becoming more complicated by the fact that there is oil and gas on the bottom of the sea in the disputed area. Relations with Russia have been complicated. Since the 1990s they are on their way of being steadily improved, but they become strained, when Japan is given priority access to oil fields in Siberia. The sensitive relations with the U.S. tend to be impaired by China's ways of getting access to more secure supply of oil and gas. Chinese efforts to get a more attractive foreign policy profile is on the other hand alleviating but does not eliminate the potential of the energy issue to complicate. China's foreign and security policy relations. The European Union seems to be on its way to introduce energy questions as a field of common policy. This is a reason for Sweden to study the development. It is a matter of special interest that China has proposed an 'Energy Dialogue between Asia and Europe' about the resources and the Eurasian continent. The Chinese example illustrates the need for a Swedish energy security policy and plans for energy crisis preparedness

  6. Simple multicomponent batch distillation procedure with a variable reflux policy

    Directory of Open Access Journals (Sweden)

    A. N. García

    2014-06-01

    Full Text Available This paper describes a shortcut procedure for batch distillation simulation with a variable reflux policy. The procedure starts from a shortcut method developed by Sundaram and Evans in 1993 and uses an iterative cycle to calculate the reflux ratio at each moment. The functional relationship between the concentrations at the bottom and the dome is evaluated using the Fenske equation and is complemented with the equations proposed by Underwood and Gilliland. The results of this procedure are consistent with those obtained using a fast method widely validated in the relevant literature.

  7. Three Modes of Thinking and Policy Orientation of Cultural Security

    Institute of Scientific and Technical Information of China (English)

    LIU Yuejin; Wang Xuege

    2016-01-01

    Three types of relations are entangled nowadays in dealing with issues conceming national cultural security on both the theoretical and practical levels:(1) the relation between one's own culture and that of other ethnic groups;(2) the relation between advanced and underdeveloped parts of culture;(3) the relation between one's ethnic culture and so-called foreign advanced culture as related to the previous two.Accordingly,three modes of thinking are likely adopted in handling issues concerning national cultural security:to antagonize one's own culture with that of other ethnic groups,that is,taking the "me or you" attitude;to dualize cultures as the "advanced" and the "underdeveloped",that is,believing things to be good if not bad,or vice versa;and to assert that the ethnic are the advanced,that is,taking the "only-megood" stance.It is a very demanding job to maintain national culture and to pursue cultural development at the same time.Only when cultures are grouped into those without distinction between the advanced and the underdeveloped and those with such distinction can the relation between the ethnic and the advanced be properly handled.With the former,it is essential to maintain the ethnicity of one's own culture before the cultural security is safeguarded.With the latter,however,the pursuit of advanced cultures and the advocacy of the advanced part of a particular culture is a key to ensuring and safeguarding the national cultural security.Hence,it is important to enhance the public awareness of cultural security,and more essentially for the government to offer scientifically appropriate orientation towards cultural security and to frame related policies.

  8. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  9. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  10. 32 CFR 168a.4 - Policy and procedures.

    Science.gov (United States)

    2010-07-01

    ... to pursue graduate degrees in science, engineering, or other fields of study that are designated, in... DEFENSE SCIENCE AND ENGINEERING GRADUATE FELLOWSHIPS § 168a.4 Policy and procedures. (a) Sponsoring... nationwide competition in which all appropriate actions have been taken to encourage applications from...

  11. ODIN. Online Database Information Network: ODIN Policy & Procedure Manual.

    Science.gov (United States)

    Townley, Charles T.; And Others

    Policies and procedures are outlined for the Online Database Information Network (ODIN), a cooperative of libraries in south-central Pennsylvania, which was organized to improve library services through technology. The first section covers organization and goals, members, and responsibilities of the administrative council and libraries. Patrons…

  12. 78 FR 69286 - Electric System Construction Policies and Procedures

    Science.gov (United States)

    2013-11-19

    ... DEPARTMENT OF AGRICULTURE Rural Utilities Service 7 CFR Part 1726 Electric System Construction Policies and Procedures CFR Correction In Title 7 of the Code of Federal Regulations, Parts 1600 to 1759, revised as of January 1, 2013, on page 246, in Sec. 1726.14, the second definition of Minor modification...

  13. 12 CFR 609.930 - Policies and procedures.

    Science.gov (United States)

    2010-01-01

    .... Before engaging in E-commerce, you must weigh its business risks against its benefits. You must also....930 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM ELECTRONIC COMMERCE Standards for Boards and Management § 609.930 Policies and procedures. The FCA supports E-commerce and wants to...

  14. 31 CFR 206.3 - Billing policy and procedures.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Billing policy and procedures. 206.3 Section 206.3 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE MANAGEMENT OF FEDERAL AGENCY RECEIPTS...

  15. Cyber security awareness toolkit for national security: An approach to South Africa’s cybersecurity policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed Cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives as well...

  16. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    Science.gov (United States)

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  17. THE FOREIGN AND SECURITY POLICIES OF THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Anand Menon

    2003-09-01

    Full Text Available In only a decade the European Union has moved from being a new kid on the block in terms of foreign and security policies to being a high profile and surprisingly effective international actor. Certainly, it has failed to match the ambitions of some of its most enthusiastic proponents. Certainly, too, European publics know next to nothing about what the Union does in the international realm. It is because of this that, despite their potential and their effectiveness to date, EU policies in this sphere were widely derided as failures following the moment when the attacks of 11 September 2001 shook the western world to its core. The Convention on the Future of Europe and subsequent intergovernmental conference look set to make significant institutional changes to the Union’s foreign and security policy systems. In undertaking these reforms, Convention members, and national governments are doubtless motivated by the laudable objective of enabling the Union to do more on the international stage. One can only hope that these motives notwithstanding, they do not simply propose reforms for their own sake and, in the process, undermine a system that, to the surprise of many, has continued to function respectably in an ever more complex and ever more dangerous world.

  18. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  19. Dynamic reconfiguration of security policies in wireless sensor networks.

    Science.gov (United States)

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-03-04

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs).We evaluate our approach using a case study from the intelligent transportation system domain.

  20. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mónica Pinto

    2015-03-01

    Full Text Available Providing security and privacy to wireless sensor nodes (WSNs is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs.We evaluate our approach using a case study from the intelligent transportation system domain.

  1. Debating food security policy in two different ideational settings

    DEFF Research Database (Denmark)

    Farsund, Arild Aurvåg; Daugbjerg, Carsten

    2017-01-01

    in Australia and Norway is compared. In Australia, agricultural normalism (agricultural markets and production are considered to be similar to those of other economic sectors) has been dominant since the mid-1980s, while Norwegian agricultural policy making has been dominated by agricultural exceptionalism...... (agriculture is considered a unique economic sector with special market and production conditions). It is demonstrated in the article how these two opposing institutionalised ideational foundations have influenced the nature of the food security debate in the two countries. In Australia, the debate emphasises...... the positive role of the market and trade in providing global food security. In Norway, the debate highlights the need to regulate market forces and restrict trade in order to allow countries to develop their own agricultural sectors....

  2. U.S. energy security: problems and policies

    Energy Technology Data Exchange (ETDEWEB)

    Toman, M.A

    2002-12-15

    The reemergence of concern about energy security in the wake of the September 2001 terror attacks amplified a theme that was already present in U.S. energy policy debates. Energy security was a central theme in the Bush administration energy policy report released by Vice President Cheney in the spring of 2001. World oil prices rose from about 10 dollar a barrel in 1998 to more than 30 dollar a barrel in late 2000. Prices trended down through most of 2001 to below 20 dollar a barrel, although the combined effect of improving economic conditions, OPEC supply cuts, and Middle East conflict (both actual and potential) have recently brought prices back into the dollar 25 per barrel neighborhood. In 2000 the United States imported almost 60 percent of the petroleum it consumed; imports from the Organization of Petroleum Exporting Countries (OPEC) made up about a quarter of total U.S. consumption. In previous energy security debates in the U.S., most of the attention has been on international oil markets and geopolitics. This time, even before September 11, the energy security debate had a much larger domestic component. The 2001 ''electricity market meltdown'' in California raised large concerns there and nationwide about the causes and consequences of electricity shortages and price volatility. The concerns run so deep that they are likely to have a significant effect on the ongoing debate about restructuring of the power sector though the nature of that effect remains to be determined. Similarly, periods of sharply rising motor fuels prices over the past few years increases well beyond what would be implied just by crude oil price volatility have led to concerns about the effects on households and commerce. All of these concerns are only amplified by worries about attacks on critical energy infrastructure. (author)

  3. U.S. energy security: problems and policies

    International Nuclear Information System (INIS)

    Toman, M.A.

    2002-12-01

    The reemergence of concern about energy security in the wake of the September 2001 terror attacks amplified a theme that was already present in U.S. energy policy debates. Energy security was a central theme in the Bush administration energy policy report released by Vice President Cheney in the spring of 2001. World oil prices rose from about 10 dollar a barrel in 1998 to more than 30 dollar a barrel in late 2000. Prices trended down through most of 2001 to below 20 dollar a barrel, although the combined effect of improving economic conditions, OPEC supply cuts, and Middle East conflict (both actual and potential) have recently brought prices back into the dollar 25 per barrel neighborhood. In 2000 the United States imported almost 60 percent of the petroleum it consumed; imports from the Organization of Petroleum Exporting Countries (OPEC) made up about a quarter of total U.S. consumption. In previous energy security debates in the U.S., most of the attention has been on international oil markets and geopolitics. This time, even before September 11, the energy security debate had a much larger domestic component. The 2001 ''electricity market meltdown'' in California raised large concerns there and nationwide about the causes and consequences of electricity shortages and price volatility. The concerns run so deep that they are likely to have a significant effect on the ongoing debate about restructuring of the power sector though the nature of that effect remains to be determined. Similarly, periods of sharply rising motor fuels prices over the past few years increases well beyond what would be implied just by crude oil price volatility have led to concerns about the effects on households and commerce. All of these concerns are only amplified by worries about attacks on critical energy infrastructure. (author)

  4. Energy policy seesaw between security and protecting the environment

    International Nuclear Information System (INIS)

    Finon, D.

    1994-01-01

    It is just the price of oil that causes the energy policies of importing countries to vacillate. Changing perceptions of energy supply factors has had as much to do with transfiguring government action modes since 1973 as has the idea of the legitimacy of that action. The present paper thus draws a parallel between the goal of energy security twenty years ago and that of global environmental protection today, which explains the critical reversion to a view of minimum government action in the energy field - a view that marked the eighties. (author). 20 refs

  5. Science and Security Policy: The Case of Advanced Pathogens

    International Nuclear Information System (INIS)

    Harris, E. D.

    2007-01-01

    The revolution in biotechnology presents unprecedented opportunities and dangers for the health and well being of mankind. Today, one can plausibly imagine the eradication of many historic diseases. One can also envisage the creation of new diseases that would endanger a substantial proportion of the entire human species. As powerful applications for biotechnology research are identified, appropriate arrangements for managing their extraordinary consequences will inevitably become necessary. This presentation will explore recent efforts to balance science and security policy in the area of advanced biotechnology research. Key developments on the dual-use issue will be discussed, together with a variety of governance options aimed at mitigating the risk from such research. (author)

  6. The Distributional Impact of Social Security Policy Options.

    Science.gov (United States)

    Couch, Kenneth A; Reznik, Gayle L; Tamborini, Christopher R; Iams, Howard M

    2017-01-01

    Using microsimulation, we estimate the effects of three policy proposals that would alter Social Security's eligibility rules or benefit structure to reflect changes in women's labor force activity, marital patterns, and differential mortality among the aged. First, we estimate a set of options related to the duration of marriage required to receive divorced spouse and survivor benefits. Second, we estimate the effects of an earnings sharing proposal with survivor benefits, in which benefits are based entirely on earned benefits with spouses sharing their earnings during years of marriage. Third, we estimate the effects of adjusting benefits to reflect the increasing differential life expectancy by lifetime earnings. The results advance our understanding of the distributional effects of these alternative policy options on projected benefits and retirement income, including poverty and supplemental poverty status, of divorced and widowed women aged 60 or older in 2030.

  7. Development of Policies, Institutions and Procedures for Water Reuse

    Science.gov (United States)

    Demouche, L.; Pfiefer, J.; Hanson, A.; Skaggs, R.

    2009-12-01

    In the arid, water scarce region of New Mexico and West Texas there is growing interest in the potential for water reuse to extend existing supplies and mitigate drought shortage impacts. There are no new sources of water in New Mexico, except reclaimed water. Communities and individuals are uncertain about and have many unanswered questions about polices, institutions involved (agencies), legal and regulatory requirements, and procedures governing water reuse. Issues to be addressed by this project include: the legal ability to reuse water, ownership of water rights, downstream or third party impacts, regulatory and procedural requirements, water quality concerns, state and local agency involvement, and cost effectiveness of water reuse compared to alternative sources. Presently, there is very little implementation or directives in New Mexico policy that addresses reuse, reclamation, or recycled water. The only regulations pertaining to reuse is New Mexico Environmental Department currently allows the use of reclaimed domestic wastewater for irrigation of golf courses and green spaces, which is listed in the Policy for the Above Ground Use of Reclaimed Domestic Wastewater (NMED, 2003). This document identifies the various reclaimed quality classifications that are required for specific applications and the permits required for application. This document does not identify or address policy applications on the distribution, ownership, or trading of reclaimed water. Even though reclaimed water reuse projects are currently being implemented in many cities in the U.S., mainly for commercial and municipal irrigation (golf courses and green space), its potential has not yet been exploited. A policy analysis matrix (PAM) is being designed to identify and examine the policy framework and consequences of non-policy implementation for decision makers and interest groups and assist them in understanding the consequences of policy actions and project outcomes if no laws or

  8. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Science.gov (United States)

    2010-01-01

    ... Procedures for certification of approved products for Homeland Security. (a) Application Procedure. An applicant seeking a Certification of anti-terrorism Technology as an Approved Product for Homeland Security... application for renewal must be made using the “Application for Certification of an Approved Product for...

  9. 12 CFR 615.5570 - Book-entry procedures for Federal Agricultural Mortgage Corporation Securities.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Book-entry procedures for Federal Agricultural Mortgage Corporation Securities. 615.5570 Section 615.5570 Banks and Banking FARM CREDIT ADMINISTRATION... Federal Agricultural Mortgage Corporation Securities § 615.5570 Book-entry procedures for Federal...

  10. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  11. The role of space in the security and defence policy of Turkey. A change in outlook: Security in space versus security from space

    OpenAIRE

    Ercan, C.; Kale, I.

    2017-01-01

    Space and security domains are strongly related with each other. Nowadays, space is an indispensable part of security and defence policy, and it is increasingly becoming a critical infrastructure for strategic Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) systems. However, space is vulnerable itself to the new space threats. This study reviews the current and near future space role in Turkey's security and defence policy and aims to address...

  12. Impact of Population Aging on Military and Security Policy

    Directory of Open Access Journals (Sweden)

    Martina Šimková

    2014-12-01

    Full Text Available Population ageing is among the most important problems of developed European countries and the most frequently discussed social issues. The Czech Republic also faces population ageing and we cannot expect a different trend in the future. Life expectancy has increased due to better health care while current lifestyle often leads to lower natality, resulting in a negative rate of natural increase and a decreasing proportion of young people in population in the future. This problem affects all spheres of life and social and economic development. Population ageing may pose a threat to the security of the population in different ways. The functioning of the security system may be threatened due to decreasing workforce. Population ageing may undercut resources for military budgets. Young recruits represent an important part of military forces and the latter are competing in the labour market with more attractive occupations. Especially ensuring the stability of the personnel needed for securing crisis situations would be a significant problem of near future. This paper presents a demographic perspective on staffing and correct operation of military forces in the context of population ageing. It describes the current situation of human resources in the military policy of the Czech Republic and determines the negative impact of population ageing on recruitment potential. It deals with the sustainability of human resources for security forces.

  13. 2 CFR 3185.30 - What policies and procedures must I follow?

    Science.gov (United States)

    2010-01-01

    ... INSTITUTE OF MUSEUM AND LIBRARY SERVICES NONPROCUREMENT DEBARMENT AND SUSPENSION § 3185.30 What policies and procedures must I follow? The IMLS policies and procedures that you must follow are the policies and... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false What policies and procedures must I follow...

  14. ENERGY IN THE CONTEXT OF THE PRESENT CHALLENGES TO THE EUROPEAN COMMON SECURITY AND DEFENCE POLICY

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2014-10-01

    Full Text Available The Common Security and Defence Policy is a part of the European Union’s Common Foreign and Security Policy (CFSP and establishes the policy framework for the institutional structures and military instruments which have to deal with the security challenges in Europe’s geopolitical neighborhood. The article aims to identify and analyze the role of energy as one of the present challenges to the European Common Security and Defence Policy in the context of the recent events in the world economy.

  15. 12 CFR 12.7 - Securities trading policies and procedures.

    Science.gov (United States)

    2010-01-01

    ... individually or in combination; (3) Provide for the crossing of buy and sell orders on a fair and equitable... their behalf in which they have a beneficial interest, if the officers and employees: (i) Make investment recommendations or decisions for the accounts of customers; (ii) Participate in the determination...

  16. Financial Management Regulation. Volume 15. Security Assistance Policy and Procedures

    Science.gov (United States)

    1993-03-01

    as follows: (3). (5). (6). (7). (I). Qty, (4). SC/MOS/ Ofr Del Itm (2). Unit of Costs TA or Rel Trm Nbr Item Descriction issue (a) Unit (b) Total...the period rubber stamp or computer printing to: ended followed by an alphabetic management code assigned by SAAC. The management code 1. Notify the...EDIT DTC (1) 22 --- Validated it TBC is invalid. See TBC va’idation TYPE-ASST(1) 23 --- NO EDIT DOC- NBR -LST-8(8) 󈧜-27 --- NO EDIT DT-RQSN(4) DOC-SERIAL

  17. Basic policy of JMTR refurbishment and regulatory procedure

    International Nuclear Information System (INIS)

    Tobita, Kenji

    2012-04-01

    The JMTR refurbishment started from FY2007 had been completed on the end of the FY2010. The refurbishment works carried out on about 60 items nuclear reactor systems, (about 40 of facilities and about 20 constructions) with no trouble. This report review the basic policy of JMTR refurbishment, such as a selection of facilities/equipments for the refurbishment and the determination method of specifications for repairs. The deliberation and discussion by the safety review committee of Oarai Research and Development Center in the Japan Atomic Energy Agency and nuclear regulatory procedure are included in this report. (author)

  18. India's grain security policy in the era of high food prices

    DEFF Research Database (Denmark)

    Yu, Wusheng; Bandara, Jayatilleke

    2017-01-01

    policies, which are superior in terms of their welfare effects and fiscal costs and might also be politically feasible. These findings have important implications on the ongoing debates on India's food security policy, particularly in relation to the discussion on its National Food Security Act....

  19. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  20. Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy Compliance

    Science.gov (United States)

    Mutchler, Leigh Ann

    2012-01-01

    The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…

  1. 23 CFR 630.1106 - Policy and procedures for work zone safety management.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Policy and procedures for work zone safety management... Policy and procedures for work zone safety management. (a) Each agency's policy and processes, procedures, and/or guidance for the systematic consideration and management of work zone impacts, to be...

  2. BULGARIA’S MULTI-VECTOR FOREIGN POLICY APPROACH TO SECURITY CHALLENGES IN EASTERN EUROPE

    Science.gov (United States)

    2017-04-06

    tenuous than ever with the new controversial Trump administration and the EU nascent foreign policy efforts already failed in handling the challenges...AIR WAR COLLEGE AIR UNIVERSITY BULGARIA’S MULTI-VECTOR FOREIGN POLICY APPROACH TO SECURITY CHALLENGES IN EASTERN EUROPE by Dimitar Y...the abatement of US interest in Europe, will require wise foreign policy maneuvers to address the changes in the transformed security environment. As

  3. Data publication - policies and procedures from the PREPARDE project

    Science.gov (United States)

    Callaghan, Sarah; Murphy, Fiona; Tedds, Jonathan; Kunze, John; Lawrence, Rebecca; Mayernik, , Matthew S.; Whyte, Angus; Roberts, Timothy

    2013-04-01

    Data are widely acknowledged as a first class scientific output. Increases in researchers' abilities to create data need to be matched by corresponding infrastructures for them to manage and share their data. At the same time, the quality and persistence of the datasets need to be ensured, providing the dataset creators with the recognition they deserve for their efforts. Formal publication of data takes advantage of the processes and procedures already in place to publish academic articles about scientific results, enabling data to be reviewed and more broadly disseminated. Data are vastly more varied in format than papers, and so the policies required to manage and publish data must take into account the complexities associated with different data types, scientific fields, licensing rules etc. The Peer REview for Publication & Accreditation of Research Data in the Earth sciences (PREPARDE) project is JISC- and NERC-funded, and aims to investigate the policies and procedures required for the formal publication of research data. The project is investigating the whole workflow of data publication, from ingestion into a data repository, through to formal publication in a data journal. To limit the scope of the project, the focus is primarily on the policies required for the Royal Meteorological Society and Wiley's Geoscience Data Journal, though members of the project team include representatives from the life sciences (F1000Research), and will generalise the policies to other disciplines. PREPARDE addresses key issues arising in the data publication paradigm, such as: what criteria are needed for a repository to be considered objectively trustworthy; how does one peer-review a dataset; and how can datasets and journal publications be effectively cross-linked for the benefit of the wider research community and the completeness of the scientific record? To answer these questions, the project is hosting workshops addressing these issues, with interactions from key

  4. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    Science.gov (United States)

    2017-06-01

    confirmation of Lake’s concerns with the administration’s public relations failures, David Gergen, the president’s communications advisor, increased... Public Affairs: 389-395. 75 these positions, he did not openly object too them during the campaign. Additionally, as this case study shows, he...PEOPLE, PROCESS, AND POLICY: CASE STUDIES IN NATIONAL SECURITY ADVISING, THE NATIONAL SECURITY COUNCIL, AND PRESIDENTIAL DECISION MAKING

  5. 42 CFR 50.403 - What is the policy basis for these procedures?

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false What is the policy basis for these procedures? 50.403 Section 50.403 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS POLICIES OF GENERAL APPLICABILITY Public Health Service Grant Appeals Procedure § 50.403 What is the policy...

  6. Composing Alternatives to a National Security Language Policy

    Science.gov (United States)

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  7. An encryption scheme for a secure policy updating

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, M.; Petkovic, M.; Obaidat, M.S.; Tsihrintzis, G.A.; Filipe, J.

    2012-01-01

    Ciphertext policy attribute based encryption is an encryption technique where the data is encrypted according to an access policy over attributes. Users who have a secret key associated with a set of attributes which satisfy the access policy can decrypt the encrypted data. However, one of the

  8. UN Security Council Practice and Regional Arrangements: Procedure, Legitimacy and International Justice

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2015-01-01

    When the United Nations Security Council first met in January 1946, it was unable to reach agreement on rules of procedure to govern its operation. Instead, “provisional” rules were adopted in anticipation of further negotiation at a later date. The same provisional rules govern the Council’s work...... today, but provide only the skeletal framework of its contemporary practice. From the early 1990s, the Council increasingly implemented informal working methods to expedite its decision-making. This paper will critically examine the tension between the procedural practice of the Security Council...... to act ‘in conformity with the principles of justice and international law’ as stipulated in the very first provision of the United Nations Charter. Scholarship to date has largely ignored the procedural context of Security Council decisions, notwithstanding it provides the very structure within which...

  9. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    Science.gov (United States)

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  10. (Inefficiency of EU Common Foreign and Security Policy: Ukraine, Brexit, Trump and beyond

    Directory of Open Access Journals (Sweden)

    Filipec Ondřej

    2017-10-01

    Full Text Available The main aim of this article is to explore and analyze key determinants of EU Common Foreign and Security Policy efficiency. For this purpose a 3C analytical approach is used, exploring EU foreign and security policy consistency, capacities and the dimension of cooperation. Article analyzes both horizontal and vertical, consistency of EU Foreign and Security policy especially with connection to Ukraine crises and diverging interests of EU member states. EU capacities are explored with main focus on military spending and challenges related to limited spending. EU military decline is put in contrast with new emerging regional powers. In the area of cooperation article is dedicated mainly to ineffective partnership with Turkey, cold attitude of Trump administration towards Europe and the implications of Brexit for EU foreign and security policy.

  11. INTERNAL MARKET GOVERNMENT SECURITIES IN PROMOTING THE EFFICIENCY OF DEBT POLICY OF UKRAINE

    Directory of Open Access Journals (Sweden)

    K. Kuryshchuk

    2014-01-01

    Full Text Available The article analyzes the effectiveness of debt policy of Ukraine, to its shortcomings and implications for the economy. The evaluation of the domestic government securities market and its impact on the efficiency of debt management.

  12. How Robust Refugee Protection Policies Can Strengthen Human and National Security

    Directory of Open Access Journals (Sweden)

    Donald Kerwin

    2016-09-01

    Full Text Available This paper makes the case that refugee protection and national security should be viewed as complementary, not conflicting state goals. It argues that refugee protection can further the security of refugees, affected states, and the international community. Refugees and international migrants can also advance national security by contributing to a state’s economic vitality, military strength, diplomatic standing, and civic values. The paper identifies several strategies that would, if implemented, promote both security and refugee protection. It also outlines additional steps that the US Congress should take to enhance US refugee protection policies and security. Finally, it argues for the efficacy of political engagement in support of pro-protection, pro-security policies, and against the assumption that political populism will invariably impede support for refugee protection.

  13. Party politics and Greek security policy from 1974 to 1984: change and continuity

    OpenAIRE

    Haines, John L.

    1984-01-01

    Approved for public release; distribution is unlimited This thesis explores the effects of political change on Greek security policy during the period 1974 to 1984. This period encompasses significant change in Greece's foreign relations including those with the United States. The central question is: Are the elements of Greek security policy based on long-term basic interests which find consistent expression, or are they a function of domestic political factors, more ideologicall...

  14. Role and participation of women in the establishment and implementation of international security policies

    Directory of Open Access Journals (Sweden)

    Marigonë Vrajolli

    2018-03-01

    The purpose of this paper is to explain the different roles that women have in creating security policies. Further, this paper explains the role of women in initiatives, peacekeeping and peace-building. The paper also explains the international mechanisms that promote the involvement of women in peace and security processes.

  15. Critical water requirements for food, methodology and policy consequences for food security

    NARCIS (Netherlands)

    Gerbens-Leenes, P.W.; Nonhebel, S.

    2004-01-01

    Food security and increasing water scarcity have a dominant place on the food policy agenda. Food security requires sufficient water of adequate quality because water is a prerequisite for plant growth. Nowadays, agriculture accounts for 70% of the worldwide human fresh water use. The expected

  16. Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems

    NARCIS (Netherlands)

    Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir; Barthe, Gilles; Markatos, Evangelos; Samarati, Pierangela

    2016-01-01

    A crucial question for an ICT organization wishing to improve its security is whether a security policy together with physical access controls protects from socio-technical threats. We study this question formally. We model the information flow defined by what the organization’s employees do (copy,

  17. The impact of security and intelligence policy in the era of cyber crimes

    Directory of Open Access Journals (Sweden)

    MSc. Bahri Gashi

    2016-07-01

    Full Text Available Creation of National Cyber Defense Strategy, is the only security and the best protection against cyber-crimes. This is the starting point, from where adequate policies and necessary legal measures begin, aiming the creation of a solid ground and responsible users by implementing comprehensive measures and legal restrictions. The methodology used to achieve the recognition of users with applicable legislation and regulations on the use of the Internet, as well as legal obligations; implementation of procedures to use communication systems; signing and approval by users of their responsibilities; knowledge and information on the risks and threats stemming from the use of communication networks; certification of trained and specialized staff; classification and processing of information in a particular system; identifying unauthorized users who use classified information networks in  public systems and private sector; creating barriers in distance entry networks and information systems, etc. Various Security and Intelligence institutions covering and operating in these areas are responsible for the creation and promotion of National Cyber Defense Strategy, analyzing the risk to implement protective measures for preventing attacks on Cybercrime (Cyber Crimes.

  18. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  19. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    Science.gov (United States)

    2011-12-01

    national security and the interagency process ( Marcella , 2010). All these documents reviewed focused mainly on national security and overseas...administration, they were considered “the heart and soul of the process” ( Marcella , 2010). While subtle differences exist across administrations, the IPC...and build consensus across the government for action ( Marcella , 2010). During the second term of the Bush administration and during the first years

  20. The Value of a European Security and Defense Policy

    Science.gov (United States)

    2007-05-08

    relations has lately dominated US foreign policy. Subsequently some normative and meta- ethical conceptual conclusions will be drawn upon to show how US...relations has lately dominated US foreign policy by analyzing recent 3 policy decisions. After this analysis, some normative meta ethical conclusions...old patterns or as Kagan writes: “Europeans have stepped out of the Hobbesian world of anarchy into the Kantian world of perpetual peace.”13 The fact

  1. Philosophy, policies, and procedures - The three P's of flight-deck operations

    Science.gov (United States)

    Degani, Asaf; Wiener, Earl L.

    1991-01-01

    Standard operating procedures are drafted and provided to flightcrews to dictate the manner in which tasks are carried out. Failure to conform to Standard Operating Procedures (SOP) is frequently listed as the cause of violations, incidents, and accidents. However, procedures are often designed piecemeal, rather than being based on a sound philosophy of operations and policies that follow from such a philosophy. A framework of philosophy, policies, and procedures is proposed.

  2. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  3. Interest Groups and Strategic Constructivism: Business Actors and Border Security Policies in the European Union

    NARCIS (Netherlands)

    Baird, T.E.

    Evidence suggests that business lobbying shapes European Union (EU) border security policies, but there has been no detailed empirical and theoretical work detailing how interest groups exert influence in this domain. Building on strategic constructivist accounts of policy-making, the article argues

  4. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  5. Guideline of Cyber Security Policy for Digital I and C Systems in Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Zeen; Kim, Jang Seong; Kim, Kwang Jo [Information and Communications University, Daejeon (Korea, Republic of); Kang, Young Doo; Kim, Dai Il; Jeong, Choong Heui [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2007-10-15

    Recently computers and communication systems have been developed very fast and applied to various areas in many applications. This development has raised new vulnerabilities that may endanger the critical systems for nuclear safety and physical protection at the facilities. In order to protect the critical infrastructures from these new cyber attacks, we clearly need deep considerations on the risks and threats through the cyberspace. Based on these needs, many organizations which related to nuclear power plants suggested various cyber security protection methods based on regulation or technical safeguard. Even if security countermeasures against various cyber attacks are important, it is required to establish the best practices of cyber security policy by the vendor and licensee. Based on the policy they can evaluate their activities against various cyber attacks throughout the whole life cycle. In this paper, we discuss how to establish the cyber security policy for digital instrumentation and control (I and C) systems in nuclear power plants.

  6. Guideline of Cyber Security Policy for Digital I and C Systems in Nuclear Power Plant

    International Nuclear Information System (INIS)

    Kim, Zeen; Kim, Jang Seong; Kim, Kwang Jo; Kang, Young Doo; Kim, Dai Il; Jeong, Choong Heui

    2007-01-01

    Recently computers and communication systems have been developed very fast and applied to various areas in many applications. This development has raised new vulnerabilities that may endanger the critical systems for nuclear safety and physical protection at the facilities. In order to protect the critical infrastructures from these new cyber attacks, we clearly need deep considerations on the risks and threats through the cyberspace. Based on these needs, many organizations which related to nuclear power plants suggested various cyber security protection methods based on regulation or technical safeguard. Even if security countermeasures against various cyber attacks are important, it is required to establish the best practices of cyber security policy by the vendor and licensee. Based on the policy they can evaluate their activities against various cyber attacks throughout the whole life cycle. In this paper, we discuss how to establish the cyber security policy for digital instrumentation and control (I and C) systems in nuclear power plants

  7. A Biological Security Motivation System for Potential Threats: Are There Implications for Policy-Making?

    Directory of Open Access Journals (Sweden)

    Erik Z Woody

    2013-09-01

    Full Text Available Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates behaviours to probe the potential danger, such as checking, and to correct for it, such as washing. Engagement in these behaviours serves as the terminating feedback for the activation of the system. Because security motivation theory makes predictions about what kinds of stimuli activate security motivation and what conditions terminate it, the theory may have applications both in understanding how policy-makers can best influence others, such as the public, and also in understanding the behavior of policy-makers themselves.

  8. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implemented a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.

  9. [Review of food policy approaches: from food security to food sovereignty (2000-2013)].

    Science.gov (United States)

    López-Giraldo, Luis Alirio; Franco-Giraldo, Álvaro

    2015-07-01

    Food policies have attracted special interest due to the global food crisis in 2008 and promotion of the Millennium Development Goals, leading to approaches by different fields. This thematic review aims to describe the main theoretical and methodological approaches to food security and food sovereignty policies. A search was performed in databases of scientific journals from 2000 to 2013. 320 complete articles were selected from a total of 2,699. After reading the articles to apply the inclusion criteria, 55 items were maintained for analysis. In conclusion, with the predominance of food security as a guiding policy, food sovereignty has emerged as a critical response to be included in designing and researching food policies. Food policies are essential for achieving public health goals. Public health should thus take a leading role in linking and orienting such policies.

  10. Kuwait: Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-09-29

    Gulf Cooperation Council (GCC: Saudi Arabia, Kuwait, UAE, Qatar, Bahrain, and Oman). In March 2011, Kuwait joined a GCC military intervention to...before the start of [2013]”—a statement that furthered Iraq’s argument that the U.N. Security Council should remove any remaining “Chapter 7” (of the...with alternative mechanisms, as discussed below. On December 15, 2010, the U.N. Security Council passed three resolutions—1956, 1957, and 1958—that

  11. Germany and energy security in the 2000s. Rise and fall of a policy issue?

    International Nuclear Information System (INIS)

    Duffield, John S.

    2009-01-01

    After some two decades of inattention, the issue of energy security once again moved to the top of the policy agenda in Germany in the mid-2000s. After briefly achieving renewed prominence, however, it was eclipsed in German energy policy, at least temporarily, by heightened concerns about climate change. This paper explains the re-emergence of concerns about energy insecurity in recent years as well as the reasons for their subsequent overshadowing. It describes and explains the steps that have been taken during this period to promote German energy security and analyzes their adequacy. The paper identifies a number of reasons to be skeptical about how much the agreed policies will improve Germany's energy security, but it concludes that there are nevertheless good reasons to expect the issue to regain the attention of policy-makers in the future. (author)

  12. Germany and energy security in the 2000s. Rise and fall of a policy issue?

    Energy Technology Data Exchange (ETDEWEB)

    Duffield, John S. [Department of Political Science, Georgia State University, Atlanta, GA 30303 (United States)

    2009-11-15

    After some two decades of inattention, the issue of energy security once again moved to the top of the policy agenda in Germany in the mid-2000s. After briefly achieving renewed prominence, however, it was eclipsed in German energy policy, at least temporarily, by heightened concerns about climate change. This paper explains the re-emergence of concerns about energy insecurity in recent years as well as the reasons for their subsequent overshadowing. It describes and explains the steps that have been taken during this period to promote German energy security and analyzes their adequacy. The paper identifies a number of reasons to be skeptical about how much the agreed policies will improve Germany's energy security, but it concludes that there are nevertheless good reasons to expect the issue to regain the attention of policy-makers in the future. (author)

  13. Germany and energy security in the 2000s: Rise and fall of a policy issue?

    Energy Technology Data Exchange (ETDEWEB)

    Duffield, John S., E-mail: duffield@gsu.ed [Department of Political Science, Georgia State University, Atlanta, GA 30303 (United States)

    2009-11-15

    After some two decades of inattention, the issue of energy security once again moved to the top of the policy agenda in Germany in the mid-2000s. After briefly achieving renewed prominence, however, it was eclipsed in German energy policy, at least temporarily, by heightened concerns about climate change. This paper explains the re-emergence of concerns about energy insecurity in recent years as well as the reasons for their subsequent overshadowing. It describes and explains the steps that have been taken during this period to promote German energy security and analyzes their adequacy. The paper identifies a number of reasons to be skeptical about how much the agreed policies will improve Germany's energy security, but it concludes that there are nevertheless good reasons to expect the issue to regain the attention of policy-makers in the future.

  14. Information System Security: Army Web Site Administration, Policies, and Practices

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Policy requires heads of DoD Components to establish a process to identify appropriate information for posting to Web sites and to review all information placed on publicly accessible Web sites...

  15. 15 CFR 291.6 - Additional requirements; Federal policies and procedures.

    Science.gov (United States)

    2010-01-01

    ... and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST... requirements; Federal policies and procedures. Recipients and subrecipients are subject to all Federal laws and Federal and Department of Commerce policies, regulations, and procedures applicable to Federal financial...

  16. Responding to Self-Harm: A Documentary Analysis of Agency Policy and Procedure

    Science.gov (United States)

    Paul, Sally; Hill, Malcolm

    2013-01-01

    This paper reports on the findings of a documentary analysis of policies and procedures relating to self-harm from a range of organisations working with young people in the UK. It identifies the extent to which policies and/or procedures relating to self-harm are available for service providers and offers a wider understanding of the concepts of…

  17. Trust Evolution Policies for Security in Collaborative Ad Hoc Applications

    DEFF Research Database (Denmark)

    Gray, Elizabeth; Jensen, Christian D.; Connell, Paul O

    2006-01-01

    The vision of pervasive computing has introduced the notion of a vast, networked infrastructure of heterogeneous entities interact through collaborative applications, e.g., playing a multi-player online game on the way to work. This will require interactions between users who may be marginally...... admission policies in a manner similar to what would be expected from human trust assessment. This indicates that trust evolution policies can replace explicit human intervention in application scenarios that are similar to the evaluated prototype....

  18. Linking research and food security policies in MENA | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 حزيران (يونيو) 2013 ... Hammou Laamrani works for IDRC as a specialist in agriculture, water, and knowledge management. He believes that ... Food security challenges are also related to the low adoption of technologies to optimize food availability and storage, reduce post-harvest losses, and improve food safety. Unless food ...

  19. Support for Multi-Level Security Policies in DRM Architectures

    NARCIS (Netherlands)

    Tanenbaum, A.S.; Popescu, B.C.; Crispo, B.; Hempelmann, C.F.; Raskin, V.

    2004-01-01

    Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no easy task, given that content needs to be protected while accessed through electronic devices in the hands of

  20. Identifying the Enemy: Social Categorization and National Security Policy

    Science.gov (United States)

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  1. Framework for an African policy towards creating cyber security awareness

    CSIR Research Space (South Africa)

    Dlamini, IZ

    2011-05-01

    Full Text Available Cyber security is a GLOBAL issue. The rest of the world needs Africa to be aware and ready. Furthermore, Africa can only be aware and ready if it is internally organised and collaborates effectively with the rest of the world. The African continent...

  2. An integrated assessment of climate change, air pollution, and energy security policy

    International Nuclear Information System (INIS)

    Bollen, Johannes; Hers, Sebastiaan; Van der Zwaan, Bob

    2010-01-01

    This article presents an integrated assessment of climate change, air pollution, and energy security policy. Basis of our analysis is the MERGE model, designed to study the interaction between the global economy, energy use, and the impacts of climate change. For our purposes we expanded MERGE with expressions that quantify damages incurred to regional economies as a result of air pollution and lack of energy security. One of the main findings of our cost-benefit analysis is that energy security policy alone does not decrease the use of oil: global oil consumption is only delayed by several decades and oil reserves are still practically depleted before the end of the 21st century. If, on the other hand, energy security policy is integrated with optimal climate change and air pollution policy, the world's oil reserves will not be depleted, at least not before our modeling horizon well into the 22nd century: total cumulative demand for oil decreases by about 24%. More generally, we demonstrate that there are multiple other benefits of combining climate change, air pollution, and energy security policies and exploiting the possible synergies between them. These benefits can be large: for Europe the achievable CO 2 emission abatement and oil consumption reduction levels are significantly deeper for integrated policy than when a strategy is adopted in which one of the three policies is omitted. Integrated optimal energy policy can reduce the number of premature deaths from air pollution by about 14,000 annually in Europe and over 3 million per year globally, by lowering the chronic exposure to ambient particulate matter. Only the optimal strategy combining the three types of energy policy can constrain the global average atmospheric temperature increase to a limit of 3 C with respect to the pre-industrial level. (author)

  3. Policies and Procedures for Foreign Exchange Agencies. First Edition.

    Science.gov (United States)

    Hartman, Donald D.

    The guide details the policy of the Jefferson County (Alabama) Board of Education policy concerning international exchange of students (travel both to and from United States) in elementary and secondary grades. The first section specifies the standards by which the county will evaluate all international exchange agencies concerning structure,…

  4. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  5. Information security in academic libraries: the role of the librarian in planning and introducing institutional policies

    Directory of Open Access Journals (Sweden)

    Juliana Soares Lima

    2017-04-01

    Full Text Available This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.

  6. Greek National Security Concerns and the European Union’s Common Foreign and Security Policy: Consensus or Divergence?

    Science.gov (United States)

    2011-09-01

    to my tutor.” Alexander the Great, referring to his tutor, Aristotle (356–323 BC) xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION...an actual policy since the Turkish invasion of Cyprus. Despite his political rhetoric and posturing while in opposition, Papandreou’s tenure...responsibility for global security.”139 Limited in breadth within the Petersberg tasks framework, the ESS focuses its rhetoric on the internal, rather

  7. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    OpenAIRE

    Dan Constantin TOFAN; Maria Lavinia ANDREI; Lavinia Mihaela DINCÄ‚

    2012-01-01

    Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, di...

  8. Challenges of EU Security on the Example of Cybeterrorism Policy

    Directory of Open Access Journals (Sweden)

    Izabela Oleksiewicz

    2015-06-01

    Full Text Available In addition to traditional threats to information as spying or leaking state secrets and business secrets appeared the new threats, among which the most dangerous is cyberterrorism. Taking into account the problems of cyber-terrorism, includes, in particular, the analysis of legislation aimed at ensuring the security of information systems of individual countries particular, this subject should be also recognized as requiring at the present time the insightful analysis. Therefore, this publication is an attempt of characteristics the determinants of this phenomenon and analysis of the latest legal solutions in the fight against cyber terrorism within the European Union. Moreover, it was made the attempt to find an answer to the question whether the current legal solutions of the European Union in the area of security are an effective tool in the fight against cyberterrorism.

  9. Towards a policy for human security: psychosocial contributions.

    Science.gov (United States)

    Tullio, Francesco

    2007-01-01

    Inspired by the correspondence between Einstein and Freud in 1936, this paper focuses on the multidimensional aspect of security, exploring its implications within the psychosocial approach. Reflections are therefore centred on the psychological aspects of conflict, on bio-psychic responses to violent solicitation and on ways in which individual emotions are managed and controlled by the State. Some social and economic mechanisms comprising the present global social scenario are explored: the intermesh between economic/industrial organisations and Security Institutions, and the consumerist economic model and its individual/collective consequences, ultimately environmental destruction. As suggested by Einstein, the creation of a supranational organisation would be an essential step towards an effective and economically sustainable international system. This can be achieved through a process that implies the evolution of cultural parameters and the transformation of national institutions. In this sense, the author suggests a decisive role for civil society organisations such as the International Physicians for the Prevention of Nuclear War (IPPNW).

  10. Poverty, Security and Social Assistance: Challenges of Brazilian Social Policy

    Directory of Open Access Journals (Sweden)

    Ana Paula Ornellas Mauriel

    2010-01-01

    Full Text Available This article presents partial results of a study about anti-poverty programs in Brazil. The main contribution of the text is that it relates certain characteristics of the anti poverty programs to theoretical categories that have influenced the debate about social policy in the contemporary context. Special attention is given to the relation of these programs with national social assistance policy. The article begins from the hypothesis that the logic that had inspired the construction of social policies was reconsidered, based on a transformation in the theoretical understanding of the social issue and of ways to confront it. This change appears in the texts in the priority given to poverty as a category of analysis, which is understood as an absence of capacities. This theoretically and methodologically configures an individualistic perspective on social issues, the principal theoretical source for which is the thinking of Amartya Sen.

  11. Bahrain: Reform, Security, and U.S. Policy

    Science.gov (United States)

    2017-02-14

    by the Ministry of Interior. Bahrain’s opposition asserts that the United States is downplaying regime abuses in order to protect the security... woman , who was unopposed in her district, was elected out of 18 female candidates. The king subsequently named a new Shura Council with 20 Shiites, 19...previous COR). The same woman who had won in 2006 was elected. Municipal elections were conducted concurrently. The king reappointed 30 of the 40 serving

  12. ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

    OpenAIRE

    Asghar, Muhammad Rizwan; Ion, Mihaela; Russello, Giovanni; Crispo, Bruno

    2013-01-01

    Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions. Despite all its benefits, data outsourcing raises serious security concerns for preserving data confidentiality. There are solutions for preserving confidentiality of data while supporting search on the data stor...

  13. Chemical Facility Security: Reauthorization, Policy Issues, and Options for Congress

    Science.gov (United States)

    2010-12-10

    gaseous chlorine disinfection to chloramine disinfection —a change identified by some advocacy groups as being an inherently safer substitution—as being...chemicals, such as chlorine, for purposes such as disinfection .29 Advocates for their inclusion in security regulations cite the presence of such...Science and Technology (S& T ) Directorate is engaged in a Chemical Infrastructure Risk Assessment Project that, among other goals, will assess the

  14. Oman: Reform, Security, and U.S. Policy

    Science.gov (United States)

    2012-08-30

    workshop in Muscat to discuss freedom of speech .3 However, evidence that the pace of change has been perceived as slow was demonstrated in 2011 in...change their government, limits on freedom of speech , and societal mores that discriminate against women. The report adds that security force...Research Service 7 Freedom of Expression/Media The State Dept. human rights report for 2011 states that the law provides for limited freedom of speech and

  15. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  16. The North Atlantic Treaty Organization and the European Union’s Common Security and Defense Policy: Intersecting Trajectories

    Science.gov (United States)

    2011-07-01

    Lieutenant General, Canadian Forces, Canadian Military Repre- sentative to NATO Elizabeth Race, Deputy Defence Policy Advisor, Canadian Joint...Ruehle, Head, Energy Security Section, Emerging Security Challenges Division, NATO ( Brus - sels) Patrick Nash, Lieutenant General, Irish Army, for- mer

  17. National Security and the Industrial Policy Debate: Modernizing Defense Manufacturing

    Science.gov (United States)

    1991-05-01

    47. 49. Michael Schroeder and Walecia Konrad, " Nucor : Rolling Right Into Steel’s Big Time," Business Week 19 Nov. 1990: 76. 50. Clyde V. Prestowitz...Defense." The I Industrial Policy Debate. Ed. Chalmers Johnson. San Francisco: ICS Press, 1984. i 74I Schroeder, Michael and Walecia Konrad. " Nucor

  18. Iran: Politics, Gulf Security, and U.S. Policy

    Science.gov (United States)

    2016-03-30

    U.S. Policy Congressional Research Service Contents Political History ...Research Service 1 Political History Iran is a country of nearly 80 million people, located in the heart of the Persian Gulf region. The United...Iran government figure was 27), including a 19-year-old woman , Neda Soltani, who subsequently became an emblem of the uprising. The opposition

  19. Distribution of Responsibility for Social Security and Labour Market Policy

    DEFF Research Database (Denmark)

    Madsen, Per Kongshøj

    It is shown that legislation of unemployment insurance and active labour market policy is set by the national government. Legislation with respect to employment protection, however, is largely left to the social partners, i.e. the dismissal of salaried workers is regulated by a special piece...

  20. 44 CFR 1.4 - Policy and procedures.

    Science.gov (United States)

    2010-10-01

    ... economy, and other regulatory actions contemplated for the future. (b) It is the policy of FEMA to provide... include a statement with respect to the impact of the proposed rule on small entities; holding open...

  1. Policy, Procedures and Standards for Enterprise Information Management

    Science.gov (United States)

    This policy establishes a standard approach for managing information produced by, funded by, or received per regulated reporting and/or federal-wide requirements and subsequently held or cataloged in information management systems by EPA.

  2. US oil policy and energy security; Politique petroliere americaine et securite energetique

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    2002-05-15

    Although the energy dependence reached its historical maximum and will continue to increase for the next 20 years, the USA keep their oil policy. For the economist this policy is reasonable because of the poor room for the US imports reduction costs. To explain these conclusions the author discusses on the following topics: the links between the oil dependence and the energy security, the oil policy after Reagan, the oil policy evolution - or no evolution - facing the increasing dependency and the Cheney report. (A.L.B.)

  3. International Commission on Radiological Protection. History, policies, procedures

    International Nuclear Information System (INIS)

    Lindell, Bo; Dunster, H.J.; Valentin, Jack; )

    2000-01-01

    This report briefly reviews the history, mode of operation, concepts, and current policies of the International Commission on Radiological Protection (ICRP). It touches upon the objectives of the Commission's recommendations, the quantities used, the biological basis of the Commission's policy, the quantitative basis for its risk estimates, the structure of the system of protection, some problems of interpretation and application in that system, and the need for stability, consistency, and clarity in the Commission's recommendations. (author)

  4. Energy policy of the EU and the role of Turkey in Energy Supply Security

    Directory of Open Access Journals (Sweden)

    MEHTER AYKIN Sibel

    2018-01-01

    Full Text Available All the nations define strategies and develop policies on national and international levels to eliminate risks against energy security. The aim of this paper is to define the energy policy of the European Union and identify the potential of Turkey in securing energy supply to the European Union. To achieve this end, after explaining the policy frame of the European Union and that of Turkey in energy related matters, the existing and planned energy routes expanding from the Russian Federation, Caspian Sea and the Middle East to the European Continent are mapped, and the role assigned to Turkey as an energy hub is exemplified with reference to its accession process. It is concluded that Turkey’s membership is to enrich the European Union and contribute to its energy supply security.

  5. American Foreign Policy Think Tanks and their Views on Baltic Security

    Directory of Open Access Journals (Sweden)

    Boyd Jonathan A.

    2017-12-01

    Full Text Available Recent events have created a sense of urgency within the U.S. foreign policy establishment to update its strategy towards Russia. The Baltic states are seen to be particularly vulnerable and because of its NATO commitments and its history of underwriting security in the region, the U.S. is under pressure to develop an appropriate response. Policy and research institutes-or think tanks-are an important part of the U.S. foreign policy establishment, and given the influence they often have on American foreign policy, it is sensible for any student of Baltic security to evaluate the think tanks’ current perspectives on the viability and desirability of U.S. security commitments in the region. To that end, this article evaluates the outputs of twelve prominent U.S. foreign policy think tanks according to the views they expressed across four general groupings of issues: positions on U.S. grand strategy, perceptions of Moscow’s intentions and capabilities, assessments of NATO’s heath and its value to U.S. security, and the level of commitment to, and assessment of, the security vulnerabilities of the Baltic states. The findings dispel a common misperception that U.S. foreign policy think tanks are generally shifting towards a realist perspective on the Baltic states; they generally do not support U.S. retrenchment, most consider Russia as having revanchist motives, and as a whole support bolstering the defences of NATO’s easternmost flank. However, it would also be an exaggeration to conclude that the U.S. think tank community overall were staunch defenders of the Baltic states, as for many there is a prevailing inattentiveness to Baltic security issues.

  6. Academic medical libraries' policies and procedures for notifying library users of retracted scientific publications.

    Science.gov (United States)

    Hughes, C

    1998-01-01

    Academic medical libraries have a responsibility to inform library users regarding retracted publications. Many have created policies and procedures that identify flawed journal articles. A questionnaire was sent to the 129 academic medical libraries in the United States and Canada to find out how many had policies and procedures for identifying retracted publications. Of the returned questionnaires, 59% had no policy and no practice for calling the attention of the library user to retracted publications. Forty-one percent of the libraries called attention to retractions with or without a formal policy for doing so. Several responding libraries included their policy statement with the survey. The increasing number of academic medical libraries that realize the importance of having policies and practices in place highlights the necessity for this procedure.

  7. Air Force IT System Security Compliance with Law and Policy

    Science.gov (United States)

    2016-04-01

    monetary burden on 3 system owners as there is “…a significant cost benefit to building in IA during the development phase” 4 of a system. Current...16 Option 4 : Cloud Computing to Eliminate Policy and Methodology Requirements ....17 Option 4 : Application...Assurance ( IA ) (data integrity) to support mission assurance. To ensure IA and to support the mission, changes need to be made to Air Force IT

  8. 76 FR 213 - National Environmental Policy Act Implementing Procedures

    Science.gov (United States)

    2011-01-03

    ... due to, for example, a threatened violation of applicable environmental, safety, and health... legally enforceable rights, benefits, or responsibilities, substantive or procedural, not otherwise... failed in indoor tests. Whether the explosives or propellants were tested indoors or outdoors, the...

  9. Policy in Conflict: The Struggle Between Environmental Policy and Homeland Security Goals

    Science.gov (United States)

    2013-09-01

    environmental and energy 34 policy (Murkowski, 2010). However, a good set of literature on the broader, macro level question central to this investigation...terms of increasing efficiency of the automotive fleet (demand side), certain environmental policies have the unintended consequence of restricting the...Middle East  Broader aspects of the struggle between environmental policy and energy policy  A broad analysis of ways to diminish animus toward the

  10. Energy security and climate change concerns: Triggers for energy policy change in the United States?

    Energy Technology Data Exchange (ETDEWEB)

    Bang, Guri, E-mail: guri.bang@cicero.uio.n [CICERO - Center for International Climate and Environmental Research Oslo, P.O. Box 1129, 0318 Oslo (Norway)

    2010-04-15

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress-the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo.

  11. Energy security and climate change concerns. Triggers for energy policy change in the United States?

    Energy Technology Data Exchange (ETDEWEB)

    Bang, Guri [CICERO - Center for International Climate and Environmental Research Oslo, P.O. Box 1129, 0318 Oslo (Norway)

    2010-04-15

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress - the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo. (author)

  12. Energy security and climate change concerns: Triggers for energy policy change in the United States?

    International Nuclear Information System (INIS)

    Bang, Guri

    2010-01-01

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress-the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo.

  13. A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

    Directory of Open Access Journals (Sweden)

    Faouzi Jaïdi

    2018-01-01

    Full Text Available Substantial advances in Information and Communication Technologies (ICT bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things, edge-fog-social-cloud computing, and big data analytics is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our system SVIRVRO that allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.

  14. The effects of a social media policy on pharmacy students' facebook security settings.

    Science.gov (United States)

    Williams, Jennifer; Feild, Carinda; James, Kristina

    2011-11-10

    To examine how students entering a doctor of pharmacy (PharmD) program used Facebook privacy settings before and after the college's social media policy was presented to them. The Facebook profiles of all entering first-year pharmacy students across 4 campuses of a college of pharmacy were evaluated. Ten dichotomous variables of interest were viewed and recorded for each student's Facebook account at 3 time points: before the start of the semester, after presentation of the college's social media policy, and at the end of the semester. Data on whether a profile could be found and what portions of the profile were viewable also were collected. After introduction of the policy, a significant number of students increased their security settings (made information not visible to the public) related to Facebook walls, information pages, and links. Making pharmacy students aware of a college's social media policy had a positive impact on their behaviors regarding online security and privacy.

  15. Effect of Policy Interventions on Food Security in Tigray, Northern Ethiopia

    Directory of Open Access Journals (Sweden)

    Anne van der Veen

    2011-03-01

    Full Text Available Following the design of a conservation-based agricultural development strategy and food security strategy, the Tigray government has implemented different pro-poor development programs over the past years to address the problems of food security. This study attempts to investigate the effectiveness of government policy interventions at different scales addressed to improve food security. Food security both at the regional and district level was investigated by deriving food balance sheets for the period 2000-2008. An empirical analysis based on a logit model was also employed to analyze household level food security status. The results of the logit model reveal that government policy interventions such as water harvesting schemes, employment generation schemes, and promotion of technology adoption significantly contribute to a higher likelihood of household food security status. The findings of the food balance sheet also indicate that the region has made some impressive development gains in improving regional food self-sufficiency, indicating the importance of government interventions in improving food security both at the household and regional level.

  16. Protest Movements and the Security Policy of the Federal Republic of Germany Since 1950.

    Science.gov (United States)

    1983-12-01

    to rearmament. The state of mind that framed a majority of the members, however, remained one of 33 semi- abstentionism where German labor remained on...I 0D A132 201 PROTEST MOVEMENTS AND THE SECURI Y POLICY 0 THE FEDERAL REPUBLIC OF GERMANY SINCE 1950( U) NAVAL\\ POSTGRADUATE SCHOOL MONEREY CA A N...1 THESIS PROTEST MOVEMENTS AND THE SECURITY POLICY OF THE FEDERAL REPUBLIC OF GERMANY SINCE 1950 by Arthur Neil Black 0. December 1983 C-) LIJ Thesis

  17. 12 CFR 612.2165 - Policies and procedures.

    Science.gov (United States)

    2010-01-01

    ..., preserve the integrity and independence of the supervisory process, and prevent the improper use of... employees may purchase any real or personal property of a System institution acquired by such institution... demonstrating compliance with standards-of-conduct decisions and board policy; (12) Establish reporting...

  18. 33 CFR 236.5 - Policy and procedure.

    Science.gov (United States)

    2010-07-01

    ... manage when directly integrated with the implementation or management of the water resource development... created by a water resource development to be recommended for implementation by the Corps of Engineers. (3... DEFENSE WATER RESOURCE POLICIES AND AUTHORITIES: CORPS OF ENGINEERS PARTICIPATION IN IMPROVEMENTS FOR...

  19. OECD Policy Recommendations on Security for Biological Materials

    International Nuclear Information System (INIS)

    Radisch, J.

    2007-01-01

    Biomedical innovations derived from research on pathogenic micro-organisms promise astounding health and economic benefits. Some such biological resources employed in the RandD for diagnostic kits, vaccines and therapeutics, however, possess capacity for dual-use; they may be misused to develop biological weapons. Research facilities entrusted with possession of such dual-use materials have a responsibility to comply with biosecurity measures that are designed to prevent loss or theft and thereby reduce the probability of a bioterrorist attack. The OECD has provided a forum for its Member countries to engage in a dialogue of international co-operation with a view to produce policies that achieve a research environment fortified by biosecurity measures and capable of producing health innovations. In 2007, the OECD developed a risk assessment framework and risk management principles for Biological Resource Centres. Ongoing policy work at the OECD will look to design biosecurity guidelines appropriate to a broader range of facilities in possession of dual-use materials, such as university and industrial laboratories.(author)

  20. Common Foreign and Security Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Haydar Efe

    2008-06-01

    Full Text Available CFSP has been one of the most difficult areas in the cooperation cooperate in EU’s integration process. Because member states which have different national interests, historical traditions and different political relations with other parts of the world, have seen it as a sign of their sovereignty. But, in spite of many controversies, the demands for a CFSP are widely shared in the EU. The main argument of this study is to emphasize the fact that in the realization of the aims of EU for being effective in the solutions of international problems and for being the main actor on the global policy the only way is to form effective and coherent DDGP

  1. Right and Goods: Procedural Liberalism and Educational Policy

    Science.gov (United States)

    Johnston, James Scott

    2007-01-01

    In this essay, James Scott Johnston asks what sort of liberalism is best for the educational systems of early twenty-first century, late capitalistic democratic nations, looking at the procedural liberalism extant. Two major models are John Rawls's Justice as Fairness and Jurgen Habermas's Communicative Action. Both owe their foundational…

  2. Challenges and opportunities for more integrated regional food security policy in the Caribbean Community

    Directory of Open Access Journals (Sweden)

    Kristen Lowitt

    2016-01-01

    Full Text Available The Caribbean Community (CARICOM has recognized regional integration as an important development strategy for addressing the unique vulnerabilities of its member small island developing states (SIDS. Food security in the Caribbean is a fundamental social and ecological challenge in which the dynamics of regional integration are increasingly playing out. CARICOM members have subsequently identified a number of shared food security problems and have endorsed regional goals and approaches to address them; however, progress towards solutions has been slow. Recognizing that evidence-based studies on the potential factors limiting sustained progress are lacking, we undertook a comparative policy analysis to understand better the various approaches and framings of food security at national and regional levels with a view to assessing coherence. We identify considerable divergence in how regional and local policy institutions frame and approach food security problems in CARICOM and then identify ways through which the policy integration objectives for enhanced regional food security might be progressed, with a particular focus on social learning.

  3. Sustainable land use and food security in developing countries: DLV's approach to policy support.

    NARCIS (Netherlands)

    Keulen, van H.; Kuyvenhoven, A.; Ruben, R.

    1998-01-01

    During the past decades, major changes have taken place with regard to the available policy instruments for food security and rural development. These changes are reviewed against the background of the structural adjustment programmes carried out in the agricultural sector. The linkages between

  4. American Policy in the Persian Gulf Region: Peace, Security, and the Spread of Democracy

    National Research Council Canada - National Science Library

    Fox, Darin J

    2008-01-01

    To achieve lasting security in the Arabian Gulf region, U.S. policy, though currently focused on Iraq, must engage Saudi Arabia and Iran with all of its instruments of national power to encourage the spread of democracy within the region...

  5. Policies and measures for economic efficiency, energy security and environment protection in India

    International Nuclear Information System (INIS)

    Venkaiah, M.; Kaushik, S.C.; Dewangan, M.L.

    2007-01-01

    India needs to sustain 8-10% economic growth to meet energy needs of people below poverty line. India would, at least, need to grow its primary energy supply (3-4 times) of present consumption to deliver a sustained growth of 8% by 2031. This paper discusses India's policies and measures for economic efficiency, environment protection and energy security (3-E). (author)

  6. News framing and public support for a common foreign and security policy

    NARCIS (Netherlands)

    de Vreese, C.H.; Kandyla, A.

    2009-01-01

    Abstract A common EU foreign and security policy (CFSP) can be framed by elites and media as a risk or as an opportunity. This article examines the effects of framing in terms of ‘risk’ and ‘opportunity’ on public support. Moreover, we examine first whether the effect of framing CFSP as a ‘risk for

  7. Visa Security Policy: Roles of the Departments of State and Homeland Sec

    Science.gov (United States)

    2010-03-08

    report pursuant to S. Res.137., committee print, 81st Cong., 2nd sess., April 20, 1950. 11 8 U.S.C. 1104 . 12 8 U.S.C. 1201. Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS

  8. Education Policy and National Security in Brazil in the Post-1964 Context

    Science.gov (United States)

    Silveira, Rene Trentin

    2013-01-01

    The aim of this article is to analyse and show in detail the influence of the National Security and Development Doctrine, the main ideological prop of the 1964 civilian-military coup, on the education policy implemented by the regime. Special attention is given to the MEC-USAID agreements, the setting up of the Meira Matos Commission and the…

  9. Policy risk in action: pension reforms and social security wealth in Hungary, Czech Republic, and Slovakia

    Czech Academy of Sciences Publication Activity Database

    Dušek, Libor; Kopecsni, J.

    -, 9/2008 (2008), s. 1-34 R&D Projects: GA ČR GA402/05/0711 Institutional research plan: CEZ:AV0Z70850503 Keywords : pension reforms * social security * policy risk Subject RIV: AH - Economics http://ies.fsv.cuni.cz/default/file/download/id/8361

  10. Perioperative complications and early follow-up with 100 TVT-SECUR procedures.

    Science.gov (United States)

    Neuman, Menahem

    2008-01-01

    Our objective was to evaluate the complications and early follow-up of the tension-free vaginal tape (TVT)-SECUR, a new minimally invasive anti-incontinence operative procedure. A prospective, observational, and consecutive patient series was conducted. Perioperative and 12-month postoperative data were prospectively collected for the first 50 patients against the next consecutive 50 patients, among which TVT-SECUR specific surgical measurements were adopted (Canadian Task Force classification 2). In private hospital operative theatres, the TVT-SECUR operation was performed. Patients with urodynamically proved stress urinary incontinence were enrolled in this study after detailed informed consent was given. The TVT-SECUR, in the hammock shape to mimic the TVT-obturator placement, yet with no skin incisions, required neither bladder catheterization nor intraoperative diagnostic cystoscopy. The clinical and surgical data of 100 consecutive patients with TVT-SECUR were collected prospectively. Two patients had urinary obstructions and needed surgical tape-tension relief. One patient had a 50 mL paravesical self-remitting hematoma. At the first-month postoperative follow-up appointment, the objective therapeutic failure rate for the TVT-SECUR procedure among the 50 patients was 20.0% (10 patients). But when the tape was placed close to the urethra with no space allowed in between, the failure rate in the second patient group went down to 8.0% (4 patients); yet no further postoperative bladder outlet obstruction was diagnosed. Four (8.0%) patients in the first group had vaginal wall penetration with the inserters, requiring withdrawal, reinsertion, and vaginal wall repair. This was avoided with the second patient group by facilitating the inserters' introduction by widening the submucosal tunnel to 12 mm. Six (12.0%) other patients in the first group needed postoperative trimming of a vaginally extruded tape segment, performed in the office with satisfactory results

  11. 12 CFR 616.6300 - Leasing policies, procedures, and underwriting standards.

    Science.gov (United States)

    2010-01-01

    ... property and associated risks; (e) Property tax and sales tax reporting; (f) Title and ownership of leased... engaged in lease underwriting must adopt a written policy (or policies). Management, at the direction of the board, must develop procedures that reflect lease practices that control risk and comply with all...

  12. Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-01-01

    Full Text Available Mobile health (also written as mHealth provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and physician preferences defined by a set of attributes. In mHealth systems, not only the data but also the policies for sharing it may be sensitive since they directly contain sensitive information which can reveal the underlying data protected by the policy. Also, since the policies usually incur linearly increasing communication costs, mHealth is inapplicable to resource-constrained environments. Lastly, access privileges may be publicly known to users, so a malicious user could illegally share his access privileges without the risk of being traced. In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. The computation cost to the user is reduced by delegating approximately 50% of the decryption operations to the more powerful storage systems.

  13. Addressing 2030 EU policy framework for energy and climate: Cost, risk and energy security issues

    International Nuclear Information System (INIS)

    Llano-Paz, Fernando de; Martínez Fernandez, Paulino; Soares, Isabel

    2016-01-01

    The different energy sources, their costs and impacts on the environment determine the electricity production process. Energy planning must solve the existence of uncertainty through the diversification of power generation technologies portfolio. The European Union energy and environmental policy has been mainly based on promoting the security of supply, efficiency, energy savings and the promotion of Renewable Energy Sources. The recent European Commission communication “Towards an European Energy Union: A secure, sustainable, competitive and affordable energy for every European” establishes the path for the European future. This study deals with the analysis of the latest EU “Energy Union” goals through the application of Markowitz portfolio theory considering technological real assets. The EU targets are assessed under a double perspective: economic and environmental. The model concludes that implementing a high share of Renewable Energy target in the design of European Policies is not relevant: the maximization of Renewable Energy share could be achieved considering a sole Low Emissions of carbon dioxide policy. Additionally it is confirmed the need of Nuclear energy in 2030: a zero nuclear energy share in 2030 European Mix is not possible, unless the technological limits participation for Renewable Energy Sources were increased. - Highlights: • Implementing a high RES share target in European Policies could not be relevant. • Maximizing RES share could be achieved considering a sole Low Emissions policy. • The EU 2030 Nuclear energy 50% shutting down could be feasible. • Minimizing risk portfolio presents high diversification and energy security levels.

  14. Comparative analysis of military security policy of Norway and Denmark in the Arctic region

    Directory of Open Access Journals (Sweden)

    Igor S. Doroshenko

    2017-01-01

    Full Text Available The interest of Western countries in the Arctic region is growing with each new statement about the sharp climate change and the melting of the Arctic Ocean’s glaciers. In addition to the threats related to the environmental situation in the Arctic zone, the desire to participate in shelf research and development, the potential of using the sea routes of the region by both the Arctic and non-Arctic states creates threats to the security of the Nordic countries.The coastal states, which in case of the escalation of tensions will be in the midst of a regional conflict in the Arctic, are Norway and Denmark. Therefore, the analysis of a level of Norwegian and Danish military security against a backdrop of increasing confrontation between Russia and West and changing climate situation in the region is urgent ., Nevertheless, to ensure a necessary level of defence capability as well as security of borders and zones of exceptional economic interests in the conditions of low temperatures is not so easy. This article examines the Norwegian and Danish approaches to the new military security challenges in the Arctic region. The paper contains examination of the doctrinal basis of military security along with the main documents that form the security concepts of the two countries in the Arctic region, and the reports of the defense ministries and scientific institutions surveys of military activities in the Arctic.Three directions of coastal countries’ policy making in the issues of military security were chosen for comparison. Firstly, the relationships with the USA, the leader of the North Atlantic alliance, which allow us to determine the significance of Norway and Denmark in building NATO security in the north. Secondly, the relationships with the EU and separately with the Nordic countries are considered. This case shows the level of involvement of the European community in the issue of ensuring the Arctic security . Thirdly, the relationships with

  15. Youth transitioning out of foster care: an evaluation of a Supplemental Security Income policy change.

    Science.gov (United States)

    King, Laura; Rukh-Kamaa, Aneer

    2013-01-01

    Youths with disabilities face numerous challenges when they transition to adulthood. Those who are aging out of foster care face the additional challenge of losing their foster care benefits, although some will be eligible for Supplemental Security Income (SSI) payments after foster care ceases. However, the time needed to process SSI applications exposes those youths to a potential gap in the receipt of benefits as they move between foster care and SSI. We evaluate the effects of a 2010 Social Security Administration policy change that allows such youths to apply for SSI payments 60 days earlier than the previous policy allowed. The change provides additional time for processing claims before the applicant ages out of the foster care system. We examine administrative records on SSI applications from before and after the policy change to determine if the change has decreased the gap between benefits for the target population.

  16. The Paradox of German Foreign and Security Policy: With Respect to National Energy Security

    Science.gov (United States)

    2009-05-21

    analysis from an historical perspective and first published post- materialist theory. It builds on Maslow ‟s hierarchy of needs and seeks to explain how...and maintaining the data needed , and completing and reviewing this collection of information. Send comments regarding this burden estimate or any...policy. Being strategically prepared when market forces fail to balance contradictory interests becomes a necessity for many countries. Based on Germany

  17. The united states and the world oil security. US oil policy and production of a global collective good

    International Nuclear Information System (INIS)

    Noel, P.

    2004-07-01

    The aim of this paper is to define and discusses the part of the Unites States in the world oil system operating and more particularly the US oil security policy in the world policy. It refutes some established ideas as the necessity of the US military supremacy to provide the oil security, the necessity of ''agreements'' with oil exporting countries facing the US energy consumption increase or the limitation of the resources access to other countries. At the opposite the United States seem to invest in the production of a global public good in matter of energy security. In order to illustrate this opinion the author defines the problem of the US oil security in a world context. He analyzes then the US policies to show the impacts in the world oil security and studies the specific part of the military factor in the security policy. (A.L.B.)

  18. Food Supply Security and Import Substitution as the Key Strategic Objectives of the Modern Agricultural Policy

    Directory of Open Access Journals (Sweden)

    Anatoly Ivanovich Altukhov

    2015-09-01

    Full Text Available A crucially new social- and economic situation has shaped up by now in the rural areas and agricultural sphere; in its many instances such situation does not fit in the national agricultural policy in effect called upon to be a long-term instrument for economic adjustment of the agro-food market and state support of the agricultural sphere, most significantly, its foundation — the farming sector. Ensuring of food supply security by import substitution in the age of the national farm product markets globalization is possible in the macro-economic conditions promoting the development of the agricultural sector. The main reason that retards this sector development is inequitable cross-sector exchange at sacrifice of the agricultural industry. The article sets forward and approbates the author’s method of simple assessment procedure of how the price cross-sector relations and state financial support (in the form of subsidies of the agricultural enterprises influence their profitability generation. Further to the assessment, the following conclusions have been made: — in view of the tangible contribution of the agricultural sector to the country economy, this sector is self-reliant for its own development, i.e. the state is reasonably in a position to increase expenses for eliminating negative consequences of inequitable crosssector exchange; — the amount of expenses for state financial support is supposed to enable the agricultural commodity producers to generate profitability to the level that can stimulate the farm workers’ labour efficiency and build up a system of affordable credit facilities for the objects of techno-engineering modernization necessary to produce competitive products. — the issue of improving the competitiveness of agricultural production should be addressed in the first place at the federal level. Among the essential factors to increase the competitiveness of specific types of domestic food products and

  19. 75 FR 70557 - Endocrine Disruptor Screening Program; Draft Policies and Procedures for Screening Safe Drinking...

    Science.gov (United States)

    2010-11-17

    ... comments by referencing a Code of Federal Regulations (CFR) part or section number. iii. Explain why you... the record in accordance with section 554 of the Administrative Procedure Act (APA). (15 U.S.C. 2615(a... referencing by parties unfamiliar with the referenced regulation. C. When do these policies and procedures...

  20. 47 CFR 64.401 - Policies and procedures for provisioning and restoring certain telecommunications services in...

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Policies and procedures for provisioning and restoring certain telecommunications services in emergencies. 64.401 Section 64.401 Telecommunication... procedures for provisioning and restoring certain telecommunications services in emergencies. The...

  1. Integrating security issues in nuclear engineering curriculum in Indonesia. Classical vs policy approaches

    International Nuclear Information System (INIS)

    Putero, Susetyo Hario; Rosita, Widya; Sihana, Fnu; Ferdiansjah; Santosa, Haryono Budi; Muharini, Anung

    2015-01-01

    Recently, risk management for nuclear facilities becomes more complex due to security issue addressed by IAEA. The harmonization between safety, safeguards and security is still questionable. It also challenges to nuclear engineering curriculum in the world how to appropriately lecture the new issue. This paper would like to describe how to integrate this issue in developing nuclear engineering curriculum in Indonesia. Indonesia has still no nuclear power plant, but there are 3 research reactors laid in Indonesia. As addition, there are several hospitals and industries utilizing radioisotopes in their activities. The knowledge about nuclear security of their staffs is also not enough for handling radioactive material furthermore the security officers. Universitas Gadjah Mada (UGM) is the only university in Indonesia offering nuclear engineering program, as consequently the university should actively play the role in overcoming this issue not only in Indonesia, but also in Southeast Asia. In the other hand, students has to have proper knowledge in order to complete in the global nuclear industry. After visited several universities in USA and participated in INSEN meeting, we found that most of universities in the world anticipate this issue by giving the student courses related to policy (non-technical) study based on IAEA NSS 12. In the other hand, the rest just make nuclear security as a case study on their class. Furthermore, almost all of programs are graduate level. UGM decided to enhance several present related undergraduate courses with security topics as first step to develop the awareness of student to nuclear security. The next (curriculum 2016) is to integrate security topics into the entire of curriculum including designing a nuclear security elective course for undergraduate level. The first trial has successfully improved the student knowledge and awareness on nuclear security. (author)

  2. Energy security in ASEAN: A quantitative approach for sustainable energy policy

    International Nuclear Information System (INIS)

    Tongsopit, Sopitsuda; Kittner, Noah; Chang, Youngho; Aksornkij, Apinya; Wangjiraniran, Weerin

    2016-01-01

    We investigate energy security of the Association of Southeast Asian Nations (ASEAN) under the 4-A’s framework. The ASEAN Economic Community (AEC) agreement launched in 2015 renewed a regional focus on energy security and sustainability. We employ an analytic framework to quantitatively assess progress in different categories including availability, acceptability, affordability, and applicability. Key metrics include the documentation of CO_2 emissions, energy access measures, and energy supply reserves from 2005–2010. We identify relevant energy indicators using high quality historical data from the IEA and World Bank. We find that ASEAN made little progress toward establishing energy security in the previous five-year planning period (2005–2010) as it regressed in most categories except applicability. Therefore, we suggest that increased development of renewable energy and energy efficiency technologies would move ASEAN in a positive direction toward achieving energy security and sustainable energy policy goals. - Highlights: • We investigate energy security in ASEAN across four dimensions. • Energy security in ASEAN has mostly regressed from 2005–2010. • Future cooperative agreements will help ASEAN improve energy security.

  3. Nuclear security policy in the context of counter-terrorism in Cambodia

    International Nuclear Information System (INIS)

    Khun, Vuthy; Wongsawaeng, Doonyapong

    2016-01-01

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia

  4. Nuclear security policy in the context of counter-terrorism in Cambodia

    Science.gov (United States)

    Khun, Vuthy; Wongsawaeng, Doonyapong

    2016-01-01

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  5. Nuclear security policy in the context of counter-terrorism in Cambodia

    Energy Technology Data Exchange (ETDEWEB)

    Khun, Vuthy, E-mail: vuthy.khun@gmail.com; Wongsawaeng, Doonyapong [Department of Nuclear Engineering, Faculty of Engineering, Chulalongkorn University, 254 Phayathai Road, Pathumwan, Bangkok 10330 (Thailand)

    2016-01-22

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  6. 36 CFR 1254.76 - What procedures do I follow to copy formerly national security-classified documents?

    Science.gov (United States)

    2010-07-01

    ... to copy formerly national security-classified documents? 1254.76 Section 1254.76 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS... § 1254.76 What procedures do I follow to copy formerly national security-classified documents? (a) We...

  7. Role of Global Food Security in the Common Agrarian Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Igor N. Shcherbak

    2014-01-01

    Full Text Available The author devoted his research to the role of the global food security in the priorities of the Common Agricultural Policy of the European Union (CAP. The research sheds light on the parameters of the Common Agricultural Policy and the basic steps on the path of its reform. The research demonstrates that the priorities of the EC are mainly concentrated on achieving food security for the member-states of the EC, its population and the interests of the agricultural sector. The modern challenges to the Global Food Security (global food crises of 2007-2009, acute food shortages and hunger in crises regions of Africa and chronic malnutrition are placed high on the agenda of the CAP. In this situation, the EU is trying in the interests of stabilization of the world agricultural market to solve simultaneously the tasks of providing assistance for development and mitigation of the threats to the Global Food security. The deepening rift between the strategy of the CAP oriented towards promotion of agricultural export and real contribution of the EC to the Global Food Security and assistance for development is becoming more and more the most «vulnerable» place of the CAP.

  8. The Nuclear Security Science and Policy Institute at Texas A&M University

    Directory of Open Access Journals (Sweden)

    Claudio A. Gariazzo

    2015-07-01

    Full Text Available The Nuclear Security Science and Policy Institute (NSSPI is a multidisciplinary organization at Texas A&M University and was the first U.S. academic institution focused on technical graduate education, research, and service related to the safeguarding of nuclear materials and the reduction of nuclear threats. NSSPI employs science, engineering, and policy expertise to: (1 conduct research and development to help detect, prevent, and reverse nuclear and radiological proliferation and guard against nuclear terrorism; (2 educate the next generation of nuclear security and nuclear nonproliferation leaders; (3 analyze the interrelationships between policy and technology in the field of nuclear security; and (4 serve as a public resource for knowledge and skills to reduce nuclear threats. Since 2006, over 31 Doctoral and 73 Master degrees were awarded through NSSPI-sponsored research. Forty-one of those degrees are Master of Science in Nuclear Engineering with a specialization in Nuclear Nonproliferation and 16 were Doctorate of Philosophy degrees with a specific focus on nuclear nonproliferation. Over 200 students from both technical and policy backgrounds have taken classes provided by NSSPI at Texas A&M. The model for creating safeguards and security experts, which has in large part been replicated worldwide, was established at Texas A&M by NSSPI faculty and staff. In addition to conventional classroom lectures, NSSPI faculty have provided practical experiences; advised students on valuable research projects that have contributed substantially to the overall nuclear nonproliferation, safeguards and security arenas; and engaged several similar academic and research institutes around the world in activities and research for the benefit of Texas A&M students. NSSPI has had an enormous impact on the nuclear nonproliferation workforce (across the international community in the past 8 years, and this paper is an attempt to summarize the activities

  9. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  10. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  11. Adoption of an information systems security policy in small and medium sized enterprises.

    Directory of Open Access Journals (Sweden)

    Isabel Maria Lopes

    2017-03-01

    Full Text Available Information Systems Security (ISS is a relevant fact for current organizations. This paper focuses on Small and Medium Sized Enterprises (SMEs. This article aims to constitute an empirical study on the applicability of the Action Research (AR method in information systems, more specifically by assessing the adoption of an ISS policy in six SMEs, and identifying the critical success factors in adopting an ISS policy. The research question we intend to answer is to what extent this research method is adequate to reach the proposed goal. The results of the study suggest that AR is a promising means for the evaluation of ISS policies adoption. It can both act as a research method that improves the understanding about the reasons why the policy has been abandoned, and as a change method, assisting practitioners to overcome barriers and suggesting measures to be implemented.

  12. Policy and Policy Formulation Considerations for Incorporation of Secure Mobile Devices in USMC Ground Combat Units

    Science.gov (United States)

    2014-09-01

    Defense Information Systems Network Flag Panel, and its GIG waiver request within 14 days or be subject to censorship and punitive action (Office...can disproportionately affect the outcome of an engagement. Balancing the requirements of GIG security while also incorporating technologies which...classified the paradigm of the industrial age as the division of labor and economies of scale in his 1776 The Wealth of Nations, and it was on these

  13. Food security and nutrition in the Russian Federation – a health policy analysis

    Directory of Open Access Journals (Sweden)

    Karsten Lunze

    2015-06-01

    Full Text Available Background: In the Russian Federation (Russia, an elevated burden of premature mortality attributable to non-communicable diseases (NCDs has been observed since the country's economic transition. NCDs are largely related to preventable risk factors such as unhealthy diets. Objective: This health policy study's aim was to analyze past and current food production and nutritional trends in Russia and their policy implications for Russia's NCD burden. Design: We examined food security and nutrition in Russia using an analytical framework of food availability, access to food, and consumption. Results: Agricultural production declined during the period of economic transition, and nutritional habits changed from high-fat animal products to starches. However, per-capita energy consumption remained stable due to increased private expenditures on food and use of private land. Paradoxically, the prevalence of obesity still increased because of an excess consumption of unsaturated fat, sugar, and salt on one side, and insufficient intake of fruit and vegetables on the other. Conclusions: Policy and economic reforms in Russia were not accompanied by a food security crisis or macronutrient deprivation of the population. Yet, unhealthy diets in contemporary Russia contribute to the burden of NCDs and related avoidable mortality. Food and nutrition policies in Russia need to specifically address nutritional shortcomings and food-insecure vulnerable populations. Appropriate, evidence-informed food and nutrition policies might help address Russia's burden of NCDs on a population level.

  14. Designing, Capturing and Validating History-Sensitive Security Policies for Distributed Systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    has the capability of combining both history-sensitive and future-sensitive policies, providing even more flexibility and power. Moreover, we propose a global Logic for reasoning about the systems designed with this language. We show how the Logic can be used to validate the combination of security...... this approach with history-based components, as is traditional in reference-monitor-based approaches to mandatory access control. Our developments are performed in an Aspect-oriented coordination language, aiming to describe the Bell-LaPadula policy as elegantly as possible. Furthermore, the resulting language...

  15. Food security for infants and young children: an opportunity for breastfeeding policy?

    Science.gov (United States)

    Salmon, Libby

    2015-01-01

    Increased global demand for imported breast milk substitutes (infant formula, follow-on formula and toddler milks) in Asia, particularly China, and food safety recalls have led to shortages of these products in high income countries. At the same time, commodification and trade of expressed breast milk have fuelled debate about its regulation, cost and distribution. In many economies suboptimal rates of breastfeeding continue to be perpetuated, at least partially, because of a failure to recognise the time, labour and opportunity costs of breast milk production. To date, these issues have not figured prominently in discussions of food security. Policy responses have been piecemeal and reveal conflicts between promotion and protection of breastfeeding and a deregulated trade environment that facilitates the marketing and consumption of breast milk substitutes. The elements of food security are the availability, accessibility, utilization and stability of supply of nutritionally appropriate and acceptable quantities of food. These concepts have been applied to food sources for infants and young children: breastfeeding, shared breast milk and breast milk substitutes, in accordance with World Health Organization (WHO)/United Nations Children's Fund (UNICEF) guidelines on infant feeding. A preliminary analysis indicates that a food security framework may be used to respond appropriately to the human rights, ethical, economic and environmental sustainability issues that affect the supply and affordability of different infant foods. Food security for infants and young children is not possible without high rates of breastfeeding. Existing international and national instruments to protect, promote and support breastfeeding have not been implemented on a wide scale globally. These instruments need review to take into account the emerging trade environment that includes use of the internet, breast milk markets and globalised supply chains for breast milk substitutes. New

  16. Successes and Shortfalls of European Union Common Security and Defence Policy Missions in Africa

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Nervanto, Elisa

    This brief synthesises the IECEU project’s most essential findings on the effectiveness of European Union (EU) missions in four Africa countries: Libya, South Sudan, the Democratic Republic of the Congo (DRC) and the Central African Republic (CAR). It describes the main elements and impact...... and context. However, the EU missions presented in this brief share the main characteristic that they have all been deployed under the union’s Common Security and Defence Policy (CSDP)2 with the explicit intent of improving the overall security situation and addressing conflicts in Africa. This brief...... will start by providing a short overview of each case, describing the conflict(s), security situation, mission objectives and obstacles. In this way, it compares the overall effectiveness of EU operational conflict prevention across the four African countries and discusses what lessons can be learned from...

  17. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    security S&T, and facilitate commercialisation of research outcomes for national benefit. The policy will be delivered through a coherent and...our economy and higher living and education standards1,2. Questions for discussion: Q2.1 Are there other imperatives or drivers that justify the...organisations can drive the uptake of new technology and knowledge. Second, private sector organisations are essential to the commercialisation of

  18. Analysis of Department of Defense social media policy and its impact on operational security

    OpenAIRE

    Leonhardi, Eric V.; Murphy, Mark; Kim, Hannah

    2015-01-01

    Approved for public release; distribution is unlimited The emergence and rapid adoption of social media by society has forced the Department of Defense (DOD) to adapt, and ultimately develop and incorporate, social media policy into its cybersecurity strategy. While social media has influenced DOD strategy, it has also had a direct impact on the organization’s operational security (OPSEC). DOD personnel using social media represent a potential OPSEC risk through the various ways and means ...

  19. Leadership From the Centre: A New Foreign and Security Policy for Germany

    Science.gov (United States)

    2016-03-01

    collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources...the form of new partnerships, for a commitment that in a globalised world no longer has any geographical limits: No nation—whatever its size— to...German security and defense policy debates. D. RESEARCH DESIGN AND METHODOLOGY This thesis will source mainly scholarly works and news articles with

  20. Policy risk in action: pension reforms and social security wealth in Hungary, Czech Republic, and Slovakia

    Czech Academy of Sciences Publication Activity Database

    Dušek, Libor; Kopecsni, J.

    2008-01-01

    Roč. 58, 7-8 (2008), s. 329-358 ISSN 0015-1920 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:AV0Z70850503 Keywords : pension reforms * social security * policy risk Subject RIV: AH - Economics Impact factor: 0.275, year: 2008 http://journal.fsv.cuni.cz/storage/1137_dusek-kopecsni_-_329-358-opravené.pdf

  1. Britain, France and Germany: Priorities for the European Union’s Security and Defense Policy

    Science.gov (United States)

    2009-12-01

    David M. Triesman, “A Strong, Competitive Europe is Vital” ( Mansion House, London, 9 January 2007), Denis MacShane, “Enlarging the EU: Peace and...Europe” ( Humboldt University, Berlin, 16 May 2006), http://www.fco.gov.uk/en/newsroom/latest-news/?view=Speech&id=1893537 (accessed 18 April 2009... Humboldt University, Berlin, 16 May 2006. Howorth, Jolyon. Security and Defence Policy in the European Union. New York: Palgrave Macmillan, 2007

  2. Nuclear regulatory policy concept on safety, security, safeguards and emergency preparedness (3S+EP)

    International Nuclear Information System (INIS)

    Ilyas, Zurias

    2009-01-01

    Regulatory Policy is formulated in regulations that stipulate the assurance of workers and public safety and environmental protection. Legislation and regulations on nuclear energy should consider nuclear safety, security and safeguards, as well as nuclear emergency preparedness (3S+EP) and liability for nuclear damage. Specific requirements stipulated in international conventions and agreements should also be taken into account. Regulatory Policy is formulated in regulations that stipulate the assurance of workers and public safety and environmental protection. Legislation and regulations on nuclear energy should consider nuclear safety, security and safeguards, as well as nuclear emergency preparedness (3S+EP) and liability for nuclear damage. Specific requirements stipulated in international conventions and agreements should also be taken into account. By undertaking proper regulatory oversight on Safety, Security and Emergency Preparedness (3S+EP) as an integrated and comprehensive system, safe and secure use of nuclear energy can be assured. Licence requirements and conditions should fulfil regulatory requirements pertaining to 3S+EP for nuclear installation as an integrated system. An effective emergency capacity that can be immediately mobilized is important. The capacity in protecting the personnel before, during and after the disaster should also be planned. Thus, proper emergency preparedness should be supported by adequate resources. The interface between safety, security, safeguards and emergency preparedness has to be set forth in nuclear regulations, such as regulatory requirements; 3S+EP; components, systems and structures of nuclear installations and human resources. Licensing regulations should stipulate, among others, DIQ, installations security system, safety analysis report, emergency preparedness requirements and necessary human resources that meet the 3S+EP requirements.

  3. Energy security in western Mediterranean: new factors, new policies. A Spanish perspective

    International Nuclear Information System (INIS)

    Mane-Estrada, Aurelia

    2008-01-01

    After having noticed that there are two typical approaches and models to address energy security, policies acting on the supply side and policies based on a market-and-institutions approach (like stated by the European Union), the author outlines the effects of this second approach for countries of the western Mediterranean Sea, and then analyses the evolutions of energetic relationships between Algeria (where the energy sector is the most open, which is the best equipped in terms of gas infrastructures, and which attracts foreign investors) and European countries of the region (France, Italy, Spain and Portugal). Thus, she analyses present exchanges in the region, the dependency of these European countries on Mediterranean producers, and the relationships between involved companies of the region. She discusses the issue of energy security policy for the region from the perspective of the governments of producing countries and of consuming countries, and of companies. She discusses whether the project of Union for the Mediterranean complies with these objectives of energy security

  4. MyHealthAtVanderbilt: policies and procedures governing patient portal functionality

    Science.gov (United States)

    Rosenbloom, S Trent; Stenner, Shane P; Anders, Shilo; Muse, Sue; Johnson, Kevin B; Jirjis, Jim; Jackson, Gretchen Purcell

    2011-01-01

    Explicit guidelines are needed to develop safe and effective patient portals. This paper proposes general principles, policies, and procedures for patient portal functionality based on MyHealthAtVanderbilt (MHAV), a robust portal for Vanderbilt University Medical Center. We describe policies and procedures designed to govern popular portal functions, address common user concerns, and support adoption. We present the results of our approach as overall and function-specific usage data. Five years after implementation, MHAV has over 129 800 users; 45% have used bi-directional messaging; 52% have viewed test results and 45% have viewed other medical record data; 30% have accessed health education materials; 39% have scheduled appointments; and 29% have managed a medical bill. Our policies and procedures have supported widespread adoption and use of MHAV. We believe other healthcare organizations could employ our general guidelines and lessons learned to facilitate portal implementation and usage. PMID:21807648

  5. Chinese and Russian Policies on Climate Change: Implications for U.S. National Security Policy

    Science.gov (United States)

    2016-06-01

    crop productivity in China by 2030 as a result of climate change, and a decline of up to 37 percent in rice, maize , and wheat yields after 2050...against global warming. Comparing and contrasting China’s and Russia’s climate change policies and programs may also help to identify gaps in...adequate measures to adapt agriculture to climate change, the annual economic loss from a decrease in climate-determined crop yield in Russia is

  6. The Effects of a Social Media Policy on Pharmacy Students’ Facebook Security Settings

    Science.gov (United States)

    Feild, Carinda; James, Kristina

    2011-01-01

    Objective. To examine how students entering a doctor of pharmacy (PharmD) program used Facebook privacy settings before and after the college's social media policy was presented to them. Methods. The Facebook profiles of all entering first-year pharmacy students across 4 campuses of a college of pharmacy were evaluated. Ten dichotomous variables of interest were viewed and recorded for each student's Facebook account at 3 time points: before the start of the semester, after presentation of the college's social media policy, and at the end of the semester. Data on whether a profile could be found and what portions of the profile were viewable also were collected. Results. After introduction of the policy, a significant number of students increased their security settings (made information not visible to the public) related to Facebook walls, information pages, and links. Conclusions. Making pharmacy students aware of a college's social media policy had a positive impact on their behaviors regarding online security and privacy. PMID:22171105

  7. The effectiveness of sexual harassment policies and procedures at higher education institutions in South Africa

    Directory of Open Access Journals (Sweden)

    Pierre Joubert

    2011-02-01

    Research purpose: The aim of this study was to investigate the awareness levels of academic staff members at higher education institutions in South Africa of sexual harassment policies and procedures in their institutions. Motivation for the study: A number of high profile court cases emphasised the need for effective policies to reduce the incidence of sexual harassment complaints. Research design, approach and method: A cross-sectional survey design was conducted amongst 161 academic staff members, representing 10 higher education institutions in South Africa. The measuring instrument that was used is the Sexual Harassment Questionnaire (SHQ that was developed specifically for this study. Main findings: The results showed that despite indications that sexual harassment policies do exist and that they are regarded as effective tools in addressing sexual harassment, the implementation of such policies is not effective and few academic staff members received training and/or guidance on the utilisation of the policy. Significant correlation coefficients were found between the elements of an effective policy and between population group and some of the elements. Practical/managerial implications: Employers across the board should regularly conduct an audit to determine the level of awareness of sexual harassment policies and procedures and plan interventions. Contribution: No other study in South Africa attempted to measure the awareness levels of academics and its impact on the management of sexual harassment.

  8. Alternative policy impacts on US GHG emissions and energy security: A hybrid modeling approach

    International Nuclear Information System (INIS)

    Sarica, Kemal; Tyner, Wallace E.

    2013-01-01

    This study addresses the possible impacts of energy and climate policies, namely corporate average fleet efficiency (CAFE) standard, renewable fuel standard (RFS) and clean energy standard (CES), and an economy wide equivalent carbon tax on GHG emissions in the US to the year 2045. Bottom–up and top–down modeling approaches find widespread use in energy economic modeling and policy analysis, in which they differ mainly with respect to the emphasis placed on technology of the energy system and/or the comprehensiveness of endogenous market adjustments. For this study, we use a hybrid energy modeling approach, MARKAL–Macro, that combines the characteristics of two divergent approaches, in order to investigate and quantify the cost of climate policies for the US and an equivalent carbon tax. The approach incorporates Macro-economic feedbacks through a single sector neoclassical growth model while maintaining sectoral and technological detail of the bottom–up optimization framework with endogenous aggregated energy demand. Our analysis is done for two important objectives of the US energy policy: GHG reduction and increased energy security. Our results suggest that the emission tax achieves results quite similar to the CES policy but very different results in the transportation sector. The CAFE standard and RFS are more expensive than a carbon tax for emission reductions. However, the CAFE standard and RFS are much more efficient at achieving crude oil import reductions. The GDP losses are 2.0% and 1.2% relative to the base case for the policy case and carbon tax. That difference may be perceived as being small given the increased energy security gained from the CAFE and RFS policy measures and the uncertainty inherent in this type of analysis. - Highlights: • Evaluates US impacts of three energy/climate policies and a carbon tax (CT) • Analysis done with bottom–up MARKAL model coupled with a macro model • Electricity clean energy standard very close to

  9. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Bjornstad, D.J.; Curlee, T.R. (Oak Ridge National Lab., TN (United States)); Bohi, D.R. (Resources for the Future, Inc., Washington, DC (United States))

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab.

  10. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    International Nuclear Information System (INIS)

    Bjornstad, D.J.; Curlee, T.R.; Bohi, D.R.

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab

  11. An Analysis of China's Fertilizer Policies: Impacts on the Industry, Food Security, and the Environment.

    Science.gov (United States)

    Li, Yuxuan; Zhang, Weifeng; Ma, Lin; Huang, Gaoqiang; Oenema, Oene; Zhang, Fusuo; Dou, Zhengxia

    2013-07-01

    China has made remarkable strides in recent decades to grow enough food to feed 20% of the world's population with only 9% of the world's arable land. Meanwhile, the nation is experiencing exacerbated air and water pollution problems. Agricultural growth and the pollution aggravation are closely linked with policies affecting fertilizer production and use. Essentially nonexistent in 1950, China's fertilizer industry is now a robust conglomerate producing fertilizers in amounts that not only meet domestic demand but also contribute to international trade. The industry's growth stemmed from a series of policy progressions, featuring (i) a total control system with state ownership and central planning (1949-1984), (ii) a dual system of central planning and market adjustment (1985-1997), (iii) a market-driven system with government-mandated price caps (1998-2009), and (iv) a complete market-oriented system (since 2009). In conjunction with the policy changes were massive subsidy programs totaling more than $18 billion in 2010. The support policies and subsidies helped grow the industry and safeguard an adequate supply of fertilizers at affordable costs to farmers, but the artificially low-priced fertilizers also contributed to a nationwide trend of fertilizer overuse, leading to nutrient pollution. China needs innovative policies and programs to address food security and sustainability challenges. In this study, we review and analyze policies and programs related to China's fertilizer production and use in a 60-yr span (1950-2010) and discuss its impact on the development of the industry, food security, and pressing environmental issues. Finally, our study analyzes long-term trends in fertilizer use in China and offers some key viewpoints to stimulate debates among all stakeholders. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  12. A Cyber Security Risk Assessment Procedure for Digital I and C Systems in NPPs

    International Nuclear Information System (INIS)

    Song, J. G.; Lee, J. W.; Lee, C. K.; Kwon, K. C.; Lee, D. Y.

    2011-01-01

    Digital Instrumentation and Control (I and C) systems in nuclear power plants (NPPs) use general digital technologies similar to those used in IT systems. However, one of significant differences between the two systems resides in the duration of their service life. The I and C systems in NPPs operate for more than 20 years. IT systems, on the other hand, are in service for about 3 to 5 years. Hence, a one-time risk assessment for IT systems is normally acceptable. In contrast, the risk assessment for the I and C systems in NPPs should be recursively performed during their longer operation life. A recursive procedure for cyber security risk assessment of the I and C systems in NPPs is studied and proposed in this paper

  13. A Cyber Security Risk Assessment Procedure for Digital I and C Systems in NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Song, J. G.; Lee, J. W.; Lee, C. K.; Kwon, K. C.; Lee, D. Y. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2011-10-15

    Digital Instrumentation and Control (I and C) systems in nuclear power plants (NPPs) use general digital technologies similar to those used in IT systems. However, one of significant differences between the two systems resides in the duration of their service life. The I and C systems in NPPs operate for more than 20 years. IT systems, on the other hand, are in service for about 3 to 5 years. Hence, a one-time risk assessment for IT systems is normally acceptable. In contrast, the risk assessment for the I and C systems in NPPs should be recursively performed during their longer operation life. A recursive procedure for cyber security risk assessment of the I and C systems in NPPs is studied and proposed in this paper

  14. Review: Miller, Michelle Ann (2009, Rebellion and Reform in Indonesia – Jakarta’s Security and Autonomy Policies in Aceh

    Directory of Open Access Journals (Sweden)

    Antje Missbach

    2009-01-01

    Full Text Available Review of the monograph: Miller, Michelle Ann, Rebellion and Reform in Indonesia – Jakarta’s Security and Autonomy Policies in Aceh, London/ New York: Routledge, 2009, ISBN 13: 978-0-415-45467-4, 240 pages.

  15. Security, independence, and sustainability: Imprecise language and the manipulation of energy policy in the United States

    International Nuclear Information System (INIS)

    Littlefield, Scott R.

    2013-01-01

    This article examines the impact of imprecise terminology on the energy policymaking process in US, focusing on the manipulation of discourse by different political–economic interests seeking to sway popular opinion. Using the 2012 US Presidential Elections as a backdrop, the analysis highlights the cooption of the concepts “security,” “independence,” and “sustainability” in energy debates by different and often opposing interest groups. The article’s first section traces the malleability of energy terminology to the vagueness of the term “energy” itself and notes how qualifying words like security, independence, and sustainability have been selectively exploited to introduce further ambiguity to an already fungible concept. The second section notes that while energy is a critical and complex factor of macroeconomic production, its main public visibility comes via a few partially representative numbers, like gasoline prices. This mismatch of broad social importance and piecemeal public understanding enables organized interests to leverage vague terminology in support of particular policy ideas. The third section examines three policymaking tools (1) taxation, (2) regulation, and (3) technology promotion and compares these administrative instruments. Ultimately, the article concludes that loosely defined terminology inhibits energy policy discussion and stifles meaningful public debate over and action on energy issues. - Highlights: ► This article examines the impact of imprecise terminology on US energy policymaking. ► Energy security, energy independence, and sustainability are vaguely defined terms. ► Coordinated interests manipulate debate and exploit public ignorance. ► Taxes, regulation, and innovation incentives are used to apply policy prescriptions. ► Vague terminology stifles meaningful public debate over energy policy.

  16. A View of DANIDAs Policy Note on Food Security through A Policy Coherent Lens

    DEFF Research Database (Denmark)

    Robertson, Aileen

    2014-01-01

    -usikkerhed hæmmer udvikling’ understreges det, at hvis ‘underernæring’ og ‘sult’ forveksles, findes disse synergier ikke og sparsomme resourcer spildes. I Danida`s ’Policy Note on Food Security’ nævnes det, at ‘852 million are living in hunger’, altså sult. Det er imidlertid snarere kronisk underernæring end sult...... Greener World for All (NEC)’. Faktisk peger man på, at landbrugets og fødevaresektorens primære rolle er at brødføde befolkningen ved at øge tilgængeligheden og forbruget af sikre, miljørigtige madvarer, der er i overensstemmelse med ernæringsmæssige anbefalinger og til overkommelige priser. Derfor...

  17. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    Science.gov (United States)

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  18. A Review of Cash Management Policies, Procedures and Practices of Mississippi's Institutions of Higher Learning.

    Science.gov (United States)

    Mississippi State Legislature, Jackson. Performance Evaluation and Expenditure Review Committee.

    This report to the Mississippi Legislature presents the findings of a review of the cash management policies, procedures, and practices of the State Board of Trustees of Institutions of Higher Learning (IHL). The methodology involved review of: applicable Mississippi statutes; standards promulgated by the National Association of College and…

  19. 2 CFR 801.30 - What policies and procedures must I follow?

    Science.gov (United States)

    2010-01-01

    ...? 801.30 Section 801.30 Grants and Agreements Federal Agency Regulations for Grants and Agreements DEPARTMENT OF VETERANS AFFAIRS NONPROCUREMENT DEBARMENT AND SUSPENSION § 801.30 What policies and procedures... § 801.220 in this part (2 CFR 801.220). ...

  20. ASEAN’S Strategic Approach Towards Security Relations with the U.S. and China: Hedging through a Common Foreign and Security Policy

    Science.gov (United States)

    2014-06-13

    Foreign and Security Policy EAS East Asia Summit EU European Union NATO North Atlantic Treaty Organization SCS South China Sea U.S. United States...operational vacuum. While ASEAN has rejected “hard” security institutions like the North Atlantic Treaty Organization to resolve inter-state... Bali Concord II) calls for the establishment of an ASEAN Community by the 74Sheldon W. Simon, “The ASEAN Regional Forum: Beyond the Talk Shop?,” NBR

  1. Automated procedure for selection of optimal refueling policies for light water reactors

    International Nuclear Information System (INIS)

    Lin, B.I.; Zolotar, B.; Weisman, J.

    1979-01-01

    An automated procedure determining a minimum cost refueling policy has been developed for light water reactors. The procedure is an extension of the equilibrium core approach previously devised for pressurized water reactors (PWRs). Use of 1 1/2-group theory has improved the accuracy of the nuclear model and eliminated tedious fitting of albedos. A simple heuristic algorithm for locating a good starting policy has materially reduced PWR computing time. Inclusion of void effects and use of the Haling principle for axial flux calculations extended the nuclear model to boiling water reactors (BWRs). A good initial estimate of the refueling policy is obtained by recognizing that a nearly uniform distribution of reactivity provides low-power peaking. The initial estimate is improved upon by interchanging groups of four assemblies and is subsequently refined by interchanging individual assemblies. The method yields very favorable results, is simpler than previously proposed BWR fuel optimization schemes, and retains power cost as the objective function

  2. The Policy Trade-off Between Energy Security and Climate Change in the GCC States

    Science.gov (United States)

    Shahbek, Shaikha Ali

    Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.

  3. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  4. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  5. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  6. Analysis of Russian Federation Foreign Policy in the Field of International Information Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2014-01-01

    Full Text Available Information and communication technologies (ICT play an essential role in the improvement of the quality of life, economic and socio-political of individual countries and humanity in general. However, ICT development is fraught with new challenges and threats to international and national security. Interstate rivalry in the information sphere generates conflicts, an extreme form of which is an information war. Since 1998, the Russian initiative supports the international cooperation on information security at the global and regional level as well as within the framework of the bilateral relations. The article analyzes the characteristics of the global information society, which has a decisive influence on the international security in the information age, as well as international cooperation in this field. The analysis of Russian foreign policy initiatives in the field of international information security is also presented. Today more than 130 countries develop cyber capabilities, both defensive and offensive, that pose serious threats to the international stability. It's difficult to trace the source of information attacks and its consequences can be devastating and cause retaliation, including the use of conventional weapons. In this situation Russian approach, advocating for the development of the rules of conduct of States and demilitarization of information space in order to ensure its safety, seems urgent and relevant with the international situation.

  7. Indirect effect of management support on users' compliance behaviour towards information security policies.

    Science.gov (United States)

    Humaidi, Norshima; Balakrishnan, Vimala

    2018-01-01

    Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management

  8. The foreign policy and security options of Romania in the vision of Klaus Johannis

    Directory of Open Access Journals (Sweden)

    Radu-Ioan Opriș

    2015-03-01

    Full Text Available If a decade ago, Romania became a NATO member and it was enrolled in the accession process to the European Union, in 2014, the problem is radically different: Romania has a new status within NATO, it is part of the EU, it is in process of accession to the Schengen area and it has developed its strategic partnership with the United States of America. In this context, the aim of this paper is to bring into attention the vision of the new president of Romania, Klaus Iohannis, regarding the romanian foreign policy and security.

  9. Policies, Procedures, and Practices Regarding Sport-Related Concussion in Community College Athletes.

    Science.gov (United States)

    Paddack, Michael; DeWolf, Ryan; Covassin, Tracey; Kontos, Anthony

    2016-01-01

    College sport organizations and associations endorse concussion-management protocols and policies. To date, little information is available on concussion policies and practices at community college institutions. To assess and describe current practices and policies regarding the assessment, management, and return-to-play criteria for sport-related concussion (SRC) among member institutions of the California Community College Athletic Association (CCCAA). Cross-sectional study. Web-based survey. A total of 55 head athletic trainers (ATs) at CCCAA institutions. Data about policies, procedures, and practices regarding SRC were collected over a 3-week period in March 2012 and analyzed using descriptive statistics, the Fisher exact test, and the Spearman test. Almost half (47%) of ATs stated they had a policy for SRC assessment, management, and return to play at their institution. They reported being in compliance with baseline testing guidelines (25%), management guidelines (34.5%), and return-to-play guidelines (30%). Nearly 31% of ATs described having an SRC policy in place for academic accommodations. Conference attendance was positively correlated with institutional use of academic accommodations after SRC (r = 0.44, P = .01). The number of meetings ATs attended and their use of baseline testing were also positively correlated (r = 0.38, P = .01). At the time of this study, nearly half of CCCAA institutions had concussion policies and 31% had academic-accommodation policies. However, only 18% of ATs at CCCAA institutions were in compliance with all of their concussion policies. Our findings demonstrate improvements in the management of SRCs by ATs at California community colleges compared with previous research but a need for better compliance with SRC policies.

  10. Secure energy supply in 2025: Indonesia's need for an energy policy strategy

    International Nuclear Information System (INIS)

    Mujiyanto, Sugeng; Tiess, Günter

    2013-01-01

    Indonesia as an emerging country with one of the fastest growing economies requires sufficient supply with energy for national development. Domestic energy production cannot satisfy the domestic demand, and the deficiency necessitates growing imports. The present energy mix consists of 96% from non-renewable sources, i.e. fossil fuels, less than 4% from renewables. Government Regulation 5/2006 aims at increasing the proportion of renewable sources to 17%. Two scenarios for the energy situation in 2025 have been elaborated and are discussed. An overall energy policy strategy and regulatory framework covering non-renewable and renewable resources are crucial for securing energy demand. - Highlights: • Indonesia aims at 17% renewable energy in energy mix 2025. • Population growth exceeds increase of energy production. • Investment incentives for new technologies, exploration and efficient production are necessary. • Clear and comprehensive energy policy strategy and regulatory framework are crucial

  11. Land certification as a substitute or complement to local procedures ? Securing rural land transactions in the Malagasy highlands

    OpenAIRE

    Boué, C.; Colin, Jean-Philippe

    2018-01-01

    This text deals with the relationships between land transactions and the formalization of land rights in a Malagasy context, exploring the local procedures aiming at securing land transactions, while putting them in perspective with the legal formalization of land rights through land certification. Our research shows that (i) transactions are far from being limited to legally recorded plots of land, (ii) the local extra-legal procedures for formalizing transactions are highly standardized, (i...

  12. Energy demand and supply, energy policies, and energy security in the Republic of Korea

    International Nuclear Information System (INIS)

    Kim, Hoseok; Shin, Eui-soon; Chung, Woo-jin

    2011-01-01

    The Republic of Korea (ROK) has enjoyed rapid economic growth and development over the last 30 years. Rapid increases in energy use-especially petroleum, natural gas, and electricity, and especially in the industrial and transport sectors-have fueled the ROK's economic growth, but with limited fossil fuel resources of its own, the result has been that the ROK is almost entirely dependent on energy imports. The article that follows summarizes the recent trends in the ROK energy sector, including trends in energy demand and supply, and trends in economic, demographic, and other activities that underlie trends in energy use. The ROK has been experiencing drastic changes in its energy system, mainly induced by industrial, supply security, and environmental concerns, and energy policies in the ROK have evolved over the years to address such challenges through measures such as privatization of energy-sector activities, emphases on enhancing energy security through development of energy efficiency, nuclear power, and renewable energy, and a related focus on reducing greenhouse gas emissions. The assembly of a model for evaluating energy futures in the ROK (ROK2010 LEAP) is described, and results of several policy-based scenarios focused on different levels of nuclear energy utilization are described, and their impacts on of energy supply and demand in the ROK through the year 2030 are explored, along with their implications for national energy security and long-term policy plans. Nuclear power continues to hold a crucial position in the ROK's energy policy, but aggressive expansion of nuclear power alone, even if possible given post-Fukushima global concerns, will not be sufficient to attain the ROK's 'green economy' and greenhouse gas emissions reduction goals. - Research highlights: →Rapid industrialization caused ROK energy use to increase over 10-fold during 1970-2000, with dramatic structural changes. → Growth in energy use after 2000 slowed to under 5%/yr, and

  13. Marcel de Haas, Russia’s Foreign Security Policy in the 21st Century – Putin, Medvedev and Beyond.

    Directory of Open Access Journals (Sweden)

    Isabelle Facon

    2011-03-01

    Full Text Available Specialists of Russian military and defense policy are familiar with Marcel De Haas’s prolific and in-depth publications on sometimes fairly technical issues. This book, with its broader outlook aimed at providing an overall understanding of Russian security policy in the 2000s, is the product of Dr. De Haas’s years as a Senior Research Fellow at the Clingendael Institute (The Hague. In many ways, it constitutes a follow-on to the author’s previous book– Russian Security Policy and Air Power...

  14. A Case Study of Policies and Procedures to Address Cyberbullying at a Technology-Based Middle School

    Science.gov (United States)

    Tate, Bettina Polite

    2017-01-01

    This qualitative case study explored the policies and procedures used to effectively address cyberbullying at a technology-based middle school. The purpose of the study was to gain an in-depth understanding of policies and procedures used to address cyberbullying at a technology-based middle school in the southern United States. The study sought…

  15. The Chain-Link Fence Model: A Framework for Creating Security Procedures

    Science.gov (United States)

    Houghton, Robert F.

    2013-01-01

    A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…

  16. 48 CFR 1804.470-2 - Policy.

    Science.gov (United States)

    2010-10-01

    ...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements... ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 1804.470-2 Policy. NASA IT security...

  17. Policies and procedures in the workplace: how health care organizations compare.

    Science.gov (United States)

    Loo, R

    1993-01-01

    Many organizations are implementing programs and services to manage the human and economic costs of stress. A mail survey was conducted of 500 randomly selected Canadian organizations having at least 500 employees. The survey tapped four major areas: organizational policies and procedures for managing stress; programs and services offered; perceived benefits and constraints for the organization; and projected future directions in this area. Analyses of returns from 210 organizations-43 health and 167 non-health-revealed various findings. For example, over half of health care organizations have policies and procedures as opposed to less than half of non-health care organizations. Also, health care organizations place greater emphasis on smoking cessation, weight control programs and on stress management training. Although some Canadian organizations are addressing stress, much more could and should be done, especially by organizations that do not yet recognize the impact of stress on employees and their work performance.

  18. Strategic Culture and Energy Security Policy of South Korea: The Case of Nuclear Energy

    International Nuclear Information System (INIS)

    Kim, Taehyun

    2012-01-01

    The U. S. - ROK Civil Nuclear Cooperation Agreement highlights the dilemma of contemporary international non-proliferation regime. Non-Proliferation Treaty has represented an awkward balance between the ideal of nuclear energy and the reality of nuclear weapons. It is neither complete nor effective. It is not complete because it does not cover all the issues with respect to nuclear energy, which have become increasingly complex. Nuclear security, for example, is not an issue that it addresses, and it is precisely why President Obama called for the unprecedented Nuclear Security Summit. It is not effective. It has failed in preventing proliferation of nuclear weapons states, India, Israel, Pakistan and North Korea, who remain outside of the regime. An international regime is defined as 'a set of principles, norms, rules, and decision-procedures around which actors' expectations converge. The extents to which actors' expectations converge and forceful measures in the name of international community against any violation are justified will measure its effectiveness. NPT regime is sub-par on that. The world is in dire need of a comprehensive and integrated regime for nuclear energy regime, where proliferation, security, and safety concern are effectively addressed. South Korea, if it truly wants to become a key player in the field, has to be one of its architects. The ability to meet the challenge of revising Civil Nuclear Cooperation Agreement will show if it is a qualified architect

  19. Policy Preferences about Managed Aquifer Recharge for Securing Sustainable Water Supply to Chennai City, India

    Directory of Open Access Journals (Sweden)

    Norbert Brunner

    2014-12-01

    Full Text Available The objective of this study is to bring out the policy changes with respect to managed aquifer recharge (focusing on infiltration ponds, which in the view of relevant stakeholders may ease the problem of groundwater depletion in the context of Chennai City; Tamil Nadu; India. Groundwater is needed for the drinking water security of Chennai and overexploitation has resulted in depletion and seawater intrusion. Current policies at the municipal; state and national level all support recharge of groundwater and rainwater harvesting to counter groundwater depletion. However, despite such favorable policies, the legal framework and the administrative praxis do not support systematic approaches towards managed aquifer recharge in the periphery of Chennai. The present study confirms this, considering the mandates of governmental key-actors and a survey of the preferences and motives of stakeholder representatives. There are about 25 stakeholder groups with interests in groundwater issues, but they lack a common vision. For example, conflicting interest of stakeholders may hinder implementation of certain types of managed aquifer recharge methods. To overcome this problem, most stakeholders support the idea to establish an authority in the state for licensing groundwater extraction and overseeing managed aquifer recharge.

  20. Food security, wheat production and policy in South Africa: Reflections on food sustainability and challenges for a market economy

    Directory of Open Access Journals (Sweden)

    Francois de Wet

    2018-01-01

    Full Text Available The traditional concept of security has broadened over the past decades. Food security in South Africa is an imperative for human and non-human survival. In the contemporary political economy, there is a real nexus between globalisation, exploitation, the state, scarcity of resources, the market, peoples’ need to feel secure, notions of state responsibility and food production. Political economy and human security in theoretical debates and face-to-face politics are intrinsically linked. The notion of a ‘secure community’ changed. Food security and the right to quality living became a social imperative. Understanding current agricultural economics requires the ability to link security and access to food for all. In this case study, wheat production in South Africa is addressed against the interface of the global and the local including South Africa’s transition to a democratic and constitutional state with a Bill of Rights. The current security approach represents a more comprehensive understanding of what security is meant to be and include, amongst others, housing security, medical security, service delivery and food security, as set out in the Millennium Development Goals and the subsequent Sustainable Development Goals. The issue of food security is addressed here with particular reference to wheat production, related current government policies and the market economy. The authors chose to limit their socio-economic focus to a specific sector of the agricultural market, namely wheat, rather than discuss food security in South Africa in general. Wheat was chosen as a unit of analysis because as a crop, wheat used in bread is one of the staples for the majority of South Africans and given the current negative economic developments, wheat as a staple is likely to remain integral, if not increasing its status of dependability

  1. Integrated Hatchery Operations Team: Policies and Procedures for Columbia Basin Anadromous Salmonid Hatcheries, 1994 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Integrated Hatchery Operations Team (Northwest Power Planning Council, Portland, OR)

    1995-01-01

    This document outlines regional policies and procedures for hatchery operations in the Columbia River Basin. The purpose of these policies is to provide regional guidelines by which all anadromous fish hatcheries will be operated. These policies will be adopted by the fisheries co-managers, and will provide guidance to operate hatcheries in an efficient and biologically sound manner. The hatchery policies presented in this manual are not intended to establish production priorities. Rather, the intent is to guide hatchery operations once production numbers are established. Hatchery operations discussed in this report include broodstock collection, spawning, incubation of eggs, fish rearing and feeding, fish release, equipment maintenance and operations, and personnel training. Decisions regarding production priorities must be provided by fishery managers through a comprehensive plan that addresses both natural and hatchery fish production. The Integrated Hatchery Operations Team is a multi-agency group called for by the Northwest Power Planning Council. This team was directed to develop new basinwide policies for managing and operating all existing and future anadromous fish hatcheries in the Columbia River Basin. The parties pledge to confer with each other and to use their authorities and resources to accomplish these mutually acceptable hatchery practices.

  2. 7 CFR 1710.113 - Loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Loan security. 1710.113 Section 1710.113 Agriculture... GENERAL AND PRE-LOAN POLICIES AND PROCEDURES COMMON TO ELECTRIC LOANS AND GUARANTEES Loan Purposes and Basic Policies § 1710.113 Loan security. (a) RUS makes loans only if, in the judgment of the...

  3. 48 CFR 3004.470-2 - Policy.

    Science.gov (United States)

    2010-10-01

    ... unclassified information. MD 4300.1, entitled Information Technology Systems Security, and the DHS Sensitive Systems Handbook, prescribe the policies and procedures on security for Information Technology resources... 3004.470-2 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY...

  4. Decoding the canada's foreing and security policy: tracking the strategic and ethicliberal approaches of a middle power's behavior

    OpenAIRE

    Rodríguez, Federmán

    2010-01-01

    The article attempts to explain the main paradox faced by Canada at formulating its foreign policy on international security. Explained in economic and political terms, this paradox consists in the contradiction between the Canadian ability to achieve its strategic goals, serving to its own national interest and its dependence on the United States. The first section outlines three representative examples to evaluate this paradox: the Canada’s position in North American security regime, the US...

  5. A Quantitative Study on Japanese Internet User's Awareness to Information Security: Necessity and Importance of Education and Policy

    OpenAIRE

    Toshihiko Takemura; Atsushi Umino

    2009-01-01

    In this paper, the authors examine whether or not there Institute for Information and Communications Policy shows are differences of Japanese Internet users awareness to information security based on individual attributes by using analysis of variance based on non-parametric method. As a result, generally speaking, it is found that Japanese Internet users' awareness to information security is different by individual attributes. Especially, the authors verify that the users who received the in...

  6. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  7. Common security and defence policy of the European Union and NATO

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2015-01-01

    Full Text Available The paper presents the structural analysis of cooperation collectivity NATO and the EU, who are the guarantors of foreign security policy in the region and in the world. In this regard, it outlines the hypothetical discourse in the EU's relations with NATO, the United States, that have marked the start of the independence of each individual battle in terms of security. Standalone approach, reflecting the credibility of each individual collectivity, ultimately lead to a reduction of investment potential. It starts by considering a presentation of possible options on the reflection of the relations between the EU and NATO that the 'fine-tuning' proclaims the need for integration and pragmatic and rational manner, accepted by the political and economic realities in achieving interests. In this paper, the intention of the data on CSDP and critical analysis of relations between the EU and NATO and the presentation of the most significant agreements between the two collectives, help bridge the gap in the division of political interest and commitment of its leading members.

  8. Potential impacts of biofuel development on food security in Botswana: A contribution to energy policy

    International Nuclear Information System (INIS)

    Kgathi, Donald L.; Mfundisi, K.B.; Mmopelwa, G.; Mosepele, K.

    2012-01-01

    Biofuel development continues to be a critical development strategy in Africa because it promises to be an important part of the emerging bio-economy. However, there is a growing concern that the pattern of biofuel development is not always consistent with the principles of sustainable development. This paper assesses the potential of the impacts of biofuel development on food security in Botswana. Drawing on informal and semi-structured interviews, the paper concludes that there is potential for the development of biofuels in Botswana without adverse effects on food security due mainly to availability of idle land which accounted for 72% of agricultural land in the eastern part of the country in 2008. It is suggested that farmers could be incentivized to produce energy crops and more food from such land. Although it is hypothesized that the implementation of biofuel development programmes in other countries had an impact on local commodity prices during the period 2005–2008 in Botswana, it is argued that local biofuel production may not necessarily lead to a substantial increase in commodity food prices because land availability is not a major issue. The paper makes policy recommendations for sustainable biofuel development in Botswana. - Highlights: ► Biofuel development in Botswana can be pursued without harming food security. ► There is plenty idle land which could be used for biofuel and food production. ► Biofuel production will not lead to significant increases in food prices. ► There is need to define land for biofuels to avoid future scarcity of land for food production.

  9. [Food and nutrition security policy in Brazil: an analysis of resource allocation].

    Science.gov (United States)

    Custódio, Marta Battaglia; Yuba, Tânia Yuka; Cyrillo, Denise Cavallini

    2013-02-01

    To describe the progression and distribution of federal funds for programs and activities that fall within the scope of the guidelines of the Brazilian National Policy on Food and Nutrition Security (PNSAN) in the period from 2004 to 2010. This descriptive study used data from the Transparency Website maintained by the Brazilian Public Sector Internal Control Office. Search results were exported to Excel spreadsheets. To determine the resources allocated to food security initiatives, a database was set up containing all actions developed by the federal government between 2004 and 2010. This database was reviewed and the actions that were not related to PNSAN were discarded. The annual amounts obtained were corrected by the Consumer Price Index and updated for the year 2010. Since actions are part of specific programs, the sum of the resources allocated for all the actions of a program amounted to the resources invested in the program as a whole. The programs were then prioritized according to the amount of resources received in 2010. Of the 5 014 actions receiving federal funds in the study period, 814 were related to PNSAN (229 programs). There was growth in resources allocated for PNSAN programs, reaching US$ 15 billion in 2010 (an 82% increase over the previous year). The largest amount was invested in Bolsa Família, a cash transfer program. Ten programs received 90% of the funds, of which five were linked to food production processes. The amount of resources invested in the PNSAN and in actions and programs that promote food and nutrition security is increasing in Brazil.

  10. Policy analysis of authorisation procedures for wind energy deployment in Spain

    International Nuclear Information System (INIS)

    Iglesias, Guillermo; Rio, Pablo del; Dopico, Jesus Angel

    2011-01-01

    The aim of this paper is to analyse the administrative procedures for the granting of authorisations for the siting of wind farms in Spain, currently the competency of regional authorities. The analysis reveals some commonalities and differences between the procedures across regions. Furthermore, some aspects regarding these procedures have raised the concern of different stakeholders, including the central government and wind energy investors. A conflict between the interests of the central and regional governments can be observed. Lack of coordination between the different administrative levels and the 'more is better mentality' of regional authorities have led to a significant growth of wind energy requests for the (national) feed-in tariff. In turn, investors have complained about the discretionarity and non-transparency of those procedures and the lack of homogeneity across regions. This is likely to result in delays, uncertainty for investors and higher transaction costs. Although there has been a trend to a model which involves the use of multicriteria bidding procedures with more explicit, objective and precise criteria regarding project selection, the aforementioned problems suggest the need to improve coordination between the different administrative levels. - Highlights: → A conflict between the interests of the central and regional governments in the granting of administrative procedures can be observed. → Lack of coordination between different administrative levels have led to a significant growth of wind energy requests for the (national) feed-in tariff. → The resulting increase in the total costs of wind energy promotion has been a major concern for national policy-makers. → In turn, investors have complained about the discretionarity and non-transparency of those procedures and the lack of homogeneity across regions. → Those problems suggest the need to improve coordination between the different administrative levels.

  11. Policy Implementation of Working Procedures of Information and Documentation Officer at Cimahi City

    Directory of Open Access Journals (Sweden)

    Karina Intan Permatasari

    2015-12-01

    Full Text Available Since one year after the enactment of Public Information Disclosure Rights Number 14 of 2008 in April 2010, all government in Indonesia shall establish Information and Documentation Officer (PPID and all supporting instruments. Cimahi itself had made Cimahi Mayor Regulation No. 4 of 2011 on the Working Procedures and Documentation Information Management Officer at Cimahi in response to the main policy. However, despite being implemented for 3 years, implementation of this policy is not in accordance with UU KIP sought to assess and analyse the factors that cause these obstacles by using the theory of Charles O. Jones who focuses on organizational aspects, aspects of the interpretation and application of aspects of using qualitative research methods.

  12. Arterial Injury Associated with Tension-Free Vaginal Tapes-SECUR Procedure Successfully Treated by Radiological Embolization

    Directory of Open Access Journals (Sweden)

    Yun Seok Jung

    2010-12-01

    Full Text Available Various postoperative complications have been reported after the use of tension-free vaginal tapes (TVT. The transobturator approach was introduced to minimize the potential complications. The next generation of recently introduced TVT-SECUR is intended to minimize the incidence of complications. Herein we report a case of internal pudendal artery injury sustained during this procedure that was successfully treated by radiological embolization. Angiography with vessel embolization, when available, should be considered when the arterial injury is suspected.

  13. Analysis of rice policy based on presidential instruction on household food security: simultaneous equation model

    Science.gov (United States)

    Sembiring, S. A.

    2018-02-01

    The objective of this research is to analyze the impacts of rice policy on the household food security. The research used cross section data, were collected from 74 respondent as determined by purposive sampling in Sei Rejo villages, the Sub District of Sei Rampah, Serdang Bedagai District in the Province of North Sumatera. Rice policy model specification uses the simultaneous equations consisting of 6 structural equations and 6 identity equations which was estimated using Two Stages Least Squares (2SLS) method. The results show that the effectiveness of government purchase price of dried harvest paddy gave a positive impact on paddy planted area and lead to an increase paddy production and an increase of the rice production gave a positive impact on household rice availability and household rice surplus, and the increase of household rice surplus gave the quantity of Raskin decrease, whereas the increase of fertilizers gave a negative impact on paddy planted area and lead to decrease paddy production and to decrease in rice production was followed by an decrease in household rice availability and household rice surplus, and the decrease of household rice surplus gave the quantity of Raskin increase.

  14. TVT-Secur (Hammock) versus TVT-Obturator: a randomized trial of suburethral sling operative procedures.

    Science.gov (United States)

    Hota, Lekha S; Hanaway, Katherine; Hacker, Michele R; Disciullo, Anthony; Elkadry, Eman; Dramitinos, Patricia; Shapiro, Alexander; Ferzandi, Tanaz; Rosenblatt, Peter L

    2012-01-01

    This study aimed to compare TVT-Secur (TVT-S) and TVT-Obturator (TVT-O) suburethral slings for treatment of stress urinary incontinence (SUI). This was a single-center, nonblinded, randomized trial of women with SUI who were randomized to TVT-S or TVT-O from May 2007 to April 2009. The primary outcome, SUI on cough stress test (CST), and quality-of-life and symptom questionnaires (Pelvic Floor Distress Inventory [PFDI-20] and Pelvic Floor Impact Questionnaire [PFIQ-7]) were assessed at 12 weeks and 1 year. Forty-three women were randomized to TVT-S and 44 to TVT-O. There were no differences in median baseline PFDI-20 and PFIQ-7. Twenty-two (52.4%) of 42 participants randomized to TVT-S had a positive CST result at evaluation after 12 weeks or 1 year, whereas 4 (9.1%) of the 44 in the TVT-O group had a positive CST result. The intent-to-treat analysis showed that the risk of a positive CST result was 6 times higher after TVT-S than TVT-O (risk ratio, 6.0; 95% confidence interval [CI], 2.3-16.0). Among women not lost to follow-up, the risk ratio for a positive CST result after TVT-S compared with TVT-O was 17.9 (95% CI, 2.5-128.0) at 12 weeks and 3.5 (95% CI, 1.1-11.0) at 1 year. Both TVT-S and TVT-O resulted in improved quality of life and symptoms at 12 weeks. There was no difference between the groups for PFDI-20 (P = 0.40) or PFIQ-7 (P = 0.43). A similar pattern was seen at 1 year (P = 0.85 and P = 0.36). The TVT-S seems to have a higher risk of positive postoperative CST result; however, the procedures result in similar improvements in quality of life and symptoms.

  15. Security breaches: tips for assessing and limiting your risks.

    Science.gov (United States)

    Coons, Leeanne R

    2011-01-01

    As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.

  16. Notification: Audit of EPA's Adherence to Policies, Procedures and Oversight Controls Pertaining to the Administrator’s Travel

    Science.gov (United States)

    Project #OA-FY17-0382, August 28, 2017. The EPA OIG plans to begin preliminary research on the EPA’s adherence to policies, procedures and oversight controls pertaining to the Administrator’s travel to Oklahoma.

  17. Report: EPA Needs Policies and Procedures to Manage Public Pesticide Petitions in a Transparent and Efficient Manner

    Science.gov (United States)

    Report #16-P-0019, October 27, 2015. OPP’s lack of policies and procedures to manage public pesticide petitions in a transparent and efficient manner can result in unreasonable delay lawsuits costing the agency time and resources.

  18. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  19. The Ripple Effect of Virginia Tech: Assessing the Nationwide Impact on Campus Safety and Security Policy and Practice

    Science.gov (United States)

    Rasmussen, Chris; Johnson, Gina

    2008-01-01

    This report is the result of a nationwide survey conducted in March 2008 of student life officers and campus safety directors to assess the impact of the April 2007 shootings at Virginia Tech on campus safety and security policy and practice. Discussion areas include: (1) Student Privacy vs. Need-to-Know; (2) Prevention, Mitigation and Recovery;…

  20. Towards Food Security and Livelihoods of Low-income Women in central Uganda: Policy Implications based on action research

    DEFF Research Database (Denmark)

    Nambuanyi, Lekunze Ransom; Midtvåge, Runa; Hiranandani, Vanmala Sunder

    2015-01-01

    Uganda is burdened with rising poverty, malnutrition and food insecurity. While most Ugandans depend on agriculture for their livelihoods, it is important to recognize that access to and control over resources by women and climate factors are central to the question of food security in Uganda....... However, a review of the literature demonstrates that policy options have poorly understood these interlinkages or tended to undermine them, especially the extent that these policies and programs put the necessary attention on the role of women farmers in food security. This paper presents part of a work...... in progress of a research project that seeks to investigate the interrelated effects of agricultural practices, access to and control over resources, as well as climate change on women’s food security in the urban and peri-urban areas of central Uganda. The paper not only considers how to turn...

  1. 21 CFR 1404.610 - What procedures does the Office of National Drug Control Policy use in suspension and debarment...

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false What procedures does the Office of National Drug Control Policy use in suspension and debarment actions? 1404.610 Section 1404.610 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) General Principles Relating to Suspension and Debarment...

  2. 75 FR 29996 - Review of MMS NEPA Policies, Practices, and Procedures for OCS Oil and Gas Exploration and...

    Science.gov (United States)

    2010-05-28

    ... Environmental Policy Act (NEPA) policies, practices, and procedures for the Minerals Management Service (MMS... applies NEPA in its management of Outer Continental Shelf oil and gas exploration and development and make recommendations for revisions. The scope of the review is intended to be holistic, i.e. from leasing decisions to...

  3. 76 FR 50813 - Major Capital Investment Projects; Guidance on News Starts/Small Starts Policies and Procedures

    Science.gov (United States)

    2011-08-16

    ... DEPARTMENT OF TRANSPORTATION Federal Transit Administration Major Capital Investment Projects; Guidance on News Starts/Small Starts Policies and Procedures AGENCY: Federal Transit Administration (FTA... Administration (FTA) to publish policy guidance on the New and Small Starts capital project review and evaluation...

  4. Short-term clinical and quality-of-life outcomes in women treated by the TVT-Secur procedure.

    Science.gov (United States)

    Lim, Jeanette L; de Cuyper, Eva M J; Cornish, Ann; Frazer, Malcolm

    2010-04-01

    The TVT-Secur (Ethicon, Somerville, NJ, USA) is a minimally invasive suburethral synthetic sling used in the treatment of female stress urinary incontinence. It claims to cause less postoperative pain and to enable performing in an office setting. However, this may be at the expense of a significant learning curve and a higher early failure rate. To assess objectively the success rate of the TVT-Secur procedure in the 'U' configuration at six months. Secondary outcomes focussed on subjective success rates, complications, patient satisfaction and quality-of-life (QOL). A prospective observational study was undertaken at two tertiary referral urogynaecology centres. A cohort of 42 consecutive patients with urodynamic stress incontinence who underwent the TVT-Secur procedure in the 'U' configuration between November 2006 and August 2007 were followed up for six months. Three standardised QOL questionnaires were completed preoperatively and at six months. A urogenital history, visual analogue score (VAS) for patient satisfaction, uroflow and urinary stress test were performed at six months. Recruitment was ceased prematurely because of a high number of early failures. Objective and subjective success rates at six months were 58.3% and 51.3% respectively. Complications included urinary tract infections, voiding difficulty, groin discomfort, haematoma, vaginal pain, tape erosion and intra-operative dislodgement of tape. Prevalence of de novo urge incontinence was 10.3%. Only symptom-specific QOL scores improved and only 48.6% indicated a high level satisfaction (VAS > or = 80%) with TVT-Secur. On the basis of this limited study, we are hesitant to recommend the 'U' configuration of the TVT-Secur over its more established counterparts, the TVT and TVT-O.

  5. Policy Needs for Social Security in the Process of Citizenization of the Peri-urban Farmers:A Case Study of Hefei City

    Institute of Scientific and Technical Information of China (English)

    TAN Jiang-lin; CHEN Rui; NI Wen-cong

    2012-01-01

    We conduct a survey of transformational towns and villages in High-tech Development District, Yaohai District and Shushan District, Hefei City. Using data, we analyze the "sideline effect" and inherent contradiction of transformational cities, research the policy needs for social security and its trend in the citizenization process of the peri-urban farmers. On this basis, we construct the social security policy system that can adapt to the accelerated process of urbanization. Finally, we put forth the following recommendations for the social security policy in the citizenization process of the peri-urban farmers: distinguishing different groups’ policy needs for social security; attaching importance to people’s dynamic policy needs for social security in urbanization; focusing on the adaptability of social security policy transformation in urbanization; attaching importance to the social psychosocial environment of social security policy transformation in urbanization; achieving the trinity of non-farm conversion, urbanization and citizenization in the process of urbanization; strengthening the government’s dominant position in the building of social security policy system.

  6. A survey of energy policy priorities in the United States: Energy supply security, economics, and the environment

    International Nuclear Information System (INIS)

    Manley, Dawn K.; Hines, Valerie A.; Jordan, Matthew W.; Stoltz, Ronald E.

    2013-01-01

    Security, environment, and economic concerns are commonly identified as three major objectives of energy policy. State and federal governments have set aggressive targets for carbon emissions reductions and for alternative fuel use and increased vehicle efficiency to reduce petroleum consumption. Moreover, jobs creation and GDP growth are often cited as key drivers for energy policies. Previous studies on energy policy decision-making have examined the process for developing and evaluating options using multi-criteria decision analysis tools. In addition, energy opinion polls have either elicited preferences between two goals or whether the public supports a specific policy action. In this article, we report results from a survey of 884 members of professional membership organizations on how the U.S. should prioritize energy policy across the goals of energy supply security, environment and climate, and economics and job creation. The majority favor policymaking that is balanced across all three. Security and economic concerns increase with age for male respondents, whereas environment is the highest priority for females regardless of age. Unlike previous surveys that target the general public and focus on a particular objective or technology, these results provide an example of eliciting a portfolio allocation across multiple energy policy goals from targeted constituents. - Highlights: • We surveyed 884 members of professional membership organizations on how the U.S. should prioritize energy policy. • The paper addresses direct elicitation of energy policy goal portfolio allocation for a large set of energy stakeholders. • The majority of respondents favor policymaking balanced across multiple goals. • We observed differences in priorities based on age and gender. • Respondents expressed a tension in allocating across goals that are interrelated

  7. 12 CFR 550.140 - Must I adopt and follow written policies and procedures in exercising fiduciary powers?

    Science.gov (United States)

    2010-01-01

    ... procedures in exercising fiduciary powers? 550.140 Section 550.140 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF SAVINGS ASSOCIATIONS Exercising Fiduciary Powers § 550.140 Must I adopt and follow written policies and procedures in exercising fiduciary powers? You...

  8. Operator's and insurer's relationship with social security organizations in the course of individual damage compensation procedures

    International Nuclear Information System (INIS)

    Deprimoz, Jacques.

    1995-01-01

    The Paris and Vienna Conventions internationally agreeded that health care and hospitalization guarantee and disability pension or death due to victim's outside the nuclear installations, as well as the organization funds contributions should be fixed by the internal rights of each Signatory Part. The present study, applicable to nine countries (Germany, Belgium, Brazil, France, Italy, Low Countries, United Kingdom, Sweden and Switzerland) sets up that the social security levels are more or less high and that the charges contributions could be important in countries under subrogation, even reduced or null in countries under imputation. In cases of transfrontier accidents, the contributions extension relies on harmonized rights with the social security organizations of victim's countries. Each indenominity victim's dossier could take a long time. The study concludes that the regulatory services of the social security organizations and their responsible operators or substitutes insurers should coordinate their interventions by using the information system

  9. DoDs Policies, Procedures, and Practices for Information Security Management of Covered Systems (REDACTED)

    Science.gov (United States)

    2016-08-15

    authentication factors, such as: • something known to the user, such as a password or personal identification number; • an access device provided to the...user, such as a cryptographic identification device or token; or • a unique biometric characteristic of the user, such as fingerprints or face...to authenticate themselves (through the use of passwords or other identifiers) and limit the files and other resources that authenticated users can

  10. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.

    Science.gov (United States)

    Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  11. Among cosmopolitan values and strategic interests: liberal and realist discourses of canada’s international security policy during post- cold war

    OpenAIRE

    Rodríguez M., Federmán

    2014-01-01

    The purpose of the article is to explain the liberal and realist discourses that underpinned the Canadian International Security Policy (CISP) during the post-Cold War. In particular, it offers evidence to show that Canadian governments inevitably debate between cosmopolitan values and strategic interests in formulating their respective policies of international security. After considering how liberal and realist orientations of this policy have been studied in the literature on CISP, it expl...

  12. Micro Declared Language Policy or Not?: Language-Policy-Like Statements in the Rules of Procedure of the Rwandan Parliament

    Science.gov (United States)

    Gafaranga, Joseph; Niyomugabo, Cyprien; Uwizeyimana, Valentin

    2013-01-01

    An invitation to integrate macro and micro level analyses has been extended to researchers as this integration is felt to be the way forward for language policy research (Ricento, Ideology, politics and language policies: Focus on english, John Benjamins, Amsterdam, 2000). In turn, the notion of 'micro' in language policy has been specified as…

  13. Policy and procedures for classification of Class III groundwater at UMTRA Project sites

    International Nuclear Information System (INIS)

    1989-03-01

    The US Environmental Protection Agency (EPA) has recently proposed groundwater regulations for the US Department of Energy's )DOE) Uranium Mill Tailings Remedial Action (UMTRA) Project. These regulations allow the application of supplemental standards at UMTRA Project sites in specific situations. The designation of groundwater as Class III permits the application of supplemental standards. This document discusses a final UMTRA Project policy and procedures for identifying Class III groundwater, including identification of a review area, definition of water quality, quantification of aquifer yield, and identification of methods reasonably employed for public water supply systems. These items, either individually or collectively, need to be investigated in order to determine if groundwaters at UMTRA Project sites are Class III. This document provides a framework for the DOE to determine Class III groundwaters

  14. U.S. Army War College Guide to National Security Issues. Volume 2. National Security Policy and Strategy

    Science.gov (United States)

    2012-06-01

    establishment of a plethora of federal agencies empowered to make policy in their realms in order to lift the country out of the Depression . Justice Robert H... depressing regularity. The fact of moral failure, rather than proving the falsity of morality, points instead to the source of our disappointment in such... Centennial Campaign: The Sioux War of 1876, Norman, OK: University of Oklahoma Press, 1976, p. 23. 24. Gray, p. 89. 25. Utley, p. 253. 26. Ibid., p

  15. Testimony before the US-China Economic Security Review Commission: China's Agriculture Policy and US Access to China's Market

    OpenAIRE

    Dermot J. Hayes

    2013-01-01

    Testimony before the US-China Economic and Security Review Commission on April 25, 2013, by Dermot Hayes, professor of Economics and Finance, Iowa State University. Testimony covers impacts on food demand from China's rising incomes and urbanization; the viability of China's attempt to remain self-sufficient in meat and key staple crop production under inherent supply constraints, and the possible technological- and policy-based measures they may pursue in regard of such constraints; and, the...

  16. Japanese Prime Minister Shinzo Abe’s Two Administrations: Successes and Failures of Domestic and Security Policies

    Science.gov (United States)

    2016-12-01

    parties as well. It seemed also difficult to make coalitions among the opposition parties, with their diverse political identities , to win a district...explanations for Abe’s political success in his second administration. Abe’s pragmatism in statecraft mainly originated from his own political experiences...and was crucial for accumulating his political capital and realizing security policy. At the domestic level, political influence from former

  17. U.S.-China Economic and Security Review Commission: Emerging Factor in Western Pacific Strategic Policy Analysis

    OpenAIRE

    Chapman, Bert

    2017-01-01

    Those studying and analyzing Western Pacific strategic trends and develop- ments have access to multiple unclassified analyses of security trends in this region covering these waters and adjacent countries. These information resources are produced by military and government agencies from multiple countries, multinational public policy research institutions, popular and scholarly journals, and Internet resources featuring text, data, webcasts, and imagery. One of these resources is the U.S.–Ch...

  18. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  19. Triggering radiation alarm at security checks. Patients should be informed even after diagnostic nuclear medicine procedures.

    Science.gov (United States)

    Palumbo, Barbara; Neumann, Irmgard; Havlik, Ernst; Palumbo, Renato; Sinzinger, Helmut

    2009-01-01

    During the last few years an increasing number of nuclear medicine patients in various countries evoked a radiation alarm after therapeutic or diagnostic procedures, and even after passive exposure. A prospective calculation of activity retention in the patient's body is difficult due to extremely high variation of uptake and kinetics. Furthermore, different sensitivities and distances of the detectors make a prospective calculation even more difficult. In this article a number of cases are being reported, related problems are discussed and the surprisingly very limited literature reviewed. In order to minimize problems after eventually triggering alarms, we strongly recommend that each patient receives a certificate providing personal data, tracer, dose, half-life of the radionuclide, type and date of procedure applied as well as the nuclear medicine unit to contact for further information. Furthermore, a closer cooperation and exchange of information between the authorities and local nuclear medicine societies, would be welcome.

  20. REDD policy impacts on the agri-food sector and food security

    NARCIS (Netherlands)

    Tabeau, A.A.; Meijl, van J.C.M.; Overmars, K.P.; Stehfest, Elke

    2015-01-01

    The REDD policy which preserves, enables substantial emission reductions. Since agricultural production and area expansion is a primary driver of tropical deforestation, REDD policies might limit the expansion possibilities of agricultural land use and therefore influence competitiveness,

  1. Asylum migration and the construction of the European Common Foreign and Security Policy: evidence from the Greek case

    Directory of Open Access Journals (Sweden)

    Silvia Lucía Forero Castañeda

    2015-12-01

    Full Text Available This article examines how the recent evolution of asylum migration has affected the construction of the European Common Foreign and Security Policy (EU-CFSP, taking the Greek case during the 2001-2012 period as a starting point. With this in mind, the normative progress of the EU-CFSP facing the reception of asylum seekers in Greece is analyzed, under the scope of what Barry Buzan and Ole Waever would call Securitization Process. Both legal and political frameworks on asylum migration in Greece and in the European Union are approached, in the context of the evolution of the EU-CFSP in three main areas: Neighborhood Policy, Development and Cooperation Policy, and Human Rights Protection. The conclusión points toward the partial influence of asylum migration in the configuration of the UE-CFSP during the studied period.

  2. The Effects of National Policy on Refugee Welfare and Related Security Issues: A Comparative Case Study of Lebanon, Egypt and Syria

    National Research Council Canada - National Science Library

    Cleary, Jessica E

    2008-01-01

    .... However, it is the effects of state policy that actually shape the living conditions and the opportunities available for refugees, and in turn influence the security repercussions they can set in motion...

  3. Clausewitz and the Theory of Military Strategy in Europe - Reflections Upon a Paradigm of Military Strategy Within the European Common Security and Defense Policy (ESDP)

    National Research Council Canada - National Science Library

    Hartmann, Uwe

    2001-01-01

    ... as a core element of the Common Security and Defense Policy of the EU, Based on the interpretation of Clausewitz's theory of war and strategy in Britain, France, and Germany, main commonalities...

  4. MODELING OF PROCESSES OF OVERCOMING CONTRADICTIONS OF THE STATE AND ECONOMIC OPERATORS FOR THE SECURITY AND FACILITATION OF CUSTOMS PROCEDURES

    Directory of Open Access Journals (Sweden)

    Berezhnyuk Ivan

    2018-03-01

    Full Text Available Introduction. The issue of simultaneous provision of economic security of the state and simplification of customs procedures is actualized nowadays. The author of the study stressed the importance to create a «safe» business environment from the point of view of the customs sphere, which is based on «security», «justice» and «stability». Purpose. Development of methodical recommendations for modeling the processes of overcoming contradictions of the state and subjects of foreign economic activity in the field of security and simplification of customs procedures. Results. The research indicates that the appointment of revenue and fee bodies is the creation of favorable conditions for the development of foreign economic activity, ensuring the safety of society, protecting the customs interests of Ukraine. When performing customs duties by the SFS, the tasks assigned to them, aimed at ensuring the correct application, strict observance and prevention of non-compliance with the requirements of the Ukrainian legislation on state customs issues, may present risks that are inherently contradictory, conflicting in terms of the vector of action with respect to each other, namely: the probability of non-compliance by the subjects of foreign trade with the norms of customs legislation, or the creation of significant bureaucratic barriers in the process of economic operators. There is a peculiar conflict of interests between the state and the subjects of foreign economic activity. The main direction of creating a favorable business environment in accordance with the recommendations of WCO is the process of further simplification of customs procedures for subjects with a high degree of trust, fighting corruption and facilitating the movement of goods, vehicles and people in general. Conclusions. Thus, the scheme of «relations» between the state and the subjects of foreign economic activity can be modeled by the means of game theory, which is

  5. The mass balance of production and consumption: Supporting policy-makers for aquatic food security

    Science.gov (United States)

    Lopes, A. S.; Ferreira, J. G.; Vale, C.; Johansen, J.

    2017-03-01

    the world, well above both Malaysia and South Korea (each with 58 kg ind-1 y-1). The corrected data show that Portugal had the highest consumption rate in the world until the mid-1970's, when it was overtaken by Iceland for reasons discussed herein. The lack of detailed per-species consumption data, as well as the grouping of species by commodities, hinders a more detailed seafood consumption analysis, required by policy makers and stakeholders to effectively develop management measures to reduce illegal fishing or bycatch, and to correctly formulate strategic options for development of aquaculture and fisheries, necessary for ensuring food security over the next decades.

  6. 41 CFR 301-70.600 - What governing policies and procedures must we establish related to threatened law enforcement...

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 4 2010-07-01 2010-07-01 false What governing policies and procedures must we establish related to threatened law enforcement/investigative employees? 301-70.600 Section 301-70.600 Public Contracts and Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES AGENCY...

  7. News media representations of a common EU foreign and security policy: a cross-national content analysis of CFSP coverage in national quality newspapers

    NARCIS (Netherlands)

    Kandyla, A.-A.; de Vreese, C.

    2011-01-01

    This study is a cross-national comparative content analysis of the broadsheet press coverage of EU Common Foreign and Security issues (n=1453) focusing on the presence of indicators of a European Public Sphere. Specifically, we investigated the visibility of Common Foreign and Security Policy (CFSP)

  8. The Strategic Petroleum Reserve: United States energy security, oil politics, and petroleum reserves policies in the twentieth century

    Science.gov (United States)

    Beaubouef, Bruce Andre

    The history of U.S. petroleum reserves policies in the twentieth century, including the Strategic Petroleum Reserve (SPR) program, provides a case study of the economic and political aspects of national security, and shows the ways in which the American political economy influences national security. One key problem plagued federal petroleum reserve programs and proposals throughout the twentieth century. In a political economy which traditionally placed strong emphasis upon the sanctity of private property and free markets, could the government develop an emergency petroleum reserve policy despite opposition from the private sector? Previous literature on the SPR and oil-stockpiling programs has largely disregarded the historical perspective, focusing instead upon econometric models, suggesting future oil-stockpiling policy options. This study will also make conclusions about the future of governmental oil-stockpiling policies, particularly with regard to the SPR program, but it will do so informed by a systematic history of the emergency petroleum reserve impulse in the twentieth century. Through a study of the emergency petroleum reserve impulse, one can see how the American political economy of oil and energy changed over the twentieth century. As petroleum became crucial to the military and then economic security of the United States, the federal government sought to develop emergency petroleum reserves first for the military, then for the civilian economy. But while the American petroleum industry could deliver the energy "goods" to American energy consumers at a reasonable price, the companies reigned supreme in the political equation. While that was true, federal petroleum reserve programs and proposals conflicted with and were overwhelmed by the historic American tradition of individual economic and private property rights. The depletion of American petroleum reserves changed that political equation, and the ensuing energy crises of the 1970s not only

  9. Nutrition and food security policy in the Islamic Republic of Iran: situation analysis and roadmap towards 2021.

    Science.gov (United States)

    Damari, Behzad; Abdollahi, Zahra; Hajifaraji, Majid; Rezazadeh, Arezoo

    2018-05-03

    All government policies and programmes for food and nutrition security should include providing healthy food, as well as providing economic and social availability for all people. This study aimed to analyse the current situation of Iranian food and nutrition security and establish a road map towards 2021. The applied methods were situation analysis and a mixed qualitative-quantitative method. The conceptual method used for developing this national document encompassed three areas: sustainable food supply, food safety and nutrition. The outcomes of the Iranian food and nutrition security system in the past three decades include development of management infrastructure and improvement in food and nutrition security status. However, analysis of current programmes showed that there were some overlapping, intertwining and parallel works in the responsibilities of related organizations in the field of supervision of food safety (from production to supply). The national document produced as the outcome of this paper was communicated by the Iranian Ministry of Health in 2012 and has been running for 2 years. Selected ministries are responsible for implementation of 20 national programmes by the end of the 5th Economic, Social and Cultural Development Programme (2016-2011). The consensus of stakeholders by the end of the 6th Development Programme (2021) is to put all of the provinces in a safe or very safe situation in terms of food and nutrition security. The most important challenge in establishing national documents is to make them operational. This aim was achieved by an intersectoral nutrition and food security working group, which produced a general memorandum of understanding with the main organizations, the media, universities and private sector. Copyright © World Health Organization (WHO) 2018. Some rights reserved. This work is available under the CC BY-NC-SA 3.0 IGO license (https://creativecommons.org/licenses/by-nc-sa/3.0/igo).

  10. Escape and evade control policies for ensuring the physical security of nonholonomic, ground-based, unattended mobile sensor nodes

    Science.gov (United States)

    Mascarenas, David; Stull, Christopher; Farrar, Charles

    2011-06-01

    In order to realize the wide-scale deployment of high-endurance, unattended mobile sensing technologies, it is vital to ensure the self-preservation of the sensing assets. Deployed mobile sensor nodes face a variety of physical security threats including theft, vandalism and physical damage. Unattended mobile sensor nodes must be able to respond to these threats with control policies that facilitate escape and evasion to a low-risk state. In this work the Precision Immobilization Technique (PIT) problem has been considered. The PIT maneuver is a technique that a pursuing, car-like vehicle can use to force a fleeing vehicle to abruptly turn ninety degrees to the direction of travel. The abrupt change in direction generally causes the fleeing driver to lose control and stop. The PIT maneuver was originally developed by law enforcement to end vehicular pursuits in a manner that minimizes damage to the persons and property involved. It is easy to imagine that unattended autonomous convoys could be targets of this type of action by adversarial agents. This effort focused on developing control policies unattended mobile sensor nodes could employ to escape, evade and recover from PIT-maneuver-like attacks. The development of these control policies involved both simulation as well as small-scale experimental testing. The goal of this work is to be a step toward ensuring the physical security of unattended sensor node assets.

  11. Weak and Failing States: Evolving Security Threats and U.S. Policy

    National Research Council Canada - National Science Library

    Wyler, Liana S

    2008-01-01

    .... national security goal since the end of the Cold War. Numerous U.S. government documents point to several threats emanating from states that are variously described as weak, fragile, vulnerable, failing, precarious, failed, in crisis, or collapsed...

  12. Cybersecurity via Intermediaries : Analyzing Security Measurements to Understand Intermediary Incentives and Inform Public Policy

    NARCIS (Netherlands)

    Asghari, H.

    2016-01-01

    Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure

  13. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... officials say they are not sure the effort is "winning." These assessments emphasize a growing sense of insecurity in areas around Kabul previously considered secure, and increased numbers of civilian and military deaths...

  14. Striking First: Preemptive and Preventive Attack in U.S. National Security Policy

    National Research Council Canada - National Science Library

    Mueller, Karl P; Castillo, Jasen J; Morgan, Forrest E; Pegahi, Negeen; Rosen, Brian

    2006-01-01

    .... U.S. leaders recast the national security strategy to place greater emphasis on the threats posed by violent nonstate actors and by states from which they might acquire nuclear, biological, or chemical...

  15. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... Both the official U.S. as well as outside assessments increasingly point to Pakistan's failure to prevent Taliban and other militant infiltration into Afghanistan as a cause of the security deterioration...

  16. The Devil Is in the Details: Development of Policy and Procedure in the Battle River Project

    Science.gov (United States)

    Gleddie, Doug L.

    2012-01-01

    Objective: Guidelines from a variety of jurisdictions for the health-promoting schools (HPS) approach include healthy school policy as a critical element. Research also supports the importance of policy; however, there seems to be a lack of information on how to develop and implement policy. The article examines the processes involved in one…

  17. What is the place of the energy supply security and energy independence in the energy policy?

    International Nuclear Information System (INIS)

    2001-12-01

    Since the petroleum crisis and the electric power cuts of the 1999 storm, the energy security interest is growing. The author recall the structural risks of the energy systems and the vulnerability of the occidental economies to the supply disruptions. They propose then a long term cooperation between producer and consumer countries, a development of operational tools to face the crisis and a supply security inside the europe. (A.L.B.)

  18. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Science.gov (United States)

    2012-12-26

    ..., Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records... made for the committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory..., Local, Tribal, and Private Sector Entities. DATES: The meeting will be held on January 30, 2013, 10:00 a...

  19. Political and Institutional Drivers of Social Security Policy in South Africa

    DEFF Research Database (Denmark)

    S. Ulriksen, Marianne; Plagerson, Sophie

    studies with varying policy outcomes: 1) the social cash transfer system, which is well established; and 2) the National Health Insurance (NHI) scheme, a recent policy, which has suffered several delays. Building on the power resource and historical institutionalism approaches, we explore how different...

  20. Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach

    Science.gov (United States)

    2011-08-01

    enviromental factors, then it is very likely that the corresponding device has been compromised and controlled by an adversary. In this case, the report... Enviromental Factors in Faulty Case (b) Result of Policy Execution in Faulty Case Figure 7: Policy Execution in Faulty Case (a) Enviromental Factors

  1. 75 FR 65550 - Overseas Security Advisory Council (OSAC) Meeting Notice

    Science.gov (United States)

    2010-10-25

    ... meeting will focus on an examination of corporate security policies and procedures and will involve... confidential, and will discuss law enforcement investigative techniques and procedures. The agenda will include... policies and protective programs and the protection of U.S. business information overseas. For more...

  2. Energy policy for Europe. Ensuring secure and low-carbon energy in the EU's internal market. Interim report

    International Nuclear Information System (INIS)

    Egenhofer, C.; Hammes, J.J.; Pedersen, K.

    2006-12-01

    In early March 2006, the European Commission re-launched the discussion on an Energy Policy for Europe with the 2006 publication of its Green Paper 'Secure, Competitive and Sustainable Energy for Europe'. This manifests the EU's will to broaden its reflection on its future energy systems, taking into account increasing market liberalisation and globalisation, environmental pressures, technological challenges and the growing import dependency from politically unstable regions. Other major contributions to this debate include the climate change communication 'Winning the battle against climate change' (published in 2005), the Green Paper on Energy Efficiency (2005), the Energy Efficiency Action Plan (2006), the ongoing works of the High Level Group on Competitiveness, Energy and the Environment (2006) and the enquiry into the energy sector by DG Competition of the European Commission in 2006. The Spring European Council in March 2006 welcomed the Energy Policy Green Paper and committed itself adopting a prioritised Action Plan at its spring session in 2007, to be prepared by the European Commission and the Energy Council. Early next year, the European Commission will table both the EU Strategic Energy Review, accompanied by a number of sectoral policies and a Green Paper on future climate change policy for the period post-2012 when the Kyoto Protocol expires. Both the EU Strategic Energy Review and the post-2012 Green Paper will outline the European Union (EU) 'energy and climate change vision' and propose a roadmap towards achieving EU energy and climate change objectives, namely, how to ensure the competitiveness of European industries while at the same time combating climate change and ensuring security of energy supply. To contribute to this debate, the CEPS multi-stakeholder Task Force on 'energy policy for Europe' has presented this Interim Report, which attempts to develop the key elements for an EU energy policy framework. Although this report will focus

  3. Information Security Management System toolkit

    OpenAIRE

    Καραμανλής, Μάνος; Karamanlis, Manos

    2016-01-01

    Secure management of information is becoming critical for any organization because information is one of the most valuable assets in organization’s business operations. An Information security management system (ISMS) consists of the policies, procedures, guidelines, and associated resources and activities, collectively managed by an organization, in the pursuit of protecting its information assets. An ISMS is a systematic approach for establishing, implementing, operating, mon...

  4. 33 CFR 157.420 - Vessel specific watch policy and procedures.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) POLLUTION RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Interim Measures for Certain Tank Vessels Without Double Hulls Carrying Petroleum Oils...

  5. Exploring Resource Security Policy and Green Science and Technology in Asia

    Science.gov (United States)

    2014-04-01

    consumption patterns, diets and resource use of its population that will only increase 1...Indonesia, Vietnam, Thailand and Malaysia - have started to put, if not ramped up existing, green policies in place. 9 In India, the government’s

  6. Nuclear Weapons in U.S. National Security Policy: Past, Present, and Prospects

    National Research Council Canada - National Science Library

    Woolf, Amy F

    2008-01-01

    .... During the Cold War, the United States often modified, or tailored, its nuclear targeting doctrine, its nuclear weapons employment policy, and its nuclear force structure to enhance or maintain...

  7. Party Politics and Greek Security Policy from 1974 to 1984: Change and Continuity.

    Science.gov (United States)

    1984-12-01

    it was stated that: The challenge for American policy aakers who want to ensure the tuture of the alliance is to adopt policies which respond to...parliament building. Most of the personal - ities represented the perpetuation of the Greek military regime which had controlled Greece since the 1967 Greek...brought a degree of prosperity to Greece. 12 His resignation in 1963 as a result of disagreement with the King marked him as a person of independent

  8. A Security plan for LMOs - concentrated on environmental policy of Biosafety Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Park, Yong Ha [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    Biotechnology industry in Korea is raised by the national support. Also, Korea imports 70% of entire agricultural products. Considering the present situation in Korea, signing a Biosafety Protocol is necessary to prevent harm by LMOs and to protect associated biotechnological industry. Therefore, the problems on signing Biosafety Protocol were analyzed and the environmental policy to be pursued was proposed. This study result will be a cornerstone to prepare a definite environmental policy by government. 54 refs., 7 figs., 27 tabs.

  9. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  10. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Microphysical particles such as glass and metal can be hazardous and cause serious injury to consumers. Pathogenic bacteria, viruses and toxins produced by microorganisms are all possible contaminants of food and impact food safety. Like food security, food safety is also effected by poverty and climate change. Hence Foo

  11. Swiss Strategic Communication in the Defense Sector and Its Implications for Swiss Security Policy

    Science.gov (United States)

    2017-12-01

    rejected because of its projected higher costs compared to buying the fighter jets.392 Through a public -private partnership, the needed Gripens would...necessary military strategies, overall efficiency and coherence can be augmented to the benefit of national security, the public finances, and the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SWISS STRATEGIC

  12. European Security and Defense Policy (ESDP) After Ten Years - Current Situation and Perspectives

    Science.gov (United States)

    2010-01-01

    Reconnaissance and Observation ( MUSIS ), enhancement of the use of the EU Satellite-Center (EUSC), enhancement of Unmanned Armed Vehicles (UAV), Maritime Mine...stipulated by the capability declaration of 2008, are within the responsibility of the agency. Specific capabilities initiatives, such as the MUSIS ...Product ISAF = International Security Assistance Force KFOR = NATO Kosovo Force MUSIS = Multinational Space-Based Imaging System for Surveillance

  13. Economics and National Security: Issues and Implications for U.S. Policy

    Science.gov (United States)

    2011-01-04

    College, K-12, and Early Childhood Education ............................................................. 25 Science, Technology, Engineering, and...to democratize because democracies were more likely than dictatorships to have shared values and to keep the peace; and • Western culture was...ahead of the United States in all three categories.57 College, K-12, and Early Childhood Education58 The 2010 National Security Strategy proposes that

  14. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  15. Career Obsolescence and Social Security: Emerging Education Policy Issues in Law.

    Science.gov (United States)

    Sandow, Stuart A.

    This document is the second in a series of studies designed to examine the legal aspects of various potential educational problems in our society. This particular study deals with the case of a highly trained aerospace technician who sues the social security trust for loan benefits, arguing that he is economically disabled and has been retired by…

  16. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Full Text Available The theme for World Health Day campaign for this year 2015 is “Food safety: from farm to plate, make food safe”. The day focuses on demonstrating the importance of food safety along the whole length of the food chain in a globalized world, from production and transport, to preparation and consumption (1. Everyone needs food and needs it every day either plant sources or animal sources or both. The food we eat must be nutritious and safe but we often ignore or overlook the issue of food safety. Many cases of food borne diseases either acute poisoning or chronic exposure are largely under reported. In this globalized world, though the food chain extends over thousands of miles from different continents, an error or contamination in one country can affect the health of consumers on the other part of the world. To ensure full impact, these actions must build on principles of government stewardship, engagement of civil society, (2.According to UN, access to a safe and secure food supply is a basic human right. Food safety and food security are interrelated concepts which have an impact on the health outcomes and quality of human lives. As per Food and Agricultural Organization (FAO, Food security is a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life, (3. Based on the definition of Food security, four food security dimensions can be identified: food availability, economic and physical access to food, food utilization and stability over time. Apart from that food security is also affected by Poverty and Climate change.Food safety is an umbrella term that encompasses many aspects like food items handling, preparation and storage of food to prevent illness and injury. The other important issues are chemical, microphysical and microbiological aspects of food safety, (4. Control of

  17. A Proactive Approach to Building Security.

    Science.gov (United States)

    Winters, Sharon

    1994-01-01

    Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…

  18. Fiscal policy surveillance in the enlarged European Union: Procedural checks or simple arithmetic?

    NARCIS (Netherlands)

    Groenendijk, Nico; Batten, Jonathan A.; Kearney, Colm

    2006-01-01

    In its recommendation on the 2004 update of the Broad Economic Policy Guidelines (BEPGs), the European Commission (2004) issued country-specific recommendations for fiscal policy in the Central and Eastern European (CEE) countries that have recently joined the European Union (EU) (henceforth the

  19. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  20. Conflicts of Interest in Clinical Guidelines: Update of U.S. Preventive Services Task Force Policies and Procedures.

    Science.gov (United States)

    Ngo-Metzger, Quyen; Moyer, Virginia; Grossman, David; Ebell, Mark; Woo, Meghan; Miller, Therese; Brummer, Tana; Chowdhury, Joya; Kato, Elisabeth; Siu, Albert; Phillips, William; Davidson, Karina; Phipps, Maureen; Bibbins-Domingo, Kirsten

    2018-01-01

    The U.S. Preventive Services Task Force (USPSTF) provides independent, objective, and scientifically rigorous recommendations for clinical preventive services. A primary concern is to avoid even the appearance of members having special interests that might influence their ability to judge evidence and formulate unbiased recommendations. The conflicts of interest policy for the USPSTF is described, as is the formal process by which best practices were incorporated to update the policy. The USPSTF performed a literature review, conducted key informant interviews, and reviewed conflicts of interest policies of ten similar organizations. Important findings included transparency and public accessibility; full disclosure of financial relationships; disclosure of non-financial relationships (that create the potential for bias and compromise a member's objective judgment); disclosure of family members' conflicts of interests; and establishment of appropriate reporting periods. Controversies in best practices include the threshold of financial disclosures, ease of access to conflicts of interest policies and declarations, vague definition of non-financial biases, and request for family members' conflicts of interests (particularly those that are non-financial in nature). The USPSTF conflicts of interest policy includes disclosures for immediate family members, a clear non-financial conflicts of interest definition, long look-back period and application of the policy to prospective members. Conflicts of interest is solicited from all members every 4 months, formally reviewed, adjudicated, and made publicly available. The USPSTF conflicts of interest policy is publicly available as part of the USPSTF Procedure Manual. A continuous improvement process can be applied to conflicts of interest policies to enhance public trust in members of panels, such as the USPSTF, that produce clinical guidelines and recommendations. Copyright © 2018 American Journal of Preventive Medicine

  1. Consumer Food Security and Labeling Intervention on Food Products through Public Policies in Romania

    Directory of Open Access Journals (Sweden)

    Dacinia Crina Petrescu

    2018-02-01

    Full Text Available The correct understanding of consumers’ food labeling knowledge and perceptions is a prerequisite to develop and implement coherent and appropriate food safety policies. One objective of the paper was to discover how often consumers access and use specific food label information. Another objective was to explore stakeholders’ preferences for several public policy options relevant for food safety. In this respect, a survey on a sample of 312 Romanian consumers and the evaluation of several public policy options by four stakeholder groups (food producers and sellers, doctors, fitness trainers, and consumers were carried out. The results revealed that the most frequently read types of information on the label were “expiration date” and “price”, closely followed by “quantity” and “brand”. Among tested public policies, those related to the traffic light labels and to the social interest messages with health claims were rewarded with high scores by investigated stakeholders. Although nutrition has a decisive impact on health state, nutrition information was not frequently read by people, thus justifying the implementation of a public policy meant to enhance consumers’ interest in and reading frequency of nutrition information on food label.

  2. 41 CFR 102-192.80 - How do we develop written security policies and plans?

    Science.gov (United States)

    2010-07-01

    ... Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...) Operating procedures; (d) Plan to provide a visible mail screening operation; (e) Training mail center...) Managing threats; (h) Communications plan; (i) Occupant Emergency Plan (OEP); (j) Continuity of Operations...

  3. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  4. Regional disaster risk management strategies for food security: Probing Southern African Development Community channels for influencing national policy

    Directory of Open Access Journals (Sweden)

    Happy M. Tirivangasi

    2018-05-01

    Full Text Available Natural disasters and food insecurity are directly interconnected. Climate change related hazards such as floods, hurricanes, tsunamis, droughts and other risks can weaken food security and severely impact agricultural activities. Consequently, this has an impact on market access, trade, food supply, reduced income, increased food prices, decreased farm income and employment. Natural disasters create poverty, which in turn increases the prevalence of food insecurity and malnutrition. It is clear that disasters put food security at risk. The poorest people in the community are affected by food insecurity and disasters; hence, there is a need to be prepared as well as be in a position to manage disasters. Without serious efforts to address them, the risks of disasters will become an increasingly serious obstacle to sustainable development and the achievement of sustainable development goals, particularly goal number 2 ‘end hunger, achieve food security and improved nutrition and promote sustainable agriculture’. In recent years, countries in southern Africa have experienced an increase in the frequency, magnitude and impact of climate change–related hazards such as droughts, veld fire, depleting water resources and flood events. This research aims to reveal Southern African Development Community disaster risk management strategies for food security to see how they an influence and shape policy at the national level in southern Africa. Sustainable Livelihood approach was adopted as the main theoretical framework for the study. The qualitative Analysis is based largely on data from databases such as national reports, regional reports and empirical findings on the disaster management–sustainable development nexus.

  5. Sustainable Food Security in the Mountains of Pakistan: Towards a Policy Framework.

    Science.gov (United States)

    Rasul, Golam; Hussain, Abid

    2015-01-01

    The nature and causes of food and livelihood security in mountain areas are quite different to those in the plains. Rapid socioeconomic and environmental changes added to the topographical constraints have exacerbated the problem of food insecurity in the Hindu Kush-Himalayan (HKH) region. In Pakistan, food insecurity is significantly higher in the mountain areas than in the plains as a result of a range of biophysical and socioeconomic factors. The potential of mountain niche products such as fruit, nuts, and livestock has remained underutilized. Moreover, the opportunities offered by globalization, market integration, remittances, and non-farm income have not been fully tapped. This paper analyzes the opportunities and challenges of food security in Pakistan's mountain areas, and outlines a framework for addressing the specific issues in terms of four different types of area differentiated by agro-ecological potential and access to markets, information, and institutional services.

  6. FOOD SECURITY PROVIDING OF THE SVERDLOVSKAYA OBLAST POPULATION AS THE AGRARIAN POLICY BASIS

    Directory of Open Access Journals (Sweden)

    M.V. Fedorov

    2008-12-01

    Full Text Available Food safety may be interpreted as production systems attribute providing during different technological processes the security and the quality of food products. The key role in this is played by control systems over these processes. Any control system is based on the information data concerning efficiency and state of the system. This information is necessary for operative quality management and the frequency of hypothetic deviations may serve as a universal numeric indicator of the technological processes breakages. The basic elements of food security provision in the region are seen as the following: orientation on our own resources; agro industrial complex restructuring wits a due account of disproportions in its spheres; innovation changes in the production processes in view of competitiveness increase; nutrition improvement and health of the population.

  7. Sports Venue Security: Public Policy Options for Sear 4-5 Events

    Science.gov (United States)

    2014-06-01

    team which commands the highest attendance is the world-renowned New York Yankees franchise . The Yankees games average 10,300 people per pre-season...spectator-patron buy -in to partner with the government and private sector for funding SEAR 4–5 venue security. As shown in Chapter III, the sports...now. Further, the sports ticket buying public has also accepted the purely for profit convenience fees already attached to sporting event ticket

  8. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-06-06

    Security Council Resolution 1193 (August 28, 1998) and 1214 (December 8, 1998) urged the Taliban to end discrimination against women . Women’s rights ...powers to compensate. Gives men and women equal rights under the law, allows for political parties as long as they are not “un-Islamic;” allows for...implement the NAPWA and all of its past commitments and laws to strengthen the rights of women and provide services to them. The major institutional

  9. Mitigating Insider Threats in the Domestic Aviation System: Policy Options for the Transportation Security Administration

    Science.gov (United States)

    2017-12-01

    Birmingham Airport to come up with a set of short-, mid-, and long-term initiatives for its employees. The first step was to pull the top layer of...programs are defensive and akin to a goalie patrolling the net. They know what they are defending against and the area (goal) they are protecting...Unfortunately, even the best goalies from time to time have the ball kicked past them. At their core, security programs can be split into two main

  10. Analysis of Department of Defense Social Media Policy and Its Impact on Operational Security

    Science.gov (United States)

    2015-06-01

    MWR Morale, Welfare , and Recreation NIPRNET Non-secure Internet Protocol Router Network NIST National Institute of Standards and Technology NSA...cyber risks at both the national and international levels (DOD, 2011). This is because many domestic technology firms outsource software production...provided by morale, welfare , and recreation (MWR), military exchanges, and lodging programs for use by authorized patrons. C) Applies to contractors

  11. The Impact of the Soviet Military Presence in the Arctic Region on Norwegian Security Policies

    Science.gov (United States)

    1990-01-01

    Admiral Roy Breivik , "Assuring the Security of Reinforcements to Norway", NATO’s Sixteen Nations, Special nr 2, (1982): 67. Former Director General of...34Norway Country Portrait", (1984): 53. 17 Holst, (1982): 27. 18 German, (1982): 61. 19 Bjol, (1983): 25. 20 Breivik , (1982): 68. 21 Interview, Major Kurt...1, (January 1981): 5-7. 137 Vinogradov, N., as translated by Suggs, Robert C., "Let’s Go to Hammerfest", Red Star, (February 1985). Wall, Patrick

  12. A Formal Model of Trust Chain based on Multi-level Security Policy

    OpenAIRE

    Kong Xiangying

    2013-01-01

    Trust chain is the core technology of trusted computing. A formal model of trust chain based on finite state automata theory is proposed. We use communicating sequential processes to describe the system state transition in trust chain and by combining with multi-level security strategy give the definition of trust system and trust decision theorem of trust chain transfer which is proved meantime. Finally, a prototype system is given to show the efficiency of the model.

  13. Dividend Policy: A Survey of Malaysian Public Listed Companies and Security Analysts

    OpenAIRE

    Chong, David Voon Chee

    2003-01-01

    This dissertation revisits the dividend puzzle and attempts to answer the fundamental question of “why do companies pay dividends?” by using a simple regression model incorporating the major theories on dividend relevance. In addition, this research investigates if the opinions of companies (both dividend and non-dividend paying) and security analysts differ with respect to the various explanations for paying dividends. Finally, this research also explores the views and opinions of corporate ...

  14. Social Security reform: evaluating current proposals. Latest results of the EBRI-SSASIM2 policy simulation model.

    Science.gov (United States)

    Copeland, C; VanDerhei, J; Salisbury, D L

    1999-06-01

    The present Social Security program has been shown to be financially unsustainable in the future without modification to the current program. The purpose of this Issue Brief, EBRI's fourth in a series on Social Security reform, is threefold: to illustrate new features of the EBRI-SSASIM2 policy simulation model not available in earlier EBRI publications, to expand quantitative analysis to specific proposals, and to evaluate the uncertainty involved in proposals that rely on equity investment. This analysis compares the Gregg/Breaux-Kolbe/Stenholm (GB-KS) and Moynihan/Kerrey proposals with three generic or "traditional" reforms: increasing taxes, reducing benefits, and/or increasing the retirement age. Both proposals would create individual accounts by "carving out" funds from current Social Security payroll taxes. This analysis also examines other proposed changes that would "add on" to existing Social Security funds through the use of general revenue transfers and/or investment in the equities market. President Clinton has proposed a general revenue transfer and the collective investment of some of the OASDI trust fund assets in equities. Reps. Archer and Shaw have proposed a general revenue tax credit to establish individual accounts that would be invested partially in the equities markets. When comparing Social Security reform proposals that would specifically alter benefit levels, the Moynihan/Kerrey bill compares quite favorably with the other proposals in both benefit levels and payback ratios, when individuals elect to use the individual account option. In contrast, the GB-KS bills do not compare quite as favorably for their benefit levels, but do compare favorably in terms of payback ratios. An important comparison in these bills is the administrative costs of managing the individual accounts, since benefits can be lowered by up to 23 percent when going from the assumed low to high administrative costs. Moreover, allowing individuals to decide whether to

  15. Sustainable Livestock Production in The Perspective of National Food Security Policy

    Directory of Open Access Journals (Sweden)

    Tjeppy D Soedjana

    2013-03-01

    Full Text Available This paper presents an overview of the role that livestock play in various dimensions of food security. Food security is defined as a state of affairs where all people at all times have access to safe and nutritious food to maintain a healthy and active life. Availability, accessibility, and affordability of individuals to consume food according to their respective socio-economic conditions are important dimensions. It describes the place of livestock products in human nutrition, the contribution of livestock to the national food supply and the way that livestock can affect food access, as a direct source of food and a source of income. Access to food is the most basic human right, especially for Indonesia with more than 240 million people with annual growth of 1.3%. To secure food availability, a sustainable food production growth more than 2% per year, including animal protein sources, is needed. It is necessary to strengthen food supply by maximizing available resources; improve food distribution system to guarantee a stable food supply and public access; encourage diversified food consumption; and prevent as well as resolve food scarcity. Furthermore, within the national objectives for self-sufficiency in rice, corn, soybean, and white sugar, the current annual percapita consumption of livestock products has reached 6.96 kg (meat, 7.3 kg (eggs and 16.5 kg (milk, which indicates good progress to stimulate sustainable domestic livestock production.

  16. Security policy speculation of user uploaded images on content sharing sites

    Science.gov (United States)

    Iyapparaja, M.; Tiwari, Maneesh

    2017-11-01

    Innovation is developing step by step tremendously. As there are numerous social locales where information likes pictures, sound, video and so forth are shared by the client to each other. In concentrate to all exercises on social locales, there is need of protection to pictures. Because of this reason, I utilized Adaptive protection strategy forecast instrument to give security to the pictures. Issue identified with pictures is the huge issue in social locales like Facebook, twitter and so on. So here the part of a social thought, security to pictures, metadata and so on is produced. To conquer this issue we produced an answer which is 2 systems which understanding to a background marked by the pictures gives appropriated answer for them. Here we give an arrangement to the specific sort of pictures by characterizing them and in addition giving protection to pictures which are transferred agreement to a calculation that we utilized. Consequently as indicated by this arrangement expectation pictures take after a similar approach on up and coming pictures and give successful security to them.

  17. Conditions of Poland’s foreign and security policy within the EU and NATO environment

    Directory of Open Access Journals (Sweden)

    Antczak- Barzan Anna

    2014-01-01

    Full Text Available The article is an attempt to answer the question about the state of Poland’s security after the first decade of the twenty-first century, what are its determinants, what kind of challenges Poland faces and which of them may turn into a threat and which into an opportunity, or what Polish potential is and which of its components determine its position on the international arena. It is achieved through a detailed analysis of actions undertaken by Poland in the international arena to strengthen its international position as well as the level of its security. Thus, the aim is to identify those determinants which may contribute to establishing a stronger position and which can create problems and become a formidable challenge in the context of various aspects of security, and even develop into a threat. Unfortunately, the picture which comes out of the above mentioned analysis is not optimistic and the impression is that Poland did not use the chance it was given after the accession to the NATO and the EU.

  18. [Food and nutritional security: situation analysis of decentralization in the national public policy].

    Science.gov (United States)

    Vasconcellos, Ana Beatriz Pinto de Almeida; Moura, Leides Barroso Azevedo de

    2018-03-01

    The aim of this study was to analyze the situation with the decentralization of the Brazilian National System of Food and Nutritional Security (SISAN), created in 2006 under the Brazilian National Food and Nutritional Security Act (LOSAN). Based on the criteria for joining SISAN, as set out in Decree 7,272 of August 25, 2010, the authors analyzed data from the basic information surveys of the Brazilian Institute of Geography and Statistics, 2014 (Estadic e Munic/2014). The results show that decentralization of SISAN is still incipient at the municipal level, although all the states of Brazil have already joined the system. The social assistance sector has played an outstanding role in coordinating SISAN at the state and municipal levels, while in the latter the health sector has also played a relevant role. The analysis of food and nutritional security activities conducted to date, based on the sources of federal, state, and municipal funds, further shows that the federal sphere has still not played a strong inductive role capable of leading the expansion of SISAN. More effective funding mechanisms and the assignment of responsibilities to the states and municipalities are relevant factors for consolidating the system's state-level base and expanding the municipal base in the search for an identity and capillarity for SISAN.

  19. Security, development and human rights: normative, legal and policy challenges for the international drug control system.

    Science.gov (United States)

    Barrett, Damon

    2010-03-01

    This commentary addresses some of the challenges posed by the broader normative, legal and policy framework of the United Nations for the international drug control system. The 'purposes and principles' of the United Nations are presented and set against the threat based rhetoric of the drug control system and the negative consequences of that system. Some of the challenges posed by human rights law and norms to the international drug control system are also described, and the need for an impact assessment of the current system alongside alternative policy options is highlighted as a necessary consequence of these analyses. Copyright (c) 2010 Elsevier B.V. All rights reserved.

  20. 78 FR 47047 - Proposed Policy for Discontinuance of Certain Instrument Approach Procedures

    Science.gov (United States)

    2013-08-02

    ... the cancellation of certain Non-directional Beacon (NDB) and Very High Frequency (VHF) Omnidirectional... approach procedures. The FAA proposes specific criteria to guide the identification and selection of... selection of potential NDB and VOR procedures for cancellation. Once the criteria are established and the...

  1. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  2. 78 FR 75563 - Commission Policies and Procedures Under the Communications Act, Foreign Investment in Broadcast...

    Science.gov (United States)

    2013-12-12

    ... competitive opportunities (ECO) approach for broadcast foreign ownership similar to that applied in common... Technology, a firm that consults with financial institutions and broadcast owners. Adelante Comments at 1-2... threats and national security issues have arisen as technology has advanced,\\33\\ we do not believe that...

  3. 78 FR 30733 - Modernizing Federal Infrastructure Review and Permitting Regulations, Policies, and Procedures

    Science.gov (United States)

    2013-05-22

    ... of an economy built to last. Investing in our Nation's infrastructure serves as an engine for job... edge in a global economy and to securing our path to energy independence. In taking steps to improve...- and watershed- level mitigation practices; promoting the sharing of scientific and environmental data...

  4. Fair play in energy policy decisions: Procedural fairness, outcome fairness and acceptance of the decision to rebuild nuclear power plants

    International Nuclear Information System (INIS)

    Visschers, Vivianne H.M.; Siegrist, Michael

    2012-01-01

    To raise public acceptance of new energy policies, promoting the fairness of the outcomes and of the decision-making procedure has been suggested. Very few studies have examined the role of fairness in public acceptance of rebuilding nuclear power plants. Therefore, using a large mail survey, we investigated the public’s acceptance of the decision to rebuild nuclear power plants in Switzerland by 2020. The study examined the influence of procedural fairness and outcome fairness on the acceptance of this decision, as well as other factors such as risk perception and benefit perception. Additionally, we investigated the moderating influence of general attitudes towards nuclear power on the relation between fairness and decision acceptance. Results indicated that outcome fairness strongly increased decision acceptance, along with general attitudes towards nuclear power and perceived economic benefits. Procedural fairness had only a small impact on decision acceptance. The influence of fairness on decision acceptance did not seem to depend on general nuclear attitudes. Our findings imply that, in the case of rebuilding nuclear power plants, perceived benefits and outcome fairness are important determinants of acceptance of the decision, while procedural fairness only has a limited impact. - Highlights: ► We investigated the role of fairness in the acceptance of a nuclear policy decision. ► Outcome fairness strongly influenced decision acceptance regarding nuclear power plants. ► The role of procedural fairness was relatively small in this respect. ► Also, nuclear attitudes and perceived economic benefits affected decision acceptance. ► Outcome fairness seems more relevant for decision acceptance than procedural fairness.

  5. Fundamental economic irreversibilities influence policies for enhancing international forest phytosanitary security

    Science.gov (United States)

    Thomas P. Holmes; Will Allen; Robert G. Haight; E. Carina H. Keskitalo; Mariella Marzano; Maria Pettersson; Christopher P. Quine; E. R. Langer

    2017-01-01

    National and international efforts to manage forest biosecurity create tension between opposing sources of ecological and economic irreversibility. Phytosanitary policies designed to protect national borders from biological invasions incur sunk costs deriving from economic and political irreversibilities that incentivizes wait-and-see decision-making. However, the...

  6. Achieving Food Security and Environmental Sustainability in Southeast Asia: A Policy Challenge

    NARCIS (Netherlands)

    Mahanani WR; MNV

    2002-01-01

    To get a thorough picture on the possible situation of food and the environment in Southeast Asia in 2030 and to identify the areas that need policy intervention, five scenarios on future food production are reviewed and compared. These scenarios include: 1) FAO AT 2015/30 which is taken as the

  7. Good governance and virtue in South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Burmeister, O

    2015-01-01

    Full Text Available Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack...

  8. REDD policy impacts on the agri-food sector and food security

    NARCIS (Netherlands)

    Tabeau, Andrzej; Meijl, van Hans; Overmars, Koen P.; Stehfest, Elke

    2017-01-01

    Recent research shows that the combined contributions of deforestation, forest degradation and peat land emissions account for about 15% of greenhouse gas emissions. The REDD policy which preserves forests and values standing forests, enables substantial emission reductions. Since agricultural

  9. United States foreign oil policy since World War 1 : for profits and security. 2 ed.

    Energy Technology Data Exchange (ETDEWEB)

    Randall, S.J.

    2005-07-01

    This book provided a historical context for United States global oil politics, with a focus on the goals, accomplishments and challenges of United States foreign oil policy, as well as on the relationship between the state and private sectors. This second edition has integrated developments in global politics since the end of the Cold War. It was suggested that many factors have provided the context for oil policy formation: a succession of crises in Iran since the 1950s; 2 wars in Iraq; U.S. intervention in Afghanistan; the threat of international terrorism since September 11, 2001; ongoing conflicts between Israel and the Arab nations in the Middle East; political instability in Saudi Arabia and in Venezuela and the trend towards trade and investment liberalization in Latin America in the 1990s. In addition, the emergence of oil sands reserves in Canada and other sources of non-conventional oil were discussed. Nationalism and oil policies in the Depression and World War 2 were examined. The structure of decision-making in oil policies was examined. Domestic and offshore resources were reviewed, and an outline of international agreements and relationships was presented. Issues concerning OPEC countries and the Iranian Revolution were examined. It was concluded that the United States has become more and not less vulnerable, despite its military strength. The author suggested that the main policy challenge to the United States may well be the tension between its commitment to Israel and its determination to avoid alienating the Arab oil-producing states. refs., tabs., figs.

  10. Data Security and Privacy in Apps for Dementia: An Analysis of Existing Privacy Policies.

    Science.gov (United States)

    Rosenfeld, Lisa; Torous, John; Vahia, Ipsit V

    2017-08-01

    Despite tremendous growth in the number of health applications (apps), little is known about how well these apps protect their users' health-related data. This gap in knowledge is of particular concern for apps targeting people with dementia, whose cognitive impairment puts them at increased risk of privacy breaches. In this article, we determine how many dementia apps have privacy policies and how well they protect user data. Our analysis included all iPhone apps that matched the search terms "medical + dementia" or "health & fitness + dementia" and collected user-generated content. We evaluated all available privacy policies for these apps based on criteria that systematically measure how individual user data is handled. Seventy-two apps met the above search teams and collected user data. Of these, only 33 (46%) had an available privacy policy. Nineteen of the 33 with policies (58%) were specific to the app in question, and 25 (76%) specified how individual-user as opposed to aggregate data would be handled. Among these, there was a preponderance of missing information, the majority acknowledged collecting individual data for internal purposes, and most admitted to instances in which they would share user data with outside parties. At present, the majority of health apps focused on dementia lack a privacy policy, and those that do exist lack clarity. Bolstering safeguards and improving communication about privacy protections will help facilitate consumer trust in apps, thereby enabling more widespread and meaningful use by people with dementia and those involved in their care. Copyright © 2017. Published by Elsevier Inc.

  11. CHALLENGES TO ILLEGAL MIGRATION POLICIES AND NATIONAL SECURITY OF MEXICO: ANALYSIS FROM THE MANAGEMENT CONDUCTED BETWEEN 2001 AND 2014 AND THE CASE CONCERNING INTERNATIONAL REFERENCES

    Directory of Open Access Journals (Sweden)

    PEDRO RODRÍGUEZ MORENO

    2017-09-01

    Full Text Available This article discusses the issue of political-legal, social and human rights challenges imposed by irregular migration to Mexico, a nation that has been converted into an important area of destination and transit to the United States. The criminalization of the phenomenon and, therefore, the securitization of immigration policy, endorsed by the National Security Policy, has led to social and humanitarian conditions that are deplorable for undocumented migrants most of the times. It then examines the situation of Mexico between 2001 and 2014 and the reality of international benchmarks in the field. One of the challenges recognized for Immigration and National Security policies on the social level is the stigmatization suffered by irregular migrants both adults and children. In the political-legal arena to challenge the institutionalization of irregular migration as a threat that affects national security and overcomes the disjunction between the established regulations and their implementation. Key

  12. The Economics of the Security Dilemma in the Eastern Baltic Economic Dilemmas of the Security Policy of the Eastern Baltic Countries

    Directory of Open Access Journals (Sweden)

    Mezhevich N. M.

    2018-05-01

    Full Text Available This article considers military security in the Eastern Baltic. The research focuses on the economic sustainability of Estonia, Latvia, and Lithuania in the context of military spending. The authors maintain that an increase in military spending can either strengthen or weaken national economic and technological potential. In Germany or Sweden, military spending accounts for a smaller proportion of the GDP or budget revenues, but it is integrated into the general model of innovative and technological development. In the case of the Baltics, it is advisable to estimate military spending as a proportion of budget revenues rather than that of GDP — this recommendation applies to all smaller states. The authors stress that the central component of any national military and economic development is a focus on general national objectives rather than solely military ones. Economically advanced countries integrate defence spending into their investment and innovation strategies and industrial policies. Smaller countries — and the Baltics are no exception — do not apply this principle. Their military spending does not contribute to the technological and economic agenda. The article shows that the military spending of Lithuania, Latvia and Estonia undermines their investment potential and serves as a critical factor in their national and governmental development. The authors suggest estimating military spending as a proportion of budget revenues rather than that of GDP.

  13. Policy for securing human resources in the nuclear industry of Japan

    International Nuclear Information System (INIS)

    Takeuchi, S.

    1993-01-01

    The shortage of human resources in the field of nuclear industry in Japan is due to: structural difficulty resulting from the prevailing labor shortage in Japan, difficulties from the ever-intensifying adverse wind against nuclear power, and difficulties specific to R and D organizations. A practical plan is proposed for securing qualified personnel: approach to be directly made on campuses; effective/advanced management of human resources; better treatment and fringe benefit; promoting the nuclear industry attractiveness; expanding the scope of basic and fundamental researches; regaining the public confidence; closer cooperation between the government and the nuclear power groups. 6 figs

  14. Southeast Asian Perceptions of U.S. Security Policy in the Post-Cold War Era

    Science.gov (United States)

    1993-06-01

    personnel to be stationed in Singapore. Alimin’s statement came the day following Malaysia’s Defense Minister Najib Tun Razak had also declared Kuala Lumpur’s...military concerns. Malaysian Defense Minister Datuk Sri Mohamed Najib Razak has said: "The question of security should not be viewed from a narrow...region."" In November 1991, Defense Minister Najib Razak offered the use of the Royal Malaysian Naval Base in Lumut as a maintenance and repair depot for

  15. Timor-Leste’s Foreign Policy: Securing State Identity in the Post-Independence Period

    Directory of Open Access Journals (Sweden)

    Selver B. Sahin

    2014-01-01

    Full Text Available This paper examines some of the major ideational aspects of Timor-Leste’s foreign policy orientation in the post-independence period. Drawing upon the constructivist accounts of state behaviour, the paper situates Timorese leaders’ foreign policy decisions in the broader context of their search to position the fledging nation in the global political order. It argues that Timor-Leste’s insecure state identity has shaped its leaders’ foreign policy preferences in the post-independence period. This identity can be examined by separating it into two parts: the construction of spatial boundaries and the creation of a temporal “other”. The former is evidenced by the leadership’s rhetorical emphasis on the country’s Portuguese heritage and their prioritisation of ASEAN membership, both of which are closely related to the consolidation of the young nation’s political and cultural identity. The creation of a temporal other, as illustrated by the rise of political discourse emphasising sovereignty, reflects a wider transitional process that is embedded in the country’s transformation from colony to independent state under international supervision as well as the state’s transformation from “fragile” or “failing” to “stable”. A detailed analysis of the basic aspects of Timor-Leste’s insecurities as a constitutive element of its foreign policy becomes instrumental to understanding the country’s nation-state-building experience since its separation from Indonesia in 1999, as it enters a new phase of socio-political structuring following the withdrawal of the international security presence in 2012.

  16. 76 FR 66721 - New Policies and Procedural Requirements for the Electronic Submission of Discretionary Grant...

    Science.gov (United States)

    2011-10-27

    ... electronic submission of discretionary grant applications through the government-wide grants application site... Procedural Requirements for the Electronic Submission of Discretionary Grant Applications AGENCY: Division of... requirements for the electronic submission of discretionary grant applications. Overview Information: The...

  17. 77 FR 3102 - Procedures for Implementing the National Environmental Policy Act

    Science.gov (United States)

    2012-01-23

    ..., organizational changes, and procurement of routine goods and services. (ii) Issuance of procedural rules, manuals... routine data collection and analysis activities. (vi) Preparation and dissemination of information, including document mailings, publications, classroom materials, conferences, speaking engagements, Web sites...

  18. The Party Politics of Legislative-Executive Relations in Security and Defence Policy

    NARCIS (Netherlands)

    Wagner, W.M.; Herranz-Surralles, A.; Kaarbo, J.; Ostermann, F.

    2017-01-01

    The move from territorial defence to ‘wars of choice’ has influenced the domestic politics of military interventions. This paper examines the extent to which both the substance and the procedure of military interventions are contested among political parties. Regarding the substance, our analysis of

  19. 34 CFR 668.46 - Institutional security policies and crime statistics.

    Science.gov (United States)

    2010-07-01

    ... a voluntary, confidential basis for inclusion in the annual disclosure of crime statistics, and, if... procedures to report crimes on a voluntary, confidential basis for inclusion in the annual disclosure of... the victim's actual or perceived race, gender, religion, sexual orientation, ethnicity, or disability...

  20. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2011-04-15

    banks existed during Taliban era. Some limited credit card use. Some Afghan police now paid by cell phone (E-Paisa). Access to Electricity 15%-20...another policy review, taking into account the McChrystal recommendations and the marred August 20, 2009, presidential election. Some senior U.S...seen as a prelude to a broader and more complex bilateral free trade agreement, but negotiations on an FTA have not yet begun. On December 13, 2004

  1. U.S. Refugee Policy In The Era Of Homeland Security: A Comparative Government Analysis

    Science.gov (United States)

    2017-12-01

    comparative analysis with Canada and Germany, both of which are democratic Western societies facing similar issues. It answers the question of what...with Canada and Germany, both of which are democratic Western societies facing similar issues. It answers the question of what U.S. policy makers can...Refugee Crisis and the Need for U.S. Leadership (New York: Human Rights First, 2016), https://www.humanrightsfirst.org/sites/default/files

  2. Policy Analysis in National Security Affairs: New Methods for a New Era

    Science.gov (United States)

    2006-01-01

    Basic Books, 1982); Lee S. Friedman, Microeconomic Policy Analysis (New York: McGraw-Hill, 1984); Duncan Macrae, Jr., and Dale Whittington , Expert...that part of the an- swer lies in scuttling the Stryker brigades and the FCS effort, but this step would deprive the Army of main transformation...about whether too many soldiers were being allocated to logistic support, depriving the U.S. Army and European forces of adequate combat formations

  3. Political Influence on Japanese Nuclear and Security Policy: New Forces Face Large Obstacles

    Science.gov (United States)

    2014-02-01

    supported and sometimes even led by a strong bureaucracy, with oversight by but also much deference from the broader LDP majority in the Diet . During the...Research Council (PARC), a “shadow Diet committee” system in which DPJ legislators could engage in bureaucrat-led “study sessions,” something...303- 328. 62 Katsuhisa Furukawa, “Japan’s Policy and Views on Nuclear Weapons: A Historical Perspective,” Jebat: Malaysian Journal of History

  4. The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    Directory of Open Access Journals (Sweden)

    Jeroen Ooms

    2013-11-01

    Full Text Available The increasing availability of cloud computing and scientific super computers brings great potential for making R accessible through public or shared resources. This allows us to efficiently run code requiring lots of cycles and memory, or embed R functionality into, e.g., systems and web services. However some important security concerns need to be addressed before this can be put in production. The prime use case in the design of R has always been a single statistician running R on the local machine through the interactive console. Therefore the execution environment of R is entirely unrestricted, which could result in malicious behavior or excessive use of hardware resources in a shared environment. Properly securing an R process turns out to be a complex problem. We describe various approaches and illustrate potential issues using some of our personal experiences in hosting public web services. Finally we introduce the RAppArmor package: a Linux based reference implementation for dynamic sandboxing in R on the level of the operating system.

  5. National Security and International Policy Challenges in a Post Stuxnet World

    Directory of Open Access Journals (Sweden)

    Butrimas Vytautas

    2014-12-01

    Full Text Available The international community has focused too much on addressing cybercrime and cyber hacktivist questions. The list of usual suspects responsible for cyber incidents associated with attacks involving the theft of intellectual property, sensitive private data, money and disruption of web services unfortunately has grown beyond the attention seeking student hacker, cybercriminal or social hacktivist. The public appearance of the Stuxnet family of malware designed to destroy specifically targeted critical infrastructure components in June of 2010 gave perhaps the first indication that States have entered cyberspace as one of the perpetrators of malicious cyber activity. The problem of States actively preparing and executing cyber-attacks against the critical infrastructures of other States has been largely ignored by the international community. These attacks raise national security issues concerning threats to the economic and social well-being of States. However the pervasive presence of cyber space as the common environment where all modern industrial processes take place and the interrelations developed among the critical infrastructure of other States raise cross-border security issues as well. The international community must act in order to insure that the use of this new weapon by States will not get out of hand and be the cause of new and more serious international conflicts. Three solutions and a possible model are proposed to manage this disruptive activity of States in cyberspace at the international level.

  6. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a

  7. The Model of Gas Supply Capacity Simulation In Regional Energy Security Framework: Policy Studies PT. X Cirebon Area

    Science.gov (United States)

    Nuryadin; Ronny Rahman Nitibaskara, Tb; Herdiansyah, Herdis; Sari, Ravita

    2017-10-01

    The needs of energy are increasing every year. The unavailability of energy will cause economic losses and weaken energy security. To overcome the availability of gas supply in the future, planning are cruacially needed. Therefore, it is necessary to approach the system, so that the process of gas distribution is running properly. In this research, system dynamic method will be used to measure how much supply capacity planning is needed until 2050, with parameters of demand in industrial, household and commercial sectors. From the model obtained PT.X Cirebon area in 2031 was not able to meet the needs of gas customers in the Cirebon region, as well as with Businnes as usual scenario, the ratio of gas fulfillment only until 2027. The implementation of the national energy policy that is the use of NRE as government intervention in the model is produced up to 2035 PT.X Cirebon area is still able to supply the gas needs of its customers.

  8. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

    2005-12-01

    Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

  9. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  10. 12 CFR 615.5560 - Book-entry Procedure for Farm Credit System Financial Assistance Corporation Securities.

    Science.gov (United States)

    2010-01-01

    ... Assistance Corporation (Financial Assistance Corporation) is a federally chartered instrumentality of the... Corporation securities). The Financial Assistance Corporation may prescribe the forms, the denominations, the...

  11. 78 FR 38989 - New Policies and Procedural Requirements for Electronic Submission of State Plans, and Program...

    Science.gov (United States)

    2013-06-28

    .... Report (FFR). Child Abuse and Neglect State Grant Form SF-425: Federal Financial Part 1. Report (FFR... DEPARTMENT OF HEALTH AND HUMAN SERVICES Administration for Children and Families New Policies and..., for Mandatory Grant Programs AGENCY: Office of Administration (OA), Administration for Children and...

  12. 76 FR 18942 - Policies To Promote Rural Radio Service and To Streamline Allotment and Assignment Procedures

    Science.gov (United States)

    2011-04-06

    ... absence of other Tribal-owned or Tribal-oriented media of mass communications in the area, or a showing... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 73 and 74 [MB Docket No. 09-52; FCC 11-28] Policies... Communications Commission. ACTION: Final rule. SUMMARY: In this document, the Commission adopted a number of...

  13. 77 FR 2916 - Policies To Promote Rural Radio Service and To Streamline Allotment and Assignment Procedures

    Science.gov (United States)

    2012-01-20

    ... bidding credit to Tribes with no interests in media of mass communications, for a total maximum bidding.... ADDRESSES: Peter Doyle or Thomas Nessinger, Federal Communications Commission, Media Bureau, Audio Division... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 09-52; FCC 11-190] Policies To...

  14. 34 CFR 668.134 - Institutional policies and procedures for requesting documentation and receiving secondary...

    Science.gov (United States)

    2010-07-01

    ... STUDENT ASSISTANCE GENERAL PROVISIONS Immigration-Status Confirmation § 668.134 Institutional policies and... immigration status of applicants for title IV, HEA student financial assistance who claim to meet the... eligible noncitizen until the institution has provided the student the opportunity to submit the...

  15. 78 FR 35909 - Endocrine Disruptor Screening Program; Final Policies and Procedures for Screening Safe Drinking...

    Science.gov (United States)

    2013-06-14

    ... for Responsible Medicine (PCRM), ACC, BCS, and CLA and the Endocrine Policy Forum (EPF)) indicated... chemicals and drinking water contaminants. G. Other Topics 1. Cost sharing. ACC, CLA, EPF, and CPDA stated... should strictly disallow CBI claims. The ACC, CLA, and EPF commented that FFDCA authorized, and EPA...

  16. Dr. Inside and Dr. Outside: Physicists Involved With National Security and Foreign Policy

    Science.gov (United States)

    Zimmerman, Peter D.

    2009-05-01

    Physicists have had a special interest in American national security and arms control since at least the Manhattan Project. They have served our country in uniform and in the career civil service. Some have left academic careers for brief periods to work as political appointees, consultants, or resident scholars and then returned to an academic life, but often with changed goals. Some have tried government life and left nearly immediately, while others dipped a toe in and decided to stay. I will look at real-life examples, mostly using real names, drawn from my career and circle of colleagues to try to explain why some physicists have been extremely successful, why others have not, and what happens to a physicist who moved to Washington and decides to stay. I will also discuss routes into public service for those interesting in giving it a try.

  17. Iceland and the EU’s Common Security and Defence Policy: Challenge or Opportunity?

    Directory of Open Access Journals (Sweden)

    Alyson J.K. Bailes

    2012-06-01

    Full Text Available Iceland had initial misgivings about the EU’s capacity created in 1999 for military crisis management. In the current debate over Iceland’s EU application, questions have been raised about the possible impact of CSDP on the nation’s non-military status. In fact the CSDP is designed to respect national choices in defence; requires unanimity on new actions; and allows case-by-case decisions on participation. Preliminary study of six other small states in the EU suggests that none of them has been obliged by membership to abandon national preferences in this field, though all have made special efforts to support EU police and civilian operations - an area where Iceland is also well qualified to contribute. The more significant effects of EU membership for Icelandic security might in fact come in other, ‘softer’ areas including EU obligations for mutual assistance in civil emergencies.

  18. It's more than money: policy options to secure medical specialist workforce for regional centres.

    Science.gov (United States)

    May, Jennifer; Walker, Judi; McGrail, Mathew; Rolley, Fran

    2017-12-01

    Objectives Regional centres and their rural hinterlands support significant populations of non-metropolitan Australians. Despite their importance in the settlement hierarchy and the key medical services provided from these centres, little research has focused on their issues of workforce supply and long-term service requirements. In addition, they are a critical component of the recent growth of 'regional' hub-and-spoke specialist models of service delivery. Methods The present study interviewed 62 resident specialists in four regional centres, seeking to explore recruitment and retention factors important to their location decision making. The findings were used to develop a framework of possible evidence-informed policies. Results This article identifies key professional, social and locational factors, several of which are modifiable and amenable to policy redesign, including work variety, workplace culture, sense of community and spousal employment; these factors that can be targeted through initiatives in selection, training and incentives. Conclusions Commonwealth, state and local governments in collaboration with communities and specialist colleges can work synergistically, with a multiplicity of interdigitating strategies, to ensure a positive approach to the maintenance of a critical mass of long-term rural specialists. What is known about the topic? Rural origin increases likelihood of long-term retention to rural locations, with rural clinical school training associated with increased rural intent. Recruitment and retention policy has been directed at general practitioners in rural communities, with little focus on regional centres or medical specialists. What does this study add? Rural origin is associated with regional centre recruitment. Professional, social and locational factors are all moderately important in both recruitment and retention. Specialist medical training for regional centres ideally requires both generalist and subspecialist skills

  19. Corrigendum to: It's more than money: policy options to secure medical specialist workforce for regional centres.

    Science.gov (United States)

    May, Jennifer; Walker, Judi; McGrail, Mathew; Rolley, Fran

    2017-12-01

    Objectives Regional centres and their rural hinterlands support significant populations of non-metropolitan Australians. Despite their importance in the settlement hierarchy and the key medical services provided from these centres, little research has focused on their issues of workforce supply and long-term service requirements. In addition, they are a critical component of the recent growth of 'regional' hub-and-spoke specialist models of service delivery. Methods The present study interviewed 62 resident specialists in four regional centres, seeking to explore recruitment and retention factors important to their location decision making. The findings were used to develop a framework of possible evidence-informed policies. Results This article identifies key professional, social and locational factors, several of which are modifiable and amenable to policy redesign, including work variety, workplace culture, sense of community and spousal employment; these factors that can be targeted through initiatives in selection, training and incentives. Conclusions Commonwealth, state and local governments in collaboration with communities and specialist colleges can work synergistically, with a multiplicity of interdigitating strategies, to ensure a positive approach to the maintenance of a critical mass of long-term rural specialists. What is known about the topic? Rural origin increases likelihood of long-term retention to rural locations, with rural clinical school training associated with increased rural intent. Recruitment and retention policy has been directed at general practitioners in rural communities, with little focus on regional centres or medical specialists. What does this study add? Rural origin is associated with regional centre recruitment. Professional, social and locational factors are all moderately important in both recruitment and retention. Specialist medical training for regional centres ideally requires both generalist and subspecialist skills

  20. 12 CFR 615.5451 - Book-entry and definitive securities.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Book-entry and definitive securities. 615.5451... AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry Procedures for Farm Credit Securities § 615.5451 Book-entry and definitive securities. Subject to subpart C of this part: (a) Farm...

  1. Defense Logistics: Enhanced Policy and Procedures Needed to Improve Management of Sensitive Conventional Ammunition

    Science.gov (United States)

    2016-02-01

    Information System-Retail OIS-MC Ordnance Information System-Marine Corps SAAS -MOD Standard Army Ammunition System-Modernization SRC Security Risk...automated information systems. For the Army we used LMP, SAAS , and WARS-NT; for the Navy and Marine Corps we used OIS-W, OIS-R, and OIS-MC; and for the Air...Army we used LMP, SAAS , and WARS-NT; for the Navy and Marine Corps we used OIS-W, OIS-R, and OIS-MC; and for the Air Force we used CAS. Military

  2. Notification: Audit of EPA’s Adherence to Policies, Procedures and Oversight Controls Pertaining to the Administrator’s Travel (2nd notification)

    Science.gov (United States)

    Project #OA-FY17-0382, October 6, 2017 - The EPA OIG plans to expand the scope of preliminary research on the EPA’s adherence to policies, procedures and oversight controls pertaining to the Administrator’s travel.

  3. DoD Program for Stability of Civilian Employment: Policies, Procedures, and Programs Manual

    Science.gov (United States)

    1990-09-01

    history of treatment for mental or emotional problems) .......................................... 91 Severe distortion of limbs and/or spine (e.g., dwarfism ...Cancer-a history of cancer with complete recovery .................. 88 Cancer-undergoing surgical and/or medical treatment ............. 89 Mental...and therefore, the treatment each registrant must receive. e. Activities planning to fill positions through competitive procedures should

  4. 77 FR 72237 - Policies To Promote Rural Radio Service and To Streamline Allotment and Assignment Procedures

    Science.gov (United States)

    2012-12-05

    ...) (section 307(b)) for new AM construction permits, as well as new FM allotments, in already well- served... petitioners argued that the new procedures ``ignore current marketplace realities,'' causing radio stations to..., whether ``potential services,'' such as vacant FM allotments or granted but unbuilt construction permits...

  5. Policy-based secure communication with automatic key management for industrial control and automation systems

    Science.gov (United States)

    Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.

    2016-11-22

    A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one or more other devices in the industrial process control and automation system in order to control communications to or from the specified device.

  6. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... evacuation routes and assembly stations; and (viii) Existing security and safety equipment for protection of... protection systems; (iv) Procedural policies; (v) Radio and telecommunication systems, including computer... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Security Assessment (FSA...

  7. Does Variation in the Extent of Generalized Trust, Individual Education and Extensiveness of Social Security Policies Matter for Maximization of Subjective Well-Being?

    Science.gov (United States)

    Valeeva, Rania F.

    2016-01-01

    In this paper, I examine whether generalized trust and education, as well as social security policies of welfare state institutions matter for cross-national differences in subjective well-being (SWB), because knowledge on this issue is still lacking. For this purpose I integrated the insights of two sociological theories: Social Function…

  8. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  9. Securing Gender Equality through a Nexus of Energy Policy Performance and Relative Political Performance

    Science.gov (United States)

    Perkins-Ozuagiemhe, Andrea Christen

    that, in fact, that women are not impacted equally by energy policy preferences as men and that women in developing countries benefit from increased access to modern household energy. Thus, gender-differentiated energy usage illustrates why treating population as a homogenous group fails to capture how energy policy preferences and energy policy performance can affect different subgroups of population in terms of individual choices and how those differences can affect an overall economic growth and development. Fundamental theoretical implications emerge from this dissertation's empirical findings. First, improving gender equality through technological advancements in household electricity facilitates the progress of demographic transition in terms of reducing fertility rates. Time altering effects of increased access and use of household electricity modify intra-household relations by diminishing differing roles between men and women. When women gain greater autonomy facilitated by increasing time via access to modern household electricity for more economically and educationally productive activities, fertility rates and child births tend to decrease by altering choice in family size with increased investments in children. The effect that the reduction in fertility generated by increased gender equality has upon demographic transition is that it alters the change in age structure in a developing country by decreasing youth dependency ratios generating the demographic dividend. Gender equality-generated fertility reductions may also facilitate the return to human capital by lessening the burden of non-SNA work and activities including reducing child care, increasing female labor force participation rates.

  10. Public Policy Issues in Transport. Taxes and standards for energy security and greenhouse gas objectives

    Energy Technology Data Exchange (ETDEWEB)

    Eskeland, Gunnar (Cicero, Oslo (Norway))

    2008-07-01

    The direct case for fuel economy standards on a stand alone basis dies in the textbook on the basis of first principles: the fuel tax is a better targeted instrument. In practice, the fuel economy standard, is killed by the 'rebound effect'. Vehicle users will, once they have more fuel efficient vehicles, respond to lower marginal costs by increased vehicle use. If an important part of negative externalities from transport are associated with vehicle kilometres (accidents, congestion, road wear) rather than fuel consumption, the rebound effect increases negative externalities from transport. The more direct way of addressing negative externalities from transport is to increase fuel taxes, and depending on their prior level, this is our first recommendation. But higher fuel taxes often raise political resistance. The fuel efficiency of existing cars is an important way by which people have adapted to present fuel taxes, determining their resistance to increases. A higher fuel efficiency standard is an instrument that faces little political resistance and which - over time - reduces the political resistance to increased fuel taxes. In efforts to reduce the fuel intensity of an economy, this interplay between an activity's fuel intensity, like gallons per vehicle mile, and the activity level, vehicle miles travelled or transported, nicely illustrates some important empirical questions and public policy issues: i) the first best policy proposition to reduce fuel related externalities is fuel taxes. Indeed, at the right level of fuel taxes, the externalities are zero: they are internalized. ii) the part of an economy's ability to shed fuel consumption lies in increased fuel efficiency in the individual activities, and this part can be stimulated with fuel efficiency standards. The other part, the activity level, should then be addressed with fuel tax increases. iv) We speculate that it may be difficult credibly to raise expected fuel taxes more than

  11. How Strong Is Europeanisation, Really? The Danish Defence Administration and the Opt-Out from the European Security and Defence Policy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2011-01-01

    The article questions how strong Europeanisation is as an explanation of administrative changes in EU member states. Denmark has an opt-out from the European cooperation on defence, and, therefore, its defence administration represents a critical or a less likely case to test the Europeanisation...... thesis. The article shows that in spite of the opt-out, the administrative structures and the policy processes in the Ministry of Foreign Affairs (MFA) have adapted to the common foreign and security policy (CFSP) and the European security and defence policy (ESDP). Surprisingly, the administrative...... structures and the decision-making processes in the Ministry of Defence (MoD) have also adapted to the ESDP. The latter example emphasises the strength of top-down Europeanisation as a possible explanation of domestic administrative changes in member states. It is argued that Europeanisation per se...

  12. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  13. 41 CFR 301-75.3 - What governing policies and procedures must we establish related to pre-employment interview travel?

    Science.gov (United States)

    2010-07-01

    ... and procedures must we establish related to pre-employment interview travel? 301-75.3 Section 301-75.3... ALLOWANCES AGENCY RESPONSIBILITIES 75-PRE-EMPLOYMENT INTERVIEW TRAVEL General Rules § 301-75.3 What governing policies and procedures must we establish related to pre-employment interview travel? You must establish...

  14. Market principles in health care and social security policy in Japan.

    Science.gov (United States)

    Akiyama, Hiroshi

    2004-01-01

    Although health care in Japan is under the management of an obligatory insurance system, it is within the framework of a capitalist economy, and has helped achieve longevity during the post-war period. However, average lifetime has been improving in western European and Asian countries that have developed later. It has also been said that higher longevity is not necessarily due only to health care but also to the enhancement of environmental health achieved by economic improvements. On the other hand, the so-called 'development' led by capitalism and the market economy, and the luxuries that sometimes can be construed as uncultured, have caused unnecessary environmental destruction and disparities in wealth. Is it too cynical to think that the extended lifespan of the advanced countries has been achieved at the expense of the epidemics, refugee problems and wars which have resulted in a reduced lifespan in developing countries? It is said that capitalism is an economic ideology that includes many contradictions and is following a path of destruction. In addition, under the name of globalization, capitalism has continuously and rapidly caused vicious cycles of corruption, which are features commonly seen in today's world. It is still common that financial failures and threats are indirectly solved by initiating wars--a method completely inimical to health care. Along with environmental factors and the logic of this market doctrine, we have been trying to reform our financially-collapsed health care system. However, we cannot count on the 'durability' of any reform conducted without some awareness of our economic mistakes. It is often said that it is only because of the existence of the economy that we have health care. However, it is more realistic to say that stable health care and social security lead to a stable economy. Health care did not collapse. It was the market economy upon which health care depended that collapsed. Therefore, one must not consider that

  15. Informing National Food and Water Security Policy through Water Footprint Assessment: the Case of Iran

    Directory of Open Access Journals (Sweden)

    Fatemeh Karandish

    2017-10-01

    Full Text Available Iran’s focus on food self-sufficiency has led to an emphasis on increasing water volumes available for irrigation with little attention to water use efficiency, and no attention at all to the role of consumption and trade. To better understand the development of water consumption in relation to food production, consumption, and trade, we carried out the first comprehensive water footprint assessment (WFA for Iran, for the period 1980–2010, and estimated the water saving per province associated with interprovincial and international crop trade. Based on the AquaCrop model, we estimated the green and blue water footprint (WF related to both the production and consumption of 26 crops, per year and on a daily basis, for 30 provinces of Iran. We find that, in the period 1980–2010, crop production increased by 175%, the total WF of crop production by 122%, and the blue WF by 20%. The national population grew by 92%, and the crop consumption per capita by 20%, resulting in a 130% increase in total food consumption and a 110% increase in the total WF of national crop consumption. In 2010, 26% of the total water consumption in the semi-arid region served the production of crops for export to other regions within Iran (mainly cereals or abroad (mainly fruits and nuts. Iran’s interprovincial virtual water trade grew by a factor of 1.6, which was mainly due to increased interprovincial trade in cereals, nuts, and fruits. Current Iranian food and water policy could be enriched by reducing the WFs of crop production to certain benchmark levels per crop and climatic region and aligning cropping patterns to spatial differences in water availability and productivities, and by paying due attention to the increasing food consumption per capita in Iran.

  16. Prospective analysis of energy security: A practical life-cycle approach focused on renewable power generation and oriented towards policy-makers

    International Nuclear Information System (INIS)

    García-Gusano, Diego; Iribarren, Diego; Garraín, Daniel

    2017-01-01

    Highlights: • Formulation and application of the Renewable Energy Security Index (RESI). • Prospective analysis combining Energy Systems Modelling and Life Cycle Assessment. • Feasibility proven through two case studies of power generation in Spain and Norway. • Good coverage of key energy security aspects (availability, affordability, etc.). • Novel and easy-to-report index suitable for energy policy-making. - Abstract: Energy security is a wide-ranging term to encompass issues such as security of supply, reliability of infrastructures, affordability and environmental friendliness. This article develops a robust indicator – the Renewable Energy Security Index, RESI – to enrich the body of knowledge associated with the presence of renewable energy technologies within national electricity production mixes. RESI is built by combining environmental life cycle assessment and techno-economic energy systems modelling. Spain and Norway are used as illustrative case studies for the prospective analysis of power generation from an energy security standpoint. In the Spanish case, with a diversified electricity production mix and a growing presence of renewable technologies, RESI favourably “evolves” from 0.36 at present to 0.65 in 2050 in a business-as-usual scenario, reaching higher values in a highly-restricted CO_2 scenario. The Norwegian case study attains RESI values similar to 1 due to the leading role of renewable electricity (mainly hydropower) regarding both satisfaction of national demand and exportation of electricity surplus. A widespread use of RESI as a quantifiable energy security index of national power generation sectors is found to be feasible and practical for both analysts and energy policy-makers, covering a significant number of energy security aspects.

  17. When Procedural Legitimacy Equals Nothing: Civil Society and Foreign Trade Policy in Brazil and Mexico

    Directory of Open Access Journals (Sweden)

    Vinícius Rodrigues Vieira

    2016-01-01

    Full Text Available Abstract Non-state actors contribute with inputs to the elaboration of the national interest in trade negotiations, thus enhancing its legitimacy. Nevertheless, does the participation of those actors necessarily equal influence on the part of all segments of civil society on policymaking? To answer the question, I argue that procedural legitimacy should be evaluated not only in relation to the inputs society provides to the State, but should also consider whether officials actually analyse societal contributions in decision-making. I demonstrate the empirical application of the model based upon Brazil's experience in multilateral trade negotiations during the 2000s, using Mexico as a shadow case. I conclude that foreign trade policymaking can only be democratised if, in procedural legitimacy, the State attributes equal weight to contributions from all types of societal actors, including civil society organisations and organised social movements, which tend to have less material resources and power than interest groups such as business associations and labour unions.

  18. The “geotoxicology” of airborne particulate matter: implications for public health, public policy, and environmental security (Invited)

    Science.gov (United States)

    Plumlee, G. S.; Morman, S. A.

    2009-12-01

    substantial public health risk. PM is at the core of diverse policy issues related to air quality, public health, and environmental security, at scales from local to global. Interdisciplinary earth and health science investigations are crucial to the development of effective policy. For example, earth science input will be key for understanding and managing potential risks associated with living on or near asbestos-containing rocks. Particularly in dry climates, a better understanding of the roles of geogenic PM versus anthropogenic PM as triggers of disease is needed in the development of appropriate air quality regulations at local to regional scales; this issue will only increase in importance in the future as human inhabitation increases in some arid regions, and as arid regions expand or shift due to climate change or human-induced stresses. Over the last decade, it has been recognized that dusts can transport contaminants and pathogens between continents. Hence, human practices and policies that influence dust generation in one continent or country may ultimately have an impact on public health, policy, and environmental security in distant downwind countries.

  19. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  20. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  1. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  2. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  3. Notification: Follow-up Review of EPA’s Classification of National Security Information

    Science.gov (United States)

    Project #OPE-FY15-0057, July 20, 2015. The EPA OIG plans to begin preliminary research on the OARM actions taken to improve policies and procedures related to the classification of national security information.

  4. The Global Trends in the Alternative Energetics and Improvement of the State Policy in the Sphere of Fiscal Security: in Search for Equilibrium and Markets

    Directory of Open Access Journals (Sweden)

    Hnedina Kateryna V.

    2017-12-01

    Full Text Available Alternative energetics is an important component of the competitiveness and security of the national economy. Its rapid development over the past 10 years is caused by both the attempts of individual countries to maintain and strengthen their competitive advantage in the world markets and the efforts of international organizations (UN, IRENA, IEA to consolidate different stakeholders to achieve energy and fiscal security, protection of environment and improvement of climate conditions. The article is aimed at generalizing global trends in alternative energetics in the context of development of the State policy in the sphere of fiscal security. A brief overview of the latest trends in the alternative energetics development, most of which focus on identifying the basic sectoral trends, has been provided. However, the issues of fiscal security in the energy sector remain poorly researched, especially in terms of formation of the State policy, consolidating interests of different groups of stakeholders. It has been determined that in the developed countries a significant growth of alternative energetics is caused by the consistent State policy on creation of conditions for formation of effective branch markets and the solving of so-called energy trilemma.

  5. Securing Communal Land Rights to Achieve Sustainable Development in Sub-Saharan Africa: Critical Analysis and Policy Implications

    Directory of Open Access Journals (Sweden)

    Ross Andrew Clarke

    2009-09-01

    Full Text Available While the concept of sustainable development gains increasing traction under international law, effective and scalable policies to translate these principles into practice remain largely beyond reach. This article analyses one possible strategy in Sub-Saharan Africa - increasing security of communal tenure to improve resource management and achieve rural sustainable development. Although this approach has attracted some attention, particularly with management responsibility of communal property increasingly devolved to the community-level, the expected results in terms of more sustainable resource exploitation and sounder environmental management have yet to be realised. Through critical analysis, with particular emphasis on the Gestion Terroir approach in Burkina Faso , the article explores the reasons behind the limited success. The article suggests that greater emphasis must be placed on bridging statutory command-and-control regimes with community-based models. Focusing on the links between communal land tenure and environmental management, and effectively embedding community land management institutions within existing environmental governance structures offers a practical model to promote sustainable development.

  6. System security in the space flight operations center

    Science.gov (United States)

    Wagner, David A.

    1988-01-01

    The Space Flight Operations Center is a networked system of workstation-class computers that will provide ground support for NASA's next generation of deep-space missions. The author recounts the development of the SFOC system security policy and discusses the various management and technology issues involved. Particular attention is given to risk assessment, security plan development, security implications of design requirements, automatic safeguards, and procedural safeguards.

  7. Aspects regarding the implementation of information security standards in organizations

    Directory of Open Access Journals (Sweden)

    Mihai Bârsan

    2017-03-01

    Full Text Available Information security is one of the major challenges of the information and knowledge based society. The preoccupation of organizations to ensure the security of information in the digital environment has led to the emergence of specific standards in the field. Thus, ISO 27000 brings together reference standards in the field. Starting from ISO 27001, which summarizes policies and procedures on physical, legal and technological security risks, this paper looks at the steps the organization must undertake to implement the standards.

  8. Japan's Security Policies during OEF and OIF: Incremental Reactions Meet Great Expectations (Asia-Pacific Security Studies. Volume 2, Number 6, August 2003)

    National Research Council Canada - National Science Library

    Sato, Yoichiro

    2003-01-01

    .... The net importance of Japan's responses to OEF and OIF is that they reflect incremental progress toward an enhanced Japanese security role and serve as foundation blocks for future legislation...

  9. Increasing Internal Stakeholder Consensus about a University Science Center's Outreach Policies and Procedures

    Science.gov (United States)

    Fisher, Richard D.

    For decades the United States has tried to increase the number of students pursuing science, technology, engineering, and mathematics (STEM) education and careers. Educators and policy makers continue to seek strategies to increase the number of students in the STEM education pipeline. Public institutions of higher education are involved in this effort through education and public outreach (EPO) initiatives. Arizona State University opened its largest research facility, the new Interdisciplinary Science and Technology Building IV (ISTB4) in September, 2012. As the new home of the School of Earth & Space Exploration (SESE), ISTB4 was designed to serve the school's dedication to K-12 education and public outreach. This dissertation presents a menu of ideas for revamping the EPO program for SESE. Utilizing the Delphi method, I was able to clarify which ideas would be most supported, and those that would not, by a variety of important SESE stakeholders. The study revealed that consensus exists in areas related to staffing and expansion of free programming, whereas less consensus exist in the areas of fee-based programs. The following most promising ideas for improving the SESE's EPO effort were identified and will be presented to SESE's incoming director in July, 2013: (a) hire a full-time director, theater manager, and program coordinator; (b) establish a service-learning requirement obligating undergraduate SESE majors to serve as docent support for outreach programs; (c) obligate all EPO operations to advise, assist, and contribute to the development of curricula, activities, and exhibits; (d) perform a market and cost analysis of other informational education venues offering similar programming; (3) establish a schedule of fee-based planetarium and film offerings; and (f) create an ISTB4 centric, fee-based package of programs specifically correlated to K12 education standards that can be delivered as a fieldtrip experience.

  10. Management of information security risks in a federal public institution: a case study

    Directory of Open Access Journals (Sweden)

    Jackson Gomes Soares Souza

    2016-11-01

    Full Text Available Public institutions bound to the Brazilian federal public sector must apply security measures, policies, procedures and guidelines as information assets protection measures. This case study sought to determine whether the management of information security risks is applied in a federal public institution according to Information Technology (I.T. managers perceptions and the results expose the importance of the roles played by people, responsibilities, policies, standards, procedures and their implementation aiming greater control of information security risks and opportunities related to information technology security.

  11. 12 CFR 551.150 - How do my officers and employees file reports of personal securities trading transactions?

    Science.gov (United States)

    2010-01-01

    ... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d) must...

  12. [Changes in workers' rehabilitation procedures under the Brazilian social security system: modernization or undermining of social protection?].

    Science.gov (United States)

    Takahashi, Mara Alice Batista Conti; Iguti, Aparecida Mari

    2008-11-01

    This article describes the changes in workers' rehabilitation practices under the Brazilian National Social Security Institute (INSS) in the 1990s, in the context of neoliberal economic adjustment measures, based on an analysis of INSS documents from 1992 to 1997. The INSS plan for "modernization" of workers' rehabilitation led to: (1) dismantling of multidisciplinary teams; (2) induction of workers to accept proportional retirement pensions and voluntary layoffs; (3) under-utilization of the remaining INSS professional staff; (4) elimination of treatment programs for workers' rehabilitation; and (5) dismantling of INSS rehabilitation centers and clinics. The changes in the Brazilian social security system undermined the county's social security project and hegemony and reduced social security reform to a mere management and fiscal issue. Current "rehabilitation" falls far short of the institution's original purpose of social protection for workers, while aiming at economic regulation of the system to contain costs of workers' benefits. Workers that suffer work-related accidents are denied occupational rehabilitation, which aggravates their social disadvantage when they return to work.

  13. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  14. On the risk to low doses (<100 mSv) of ionizing radiation during medical imaging procedures - IOMP policy statement

    International Nuclear Information System (INIS)

    Pradhan, A.S.

    2013-01-01

    The science committee of International Organization for Medical Physics (IOMP) developed a policy statement on the predictions of radiation-induced cancers and cancer deaths in patients exposed to low doses (<100 mSv) of ionizing radiation during medical imaging; this statement has been approved by the IOMP council. In order to attract the attention of medical physicists, an editorial (1) titled 'Risk of Medical Imaging' that includes the said statement has recently been published in Medical Physics journal of American Association of Physicists in Medicine (AAPM). As stated, IOMP represents 80 national and 6 regional medical physics organizations and 18,000 medical physicists worldwide. The IOMP affiliated bodies/organizations in different countries (such as Association of Medical Physicists of India, AMPI) have been encouraged to reproduce the IOMP statement in their journals/newsletters for the benefit of larger community of medical physicists. The IOMP statement is reproduced below (readers may also go through the supportive literature listed in references). It is hoped that this policy statement will have some deterrent influence on the continued propagation of unproven risk related to medical imaging procedures conducted with small doses.

  15. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  16. Influence of new customs procedures and logistic security standards on companies competiveness – a Croatian company case study

    Directory of Open Access Journals (Sweden)

    Aleksandar Erceg

    2014-12-01

    Full Text Available In today’s global market, companies are constantly confronted with the competition on the local, national and international level. Companies therefore use a variety of strategies and tools to become and/or remain competitive. Potential areas for cost reduction in companies are supply chain management and logistic and customs procedures. Implementation of various logistic standards in supply chain management can provide significant cost savings for the company’s daily operations and thus reduce overall costs and improve the competitiveness. Using different customs procedures and logistic standards to reduce their costs and become more competitive in the market is necessary for Croatian companies. The method of using these tools is not a one-time process and requires constant efforts. Companies therefore have to be ready to improve daily to be and remain competitive. Using a variety of modern customs procedures can save their money and time, not only through these procedures, but also through better use of their employee’s time, their own vehicles and other equipment. The paper analyzes various customs procedures and logistic standards that can help companies save time and money and improve their competitiveness. In the example of Croatian company, which uses various available procedures and standards the benefits of their use are shown. Apart from bringing savings in operations, all these procedures and standards allow the company to be better, cheaper and more attractive to buyers.

  17. 7 CFR 1737.41 - Procedure for obtaining approval.

    Science.gov (United States)

    2010-01-01

    ... RUS financing. (3) The proposed interim financing presents unacceptable loan security risks to RUS, or..., DEPARTMENT OF AGRICULTURE PRE-LOAN POLICIES AND PROCEDURES COMMON TO INSURED AND GUARANTEED TELECOMMUNICATIONS LOANS Interim Financing of Construction of Telephone Facilities § 1737.41 Procedure for obtaining...

  18. Algorithm and Indicators of Evaluation of Agrarian Policy Efficiency in the Sphere of Food Security of the Region

    Directory of Open Access Journals (Sweden)

    Elena Nikolaevna Antamoshkina

    2015-12-01

    Full Text Available The article substantiates the author’s method of analysis of the regional food security and its approbation on the example of the Southern Federal District. The author’s goal was to develop a comprehensive universal method of analysis of the regional food security. To achieve this goal the following steps were required: to develop a system of indicators to measure food security at the regional level; to define criteria for assessing regional food security; to synthesize model analysis and evaluation of food security in the region. The paper presents an algorithm for the phased application of methodology for assessing regional food security. The recommended indicators and criteria for assessing regional food security are consistent with the parameters defined by the Doctrine of food security in Russia, and take into account the requirements of the WTO. The proposed method was tested on data from the largest regions of the Southern Federal District, which allowed a comparison of the level of food security in the regions of the spatial and temporal perspective. Comparison was made on the basis of an integrated assessment of the level of food security in the regions. The theoretical significance consists in the meaningful complement to research models and tools for analysis of food security at the regional level of the economy in terms of justification of indicators and criteria for assessing food security in the region in terms of Russia’s participation in the WTO. The practical significance is in developing and testing the proposed method based on an assessment of indicators of food security in SFD.

  19. The EU as black widow; Devouring the WEU to give birth to a European Security and Defence Policy

    NARCIS (Netherlands)

    Wessel, Ramses A.; Kronenberger, Vincent

    2001-01-01

    The Treaty of Nice will finally turn the European Union into a security and defence organisation. Alongside its tasks in all other areas the Union will be given the competence to strengthen its contribution to the maintenance of international peace and security in accordance with the UN Charter.

  20. Flexibility and security: an asymmetrical relationship? The uncertain relevance of flexicurity policies for segmented labour markets and residual welfare regimes

    NARCIS (Netherlands)

    Mouriki, A.

    2009-01-01

    Against a background of growing international competition and of pervasive uncertainty and fluidity, flexicurity policies are being actively promoted in the EU policy agenda as a useful policy tool to address the needs of business to respond to rapid changes, while providing workers with a safety