WorldWideScience

Sample records for security policy enforcement

  1. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2006-01-01

    .... but provides the strong security guarantees of modern languages such as Java. A second avenue of language-based work explored a general class of policy enforcement mechanism based on in-line reference monitors (IRM...

  2. Towards a Secure Application-Aware Policy Enforcement Architecture

    NARCIS (Netherlands)

    Krishnan Nair, S.; Crispo, B.; Tanenbaum, A.S.

    2006-01-01

    Even though policy enforcement has been studied from different angles including notation, negotiation and enforcement, the development of an application-semantic aware enforcement architecture remains an open problem. In this paper we present and discuss the design of such an architecture.

  3. Obligations to enforce prohibitions: on the adequacy of security policies

    NARCIS (Netherlands)

    Pieters, Wolter; Padget, Julian; Dechesne, Francien; Dignum, Virginia; Aldewereld, Huib

    2013-01-01

    Security policies in organisations typically take the form of obligations for the employees. However, it is often unclear what the purpose of such obligations is, and how these can be integrated in the operational processes of the organisation. This can result in policies that may be either too

  4. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    Science.gov (United States)

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  5. The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    Directory of Open Access Journals (Sweden)

    Jeroen Ooms

    2013-11-01

    Full Text Available The increasing availability of cloud computing and scientific super computers brings great potential for making R accessible through public or shared resources. This allows us to efficiently run code requiring lots of cycles and memory, or embed R functionality into, e.g., systems and web services. However some important security concerns need to be addressed before this can be put in production. The prime use case in the design of R has always been a single statistician running R on the local machine through the interactive console. Therefore the execution environment of R is entirely unrestricted, which could result in malicious behavior or excessive use of hardware resources in a shared environment. Properly securing an R process turns out to be a complex problem. We describe various approaches and illustrate potential issues using some of our personal experiences in hosting public web services. Finally we introduce the RAppArmor package: a Linux based reference implementation for dynamic sandboxing in R on the level of the operating system.

  6. Analyzing Security-Enhanced Linux Policy Specifications

    National Research Council Canada - National Science Library

    Archer, Myla

    2003-01-01

    NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for security policies and a Flask-like architecture with a security server for enforcing policies defined in the language...

  7. 16 CFR 1602.1 - Enforcement policy.

    Science.gov (United States)

    2010-01-01

    ... Enforcement Policy” published as a notice in the Federal Register of November 10, 1971 (36 FR 21544), as... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Enforcement policy. 1602.1 Section 1602.1... POLICY OR INTERPRETATION § 1602.1 Enforcement policy. (a) On May 14, 1973, the responsibilities of the...

  8. 29 CFR 786.250 - Enforcement policy.

    Science.gov (United States)

    2010-07-01

    ... POLICY OR INTERPRETATION NOT DIRECTLY RELATED TO REGULATIONS MISCELLANEOUS EXEMPTIONS Newspaper Publishing § 786.250 Enforcement policy. The exemption provided by paragraph 13(a)(8) of the Fair Labor... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement policy. 786.250 Section 786.250 Labor...

  9. On Using Encryption Techniques to Enhance Sticky Policies Enforcement

    NARCIS (Netherlands)

    Tang, Qiang

    2008-01-01

    How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts. The sticky policy paradigm, proposed by Karjoth, Schunter, and Waidner, provides very

  10. 45 CFR 30.23 - Enforcement policy.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Enforcement policy. 30.23 Section 30.23 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CLAIMS COLLECTION Debt Compromise § 30.23 Enforcement policy. The Secretary may compromise statutory penalties, forfeitures, or claims...

  11. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  12. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  13. 3PAC: Enforcing Access Policies for Web Services

    NARCIS (Netherlands)

    van Bemmel, J.; Wegdam, M.; Lagerberg, K.

    Web Services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security. In particular, the enforcement of access policies in a Service Oriented Architecture is not addressed adequately. We

  14. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to whole spectrum of ICT users and Providers including home users; small, medium & large organisations, Government and Academia. Strategies: ...

  15. Expressing Security Policies for Distributed Objects Applications

    NARCIS (Netherlands)

    Popescu, B.C.; Crispo, B.; Tanenbaum, A.S.; Zeeman, M.

    2003-01-01

    In this paper we describe the design and implementation of a policy engine for enforcing security policies for distributed object applications. We show how our design can be integrated as part of the Globe [11] system - a middleware for supporting wide-area replicated objects. While extensive work

  16. European Cyber Security Policy

    OpenAIRE

    Bendiek, Annegret

    2012-01-01

    The gradually developing European cyber security policy tries to establish minimum standards in all EU member states with regard to prevention, resilience and international cooperation. It aims to foster national security without compromising democratic principles or unduly limiting individual liberties. However, it is hard to find a balance between these goals, and the EU’s measures thus inevitably raise questions about the democratic implications of European cyber security policy. Are the i...

  17. Working together: public law enforcement and private security.

    Science.gov (United States)

    Jones, Harold T

    2010-01-01

    Private security forces, including hospital security professionals, provide a vast largely untapped resource for public law enforcement in a number of critical areas affecting society, the author points out. At the same time, police agencies in some communities have programs which can be used to provide additional training for private security officers.

  18. REGULATION AND ENFORCEMENT OF COMPETITION POLICY

    Directory of Open Access Journals (Sweden)

    Liviana Andreea Niminet

    2014-12-01

    Full Text Available Competition policy starts by shaping a legislative framework. This is aimed to establish boundaries for conducting competition and also sets limits of licit and illicit demarcation, for competitive and anticompetitive practices. The Romanian Competition Law has a divalent approach and it aims to provide specific behavioral conditions in order to stimulate and protect free-market competition, with the ultimate goal of developing a balanced, efficient and competitive economy. Our country’s Competition policy is based on punishing the behavior. There are three such types of anti-competitive behavior, namely: agreements between undertakings, abuse of dominant position and mergers and other concentrations between undertakings. Recent Practice proved that this “enforcement-conduct-punishment” structure is not necessary the best way to address competition and it is high time for authorities to switch both regulation and enforcement of competition from the “classical perspective” towards concepts like “competition advocacy” and “soft power” and give competition policy a new, reshaped face.

  19. Security and Criminal Policy

    Directory of Open Access Journals (Sweden)

    Andrejs Vilks

    2016-03-01

    Full Text Available The current period of the public evolution can be identified as one of the global (economic, financial, political, social, legal and moral periods of crisis. In worsened crisis conditions the level of crimes remains at such a level when it is hard to control them by means of law enforcement authority – capacity of institution resources and workload exceeds its limits. Great role in combating of crimes is attributed to prevention. To a certain extent, the goals of state criminal law policy are not only to punish, but to restore the possible truth as well, to prevent the society, to resocialize and prevent the people from committing of crimes. The investments into people’s educational policy is incomparably more important than capturing of the offenders, their punishment and execution of the sentence. When working out crime prevention measures in criminal law police, one should use also foreign experience and the latest technologies. We perceive criminal law policy as the state activity in provision of legal order in individual’s protection from crimes, violation of the rights, and implementation of the law enforcement.

  20. NRC Enforcement Policy Review, July 1995-July 1997

    Energy Technology Data Exchange (ETDEWEB)

    Lieberman, J.; Pedersen, R.M.

    1998-04-01

    On June 30, 1995, the Nuclear Regulatory Commission (NRC) issued a complete revision of its General Statement of Policy and Procedure for Enforcement Action (Enforcement Policy) (60 FR 34381). In approving the 1995 revision to the Enforcement Policy, the Commission directed the staff to perform a review of its implementation of the Policy after approximately 2 years of experience and to consider public comments. This report represents the results of that review.

  1. [How to establish the hospital information system security policies].

    Science.gov (United States)

    Gong, Qing-Yue; Shi, Cheng

    2008-03-01

    It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.

  2. Enforcing Conformance between Security Architecture and Implementation

    Science.gov (United States)

    2009-04-01

    Data Flow Diagrams ( DFDs ) with security-specific annotations to describe how data enters, leaves and traverses the system by showing data sources and...code. 4.1.1 Gather available documentation We studied the available architectural documentation, which consisted of various Data Flow Diagrams ( DFDs ...architecture We designed a target architecture using Acme. We based this architecture largely on the available DFDs (Section 4.1.1). We represented

  3. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    with static program analysis techniques. The former technique can separate security concerns out of the main logic, and thus improves system modularity. The latter can analyze the system behavior, and thus helps detect software bugs or potential malicious code. We present AspectKE, an aspect......-oriented extensions based on KLAIM, followed by a discussion of open joinpoints that commonly exist in coordination languages such as KLAIM. Based on the idea of AspectKE, we design and implement a proof-of-concept programming language AspectKE*, which enables programmers to easily specify analysis-based security......Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases...

  4. 77 FR 33786 - NRC Enforcement Policy Revision

    Science.gov (United States)

    2012-06-07

    ... in the NRC Library at http://www.nrc.gov/reading-rm/adams.html . To begin the search, select ``ADAMS... coordinate with the Office of Enforcement before applying this lower risk significance concept for violations...

  5. Internal Security Cooperation under Functional Expectations: Initial Law Enforcement Europeanization - Case of Finland and Estonia

    Directory of Open Access Journals (Sweden)

    Ramon Loik

    2016-03-01

    Full Text Available Law enforcement cooperation as a central part of the EU internal security policy to combat cross-border organised crime and terrorism needs to be more effective by adopting specific provisions and tools. This paper argues that functional expectations require removal of barriers and construction of a common security area, but sometimes better cooperation in practice does not fit, as Europeanization of law enforcement still lacks understanding of objectives, values and principles for improving international trust, consensus, sincere cooperation and effective national coordination. The level of Europeanization of law enforcement could be evaluated as based on the level of implementation of the EU provisions on police cooperation related to practical enforcement, factors promoting or hindering law enforcement and changes in discursive practices due to EU provisions and professional socialisation processes. Some aspects of observed inertia characterizes the slow process of transition or tendencies for absorption in which resilience meets the necessary degree of flexibility allowing for some mutual learning and cooperation, but the result is expectedly a form of accommodation of needful policy requirements in the lack of substantial change perspective.

  6. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  7. 8 CFR 1003.47 - Identity, law enforcement, or security investigations or examinations relating to applications...

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Identity, law enforcement, or security... Procedure § 1003.47 Identity, law enforcement, or security investigations or examinations relating to... removal that is subject to the conduct of identity, law enforcement, or security investigations or...

  8. Constitutional Basis for the Enforcement of ''Executive'' Policies that ...

    African Journals Online (AJOL)

    The aim of this article is to critically reflect on the status and possible constitutional basis for the enforceability of "executive" policies that give effect to socio-economic rights in South Africa. Based on the jurisprudence of courts and some examples of "executive" policies, this article demonstrates that the constitutional basis ...

  9. Cyber security policy guidebook

    CERN Document Server

    Bayuk, nifer L; Rohmeyer, l; Sachs, cus; Schmidt, frey; Weiss, eph

    2012-01-01

    This book is a taxonomy and thesaurus of current cybersecurity policy issues, including a thorough description of each issue and a corresponding list of pros and cons with respect to identified stances on each issue. It documents policy alternatives for the sake of clarity with respect to policy alone, and dives into organizational implementation issues. Without using technical jargon, the book emphasizes the importance of critical and analytical thinking when making policy decisions.  It also equips the reader with descriptions of the impact of specific policy ch

  10. An Optimal Anti-Drug Law Enforcement Policy

    OpenAIRE

    Sylvaine Poret

    2005-01-01

    This paper presents a model of an optimal anti-drug law enforcement policy,whose objective is the reduction of drug-related social cost, including the net costof law enforcement, the social harm, and the surplus of agents. We consider avertically organized distribution system with two levels: traffickers and retailers.The two questions are which type of sellers authorities must pursue, traffickers orretailers, and which sanction a seller has to pay in case of arrest. The optimal levelof fine ...

  11. Policy Pathways: Monitoring, Verification and Enforcement

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA estimates that, if implemented globally without delay, the 25 IEA Energy Efficiency recommendations could save 8.2 Gt CO2 per year by 2030. Yet many governments struggle with their implementation and thus miss a great part of the energy efficiency potential. The new IEA series Policy Pathways: Showing the way to energy efficiency implementation now aims to assist countries with improving energy efficiency policies. It features practical 'how-to' guides for designing, implementing and evaluating energy efficiency policies and achieving greater improvement.

  12. Perceived enforcement of school tobacco policy and adolescents' cigarette smoking.

    Science.gov (United States)

    Lipperman-Kreda, Sharon; Paschall, Mallie J; Grube, Joel W

    2009-06-01

    School tobacco use policies are part of a comprehensive strategy for preventing or reducing adolescent cigarette smoking. This study examines the relationship between perceived tobacco policy enforcement at the school level and smoking behaviors among students. 21,281 middle and high school students of 255 schools participated in the 2006 Oregon Health Teens Survey. Multilevel logistic regression was conducted, using a school-level policy enforcement measure based on aggregated student reports, and individual-level characteristics (e.g., age, gender, cigarette smoking before age 12, personal beliefs about smoking) as predictors of past-30-day cigarette smoking behaviors (e.g., any smoking, daily smoking, heavy episodic smoking, smoking on school property). Higher levels of perceived enforcement of anti-smoking policy at the school level were inversely associated with the prevalence of past-30-day smoking behaviors, independent of individual-level predictors. Stricter enforcement of school policies against tobacco use may help prevent or reduce adolescents' cigarette smoking on and outside of school property.

  13. 16 CFR 1616.61 - Enforcement policy.

    Science.gov (United States)

    2010-01-01

    ... FLAMMABILITY OF CHILDREN'S SLEEPWEAR: SIZES 7 THROUGH 14 (FF 5-74) Interpretations and Policies § 1616.61...'s sleepwear in sizes 7 through 14 (including garments and fabric or related material intended or promoted for use in such children's sleepwear) are subject to the Standard FF 5-74 (subpart A of this part...

  14. 41 CFR 50-210.0 - General enforcement policy.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true General enforcement policy. 50-210.0 Section 50-210.0 Public Contracts and Property Management Other Provisions Relating to... for strict compliance with the provisions thereof and the regulations issued pursuant thereto. (c) Any...

  15. 20 CFR 638.805 - Security and law enforcement.

    Science.gov (United States)

    2010-04-01

    ... jurisdiction with the appropriate State and locality with respect to criminal law enforcement as long as a... jurisdiction establish agreements with federal, State and local law enforcement agencies to enforce criminal... right-to-privacy laws. ...

  16. US-Africa Security Policy

    DEFF Research Database (Denmark)

    Møller, Nicolai Stahlfest

    This paper will discuss the United States security policy towards Africa based on the National Security Strategy from 2006 and the founding of US Africa Command, the new military combatant command that is supposed to unify US military efforts on the African continent. The paper will discuss whether...... AFRICOM and US actions in Africa could be seen as a true (newfound) American interest in Africa or whether actions that are considered low-key and low-budget in Washington are to be regarded as a true asymmetry because African states regard US action as important and significant. The paper will explain...... the US role in Africa using geopolitical theories derived from Zbigniew Brzezinski, Mahan and Thomas P.M. Barnett. The paper will explore the possible roles of AFRICOM as instrument of US foreign policy and the implications thereof for Danish policy on the African continent....

  17. 10 CFR Appendix A to Part 820 - General Statement of Enforcement Policy

    Science.gov (United States)

    2010-01-01

    ... Appendix A to Part 820—General Statement of Enforcement Policy I. Introduction (a) This policy statement... be shared with all appropriate DOE contractors. b. Pursuant to this enforcement philosophy, DOE will...

  18. Alcohol policy enforcement and changes in student drinking rates in a statewide public college system: a follow-up study

    Directory of Open Access Journals (Sweden)

    Harris Sion K

    2010-08-01

    Full Text Available Abstract Background Heavy alcohol use among U.S. college students is a major contributor to young adult morbidity and mortality. The aim of this study was to examine whether college alcohol policy enforcement levels predict changes in student drinking and related behaviors in a state system of public colleges and universities, following a system-wide change to a stricter policy. Methods Students and administrators at 11 Massachusetts public colleges/universities completed surveys in 1999 (N of students = 1252, one year after the policy change, and again in 2001 (N = 1074. We calculated policy enforcement scores for each school based on the reports of deans of students, campus security chiefs, and students, and examined the correlations between perceived enforcement levels and the change in student drinking rates over the subsequent two year period, after weighting the 2001 data to adjust for demographic changes in the student body. Results Overall rates of any past-30-days drinking, heavy episodic drinking, and usual heavy drinking among past-30-days drinkers were all lower in 2001 compared to 1999. School-level analyses (N = 11 found deans' baseline reports of stricter enforcement were strongly correlated with subsequent declines in heavy episodic drinking (Pearson's r = -0.73, p = 0.011. Moreover, consistently high enforcement levels across time, as reported by deans, were associated with greater declines in heavy episodic drinking. Such relationships were not found for students' and security chiefs' reports of enforcement. Marijuana use did not rise during this period of decline in heavy drinking. Conclusions Study findings suggest that stronger enforcement of a stricter alcohol policy may be associated with reductions in student heavy drinking rates over time. An aggressive enforcement stance by deans may be an important element of an effective college alcohol policy.

  19. Formal Verification of Security Policy Implementations in Enterprise Networks

    Science.gov (United States)

    Bera, P.; Ghosh, S. K.; Dasgupta, Pallab

    In enterprise networks, the management of security policies and their configurations becoming increasingly difficult due to complex security constraints of the organizations. In such networks, the overall organizational security policy (global policy) is defined as a collection of rules for providing service accesses between various network zones. Often, the specification of the global policy is incomplete; where all possible service access paths may not be covered explicitly by the "permit" and "deny" rules. This policy is implemented in a distributed manner through appropriate sets of access control rules (ACL rules) in the network interfaces. However, the implementation must be complete i.e., all service access paths across the network must be implemented as "permit" and "deny" ACL rules. In that case, the unspecified access paths in a given policy must be implemented as either "permit" or "deny" rules; hence there may exist multiple ACL implementations corresponding to that policy. Formally verifying that the ACL rules distributed across the network interfaces guarantees proper enforcement of the global security policy is an important requirement and a major technical challenge. The complexity of the problem is compounded by the fact that some combination of network services may lead to inconsistent hidden access paths in the network. The ACL implementations ignoring these hidden access paths may result in violation of one or more policy rules implicitly. This paper presents a formal verification framework for analyzing security policy implementations in enterprise networks. It stems from boolean modeling of the network topology, network services and security policy where the unspecified access paths are modeled as "don't-care" rules. The framework formally models the hidden access rules and incorporates them in the distributed ACL implementations for extracting a security implementation model, and finally formulates a QSAT (satisfiability of quantified boolean

  20. Security Policy Alignment: A Formal Approach

    NARCIS (Netherlands)

    Pieters, Wolter; Dimkov, T.; Pavlovic, Dusko

    2013-01-01

    Security policy alignment concerns the matching of security policies specified at different levels in socio-technical systems, and delegated to different agents, technical and human. For example, the policy that sales data should not leave an organization is refined into policies on door locks,

  1. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development....

  2. 30 CFR 843.25 - Energy Policy Act enforcement in States with approved State programs.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Energy Policy Act enforcement in States with approved State programs. 843.25 Section 843.25 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... ENFORCEMENT § 843.25 Energy Policy Act enforcement in States with approved State programs. (a) State-by-State...

  3. 10 CFR Appendix A to Part 824 - General Statement of Enforcement Policy

    Science.gov (United States)

    2010-01-01

    ... Enforcement Policy Link to an amendment published at 74 FR 66033, Dec. 14, 2009. I. Introduction a. This... enforcement philosophy, DOE will provide substantial incentive for the early self-identification, reporting...

  4. Enforcing Hardware-Assisted Integrity for Secure Transactions from Commodity Operating Systems

    Science.gov (United States)

    2015-08-17

    14-Jan-2011 13-Jul-2011 Approved for Public Release; Distribution Unlimited Final Report: Enforcing Hardware -Assisted Integrity for Secure...AND ADDRESS (ES) U.S. Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 Tailor Trusted Spaces, Hardware -Assisted...published in non peer-reviewed journals: Final Report: Enforcing Hardware -Assisted Integrity for Secure Transactions from Commodity Operating Systems

  5. 77 FR 71008 - Guidance for Industry: Enforcement Policy Concerning Rotational Warning Plans for Smokeless...

    Science.gov (United States)

    2012-11-28

    ... brand of smokeless tobacco product ``in accordance with a plan submitted by the tobacco product... announced the availability of a guidance entitled ``Enforcement Policy Concerning Rotational Warning Plans...

  6. Governmental Control of the Internet in addressing Law Enforcement and National Security

    Science.gov (United States)

    Watney, Murdoch

    Some people contended that governmental regulation of the Internet would not be possible due to its inherent characteristics. This paper relates how governments, in addressing law enforcement and national security, have taken control of the Internet by means of legislation. Consideration is given to the influence and impact of powerful governments on the legal regulation of the Internet. It is pointed out that when addressing law enforcement and national security the borderless nature of the Internet is in reality bordered. It is concluded that in striving towards law enforcement and national security, enforcement of governmental control of the Internet is not easily achieved without the assistance of the Internet Service Provider (ISP) as well as international assistance and co-operation.

  7. TB anywhere is TB everywhere: the intersection of U.S. immigration enforcement policy and TB

    OpenAIRE

    Little, Reed David

    2016-01-01

    Approved for public release; distribution is unlimited Tuberculosis (TB) is a significant health issue to both the general public and the officers who enforce our nation's immigration laws. Current immigration enforcement policies increase the likelihood that immigration officers will encounter people with TB. Should the United States alter its immigration enforcement policies to address more directly the threat that tuberculosis poses to public health? This thesis reviews this question th...

  8. 29 CFR 786.200 - Enforcement policy concerning performance of nonexempt work.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement policy concerning performance of nonexempt work... MISCELLANEOUS EXEMPTIONS Taxicab Operators § 786.200 Enforcement policy concerning performance of nonexempt work... Standards Act will be deemed applicable even though some nonexempt work (that is, work of a nature other...

  9. 29 CFR 786.1 - Enforcement policy concerning performance of nonexempt work.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement policy concerning performance of nonexempt work... MISCELLANEOUS EXEMPTIONS Carriers by Air § 786.1 Enforcement policy concerning performance of nonexempt work... Standards Act of 1938, as amended, will be deemed applicable even though some nonexempt work (that is, work...

  10. 29 CFR 786.100 - Enforcement policy concerning performance of nonexempt work.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement policy concerning performance of nonexempt work... MISCELLANEOUS EXEMPTIONS Switchboard Operator Exemption § 786.100 Enforcement policy concerning performance of nonexempt work. The Division has taken the position that the exemption provided by section 13(a)(10) of the...

  11. Leveraging State And Local Law Enforcement Maritime Homeland Security Practices

    Science.gov (United States)

    2016-03-01

    efforts, and state government role in maritime homeland security. The resounding and underlying theme of the best practices cited by these port...security. The resounding and underlying theme of the best practices cited by these port areas is centered on collaborative efforts across federal...hope to reveal the important, smart , or best practices that these state and local agencies have implemented to develop maritime homeland security

  12. 78 FR 5122 - NASA Security and Protective Services Enforcement

    Science.gov (United States)

    2013-01-24

    ... SPACE ADMINISTRATION 14 CFR Parts 1203a, 1203b, and 1204 RIN 2700-AD89 NASA Security and Protective.... SUMMARY: This direct final rule makes nonsubstantive changes to NASA regulations to clarify the procedures... powers and authority of NASA security force personnel are also updated and clarified to include the...

  13. The impact of local immigration enforcement policies on the health of immigrant hispanics/latinos in the United States.

    Science.gov (United States)

    Rhodes, Scott D; Mann, Lilli; Simán, Florence M; Song, Eunyoung; Alonzo, Jorge; Downs, Mario; Lawlor, Emma; Martinez, Omar; Sun, Christina J; O'Brien, Mary Claire; Reboussin, Beth A; Hall, Mark A

    2015-02-01

    We sought to understand how local immigration enforcement policies affect the utilization of health services among immigrant Hispanics/Latinos in North Carolina. In 2012, we analyzed vital records data to determine whether local implementation of section 287(g) of the Immigration and Nationality Act and the Secure Communities program, which authorizes local law enforcement agencies to enforce federal immigration laws, affected the prenatal care utilization of Hispanics/Latinas. We also conducted 6 focus groups and 17 interviews with Hispanic/Latino persons across North Carolina to explore the impact of immigration policies on their utilization of health services. We found no significant differences in utilization of prenatal care before and after implementation of section 287(g), but we did find that, in individual-level analysis, Hispanic/Latina mothers sought prenatal care later and had inadequate care when compared with non-Hispanic/Latina mothers. Participants reported profound mistrust of health services, avoiding health services, and sacrificing their health and the health of their family members. Fear of immigration enforcement policies is generalized across counties. Interventions are needed to increase immigrant Hispanics/Latinos' understanding of their rights and eligibility to utilize health services. Policy-level initiatives are also needed (e.g., driver's licenses) to help undocumented persons access and utilize these services.

  14. Information security policy development for compliance

    CERN Document Server

    Williams, Barry L

    2013-01-01

    Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control. Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, the book will he

  15. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implemented a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.

  16. Enforcement of opacity security properties for ship information system

    Directory of Open Access Journals (Sweden)

    Bowen Xing

    2016-09-01

    Full Text Available In this paper, we consider the cybersecurity issue of ship information system (SIS from a new perspective which is called opacity. For a SIS, its confidential information (named as “secret” may be leaked through the working behaviors of each Distributed Control Unit (DCU from an outside observer called an “intruder” which is able to determine ship's mission state by detecting the source of each data flow from the corresponding DCUs in SIS. Therefore we proposed a dual layer mechanism to enforce opacity by activating non-essential DCU during secret mission. This mechanism is calculated by two types of insertion functions: Safety-assured insertion function (fIS and Admissibility-assured insertion function (fIA. Due to different objectives, fIS is designed to confuse intruder by constructing a non-secret behaviors from a unsafe one, and the division of fIA is to polish the modified output behaviors back to normal. We define the property of “I2–Enforceability” that dual layer insertion functions has the ability to enforce opacity. By a given mission map of SIS and the marked secret missions, we propose an algorithm to select fIS and compute its matchable fIA and then the DCUs which should be activated to release non-essential data flow in each step is calculable.

  17. Towards Parliamentarization of Foreign and Security Policy?

    NARCIS (Netherlands)

    Wagner, W.M.; Raunio, T.

    2017-01-01

    It is customary to argue that foreign policy is very much dominated by the executive, with parliaments wielding limited influence. However, with the exception of the US Congress, legislative‒executive relations in the realm of foreign and security policy have attracted remarkably little scholarly

  18. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  19. 78 FR 7798 - Privacy Act of 1974; Department of Homeland Security U.S. Immigration and Customs Enforcement-010...

    Science.gov (United States)

    2013-02-04

    .... Immigration and Customs Enforcement--010 Confidential and Other Sources of Information System of Records... general questions, please contact: Lyn Rahilly, Privacy Officer, Immigration and Customs Enforcement, (202... Congress. System of Records Department of Homeland Security (DHS)/U.S. Immigration and Customs Enforcement...

  20. The European Security and Defence Policy

    DEFF Research Database (Denmark)

    Adler-Nissen, Rebecca

    2009-01-01

    The European Security and Defence Policy (ESDP), which is the operational military and civilian dimension of the Common Foreign and Security Policy (CFSP), is today one of the most dynamic areas of the European Union. However, it is only recently that the EU has acquired explicit military decision....... The Union is thus gradually emerging as an important player on the international scene, with a strategic vision, as well as diplomatic, civilian and military crisis-management instruments that complement the existing economic, commercial, humanitarian and development policies on which the EU has hitherto...... built its reputation as a ‘soft power'. Despite its rapid development, many still regard the EU as weak and ineffi cient when it comes to security and defence policy. Moreover, the EU struggles with internal divisions and has a strained relationship with NATO. Nonetheless, there are good reasons...

  1. 16 CFR 1020.5 - What is the Small Business Enforcement Policy?

    Science.gov (United States)

    2010-01-01

    .... (5) The small business failed to make a good faith effort to comply with the law. (6) The small... 16 Commercial Practices 2 2010-01-01 2010-01-01 false What is the Small Business Enforcement... BUSINESS § 1020.5 What is the Small Business Enforcement Policy? (a) When appropriate, the Commission will...

  2. Energy security and climate policy. Assessing interactions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-03-28

    World energy demand is surging. Oil, coal and natural gas still meet most global energy needs, creating serious implications for the environment. One result is that CO2 emissions, the principal cause of global warming, are rising. This new study underlines the close link between efforts to ensure energy security and those to mitigate climate change. Decisions on one side affect the other. To optimise the efficiency of their energy policy, OECD countries must consider energy security and climate change mitigation priorities jointly. The book presents a framework to assess interactions between energy security and climate change policies, combining qualitative and quantitative analyses. The quantitative analysis is based on the development of energy security indicators, tracking the evolution of policy concerns linked to energy resource concentration. The 'indicators' are applied to a reference scenario and CO2 policy cases for five case-study countries: The Czech Republic, France, Italy, the Netherlands, and the United Kingdom. Simultaneously resolving energy security and environmental concerns is a key challenge for policy makers today. This study helps chart the course.

  3. 10 CFR Appendix B to Part 851 - General Statement of Enforcement Policy

    Science.gov (United States)

    2010-01-01

    ..., 2009. I. Introduction (a) This policy statement sets forth the general framework through which the U.S... contractors. (b) Pursuant to this enforcement philosophy, DOE will provide substantial incentive for the early...

  4. 78 FR 41125 - Interim Enforcement Policy for Permanent Implant Brachytherapy Medical Event Reporting

    Science.gov (United States)

    2013-07-09

    ... COMMISSION Interim Enforcement Policy for Permanent Implant Brachytherapy Medical Event Reporting AGENCY...'s permanent implant brachytherapy program. This interim policy affects NRC licensees that are authorized to perform permanent implant brachytherapy. DATES: This policy revision is effective July 9, 2013...

  5. Security Force Assistance: Cases and Policy

    Science.gov (United States)

    2018-02-02

    estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense , Washington...NAME(S) AND ADDRESS(ES) 12. DISTRIBUTION/AVAILABILITY STATEMENT 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION...19b. TELEPHONE NUMBER (Include area code) 02/02/2018 Final Technical Report December 2016 - November 2017 Security Force Assistance: Cases and Policy

  6. On financing the internal enforcement of illegal immigration policies.

    Science.gov (United States)

    Bucci, G A; Tenorio, R

    1996-02-01

    "We introduce a government budget constraint into an illegal immigration model, and show that the effect of increasing internal enforcement of immigration laws on the host country's disposable national income depends on the mix of employer fines and income taxation used to finance the added enforcement. These issues are addressed under alternative assumptions about (a) the ability of host country employers to discern between legal and illegal workers, and (b) host country labor market conditions. Empirical evidence for the United States indicates that the employer sanctions program may have had a negative impact on disposable national income." excerpt

  7. Modelling mobility aspects of security policies

    NARCIS (Netherlands)

    Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J.

    Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of

  8. A Model of Managerial Effectiveness in Information Security: From Grounded Theory to Empirical Test

    National Research Council Canada - National Science Library

    Knapp, Kenneth J

    2005-01-01

    ...: user training, security culture, policy relevance, and policy enforcement. Prior research has not yet examined the mediation factors between management support and information security effectiveness...

  9. European Union security policy through strategic culture

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2014-01-01

    Full Text Available In this paper, we shall pay attention to the security policy of the European Union, through the strategic culture, starting from the existing various options for cooperation in the field of security and defense. Our goal is to look at the implementation of the Strategic Culture of the European Union (EU SK, research ways to improve the international position of the Union and its impact on policy cooperation and trust with other collectives. Analysis of flexible cooperation between the European Union, as well as access to special procedures in the field of security and defense policy, we will follow the ambition and capacity in implementing the same. Paper aims to introduce the idea of the European Union, which allows its members to rationally consider and check the box of options available to decision makers. In this regard, the EU seeks to build its own armed forces to protect the association of interests-investment terms. Reviewing and understanding the strategic culture of the EU by countries that are not its members can be seen as reasons for strengthening the capacity of the Union for the realization of the impact of the global security as well as predicting its future steps.

  10. Modeling Security-Enhanced Linux Policy Specifications for Analysis (Preprint)

    National Research Council Canada - National Science Library

    Archer, Myla; Leonard, Elizabeth; Pradella, Matteo

    2003-01-01

    Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...

  11. A Logical Method for Policy Enforcement over Evolving Audit Logs

    Science.gov (United States)

    2011-02-24

    Proceedings of the 22nd International Conference on Computer Aided Verification (CAV), pages 1–18, 2010. [11] Andreas Bauer, Martin Leucker, and...97, 2006. [25] Qun Ni, Elisa Bertino, and Jorge Lobo . An obligation model bridging access control policies and privacy policies. In Proceedings of the

  12. Enforcement of Privacy Policies over Multiple Online Social Networks for Collaborative Activities

    Science.gov (United States)

    Wu, Zhengping; Wang, Lifeng

    Our goal is to tend to develop an enforcement architecture of privacy policies over multiple online social networks. It is used to solve the problem of privacy protection when several social networks build permanent or temporary collaboration. Theoretically, this idea is practical, especially due to more and more social network tend to support open source framework “OpenSocial”. But as we known different social network websites may have the same privacy policy settings based on different enforcement mechanisms, this would cause problems. In this case, we have to manually write code for both sides to make the privacy policy settings enforceable. We can imagine that, this is a huge workload based on the huge number of current social networks. So we focus on proposing a middleware which is used to automatically generate privacy protection component for permanent integration or temporary interaction of social networks. This middleware provide functions, such as collecting of privacy policy of each participant in the new collaboration, generating a standard policy model for each participant and mapping all those standard policy to different enforcement mechanisms of those participants.

  13. Dynamic Enforcement of Knowledge-based Security Policies

    Science.gov (United States)

    2011-04-05

    evaluation, 〈〈B〉〉C returns a convex polyhe- dron containing at least the points in C that satisfy B . • Expression count, C#B returns an upper bound on the...S′〉〉 (Pi | B) • Φn def= ∑n i=1 (Pi | ¬B) • ⊥P is a function that takes in any probabilistic polyhe- dron and produces a zero probabilistic polyhedron

  14. Security and Policy for Group Collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Ian Foster; Carl Kesselman

    2006-07-31

    Security and Policy for Group Collaboration” was a Collaboratory Middleware research project aimed at providing the fundamental security and policy infrastructure required to support the creation and operation of distributed, computationally enabled collaborations. The project developed infrastructure that exploits innovative new techniques to address challenging issues of scale, dynamics, distribution, and role. To reduce greatly the cost of adding new members to a collaboration, we developed and evaluated new techniques for creating and managing credentials based on public key certificates, including support for online certificate generation, online certificate repositories, and support for multiple certificate authorities. To facilitate the integration of new resources into a collaboration, we improved significantly the integration of local security environments. To make it easy to create and change the role and associated privileges of both resources and participants of collaboration, we developed community wide authorization services that provide distributed, scalable means for specifying policy. These services make it possible for the delegation of capability from the community to a specific user, class of user or resource. Finally, we instantiated our research results into a framework that makes it useable to a wide range of collaborative tools. The resulting mechanisms and software have been widely adopted within DOE projects and in many other scientific projects. The widespread adoption of our Globus Toolkit technology has provided, and continues to provide, a natural dissemination and technology transfer vehicle for our results.

  15. The Political Economy of Carbon Securities and Environmental Policy

    DEFF Research Database (Denmark)

    Polborn, Sarah

    The costs of the current suboptimal carbon abatement policy are likely in the range of 3 to 6 trillion 2005 US dollars. Using methods from the political economy of environmental policy, the paper develops a new carbon abatement policy instrument, carbon securities. A carbon security entitles its...... environmental policy, and higher investment in abatement technology....

  16. Compact, rugged, and intuitive thermal imaging cameras for homeland security and law enforcement applications

    Science.gov (United States)

    Hanson, Charles M.

    2005-05-01

    Low cost, small size, low power uncooled thermal imaging sensors have completely changed the way the world views commercial law enforcement and military applications. Key applications include security, medical, automotive, power generation monitoring, manufacturing and process control, aerospace application, defense, environmental and resource monitoring, maintenance monitoring and night vision. Commercial applications also include law enforcement and military special operations. Each application drives a unique set of requirements that include similar fundamental infrared technologies. Recently, in the uncooled infrared camera and microbolometer detector areas, major strides have been made in the design and manufacture of personal military and law enforcement sensors. L-3 Communications Infrared Products (L-3 IP) is producing a family of new products based on the amorphous silicon microbolometer with low cost, low power, high volume, wafer-level vacuum packaged silicon focal plane array technologies. These bolometer systems contain no choppers or thermoelectric coolers, require no manual calibration, and use readily available commercial off-the-shelf components. One such successful product is the Thermal-Eye X100xp. Extensive market needs analysis for these small hand held sensors has been validated by the quick acceptability into the Law Enforcement and Military Segments. As well as this product has already been received, L-3 IP has developed a strategic roadmap to improve and enhance the features and function of this product to include upgrades such as the new 30-Hz, 30-μm pitch detector. This paper describes advances in bolometric focal plane arrays, optical and circuit card technologies while providing a glimpse into the future of micro hand held sensor growth. Also, technical barriers are addressed in light of constraints, lessons learned and boundary conditions. One conclusion is that the Thermal Eye Silicon Bolometer technology simultaneously drives weight

  17. 29 CFR 786.150 - Enforcement policy concerning performance of nonexempt work.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement policy concerning performance of nonexempt work... concerning performance of nonexempt work. The Division has taken the position that the exemption provided by section 13(b)(2) of the Fair Labor Standards Act will be deemed applicable even though some nonexempt work...

  18. Nuclear Cyber Security Issues and Policy Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Cheol-Kwon; Lee, Dong-Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Na-Young; Hwang, Young-Soo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities.

  19. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  20. Co-opting human security and deductions for security policy-making ...

    African Journals Online (AJOL)

    It argues that far from being an abstract idea, human security meets a tangible need. Using Ghana as a case study, the article hints at possible implications of the co-optation of human security on security policy-making in Ghana. Keywords: Human Security, Protection, Empowerment, Threats, National Security ...

  1. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    Science.gov (United States)

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  2. Some problems with ordering and enforcing the security measure prohibiting offenders from operating motor vehicles

    Directory of Open Access Journals (Sweden)

    Milić Ivan

    2013-01-01

    Full Text Available The subject of this paper is the prohibition on operating motor vehicles as a security measure ordered against offenders who have committed crimes which endanger traffic. The first part of the paper explains certain aspects of ordering this security measure. Special consideration will be given to ordering this measure against defendants who have not passed the driving test, as well as against offenders with a foreign driver's license. In the second part of the paper we will describe the enforcement of this security measure. Finally, we will present our own view on the matter, which also represents the main motive for writing this paper, and that is the question of sanctions in case the prohibition on operating motor vehicles is not adhered to. The Criminal code of the Republic of Serbia prescribes the possibility of revoking a suspended sentence in case the prohibition is not adhered to. If this security measure is not ordered with a suspended sentence, but with a different criminal sanction, the question is whether there will still be a sanction if the prohibition is not adhered to.

  3. Formal Verification of Security Properties in Trust Management Policy

    Science.gov (United States)

    2011-01-01

    Formal Verification of Security Properties in Trust Management Policy ∗ Jianwei Niu William H. Winsborough Mark Reith† University of Texas at San...3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Formal Verification of Security Properties in Trust Management Policy 5a...first step towards formal verification of security policy properties for RBAC. In Proceedings of Fourth International Conference on Quality Software

  4. Speaker identification for the improvement of the security communication between law enforcement units

    Science.gov (United States)

    Tovarek, Jaromir; Partila, Pavol

    2017-05-01

    This article discusses the speaker identification for the improvement of the security communication between law enforcement units. The main task of this research was to develop the text-independent speaker identification system which can be used for real-time recognition. This system is designed for identification in the open set. It means that the unknown speaker can be anyone. Communication itself is secured, but we have to check the authorization of the communication parties. We have to decide if the unknown speaker is the authorized for the given action. The calls are recorded by IP telephony server and then these recordings are evaluate using classification If the system evaluates that the speaker is not authorized, it sends a warning message to the administrator. This message can detect, for example a stolen phone or other unusual situation. The administrator then performs the appropriate actions. Our novel proposal system uses multilayer neural network for classification and it consists of three layers (input layer, hidden layer, and output layer). A number of neurons in input layer corresponds with the length of speech features. Output layer then represents classified speakers. Artificial Neural Network classifies speech signal frame by frame, but the final decision is done over the complete record. This rule substantially increases accuracy of the classification. Input data for the neural network are a thirteen Mel-frequency cepstral coefficients, which describe the behavior of the vocal tract. These parameters are the most used for speaker recognition. Parameters for training, testing and validation were extracted from recordings of authorized users. Recording conditions for training data correspond with the real traffic of the system (sampling frequency, bit rate). The main benefit of the research is the system developed for text-independent speaker identification which is applied to secure communication between law enforcement units.

  5. An algorithm to evaluate implementation cost for liveness-enforcing supervisors designed by deadlock prevention policy

    Directory of Open Access Journals (Sweden)

    Shaoyong Li

    2016-07-01

    Full Text Available Deadlock prevention policy is widely used to design the liveness-enforcing supervisors because of its advantage that deadlocks are considered and solved in design and planning stages for flexible manufacturing systems modeled with Petri nets. However, how to evaluate the implementation cost of these liveness-enforcing supervisors is not done in the existing literature. This article proposes an algorithm to evaluate the implementation cost performance of different liveness-enforcing supervisors designed by deadlock prevention policy. By designing a multiple objective linear programming problem associated with two parameters (denoted as f1 and f2 to characterize the corresponding implementation costs for the added control places and the related input and out transitions and control arcs, the proposed algorithm first obtains the variable regions of f1 and f2 And then a satisfactory level coefficient (denoted as λ concentrating on the optimal compromise solutions of f1 and f2 (denoted as f1* and f2* is solved by a linear programming problem. As a result, the implementation cost performance of the corresponding liveness-enforcing supervisor can be indicated conveniently on the basis of the values of λ , f1*, and f2*. The practical potential of the proposed algorithm is demonstrated via a theoretical analysis and several widely used examples from the existing literature.

  6. Framework for an African policy towards creating cyber security awareness

    CSIR Research Space (South Africa)

    Dlamini, IZ

    2011-05-01

    Full Text Available , Estonia, Korea), identification of African countries that have such policies in place, and identification of the agencies, forums, workgroups, conferences, organisations and other initiatives that are currently dealing with ICT and cyber security policy...

  7. Food security policies in India and China

    DEFF Research Database (Denmark)

    Yu, Wusheng; Elleby, Christian; Zobbe, Henrik

    2015-01-01

    Food insecurity is a much more serious concern in India than China. In addition to income and poverty differences, we argue in this paper that differences in food policies can further explain the different food security outcomes across the two countries. First, India mostly uses price-based input...... subsidies to support agricultural incentives whereas China has recently adopted direct transfers to support agricultural incentives, which are believed to be less distorting and more efficient. Second, the two countries apply quite different approaches to address poor consumers’ access to food, with India...... adopting a widely criticized public distribution system and China mainly using direct income transfers and other social safety nets. Third, although both committed considerable fiscal resources to insulating their respective domestic markets, especially during recent food price spikes, India’s heavy...

  8. Security policies and trust in ubiquitous computing.

    Science.gov (United States)

    Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand

    2008-10-28

    Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

  9. Assessing the Effectiveness of Competition Law Enforcement Policy in Relation to Cartels

    Directory of Open Access Journals (Sweden)

    Priit Mändmaa

    2014-11-01

    Full Text Available Despite the high fines for cartel infringements it is claimed that the current competition law enforcement lacks deterrent effect for the avoidance of cartel infringements and is procedurally fragile. This article analyses the current competition law enforcement policy in relation to cartels. More specifically, the article assesses the effectiveness of the policy in deterring the formation of cartels and pursuing the goals of competition law by analysing the theory of deterrence, case law, procedural norms, imposed fines and academic literature. The main conclusions are that wrong targets are aimed at under the deterrence principle, the proceedings are of a criminal law nature and require a separation of powers, and that the current level of fines does not pose a threat on the economy and continually fail to deter price-fixing.

  10. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy... submitted to the Information Security Oversight Office (ISOO) no later than Wednesday, March 17, 2010. ISOO... regulation 41 CFR 101-6, announcement is made for a meeting of the National Industrial Security Program...

  11. Towards a social theory of EU foreign and security policy

    NARCIS (Netherlands)

    Bickerton, C.J.

    2011-01-01

    This article argues that the study of EU foreign and security policy has been hampered by its conceptualization of the sovereign state. Realist and constructivist scholars share Stanley Hoffmann's formulation of states as either 'obstinate or obsolete'. EU foreign and security policy is puzzling in

  12. Private military and security companies policy in Africa: regional ...

    African Journals Online (AJOL)

    The purpose of this article is to explain the policy stasis around private security regulation in Africa. Africa is one of the largest theatres of private military and security company operations in the world. Yet, there is still no new regional convention or policy on their regulation. Previous studies focused on Western efforts to ...

  13. Poland´s Foreign and Security Policy. Main Directions

    Directory of Open Access Journals (Sweden)

    Agnieszka Bieńczyk-Missala

    2016-01-01

    Full Text Available This article tries to present the main areas of Polish foreign and security policy. Poland’s membership in the EU and in NATO was the strongest determinant of its position in international relations and the guiding light of its foreign policy. Poland’s work in the EU was focused in particular on EU policy towards its eastern neighbours, common energy policy and security issues, while in NATO, Poland has always been a proponent of the open doors policy and has maintained close relationship with the US, supporting many of its policies and initiatives.

  14. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  15. Information security policies and procedures a practitioner's reference

    CERN Document Server

    Peltier, Thomas R

    2004-01-01

    INFORMATION SECURITY POLICIES AND PROCEDURES Introduction Corporate Policies Organizationwide (Tier 1) Policies Organizationwide Policy Document Legal Requirements Duty of Loyalty Duty of Care Other Laws and Regulations Business Requirements Where to Begin? Summary Why Manage This Process as a Project? Introduction First Things First: Identify the Sponsor Defining the Scope of Work Time Management Cost Management Planning for Quality Managing Human Resources Creating a Communications Plan Summary Planning and Preparation Introduction Objectives of Policies, Stand

  16. Security policy development in health area

    OpenAIRE

    Grilc, Uroš

    2012-01-01

    In the following assignment, we will research the concepts of information security and information security management system in a business environment. Then we will try to develop an actual information security management system for an organization, active in healthcare area, which will be specified by restrictions, introduced by the current state legislation for the healthcare area. In the developing information security management system, we will first try to define the desired system's...

  17. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  18. Three Essays on Information Security Policies

    Science.gov (United States)

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  19. Security Policy Scheme for an Efficient Security Architecture in Software-Defined Networking

    Directory of Open Access Journals (Sweden)

    Woosik Lee

    2017-06-01

    Full Text Available In order to build an efficient security architecture, previous studies have attempted to understand complex system architectures and message flows to detect various attack packets. However, the existing hardware-based single security architecture cannot efficiently handle a complex system structure. To solve this problem, we propose a software-defined networking (SDN policy-based scheme for an efficient security architecture. The proposed scheme considers four policy functions: separating, chaining, merging, and reordering. If SDN network functions virtualization (NFV system managers use these policy functions to deploy a security architecture, they only submit some of the requirement documents to the SDN policy-based architecture. After that, the entire security network can be easily built. This paper presents information about the design of a new policy functions model, and it discusses the performance of this model using theoretical analysis.

  20. Position paper: A generic approach for security policies composition

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario; Nielson, Flemming

    2012-01-01

    When modelling access control in distributed systems, the problem of security policies composition arises. Much work has been done on different ways of combining policies, and using different logics to do this. In this paper, we propose a more general approach based on a 4-valued logic, that abst......When modelling access control in distributed systems, the problem of security policies composition arises. Much work has been done on different ways of combining policies, and using different logics to do this. In this paper, we propose a more general approach based on a 4-valued logic...

  1. External dimension of Ukraine’s security policy

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2015-07-01

    Full Text Available Investigation of the external dimension of security policy of Ukraine is stipulated for the need to analyse the current state of relations with organizations such as the Organization for Security and Co-operation in Europe and The Collective Security Treaty Organization, and relations within the Common European Security and Defence Policy. Ukraine’s European Integration means inclusion in the global space security with countries that it shares common values and principles. It does not exclude the collaboration with the countries that belong to other systems of collective security in the scope that is appropriate to basic national interests of Ukraine. It is proved that the activities of the OSCE Special Monitoring Mission is an important contribution to the process of peaceful conflict resolution, and helps to develop democratic principles and foundations of foreign policy. It is determined that the further development of the constructive cooperation between the EU advisory mission under CSDP will provide an opportunity to improve and increase the security of national borders from external threats and challenges, and help to accelerate the process of integration into the European security space. The attention is paid to the fact that, taken into consideration the state of relations with Russia, the further cooperation with the Collective Security Treaty Organization (CSTO may adversely affect the overall security situation in Ukraine and lead to further tension with Russia today.

  2. Understanding Internal Information Systems Security Policy Violations as Paradoxes

    National Research Council Canada - National Science Library

    Kennedy Njenga

    2017-01-01

    Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees...

  3. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ... goals to eliminate current threats and risks such as terrorism. As far as Poland is concerned, its priority is to be an active leader in improving common security policy within the boundaries of the European Union (EU...

  4. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  5. Nuclear security policy in the context of counter-terrorism in Cambodia

    Science.gov (United States)

    Khun, Vuthy; Wongsawaeng, Doonyapong

    2016-01-01

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  6. Nuclear security policy in the context of counter-terrorism in Cambodia

    Energy Technology Data Exchange (ETDEWEB)

    Khun, Vuthy, E-mail: vuthy.khun@gmail.com; Wongsawaeng, Doonyapong [Department of Nuclear Engineering, Faculty of Engineering, Chulalongkorn University, 254 Phayathai Road, Pathumwan, Bangkok 10330 (Thailand)

    2016-01-22

    The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.

  7. Japan's National Security: Structures, norms, and policies

    Energy Technology Data Exchange (ETDEWEB)

    Katzenstein, P.J.; Okawara, N.

    Japan's national security policy has two distinctive aspects that deserve analysis. First, Japan's definition of national security goes far beyond traditional military notions. National security is viewed in comprehensive terms that also include economic and political dimensions. The second feature of Japan's security policy worth explanation is a distinctive mixture of flexibility and rigidity in the process of policy adaptation to change: flexibility on issues of economic security, rigidity on issues of military security, and flexibility combined with rigidity on issues of political security. With the end of the Cold War and changes in the structure of the international system, it is only natural that we ask whether and how Japan's national security policy will change as well. Optimists insist that the Asian balance of power and the US-Japan relationship will make Japan aspire to be a competitive, noninterventionist trading state that heeds the universal interest of peace and profit rather than narrow aspirations for national power. Pessimists warn us instead that the new international system will finally confirm Herman Kahn's prediction of 1970: Japan will quickly change to the status of a nuclear superpower, spurred perhaps by what some see as a dangerous rise of Japanese militarism in the 1970s and 1980s.

  8. Globalized Security Reshaping America’s Defense Trade Policy

    Science.gov (United States)

    2001-04-01

    AU/SCHOOL/NNN/2001-04 THE ATLANTIC COUNCIL OF THE UNITED STATES AIR UNIVERSITY NATIONAL DEFENSE FELLOWSHIP PROGRAM GLOBALIZED SECURITY RESHAPING...to) - Title and Subtitle Globalized Security Reshaping America’s Defense Trade Policy Contract Number Grant Number Program Element Number...20 Globalization

  9. Food security management Through Public Policy | Amani | African ...

    African Journals Online (AJOL)

    This paper emphasizes the role of public policy in addressing food insecurity. It begins with an elaboration of the food security concept. In this regard, the paper argues that the conceptual framework for food security should seek to ensure that food is available and accessible to each individual in sufficient quantities to ...

  10. Household Food Security Policy Analysis A System Dynamics Perspective

    OpenAIRE

    Isdore Paterson Guma; Agnes Semwanga Rwashana; Benedict Oyo

    2015-01-01

    Household food security FS is complex and requires multiple stakeholder intervention. Systemic approach aids stakeholders to understand the mechanisms and feedback between complexities in food security providing effective decision making as global resource consumption continues to grow. The study investigated food security challenges and a system dynamics model was developed for evaluating policies and intervention strategies for better livelihood at household level. Dynamic synthesis methodo...

  11. Debating food security policy in two different ideational settings

    DEFF Research Database (Denmark)

    Farsund, Arild Aurvåg; Daugbjerg, Carsten

    2017-01-01

    in Australia and Norway is compared. In Australia, agricultural normalism (agricultural markets and production are considered to be similar to those of other economic sectors) has been dominant since the mid-1980s, while Norwegian agricultural policy making has been dominated by agricultural exceptionalism...... the positive role of the market and trade in providing global food security. In Norway, the debate highlights the need to regulate market forces and restrict trade in order to allow countries to develop their own agricultural sectors.......Food security has emerged as a relatively new policy issue in agricultural policy making in developed countries. This policy problem is addressed within an institutional landscape in which agricultural ideas and institutions are well-established. In this article, food security policy making...

  12. Beyond the security paradox: Ten criteria for a socially informed security policy.

    Science.gov (United States)

    Pavone, Vincenzo; Ball, Kirstie; Degli Esposti, Sara; Dibb, Sally; Santiago-Gómez, Elvira

    2017-04-01

    This article investigates the normative and procedural criteria adopted by European citizens to assess the acceptability of surveillance-oriented security technologies. It draws on qualitative data gathered at 12 citizen summits in nine European countries. The analysis identifies 10 criteria, generated by citizens themselves, for a socially informed security policy. These criteria not only reveal the conditions, purposes and operation rules that would make current European security policies and technologies more consistent with citizens' priorities. They also cast light on an interesting paradox: although people feel safe in their daily lives, they believe security could, and should, be improved.

  13. An integrative behavioral model of information security policy compliance.

    Science.gov (United States)

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing

  14. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  15. Security versus bank finance : the importance of a proper enforcement of legal rules

    NARCIS (Netherlands)

    Modigliani, F.; Perotti, E.C.

    2000-01-01

    We argue that in an unreliable enforcement regime, transactions tend to become intermediated through institutions or concentrated among agents bound by some form of private enforcement. Provision of funding shifts from risk capital to debt, and from markets to institutions with long term relations.

  16. Security versus bank finance : the importance of a proper enforcement of legal rules

    NARCIS (Netherlands)

    Modigliani, F.; Perotti, E.C.; van Oijen, P.H.

    1998-01-01

    We argue that in an unreliable enforcement regime, transactions tend to become intermediated through institutions or concentrated among agents bound by some form of private enforcement. Provision of funding shifts from risk capital to debt, and from markets to institutions with long term relations.

  17. Family Economic Security Policies and Child and Family Health.

    Science.gov (United States)

    Spencer, Rachael A; Komro, Kelli A

    2017-03-01

    In this review, we examine the effects of family economic security policies (i.e., minimum wage, earned income tax credit, unemployment insurance, Temporary Assistance to Needy Families) on child and family health outcomes, summarize policy generosity across states in the USA, and discuss directions and possibilities for future research. This manuscript is an update to a review article that was published in 2014. Millions of Americans are affected by family economic security policies each year, many of whom are the most vulnerable in society. There is increasing evidence that these policies impact health outcomes and behaviors of adults and children. Further, research indicates that, overall, policies which are more restrictive are associated with poorer health behaviors and outcomes; however, the strength of the evidence differs across each of the four policies. There is significant diversity in state-level policies, and it is plausible that these policy variations are contributing to health disparities across and within states. Despite increasing evidence of the relationship between economic policies and health, there continues to be limited attention to this issue. State policy variations offer a valuable opportunity for scientists to conduct natural experiments and contribute to evidence linking social policy effects to family and child well-being. The mounting evidence will help to guide future research and policy making for evolving toward a more nurturing society for family and child health and well-being.

  18. Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs.

    Science.gov (United States)

    González-Tablas, Ana I; Tapiador, Juan E

    2016-05-11

    We address the problem of bootstrapping security and privacy policies for newly-deployed apps in wireless body area networks (WBAN) composed of smartphones, sensors and other wearable devices. We introduce a framework to model such a WBAN as an undirected graph whose vertices correspond to devices, apps and app resources, while edges model structural relationships among them. This graph is then augmented with attributes capturing the features of each entity together with user-defined tags. We then adapt available graph-based similarity metrics to find the closest app to a new one to be deployed, with the aim of reusing, and possibly adapting, its security policy. We illustrate our approach through a detailed smartphone ecosystem case study. Our results suggest that the scheme can provide users with a reasonably good policy that is consistent with the user's security preferences implicitly captured by policies already in place.

  19. Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs

    Directory of Open Access Journals (Sweden)

    Ana I. González-Tablas

    2016-05-01

    Full Text Available We address the problem of bootstrapping security and privacy policies for newly-deployed apps in wireless body area networks (WBAN composed of smartphones, sensors and other wearable devices. We introduce a framework to model such a WBAN as an undirected graph whose vertices correspond to devices, apps and app resources, while edges model structural relationships among them. This graph is then augmented with attributes capturing the features of each entity together with user-defined tags. We then adapt available graph-based similarity metrics to find the closest app to a new one to be deployed, with the aim of reusing, and possibly adapting, its security policy. We illustrate our approach through a detailed smartphone ecosystem case study. Our results suggest that the scheme can provide users with a reasonably good policy that is consistent with the user’s security preferences implicitly captured by policies already in place.

  20. Reducing Security Policy Size for Internet Servers in Secure Operating Systems

    National Research Council Canada - National Science Library

    YOKOYAMA, Toshihiro; HANAOKA, Miyuki; SHIMAMURA, Makoto; KONO, Kenji; SHINAGAWA, Takahiro

    2009-01-01

    .... Considering that remote attackers can never attack a server before they establish connections to it, we propose a novel scheme that exploits phases to simplify security policy descriptions for Internet servers...

  1. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  2. Food security, agricultural policies and economic growth

    NARCIS (Netherlands)

    Koning, Niek

    2017-01-01

    Using a political-economic approach supplemented with insights from human ecology, this volume analyzes the long-term dynamics of food security and economic growth. The book begins by discussing the nature of preindustrial food crises and the changes that have occurred since the 19th century with

  3. Coalition Warfare Program (CWP): secure policy controlled information query and dissemination over a Bices network

    Science.gov (United States)

    Toth, Andrew; Pham, Tien; Karr, Todd; Bent, Graham; Harries, Dominic; Knox, Alan

    2013-05-01

    In 2006, the US Army Research Laboratory (ARL) and the UK Ministry of Defence (MoD) established a collaborative research alliance with academia and industry, called the International Technology Alliance (ITA) to address fundamental issues concerning Network and Information Sciences. Under the ITA research program, a US-UK transition project on "ITA Policy Controlled Information Query and Dissemination" was funded in 2011 by OSD's Coalition Warfare Program (CWP). The goal of this CWP project is to develop an extensible capability of performing distributed federated query and information dissemination across a coalition network of distributed disparate data/information sources with access­ controlled policies. The CWP project is lead by US Army Research Laboratory (ARL) and UK Defence Science Technology Laboratory (Dstl) with software development by IBM UK and IBM US. The CWP project exploits two key technology components developed within the ITA, namely the Gaian Database and integrated Access Policy Decision and Enforcement mechanisms. The Gaian Database (GaianDB) is a Dynamic Distributed Federated Database (DDFD) that addresses a need to share information among coalition members by providing a means for policy-controlled access to data across a network of heterogeneous data sources. GaianDB implements a SQL-compliant Store-Locally-Query-Anywhere (SLQA) approach providing software applications with global access to data from any node in the database network via standard SQL queries. Security policy is stored locally and enforced at the database node level, reducing potential for unauthorized data access and waste of network bandwidth. A key metric of success for a CWP project is the transition of coalition-related technology from TRL-3 or 4 to TRL-6 or higher. Thus, the end goal of this CWP project was to demonstrate the GaianDB and policy technology within an operational environment at the NATO Intelligence Fusion Centre (NIFC) at Molesworth RAF. An initial

  4. Development of an Internet Security Policy for health care establishments.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  5. Security Policy for a Generic Space Exploration Communication Network Architecture

    Science.gov (United States)

    Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.

    2016-01-01

    This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  6. Household Food Security Policy Analysis A System Dynamics Perspective

    Directory of Open Access Journals (Sweden)

    Isdore Paterson Guma

    2015-08-01

    Full Text Available Household food security FS is complex and requires multiple stakeholder intervention. Systemic approach aids stakeholders to understand the mechanisms and feedback between complexities in food security providing effective decision making as global resource consumption continues to grow. The study investigated food security challenges and a system dynamics model was developed for evaluating policies and intervention strategies for better livelihood at household level. Dynamic synthesis methodology questionnaires and interview guide were used to unearth food security challenges faced by households. A causal loop diagram was drawn. The model demonstrates a balance between food stock seeds preserved seeds for sale and consumption from crop harvest throughout the food cycles. This research makes contribution to the literature by evaluating dynamic synthesis methodology and FS policy discussions from a feedback point of view.

  7. National Security Implications of Global Warming Policy

    Science.gov (United States)

    2010-03-01

    Although numerous historical examples demonstrate how actual climate change has contributed to the rise and fall of powers, global warming , in and of...become convinced that global warming is universally bad and humans are the primary cause, political leaders may develop ill-advised policies restricting

  8. FOOD SECURITY AND PDS IN TRIPURA: A POLICY INTERVENTION

    OpenAIRE

    De, Utpal Kumar

    2000-01-01

    Tripura is facing the problem of food insecurity for quite some long period of time and lagging behind the most other states of India with respect to the development of human capital, agriculture and industry. Food security is one of the basic criteria for the formation and improvement of human capital and also productivity of human being. The working of PDS and other government policies have not been successful in achieving food security at the desired level. However the recent offtake patte...

  9. Paradiplomacy, Security Policies and City Networks: the Case of the Mercocities Citizen Security Thematic Unit

    Directory of Open Access Journals (Sweden)

    Gilberto Marcos Antonio Rodrigues

    Full Text Available Abstract In a phenomenon known as paradiplomacy, cities are playing an increasingly important role in international relations. Through paradiplomacy, cities are co-operating internationally with other cities, and city networks have become important spaces for sharing experiences of and best practices in local public policy. Moreover, security policy is a increasingly important part of local policy-making. In Latin America, the concept of citizen security, based on a democratic and human rights approach, has developed in response to the legacy of authoritarian regimes from the 1960s to the 1980s. This article examines how security policies have been disseminated, discussed and transferred through Mercocities, the main city network in South America.

  10. Asia-Pacific Security: Policy Challenges

    OpenAIRE

    Lovell, David W.

    2013-01-01

    Since September 11, 2001, our newspapers have been filled with the ‘war on terror’; our governments have mobilised their resources for ‘homeland security’; and people everywhere are braced for more terrorist attacks. Yet while the new threat is genuine, we must not lose sight of the continuing security concerns in the Asia-Pacific. Tensions persist on the Korean peninsula, in the Taiwan Straits and the South China Sea, and in Kashmir. The region is well supplied with weapons of mass destr...

  11. In Harm’s Way: Family Separation, Immigration Enforcement Programs and Security on the US-Mexico Border

    Directory of Open Access Journals (Sweden)

    Jeremy Slack

    2015-03-01

    Full Text Available The Consequence Delivery System (CDS is a suite of border and immigration enforcement programs designed to increase the penalties associated with unauthorized migration in order to convince people not to return (Rosenblum 2013. Despite its inauguration in 2011, many aspects of the CDS are not new. CDS does however, mark a shift from the deterrent strategy that, in the 1990s that relied heavily on the dangers of the natural terrain to dissuade unauthorized border crossers, to one that actively punishes, incarcerates, and criminalizes them. This article presents findings from the Migrant Border Crossing Study, a random sample survey of 1,100 recently deported migrants in six cities in Mexico conducted between 2009 and 2012. It examines the demographics and family ties of deportees, their experiences with immigration enforcement practices and programs under the CDS, and how these programs have reshaped contemporary migration and deportation along the US-Mexico border. The article covers programs such as criminal prosecutions of illegal entries under Operation Streamline, and the Alien Transfer and Exit Program (ATEP or lateral repatriation program which returns immigrants to different locations from where they illegally entered. In relationship to these programs, it considers issues of due process and treatment of deportees in US custody. It also examines interior enforcement under Secure Communities, which, during the study period, comprised part of the overarching border security plan, and screened virtually everybody arrested in the United States against immigration databases.The article concludes that these programs do not have a strong deterrent effect. Instead, immigration enforcement has led to a “caging effect” over the past two decades which has disrupted seasonal migration flows, increased familial and social ties to the United States, and decreased the probability of returning to Mexico once in the United States. The development of

  12. Space Shuttle security policies and programs

    Science.gov (United States)

    Keith, E. L.

    1985-01-01

    The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.

  13. Features of modern security policy UK political parties

    Directory of Open Access Journals (Sweden)

    A. V. Stalovierova

    2015-12-01

    Full Text Available The security policy of the British coalition government of D. Cameron (2010-2015 is summarized; it’s been proved that political forces of Tory and Liberal Democrat should have compromised to carry out unanimous course in the scope of national security, and the problems of the security strategy on parliamentary elections in 2015 are analyzed, particularly the comparative analysis of the modern safety strategy of leading British parties is exercised. Under conditions of the appearance of new challenges and threats, transformation of international safety system, the questions of safety policy often become the object of attention of the British community and experts. The absence of cross-party consensus on most terms of safety strategy of the United Kingdom during the election campaign in 2015 makes the discussion about perspectives of the British safety policy still more urgent. During the election campaign there was no unity on any aspect of security subject between parties. First of all, Labourists, Liberal Democrats, Scottish National Party and Green Party made a statement about readiness to develop cooperation with the EU and the Conservatives and the UK Independence Party were on the side of the Eurosceptics. The opinions of the parties were also divided on military operations abroad, financing and force level. In terms of one-party government and presence of majority in the House of Commons, the Conservatives have opportunities to realize their own vision of British safety policy.

  14. Land Reform and Food Security | Sanusi | Economic and Policy ...

    African Journals Online (AJOL)

    This paper posits that to achieve a longterm success of land reform in Nigeria and increase its productive capacities for food security, it will require the formulation of an agrarian policy that will balance the competing social and economic needs of the people.

  15. Agriculture development and food security policy in Eritrea - An ...

    African Journals Online (AJOL)

    Therefore, the primary goal of Eritrea is to guarantee food security by introducing modern technology, irrigation, terracing, soil and water conservation, with less dependence on rainwater. Thus the Government has articulated its food policy, which stresses national ownership of grant food assistance and to achieve food ...

  16. Democratic Security and Defense Policy: A Successful Counterinsurgency Model

    Science.gov (United States)

    2012-06-08

    Defense University, 2011. 89 Government Documents Colombian Army. Manual de Operaciones Irregulares ( Manual for Irregular...Coordinacion de Accion Integral CCOPE Comando Conjunto de Operaciones Especiales COIN Counterinsurgency DSDP Democratic Security and Defense Policy...EU European Union FARC Fuerzas Armadas Revolucionarias de Colombia FM Field Manual HVT High Value Target JP Joint Publication LOE Line of

  17. Hospital Smoke-Free Policy: Compliance, Enforcement, and Practices. A Staff Survey in Two Large Public Hospitals in Australia.

    Science.gov (United States)

    McCrabb, Sam; Baker, Amanda L; Attia, John; Balogh, Zsolt J; Lott, Natalie; Palazzi, Kerrin; Naylor, Justine; Harris, Ian A; Doran, Christopher M; George, Johnson; Wolfenden, Luke; Skelton, Eliza; Bonevski, Billie

    2017-11-08

    Background: Smoke-free hospital policies are becoming increasingly common to promote good health and quit attempts among patients who smoke. This study aims to assess: staff perceived enforcement and compliance with smoke-free policy; the current provision of smoking cessation care; and the characteristics of staff most likely to report provision of care to patients. Methods: An online cross-sectional survey of medical, nursing, and allied staff from two Australian public hospitals was conducted. Staff report of: patient and staff compliance with smoke-free policy; perceived policy enforcement; the provision of the 5As for smoking cessation (Ask, Assess, Advise, Assist, and Arrange follow-up); and the provision of stop-smoking medication are described. Logistic regressions were used to determine respondent characteristics related to the provision of the 5As and stop-smoking medication use during hospital admission. Results: A total of 805 respondents participated. Self-reported enforcement of smoke-free policy was low (60.9%), together with compliance for both patients (12.9%) and staff (23.6%). The provision of smoking cessation care was variable, with the delivery of the 5As ranging from 74.7% (ask) to 18.1% (arrange follow-up). Medical staff (odds ratio (OR) = 2.09, CI = 1.13, 3.85, p = 0.018) and full time employees (OR = 2.03, CI = 1.06, 3.89, p = 0.033) were more likely to provide smoking cessation care always/most of the time. Stop-smoking medication provision decreased with increasing age of staff (OR = 0.98, CI = 0.96, 0.99, p = 0.008). Conclusions: Smoke-free policy enforcement and compliance and the provision of smoking cessation care remains low in hospitals. Efforts to improve smoking cessation delivery by clinical staff are warranted.

  18. The securitisation of pandemic influenza: framing, security and public policy.

    Science.gov (United States)

    Kamradt-Scott, Adam; McInnes, Colin

    2012-01-01

    This article examines how pandemic influenza has been framed as a security issue, threatening the functioning of both state and society, and the policy responses to this framing. Pandemic influenza has long been recognised as a threat to human health. Despite this, for much of the twentieth century it was not recognised as a security threat. In the decade surrounding the new millennium, however, the disease was successfully securitised with profound implications for public policy. This article addresses the construction of pandemic influenza as a threat. Drawing on the work of the Copenhagen School, it examines how it was successfully securitised at the turn of the millennium and with what consequences for public policy.

  19. The citizen security reconfiguration: The security and coexistence policy for football in Colombia

    Directory of Open Access Journals (Sweden)

    Diego Felipe Puentes Sánchez

    2015-06-01

    Full Text Available Security policies are passing through a crucial time in which management strategies focused on crime, use of force and increasing clampdown on criminal matters, are inefficient in a scenario that promotes a normative spectrum linked to Human Rights seeking to insert the security as a condition for the construction of universal dignity in what the United Nations has called Human Security. This article is inserted in the current citizen security policy debates, to evidence how concepts such as Civic Culture and Culture of Peace are an inexorable prerequisite for the transformation to a Human Security approach, issue that goes through the possibility of promoting such change from perspectives that understand the conflicts in a broader and interdisciplinary manner. In order to this, the policy for security and coexistence for football in Colombia will be analyzed so as to have a practical and concrete example that will allow to evidence the expressed theoretical approaches and also because football has great social importance (economic, political and cultural in Colombia.

  20. The impact of European Registers of Road Transport Undertakings on security and enforcement of the system of digital tachograph

    Science.gov (United States)

    Rychter, M.; Rychter, R.

    2016-09-01

    Secure digital tachograph system is indisputably a means having the great influence on road safety, enforcement of the social conditions for drivers in road transport as well as supporting the fair competition between road transport undertakings. In order to better monitor the compliance of road transport with the rules in force, inter alia the provisions on usage the digital tachographs, the European Union regulation introduces the European Registers of Road Transport Undertakings (ERRU), a system that allows a better exchange of information between Member States. The main purpose of this analysis is to present the measures for enforcement the execution of the provisions on obligation of installation and usage of digital tachographs in road transport and for improving the security of data recorded within digital tachograph system especially through exchange of the information on the most serious infringements committed by hauliers in any Member State, which may lead to the loss of good repute and the e-document engineering method used by the ERRU system.

  1. Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2009-01-01

    The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals without violating any policies, by combining

  2. 34 CFR 668.46 - Institutional security policies and crime statistics.

    Science.gov (United States)

    2010-07-01

    ... enforcement that— (i) Addresses the enforcement authority of security personnel, including their relationship... concerning who should be contacted, the importance of preserving evidence for the proof of a criminal offense.... Compliance with this paragraph does not constitute a violation of the Family Educational Rights and Privacy...

  3. International Security, Development, and Human Rights: Policy Conversion or Conflict?

    Directory of Open Access Journals (Sweden)

    Miao-ling Lin Hasenkamp

    2012-04-01

    Full Text Available This article uses an institutional network governance approach to explore the overlapping dimension of the policy fields between security, development, and human rights, reflected in the US and German provincial reconstruction teams (PRTs in Afghanistan. The past two decades have witnessed a gradually changing paradigm in academic and policy debates regarding the questions of the normative basis of world order and possibilities for tackling imminent threats to security and peace (i.e. intra-state armed conflicts, failed states, terrorism, poverty, and deepening inequality. The introduction of concepts such as “human security” and “the right to humanitarian intervention/responsibility to protect (R2P” as well as critical examinations of peace-, nation-, and state-building missions (PNSB have led to a relativist tendency of state sovereignty and a changing attitude regarding how to address the intersection of security, development, and human rights. Despite this shift, the policy commitments to integrating these policy considerations remain puzzling. How have they been redefined, conceptualized, and put into practice? I argue that an integrated conceptual approach has facilitated the redefinition of common policy goals, principles, and the mobilization of resources. At the same time, civil and military cooperation, as demonstrated in the multifunctional work of PRTs, has been Janus-headed—permanently caught in an ongoing tension between the war on terror and short-term stability operation on the one hand and long-term durable peace and development on the other. The misunderstanding of its interim character, the dynamics of Afghan environment, the blurring of policy lines, and the differences between national PRT models have made it difficult to systematically assess the efficiency and legitimacy of each policy frame and program.

  4. Homeland Security Strategic Plan for the Non-Major Local Law Enforcement Agency

    Science.gov (United States)

    2011-09-01

    who vandalize the area with graffiti . Disorder issues plague many communities and are a nuisance to citizens, businesses, and the police. Disorder...degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL September 2011...leaders should consider if their leadership ability will adequately meet the necessary skills in meeting these expectations. The threat of street level

  5. BASES OF PUBLIC POLICY FORMATION DIRECTED AT ENSURING BUDGET SECURITY

    Directory of Open Access Journals (Sweden)

    S. Onishchenko

    2015-03-01

    Full Text Available In the article the priorities and public policies that can improve the safety level of the budget of Ukraine have been grounded. Attention on the problems of imbalance and deficiency trends accumulation of public debt has been focused. The detailed analysis of the budget deficit of the European community to further research the main problems of fiscal security has been carried out. The formation of the concept of budget policy should include long-term and medium-term priorities of the state priorities areas have been concluded. Budget policy on public debt must deal with interrelated issues of debt bondage and effective use of public credit, promote economic growth with respect safe level and structure of public debt have been emphasized by author. Debt policy as part of fiscal policy under certain conditions can be a powerful tool to intensify investment and innovation processes in society, promote economic and social development. The reorientation of fiscal policy to address current problems through debt and use it as the basis of investment and innovation development provides an effective public debt management is designed to reduce state budget expenditures on its servicing and repayment, optimizing the scope and structure of debt according to economic growth. The role of debt policy in modern terms increases is clearly subordinate to and consistent with long-term goals and priorities of fiscal policy. There is an urgent development and implementation of effective mechanisms for investing borrowed resources, increasing the efficiency of public investment, including the improvement of organizational, financial, legal and controls. Strategically budget security guarantees only competitive economy, which can be constructed only by recovery and accelerated development of promising sectors of the national economy in the presence of a balanced budget policy. Now there is a tendency to implement only measures to stabilize the political and socio

  6. STUDY ON COMPANY SECURITY POLICIES FROM DIGITAL MEDIA

    Directory of Open Access Journals (Sweden)

    CRISTINA-MARIA RĂDULESCU

    2015-12-01

    Full Text Available The Internet development has brought both new opportunities and risks for either retailers or consumers. For example, electronic commerce is much faster and less expensive, but this openness makes it difficult to secure. People are aware of the fact that online businesses collecting, process and distribute enormous amounts of personal data and therefore, are concerned about their unauthorized use or their use in other purposes than intended by third parties in order to gain unauthorized access to them. There are more examples of cyber criminal activities, such as: hacking, software piracy, passwords attack, service prohibition attacks, scamming, etc. Such fears led to the editing of protection policies meant to secure personal data and to develop some mechanisms to ensure the reliability and confidentiality of electronic information. Security measures include access control devices, installation of firewalls and intrusion detection devices, of some security procedures to identify and authenticate authorized users of network systems. Such mechanisms constitute the core of this study. We will also analyze security and confidentiality policy of personal data of Google Inc.

  7. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  8. Security Policy Development: Towards a Life-Cycle and Logic-Based Verification Model

    OpenAIRE

    Luay A. Wahsheh; Jim Alves-Foss

    2008-01-01

    Although security plays a major role in the design of software systems, security requirements and policies are usually added to an already existing system, not created in conjunction with the product. As a result, there are often numerous problems with the overall design. In this paper, we discuss the relationship between software engineering, security engineering, and policy engineering and present a security policy life-cycle; an engineering methodology to policy development in high assuran...

  9. Review of the methods for the development of information security policies at organizations

    OpenAIRE

    Wu, Shan

    2016-01-01

    This thesis aims to have an overview of the current studies in the development of information security policy. The research is based on a systematical literature review. The study focuses on the development process of information security policy and other relevant issues in information security policy development within organizations. There are four research questions are proposed based on this topic: 1) what are the functions of information security policy; 2) what kind of stakeholders shoul...

  10. On the Enforceability of EU Agencies’ Soft Law at the National Level:
    The Case of the European Securities and Markets Authority

    Directory of Open Access Journals (Sweden)

    Marloes van Rijsbergen

    2014-12-01

    Full Text Available The delegation of more and more soft regulatory powers to EU agencies occurs in an increasing number of policy areas, e.g. aviation, medicines and financial services. Although the growing scope of the delegation of public authority to agencies is said to be necessary to enhance the effectiveness of EU policies, it raises doubts concerning the legitimacy of agencies and their decisions at the same time. This article aims to contribute to the ongoing discussion on EU agencies’ regulatory powers by uncovering the problematic aspects which the application and enforcement of soft law rules of EU agencies may induce at the national level. Furthermore, it adds new elements to the wider reflection on the function and status of soft law within the EU. Ultimately, it argues that further procedural and good governance guarantees are required in order to ensure both the legitimacy and effectiveness of the soft regulatory powers of EU agencies. It does so by taking one of the European Supervisory Authorities (ESAs, namely the European Securities and Markets Authority (ESMA, as an illustrative example of how the establishing regulations of newer EU agencies proceed in the direction of the institutionalisation and proceduralisation of soft law rule-making.

  11. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview

    Directory of Open Access Journals (Sweden)

    Luca Veltri

    2013-04-01

    Full Text Available The Internet of Things (IoT refers to the Internet-like structure of billions of interconnected constrained devices, denoted as “smart objects”. Smart objects have limited capabilities, in terms of computational power and memory, and might be battery-powered devices, thus raising the need to adopt particularly energy efficient technologies. Among the most notable challenges that building interconnected smart objects brings about, there are standardization and interoperability. The use of IP has been foreseen as the standard for interoperability for smart objects. As billions of smart objects are expected to come to life and IPv4 addresses have eventually reached depletion, IPv6 has been identified as a candidate for smart-object communication. The deployment of the IoT raises many security issues coming from (i the very nature of smart objects, e.g., the adoption of lightweight cryptographic algorithms, in terms of processing and memory requirements; and (ii the use of standard protocols, e.g., the need to minimize the amount of data exchanged between nodes. This paper provides a detailed overview of the security challenges related to the deployment of smart objects. Security protocols at network, transport, and application layers are discussed, together with lightweight cryptographic algorithms proposed to be used instead of conventional and demanding ones, in terms of computational resources. Security aspects, such as key distribution and security bootstrapping, and application scenarios, such as secure data aggregation and service authorization, are also discussed.

  12. Afghanistan: Post Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2017-01-12

    with the Taliban might erode post-2001 human rights gains. A component of U.S. policy to help establish a self- sustaining Afghanistan is to...since 2011. Because of the power of Islamist conservatives, alcohol is increasingly difficult to obtain in restaurants and stores, although it is...Afghanistan has been sustained by a number of factors, including (1) the small numbers of security forces in many rural areas; (2) logistical and other

  13. Toward Comprehensive Security Policy Governance in Collaborative Enterprise

    OpenAIRE

    Su, Ziyi; Biennier, Frédérique

    2011-01-01

    Part 2: Supply Chain Management; International audience; The development of collaborative service ecosystem relies mostly on software services spanning multiple organisations so to provide agile support for business applications, extending the IT Cloud paradigm to the business level. Nevertheless, a lack of trust on such cloud organisation and the rather poor adaptability level of the current security policies are often seen as braking forces to such XaaS economy development. Removing this im...

  14. Bahrain: Reform, Security, and U.S. Policy

    Science.gov (United States)

    2016-10-28

    destination country for migrant workers from South and East Asia, as well as some countries in Africa . Domestic workers are highly vulnerable to forced...for 21st Century Security and Intelligence, Policy Paper “No ‘ Plan B’: U.S. Strategic Access in the Middle East and the Question of Bahrain. June...Joint Comprehensive Plan of Action,” JCPOA) that most of the other Gulf Cooperation Council (GCC: Saudi Arabia, Kuwait, UAE, Bahrain, Qatar, and Oman

  15. Profiles of law enforcement agency body armor policies-A latent class analysis of the LEMAS 2013 data.

    Science.gov (United States)

    Liu, Weiwei; Taylor, Bruce

    2017-11-01

    The life-saving benefits of body armor have been well-documented, and law enforcement agency (LEA) body armor wear requirements have been cited by police officers as one of the most important reasons for them to wear body armor. However, research on LEAs' policies and practices regarding body armor is scarce. This study examined whether there are different agency-level profiles of various body armor-related policies, and related these body armor policy profiles to agency characteristics, size, location, etc. U.S. LEAs fell into four distinct profiles based on their body armor policies. Close to half of the LEAs had comprehensive coverage of body armor policies in all aspects. However, nearly one in five LEAs had very weak body armor policies in all aspects. The rest of the LEAs split into two groups, each with different strengths and weaknesses on selection, training, fitting, wearing, and inspection policies. Sheriff's offices and smaller LEAs were found to have weaker policies. In contrast, LEAs with a community policing emphasis and those with body armor grants were found to have stronger body armor polices, especially when it comes to mandatory wearing polices. Findings from the study provide a portrait of the current state of LEA body armor policies, and provide guidance for improving LEAs' body armor policies and practices.

  16. A New Method for Creating Efficient Security Policies in Virtual Private Network

    Science.gov (United States)

    Sadeghi, Mohammad Mehdi Gilanian; Mohd Ali, Borhanuddin; Pedram, Hossein; Deghan, Mehdi; Sabaei, Masoud

    One of the most important protocols for implementing tunnels in order to take action of secure virtual private network is IPsec protocol. IPsec policies are used widely in order to limit access to information in security gateways or firewalls. The security treatment, namely (Deny, Allow or Encrypt) is done for outbound as well as inbound traffic by security policies. It is so important that they adjust properly. The current methods for security policies creation as seen in given security requirements are not efficient enough i.e. there are much more created policies than requirements. In this paper, we define a new method to decrease adopted security policies for a specific set of security requirements without any undesirable effect. Our measurement shows that security policies creation will be improved efficiently, and their updating time will be decreased.

  17. 76 FR 40777 - Interim Enforcement Policy for Certain Fire Protection Issues

    Science.gov (United States)

    2011-07-12

    ...) involving a problem in an area such as engineering, design, implementing procedures, or installation if the............ Grants additional enforcement discretion so that licensees can use lessons learned from the pilot process...

  18. Liberty versus Security? EU Asylum Policy and the European Commission

    Directory of Open Access Journals (Sweden)

    Christian Kaunert

    2009-08-01

    Full Text Available The Common European Asylum System (CEAS experienced significant developments during the Tampere programme (1999 – 2004. This article analyses how security is constituted or viewed by the European Union in the area of asylum policy; more importantly how the European Commission, in the face of the emerging discourse on the ‘war on terror’ decided to push for a more inclusive agenda. Thus, the European Commission can (though not always does play a significant role in this process - the role of a supranational policy entrepreneur that enables the normative construction of a policy. The article analyses the high-profile case of the first phase of the CEAS, particularly the four main directives, its legal and political construction, and suggests the significance of the Commission in the political and normative process. Despite the challenges of the ‘war on terror’, the Commission managed to keep the CEAS within the limits of the Geneva Convention.

  19. A View of Food Security through A Policy Coherent Lens

    DEFF Research Database (Denmark)

    Robertson, Aileen

    2014-01-01

    strategies present a renewed opportunity to reduce stunted growth (both in economic and human terms).  Improvements in Climate Change and Green Growth can be achieved by the production of biodiverse foods that underpin human health; food and nutrition security; ecosystem resilience; sustainable livelihoods......, health services and care, allowing for a healthy and active life.” Nearly 200 million are chronically undernourished (stunted) and this number could double over next 15 years if development policies are not coherent. The food crisis in 2008 closely followed by the economic crisis drew stark attention...... adresses “food security” and “climate change”. By ensuring nutrition is explicit in their policies the agriculture, health, environment and education sectors can develop more coherent policies to prevent unintentional harm and achieve their goals. For example investing in gender equality can help to reduce...

  20. Immigration Enforcement Actions - Annual Report

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  1. Revised Interim Final Consolidated Enforcement Response and Penalty Policy for the Pre-Renovation Education Rule; Renovation, Repair and Painting Rule; and Lead-Based Paint Activities Rule

    Science.gov (United States)

    This is the revised version of the Interim Final Consolidated Enforcement Response and Penalty Policy for the Pre-Renovation Education Rule; Renovation, Repair and Painting Rule; and Lead-Based Paint Activities Rule.

  2. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    Science.gov (United States)

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  3. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  4. Russia's Security Policy since Putin's Munich Speech at the 2007 Munich Security Conference

    OpenAIRE

    Iwata, Kenji

    2007-01-01

    On February 10, 2007, at the Munich Conference on Security Policy, Russian President Vladimir Putin delivered the speech to attack the United States. He blamed it for fanning conflicts across the world through the unilateral hyper use of military force. He said America was trying to impose its standards on other nations, stimulating new arms races and the spread of nuclear weapons, and threatening Russia through new missile shield programmes. Russia and the US started to criticize each ot...

  5. THE FOREIGN AND SECURITY POLICIES OF THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Anand Menon

    2003-09-01

    Full Text Available In only a decade the European Union has moved from being a new kid on the block in terms of foreign and security policies to being a high profile and surprisingly effective international actor. Certainly, it has failed to match the ambitions of some of its most enthusiastic proponents. Certainly, too, European publics know next to nothing about what the Union does in the international realm. It is because of this that, despite their potential and their effectiveness to date, EU policies in this sphere were widely derided as failures following the moment when the attacks of 11 September 2001 shook the western world to its core. The Convention on the Future of Europe and subsequent intergovernmental conference look set to make significant institutional changes to the Union’s foreign and security policy systems. In undertaking these reforms, Convention members, and national governments are doubtless motivated by the laudable objective of enabling the Union to do more on the international stage. One can only hope that these motives notwithstanding, they do not simply propose reforms for their own sake and, in the process, undermine a system that, to the surprise of many, has continued to function respectably in an ever more complex and ever more dangerous world.

  6. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  7. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mónica Pinto

    2015-03-01

    Full Text Available Providing security and privacy to wireless sensor nodes (WSNs is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs.We evaluate our approach using a case study from the intelligent transportation system domain.

  8. Dynamic reconfiguration of security policies in wireless sensor networks.

    Science.gov (United States)

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-03-04

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs).We evaluate our approach using a case study from the intelligent transportation system domain.

  9. Information security policies for governmental organisations, the minimum criteria

    CSIR Research Space (South Africa)

    Ngobeni, SJ

    2009-07-01

    Full Text Available Information classification Security prior employment Security during employment Security at termination Facility security Equipment security Third party service delivery Protect against malicious, mobile code Protect electronic commerce services...

  10. Advanced Linux Security

    OpenAIRE

    Ranjit Nimbalkar

    2013-01-01

    Using mandatory access control greatly increases the secu-rity of an operating system. SELinux, which is an implemen-tation of Linux Security Modules (LSM), implements several measures to prevent unauthorized system usage. The se-curity architecture used is named Flask, and provides a clean separation of security policy and enforcement. This paper is an overview of the Flask architecture and the implementation in Linux.

  11. U.S. energy security: problems and policies

    Energy Technology Data Exchange (ETDEWEB)

    Toman, M.A

    2002-12-15

    The reemergence of concern about energy security in the wake of the September 2001 terror attacks amplified a theme that was already present in U.S. energy policy debates. Energy security was a central theme in the Bush administration energy policy report released by Vice President Cheney in the spring of 2001. World oil prices rose from about 10 dollar a barrel in 1998 to more than 30 dollar a barrel in late 2000. Prices trended down through most of 2001 to below 20 dollar a barrel, although the combined effect of improving economic conditions, OPEC supply cuts, and Middle East conflict (both actual and potential) have recently brought prices back into the dollar 25 per barrel neighborhood. In 2000 the United States imported almost 60 percent of the petroleum it consumed; imports from the Organization of Petroleum Exporting Countries (OPEC) made up about a quarter of total U.S. consumption. In previous energy security debates in the U.S., most of the attention has been on international oil markets and geopolitics. This time, even before September 11, the energy security debate had a much larger domestic component. The 2001 ''electricity market meltdown'' in California raised large concerns there and nationwide about the causes and consequences of electricity shortages and price volatility. The concerns run so deep that they are likely to have a significant effect on the ongoing debate about restructuring of the power sector though the nature of that effect remains to be determined. Similarly, periods of sharply rising motor fuels prices over the past few years increases well beyond what would be implied just by crude oil price volatility have led to concerns about the effects on households and commerce. All of these concerns are only amplified by worries about attacks on critical energy infrastructure. (author)

  12. The Distributional Impact of Social Security Policy Options.

    Science.gov (United States)

    Couch, Kenneth A; Reznik, Gayle L; Tamborini, Christopher R; Iams, Howard M

    2017-01-01

    Using microsimulation, we estimate the effects of three policy proposals that would alter Social Security's eligibility rules or benefit structure to reflect changes in women's labor force activity, marital patterns, and differential mortality among the aged. First, we estimate a set of options related to the duration of marriage required to receive divorced spouse and survivor benefits. Second, we estimate the effects of an earnings sharing proposal with survivor benefits, in which benefits are based entirely on earned benefits with spouses sharing their earnings during years of marriage. Third, we estimate the effects of adjusting benefits to reflect the increasing differential life expectancy by lifetime earnings. The results advance our understanding of the distributional effects of these alternative policy options on projected benefits and retirement income, including poverty and supplemental poverty status, of divorced and widowed women aged 60 or older in 2030.

  13. Implementation of the 1958 New York Convention in Several Asian Countries: The Refusal of Foreign Arbitral Awards Enforcement on the Grounds of Public Policy

    Directory of Open Access Journals (Sweden)

    Erman Radjagukguk

    2011-01-01

    Full Text Available The national character of public policy indicates that the decision is up to the court of national country concerned. Therefore, each country can rule whether public policy and its related issues are part of the country’s public policy. Courts around the world have recognized that Article V of the Convention is discretionary. The courts of Civil Law countries appear to be interpreting public policy broadly. This is quite evident from decisions made by courts in Indonesia, The People’s Republic of China, Japan and Korea. The Indonesian Court considered Article V (2 (b of the New York Convention which states that the court may deny the enforcement of an arbital award if enforcement would violate public policy of the place of enforcement. In addition, before the enactment of Law No. 30 of 1999 concerning Arbitration and Alternative Disptue Resolution, the Court referred to Indonesian Supreme Court Regulation No. 1 of 1999, which provides that the enforcement of foreign arbital awards in Indonesia imitatively applies to awards which do not violate public policy order in terms of all underlying principles of the Indonesian legal system and society. In Indonesia, Bakrie Brothers v. Trading Corporation of Pakistan Ltd., was the first case in which the Indonesian court rejected the enforcement of foreign arbital awards for the reason of violating public policy.

  14. 75 FR 25271 - Guidance for Industry and Food and Drug Administration Staff; Enforcement Policy Concerning...

    Science.gov (United States)

    2010-05-07

    ... Smokeless Tobacco; Availability AGENCY: Food and Drug Administration, HHS. ACTION: Notice. SUMMARY: The Food and Drug Administration (FDA) is announcing the availability of the guidance entitled ``Enforcement... to protect children and adolescents. One provision restricts the use of a trade or brand name of a...

  15. 76 FR 22802 - Interim Enforcement Policy for Minimum Days Off Requirements

    Science.gov (United States)

    2011-04-25

    ... fatigue is caused by consecutive days of restricted or poor quality sleep caused by such things as shift... fatigue management impede ``many safety-beneficial practices at plant sites, adversely the quality of life... agreements.'' The letter requests that the NRC ``exercise enforcement discretion from the provisions of the...

  16. Enforcement of Security and Privacy in a Service-Oriented Smart Grid

    DEFF Research Database (Denmark)

    Mikkelsen, Søren Aagaard

    The electricity grid will soon transform into the ``smart grid'' with the increasing integration of intermittent renewable energy sources such as wind energy and solar power. The smart grid vision is to achieve better efficiency, resilience and availability than the traditional electrical grid...... by applying a communication infrastructure between stakeholders. The residential sector uses a large share of the global electricity consumption and therefore has achieved a great deal of attention in this pursuit. Having a competitive smart grid market for Intelligent Automation Services (IASs) is one vision...... of creating incentives for residential consumers, grid operators and the service providers. However, this vision also creates privacy and security implications, since the IASs will depend on electricity data from the residential homes that potentially leaks sensitive information about the home and its...

  17. Effects of a natural community intervention intensifying alcohol law enforcement combined with a restrictive alcohol policy on adolescent alcohol use.

    Science.gov (United States)

    Schelleman-Offermans, Karen; Knibbe, Ronald A; Kuntsche, Emmanuel; Casswell, Sally

    2012-12-01

    Determining whether intensified inspections on alcohol retailers, combined with a policy withdrawing liquor licenses if retailers are fined twice per annum, is effective in reducing adolescents' odds to initiate weekly drinking and drunkenness. Causal pathways by which the intervention was assumed to work were tested. A longitudinal (2008, 2009, and 2010) quasi-experimental comparison group design including two Dutch communities, one intervention and one comparison, was used. Outcomes were assessed by following a cohort of 1,327 adolescents (aged 13-15 years at baseline). The intervention resulted in increased retail inspections but only seven sanctions and no repeated sanctions in 1 year. The intervention did not reduce adolescents' odds to initiate weekly drinking. Weekly drinking adolescents in the intervention community were at reduced risk to initiate drunkenness. This effect was not mediated by smaller increases in the frequency of adolescents' alcohol purchases or their perceived ease of purchasing alcohol. Intensified enforcement was effective in preventing adolescent drunkenness. No mediating causal pathways were detected. Effectiveness of enforcement could be increased by adopting enforcement methods with a high likelihood of apprehension, increasing social support for restrictive measures, and mobilizing the community to be more outspoken against adolescent (heavy) drinking. Copyright © 2012 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  18. 76 FR 67025 - Statement of Antitrust Enforcement Policy Regarding Accountable Care Organizations Participating...

    Science.gov (United States)

    2011-10-28

    ... Rural Health Clinics, as defined by the Social Security Act, are considered physician group practices.../MLNProducts/downloads/SoleCommHospfctsht508-09.pdf ; Social Security Act, 42 U.S.C. 1395ww(d)(5)(D)(iii) (2006... disorders of the musculoskeletal system and connective tissue--MDC 08). 2. Identify the zip codes that make...

  19. Tobacco Use Documenting Policy and Its Association with Pupils' Smoking and Their Perception of the Enforcement of School Smoking Bans in Finland

    Science.gov (United States)

    Saaristo, Vesa; Kulmala, Jenni; Raisamo, Susanna; Rimpelä, Arja; Ståhl, Timo

    2014-01-01

    Finnish national data sets on schools (N = 496) and pupils (N = 74,143; 14-16 years) were used to study whether a systematic documenting policy for the violations of school smoking bans was associated with pupils' smoking and their perceptions on the enforcement of smoking bans. Attending a school with a systematic documenting policy was…

  20. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available is then synthesised into sets of policy recommendation, with possible implementation mechanisms suggested in conclusion. 2. Elements of the approach from international trends 2.1 Estonian experience and approach In the case of Estonia, multiple botnets were used.... Multiple botnets (up to six) were involved in the attack; in excess of 400 million packets per second were aimed at Estonia. Websites were also defaced and much of the economy and governing of the country ground to a halt. Identifications of the culprits...

  1. ENERGY IN THE CONTEXT OF THE PRESENT CHALLENGES TO THE EUROPEAN COMMON SECURITY AND DEFENCE POLICY

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2014-10-01

    Full Text Available The Common Security and Defence Policy is a part of the European Union’s Common Foreign and Security Policy (CFSP and establishes the policy framework for the institutional structures and military instruments which have to deal with the security challenges in Europe’s geopolitical neighborhood. The article aims to identify and analyze the role of energy as one of the present challenges to the European Common Security and Defence Policy in the context of the recent events in the world economy.

  2. UAS on Main Street: Policy and Enforcement at the Local Level

    National Research Council Canada - National Science Library

    Alison Yakabe

    2015-01-01

    ...) are becoming more popular among hobbyists and businesses. UAS also pose a threat to homeland security as they could be used for nefarious activity such as preoperational surveillance or as weapons...

  3. National food security: a framework for public policy and international trade

    OpenAIRE

    Huchet-Bourdon, Marilyne; Laroche-Dupraz, Catherine

    2014-01-01

    This paper does not set out to redefine and re-explain the food security concept, but to look into the links between food security and international trade. First, we propose a conceptual framework to sum up the relationships between food security, international trade and public policies. Second, we check whether the widely used food security indicators are really suited to monitoring the impacts of government interventions and external trade shocks on the food security level. We use the Bonil...

  4. 287(g): Cross-Delegating State and Local Law Enforcement Officers with Federal Immigration Authority - Homeland Security Remedy or Rue?

    National Research Council Canada - National Science Library

    Lines, Jonathan L

    2008-01-01

    As a result of the federal government's shortcomings in thwarting illegal immigration, state and local law enforcement agencies are now largely shouldering the problem of criminal activity associated...

  5. Transforming Symbolic Law into Organizational Action: Hate Crime Policy and Law Enforcement Practice

    Science.gov (United States)

    Grattet, Ryken; Jenness, Valerie

    2008-01-01

    For decades sociologists, criminologists, political scientists and socio-legal scholars alike have focused on the symbolic and instrumental dimensions of law in examinations of the effects of social reform and policy implementation. Following in this tradition, we focus on the relationship between hate crime policy and hate crime reporting to…

  6. Transgovernmental Networks in the European Security and Defense Policy

    Directory of Open Access Journals (Sweden)

    Bastien Irondelle

    2010-08-01

    Full Text Available An increasing number of authors describe the European Union as an advanced form of transgovernmentalism. Whether called Europeanization, supranational intergovernmentalism, multilevel governance, administrative fusion or Brusselisation, the transgovernmentalist thesis states that European politics is shaped by the growing interaction of national government officials at every level of the decision-making process. This paper tests the transgovernmentalist thesis by looking at patterns of formal and informal cooperation in the framework of the European Security and Defence Policy (ESDP. The data is based on a questionnaire circulated among 73 defence officials in France, Germany, the United Kingdom and Brussels-based institutions. The results are analyzed through social network analysis. We find that the governance of ESDP is characterized by a weak form of transgovernmentalism, in which cross-border links do exist but formal state actors occupy strategic positions. In particular, two groups display transgovernmental features: a core policy group of crisis management and capability development officials in and around the Council, and a Franco-German group of capital-based defence actors.

  7. Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy Compliance

    Science.gov (United States)

    Mutchler, Leigh Ann

    2012-01-01

    The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…

  8. A Security-Awareness Virtual Machine Management Scheme Based on Chinese Wall Policy in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Si Yu

    2014-01-01

    Full Text Available Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM management. The security-awareness VMs management scheme (SVMS, a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR and aggressive in ally with relation (AIAR to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  9. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.

    Science.gov (United States)

    Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  10. Computer Network Security- The Challenges of Securing a Computer Network

    Science.gov (United States)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  11. private military and security companies: ethics, policies and civil ...

    African Journals Online (AJOL)

    hennie

    security companies form an rising and real feature within the daily life of individuals, communities and states of the international system. International, regional and national security, as well as the security of the individual is increasingly entwined in services provided by private military and security contractors. The editors ...

  12. 'Excuse me, sir. Please don't smoke here'. A qualitative study of social enforcement of smoke-free policies in Indonesia.

    Science.gov (United States)

    Kaufman, Michelle R; Merritt, Alice Payne; Rimbatmaja, Risang; Cohen, Joanna E

    2015-10-01

    District policies were recently put into place in Indonesia prohibiting smoking in public spaces. This study sought to (1) assess participants' general knowledge of secondhand smoke (SHS) dangers; (2) assess participants' awareness of and specific knowledge of smoke-free (SF) policies; and (3) assess the extent to which such policies are socially enforced and gather examples of successful social enforcement. Qualitative in-depth interviews and focus group discussions were conducted in Bogor and Palembang cities with both community members and key informants such as government officials, non-government agency staff, religious leaders and health workers. Participants in both Palembang and Bogor find SF policy important. Although there was awareness of SHS dangers and SF policies, accurate knowledge of the dangers and an in-depth understanding of the policies varied. There was a high level of support for the SF policies in both cities among both smokers and non-smokers. Many participants did have experience asking a smoker not to smoke in an area where it was restricted, even if their comfort in doing so varied. There was, however, a higher level of comfort in telling smokers to stop or to move away from pregnant women and children. Hesitation to socially enforce the policies was especially present when asking men of status and/or community leaders to stop smoking, but overall participants felt they could comfortably ask someone to obey the law. Palembang and Bogor may be evolving towards creating social norms in support of prohibiting smoking in public spaces. If provided with more support from government and law officials, such as government officials themselves promoting the policies and demonstrating compliance, and renewed efforts to promote and enforce policies in general were made, Indonesians in these cities may feel more confident protecting non-smokers from SHS. Published by Oxford University Press in association with The London School of Hygiene and

  13. Network Controlled Mobility Management with Policy Enforcement towards IMT-A

    DEFF Research Database (Denmark)

    Klockar, Annika; Mihovska, Albena D.; Luo, Jijun

    2008-01-01

    This paper introduces a framework of mobility management and call-handling based on policy en-hancement towards the IMT-A system. The function al-location and several selected mechanisms for the frame-work are described with analysis.......This paper introduces a framework of mobility management and call-handling based on policy en-hancement towards the IMT-A system. The function al-location and several selected mechanisms for the frame-work are described with analysis....

  14. Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies

    Science.gov (United States)

    2005-07-01

    Services Symposium, AAAI 2004 Spring Symposium Series, Stanford California. [25] A P3P Preference Exchange Language 1.0 (APPEL1.0). W3C Working Draft...15 April 2002, http://www.w3.org/TR/ P3P -preferences/ [26] OWL-S: Semantic Markup for Web Services, W3C Submission Member Submission, November 2004

  15. A formal basis for the design and analysis of firewall security policies

    Directory of Open Access Journals (Sweden)

    Ahmed Khoumsi

    2018-01-01

    Full Text Available A firewall is the core of a well defined network security policy. This paper presents an automata-based method to study firewall security policies. We first propose a procedure that synthesizes an automaton that describes a security policy given as a table of rules. The synthesis procedure is then used to develop procedures to detect: incompleteness, anomalies and discrepancies in security policies. A method is developed to represent the automaton by a policy qualified as mixable and that has practical utilities, such as ease to determine the whitelist and the blacklist of the policy. The developed procedures have been deeply evaluated in terms of time and space complexities. Then, a real case study has been investigated. The obtained results confirm that the developed procedures have reasonable complexities and that their actual execution times are of the order of seconds. Finally, proofs of all results are provided.

  16. Police Enforcement Policy and Programmes on European Roads (PEPPER). Deliverable 4a: Good practice in data, data collection and data use for monitoring and evaluating Traffic Law Enforcement.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. Bernhoft, I.M. Erke, A. Ewert, U. Kallberg, V.-P. & Skladana, P.

    2008-01-01

    This report is the Deliverable of task 4.3a of the PEPPER project. It describes the good practice requirements regarding data, data collection and data use for monitoring and evaluating Traffic Law Enforcement (TLE). The aim is that, eventually, individual police forces/countries put the identified

  17. 77 FR 53893 - Privacy Act of 1974; Department of Homeland Security U.S. Immigration and Customs Enforcement-005...

    Science.gov (United States)

    2012-09-04

    ..., law enforcement, immigration, intelligence, or other functions consistent with the aforementioned... value of trade goods; country of origin/export; description and/or value of financial transactions... liaison channels to selected foreign governments, in order to provide intelligence, counterintelligence...

  18. 287 (g) cross-delegating state and local law enforcement officers with federal immigration authority -- homeland security remedy or rue?

    OpenAIRE

    Lines, Jonathan L.

    2008-01-01

    CHDS State/Local As a result of the federal government's shortcomings in thwarting illegal immigration, state and local law enforcement agencies are now largely shouldering the problem of criminal activity associated with illegal immigration. Section 287(g) of the INA allows state and local police to actively participate in immigration enforcement, but has raised concerns about how to balance public safety with concerns of a "chilling effect" on the immigrant community. This thesis su...

  19. Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies

    OpenAIRE

    Fleming, Charles

    2013-01-01

    Protecting data from accidental loss or theft is crucial in today's world ofmobile computing. Data Tethers provides environmental policy control of information at the data level, rather than the file level. Data Tethers uses dynamic recompilation to add label tracking instructions to existing applications in the OpenSolaris operating system, allowing fine-grain data flow tracking in legacy applications without the need to recompile from source. We demonstrate the system's feasibility with mi...

  20. A Study of Computer Security Policies for the Indonesian Navy

    Science.gov (United States)

    1993-06-01

    The Indonesian Navy recognized the need for a computer security program over ten years ago. They published their first computer security regulation...terrorist, and disgruntled employees. This thesis demonstrates the need for an updated computer security regulation. To add in meeting that need, the thesis

  1. Computer Security Policy Issues: From Past Toward the Future

    Science.gov (United States)

    1987-12-01

    Subsequent to the presentation of the material in this paper but prior to its publication, the Senate passed H.R. 145 ( Computer Security Act of 1987...Standards) have a greater role in computer security . The Act also makes various other provisions for accommodating computer security throughout the federal

  2. Immigration Enforcement Actions: Fiscal Year 2005

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  3. Immigration Enforcement Actions: Fiscal Year 2007

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  4. Immigration Enforcement Actions: Fiscal Year 2009

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  5. Immigration Enforcement Actions: Fiscal Year 2011

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  6. Immigration Enforcement Actions: Fiscal Year 2010

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  7. Immigration Enforcement Actions: Fiscal Year 2006

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  8. Immigration Enforcement Actions: Fiscal Year 2008

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  9. Immigration Enforcement Actions: Fiscal Year 2012

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  10. Immigration Enforcement Actions: Fiscal Year 2004

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  11. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  12. Europol’s Cybercrime Centre (EC3), its Agreements with Third Parties and the Growing Role of Law Enforcement on the European Security Scene

    DEFF Research Database (Denmark)

    Vendius, Trine Thygesen

    2015-01-01

    The European Cyber Crime Centre, EC3, established under the umbrella of Europol, started operations on January 1 2013. It is to act as the focal point in the fight against cybercrime in the European Union. Using a “shared, cross-community approach” the EC3 is concluding partnerships with member...... states, European agencies, international partners and the private sector. This article describes the coming about of EC3 and its efforts to address cybercrime. Furthermore, the article is an attempt to assess the growing role of the European law enforcement community on the European security scene...

  13. What explains the change of european security policy? : an analysis of European security and defence policy (ESDP) after september 11th 2001

    OpenAIRE

    Haugsdal, Roar

    2005-01-01

    The focus and aim of this thesis is to explain the mechanisms that lead to a change in European Security and Defence Policy (ESDP) after September 11th 2001. Since ESDP was declared operational in Laeken in December 2001 there have been several changes which in sum seem to indicate that the EU now has the tools and the capabilities to act as a security policy actor on its own. The treaty of Nice, which was implemented in 2003, provided ESDP with new agencies and institutions. In 2003, the Ber...

  14. Turkey's East Asian Policy: From Security Concerns to Trade Partnerships

    National Research Council Canada - National Science Library

    Selçuk Çolakoglu

    2012-01-01

      Turkey's Asian policy entered a new period after the Second World War as Ankara began to establish relations with East Asian countries,1 based upon its own foreign policy vision and economic capacity...

  15. (Inefficiency of EU Common Foreign and Security Policy: Ukraine, Brexit, Trump and beyond

    Directory of Open Access Journals (Sweden)

    Filipec Ondřej

    2017-10-01

    Full Text Available The main aim of this article is to explore and analyze key determinants of EU Common Foreign and Security Policy efficiency. For this purpose a 3C analytical approach is used, exploring EU foreign and security policy consistency, capacities and the dimension of cooperation. Article analyzes both horizontal and vertical, consistency of EU Foreign and Security policy especially with connection to Ukraine crises and diverging interests of EU member states. EU capacities are explored with main focus on military spending and challenges related to limited spending. EU military decline is put in contrast with new emerging regional powers. In the area of cooperation article is dedicated mainly to ineffective partnership with Turkey, cold attitude of Trump administration towards Europe and the implications of Brexit for EU foreign and security policy.

  16. INTERNAL MARKET GOVERNMENT SECURITIES IN PROMOTING THE EFFICIENCY OF DEBT POLICY OF UKRAINE

    Directory of Open Access Journals (Sweden)

    K. Kuryshchuk

    2014-01-01

    Full Text Available The article analyzes the effectiveness of debt policy of Ukraine, to its shortcomings and implications for the economy. The evaluation of the domestic government securities market and its impact on the efficiency of debt management.

  17. Composing Alternatives to a National Security Language Policy

    Science.gov (United States)

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  18. Expanding the Proliferation Security Initiative: A Legal and Policy Analysis

    Science.gov (United States)

    2010-02-01

    13 Sharp, Walter G. “Proliferation Security Initiative: The Legacy of Operacion Socotora.” 16 Transnational Law and...Gregory S. Jones. U.S. Combat Commands’ Participation in the Proliferation Security Initiative: A Training Manual . Washington, DC: RAND National Defense

  19. 15 CFR 758.7 - Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs...

    Science.gov (United States)

    2010-01-01

    ... EAR. Officials of BIS, the Office of Export Enforcement, the U.S. Customs Service and postmasters... with the EAR. This includes assuring that: (1) Exports without a license issued by BIS are either..., correspondence, and any other relevant documents, as well as furnish other information bearing upon a particular...

  20. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    Science.gov (United States)

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  1. Police Enforcement Policy and Programmes on European Roads (PEPPER). Workpackage WP4 `Good Practices in Traffic Enforcement', Working paper 24: Good practice in data and data collection for monitoring and evaluating traffic law enforcement.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. van Bernhoft, I.M. Erke, A. Ewert, U. Kallberg, V.-P. & Skladana, P.

    2007-01-01

    This working paper describes the good practice requirements regarding data and data collection for monitoring and evaluating Traffic Law Enforcement (TLE). The aim is at, eventually, individual police forces/countries put the identified ’good practice’ data into a European TLE monitoring database

  2. Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems

    NARCIS (Netherlands)

    Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir; Barthe, Gilles; Markatos, Evangelos; Samarati, Pierangela

    2016-01-01

    A crucial question for an ICT organization wishing to improve its security is whether a security policy together with physical access controls protects from socio-technical threats. We study this question formally. We model the information flow defined by what the organization’s employees do (copy,

  3. Critical water requirements for food, methodology and policy consequences for food security

    NARCIS (Netherlands)

    Gerbens-Leenes, P.W.; Nonhebel, S.

    2004-01-01

    Food security and increasing water scarcity have a dominant place on the food policy agenda. Food security requires sufficient water of adequate quality because water is a prerequisite for plant growth. Nowadays, agriculture accounts for 70% of the worldwide human fresh water use. The expected

  4. From food aid to food security: the case of the safety net policy in Ethiopia

    NARCIS (Netherlands)

    Bishop, C.; Hilhorst, D.

    2010-01-01

    Ethiopia's Productive Safety Net Programme (PSNP) is an attempt to bring food security to 5 million people by providing them with social security to close the yearly hunger gap, coupled with development projects to lift them permanently out of poverty. The programme is an example of the new policy

  5. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  6. The Paradox of German Foreign and Security Policy: With Respect to National Energy Security

    Science.gov (United States)

    2009-05-21

    in reality need motivations to be imposed. In his opinion, only the absence of true interests that enforced actions allowed the genocide in Ruanda ...being independent from transit countries. Public statements of the Polish Defense Minister Radek Sikorski in May 2006 46 clearly show, that not only

  7. Risk Management as Strategic Change in National Homeland Security Policy

    Science.gov (United States)

    2007-09-01

    chairman of the House Appropriations, Subcommittee on Homeland Security who said, “Without a comprehensive and current inventory of our Nation’s...are severely hampered.” 151 Such an inventory cannot be developed without active involvement from state and local officials and the private sector...Security, 2006. . National Infrastructure Pr . “National Protection and Programs Directorate – Office of Risk Managemen and Ana ———. National Strategy

  8. A Biological Security Motivation System for Potential Threats: Are There Implications for Policy-Making?

    Directory of Open Access Journals (Sweden)

    Erik Z Woody

    2013-09-01

    Full Text Available Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates behaviours to probe the potential danger, such as checking, and to correct for it, such as washing. Engagement in these behaviours serves as the terminating feedback for the activation of the system. Because security motivation theory makes predictions about what kinds of stimuli activate security motivation and what conditions terminate it, the theory may have applications both in understanding how policy-makers can best influence others, such as the public, and also in understanding the behavior of policy-makers themselves.

  9. Enforcement handbook: Enforcement of DOE nuclear safety requirements

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department`s enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion.

  10. Extending key sharing: how to generate a key tightly coupled to a network security policy

    Science.gov (United States)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  11. Reducing the Threat of Terrorism through Knowledge Sharing in a Virtual Environment Between Law Enforcement and the Private Security Industry

    National Research Council Canada - National Science Library

    Gallagher, Jerry P

    2008-01-01

    Each day approximately 6,800 members of the private security workforce are deployed across Kansas City to provide protection services at venues, many of which have been identified as being critical...

  12. The doctrine of human security in Canadian foreign policy: Lloyd Axworthy’s contribution to the study of world policy

    Directory of Open Access Journals (Sweden)

    Jonathan Ortiz Navarrete

    2003-01-01

    Full Text Available The multitude of changes on the international scene during the 1990’s had a major impact on thinking in the area of international relations as well as on the foreign policy decision-making processes of all nation states. One of the most difficult issues to redefine and to give a meaning appropriate to the international needs of the moment was that of security. Lloyd Axworthy, Canada’s Minister of Foreign Affairs from 1996 to 2000, convinced that, with the end of bipolarity, the challenges to security had moved from the level of states to concerns more closely related to the well-being of individuals, undertook the task of promoting, as part of his country’s foreign policy, the concept of human security.

  13. Workshop on Scientific Analysis and Policy in Network Security

    Science.gov (United States)

    2010-09-10

    reducing the burden, to Department of Defense. Washington Headquarters Services, Directorate * focJnformation Operations and Reports (0704-0188), 1215...2001) 15. Mardare, R., Priami, C, Quaglia, P., Vagin , O.: Model checking biological systems described using ambient calculus. Computational Methods...order to increase the performance of performing secure communication between group members. This means for instance that the routing information is

  14. Private military and security companies policy in Africa

    African Journals Online (AJOL)

    Gwatiwa Tshepo

    to the United Nations (UN) in Somalia. They also provide services to international military organisations such as the North Atlantic Treaty Organization (NATO) and the United States Africa Command (US AFRICOM) in Sudan, Somalia and West. Africa. All the aforementioned are the major international security partners of the.

  15. Identifying the Enemy: Social Categorization and National Security Policy

    Science.gov (United States)

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  16. The Value of a European Security and Defense Policy

    Science.gov (United States)

    2007-05-08

    charter_for_european_security.htm-accessed 29.October 2006. 54 For a more comprehensive decription see Andreas Berns and Harald Rondholz, „Die OSZE“,Bundesakademie fuer...58 See: Krause, Joachim, Wenger, Andreas and Watanabe, Lisa (Edited), “Unraveling the...declared 75 NATO Secretary General Jaap de Hoop Scheffer in a speech at the Humboldt

  17. 12 CFR 344.8 - Securities trading policies and procedures.

    Science.gov (United States)

    2010-01-01

    ... responsibility for supervision of all officers or employees who: (i) Transmit orders to or place orders with... respect to all officers or employees who process orders for notification or settlement purposes, or...) For the fair and equitable allocation of securities and prices to accounts when orders for the same...

  18. Baltic dimension of the European security and defence policy

    Directory of Open Access Journals (Sweden)

    M. L. Gladysh

    2015-03-01

    The basic threats and security challenges for the Baltic States nowadays are defined, including possible aggression from Russia, which is broadcasted through the mainstream media as a reaction to the idea of protecting Russian­speaking population of the Baltic States and the establishment of «geopolitical balance through their return to the Russian sphere of influence».

  19. Linking research and food security policies in MENA | CRDI - Centre ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    At IDRC, I initially worked on reducing the demand for water in the Middle East and North Africa (MENA). More recently, I coordinated a regional KariaNet program to improve agriculture and rural development by sharing knowledge among researchers, farmers, and civil society. MN: What are the biggest food security ...

  20. Support for Multi-Level Security Policies in DRM Architectures

    NARCIS (Netherlands)

    Tanenbaum, A.S.; Popescu, B.C.; Crispo, B.; Hempelmann, C.F.; Raskin, V.

    2004-01-01

    Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no easy task, given that content needs to be protected while accessed through electronic devices in the hands of

  1. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  2. Information security in academic libraries: the role of the librarian in planning and introducing institutional policies

    Directory of Open Access Journals (Sweden)

    Juliana Soares Lima

    2017-04-01

    Full Text Available This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.

  3. Food security policies and family farm in Brazil: actors, ideas and institutions

    Directory of Open Access Journals (Sweden)

    Georges FLEXOR

    2016-12-01

    Full Text Available This article analyzes the formulation of two food security policies –the Food Acquisition Program (aap and the National School Food Program (neap– emphasizing the role of ideas, interests and institutions. The establishment of aap dates back to the 2003, a period characterized by the implementation of the policy Fome Zero (Zero Hunger, a public action which was the flagship of Luiz Inácio «Lula» da Silva first mandate policies to fight poverty. This program aims to promote food security based on family farm supply. These ideas, the actors and the institutions that have shaped this policies were also the basis for the reformulation of the neap. In this sense, this article provides not only an analysis of two policies that are the object of transfer to other countries (Latin America and Africa, but also a «portrait» –limited, but informative– of a political juncture of Brazilian history. 

  4. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    National Research Council Canada - National Science Library

    Dan Constantin Tofan; Maria Lavinia Andrei; Lavinia Mihaela Dinca

    2012-01-01

    .... The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations...

  5. Poverty, Security and Social Assistance: Challenges of Brazilian Social Policy

    Directory of Open Access Journals (Sweden)

    Ana Paula Ornellas Mauriel

    2010-01-01

    Full Text Available This article presents partial results of a study about anti-poverty programs in Brazil. The main contribution of the text is that it relates certain characteristics of the anti poverty programs to theoretical categories that have influenced the debate about social policy in the contemporary context. Special attention is given to the relation of these programs with national social assistance policy. The article begins from the hypothesis that the logic that had inspired the construction of social policies was reconsidered, based on a transformation in the theoretical understanding of the social issue and of ways to confront it. This change appears in the texts in the priority given to poverty as a category of analysis, which is understood as an absence of capacities. This theoretically and methodologically configures an individualistic perspective on social issues, the principal theoretical source for which is the thinking of Amartya Sen.

  6. Challenges of EU Security on the Example of Cybeterrorism Policy

    Directory of Open Access Journals (Sweden)

    Izabela Oleksiewicz

    2015-06-01

    Full Text Available In addition to traditional threats to information as spying or leaking state secrets and business secrets appeared the new threats, among which the most dangerous is cyberterrorism. Taking into account the problems of cyber-terrorism, includes, in particular, the analysis of legislation aimed at ensuring the security of information systems of individual countries particular, this subject should be also recognized as requiring at the present time the insightful analysis. Therefore, this publication is an attempt of characteristics the determinants of this phenomenon and analysis of the latest legal solutions in the fight against cyber terrorism within the European Union. Moreover, it was made the attempt to find an answer to the question whether the current legal solutions of the European Union in the area of security are an effective tool in the fight against cyberterrorism.

  7. Security Personnel Practices and Policies in U.S. Hospitals: Findings From a National Survey.

    Science.gov (United States)

    Schoenfisch, Ashley L; Pompeii, Lisa A

    2016-06-27

    Concerns of violence in hospitals warrant examination of current hospital security practices. Cross-sectional survey data were collected from members of a health care security and safety association to examine the type of personnel serving as security in hospitals, their policies and practices related to training and weapon/restraint tool carrying/use, and the broader context in which security personnel work to maintain staff and patient safety, with an emphasis on workplace violence prevention and mitigation. Data pertaining to 340 hospitals suggest security personnel were typically non-sworn officers directly employed (72%) by hospitals. Available tools included handcuffs (96%), batons (56%), oleoresin capsicum products (e.g., pepper spray; 52%), hand guns (52%), conducted electrical weapons (e.g., TASERs®; 47%), and K9 units (12%). Current workplace violence prevention policy components, as well as recommendations to improve hospital security practices, aligned with Occupational Safety and Health Administration guidelines. Comprehensive efforts to address the safety and effectiveness of hospital security personnel should consider security personnel's relationships with other hospital work groups and hospitals' focus on patients' safety and satisfaction. © 2016 The Author(s).

  8. Distribution of Responsibility for Social Security and Labour Market Policy

    DEFF Research Database (Denmark)

    Madsen, Per Kongshøj

    It is shown that legislation of unemployment insurance and active labour market policy is set by the national government. Legislation with respect to employment protection, however, is largely left to the social partners, i.e. the dismissal of salaried workers is regulated by a special piece...... of national law, while the rules for blue-collar workers are defined as part of the negotiations between the social partners. The Danish system of unemployment insurance and active labour market policy is a two-tier system: unemployment insurance for members of unemployment insurance funds and social...

  9. How social security policies and economic transformation affect poverty and inequality: Lessons for South Africa

    DEFF Research Database (Denmark)

    Ulriksen, Marianne

    2012-01-01

    This article examines how various characteristics of social and economic policy frameworks affect poverty and inequality levels in developing countries, principally in Botswana and Mauritius. The research findings suggest that poverty and inequality are lower in countries with generous and broad......-based – rather than pro-poor – social security policies, and where social policies are complemented by economic policies promoting economic transformation rather than mere economic growth. While South Africa’s challenges of combating poverty and inequality are shaped by its own historical context, the lessons...

  10. US oil policy and energy security; Politique petroliere americaine et securite energetique

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    2002-05-15

    Although the energy dependence reached its historical maximum and will continue to increase for the next 20 years, the USA keep their oil policy. For the economist this policy is reasonable because of the poor room for the US imports reduction costs. To explain these conclusions the author discusses on the following topics: the links between the oil dependence and the energy security, the oil policy after Reagan, the oil policy evolution - or no evolution - facing the increasing dependency and the Cheney report. (A.L.B.)

  11. US Policy Options Mitigating Venezuelan Sponsored Security Challenges

    Science.gov (United States)

    2009-03-12

    Democratic Action Party (Accion, Democratica - AD) and the Social Christian Party (Comite de Organizacion Politica Electoral Independiente-COPEI...labor conflicts between “Chavista” (pro-Chavez) labor unions and private firms, triggering work stoppages  Irresponsible fiscal policies that fueled

  12. America’s Energy Security Policy: Goals for 2025

    Science.gov (United States)

    2007-02-01

    vehicles. The promise of hydrogen technology is too great to ignore. In his 1874 novel, The Mysterious Island, Jules Verne described a world in...The Reference Shelf, Energy Policy, volume 74, Number 2 (H. W. Wilson, February 2002), 3-4. 75 Jules Verne , The Mysterious Island, 1874, original

  13. The National Security Doctrine and Policies of the Brazilian Government.

    Science.gov (United States)

    1977-07-15

    author of The Afro -Asian Dimension of Brazilian Foreign Policy, 1956-1972 (1974). Dr. Seicher contributed chapters to current Themes In African Historical...No. 163, 1976, p. 64. • 10. Sanders, p. 3. • II. “Geisel diz a estagi~rios da ESG que segurança é problema geral da Naclo,” - - Jomildo Brtuil, August

  14. Private military and security companies policy in Africa

    African Journals Online (AJOL)

    Gwatiwa Tshepo

    50 This shows that the AU considers PMSCs to be mercenaries operating under a corporate cloak. The fact that such a policy position was taken seven years since the Iraqi and Afghan wars and three years since NATO's use of PMSCs in its.

  15. Kuwait: Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-12-01

    18 Terrorism Financing Issues...question the Crown Prince. In typical Kuwaiti cabinets, most of the key ministries (defense, foreign policy, and finance ) are led by Sabah family...Christian churches to serve the approximately 750,000 Christians (mostly foreign residents) in Kuwait: Protestant, Roman Catholic, Greek Catholic (Melkite

  16. Leadership From the Centre: A New Foreign and Security Policy for Germany

    Science.gov (United States)

    2016-03-01

    been a core of its foreign policy, and this fact remains true even today in a globalized world of interlocking crises and German and European interest...would also like to extend my warm appreciation to the professors of the Department of National Security Affairs for greatly expanding my knowledge of...it announces to the world that Germany recognizes that it has to assume more responsibility in maintaining global security in the new world order

  17. Should Cops Be Spies? Evaluating the Collection and Sharing of National Security Intelligence by State, Local and Tribal Law Enforcement

    Science.gov (United States)

    2013-03-01

    more in depth discussion. 7 were civilian or military, the threat to their domains, legislative mandates and frequently political considerations... political considerations will continue to affect the efficient collection and sharing of classified domestic national security intelligence...police forces to private enterprises” (p. 198). Both Crumpton and Fathali Moghaddam have postulated globalization as a meme that has created new

  18. 75 FR 5614 - Privacy Act of 1974; Department of Homeland Security/ALL-025 Law Enforcement Authority in Support...

    Science.gov (United States)

    2010-02-03

    ... governing the means by which the United States Government collects, maintains, uses and disseminates... marks such as tattoos, scars, etc; Height and weight; Eye and hair color; Biometric data; ] Home address... or on paper in secure facilities in a locked drawer behind a locked door. The records are stored on...

  19. 75 FR 412 - Privacy Act of 1974; Department of Homeland Security U.S. Immigration and Customs Enforcement-001...

    Science.gov (United States)

    2010-01-05

    ... termination information; transfer information; leave of absence information and study abroad; extensions... Law 107-56, USA PATRIOT Act; and Public Law 107-173, Enhanced Border Security and Visa Entry Reform... working on a contract, service, grant, cooperative agreement, or other assignment for DHS, when necessary...

  20. Agricultural Trade Policies and Food Security: Is there a Causal Relationship?

    OpenAIRE

    Emiliano Magrini; Pierluigi Montalbano; Silvia Nenci; Luca Salvatici

    2014-01-01

    The aim of this paper is to assess the causal impact of trade policy distortions on food security. The added value of this work is twofold: i) its use of a non-parametric matching technique with continuous treatment, namely the Generalised Propensity Score (GPS) to address the self selection bias; ii) its analysis of heterogeneity in treatment (by commodities) as well as in outcome (i.e. different dimensions of food security). The results of our estimates clearly show that trade policy distor...

  1. National Security and the Industrial Policy Debate: Modernizing Defense Manufacturing

    Science.gov (United States)

    1991-05-01

    industry. LEADERSHIP , VISION, AND PUBLIC BEHAVIOR The public debate over issues of industrial policy and the outcome of that debate are important to...Press, 1990) 123. 2. Ronald A. Heifetz and Riley M. Sinder, "Political Leadership : Managing the Public’s Problem Solving," The Power of Public Ideas...Beyond the Trade Deficit." Science 15 July 1988. Heifetz, Ronald A. and Riley M. Sinder. "Political Leadership : Managing the Public’s Problem Solving

  2. Bahrain: Reform, Security, and U.S. Policy

    Science.gov (United States)

    2014-03-24

    international community, calling it “consistent with [Bahrain’s] stances and policies which advocate diplomatic solutions to maintain stability...independence, but some Arab governments sharply criticized the comments; Morocco broke relations with Iran. At the same time, Bahrain, like the other GCC... Unemployment Rate 15% GDP Real Growth Rate 3.9% in 2012 Size of Bahrain Defense Forces (BDF) About 13,000, plus about 1,200 National Guard. Some personnel

  3. The effects of a social media policy on pharmacy students' facebook security settings.

    Science.gov (United States)

    Williams, Jennifer; Feild, Carinda; James, Kristina

    2011-11-10

    To examine how students entering a doctor of pharmacy (PharmD) program used Facebook privacy settings before and after the college's social media policy was presented to them. The Facebook profiles of all entering first-year pharmacy students across 4 campuses of a college of pharmacy were evaluated. Ten dichotomous variables of interest were viewed and recorded for each student's Facebook account at 3 time points: before the start of the semester, after presentation of the college's social media policy, and at the end of the semester. Data on whether a profile could be found and what portions of the profile were viewable also were collected. After introduction of the policy, a significant number of students increased their security settings (made information not visible to the public) related to Facebook walls, information pages, and links. Making pharmacy students aware of a college's social media policy had a positive impact on their behaviors regarding online security and privacy.

  4. RUSSIA’S FOOD SECURITY POLICY IN THE ARCTIC

    Directory of Open Access Journals (Sweden)

    Svetlana Alekseevna Trofimova

    2017-10-01

    Full Text Available The article analyzes current food security issues across the Russian Arctic, which were considered at the International Arctic Forum «ARCTIC: Territory of Dialogue» on March 29–30, 2017 and at the International Scientific and Practical Conference «Technologies of Social, Economic and Logistic Processes of the Arctic zone of Russia: History and Modernity» held at the Krasnoyarsk State Agrarian University on March 30–31, 2017. Particular attention is drawn to the practical provision of certain areas with basic agricultural products. Measures are proposed for the active involvement of the population of Arctic territories and indigenous peoples of the Far North in self-sufficiency of food with the use of products of traditional nature management of indigenous peoples. The complex approach to supplying the population of the northern territories of the Siberian Arctic with balanced food in accordance with the directions of food security in the world elaborated by the UN in the Millennium Declaration is substantiated.

  5. Effect of Policy Interventions on Food Security in Tigray, Northern Ethiopia

    Directory of Open Access Journals (Sweden)

    Anne van der Veen

    2011-03-01

    Full Text Available Following the design of a conservation-based agricultural development strategy and food security strategy, the Tigray government has implemented different pro-poor development programs over the past years to address the problems of food security. This study attempts to investigate the effectiveness of government policy interventions at different scales addressed to improve food security. Food security both at the regional and district level was investigated by deriving food balance sheets for the period 2000-2008. An empirical analysis based on a logit model was also employed to analyze household level food security status. The results of the logit model reveal that government policy interventions such as water harvesting schemes, employment generation schemes, and promotion of technology adoption significantly contribute to a higher likelihood of household food security status. The findings of the food balance sheet also indicate that the region has made some impressive development gains in improving regional food self-sufficiency, indicating the importance of government interventions in improving food security both at the household and regional level.

  6. U.S. security policy in Asia after Korean unification

    OpenAIRE

    Ahern, Bryan M

    1997-01-01

    Approved for public release; distribution is unlimited The U.S. has pursued three policy objectives in Asia since World War II. They are 1) freedom of the seas; 2) access to the markets of the region; and 3) preventing the domination of the region by any single power. To achieve these goals, the U.S. has committed to maintain 100,000 forward deployed troops in Asia. Currently, 37,000 are stationed in South Korea. North Korea is in crisis. Seven years of negative GDP growth, severe food sho...

  7. Big Data and security policies: : Towards a framework for regulating the phases of analytics and use of Big Data

    NARCIS (Netherlands)

    Broeders, Dennis; Schrijvers, Erik; van der Sloot, Bart; van Brakel, Rosamunde; de Hoog, Josta; Hirsch Ballin, Ernst

    Big Data analytics in national security, law enforcement and the fight against fraud have the potential to reap great benefits for states, citizens and society but require extra safeguards to protect citizens' fundamental rights. This involves a crucial shift in emphasis from regulating Big Data

  8. Challenges and opportunities for more integrated regional food security policy in the Caribbean Community

    Directory of Open Access Journals (Sweden)

    Kristen Lowitt

    2016-01-01

    Full Text Available The Caribbean Community (CARICOM has recognized regional integration as an important development strategy for addressing the unique vulnerabilities of its member small island developing states (SIDS. Food security in the Caribbean is a fundamental social and ecological challenge in which the dynamics of regional integration are increasingly playing out. CARICOM members have subsequently identified a number of shared food security problems and have endorsed regional goals and approaches to address them; however, progress towards solutions has been slow. Recognizing that evidence-based studies on the potential factors limiting sustained progress are lacking, we undertook a comparative policy analysis to understand better the various approaches and framings of food security at national and regional levels with a view to assessing coherence. We identify considerable divergence in how regional and local policy institutions frame and approach food security problems in CARICOM and then identify ways through which the policy integration objectives for enhanced regional food security might be progressed, with a particular focus on social learning.

  9. Center for Technology, Security, and Policy research faculty conduct study of New Madrid Seismic Zone

    OpenAIRE

    Micale, Barbara L.

    2010-01-01

    Theresa Jefferson and John Harrald, research faculty at the Virginia Tech Center for Technology, Security, and Policy in the National Capital Region recently completed a Federal Emergency Management Agency (FEMA)-funded research project to model the social impacts and disaster response requirements of a 7.7 magnitude catastrophic earthquake on the three segments of the New Madrid Seismic Zone.

  10. Policy risk in action: pension reforms and social security wealth in Hungary, Czech Republic, and Slovakia

    Czech Academy of Sciences Publication Activity Database

    Dušek, Libor; Kopecsni, J.

    -, 9/2008 (2008), s. 1-34 R&D Projects: GA ČR GA402/05/0711 Institutional research plan: CEZ:AV0Z70850503 Keywords : pension reforms * social security * policy risk Subject RIV: AH - Economics http://ies.fsv.cuni.cz/default/file/download/id/8361

  11. Education Policy and National Security in Brazil in the Post-1964 Context

    Science.gov (United States)

    Silveira, Rene Trentin

    2013-01-01

    The aim of this article is to analyse and show in detail the influence of the National Security and Development Doctrine, the main ideological prop of the 1964 civilian-military coup, on the education policy implemented by the regime. Special attention is given to the MEC-USAID agreements, the setting up of the Meira Matos Commission and the…

  12. Poverty and National Security: A Review of Policies 1960-2010 ...

    African Journals Online (AJOL)

    Mass poverty is synonymous with failure in security in all states of the globe and Nigeria is no exception. This study reviews past poverty alleviation policies and programmes embarked upon by various Nigerian governments, problems associated with these programmes since independence (1960) to date (2010), and a ...

  13. American Policy in the Persian Gulf Region: Peace, Security, and the Spread of Democracy

    National Research Council Canada - National Science Library

    Fox, Darin J

    2008-01-01

    To achieve lasting security in the Arabian Gulf region, U.S. policy, though currently focused on Iraq, must engage Saudi Arabia and Iran with all of its instruments of national power to encourage the spread of democracy within the region...

  14. Constitutional Limits of the EU’s Common Foreign and Security Policy

    DEFF Research Database (Denmark)

    Butler, Graham

    The Common Foreign and Security Policy (CFSP) of the European Union (EU) is a highly exceptional component of the EU legal order. This constitutionalised foreign policy regime, with legal, diplomatic and political DNA woven throughout its fabric, is a distinct sub-system of law on the outer...... and judicial jurisdiction at Union level. There is constitutional significance to the choice of legal basis for foreign policy and external relations acts of the Union. Legal tensions therefore exist in EU external relations between CFSP and non-CFSP fields, as the institutional competences differ in terms...

  15. National security governance exemplified by South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Burmeister, OK

    2014-06-01

    Full Text Available There exists a paucity of research on ethical considerations in cyberdefence policies that can provide nation states guidance in mitigating the risks of a cyber attack to their national interests and to preparing for a cyber offence in response...

  16. Economic Security of Russian Economy under the Conditions of Import Substitution Policy Implementation

    Directory of Open Access Journals (Sweden)

    Natalya Viktorovna Andreeva

    2015-12-01

    Full Text Available In the article, the authors analyze the conditions of import substitution by types of activity from the perspective of the threat to the economic security of Russia. The factors of import substitution are presented. The main factor is the increase of economic and social security by the modernization of Russian economy. Today, a critical measure of the country’s economic security increase is the implementation of import substitution policy. The issue of economic modernization remains of current interest but stays unsolved, especially in the branches where the issue of import substitution is crucial: industry, agriculture, etc. The types of economic activity that can be labeled as open to import substitution are the ones with the high or medium indicators of competitiveness, investment and innovation activity. Within those types, the import substitution policy can be implemented without a threat to economic security. The analysis of the main features of import substitution such as the levels of competitiveness, innovations and investment by the types of economic activity, — is the basis to work out a smart import substitution policy, which will carry no threat to the country’s economic security. The main types of economic activity with the high dependency on import are metallurgical production, chemical industry, wood processing, electrical machines and equipment production, machinery and equipment production, textile manufacture, fishery and fish farming. In the result of the analysis, the following conclusions are drawn: the level of investment for all the types of economic activity presented is critically law; according to the level of innovation and competitiveness, metallurgic production is seen more advantageous on the back of negative dynamics and chemical industry as less advantageous. The other types of activity will face a threat to economic security if the policy of import substitution is implemented without government financing

  17. Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-01-01

    Full Text Available Mobile health (also written as mHealth provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and physician preferences defined by a set of attributes. In mHealth systems, not only the data but also the policies for sharing it may be sensitive since they directly contain sensitive information which can reveal the underlying data protected by the policy. Also, since the policies usually incur linearly increasing communication costs, mHealth is inapplicable to resource-constrained environments. Lastly, access privileges may be publicly known to users, so a malicious user could illegally share his access privileges without the risk of being traced. In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. The computation cost to the user is reduced by delegating approximately 50% of the decryption operations to the more powerful storage systems.

  18. Development of a privacy and security policy framework for a multistate comparative effectiveness research network.

    Science.gov (United States)

    Kim, Katherine K; McGraw, Deven; Mamo, Laura; Ohno-Machado, Lucila

    2013-08-01

    Comparative effectiveness research (CER) conducted in distributed research networks (DRNs) is subject to different state laws and regulations as well as institution-specific policies intended to protect privacy and security of health information. The goal of the Scalable National Network for Effectiveness Research (SCANNER) project is to develop and demonstrate a scalable, flexible technical infrastructure for DRNs that enables near real-time CER consistent with privacy and security laws and best practices. This investigation began with an analysis of privacy and security laws and state health information exchange (HIE) guidelines applicable to SCANNER participants from California, Illinois, Massachusetts, and the Federal Veteran's Administration. A 7-member expert panel of policy and technical experts reviewed the analysis and gave input into the framework during 5 meetings held in 2011-2012. The state/federal guidelines were applied to 3 CER use cases: safety of new oral hematologic medications; medication therapy management for patients with diabetes and hypertension; and informational interventions for providers in the treatment of acute respiratory infections. The policy framework provides flexibility, beginning with a use-case approach rather than a one-size-fits-all approach. The policies may vary depending on the type of patient data shared (aggregate counts, deidentified, limited, and fully identified datasets) and the flow of data. The types of agreements necessary for a DRN may include a network-level and data use agreements. The need for flexibility in the development and implementation of policies must be balanced with responsibilities of data stewardship.

  19. Infusing Aging and Public Policy Content into Gerontology Courses: Collaborative Learning Methods To Teach about Social Security and Medicare.

    Science.gov (United States)

    Cianciolo, Patricia K.; Henderson, Tammy L.

    2003-01-01

    Describes modules on Social Security and Medicare for gerontology policy courses. Discusses collaborative exercises in which students explore Internet resources on Social Security and health care finance, identity major concerns about reforms, and enact scenarios about retirees with varying degrees of income and health care security. (Contains 33…

  20. Youth transitioning out of foster care: an evaluation of a Supplemental Security Income policy change.

    Science.gov (United States)

    King, Laura; Rukh-Kamaa, Aneer

    2013-01-01

    Youths with disabilities face numerous challenges when they transition to adulthood. Those who are aging out of foster care face the additional challenge of losing their foster care benefits, although some will be eligible for Supplemental Security Income (SSI) payments after foster care ceases. However, the time needed to process SSI applications exposes those youths to a potential gap in the receipt of benefits as they move between foster care and SSI. We evaluate the effects of a 2010 Social Security Administration policy change that allows such youths to apply for SSI payments 60 days earlier than the previous policy allowed. The change provides additional time for processing claims before the applicant ages out of the foster care system. We examine administrative records on SSI applications from before and after the policy change to determine if the change has decreased the gap between benefits for the target population.

  1. United Kingdom security policy during the Blair Cabinet (1997-2007

    Directory of Open Access Journals (Sweden)

    Oana Elena Brânda

    2012-08-01

    Full Text Available The United Kingdom’s security policy between 1997-2007, the time when Tony Blair���s Labour dominated the Cabinet, cannot be easily distinguished from the foreign policy. The two are strategically combined and are the responsibility of so many institutions that one finds it difficult to assess them. However, as the period is dominated by the 9/11 attacks and the military interventions in Afghanistan and Iraq, the British defense policy is unitarily centered on the threat of terrorism and weapons of mass destruction. Despite the many holders of decision-making power, it appears that the instruments to be used in achieving a state of comfort on a security level are mainly documents that are to become the basis of further action.

  2. The United Kingdom and the establishment of European Security and Defence Policy

    Directory of Open Access Journals (Sweden)

    Alexandru-Nicolae Cucu

    2014-04-01

    Full Text Available After the Labour Party came to power, Great Britain was actively implied in the negotiations and the decision-making processes that led to the construction of the European security and defence mechanism. The European Union’s new perspective regarding security and defence assumed after 1999 was mostly framed by British leaders who seized the inability of Europe to react during the Kosovo War. Although, at the beginning the United Kingdom reformed its internal mechanisms and assumed complex duties, the creation of European Security and Defence Policy did not abolish the North Atlantic security system, as Germans and French would have wanted. Beyond the United States mistrust, transatlantic cooperation continued, especially because of the UK which sought to strike the right balance between European theatre and the North-Atlantic one.

  3. Clinical implications of household food security: definitions, monitoring, and policy.

    Science.gov (United States)

    Cook, John T

    2002-01-01

    Poverty-related food insecurity is a reality that many clinicians in nutrition and health care encounter either directly or indirectly. It is associated with both overnutrition and undernutrition, but it is not congruent with malnutrition. Food insecurity affects human development and health throughout the lifecycle, but can be particularly harmful during critical or vulnerable stages early and late in life. Understanding the causes and consequences of food insecurity and knowing how to identify them can improve the quality and effectiveness of clinical care, and facilitate prevention and treatment of many kinds of health problems. Numerous public policies and programs exist to ameliorate and prevent poverty-related food insecurity. However, the resources to support them ebb and flow with the politics of annual state and federal budgetary cycles. Support and need for these social-safety-net programs also vary with business cycles. Unfortunately, need often expands as support shrinks along with employment and government revenues during recessions, and shrinks as support expands along with employment and government revenues during expansions.

  4. Law Enforcement Plan : Necedah National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Necedah NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  5. Law Enforcement Plan : Ottawa National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Ottawa NWR Complex Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about...

  6. Chautauqua National Wildlife Refuge : Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Chautauqua National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  7. Law Enforcement Plan: Sherburne National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Sherburne NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  8. Law Enforcement Plan : Agassiz National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Agassiz Law Enforcement Plan clarifies Fish and Wildlife enforcement policies as they apply to Agassiz Refuge. It provides information about problems,...

  9. A safe Taser dose: Evaluation of Taser-related in-custody deaths, with implications for law enforcement policy and training

    Science.gov (United States)

    Lundquist, Marjorie

    2007-03-01

    The Taser, an electroconductive skeletal-muscle-incapacitating device originally designed by Taser International Inc. as a non-lethal weapon, is used by increasing numbers of law enforcement agencies (LEAs) in the USA and Canada. Since 1999, over 200 people ``Tasered'' by law enforcement personnel (LEP) have collapsed and died, prompting public calls for a moratorium on LEA Taser use except when deadly force is justified. If a sufficiently long Taser shock can kill, as seems likely [metabolic acidosis climbs, impairing respiration and elevating the risk of ventricular fibrillation], the data on Taser-related in-custody human deaths collectively support a single-shock policy for LEAs (ideally, Taser use on people exhibiting physical exhaustion or any type of delirium, or who are taking drugs for mental health reasons, or are pregnant, is prohibited unless deadly force is justified), with a second shock permitted in emergencies only for people not in the foregoing ``prohibited'' category. If all Taser-using LEAs in North America were to adopt a policy of this type, a 10- to 20-fold reduction in the rate of Taser-related in-custody deaths is projected! To protect the public, LEP training should distinguish between lethal and non-lethal Taser deployment using a ``safe Taser dose'' concept.

  10. Efficient strategy to support renewable energy. Integration in overall climate and energy security policies

    Energy Technology Data Exchange (ETDEWEB)

    Naess-Schmidt, H.S.; Hansen, Martin Bo; Bergman, E. [Copenhagen Economics, Copenhagen (Denmark); Soederholm, P. [Luleae Univ. of Technology, Luleae (Sweden)

    2013-05-15

    This report reviews how the Nordic countries can develop a strategy for renewable energy that delivers efficiently on the two underlying policy objectives of climate change and energy security challenges. The overarching elements in the evaluation of existing polices and the policy recommendations that follows from the analysis falls into three main parts: 1) Expanding renewable energy is not an end in itself, but a tool to deliver on the two real policy targets: climate change and energy security. 2) Too much policy focus at the Nordic and EU level is dedicated to boost renewable energy share of energy production in the near term, and insufficient resources are allocated to develop future low carbon technologies, which are required when CO{sub 2} abatement targets become more ambitious. 3) The long term nature of the challenges and huge investments in low carbon technologies required to deliver on long term targets puts a very high premium on policies that reduces policy risks as perceived by investors. The report was commissioned by the Nordic Council of Ministers and written by Copenhagen Economics. (Author)

  11. Water security in one blue planet: twenty-first century policy challenges for science.

    Science.gov (United States)

    Grey, D; Garrick, D; Blackmore, D; Kelman, J; Muller, M; Sadoff, C

    2013-11-13

    Water-related risks threaten society at the local, national and global scales in our inter-connected and rapidly changing world. Most of the world's poor are deeply water insecure and face intolerable water-related risks associated with complex hydrology. Most of the world's wealthy face lower water-related risks and less complex hydrology. This inverse relationship between hydrological complexity and wealth contributes to a divided world. This must be addressed if global water security is to be achieved. Using a risk-based framework provides the potential to link the current policy-oriented discourse on water security to a new and rigorous science-based approach to the description, measurement, analysis and management of water security. To provide the basis for this science-based approach, we propose an encompassing definition rooted in risk science: water security is a tolerable level of water-related risk to society. Water security policy questions need to be framed so that science can marshal interdisciplinary data and evidence to identify solutions. We join a growing group of scientists in asserting a bold vision for science leadership, calling for a new and comprehensive understanding of the planet's water system and society's water needs.

  12. The Nuclear Security Science and Policy Institute at Texas A&M University

    Directory of Open Access Journals (Sweden)

    Claudio A. Gariazzo

    2015-07-01

    Full Text Available The Nuclear Security Science and Policy Institute (NSSPI is a multidisciplinary organization at Texas A&M University and was the first U.S. academic institution focused on technical graduate education, research, and service related to the safeguarding of nuclear materials and the reduction of nuclear threats. NSSPI employs science, engineering, and policy expertise to: (1 conduct research and development to help detect, prevent, and reverse nuclear and radiological proliferation and guard against nuclear terrorism; (2 educate the next generation of nuclear security and nuclear nonproliferation leaders; (3 analyze the interrelationships between policy and technology in the field of nuclear security; and (4 serve as a public resource for knowledge and skills to reduce nuclear threats. Since 2006, over 31 Doctoral and 73 Master degrees were awarded through NSSPI-sponsored research. Forty-one of those degrees are Master of Science in Nuclear Engineering with a specialization in Nuclear Nonproliferation and 16 were Doctorate of Philosophy degrees with a specific focus on nuclear nonproliferation. Over 200 students from both technical and policy backgrounds have taken classes provided by NSSPI at Texas A&M. The model for creating safeguards and security experts, which has in large part been replicated worldwide, was established at Texas A&M by NSSPI faculty and staff. In addition to conventional classroom lectures, NSSPI faculty have provided practical experiences; advised students on valuable research projects that have contributed substantially to the overall nuclear nonproliferation, safeguards and security arenas; and engaged several similar academic and research institutes around the world in activities and research for the benefit of Texas A&M students. NSSPI has had an enormous impact on the nuclear nonproliferation workforce (across the international community in the past 8 years, and this paper is an attempt to summarize the activities

  13. The EU’s Security Sector Reform Policies in the Democratic Republic of Congo

    Directory of Open Access Journals (Sweden)

    Stephan Keukeleire

    2010-08-01

    Full Text Available In this article we approach the functioning of bureaucracy in ESDP from a governance perspective that also focuses on informal patterns of interaction between the relevant bureaucratic actors. Following the governance and related network governance approaches, the interplay between formal and informal patterns of interaction can help to overcome deadlock in policy-making and to procure effective problem-solving. This perspective is applied to security sector reform (SSR in the Democratic Republic of Congo (DRC. SSR is one of the major emerging fields of activity within the civilian crisis management dimension of ESDP, that also in the DRC became a focal point in the EU’s new security and defence policy since its inception. However, as the EU involvement in the Congolese security sector reform policies illustrates, coordination and negotiation among European actors to overcome deadlock and produce effective problem-solving is not self-evident or even desirable for all actors. In the case of the EU’s SSR policies in Congo, coordination indeed occurs between the actors that are dependent upon each other in terms of resources and have the willingness to jointly tackle the problems related to the SSR in the DRC. However, it is also often undermined by actors that prefer to engage bilaterally because they possess the resources to do so and the personal relationships with the Congolese authorities to act more efficiently and effectively.

  14. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  15. 49 CFR 1542.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1542.217 Section 1542... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.217 Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used...

  16. Analisis kebijakan standardisasi keamanan perangkat telekomunikasi untuk menunjang kebijakan pertahanan dan keamanan nasional [Policy analysis on telecommunication devices security standardization to support national security and defence policy

    Directory of Open Access Journals (Sweden)

    Wirianto Pradono

    2015-12-01

    Full Text Available Beberapa tahun terakhir, kejadian yang terkait dengan pembobolan informasi meningkat dengan signifikan dan menyebabkan kerugian yang tidak sedikit baik bagi pemerintah, industri maupun perorangan. Oleh karenanya diperlukan jaminan terhadap keamanan informasi terutama yang menyangkut informasi yang sensitif dan rahasia. Untuk mengatasi hal tersebut, diperlukan kebijakan di bidang standarisasi keamanan perangkat telekomunikasi untuk menjamin validitas dan kerahasiaan informasi yang dilewatkan melalui perangkat tersebut. Pendekatan kualitatif maupun kuantitatif digunakan dalam studi ini untuk memperoleh gambaran tentang kondisi penerapan standar keamanan perangkat baik oleh pemerintah maupun industri telekomunikasi serta mengidentifikasi kendala yang dihadapi dalam menjamin keamanan perangkat telekomunikasi baik untuk kebutuhan umum maupun kebutuhan khusus baik dari aspek teknologi, kelembagaan, maupun regulasi. Hasil penelitian menunjukkan belum ada regulasi yang mengatur standarisasi keamanan perangkat telekomunikasi untuk kebutuhan khusus. Selain itu belum ada penetapan secara eksplisit tentang lembaga yang berwenang dalam pengujian dan sertifikasi keamanan perangkat telekomunikasi terutama untuk kebutuhan khusus. Sejumlah regulasi yang mengatur secara spesifik bidang standarisasi keamanan perangkat telekomunikasi saat ini masih dalam proses penyusunan oleh instansi-instansi terkait.*****In the past years, incidents involving information security breach increase significantly and cause huge damage to industry, government or individual. Due to that, information security needs to be well guaranteed especially when it comes to sensitive and confidential information. One has to be done to cope with that is the availibility of policy on telecommunication devices security standardization to assure validity and confidentiality of all information going through the devices. Both qualitative and quantitative method used in this study to describe

  17. Adoption of an information systems security policy in small and medium sized enterprises.

    Directory of Open Access Journals (Sweden)

    Isabel Maria Lopes

    2017-03-01

    Full Text Available Information Systems Security (ISS is a relevant fact for current organizations. This paper focuses on Small and Medium Sized Enterprises (SMEs. This article aims to constitute an empirical study on the applicability of the Action Research (AR method in information systems, more specifically by assessing the adoption of an ISS policy in six SMEs, and identifying the critical success factors in adopting an ISS policy. The research question we intend to answer is to what extent this research method is adequate to reach the proposed goal. The results of the study suggest that AR is a promising means for the evaluation of ISS policies adoption. It can both act as a research method that improves the understanding about the reasons why the policy has been abandoned, and as a change method, assisting practitioners to overcome barriers and suggesting measures to be implemented.

  18. Security Implications of ISAF Exit from Afghanistan on South Asia

    Science.gov (United States)

    2014-12-12

    Afghan National Civil Order Policy ANP Afghan National Police ANSF Afghan National Security Forces BSA Bilateral Security Agreement CSTC-A...Afghan National Police ( ANP ) consist of a Uniformed Police responsible for general enforcement and public safety, a Border Police which patrols the...

  19. Food security and nutrition in the Russian Federation – a health policy analysis

    Directory of Open Access Journals (Sweden)

    Karsten Lunze

    2015-06-01

    Full Text Available Background: In the Russian Federation (Russia, an elevated burden of premature mortality attributable to non-communicable diseases (NCDs has been observed since the country's economic transition. NCDs are largely related to preventable risk factors such as unhealthy diets. Objective: This health policy study's aim was to analyze past and current food production and nutritional trends in Russia and their policy implications for Russia's NCD burden. Design: We examined food security and nutrition in Russia using an analytical framework of food availability, access to food, and consumption. Results: Agricultural production declined during the period of economic transition, and nutritional habits changed from high-fat animal products to starches. However, per-capita energy consumption remained stable due to increased private expenditures on food and use of private land. Paradoxically, the prevalence of obesity still increased because of an excess consumption of unsaturated fat, sugar, and salt on one side, and insufficient intake of fruit and vegetables on the other. Conclusions: Policy and economic reforms in Russia were not accompanied by a food security crisis or macronutrient deprivation of the population. Yet, unhealthy diets in contemporary Russia contribute to the burden of NCDs and related avoidable mortality. Food and nutrition policies in Russia need to specifically address nutritional shortcomings and food-insecure vulnerable populations. Appropriate, evidence-informed food and nutrition policies might help address Russia's burden of NCDs on a population level.

  20. The Ghost of Development Past: the Impact of Economic Security Policies on Saami Pastoral Ecosystems

    Directory of Open Access Journals (Sweden)

    Vera H. Hausner

    2011-09-01

    Full Text Available To ensure economic viability over time, any efforts to meet the Millennium Development Goals need to reconcile conservation with development interventions. Particularly, in marginal and risk prone areas erosion of resilience could make production systems more susceptible to environmental risks that compromise the economic security. By longitudinal analyses of long-term data records we investigated the impacts of big push policies on Saami pastoral ecosystems in Arctic Norway. The big push was accompanied by reindeer herd accumulation and a corresponding degradation of resilience, increasing the susceptibility to herd losses to predators and adverse winters. For the last 20 years the Norwegian government has worked to halt degradation of pasture ecosystems and reduce susceptibility to environmental risks. These intended win-win policies have mainly been based on economic incentives, which have been developed together with Saami pastoralists through negotiated agreements. We argue that the continued degradation of the Saami pastoral ecosystems is a "ghost of the development past", as the big push policies have resulted in an economic security trap (EST. The gradual reduction of resilience has persisted as the ex post payments of disaster relief and predator compensation have impeded the long-term actions to reduce susceptibility to environmental risks, i.e., ex ante policies, thereby increasing dependency on elevated economic inputs to manage the risks. The transfer of liability for managing risks to the benefactor, both through ex ante and ex post policies, has further discouraged and constrained opportunities for adaptation by the pastoralists.

  1. Reconsidering Styles of Regulatory Enforcement

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    2000-01-01

    This study addresses enforcement styles of regulatory inspectors, based on an examination of the municipal enforcement of agro-environmental policies in Denmark. Our findings make three contributions to the regulatory literature. One contribution is to add empirical support for theorizing about...

  2. Reconsidering Styles of Regulatory Enforcement

    DEFF Research Database (Denmark)

    J. May, Peter; Winter, Søren

    2007-01-01

    This study addresses enforcement styles of regulatory inspectors based on an examination of the municipal enforcement of agro-environmental policies in Denmark. Our findings make three contributions to the regulatory literature. One contribution is to add empirical support for theorizing about...

  3. Ensuring economic safety by law enforcement authorities in the context of the priorities of socio-economic development and the new Russian national security strategy

    Directory of Open Access Journals (Sweden)

    A. I. Khorev

    2016-01-01

    Full Text Available At the end of December 2015, was approved a new national security Strategy of the Russian Federation, which is one of the basic documents of strategic planning of activity of state bodies regarding domestic and foreign policy, formally defining the national interests and national strategic priorities of the Russian Federation in the field of defense; state and public safety; improve the quality of life of Russian citizens; economic growth; science, culture, technology, education, and health. ecology of living systems and rational use of natural resources and of strategic stability and equitable strategic partnership. The compilation and analysis of data of official statistics over the last decade show negative trends and the dynamics of social indicators of economic security. In accordance with the Concept, by 2020 the unemployment rate should be no more than 4-5%, inflation is 3.5%, the population with incomes below the subsistence minimum is 6.2%. According to the conservative scenario by 2030, unemployment should be at the level of 4.7%, inflation is 3.8%, the population with incomes below the subsistence minimum – 8%. Given the data and the analysis of these documents as a whole show that the concept of the provisions and forecasts require making significant adjustments based on layer-lived situation inside the country and in the world and the need to change approaches to the ongoing socio-economic policy. In modern conditions the effective implementation of the provisions of the new national security Strategy is of great importance for the further successful development of the Russian Federation.

  4. LPG: a secure, cleaner transport fuel? A policy recommendation for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, E. [Atlantic Consulting, Gattikon (Switzerland)

    2003-12-01

    LPG should play a greater role in road-transport-fuel policy in Western Europe, because (1) it is more secure than conventional and most alternative road-transport fuels; (2) it is superior to most road-transport fuels with respect to public health and environmental impact, and (3) it is available commercially today, which most alternatives are not. Policy makers should target a 2010 market share for LPG (known as Autogas when used as an automotive fuel) at 3-5% of road-transport fuel, up from its current level of about 1%. (author)

  5. Designing, Capturing and Validating History-Sensitive Security Policies for Distributed Systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    this approach with history-based components, as is traditional in reference-monitor-based approaches to mandatory access control. Our developments are performed in an Aspect-oriented coordination language, aiming to describe the Bell-LaPadula policy as elegantly as possible. Furthermore, the resulting language...... has the capability of combining both history-sensitive and future-sensitive policies, providing even more flexibility and power. Moreover, we propose a global Logic for reasoning about the systems designed with this language. We show how the Logic can be used to validate the combination of security...

  6. Food security for infants and young children: an opportunity for breastfeeding policy?

    Science.gov (United States)

    Salmon, Libby

    2015-01-01

    Increased global demand for imported breast milk substitutes (infant formula, follow-on formula and toddler milks) in Asia, particularly China, and food safety recalls have led to shortages of these products in high income countries. At the same time, commodification and trade of expressed breast milk have fuelled debate about its regulation, cost and distribution. In many economies suboptimal rates of breastfeeding continue to be perpetuated, at least partially, because of a failure to recognise the time, labour and opportunity costs of breast milk production. To date, these issues have not figured prominently in discussions of food security. Policy responses have been piecemeal and reveal conflicts between promotion and protection of breastfeeding and a deregulated trade environment that facilitates the marketing and consumption of breast milk substitutes. The elements of food security are the availability, accessibility, utilization and stability of supply of nutritionally appropriate and acceptable quantities of food. These concepts have been applied to food sources for infants and young children: breastfeeding, shared breast milk and breast milk substitutes, in accordance with World Health Organization (WHO)/United Nations Children's Fund (UNICEF) guidelines on infant feeding. A preliminary analysis indicates that a food security framework may be used to respond appropriately to the human rights, ethical, economic and environmental sustainability issues that affect the supply and affordability of different infant foods. Food security for infants and young children is not possible without high rates of breastfeeding. Existing international and national instruments to protect, promote and support breastfeeding have not been implemented on a wide scale globally. These instruments need review to take into account the emerging trade environment that includes use of the internet, breast milk markets and globalised supply chains for breast milk substitutes. New

  7. Policy risk in action: pension reforms and social security wealth in Hungary, Czech Republic, and Slovakia

    Czech Academy of Sciences Publication Activity Database

    Dušek, Libor; Kopecsni, J.

    2008-01-01

    Roč. 58, 7-8 (2008), s. 329-358 ISSN 0015-1920 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:AV0Z70850503 Keywords : pension reforms * social security * policy risk Subject RIV: AH - Economics Impact factor: 0.275, year: 2008 http://journal.fsv.cuni.cz/storage/1137_dusek-kopecsni_-_329-358-opravené.pdf

  8. Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

    OpenAIRE

    Changhee Hahn; Hyunsoo Kwon; Junbeom Hur

    2016-01-01

    Mobile health (also written as mHealth) provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs) at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and ph...

  9. Political and Institutional Drivers of Social Security Policy in South Africa

    DEFF Research Database (Denmark)

    S. Ulriksen, Marianne; Plagerson, Sophie

    This paper provides an analysis of political and institutional drivers that shape social policy in South Africa with a specific focus on social security. As elsewhere in the Global South, South Africa has a quite extensive social assistance framework, whereas social insurance is limited...... of health insurance, ideological narratives are pitted against each other: the concept of health as a common good against health as a commodity, and market-oriented strategies for delivery against state-centric approaches....

  10. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    security S&T, and facilitate commercialisation of research outcomes for national benefit. The policy will be delivered through a coherent and...our economy and higher living and education standards1,2. Questions for discussion: Q2.1 Are there other imperatives or drivers that justify the...organisations can drive the uptake of new technology and knowledge. Second, private sector organisations are essential to the commercialisation of

  11. Determining factors determinants of bank employees’ reading habits of information security policies

    Directory of Open Access Journals (Sweden)

    William Allassani

    2015-09-01

    Full Text Available This paper seeks to answer the question ‘What factors determine bank employee reading habits of security policies? Using the chi-square test, this research analyses the reading habits of bank staff to ascertain whether there is significant difference in their reading habits with regards to the following independent variable- gender, the section of bank the employee works (whether department or branch, number of years the staff has worked with the bank and the ownership status of the bank (public, private or foreign owned. In addition, logistic regression was employed to determine the predictors of these reading habits. This paper adopts a quantitative research methodology to study the information security reading habits of 136 Ghanaian bank staff from various banks and concludes that bank staffs working in departments are more likely to regularly read their banks policies than employees working in a branch. This paper also shows that there is statistical significant difference in reading habits with regards to the number of years an employee has worked with the bank. The paper finally shows that there is no statistical significant difference in security reading habits with regards to gender and ownership status of the bank. The logistic regression analysis also reveals that a respondent in a department is 4.4 times more likely to read the security policies relative to those in a branch. The analysis also concludes that , respondents who have worked for less than 5 years were less likely to read the policy relative to those who have worked more than 5 years (OR=.51

  12. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2010-09-17

    development programs are implemented. On the other hand, an April 2010 UNODC expresses concern over cannabis cultivation and trafficking—which is present...Policy, by Christopher M. Blanchard. 26 UNPDC. Afghanistan Cannabis Survey: 2009. http://www.unodc.org/documents/crop-monitoring/Afghanistan...Russian and Chinese efforts to limit U.S. influence in the region, the group has issued statements, most recently in August 2007, that security should be

  13. China’s Foreign- and Security-policy Decision-making Processes under Hu Jintao

    Directory of Open Access Journals (Sweden)

    Jean-Pierre Cabestan

    2009-10-01

    Full Text Available Since 1979, foreign- and security-policy-making and implementation processes have gradually and substantially changed. New modes of operation that have consolidated under Hu Jintao, actually took shape under Jiang Zemin in the 1990s, and some, under Deng Xiaoping. While the military’s role has diminished, that of diplomats, experts, and bureaucracies dealing with trade, international economic relations, energy, propaganda and education has increased. Decision making in this area has remained highly centralized and concentrated in the supreme leading bodies of the Chinese Communist Party (CCP. However, China’s globalization and decentralization, as well as the increasing complexity of its international interests, have intensified the need to better coordinate the activities of the various CCP and state organs involved in foreign and security policy; hence, the growing importance of the CCP leading small groups (foreign affairs, national security, Taiwan, etc.. But the rigidity of the current institutional pattern has so far foiled repeated attempts to establish a National Security Council.

  14. A Public Policy Advocacy Project to Promote Food Security: Exploring Stakeholders' Experiences.

    Science.gov (United States)

    Atkey, Kayla M; Raine, Kim D; Storey, Kate E; Willows, Noreen D

    2016-09-01

    To achieve food security in Canada, comprehensive approaches are required, which involve action at the public policy level. This qualitative study explored the experiences of 14 stakeholders engaging in a 9-month participatory public policy advocacy project to promote community food security in the province of Alberta through the initiation of a campaign to develop a Universal School Food Strategy. Through this exploration, four main themes were identified; a positive and open space to contribute ideas, diversity and common ground, confidence and capacity, and uncertainty. Findings from this study suggest that the participatory advocacy project provided a positive and open space for stakeholders to contribute ideas, through which the group was able to narrow its focus and establish a goal for advocacy. The project also seems to have contributed to the group's confidence and capacity to engage in advocacy by creating a space for learning and knowledge sharing, though stakeholders expressed uncertainty regarding some aspects of the project. Findings from this study support the use of participatory approaches as a strategy for facilitating engagement in public policy advocacy and provide insight into one group's advocacy experience, which may help to inform community-based researchers and advocates in the development of advocacy initiatives to promote community food security elsewhere. © 2016 Society for Public Health Education.

  15. Enforcement Reports

    Data.gov (United States)

    U.S. Department of Health & Human Services — Whereas not all recalls are announced in the media or on our Recalls press release page, all recalls montiored by FDA are included in FDA's weekly Enforcement Report...

  16. A novel approach to implementing digital policy management as an enabler for a dynamic secure information sharing in a cloud environment

    Science.gov (United States)

    Farroha, Bassam S.; Essman, Kristine R.; Farroha, Deborah L.; Cohen, Andy

    2011-06-01

    The traditional way of approaching the management and enforcement of information systems Policy in enterprise environments is to manually translate laws and regulations into a form that can be interpreted and enforced by enterprise devices. In other words we create system commands for routers, bridges, and firewalls to force data transfers and system access to comply with the current policies and approved rules in order to control access and protect private, sensitive, and classified information. As operational needs and threat levels change, the rules are modified to accommodate the required response. It then falls on System Administrators to manually change the configuration of the devices they manage to adapt their operations accordingly. As our user communities continue to rely more heavily on mission information, and the enterprise systems and networks that provide it, our enterprise needs to progress to more automated techniques that enable authorized managers to dynamically update and manage policies in digital formats. Automated management of access rules that control privileges for accessing secure information and enterprise resources, enabled by Digital Policy and other Enterprise Security Management (ESM) capabilities provides the means for system administrators to dynamically respond to changing user needs, threat postures and other environmental factors. With the increased popularity of virtual environments and advent of cloud enterprise services, IA management concepts need to be reexamined. Traditional ESM solutions may be subjected to new classes of threats as physical control of the assets that implement those services are relinquished to virtual environments. Additional operational factors such as invoking critical processing, controlling access to information during processing, ensuring adequate protection of transactions within virtual environments and executing ESM provisions are also affected. The paper describes the relationships among

  17. Security breaches: tips for assessing and limiting your risks.

    Science.gov (United States)

    Coons, Leeanne R

    2011-01-01

    As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.

  18. The Effects of a Social Media Policy on Pharmacy Students’ Facebook Security Settings

    Science.gov (United States)

    Feild, Carinda; James, Kristina

    2011-01-01

    Objective. To examine how students entering a doctor of pharmacy (PharmD) program used Facebook privacy settings before and after the college's social media policy was presented to them. Methods. The Facebook profiles of all entering first-year pharmacy students across 4 campuses of a college of pharmacy were evaluated. Ten dichotomous variables of interest were viewed and recorded for each student's Facebook account at 3 time points: before the start of the semester, after presentation of the college's social media policy, and at the end of the semester. Data on whether a profile could be found and what portions of the profile were viewable also were collected. Results. After introduction of the policy, a significant number of students increased their security settings (made information not visible to the public) related to Facebook walls, information pages, and links. Conclusions. Making pharmacy students aware of a college's social media policy had a positive impact on their behaviors regarding online security and privacy. PMID:22171105

  19. An Analysis of China's Fertilizer Policies: Impacts on the Industry, Food Security, and the Environment.

    Science.gov (United States)

    Li, Yuxuan; Zhang, Weifeng; Ma, Lin; Huang, Gaoqiang; Oenema, Oene; Zhang, Fusuo; Dou, Zhengxia

    2013-07-01

    China has made remarkable strides in recent decades to grow enough food to feed 20% of the world's population with only 9% of the world's arable land. Meanwhile, the nation is experiencing exacerbated air and water pollution problems. Agricultural growth and the pollution aggravation are closely linked with policies affecting fertilizer production and use. Essentially nonexistent in 1950, China's fertilizer industry is now a robust conglomerate producing fertilizers in amounts that not only meet domestic demand but also contribute to international trade. The industry's growth stemmed from a series of policy progressions, featuring (i) a total control system with state ownership and central planning (1949-1984), (ii) a dual system of central planning and market adjustment (1985-1997), (iii) a market-driven system with government-mandated price caps (1998-2009), and (iv) a complete market-oriented system (since 2009). In conjunction with the policy changes were massive subsidy programs totaling more than $18 billion in 2010. The support policies and subsidies helped grow the industry and safeguard an adequate supply of fertilizers at affordable costs to farmers, but the artificially low-priced fertilizers also contributed to a nationwide trend of fertilizer overuse, leading to nutrient pollution. China needs innovative policies and programs to address food security and sustainability challenges. In this study, we review and analyze policies and programs related to China's fertilizer production and use in a 60-yr span (1950-2010) and discuss its impact on the development of the industry, food security, and pressing environmental issues. Finally, our study analyzes long-term trends in fertilizer use in China and offers some key viewpoints to stimulate debates among all stakeholders. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  20. Review: Miller, Michelle Ann (2009, Rebellion and Reform in Indonesia – Jakarta’s Security and Autonomy Policies in Aceh

    Directory of Open Access Journals (Sweden)

    Antje Missbach

    2009-01-01

    Full Text Available Review of the monograph: Miller, Michelle Ann, Rebellion and Reform in Indonesia – Jakarta’s Security and Autonomy Policies in Aceh, London/ New York: Routledge, 2009, ISBN 13: 978-0-415-45467-4, 240 pages.

  1. A View of DANIDAs Policy Note on Food Security through A Policy Coherent Lens

    DEFF Research Database (Denmark)

    Robertson, Aileen

    2014-01-01

    at utilsigtede skadelige virkninger forebygges. I kommentaren bliver Danidas ‘Policy Note on Food Security’ analyseret og diskuteret, specielt hvordan de forskellige sektorer bedre kan samarbejde og udvikle løsninger, der giver resultater og synergier indenfor befolkningstilvækst, seksuel og reproduktiv sundhed......-usikkerhed hæmmer udvikling’ understreges det, at hvis ‘underernæring’ og ‘sult’ forveksles, findes disse synergier ikke og sparsomme resourcer spildes. I Danida`s ’Policy Note on Food Security’ nævnes det, at ‘852 million are living in hunger’, altså sult. Det er imidlertid snarere kronisk underernæring end sult...... ”food security” gennem en sådan ‘synergilinse’ bedre fremme menneskerettigheder og bekæmpe fattigdom. Dette er også beskrevet i ‘ Retten til et bedre liv’, og det kan – hvis der sættes fokus på synergier og resultater spille en nøglerolle gennem påvirkning af det internationale samfund til at gøre det...

  2. Welfare, Liberty, and Security for All? U.S. Sex Education Policy and the 1996 Title V Section 510 of the Social Security Act.

    Science.gov (United States)

    Lerner, Justin E; Hawkins, Robert L

    2016-07-01

    When adolescents delay (meaning they wait until after middle school) engaging in sexual intercourse, they use condoms at higher rates and have fewer sexual partners than those who have sex earlier, thus resulting in a lower risk for unintended pregnancies and sexually transmitted infections. The 1996 Section 510 of Title V of the Social Security Act (often referred to as A-H) is a policy that promotes abstinence-only-until-marriage education (AOE) within public schools. Using Stone's (2012) policy analysis framework, this article explores how A-H limits welfare, liberty, and security among adolescents due to the poor empirical outcomes of AOE policy. We recommend incorporating theory-informed comprehensive sex education in addition to theory-informed abstinence education that utilizes Fishbein and Ajzen's (2010) reasoned action model within schools in order to begin to address adolescent welfare, liberty, and security.

  3. Effects of a Natural Community Intervention Intensifying Alcohol Law Enforcement Combined With a Restrictive Alcohol Policy on Adolescent Alcohol Use

    NARCIS (Netherlands)

    Schelleman-Offermans, K.; Knibbe, R.A.; Kuntsche, E.N.; Casswell, S.

    2012-01-01

    Purpose Determining whether intensified inspections on alcohol retailers, combined with a policy withdrawing liquor licenses if retailers are fined twice per annum, is effective in reducing adolescents' odds to initiate weekly drinking and drunkenness. Causal pathways by which the intervention was

  4. The University Inventor's Obligation to Assign: A Review of US Case Law on the Enforceability of University Patent Policies

    Science.gov (United States)

    Ohashi, Naoko

    2004-01-01

    Until recently, it was unclear under US case law whether university patent policies were sufficient to obligate university personnel to assign their inventions to the university without a signed invention-assignment agreement. This paper examines the question through recent case law. These cases indicate a trend in support of university claims…

  5. Handbook - TRACE-ing human trafficking : Handbook for policy makers, law enforcement agencies and civil society organisations

    NARCIS (Netherlands)

    Rijken, Conny; Pijnenburg, Annick

    2016-01-01

    Human trafficking is one of the largest criminal enterprises in the world. It is a multi-billiondollar crime of global scale. This is because human trafficking as a criminal enterprise continues to evolve as a high profit-low risk business for perpetrators and challenges policy makers, law

  6. Are social security policies for Chinese landless farmers really effective on health in the process of Chinese rapid urbanization? a study on the effect of social security policies for Chinese landless farmers on their health-related quality of life

    Science.gov (United States)

    2014-01-01

    Background The continuing urbanization in China has resulted in a loss of land and rights among farmers. The social security of landless farmers has attracted considerable research attention. However, only few studies measure the health-related quality of life (HRQOL) of landless farmers by employing scientific standardized scales. By using five-dimensional European quality of life (EQ-5D) scales, this study measures the HRQOL of landless farmers from a new perspective and examines how the social security policies affect their HRQOL. Methods This study is based on a 2013 household survey that has been conducted among 1,500 landless famers who are residing in six resettlement areas in three cities within the Yangtze River Delta region, namely, Nanjing, Hangzhou, and Yangzhou. This study adopts EQ-5D scales to measure the HRQOL of these farmers. More than 50% of the respondents are in poor or non-serious health conditions, and over 50% are not satisfied with their current social security policies. The health conditions and social security policies are analyzed by multinomial regression analysis and the relationship between these two factors are analyzed via structural equation modeling (SEM). Results First, the descriptive statistical analysis shows that more than 50% of the respondents are in poor or non-serious health conditions, and that the largest proportion of these farmers are suffering from anxiety or depression, which is the most serious of the five dimensions. Second, multinomial regression analysis shows that the satisfaction of landless farmers with their social security policies improves their living conditions, particularly in their capacity for self-care, in their ability to perform daily activities, and in the reduction of pain, anxiety, and depression. Third, SEM model analysis shows that the satisfaction of landless farmers with their social security policies positively influences their HRQOL. Among the five dimensions of EQ-5D, daily activities

  7. Are social security policies for Chinese landless farmers really effective on health in the process of Chinese rapid urbanization? A study on the effect of social security policies for Chinese landless farmers on their health-related quality of life.

    Science.gov (United States)

    Liang, Ying; Lu, Wanyi; Wu, Wei

    2014-01-15

    The continuing urbanization in China has resulted in a loss of land and rights among farmers. The social security of landless farmers has attracted considerable research attention. However, only few studies measure the health-related quality of life (HRQOL) of landless farmers by employing scientific standardized scales. By using five-dimensional European quality of life (EQ-5D) scales, this study measures the HRQOL of landless farmers from a new perspective and examines how the social security policies affect their HRQOL. This study is based on a 2013 household survey that has been conducted among 1,500 landless famers who are residing in six resettlement areas in three cities within the Yangtze River Delta region, namely, Nanjing, Hangzhou, and Yangzhou. This study adopts EQ-5D scales to measure the HRQOL of these farmers. More than 50% of the respondents are in poor or non-serious health conditions, and over 50% are not satisfied with their current social security policies. The health conditions and social security policies are analyzed by multinomial regression analysis and the relationship between these two factors are analyzed via structural equation modeling (SEM). First, the descriptive statistical analysis shows that more than 50% of the respondents are in poor or non-serious health conditions, and that the largest proportion of these farmers are suffering from anxiety or depression, which is the most serious of the five dimensions. Second, multinomial regression analysis shows that the satisfaction of landless farmers with their social security policies improves their living conditions, particularly in their capacity for self-care, in their ability to perform daily activities, and in the reduction of pain, anxiety, and depression. Third, SEM model analysis shows that the satisfaction of landless farmers with their social security policies positively influences their HRQOL. Among the five dimensions of EQ-5D, daily activities produce the greatest influence

  8. Analysis of Russian Federation Foreign Policy in the Field of International Information Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2014-01-01

    Full Text Available Information and communication technologies (ICT play an essential role in the improvement of the quality of life, economic and socio-political of individual countries and humanity in general. However, ICT development is fraught with new challenges and threats to international and national security. Interstate rivalry in the information sphere generates conflicts, an extreme form of which is an information war. Since 1998, the Russian initiative supports the international cooperation on information security at the global and regional level as well as within the framework of the bilateral relations. The article analyzes the characteristics of the global information society, which has a decisive influence on the international security in the information age, as well as international cooperation in this field. The analysis of Russian foreign policy initiatives in the field of international information security is also presented. Today more than 130 countries develop cyber capabilities, both defensive and offensive, that pose serious threats to the international stability. It's difficult to trace the source of information attacks and its consequences can be devastating and cause retaliation, including the use of conventional weapons. In this situation Russian approach, advocating for the development of the rules of conduct of States and demilitarization of information space in order to ensure its safety, seems urgent and relevant with the international situation.

  9. Collaborative trust evaluation for wiki security

    DEFF Research Database (Denmark)

    Lindberg, Kasper; Jensen, Christian D.

    2012-01-01

    Wiki systems form a subclass of the more general Open Collaborative Authoring Systems, where content is created and maintained by a user community. The ability of anyone to edit the content is, at the same time, their strength and their weakness. Anyone can write documents that improve the value...... of the wiki-system, but at the same time, anyone can also introduce errors into these documents, by accident or on purpose. A security model for wiki-style authoring systems has previously been proposed. This model is based on both static and dynamic document access controls that enforce a simple integrity...... based security policy. In this paper, we present a new policy for the existing wiki security model, which provides a higher degree of parameterization and adaptability. The new policy is analyzed and compared to the original policy. Our evaluation shows that this new policy provides stronger security...

  10. Policy-Based Quality of Service and Security Management for Multimedia Services on IP networks in the RTIPA project

    NARCIS (Netherlands)

    Gay, V.C.J.; Almeroth, K.C.; Duflos, Sandrine; Hasan, M.; Kervella, Brigitte; Diaz, Gladys; Horlait, Eric

    2002-01-01

    This paper summarizes the research work that has been conducted in the context of the RTIPA project on policy-based QoS (Quality of Service) and security management for distributed multimedia services. It presents an architecture allowing the derivation of policies from the service level down to the

  11. Indirect effect of management support on users' compliance behaviour towards information security policies.

    Science.gov (United States)

    Humaidi, Norshima; Balakrishnan, Vimala

    2018-01-01

    Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management

  12. Superfund Enforcement

    Science.gov (United States)

    Provides information on the superfund enforcement cleanup program and finding the companies or people responsible for contamination at a site, and negotiating with them to do the clean up themselves, or to pay for the clean up done by another party.

  13. Marcel de Haas, Russia’s Foreign Security Policy in the 21st Century – Putin, Medvedev and Beyond.

    OpenAIRE

    Facon, Isabelle

    2011-01-01

    Specialists of Russian military and defense policy are familiar with Marcel De Haas’s prolific and in-depth publications on sometimes fairly technical issues. This book, with its broader outlook aimed at providing an overall understanding of Russian security policy in the 2000s, is the product of Dr. De Haas’s years as a Senior Research Fellow at the Clingendael Institute (The Hague). In many ways, it constitutes a follow-on to the author’s previous book– Russian Security Policy and Air Power...

  14. Marcel de Haas, Russia’s Foreign Security Policy in the 21st Century – Putin, Medvedev and Beyond.

    Directory of Open Access Journals (Sweden)

    Isabelle Facon

    2011-03-01

    Full Text Available Specialists of Russian military and defense policy are familiar with Marcel De Haas’s prolific and in-depth publications on sometimes fairly technical issues. This book, with its broader outlook aimed at providing an overall understanding of Russian security policy in the 2000s, is the product of Dr. De Haas’s years as a Senior Research Fellow at the Clingendael Institute (The Hague. In many ways, it constitutes a follow-on to the author’s previous book– Russian Security Policy and Air Power...

  15. Achieving Water and Food Security in 2050: Outlook, Policies, and Investments

    Directory of Open Access Journals (Sweden)

    Dennis Wichelns

    2015-04-01

    Full Text Available Food production in 2050 will be sufficient, globally, but many of the poor will remain food insecure. The primary cause of food insecurity will continue to be poverty, rather than inadequate food production. Thus, policies and investments that increase the incomes of the poor will remain the best ways to extend food security to all. Investments that promote growth in sustainable agriculture and provide non-farm employment opportunities in rural areas of lower income countries will be most helpful. There will be sufficient water, globally, to achieve food production goals and sustain rural and urban livelihoods, if we allocate and manage the resource wisely. Yet, water shortages will constrain agricultural production and limit incomes and livelihood opportunities in many areas. Policies and investments are needed to extend and ensure access to water for household use and agricultural production. Challenges requiring the attention of policy makers and investors include increasing urbanization and increasing demands for land and water resources. Policy makers must ensure that farmers retain access to the water they need for producing food and sustaining livelihoods, and they must create greater opportunities for women in agriculture. They must also motivate investments in new technologies that will enhance crop and livestock production, particularly for smallholders, and encourage the private sector to invest in activities that create employment opportunities in rural areas.

  16. The EU as a new form of political authority: the example of security policy

    Directory of Open Access Journals (Sweden)

    Mary Kaldor

    2012-12-01

    Full Text Available This article argues that the current crisis from which the EU is suffering is a result of both economic factors and political ones, and that the two factors feed off each other mutually. As a supranational body, the EU should not replace national or local levels of governance, instead it should protect the democracy that exists at those levels. Beyond its internal problems, the EU has enormous potential as a cosmopolitan model capable of inspiring new global institutions. More specifically, the article analyses the Common Security and Defence Policy (CSDP, which differs from other common security strategies (which place the emphasis on borders and military questions by the fact that it sets as its objective the defence of human security –a broader, more legitimate concept with regard to European citizens. It is, therefore, not only an instrument of external influence, but also an internal legitimising element that can bring together citizens and the artificers of “high policy”, thereby strengthening democracy within the Union itself.

  17. Food security, wheat production and policy in South Africa: Reflections on food sustainability and challenges for a market economy

    Directory of Open Access Journals (Sweden)

    Francois de Wet

    2018-01-01

    Full Text Available The traditional concept of security has broadened over the past decades. Food security in South Africa is an imperative for human and non-human survival. In the contemporary political economy, there is a real nexus between globalisation, exploitation, the state, scarcity of resources, the market, peoples’ need to feel secure, notions of state responsibility and food production. Political economy and human security in theoretical debates and face-to-face politics are intrinsically linked. The notion of a ‘secure community’ changed. Food security and the right to quality living became a social imperative. Understanding current agricultural economics requires the ability to link security and access to food for all. In this case study, wheat production in South Africa is addressed against the interface of the global and the local including South Africa’s transition to a democratic and constitutional state with a Bill of Rights. The current security approach represents a more comprehensive understanding of what security is meant to be and include, amongst others, housing security, medical security, service delivery and food security, as set out in the Millennium Development Goals and the subsequent Sustainable Development Goals. The issue of food security is addressed here with particular reference to wheat production, related current government policies and the market economy. The authors chose to limit their socio-economic focus to a specific sector of the agricultural market, namely wheat, rather than discuss food security in South Africa in general. Wheat was chosen as a unit of analysis because as a crop, wheat used in bread is one of the staples for the majority of South Africans and given the current negative economic developments, wheat as a staple is likely to remain integral, if not increasing its status of dependability

  18. [National pharmaceutical policy in Colombia and social security reform: access and rational use of medicines].

    Science.gov (United States)

    Mejia Restrepo, Samuel; Velez Arango, Alba Lucía; Buritica Arboleda, Olga Clemencia; Arango Mejia, María Cristina; Rio Gomez, Jaime Alberto del

    2002-01-01

    Based on the new social security system in Colombia (1993), which establishes equity and mandatory care as the basis for public health care provision, the authors analyze whether the formulation and implementation of pharmaceutical policy promote accessibility, availability, and rational use of medicines, thereby contributing to equity in health. Two approaches were used: a macro approach centered on the legal framework and various actors in the reform process and a micro approach related to the processes and results in the drug supply system. The authors studied the legal instruments backing the country's pharmaceutical policy and evaluated their application, using indicators and a specific disease (diabetes mellitus) as a marker. Although there is a legal framework providing the people's right to access health care services and essential medicines, the country lacks a comprehensive pharmaceuticals policy. Most of the institutions experience problems in distributing the medicines listed under the Mandatory Health Plan, a low percentage of medicines is dispensed at zero cost, and a major portion of patients purchase medicines through associations of diabetics or rely on alternative medicine. The study unveiled several obstacles to equity in health care coverage and access to essential medicines.

  19. Policy Preferences about Managed Aquifer Recharge for Securing Sustainable Water Supply to Chennai City, India

    Directory of Open Access Journals (Sweden)

    Norbert Brunner

    2014-12-01

    Full Text Available The objective of this study is to bring out the policy changes with respect to managed aquifer recharge (focusing on infiltration ponds, which in the view of relevant stakeholders may ease the problem of groundwater depletion in the context of Chennai City; Tamil Nadu; India. Groundwater is needed for the drinking water security of Chennai and overexploitation has resulted in depletion and seawater intrusion. Current policies at the municipal; state and national level all support recharge of groundwater and rainwater harvesting to counter groundwater depletion. However, despite such favorable policies, the legal framework and the administrative praxis do not support systematic approaches towards managed aquifer recharge in the periphery of Chennai. The present study confirms this, considering the mandates of governmental key-actors and a survey of the preferences and motives of stakeholder representatives. There are about 25 stakeholder groups with interests in groundwater issues, but they lack a common vision. For example, conflicting interest of stakeholders may hinder implementation of certain types of managed aquifer recharge methods. To overcome this problem, most stakeholders support the idea to establish an authority in the state for licensing groundwater extraction and overseeing managed aquifer recharge.

  20. 49 CFR 1542.215 - Law enforcement support.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement support. 1542.215 Section 1542.215... program under § 1542.103(a) or (b) must provide: (1) Law enforcement personnel in the number and manner...

  1. Foreign and Security Policy of the Newly Independent States: Balancing between Two Power Centers

    Directory of Open Access Journals (Sweden)

    Sergiy G. Fedunyak

    2014-12-01

    Full Text Available The article is focusing on the interplay between foreign policy agenda of the post-Soviet states at the one hand and internal policy developments in these countries at the other hand. One of the main explanations why the post-Soviet elites in non-Russian republics are pursuing the so-called multi-vectorialism in the foreign policy is that it serves as a strategy to maximize the most from having good relations both with East and West, and thus trying to perpetuate the monopoly of the power. Uzbekistan is a country in case, as Ukraine (and Moldova is (or was indeed also. At the same time, the special relations between the elites of post-Soviet countries and Moscow are very important in shaping the foreign policy agenda of these countries as a result of the Soviet legacy, i.e. the ties of the former Communist nomenklatura with Moscow are still playing a very important role in the most of the former Soviet republics. Another relevant variable in explaining the current state of affairs in the foreign and security issues of the post-Soviet states and the still dominant role of Russia is the fact that the West (NATO and EU especially are not very successful in trying to limit Moscow’s ambitions in the “near abroad”. This is making the leaders of most NIS to be obedient to Russia’s pretensions in lack of real support from the West in order to counteract these neo-imperial claims from the part of the former metropolis.

  2. International coalitions in Brazil’s foreign policy: security and governance reform

    Directory of Open Access Journals (Sweden)

    Alcides Costa Vaz

    2012-04-01

    Full Text Available The text analyses the relevance and role of international coalitions as instruments and arenas for negotiation in the context of Brazilian foreign policy under Luis Inácio Lula da Silva (2003-2010, and the perspectives they bring to the attainment of the goal of reforming the spaces and instruments of global governance in the political, economic and security spheres. Under Lula da Silva, Brazil supported and resorted intensively to coalitions not only for their instrumental value for consolidating the country’s international presence and actions, but also due to the possibility that they could induce systemic change towards a more uneven pattern of power distribution, thus helping to overcome lasting political and economic international asymmetries.

  3. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  4. Security Policy and Infrastructure in the Context of a Multi-Centeric Information System Dedicated to Autism Spectrum Disorder.

    Science.gov (United States)

    Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe

    2017-01-01

    Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in their early age. The diagnosis of ASD relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology and ophthalmology. In order to support clinicians, researchers and public health decision makers, we designed an information system dedicated to ASD, called TEDIS. TEDIS was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured Internet connections. In this paper, we present the security policy and security infrastructure we developed to protect ASD' patients' clinical data and patients' privacy. We tested our system on 359 ASD patient records in a local secured intranet environment and showed that the security system is functional, with a consistent, transparent and safe encrypting-decrypting behavior. It is ready for deployment in the nine ASD expert assessment centers in the Ile de France district.

  5. Hybrid static-runtime information flow and declassification enforcement

    NARCIS (Netherlands)

    Rocha, Bruno P.S.; Conti, Mauro; Etalle, Sandro; Crispo, Bruno

    There are different paradigms for enforcing information flow and declassification policies. These approaches can be divided into static analyzers and runtime enforcers. Each class has its own strengths and weaknesses, each being able to enforce a different set of policies. In this paper, we

  6. The impact of security and intelligence policy in the era of cyber crimes

    Directory of Open Access Journals (Sweden)

    MSc. Bahri Gashi

    2016-07-01

    Full Text Available Creation of National Cyber Defense Strategy, is the only security and the best protection against cyber-crimes. This is the starting point, from where adequate policies and necessary legal measures begin, aiming the creation of a solid ground and responsible users by implementing comprehensive measures and legal restrictions. The methodology used to achieve the recognition of users with applicable legislation and regulations on the use of the Internet, as well as legal obligations; implementation of procedures to use communication systems; signing and approval by users of their responsibilities; knowledge and information on the risks and threats stemming from the use of communication networks; certification of trained and specialized staff; classification and processing of information in a particular system; identifying unauthorized users who use classified information networks in  public systems and private sector; creating barriers in distance entry networks and information systems, etc. Various Security and Intelligence institutions covering and operating in these areas are responsible for the creation and promotion of National Cyber Defense Strategy, analyzing the risk to implement protective measures for preventing attacks on Cybercrime (Cyber Crimes.

  7. Common security and defence policy of the European Union and NATO

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2015-01-01

    Full Text Available The paper presents the structural analysis of cooperation collectivity NATO and the EU, who are the guarantors of foreign security policy in the region and in the world. In this regard, it outlines the hypothetical discourse in the EU's relations with NATO, the United States, that have marked the start of the independence of each individual battle in terms of security. Standalone approach, reflecting the credibility of each individual collectivity, ultimately lead to a reduction of investment potential. It starts by considering a presentation of possible options on the reflection of the relations between the EU and NATO that the 'fine-tuning' proclaims the need for integration and pragmatic and rational manner, accepted by the political and economic realities in achieving interests. In this paper, the intention of the data on CSDP and critical analysis of relations between the EU and NATO and the presentation of the most significant agreements between the two collectives, help bridge the gap in the division of political interest and commitment of its leading members.

  8. Ensuring Security of Supply of Natural Gas in the European Union’s Common Energy Policy

    Directory of Open Access Journals (Sweden)

    Andrei Teofil Postolachi

    2013-08-01

    Full Text Available The problematic of energy policy is nowadays widely disputed in the European Union community. In a global context characterized by highly and raising dependency of the economic activity on the energetic resources, the European authorities had launched a strategy in this sector which regards the problems of access to secure and affordable energy products. The aim of this paper is linked to the natural gas field of the European energetic concerns, and it assumes the high dependency of internal consumption on imports, more than half of the natural gas that is used in the 27 states comes from abroad. Ensuring a higher level of security in the supply is one of the goals that European Union wants to achieve on medium and long term. In these circumstances, actual measurements take into account different type of actions: stabilize relations with existing partner gas exporters (Russia, Algeria, Norway; diversification of transport routes coming from these countries, especially in the idea of trying to avoid transit countries (mainly Ukraine and Belarus; and finally opening discussions and investing in alternative routes which should transport the gas from new suppliers placed in the Caspian Sea or Central Asia region.

  9. Community Food Security: Policies for a More Sustainable Food System in the Context of the 1995 Farm Bill and Beyond

    OpenAIRE

    Gottlieb, Robert; Fisher, Andrew

    1995-01-01

    During the 1985 and 1990 Farm Bill debates, a movement emerged that sought to incorporate the goals of sustainable agriculture into legislation. As a consequence of this coalition-building process, important new policy initiatives were introduced. Recent efforts have also been made to link urban food concerns with sustainable agriculture agendas under the broader framework of food security advocacy. In relation to that effort, this paper lays out the framework and specific policy components o...

  10. From energy security to environmental protection: Understanding swings in the energy policy pendulum

    Energy Technology Data Exchange (ETDEWEB)

    Finon, D

    1994-01-01

    The various factors that have shaped the energy policies of oil-importing countries over the past 20 years are reviewed. For each phase, changes in the modes of intervention are linked to changing attitudes towards the externalities associated with energy supply and changing opinions about the legitimate sphere of government. After the oil price crises of the 1970s, importing countries redefined their energy policies in terms of energy security and governments introduced measures to lessen dependence on foreign oil, including development of strategic stocks of oil, diversifying import sources, encouraging substitution of petroleum-based fuels, promotion of new energy technologies, and initiatives to reduce energy demand. The resulting decrease in dependence on energy and oil led to a return of more moderate oil price levels in the 1980s, and oil dependence was no longer regarded as a priority issue. A retreat from government intervention was manifested in such ways as dismantling of energy trade barriers, less support for commercially unviable production and for energy conservation, partial deregulation, privatization, increased competition in energy distribution industries, and a decline in government-sponsored energy research. However, since the late 1980s, even those governments most devoted to free markets have become much more interventionist in regard to energy, reflecting a resurgence of interest in the environment. Various measures were implemented which forced energy consumers to absorb a substantial part of the environmental costs associated with supplying and using energy products. Policies are now primarily demand-oriented and seek to reduce market obstacles with respect to energy conservation and to promote clean fuels. 20 refs.

  11. A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

    Directory of Open Access Journals (Sweden)

    Chalee Vorakulpipat

    2017-01-01

    Full Text Available Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD. However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security research, ranging from management (risk and policy to technical aspects of privacy and confidentiality in BYOD. Furthermore, this study proposes a policy-based framework for preserving data confidentiality in BYOD. This framework considers a number of aspects of information security and corresponding techniques, such as policy, location privacy, centralized control, cryptography, and operating system level security, which have been omitted in previous studies. The main contribution is to investigate recent trends concerning the preservation of confidentiality in BYOD from the perspective of information security and to analyze the critical and comprehensive factors needed to strengthen data privacy in BYOD. Finally, this paper provides a foundation for developing the concept of preserving confidentiality in BYOD and describes the key technical and organizational challenges faced by BYOD-friendly organizations.

  12. Law Enforcement Plan: Minnesota Valley National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Minnesota Valley NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about...

  13. Mark Twain National Wildlife Refuge: Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Mark Twain NWR (including Clarence Cannon, Louisa, and Calhoun NWRs) Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to...

  14. Bombay Hook National Wildlife Refuge Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Bombay Hook Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  15. Towards Food Security and Livelihoods of Low-income Women in central Uganda: Policy Implications based on action research

    DEFF Research Database (Denmark)

    Nambuanyi, Lekunze Ransom; Midtvåge, Runa; Hiranandani, Vanmala Sunder

    2015-01-01

    Uganda is burdened with rising poverty, malnutrition and food insecurity. While most Ugandans depend on agriculture for their livelihoods, it is important to recognize that access to and control over resources by women and climate factors are central to the question of food security in Uganda....... However, a review of the literature demonstrates that policy options have poorly understood these interlinkages or tended to undermine them, especially the extent that these policies and programs put the necessary attention on the role of women farmers in food security. This paper presents part of a work...... in progress of a research project that seeks to investigate the interrelated effects of agricultural practices, access to and control over resources, as well as climate change on women’s food security in the urban and peri-urban areas of central Uganda. The paper not only considers how to turn...

  16. Stable and Enforceable

    DEFF Research Database (Denmark)

    Hallett, Andrew Hughes; Hougaard Jensen, Svend E.

    2011-01-01

    -term stabilisation. We argue for public sector debt targets as a practical way to achieve such a set up, and an excess debt protocol is constructed to give enforceable form to those targets. The ideas of “fiscal space” and optimal debt levels are used to provide a mechanism for identifying a stable region within...... which the debt targeting regime should operate. Making these factors explicit would both improve the credibility of planned fiscal policies and reduce risk premia on borrowing costs. We finally show how Europe’s competitiveness pact, and debt restructuring operations, can be used to maximise...

  17. Fundamentals of IP and SoC security design, verification, and debug

    CERN Document Server

    Ray, Sandip; Sur-Kolay, Susmita

    2017-01-01

    This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the “trenches” of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on desi...

  18. Using K-12 Lessons Learned about How to Balance Accessibility and Test Security to Inform Licensure, Credentialing, and Certification Exam Policies

    Science.gov (United States)

    Lazarus, Sheryl S.; van den Heuvel, Jill R.; Thurlow, Martha L.

    2017-01-01

    This paper explores how to balance test security and accessibility on licensure, credentialing, and certification exams. It examines K-12 test security policies related to educational assessments across states to discover lessons learned about how to meet accessibility needs of individuals with disabilities while minimizing test security risks. It…

  19. Insider Threat and Information Security Management

    Science.gov (United States)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  20. The appropriate and effective use of security technologies in U.S. schools : a guide for schools and law enforcement agencies.

    Energy Technology Data Exchange (ETDEWEB)

    Green, Mary Wilson

    2005-06-01

    The purpose of this report is to provide school administrators with the ability to determine their security system requirements, so they can make informed decisions when working with vendors and others to improve their security posture. This is accomplished by (1) explaining a systems-based approach to defining the objectives and needs of the system, and (2), providing information on the ability of common components (sensors, cameras, metal detectors, etc) to achieve those objectives, in an effectively integrated system.

  1. Law Enforcement Locations

    Data.gov (United States)

    Kansas Data Access and Support Center — Law Enforcement Locations in Kansas Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law enforcement agencies "are...

  2. The policy of import substitution as the basis for economic security and well-being of society

    Science.gov (United States)

    Makasheva, Yu S.; Makasheva, N. P.; Gromova, A. S.; Andreeva, N. V.; Ishtunov, S. A.

    2016-09-01

    The study presents the analysis of import substitution opportunities on separate branches of economic activity, preceding the realization of import substitution policy with the aim to support national economic security, which is essential for the contemporary society welfare insurance. Currently, social well-being is considered to be the reflection of economic activity, the instrument of state influence on the society, as well as an indicator of the social security system. Due to the fact that Russia is integrated into the world economy, the foreign-economic policy currently is playing an important role in the development of national security and the state's interest to the spheres of economy considering external and internal threats. Decline in external economic conditions may result in serious consequences for the functioning and development of the country as well as for the trade and investment activities, which will further lead to the decline in export, withdrawal of capital, recession of industrial production, trade and investment sphere, fall of GDP and living standards. Thus, considering the current state of instability in the world economy and the growing political tension in relation to Russian Federation, the measures to increase economic security in the country should be taken. The policy of import substitution is considered to be one of the major solutions nowadays.

  3. Food Supply Security and Import Substitution as the Key Strategic Objectives of the Modern Agricultural Policy

    Directory of Open Access Journals (Sweden)

    Anatoly Ivanovich Altukhov

    2015-09-01

    Full Text Available A crucially new social- and economic situation has shaped up by now in the rural areas and agricultural sphere; in its many instances such situation does not fit in the national agricultural policy in effect called upon to be a long-term instrument for economic adjustment of the agro-food market and state support of the agricultural sphere, most significantly, its foundation — the farming sector. Ensuring of food supply security by import substitution in the age of the national farm product markets globalization is possible in the macro-economic conditions promoting the development of the agricultural sector. The main reason that retards this sector development is inequitable cross-sector exchange at sacrifice of the agricultural industry. The article sets forward and approbates the author’s method of simple assessment procedure of how the price cross-sector relations and state financial support (in the form of subsidies of the agricultural enterprises influence their profitability generation. Further to the assessment, the following conclusions have been made: — in view of the tangible contribution of the agricultural sector to the country economy, this sector is self-reliant for its own development, i.e. the state is reasonably in a position to increase expenses for eliminating negative consequences of inequitable crosssector exchange; — the amount of expenses for state financial support is supposed to enable the agricultural commodity producers to generate profitability to the level that can stimulate the farm workers’ labour efficiency and build up a system of affordable credit facilities for the objects of techno-engineering modernization necessary to produce competitive products. — the issue of improving the competitiveness of agricultural production should be addressed in the first place at the federal level. Among the essential factors to increase the competitiveness of specific types of domestic food products and

  4. Law Enforcement : St. Vincent National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of the Law Enforcement Management Plan is to provide a ready reference to Service, Regional, and Station policies, procedures, and programs concerning...

  5. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Science.gov (United States)

    2012-12-26

    ... RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector... matters relating to the Classified National Security Information Program for State, Local, Tribal, and... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  6. Safety and Security in a School Environment: The Role of Dress Code Policies

    Science.gov (United States)

    Workman, Jane E.; Freeburg, Beth Winfrey

    2006-01-01

    This study examined high school student handbooks for evidence that school administrators consider dress codes as one strategy to address the physical and psychological security of students. "Physical" security refers to freedom from actual harm to the body. "Psychological security refers to freedom from implied threats to personal well-being.…

  7. From Peacekeeping to Peace Enforcement. The Blurring of the Mandate for the Use of Force in Maintaining International Peace and Security

    Science.gov (United States)

    1994-06-01

    violation of Article 2(4) or any "international act of agression " had occurred. 1 2 0 Security Council Resolution 713 was unanimously adopted on...hostages. Alison Smale, Serbs Shown Triumphant Over UN, Associated Press/AP Online , Apr. 19, 1994. 166. Carol J. Williams, Defiant Serbs Harden Stance

  8. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.

    Science.gov (United States)

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-11-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.

  9. Agriculture and food security challenge of climate change: a dynamic analysis for policy selection

    Directory of Open Access Journals (Sweden)

    Ferdous Ahmed

    2016-08-01

    Full Text Available ABSTRACT This study presents an empirical examination of climate change related to vulnerability impacts on food security and remedial adaptation options as a suitable strategy by prioritizing needs over a 50-year period. An Empirical Dynamic Commutable General Equilibrium Model for Climate and the Economy (EDCGECE is applied using future strategies for Malaysia against a baseline scenario of existing conditions, following the top-down options. The model takes into account various climatic variables, including climatic damage, carbon cycle, temperature and rainfall fluctuation, carbon emissions, vulnerability and carbon concentrations, which were adapted from national observational predictions of climatic changes caused by global warming from 2015 to 2065. The results prioritize climate change mitigation for the future. Specifically, this study estimates Malaysia’s food sustainability prospects without adaptation actions and with 5 % to 20 % adaptation actions overtime in different adaptation scenarios, as contrasted with the baseline. The results indicate that food sustainability cost in the baseline in 2015 is 859.3 million US Dollar (USD, which is about a 30-35 % shortage compared with the national targets, and that the shortage will rise over time to USD 987.3 million in 2065. However, the cost of applying different levels of adaptation for food sustainability over time is rising considerably. However, the residual damage also decreases with all adaptation actions in the different scenarios. Thus, adaptation shows a positive sign for Malaysia’s agricultural sectors. As growth values are positive and show rising trends, therefore the projected adaptation policy can be effective for food sustainability for sustainable future strategies in Malaysia.

  10. Frontier Security: The Case of Brazil

    Science.gov (United States)

    2016-08-01

    Hemisphere defense and security affairs, U.S. policy for Latin America and the Caribbean, civil-military relations, and defense education. Before... geography precludes extensive physical barriers. The country has found that law Figure 1. Brazil’s Defense Budget and GDP Growth Year 0 5,000 10,000...and had a history reaching back to the smug- gling of rubber out of South America from the late 19th century until World War II. Law enforce- ment

  11. Medicare program; prospective payment system for federally qualified health centers; changes to contracting policies for rural health clinics; and changes to Clinical Laboratory Improvement Amendments of 1988 enforcement actions for proficiency testing referral. Final rule with comment period.

    Science.gov (United States)

    2014-05-02

    This final rule with comment period implements methodology and payment rates for a prospective payment system (PPS) for federally qualified health center (FQHC) services under Medicare Part B beginning on October 1, 2014, in compliance with the statutory requirement of the Affordable Care Act. In addition, it establishes a policy which allows rural health clinics (RHCs) to contract with nonphysician practitioners when statutory requirements for employment of nurse practitioners and physician assistants are met, and makes other technical and conforming changes to the RHC and FQHC regulations. Finally, this final rule with comment period implements changes to the Clinical Laboratory Improvement Amendments (CLIA) regulations regarding enforcement actions for proficiency testing (PT) referrals.

  12. Enforcement and illegal migration

    OpenAIRE

    Pia Orrenius

    2014-01-01

    Border enforcement of immigration laws attempts to raise the costs of illegal immigration, while interior enforcement also lowers the benefits. Border and interior enforcement therefore reduce the net benefits of illegal immigration and should lower the probability that an individual will decide to migrate. While some empirical studies find that border and interior enforcement serve as significant deterrents to illegal immigration, immigration enforcement is costly and carries significant uni...

  13. On the Enforceability of EU Agencies’ Soft Law at the National Level: The Case of the European Securities and Markets Authority

    NARCIS (Netherlands)

    van Rijsbergen, Marloes

    2014-01-01

    The proliferation of EU agencies1 is one of the most important institutional developments at the EU level.2 Because they are considered to be an effective tool in implementing EU policies,3 the scope of delegation to agencies has grown not only in quantitative terms, but also qualitatively, implying

  14. Public healthcare interests require strict competition enforcement.

    Science.gov (United States)

    Loozen, Edith M H

    2015-07-01

    Several countries have introduced competition in their health systems in order to maintain the supply of high quality health care in a cost-effective manner. The introduction of competition triggers competition enforcement. Since healthcare is characterized by specific market failures, many favor healthcare-specific competition enforcement in order not only to account for the competition interest, but also for the healthcare interests. The question is whether healthcare systems based on competition can succeed when competition enforcement deviates from standard practice. This paper analyzes whether healthcare-specific competition enforcement is theoretically sound and practically effective. This is exemplified by the Dutch system that is based on regulated competition and thus crucially depends on getting competition enforcement right. Governments are responsible for correcting market failures. Markets are responsible for maximizing the public healthcare interests. By securing sufficient competitive pressure, competition enforcement makes sure they do. When interpreted according to welfare-economics, competition law takes into account both costs and benefits specific market behavior may have for healthcare. Competition agencies and judiciary are not legitimized to deviate from standard evidentiary requirements. Dutch case law shows that healthcare-specific enforcement favors the healthcare undertakings concerned, but to the detriment of public health care. Healthcare-specific competition enforcement is conceptually flawed and counterproductive. In order for healthcare systems based on competition to succeed, competition enforcement should be strict. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  15. Evaluation of the Latvian Financial Security: Aspects of Government Debt Policy

    OpenAIRE

    Semjonova, N

    2015-01-01

    Due to increased risk and severity of the global economic and financial crisis, the evaluation of financial security is vital for the national security. Internationally recognized indicators, such as sovereign credit ratings, may overestimate the actual situation due to political reasons. This paper presents a consolidated indicator of the state financial security, which takes into account a number of the state economic and financial parameters. The calculated indicator correlates well with t...

  16. Technology options and effective policies to reduce GHG emissions and improve security of supply. Final report CASCADE MINTS. Part 2

    Energy Technology Data Exchange (ETDEWEB)

    Uyterlinde, M.A.; Martinus, G.H.; Rosler, H. [ECN Policy Studies, Petten (Netherlands); Kouvaritakis, N.; Panos, V.; Mantzos, L.; Zeka-Paschou, M. [National Technical University of Athens NTUA, Athens (Greece); Kypreos, S. [Paul Scherrer Institute, Villigen (Switzerland); Jokisch, S. [Zentrum fuer Europaeische Wirtschaftsforschung ZEW, Mannheim (Germany); Blesl, M.; Ellersdorfer, I.; Zuern, M.; Fahl, U. [Institute of Energy Economics and the Rational Use of Energy IER, Stuttgart (Germany); Pratlong, F.; Le Mouel, P. [Equipe de Recherche en Analyse des Systemes et Modelisation Economiques ERASME, Ecole Centrale Paris, Paris (France); Keppo, I. [The International Institute for Applied Systems Analysis IIASA, Laxenburg (Austria); Sano, F.; Akimoto, K.; Homma, T.; Tomada, T. [Research Institute of Innovative Technology for the Earth RITE, Kyoto (Japan); Szabo, L.; Russ, P.; Suwala, W. [Institute for Prospective Technological Studies IPTS, Joint Research Centre JRC, Sevilla (Spain)

    2007-03-15

    A more sustainable energy system requires a portfolio of innovative technological options. The problems faced by Europe and the world are of a magnitude for which no single technology is the solution. Some of the options benefit both the climate problem and security of supply, and thus provide synergies, while others represent trade-offs for the policymaker. This report presents results of Part 2 of the CASCADE MINTS project. In this project, 15 renowned modelling teams in Europe, the US and Japan have provided an outlook to possible transitions of the energy system in Europe and at the global level. The objective of this project was to use a wide range of existing operational energy and energy/economy models in order to build analytical consensus concerning the impacts of policies aimed at sustainable energy systems. The emphasis is placed on evaluating the effects of policies influencing technological developments. Technologies assessed are renewables, nuclear power, CO2 capture and storage and hydrogen. There are synergies and trade-offs when applying these options for the main policy objectives of climate change mitigation and improving security of supply. This report provides a synthesis of the various policy briefs that were written for each of the individual transition pathways.

  17. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... Outside studies emphasize a growing sense of insecurity in areas previously considered secure, increased numbers of suicide attacks, and growing divisions within the NATO alliance about total troop...

  18. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... and outside assessments emphasize a growing sense of insecurity in areas around Kabul previously considered secure, increased numbers of suicide attacks and civilian deaths, and divisions within...

  19. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  20. Asylum migration and the construction of the European Common Foreign and Security Policy: evidence from the Greek case

    Directory of Open Access Journals (Sweden)

    Silvia Lucía Forero Castañeda

    2015-12-01

    Full Text Available This article examines how the recent evolution of asylum migration has affected the construction of the European Common Foreign and Security Policy (EU-CFSP, taking the Greek case during the 2001-2012 period as a starting point. With this in mind, the normative progress of the EU-CFSP facing the reception of asylum seekers in Greece is analyzed, under the scope of what Barry Buzan and Ole Waever would call Securitization Process. Both legal and political frameworks on asylum migration in Greece and in the European Union are approached, in the context of the evolution of the EU-CFSP in three main areas: Neighborhood Policy, Development and Cooperation Policy, and Human Rights Protection. The conclusión points toward the partial influence of asylum migration in the configuration of the UE-CFSP during the studied period.

  1. REDD policy impacts on the agri-food sector and food security

    NARCIS (Netherlands)

    Tabeau, A.A.; Meijl, van J.C.M.; Overmars, K.P.; Stehfest, Elke

    2015-01-01

    The REDD policy which preserves, enables substantial emission reductions. Since agricultural production and area expansion is a primary driver of tropical deforestation, REDD policies might limit the expansion possibilities of agricultural land use and therefore influence competitiveness,

  2. Clausewitz and the Theory of Military Strategy in Europe - Reflections Upon a Paradigm of Military Strategy Within the European Common Security and Defense Policy (ESDP)

    National Research Council Canada - National Science Library

    Hartmann, Uwe

    2001-01-01

    ... as a core element of the Common Security and Defense Policy of the EU, Based on the interpretation of Clausewitz's theory of war and strategy in Britain, France, and Germany, main commonalities...

  3. Leveraging Food Security with Food Aid: The Role of Applied Policy ...

    African Journals Online (AJOL)

    The paper considers that food aid must not only contribute directly to food security; it must be used, wherever possible, to contribute to development. Food aid has now become a scarce resource; it must therefore be used to make a bigger impact on food and nutritional security through better management at the ...

  4. Proposed Embedded Security Framework for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives...... a detailed survey and analysis of embedded security especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis , isolation...

  5. Changes in the SF-8 scores among healthy non-smoking school teachers after the enforcement of a smoke-free school policy: a comparison by passive smoke status.

    Science.gov (United States)

    Kiyohara, Kosuke; Itani, Yuri; Kawamura, Takashi; Matsumoto, Yoshitaka; Takahashi, Yuko

    2010-04-28

    The effects of the enforcement of a smoke-free workplace policy on health-related quality of life (HRQOL) among a healthy population are poorly understood. The present study was undertaken to examine the effects of the enforcement of a smoke-free school policy on HRQOL among healthy non-smoking schoolteachers with respect to their exposure to passive smoke. Two self-reported questionnaire surveys were conducted, the first before and the second after the enforcement of a total smoke-free public school policy in Nara City. A total of 1534 teachers were invited from 62 schools, and their HRQOL was assessed using six domains extracted from the Medical Outcomes Survey Short Form-8 questionnaire (SF-8): general health perception (GH), role functioning-physical (RP), vitality (VT), social functioning (SF), mental health (MH), and role functioning-emotional (RE). The participants were divided into two groups according to their exposure to environmental tobacco smoke (ETS) at baseline: participants not exposed to ETS at school (non-smokers), and participants exposed to ETS at school (passive smokers). Changes in each SF-8 score were evaluated using paired t-tests for each group, and their inter-group differences were evaluated using multiple linear regression analyses adjusted for sex, age, school type, managerial position, and attitude towards a smoke-free policy. After ineligible subjects were excluded, 689 teachers were included in the analyses. The number of non-smokers and passive smokers was 447 and 242, respectively. Significant changes in SF-8 scores were observed for MH (0.9; 95% confidence interval [CI], 0.2-1.5) and RE (0.7; 95% CI, 0.0-1.3) in non-smokers, and GH (2.2; 95% CI, 1.2-3.1), VT (1.8; 95% CI, 0.9-2.7), SF (2.7; 95% CI, 1.6-3.8), MH (2.0; 95% CI, 1.0-2.9), and RE (2.0; 95% CI, 1.2-2.8) in passive smokers. In the multiple linear regression analyses, the net changes in the category scores of GH (1.8; 95% CI, 0.7-2.9), VT (1.4, 95% CI, 0.3-2.5), SF (2

  6. Policy based network management : state of the industry and desired functionality for the enterprise network: security policy / testing technology evaluation.

    Energy Technology Data Exchange (ETDEWEB)

    Morgan, Christine A.; Ernest, Martha J.; Tolendino, Lawrence F.; Klaus, Edward J.; MacAlpine, Timothy L.; Rios, Michael A.; Keliiaa, Curtis M.; Taylor, Jeffrey L.

    2005-02-01

    Policy-based network management (PBNM) uses policy-driven automation to manage complex enterprise and service provider networks. Such management is strongly supported by industry standards, state of the art technologies and vendor product offerings. We present a case for the use of PBNM and related technologies for end-to-end service delivery. We provide a definition of PBNM terms, a discussion of how such management should function and the current state of the industry. We include recommendations for continued work that would allow for PBNM to be put in place over the next five years in the unclassified environment.

  7. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks......, the collaboration between science, anthropology and the military, transnational terrorism, and the ethical consequences of security expertise. Together they challenge our understanding of how expertise works and what consequences it has for security politics and international relations. This book...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  8. The mass balance of production and consumption: Supporting policy-makers for aquatic food security

    Science.gov (United States)

    Lopes, A. S.; Ferreira, J. G.; Vale, C.; Johansen, J.

    2017-03-01

    the world, well above both Malaysia and South Korea (each with 58 kg ind-1 y-1). The corrected data show that Portugal had the highest consumption rate in the world until the mid-1970's, when it was overtaken by Iceland for reasons discussed herein. The lack of detailed per-species consumption data, as well as the grouping of species by commodities, hinders a more detailed seafood consumption analysis, required by policy makers and stakeholders to effectively develop management measures to reduce illegal fishing or bycatch, and to correctly formulate strategic options for development of aquaculture and fisheries, necessary for ensuring food security over the next decades.

  9. News media representations of a common EU foreign and security policy: a cross-national content analysis of CFSP coverage in national quality newspapers

    NARCIS (Netherlands)

    Kandyla, A.-A.; de Vreese, C.

    2011-01-01

    This study is a cross-national comparative content analysis of the broadsheet press coverage of EU Common Foreign and Security issues (n=1453) focusing on the presence of indicators of a European Public Sphere. Specifically, we investigated the visibility of Common Foreign and Security Policy (CFSP)

  10. The Strategic Petroleum Reserve: United States energy security, oil politics, and petroleum reserves policies in the twentieth century

    Science.gov (United States)

    Beaubouef, Bruce Andre

    The history of U.S. petroleum reserves policies in the twentieth century, including the Strategic Petroleum Reserve (SPR) program, provides a case study of the economic and political aspects of national security, and shows the ways in which the American political economy influences national security. One key problem plagued federal petroleum reserve programs and proposals throughout the twentieth century. In a political economy which traditionally placed strong emphasis upon the sanctity of private property and free markets, could the government develop an emergency petroleum reserve policy despite opposition from the private sector? Previous literature on the SPR and oil-stockpiling programs has largely disregarded the historical perspective, focusing instead upon econometric models, suggesting future oil-stockpiling policy options. This study will also make conclusions about the future of governmental oil-stockpiling policies, particularly with regard to the SPR program, but it will do so informed by a systematic history of the emergency petroleum reserve impulse in the twentieth century. Through a study of the emergency petroleum reserve impulse, one can see how the American political economy of oil and energy changed over the twentieth century. As petroleum became crucial to the military and then economic security of the United States, the federal government sought to develop emergency petroleum reserves first for the military, then for the civilian economy. But while the American petroleum industry could deliver the energy "goods" to American energy consumers at a reasonable price, the companies reigned supreme in the political equation. While that was true, federal petroleum reserve programs and proposals conflicted with and were overwhelmed by the historic American tradition of individual economic and private property rights. The depletion of American petroleum reserves changed that political equation, and the ensuing energy crises of the 1970s not only

  11. Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan

    Science.gov (United States)

    Nabi, Syed Irfan; Nabi, Syed Waqar; Tipu, Syed Awais Ahmed; Haqqi, Bushra; Abid, Zahra; Alghathbar, Khaled

    The amount of data communications is increasing each day and with it comes the issues of assuring its security. This research paper explores the information security management issues with respect to confidentiality and integrity and the impact of Information Security Management Standards, Policies and Practices (ISMSPP) on information security. This research has been conducted on the telecommunication industry of Pakistan that was ranked 9th globally in 2009 in terms of subscription. The research methodology was case study based in which perceptions were gathered as well as thematic analysis of the interviews was done. The research focus is on breach of data integrity and confidentiality by the internal users in the industry and the perception of improvement, if any, of the data security due to implementation of security management policies and controls. The results show that information security measure are perceived to have a positive impact on reducing data confidentiality and integrity breaches but still falls short of what is required. It concludes that security policies might improve the situation provided, firstly, that the top managements takes information security seriously, and secondly, the non-technical human aspects of the issues are taken into consideration.

  12. Expandable Grids: A User Interface Visualization Technique and a Policy Semantics to Support Fast, Accurate Security and Privacy Policy Authoring

    Science.gov (United States)

    2008-07-01

    simplify presentation. For example, we grouped the P3P “contact” and “ telemarketing ” purposes into one higher-level “marketing” category. Since...about the privacy policies: 1. Telemarketing : Will Acme collect your home phone number and use it for telemarketing ? 2. Cookies: Does the Acme website...answers as applied. The Telemarketing question was always presented first and served as a question to allow participants to gain some familiarity with

  13. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    ... government authority in some areas of Afghanistan. The outside studies emphasize a growing sense of insecurity in areas previously considered secure, increased numbers of suicide attacks, and growing divisions within the NATO alliance about total...

  14. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    ....-led eastern sector of Afghanistan. However, recent outside studies contain relatively pessimistic assessments, emphasizing a growing sense of insecurity in areas previously considered secure, increased numbers of suicide attacks...

  15. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... officials say they are not sure the effort is "winning." These assessments emphasize a growing sense of insecurity in areas around Kabul previously considered secure, and increased numbers of civilian and military deaths...

  16. Afghanistan: Post-War Governance, Security, and U.S. Policy

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    .... Both the official U.S. as well as outside assessments increasingly point to Pakistan's failure to prevent Taliban and other militant infiltration into Afghanistan as a cause of the security deterioration...

  17. Cybersecurity via Intermediaries : Analyzing Security Measurements to Understand Intermediary Incentives and Inform Public Policy

    NARCIS (Netherlands)

    Asghari, H.

    2016-01-01

    Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure

  18. Distributed security in closed distributed systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario

    in their design. There should always exist techniques for ensuring that the required security properties are met. This has been thoroughly investigated through the years, and many varied methodologies have come through. In the case of distributed systems, there are even harder issues to deal with. Many approaches...... systems. We achieve the goal of showing how this can be done, though we restrict ourselves to closed systems and with a limited set of enforceable security policies. In this setting, our approach proves to be efficient. Finally, we achieve all this by bringing together several fields of Computer Science...

  19. The Impact of the Soviet Military Presence in the Arctic Region on Norwegian Security Policies

    Science.gov (United States)

    1990-01-01

    Furlong , a Norwegian Defense expert, wrote in International Defense Review in 1979: "Senior NATO commanders and intelligence officers in the Baltic...Defense. 21 R.D.M. Furlong , "The Threat to Northern Europe", International Defense Review, vol 4, (1979): 518. 22 Sjaastad, "Security Problems on the...Objectives in the Arctic region can be broken down into three categories; political, economic and security. Writing in 1988, Stephen Meyer listed the

  20. The implications of the People's Liberation Army's modernization for the Republic of Korea's security policy

    OpenAIRE

    Kim, Sangmin

    2009-01-01

    South Korean security has been threatened by North Korea since the Korean War. The collapse of the Soviet Union has required Northeast Asian regional security to be reconfigured. North Korea remains as South Korea's primary threat. China is emerging rapidly and creating several issues directly and indirectly that are related to South Korea. Especially, China's PLA modernization has been remarkable in its capability and ambition. Therefore, threats imposed by China to South Korea may seem...

  1. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-06-06

    marriages in Afghanistan are forced , despite laws banning the practice, and a majority of brides are younger than the legal marriage age of 16.  The...National Defense and Security Forces (ANDSF). The Afghan government has come under increasing domestic criticism not only for the security situation but for...created under the compromise might become a prime ministership in a restructured government. The number of U.S. forces in Afghanistan, which peaked at

  2. Does tougher enforcement make drugs more expensive?

    Science.gov (United States)

    Pollack, Harold A; Reuter, Peter

    2014-12-01

    To review empirical research that seeks to relate marginal increases in enforcement against the supply of illicit drugs to changes in drug prices at the level of the drug supply system being targeted. Review of empirical studies. Although the fact of prohibition itself raises prices far above those likely to pertain in legal markets, there is little evidence that raising the risk of arrest, incarceration or seizure at different levels of the distribution system will raise prices at the targeted level, let alone retail prices. The number of studies available is small; they use a great variety of outcome and input measures and they all face substantial conceptual and empirical problems. Given the high human and economic costs of stringent enforcement measures, particularly incarceration, the lack of evidence that tougher enforcement raises prices call into question the value, at the margin, of stringent supply-side enforcement policies in high-enforcement nations. © 2014 Society for the Study of Addiction.

  3. 78 FR 46498 - Delegation of Authority to Director of the Division of Enforcement

    Science.gov (United States)

    2013-08-01

    ... to appoint distribution fund administrators in enforcement administrative proceedings from a..., Office of Distributions, Division of Enforcement, Securities and Exchange Commission, 100 F Street NE... hearing officer shall have discretion to appoint any person, including a Commission employee, as...

  4. Understanding the Role of Bureaucracy in the European Security and Defence Policy: The State of the Art

    Directory of Open Access Journals (Sweden)

    Maurer Heidi

    2010-08-01

    Full Text Available The establishment of the European Security and Defence Policy (ESDP in 1999 has led to the creation of a whole range of bureaucratic bodies in Brussels and the national capitals. These bodies support the crisis management operations of the European Union. This review article presents the state of the art of academic research on the role of bureaucracy in this recent policy area. It argues that the growing institutional complexity and the constant interaction between actors at the national and European level require scholars to go beyond the dominant approaches of International Relations. Using insights from comparative politics, public administration and multi-level governance, this article considers four important questions: who these civil servants are, why they matter, how they interact, and how they are controlled politically and democratically.

  5. How Strong Is Europeanisation, Really? The Danish Defence Administration and the Opt-Out from the European Security and Defence Policy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2011-01-01

    thesis. The article shows that in spite of the opt-out, the administrative structures and the policy processes in the Ministry of Foreign Affairs (MFA) have adapted to the common foreign and security policy (CFSP) and the European security and defence policy (ESDP). Surprisingly, the administrative...... is not an explanation of administrative adaptation. The pressure from Europeanisation has to be propagated by actors. In the case of the Danish defence administration, the promoter is government officials embedded in a domestic political-bureaucratic environment, which is remarkably positive towards the integration...

  6. Balancing security and liberty within the European human rights framework. A critical reading of the Court’s case law in the light of surveillance and criminal law enforcement strategies after 9/11

    Directory of Open Access Journals (Sweden)

    Paul J.A. de Hert

    2005-07-01

    Full Text Available Literature concerning human rights protection by the European Court on Human Rights after 9/11 is very often coloured by optimism. Some authors hold that judicial control by the European Court on national anti-terrorism measures is very strict, especially compared to U.S. judicial review. Others suggest the existence of a strict privacy test developed by the European Court as a bulwark again anti-terrorism measures that give too much discretion to law enforcement authorities. In this paper we discuss the ‘classical’ European framework with regard to ‘hard’ anti-terrorism measures and the privacy framework that is relevant for new, ‘softer’ anti-terrorism measures. it is argued that this optimistic reading of the European human rights framework in the area of security especially with regard to the latter is flawed and based on a misunderstanding of the case law of the European Court. This analysis leaves little room for optimism about judicial review of the legislator in Europe and urges for an attitude of self-restraint.

  7. Regulatory Enforcement and Compliance

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    1999-01-01

    This study of municipal enforcement of agro-environmental regulations in Denmark provides an empirical understanding of how enforcement affects compliance. A key contribution is sorting out the relative influence of inspectors' different styles of enforcement and choices made by enforcement...... agencies. The latter are shown to be more important in bringing about compliance than are inspectors' enforcement styles. Municipal agencies are shown to increase compliance through the use of third parties, more frequent inspection, and setting priorities for inspection of major items. The findings about...

  8. India's grain security policy in the era of high food prices

    DEFF Research Database (Denmark)

    Yu, Wusheng; Bandara, Jayatilleke

    2017-01-01

    consumers and producers and restricting exports entailed huge fiscal costs and equally large welfare costs to India, an outcome that is almost always the worst as compared to the alternative policy mixes examined in this study. While the most market-oriented domestic and trade policy alternatives that would......This study uses a computable general equilibrium model to evaluate the fiscal and welfare costs of the market stabilisation and insulating food policy of India during the 2007-08 global food crisis. We demonstrate that domestic food grain price stabilisation through simultaneously subsidising...... generate better welfare effects and the least fiscal costs may not be feasible due to political economy considerations, we argue that there exist some 'middle-ground' policy mixes featuring partial relaxations of domestic subsidies on either food grains or fertilisers and/or less restrictive border...

  9. Columbia's Democratic Security and Defense Policy in the Demobilization of the Paramilitaries

    National Research Council Canada - National Science Library

    Perdomo, Jose R

    2007-01-01

    .... To deal with these complex issues, President Alvaro Uribe's administration designed a strategy known as "Democratic and Defense Policy," which showed significant results for the period 2002 to 2006...

  10. Brexit and Article 50 of the Treaty of the European Union: Implications for UK Energy Policy and Security

    Directory of Open Access Journals (Sweden)

    Augustine O. Ifelebuegu

    2017-12-01

    Full Text Available This paper articulates the potential implications of Brexit on energy policy and security in the United Kingdom (UK. Given the uncertainties associated with the decision to leave the European Union (EU, the need to consider its potential effects on the UK’s energy sector becomes even more pertinent. Through the lens of a few widely reviewed trade regimes in the light of Brexit, it can be observed that while UK energy policies are unlikely to change drastically, Brexit nevertheless threatens the UK’s capacity to safeguard its energy supply. The uncertainties following Brexit could arguably starve the UK’s upstream petroleum, electricity, and renewable energy sectors of their required investments. Both short and long-term impacts could result in UK residents paying more per unit of energy consumed in a “hard Brexit” scenario, where the UK exits the Internal Energy Market (IEM and must trade with the EU under World Trade Organisation rules. While a hard Brexit could aid the growth of the nascent shale gas industry, a negotiated withdrawal that includes some form of access to the IEM (a “soft Brexit” would be more beneficial for the future of energy security in the UK.

  11. Security Policy in the European Union and the United States through the issue of their Defence Expenditures

    Directory of Open Access Journals (Sweden)

    Dr. Theodore Metaxas

    2012-01-01

    Full Text Available This article aims to clarify how the level of defence expenditures affected security poli-cy in the post-World War II Europe and the United States till the present day. We first analyze theoretically the issue of a nation’s power through its defence outlays. We then proceed to the examination of how security policy was formulated during Cold War and afterwards for both Europe and the United States through their defence ex-penditures. By comparing European to United States defence budgets ceilings we found that the European military capabilities are undermined by the low level of the defence budget which is provided by the European Union member states as a whole, as well as by the lack of homogeneity in military means. By contrast, we noticed that the historically large US defence expenditures were one of the major reasons for the US global hegemony during Cold war and afterwards. We also examine the implica-tions that defence expenditures have on military industry, macroeconomic perfor-mance and geopolitics and the correlation that arises among them.

  12. A Security plan for LMOs - concentrated on environmental policy of Biosafety Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Park, Yong Ha [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    Biotechnology industry in Korea is raised by the national support. Also, Korea imports 70% of entire agricultural products. Considering the present situation in Korea, signing a Biosafety Protocol is necessary to prevent harm by LMOs and to protect associated biotechnological industry. Therefore, the problems on signing Biosafety Protocol were analyzed and the environmental policy to be pursued was proposed. This study result will be a cornerstone to prepare a definite environmental policy by government. 54 refs., 7 figs., 27 tabs.

  13. BULGARIA’S MULTI-VECTOR FOREIGN POLICY APPROACH TO SECURITY CHALLENGES IN EASTERN EUROPE

    Science.gov (United States)

    2017-04-06

    Russian influence in their political, economic and energy policies. The small Eastern European (EE) states are facing now a fundamentally altered...But even this deterioration of bilateral relations was not able to cut entirely the economic and military ties, and reduce the energy dependency ...policy and is involved in a new dangerous and unpredictable confrontation. Although maintaining a high dependence on Russia’s economy and energy

  14. An overview analysis of selected challenges in the enforcement of ...

    African Journals Online (AJOL)

    Moreover, cross-border trading in securities has, to some extent, given rise to the inconsistent application and enforcement of the market abuse prohibition in ... the Committee of European Securities Commissions Regulators (CESR), the European Securities and Markets Authority (ESMA), the Lamfalussy Process and the ...

  15. Global Strategy Choices (GSC) : Prognosis and Strategic Planning for European Foreign and Security Policy

    NARCIS (Netherlands)

    Zwitter, Andrej; Kettle, Lawrence

    2015-01-01

    The European Security Strategy (ESS) is currently being reformulated. This working paper puts forward a new methodological approach in the construction of global strategies for stakeholders in the international system. It makes the case that contemporary strategy formulation (including the ESS)

  16. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  17. Security Assistance International Logistics, Training, and Technical Assistance Support Policy and Responsibilities

    Science.gov (United States)

    2000-01-24

    assessment will be drawn from a variety of sources, such as checklists prepared by the in-country SAO, in-country surveys, and security assistance re...activity will prepare, coordinate, and execute the lease agreement with industry after HQDA (SAUS-IA- DSE ) obtains ASA(AL&T) approval as appropriate. d

  18. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Full Text Available The theme for World Health Day campaign for this year 2015 is “Food safety: from farm to plate, make food safe”. The day focuses on demonstrating the importance of food safety along the whole length of the food chain in a globalized world, from production and transport, to preparation and consumption (1. Everyone needs food and needs it every day either plant sources or animal sources or both. The food we eat must be nutritious and safe but we often ignore or overlook the issue of food safety. Many cases of food borne diseases either acute poisoning or chronic exposure are largely under reported. In this globalized world, though the food chain extends over thousands of miles from different continents, an error or contamination in one country can affect the health of consumers on the other part of the world. To ensure full impact, these actions must build on principles of government stewardship, engagement of civil society, (2.According to UN, access to a safe and secure food supply is a basic human right. Food safety and food security are interrelated concepts which have an impact on the health outcomes and quality of human lives. As per Food and Agricultural Organization (FAO, Food security is a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life, (3. Based on the definition of Food security, four food security dimensions can be identified: food availability, economic and physical access to food, food utilization and stability over time. Apart from that food security is also affected by Poverty and Climate change.Food safety is an umbrella term that encompasses many aspects like food items handling, preparation and storage of food to prevent illness and injury. The other important issues are chemical, microphysical and microbiological aspects of food safety, (4. Control of

  19. Secure the Clones

    Science.gov (United States)

    Jensen, Thomas; Kirchner, Florent; Pichardie, David

    Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying before accepting or handing out references to an internal mutable object. However, implementation of a copy method (like clone()) is entirely left to the programmer. It may not provide a sufficiently deep copy of an object and is subject to overriding by a malicious sub-class. Currently no language-based mechanism supports secure object cloning. This paper proposes a type-based annotation system for defining modular copy policies for class-based object-oriented programs. A copy policy specifies the maximally allowed sharing between an object and its clone. We present a static enforcement mechanism that will guarantee that all classes fulfill their copy policy, even in the presence of overriding of copy methods, and establish the semantic correctness of the overall approach in Coq. The mechanism has been implemented and experimentally evaluated on clone methods from several Java libraries.

  20. Essentials for Attorneys in Child Support Enforcement.

    Science.gov (United States)

    Henry, Michael R.; And Others

    This handbook presents a course developed to provide a national perspective for attorneys who represent state and local child support enforcement agencies operating under Title IV-D of the Social Security Act. The introduction provides an overview of the child support problem in the United States, citing causes and effects of the problem and…

  1. Social Security reform: evaluating current proposals. Latest results of the EBRI-SSASIM2 policy simulation model.

    Science.gov (United States)

    Copeland, C; VanDerhei, J; Salisbury, D L

    1999-06-01

    The present Social Security program has been shown to be financially unsustainable in the future without modification to the current program. The purpose of this Issue Brief, EBRI's fourth in a series on Social Security reform, is threefold: to illustrate new features of the EBRI-SSASIM2 policy simulation model not available in earlier EBRI publications, to expand quantitative analysis to specific proposals, and to evaluate the uncertainty involved in proposals that rely on equity investment. This analysis compares the Gregg/Breaux-Kolbe/Stenholm (GB-KS) and Moynihan/Kerrey proposals with three generic or "traditional" reforms: increasing taxes, reducing benefits, and/or increasing the retirement age. Both proposals would create individual accounts by "carving out" funds from current Social Security payroll taxes. This analysis also examines other proposed changes that would "add on" to existing Social Security funds through the use of general revenue transfers and/or investment in the equities market. President Clinton has proposed a general revenue transfer and the collective investment of some of the OASDI trust fund assets in equities. Reps. Archer and Shaw have proposed a general revenue tax credit to establish individual accounts that would be invested partially in the equities markets. When comparing Social Security reform proposals that would specifically alter benefit levels, the Moynihan/Kerrey bill compares quite favorably with the other proposals in both benefit levels and payback ratios, when individuals elect to use the individual account option. In contrast, the GB-KS bills do not compare quite as favorably for their benefit levels, but do compare favorably in terms of payback ratios. An important comparison in these bills is the administrative costs of managing the individual accounts, since benefits can be lowered by up to 23 percent when going from the assumed low to high administrative costs. Moreover, allowing individuals to decide whether to

  2. FOOD SECURITY PROVIDING OF THE SVERDLOVSKAYA OBLAST POPULATION AS THE AGRARIAN POLICY BASIS

    Directory of Open Access Journals (Sweden)

    M.V. Fedorov

    2008-12-01

    Full Text Available Food safety may be interpreted as production systems attribute providing during different technological processes the security and the quality of food products. The key role in this is played by control systems over these processes. Any control system is based on the information data concerning efficiency and state of the system. This information is necessary for operative quality management and the frequency of hypothetic deviations may serve as a universal numeric indicator of the technological processes breakages. The basic elements of food security provision in the region are seen as the following: orientation on our own resources; agro industrial complex restructuring wits a due account of disproportions in its spheres; innovation changes in the production processes in view of competitiveness increase; nutrition improvement and health of the population.

  3. Sustainable Food Security in the Mountains of Pakistan: Towards a Policy Framework.

    Science.gov (United States)

    Rasul, Golam; Hussain, Abid

    2015-01-01

    The nature and causes of food and livelihood security in mountain areas are quite different to those in the plains. Rapid socioeconomic and environmental changes added to the topographical constraints have exacerbated the problem of food insecurity in the Hindu Kush-Himalayan (HKH) region. In Pakistan, food insecurity is significantly higher in the mountain areas than in the plains as a result of a range of biophysical and socioeconomic factors. The potential of mountain niche products such as fruit, nuts, and livestock has remained underutilized. Moreover, the opportunities offered by globalization, market integration, remittances, and non-farm income have not been fully tapped. This paper analyzes the opportunities and challenges of food security in Pakistan's mountain areas, and outlines a framework for addressing the specific issues in terms of four different types of area differentiated by agro-ecological potential and access to markets, information, and institutional services.

  4. State of global fisheries – management policies

    OpenAIRE

    Alicja Dabrowska; Lara D. Mateos

    2013-01-01

    Global fisheries landings have stagnated and are associated with many negative environmental impacts, affecting the economy and food security in many countries around the world. Although many different management policies trying to incorporate a more sustainable and resilient scope have been developed over the years to improve this current fisheries crisis, we are still in the early stages of adopting more adaptive and corrective fisheries management globally, as well as enforcing it, due to ...

  5. Britain, France and Germany: Priorities for the European Union’s Security and Defense Policy

    Science.gov (United States)

    2009-12-01

    March 2008), 4. 25 Ibid., 15. 11 change, competition for energy, poverty and poor governance, demographic changes and globalisation .”26 The NSS...the multilateral approach offers the greatest advantages in terms of political legitimacy, they are also willing to use their forces in a bilateral...stabilization obligations abroad by wasting scarce financial resources to fulfill outdated security goals.166 These disadvantages constrain the

  6. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-11-08

    sustaining Afghanistan is to encourage economic development and integration into regional trading patterns. However, Afghanistan will remain dependent...shows since 2011. Because of the power of Islamist conservatives, alcohol is increasingly difficult to obtain in restaurants and stores, although it...to stability in Afghanistan has been sustained by a number of factors, including (1) the small numbers of security forces in many rural areas; (2

  7. Rethinking Food: How United States Agriculture Production Affects Security Policy and Global Markets

    Science.gov (United States)

    2014-06-13

    sustenance. Food Wars continues by highlighting increased meat consumption in China and corn based ethanol production in the United States as examples...Korea more pliable in crafting a long-term Korean Peninsula security arrangement. President George W. Bush seemed to have largely de-linked food...nuclear test, brings credence to Victor Cha’s description of Bush . Cha wrote that “His concern for the plight of the people was about as genuine as

  8. The Age of Consequences: The Foreign Policy and National Security Implications of Global Climate Change

    Science.gov (United States)

    2007-11-01

    overturning circulation (MOC; also known as the thermohaline circulation or the ocean conveyor belt). These currents transport warm tropical surface water...global warming as imperative for the sake of energy security, economic growth, trade, and U.S. global leadership. Industry has also discovered that...projections,” Science 316 (2007): 709; M.E. Schlesinger, et al., “Assessing the Risk of a Collapse of the Atlantic Thermohaline Circulation,” in H. J

  9. Japan’s security policy and the war on terror : steady incrementalism or radical leap?

    OpenAIRE

    Hughes, Christopher W.

    2002-01-01

    The study of globalisation carries important conceptual insights into the contemporary security agenda following the events of 9/11. This working paper argues that globalisation can be defined in a variety of ways, ranging from liberalisation to Westernisation, and can also be extended into concepts of supra-territorialisation. In combination, these definitions help to explain the generation of 9/11 style-conflict by providing the political-economic motivation for hyper-terrorism, by facilita...

  10. An Object-Oriented Approach to Security Policies and their Access Controls for Database Management

    Science.gov (United States)

    1991-09-01

    I (subsets of classified documents with the top -secret clearance) (subsets of classified documents with the scret , clearance)I An user profile with...to be identified by its classification level sich as top secret, secret, or confidential. These classification levels establish a strict security...hierarchy with, for example, top secret ’above’ the secret level, and confidential ’below’ the secret level. Compartmentalization enables classified data

  11. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  12. Conditions of Poland’s foreign and security policy within the EU and NATO environment

    Directory of Open Access Journals (Sweden)

    Antczak- Barzan Anna

    2014-01-01

    Full Text Available The article is an attempt to answer the question about the state of Poland’s security after the first decade of the twenty-first century, what are its determinants, what kind of challenges Poland faces and which of them may turn into a threat and which into an opportunity, or what Polish potential is and which of its components determine its position on the international arena. It is achieved through a detailed analysis of actions undertaken by Poland in the international arena to strengthen its international position as well as the level of its security. Thus, the aim is to identify those determinants which may contribute to establishing a stronger position and which can create problems and become a formidable challenge in the context of various aspects of security, and even develop into a threat. Unfortunately, the picture which comes out of the above mentioned analysis is not optimistic and the impression is that Poland did not use the chance it was given after the accession to the NATO and the EU.

  13. Security policy speculation of user uploaded images on content sharing sites

    Science.gov (United States)

    Iyapparaja, M.; Tiwari, Maneesh

    2017-11-01

    Innovation is developing step by step tremendously. As there are numerous social locales where information likes pictures, sound, video and so forth are shared by the client to each other. In concentrate to all exercises on social locales, there is need of protection to pictures. Because of this reason, I utilized Adaptive protection strategy forecast instrument to give security to the pictures. Issue identified with pictures is the huge issue in social locales like Facebook, twitter and so on. So here the part of a social thought, security to pictures, metadata and so on is produced. To conquer this issue we produced an answer which is 2 systems which understanding to a background marked by the pictures gives appropriated answer for them. Here we give an arrangement to the specific sort of pictures by characterizing them and in addition giving protection to pictures which are transferred agreement to a calculation that we utilized. Consequently as indicated by this arrangement expectation pictures take after a similar approach on up and coming pictures and give successful security to them.

  14. Sustainable Livestock Production in The Perspective of National Food Security Policy

    Directory of Open Access Journals (Sweden)

    Tjeppy D Soedjana

    2013-03-01

    Full Text Available This paper presents an overview of the role that livestock play in various dimensions of food security. Food security is defined as a state of affairs where all people at all times have access to safe and nutritious food to maintain a healthy and active life. Availability, accessibility, and affordability of individuals to consume food according to their respective socio-economic conditions are important dimensions. It describes the place of livestock products in human nutrition, the contribution of livestock to the national food supply and the way that livestock can affect food access, as a direct source of food and a source of income. Access to food is the most basic human right, especially for Indonesia with more than 240 million people with annual growth of 1.3%. To secure food availability, a sustainable food production growth more than 2% per year, including animal protein sources, is needed. It is necessary to strengthen food supply by maximizing available resources; improve food distribution system to guarantee a stable food supply and public access; encourage diversified food consumption; and prevent as well as resolve food scarcity. Furthermore, within the national objectives for self-sufficiency in rice, corn, soybean, and white sugar, the current annual percapita consumption of livestock products has reached 6.96 kg (meat, 7.3 kg (eggs and 16.5 kg (milk, which indicates good progress to stimulate sustainable domestic livestock production.

  15. Privacy enforcement and analysis for functional active objects

    OpenAIRE

    Kammueller, Florian

    2011-01-01

    In this paper we present an approach for the enforcement of\\ud privacy in distributed active object systems, illustrate its implementation in the language ASPfun, and formally prove privacy based on information flow security.

  16. The EU's Policies of Security of Energy Supply towards the Middle East and Caspian Region. Major Power Politics? Chapter 19

    Energy Technology Data Exchange (ETDEWEB)

    Hoogeveen, F.; Perlot, W. [Clingendael International Energy Programme CIEP, Den Haag (Netherlands)

    2007-07-01

    Vast reserves of fossil fuels make the Greater Middle East (GME) region the centre of attention in terms of security of supply considerations of all major energy-consuming countries, most notably of the United States (US), China, India, and of the European Union (EU). Although energy security is on the EU's agenda, the supranational nature of the EU inhibits to pursue an external energy security policy in the same way as other consuming countries. Its power, mandate, and in many ways preparedness to execute a common foreign policy towards the GME, let alone as specific as a common foreign energy strategy, are limited. This chapter seeks to answer the questions of what role the EU wants to play in the GME region in relation to objectives of energy security, what role it can play in this respect, and whether the EU's Middle East politics can be regarded as major power politics.

  17. The Securitization of Migration: An Analysis of United States Border Security and Migration Policy Toward Mexico

    Science.gov (United States)

    2013-03-01

    37  viii IV.  CONSEQUENCES OF SECURITIZATION AND ORGANIZATIONAL BEHAVIOR FOR THE BORDERLANDS...Press, 1985) 213. See also Enrique Krauze, Mexico: Biography of Power (New York: HarperPerennial, 1997), 144. 35 Ibid., 229. 36 Timothy Dunn, The...Immigration. Washington, DC: Migration Policy Institute, 2011. 51 Krauze, Enrique . Mexico: Biography of Power: A History of Modern Mexico, 1810

  18. Good governance and virtue in South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Burmeister, O

    2015-01-01

    Full Text Available Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack...

  19. East Asian Regional Architecture: New Economic and Security Arrangements and U.S. Policy

    Science.gov (United States)

    2006-09-18

    Kastner, “ Sleeping With the (Potential) Enemy: Assessing the U.S. Policy of Engagement with China,” in Jean-Marc F. Blanchard, Edward D. Mansfield...proposed by Malaysian Prime Minister Mahathir Mohamad in 1990, the U.S. strategy took two tracks. The first was to oppose its founding through

  20. Achieving Food Security and Environmental Sustainability in Southeast Asia: A Policy Challenge

    NARCIS (Netherlands)

    Mahanani WR; MNV

    2002-01-01

    To get a thorough picture on the possible situation of food and the environment in Southeast Asia in 2030 and to identify the areas that need policy intervention, five scenarios on future food production are reviewed and compared. These scenarios include: 1) FAO AT 2015/30 which is taken as the

  1. REDD policy impacts on the agri-food sector and food security

    NARCIS (Netherlands)

    Tabeau, Andrzej; Meijl, van Hans; Overmars, Koen P.; Stehfest, Elke

    2017-01-01

    Recent research shows that the combined contributions of deforestation, forest degradation and peat land emissions account for about 15% of greenhouse gas emissions. The REDD policy which preserves forests and values standing forests, enables substantial emission reductions. Since agricultural

  2. Achieving Food Security and Environmental Sustainability in Southeast Asia: A Policy Challenge

    NARCIS (Netherlands)

    Mahanani WR; MNV

    2002-01-01

    De studie gaat over de mogelijke situatie in Zuid-Oost Azie anno 2030 wat betreft voedsel en milieu, en over noodzakelijke beleidsmaatregelen. Vijf mondiale scenario's zijn voor deze regio vergeleken, namelijk: FAO Agriculture Towards 2015/2030; Policy Reform en Market Forces uit concepten

  3. Fundamental economic irreversibilities influence policies for enhancing international forest phytosanitary security

    Science.gov (United States)

    Thomas P. Holmes; Will Allen; Robert G. Haight; E. Carina H. Keskitalo; Mariella Marzano; Maria Pettersson; Christopher P. Quine; E. R. Langer

    2017-01-01

    National and international efforts to manage forest biosecurity create tension between opposing sources of ecological and economic irreversibility. Phytosanitary policies designed to protect national borders from biological invasions incur sunk costs deriving from economic and political irreversibilities that incentivizes wait-and-see decision-making. However, the...

  4. Changes in the SF-8 scores among healthy non-smoking school teachers after the enforcement of a smoke-free school policy: a comparison by passive smoke status

    Directory of Open Access Journals (Sweden)

    Matsumoto Yoshitaka

    2010-04-01

    Full Text Available Abstract Background The effects of the enforcement of a smoke-free workplace policy on health-related quality of life (HRQOL among a healthy population are poorly understood. The present study was undertaken to examine the effects of the enforcement of a smoke-free school policy on HRQOL among healthy non-smoking schoolteachers with respect to their exposure to passive smoke. Methods Two self-reported questionnaire surveys were conducted, the first before and the second after the enforcement of a total smoke-free public school policy in Nara City. A total of 1534 teachers were invited from 62 schools, and their HRQOL was assessed using six domains extracted from the Medical Outcomes Survey Short Form-8 questionnaire (SF-8: general health perception (GH, role functioning-physical (RP, vitality (VT, social functioning (SF, mental health (MH, and role functioning-emotional (RE. The participants were divided into two groups according to their exposure to environmental tobacco smoke (ETS at baseline: participants not exposed to ETS at school (non-smokers, and participants exposed to ETS at school (passive smokers. Changes in each SF-8 score were evaluated using paired t-tests for each group, and their inter-group differences were evaluated using multiple linear regression analyses adjusted for sex, age, school type, managerial position, and attitude towards a smoke-free policy. Results After ineligible subjects were excluded, 689 teachers were included in the analyses. The number of non-smokers and passive smokers was 447 and 242, respectively. Significant changes in SF-8 scores were observed for MH (0.9; 95% confidence interval [CI], 0.2-1.5 and RE (0.7; 95% CI, 0.0-1.3 in non-smokers, and GH (2.2; 95% CI, 1.2-3.1, VT (1.8; 95% CI, 0.9-2.7, SF (2.7; 95% CI, 1.6-3.8, MH (2.0; 95% CI, 1.0-2.9, and RE (2.0; 95% CI, 1.2-2.8 in passive smokers. In the multiple linear regression analyses, the net changes in the category scores of GH (1.8; 95% CI, 0

  5. Significant NRC Enforcement Actions

    Data.gov (United States)

    Nuclear Regulatory Commission — This dataset provides a list of Nuclear Regulartory Commission (NRC) issued significant enforcement actions. These actions, referred to as "escalated", are issued by...

  6. Environmental Enforcement Districts

    Data.gov (United States)

    Vermont Center for Geographic Information — Current statewide map of the geographic territories of Environmental Enforcement Officers. Part of a dataset that contains administrative boundaries for Vermont's...

  7. EPA Administrative Enforcement Dockets

    Data.gov (United States)

    U.S. Environmental Protection Agency — The EPA Administrative Enforcement Dockets database contains the electronic dockets for administrative penalty cases filed by EPA Regions and Headquarters. Visitors...

  8. Many-to-Many Information Flow Policies

    DEFF Research Database (Denmark)

    Baldan, Paolo; Beggiato, Alessandro; Lluch Lafuente, Alberto

    2017-01-01

    Information flow techniques typically classify information according to suitable security levels and enforce policies that are based on binary relations between individual levels, e.g., stating that information is allowed to flow from one level to another. We argue that some information flow...... of security levels, thus allowing to capture coordinated flows of information. The flow of information is expressed in terms of causal dependencies and the satisfaction of a policy is defined with respect to an event structure that is assumed to capture the causal structure of system computations. We suggest...... applications to secret exchange protocols, program security and security architectures, and discuss the relation to classic notions of information flow control....

  9. Data Security and Privacy in Apps for Dementia: An Analysis of Existing Privacy Policies.

    Science.gov (United States)

    Rosenfeld, Lisa; Torous, John; Vahia, Ipsit V

    2017-08-01

    Despite tremendous growth in the number of health applications (apps), little is known about how well these apps protect their users' health-related data. This gap in knowledge is of particular concern for apps targeting people with dementia, whose cognitive impairment puts them at increased risk of privacy breaches. In this article, we determine how many dementia apps have privacy policies and how well they protect user data. Our analysis included all iPhone apps that matched the search terms "medical + dementia" or "health & fitness + dementia" and collected user-generated content. We evaluated all available privacy policies for these apps based on criteria that systematically measure how individual user data is handled. Seventy-two apps met the above search teams and collected user data. Of these, only 33 (46%) had an available privacy policy. Nineteen of the 33 with policies (58%) were specific to the app in question, and 25 (76%) specified how individual-user as opposed to aggregate data would be handled. Among these, there was a preponderance of missing information, the majority acknowledged collecting individual data for internal purposes, and most admitted to instances in which they would share user data with outside parties. At present, the majority of health apps focused on dementia lack a privacy policy, and those that do exist lack clarity. Bolstering safeguards and improving communication about privacy protections will help facilitate consumer trust in apps, thereby enabling more widespread and meaningful use by people with dementia and those involved in their care. Copyright © 2017. Published by Elsevier Inc.

  10. United States foreign oil policy since World War 1 : for profits and security. 2 ed.

    Energy Technology Data Exchange (ETDEWEB)

    Randall, S.J.

    2005-07-01

    This book provided a historical context for United States global oil politics, with a focus on the goals, accomplishments and challenges of United States foreign oil policy, as well as on the relationship between the state and private sectors. This second edition has integrated developments in global politics since the end of the Cold War. It was suggested that many factors have provided the context for oil policy formation: a succession of crises in Iran since the 1950s; 2 wars in Iraq; U.S. intervention in Afghanistan; the threat of international terrorism since September 11, 2001; ongoing conflicts between Israel and the Arab nations in the Middle East; political instability in Saudi Arabia and in Venezuela and the trend towards trade and investment liberalization in Latin America in the 1990s. In addition, the emergence of oil sands reserves in Canada and other sources of non-conventional oil were discussed. Nationalism and oil policies in the Depression and World War 2 were examined. The structure of decision-making in oil policies was examined. Domestic and offshore resources were reviewed, and an outline of international agreements and relationships was presented. Issues concerning OPEC countries and the Iranian Revolution were examined. It was concluded that the United States has become more and not less vulnerable, despite its military strength. The author suggested that the main policy challenge to the United States may well be the tension between its commitment to Israel and its determination to avoid alienating the Arab oil-producing states. refs., tabs., figs.

  11. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  12. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a

  13. A Framework for an Institutional High Level Security Policy for the Processing of Medical Data and their Transmission through the Internet

    Science.gov (United States)

    Pangalos, George

    2001-01-01

    Background The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. Objective To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. Methods We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. Results We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. Conclusions The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for

  14. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

    2005-12-01

    Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

  15. The Model of Gas Supply Capacity Simulation In Regional Energy Security Framework: Policy Studies PT. X Cirebon Area

    Science.gov (United States)

    Nuryadin; Ronny Rahman Nitibaskara, Tb; Herdiansyah, Herdis; Sari, Ravita

    2017-10-01

    The needs of energy are increasing every year. The unavailability of energy will cause economic losses and weaken energy security. To overcome the availability of gas supply in the future, planning are cruacially needed. Therefore, it is necessary to approach the system, so that the process of gas distribution is running properly. In this research, system dynamic method will be used to measure how much supply capacity planning is needed until 2050, with parameters of demand in industrial, household and commercial sectors. From the model obtained PT.X Cirebon area in 2031 was not able to meet the needs of gas customers in the Cirebon region, as well as with Businnes as usual scenario, the ratio of gas fulfillment only until 2027. The implementation of the national energy policy that is the use of NRE as government intervention in the model is produced up to 2035 PT.X Cirebon area is still able to supply the gas needs of its customers.

  16. The Relevance and Influence of Small States in NATO and the EU Common Foreign and Security Policy

    Directory of Open Access Journals (Sweden)

    Urbelis Vaidotas

    2015-12-01

    Full Text Available Small states are important and visible players in international politics. Their power is limited, and their economy and military capability may not match those of their larger neighbours, but small states enjoy certain advantages that increase their abilities to influence international politics. This article tries to show and explain how small states can act and exploit their advantages in a wider international arena. The main aim is to show ways and methods for small states to act and pursue their policy goals. This article analyses the behaviour of small states inside two major European security actors: NATO and the EU. Several examples will be presented in detail, namely, air policing in the Baltic states and the Lithuanian Presidency in the European Council. These examples clearly show the achievements and failures of small states in international politics.

  17. From 2002-2017, to What Extent has Turkish Security Policy Been Effective

    Science.gov (United States)

    2017-04-13

    which has historically required an array of coalitions to be formed to get policy passed into law, has resulted in a system where consensus for...Brunswick: Transaction, 2003), 193. 44 Extremist Organisations has also provided the Turkish government with an added degree of legitimacy to its...There is little chance of Turkish-Russian relationships returning to their pre-Syrian civil war level of consensus , despite the recent Turkey/Russia

  18. Securing Water for Wetland Conservation in China - An Assessment of Policy Options

    OpenAIRE

    Wu Jian; Wang Xiaoxia; Niu Kunyu; Li Shushan

    2010-01-01

    Wetlands are one of the world's most ecologically important and productive ecosystems. They face many challenges, one of the most sifnificant being the disruption of the water supplies that feed them. As the flow of water entering a wetland is diverted to other uses, the werland's ecosystme is damaged. This problem affects many wetland areas in China. This study assesses the situation in the Qixinghe Wetlands which lie in the country's Sanjiang Plain. The study hifhlights two policy options t...

  19. Exploring Resource Security Policy and Green Science and Technology in Asia

    Science.gov (United States)

    2014-04-01

    Indonesia, Vietnam, Thailand and Malaysia - have started to put, if not ramped up existing, green policies in place. 9 In India, the government’s...economic recovery plan that puts increased focus on fast-growth sectors, including renewable energy, green vehicles, farming and healthcare . The Fukushima...absorb high R&D costs, provide new investments, and generate revenue and energy supplies. For emerging and developing economies, these public -private

  20. Police Enforcement Policy and Programmes on European Roads (PEPPER). Deliverable 9: Good practice in the selected key areas : speeding, drink driving and seat belt wearing : results from meta-analysis.

    NARCIS (Netherlands)

    Erke, A. Goldenbeld, C. & Vaa, T.

    2009-01-01

    The main objective of task 4.2 in the EU-project PEPPER on traffic law enforcement measures has been to give a systematic review of evaluation studies on speed, drink driving and seat-belt enforcement by applying meta-analyses to assess the best estimates of the effects of enforcement measures on

  1. Police Enforcement Policy and Programmes on European Roads (PEPPER). Deliverable 9: Good practice in the selected key areas : speeding, drink driving and seat belt wearing : results from meta-analysis.

    NARCIS (Netherlands)

    Erke, A. Goldenbeld, C. & Vaa, T.

    2008-01-01

    The main objective of task 4.2 in the EU-project PEPPER on traffic law enforcement measures has been to give a systematic review of evaluation studies on speed, drink driving and seat-belt enforcement by applying meta-analyses to assess the best estimates of the effects of enforcement measures on

  2. PACE: Proactively Secure Accumulo with Cryptographic Enforcement

    Science.gov (United States)

    2017-05-27

    the impact of encryption and signatures on operation throughput. I. INTRODUCTION Over the last several years, many companies have moved their...cell is then signed using one of the following signature algorithms : RSA with PKSC1 padding, RSA with PSS padding, DSA, or ECDSA. Finally, the signed...the column visibility field (Visibility), and storing the signature in another table (Table). We also compared various signature algorithms : RSA with

  3. Defining and Enforcing Hardware Security Requirements

    Science.gov (United States)

    2011-12-01

    by Baez [78]. PLY, in turn, is based on the methods used in the lex-yacc family of parsers [79]. PLY is an LR - parser . Our tool parses PSL’s Foundation...insight on malicious inclusions, and ● Cindy Eisner, for making the IBM Sugar Parser available, her excellent book with Dana Fisman on PSL, and for... parser is described in Section D. After the parse tree for the formula is generated, we pass it through a system of rewrite rules. There are two sets

  4. Rethinking US Security Policy for the 1980s. Proceedings of the Annual National Security Affairs Conference (7th) held 21-23 July 1980, Fort McNair, Washington, DC.

    Science.gov (United States)

    1980-01-01

    loi de finances pour 1977, no. 2532, Defense: Depensesen Capital, pp. 50-52. 66. A. M Dassault-Breguet, Bilan , 1975. 122 RETHINKING US SECURITY POLICY...and an emerging constellation of space systems. But the Soviet military buildup was far from a carbon -copy of American forces and associated

  5. National Security and International Policy Challenges in a Post Stuxnet World

    Directory of Open Access Journals (Sweden)

    Butrimas Vytautas

    2014-12-01

    Full Text Available The international community has focused too much on addressing cybercrime and cyber hacktivist questions. The list of usual suspects responsible for cyber incidents associated with attacks involving the theft of intellectual property, sensitive private data, money and disruption of web services unfortunately has grown beyond the attention seeking student hacker, cybercriminal or social hacktivist. The public appearance of the Stuxnet family of malware designed to destroy specifically targeted critical infrastructure components in June of 2010 gave perhaps the first indication that States have entered cyberspace as one of the perpetrators of malicious cyber activity. The problem of States actively preparing and executing cyber-attacks against the critical infrastructures of other States has been largely ignored by the international community. These attacks raise national security issues concerning threats to the economic and social well-being of States. However the pervasive presence of cyber space as the common environment where all modern industrial processes take place and the interrelations developed among the critical infrastructure of other States raise cross-border security issues as well. The international community must act in order to insure that the use of this new weapon by States will not get out of hand and be the cause of new and more serious international conflicts. Three solutions and a possible model are proposed to manage this disruptive activity of States in cyberspace at the international level.

  6. Security cooperation as a way to stop the spread of nuclear weapons? : Nuclear nonproliferation policies of the United States towards the Federal Republic of Germany and Israel, 1945-1968

    OpenAIRE

    Lahti, Makreeta

    2009-01-01

    In my dissertation on 'Security Cooperation as a Way to Stop the Spread of Nu-clear Weapons? Nuclear Nonproliferation Policies of the United States towards the Federal Republic of Germany and Israel, 1945-1968', I study the use of security assistance as nonproliferation policy. I use insights of the Structural Realist and the Rational Institutionalist theories of International Relations to explain, respectively, important foreign policy goals and the basic orientation of policies, on the one ...

  7. Enforcement and Corporate Governance

    OpenAIRE

    Berglöf, Erik; Claessens, Stijn

    2004-01-01

    Enforcement more than regulations, laws-on-the-books, or voluntary codes is key to effective corporate governance, at least in transition and developing countries. Corporate governance and enforcement mechanisms are intimately linked as they affect firms' ability to commit to their stakeholders, in particular to external investors. The authors provide a framework for understanding these li...

  8. Security Issues for Mobile Medical Imaging: A Primer.

    Science.gov (United States)

    Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George

    2015-10-01

    The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.

  9. Social Welfare Policy and Public Assistance for Low-Income Substance Abusers: The Impact of 1996 Welfare Reform Legislation on the Economic Security of Former Supplemental Security Income Drug Addiction and Alcoholism Beneficiaries.

    Science.gov (United States)

    Hogan, Sean R; Unick, George J; Speiglman, Richard; Norris, Jean C

    2008-01-01

    Prior to January 1, 1997, individuals with drug- or alcohol-related disabilities could qualify for federal public assistance through the Supplemental Security Income (SSI) program. During the welfare reforms of the Clinton administration, this policy was changed resulting in lost income and health care benefits for many low-income substance abusers. This paper examines the historical underpinnings to the elimination of drug addiction and alcoholism (DA&A) as qualifying impairments for SSI disability payments. Following this, empirical evidence is presented on the effect this policy change had on the subsequent economic security of former SSI DA&A beneficiaries. Findings indicate that study participants that lost SSI benefits suffered increased economic hardship following the policy change. These findings have important implications for future social welfare policymaking decisions.

  10. Mediação policial, segurança pública e segurança humana: uma abordagem reflexiva / Police mediation, public security and human security: a reflexive approach

    Directory of Open Access Journals (Sweden)

    Aline Chianca Dantas

    2016-07-01

    Full Text Available Resumo: Este trabalho debate se a mediação policial é um instrumento de humanização da segurança pública ou não, ensejando uma discussão maior sobre como tornar a segurança pública mais humana. Assim, discutem-se as premissas da segurança pública tradicional, o papel da polícia e do Estado e as bases da segurança pública humana. Passa-se a um estudo da mediação enquanto meio de resolução de conflitos e, especificamente, da mediação policial. Destaca-se o papel da mediação enquanto política criminal e verifica-se que a mediação policial tem características que a aproximam da segurança humana; mas, ainda está abarcada pela figura do Estado e permeada pela segurança pública tradicional. Conclui-se, então, que a mediação policial, apesar de estar imbricada com os interesses estatais, consegue incluir características mais humanas na prática policial, abarcando a figura da vítima de maneira mais protetora, possibilitando a resolução dos conflitos sociais de forma mais direta e aproximando o Estado da sociedade civil. Aponta-se, no entanto, para a necessidade de reformas mais amplas na segurança pública brasileira. Para o desenvolvimento dessa discussão, realiza-se um estudo qualitativo, utilizando-se de uma metodologia baseada em pesquisas bibliográficas sobre as temáticas apresentadas, breves exposições de casos em que a mediação policial foi utilizada e verificação de associação entre os elementos da teoria de segurança humana e a prática da mediação policial. Palavras-chave: Mediação policial; Segurança pública; Segurança humana.   Abstract: This paper debates whether police mediation is a humanizing instrument of public security or not, aiming to trigger a larger discussion about how public security can be made more human. Thus, it discusses the assumptions of traditional public security, the role of the police and the state and the bases of human public security. It goes through a

  11. The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks

    Science.gov (United States)

    Burbank, Jack L.; Kasch, William T. M.

    This paper discusses the introduction of anthropology and sociology-inspired approaches to providing security in collaborative self-aware cognitive radio networks. This includes the introduction of not only trust models, but also respect models and ‘intuition’ models. This paper discusses numerous potential benefits from this type of approach, including benefits to algorithm security, compromise recovery, protection from the Byzantine threat, and policy enforcement.

  12. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  13. Immigration Enforcement Within the United States

    Science.gov (United States)

    2006-04-06

    interior enforcement lack a border component. For example, fugitive taskforces, investigations of alien slavery and sweatshops , and employer sanctions do...Steven Greenhouse, “U.S. Officials Defend Ploys to Catch Immigrants,” New York Times, Feb. 11, 2006, p. A8. Employer Sanctions. Another policy question

  14. Biological Incident Operations: A Guide for Law Enforcement

    Science.gov (United States)

    2004-09-01

    Facilities, CDC, and are modified slightly for law enforcement. • Handwashing . Hands are washed with plain or antimicrobial-containing soaps after...require law enforcement officers to wear a surgical -type mask when within 3 feet of the infected victim. Based on local policy, some healthcare

  15. Some consequences for the Union’s common foreign and security policy of the EU-enlargement with the former Soviet bloc countries

    NARCIS (Netherlands)

    Marácz, L.

    2008-01-01

    In this era of multilateralism with strong monolithic, global political actors such as the US, Russia and China the European Union (EU) should coordinate its foreign and security policy, if it wants to play a role in the global political arena. In recent treaties however, the Union has not succeeded

  16. Does Variation in the Extent of Generalized Trust, Individual Education and Extensiveness of Social Security Policies Matter for Maximization of Subjective Well-Being?

    Science.gov (United States)

    Valeeva, Rania F.

    2016-01-01

    In this paper, I examine whether generalized trust and education, as well as social security policies of welfare state institutions matter for cross-national differences in subjective well-being (SWB), because knowledge on this issue is still lacking. For this purpose I integrated the insights of two sociological theories: Social Function…

  17. Policy-based secure communication with automatic key management for industrial control and automation systems

    Science.gov (United States)

    Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.

    2016-11-22

    A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one or more other devices in the industrial process control and automation system in order to control communications to or from the specified device.

  18. Securing a Better Living Environment for Left-Behind Children: Implications and Challenges for Policies.

    Science.gov (United States)

    Lam, Theodora; Ee, Miriam; Anh, Hoang Lan; Yeoh, Brenda S A

    2013-12-01

    Migration is an increasingly significant driver of transformations in family configurations and caregiving practices as well as living arrangements. The sustainability of geographically-split family formations is dependent on several factors, including the presence and strength of care support networks among migrants and their left-behind families, access to communication infrastructure and the stability of the families' financial resources. Drawing on both a selective review of relevant academic literature as well as key findings from the CHAMPSEA Project, the article first examines the effects of these three factors on the well-being of migrants' left-behind family members, especially children. The article also considers major implications of the project's findings, as well as possible challenges for migration and development policies. One area of concern for migration and development policy arising from our research findings is the need to provide better support for left-behind caregivers or carers who are substituting for the absent migrant in childcare and domestic work but who may also need care and support themselves. Another area relates to the need to improve communication infrastructure to help migrants and their families maintain their relationships across transnational spaces; while a third lies with the importance of minimizing migrant families' economic stress stemming from the cycle of debts resulting from exorbitant broker fees and the mismanagement of remittances. By acknowledging both the social and economic costs of international labor migration on families, governments of labor-sending countries can create a more effective legal and institutional framework as well as design suitable supporting mechanisms for left-behind families. There is then a stronger possibility that migration can become a sustainable development strategy for transnational families in South-East Asia.

  19. Compliance and Enforcement Actions (CEA) -

    Data.gov (United States)

    Department of Transportation — Compliance and Enforcement Actions application provides process assistance / improvements for conducting investigation and enforcement activities. The Compliance and...

  20. U.S. immigration and customs enforcement : dysfunctional not by design

    OpenAIRE

    Wrona, Philip

    2007-01-01

    CHDS State/Local Critical to the success of the homeland security mission is a robust Department of Homeland Security, Immigration and Customs Enforcement (ICE). During a speech made while signing the Homeland Security Appropriations Act for 2006, President George W. Bush stressed that in order to defend the United States from terrorists and criminals, the borders and interior of the country must be secured and immigration laws enforced. Unique to the authority found in ICE is the respons...

  1. Securing Gender Equality through a Nexus of Energy Policy Performance and Relative Political Performance

    Science.gov (United States)

    Perkins-Ozuagiemhe, Andrea Christen

    that, in fact, that women are not impacted equally by energy policy preferences as men and that women in developing countries benefit from increased access to modern household energy. Thus, gender-differentiated energy usage illustrates why treating population as a homogenous group fails to capture how energy policy preferences and energy policy performance can affect different subgroups of population in terms of individual choices and how those differences can affect an overall economic growth and development. Fundamental theoretical implications emerge from this dissertation's empirical findings. First, improving gender equality through technological advancements in household electricity facilitates the progress of demographic transition in terms of reducing fertility rates. Time altering effects of increased access and use of household electricity modify intra-household relations by diminishing differing roles between men and women. When women gain greater autonomy facilitated by increasing time via access to modern household electricity for more economically and educationally productive activities, fertility rates and child births tend to decrease by altering choice in family size with increased investments in children. The effect that the reduction in fertility generated by increased gender equality has upon demographic transition is that it alters the change in age structure in a developing country by decreasing youth dependency ratios generating the demographic dividend. Gender equality-generated fertility reductions may also facilitate the return to human capital by lessening the burden of non-SNA work and activities including reducing child care, increasing female labor force participation rates.

  2. Advancing U.S. Foreign Policy Through Homeland Security: The Logic for International Training and Professional Exchanges

    Science.gov (United States)

    2013-12-01

    enforcement training as a tool of diplomacy; it is an academic adventure only, and the views expressed are mine and do not reflect the position of any United...Thailand, El Salvador, and Botswana . The Federal Bureau of Investigation (FBI), Drug Enforcement Administration (DEA), United States Secret Service...Assistance, Disaster Relief & Mine Action  Regional Centers94 This next chapter will review the history of international training and professional

  3. Privacy Impact Assessment for the Enforcement Action Response System

    Science.gov (United States)

    The Enforcement Action Response System collects waste transaction information, and liability determination information. Learn how this data is collected, how it will be used, access to the data, the purpose of data collection, and record retention policies

  4. Enforcement Information System

    Data.gov (United States)

    Department of Transportation — EIS is an automated management information system that tracks the FAA’s enforcement actions on a nationwide basis. EIS is the FAA’s primary database for tracking...

  5. Speed enforcement in Norway

    DEFF Research Database (Denmark)

    Elvik, Rune

    2015-01-01

    the game-theoretic model empirically. Testing the model rigorously is difficult, mainly because some of the relevant variables are not reliably measured and are endogenous. Two models were developed: one to identify sources of changes in the rate of violations, one to identify sources of changes......This paper probes the relationship between changes in the risk of apprehension for speeding in Norway and changes in the amount of speeding. The paper is based on a game-theoretic model of how the rate of violations and the amount of enforcement is determined by the interaction between drivers...... and the police. This model makes predictions both about how drivers will adapt to changes in the amount of enforcement (the more enforcement, the less violations) as well as how the police will adapt to changes in the rate of violations (the less violations, the less enforcement). The paper attempts to test...

  6. Biomass Productivity Dynamics Monitoring and its Drivers in Sahelian Croplands and Rangelands to Support Food Security Policies

    Science.gov (United States)

    Leroux, L.

    2015-12-01

    -term food security policies.

  7. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  8. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  9. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  10. Informing National Food and Water Security Policy through Water Footprint Assessment: the Case of Iran

    Directory of Open Access Journals (Sweden)

    Fatemeh Karandish

    2017-10-01

    Full Text Available Iran’s focus on food self-sufficiency has led to an emphasis on increasing water volumes available for irrigation with little attention to water use efficiency, and no attention at all to the role of consumption and trade. To better understand the development of water consumption in relation to food production, consumption, and trade, we carried out the first comprehensive water footprint assessment (WFA for Iran, for the period 1980–2010, and estimated the water saving per province associated with interprovincial and international crop trade. Based on the AquaCrop model, we estimated the green and blue water footprint (WF related to both the production and consumption of 26 crops, per year and on a daily basis, for 30 provinces of Iran. We find that, in the period 1980–2010, crop production increased by 175%, the total WF of crop production by 122%, and the blue WF by 20%. The national population grew by 92%, and the crop consumption per capita by 20%, resulting in a 130% increase in total food consumption and a 110% increase in the total WF of national crop consumption. In 2010, 26% of the total water consumption in the semi-arid region served the production of crops for export to other regions within Iran (mainly cereals or abroad (mainly fruits and nuts. Iran’s interprovincial virtual water trade grew by a factor of 1.6, which was mainly due to increased interprovincial trade in cereals, nuts, and fruits. Current Iranian food and water policy could be enriched by reducing the WFs of crop production to certain benchmark levels per crop and climatic region and aligning cropping patterns to spatial differences in water availability and productivities, and by paying due attention to the increasing food consumption per capita in Iran.

  11. Effective Air Force Law Enforcement, Antiterrorism, Counterintelligence, Intelligence, and Emergency Management Organizations

    Science.gov (United States)

    2013-12-01

    security are also provided through specific security protocols, with specialized entry control, sentries , and response forces, as required by resource...full law enforcement authorities in exclusive and concurrent federal jurisdictions , there are some constraints on law enforcement activities within...proprietary jurisdiction and great constraints on those off an installation. Notably, due to AFOSI agent status as federal agents, they encounter the

  12. Germany, Pacifism and Peace Enforcement

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja

    This book is about the transformation of Germany's security and defence policy in the time between the 1991 Gulf War and the 2003 war against Iraq. It traces and explains the reaction of Europe's biggest and potentially most powerful country to the ethnic wars of the 1990s, the emergence of large...... the 1990s. The book debates the implications of Germany's transformation for Germany's partners and neighbours, and explains why Germany said ‘yes’ to the war in Afghanistan, but ‘no’ to the Iraq War. Based on a comprehensive study of the debates of the German Bundestag and actual German policy responses...

  13. Securing Communal Land Rights to Achieve Sustainable Development in Sub-Saharan Africa: Critical Analysis and Policy Implications

    Directory of Open Access Journals (Sweden)

    Ross Andrew Clarke

    2009-09-01

    Full Text Available While the concept of sustainable development gains increasing traction under international law, effective and scalable policies to translate these principles into practice remain largely beyond reach. This article analyses one possible strategy in Sub-Saharan Africa - increasing security of communal tenure to improve resource management and achieve rural sustainable development. Although this approach has attracted some attention, particularly with management responsibility of communal property increasingly devolved to the community-level, the expected results in terms of more sustainable resource exploitation and sounder environmental management have yet to be realised. Through critical analysis, with particular emphasis on the Gestion Terroir approach in Burkina Faso , the article explores the reasons behind the limited success. The article suggests that greater emphasis must be placed on bridging statutory command-and-control regimes with community-based models. Focusing on the links between communal land tenure and environmental management, and effectively embedding community land management institutions within existing environmental governance structures offers a practical model to promote sustainable development.

  14. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  15. Managing business compliance using model-driven security management

    Science.gov (United States)

    Lang, Ulrich; Schreiner, Rudolf

    Compliance with regulatory and governance standards is rapidly becoming one of the hot topics of information security today. This is because, especially with regulatory compliance, both business and government have to expect large financial and reputational losses if compliance cannot be ensured and demonstrated. One major difficulty of implementing such regulations is caused the fact that they are captured at a high level of abstraction that is business-centric and not IT centric. This means that the abstract intent needs to be translated in a trustworthy, traceable way into compliance and security policies that the IT security infrastructure can enforce. Carrying out this mapping process manually is time consuming, maintenance-intensive, costly, and error-prone. Compliance monitoring is also critical in order to be able to demonstrate compliance at any given point in time. The problem is further complicated because of the need for business-driven IT agility, where IT policies and enforcement can change frequently, e.g. Business Process Modelling (BPM) driven Service Oriented Architecture (SOA). Model Driven Security (MDS) is an innovative technology approach that can solve these problems as an extension of identity and access management (IAM) and authorization management (also called entitlement management). In this paper we will illustrate the theory behind Model Driven Security for compliance, provide an improved and extended architecture, as well as a case study in the healthcare industry using our OpenPMF 2.0 technology.

  16. 75 FR 10633 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security United States...

    Science.gov (United States)

    2010-03-09

    ... United States Immigration and Customs Enforcement-- 011 Immigration and Enforcement Operational Records... Security/U.S. Immigration and Customs Enforcement system of records titled, ``Department of Homeland Security/U.S. Immigration and Customs Enforcement--011 Removable Alien Records System of Records'' renamed...

  17. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  18. Europe's fragile energy security. Supply crises and their significance for European energy policy; Europas fragile Energiesicherheit. Versorgungskrisen und ihre Bedeutung fuer die europaeische Energiepolitik

    Energy Technology Data Exchange (ETDEWEB)

    Kurze, Kristina

    2009-07-01

    The author compares the way the EC responded to the 1973/74 oil crisis with developments following the Russian/Ukrainian gas conflict in 2005/2006. She then uses this as a basis for analysing the situation underlying the current dynamic changes in cooperation in the area of European energy policy. One major difference to the 1970s that becomes apparent from the viewpoint of constructivist securitisation is that energy supply issues today are regarded as a shared security problem. This makes it easier to overcome national reservations against an integrated European energy policy.

  19. policies

    African Journals Online (AJOL)

    2002-03-01

    Mar 1, 2002 ... Globalization is important on many different dimensions. However, the focus here in this paper is on the economic aspects of globalization, and particularly the role of international trade and its influence on food security. As seen here, the globalization debate is about the merits of the market system, now.

  20. Secure communication and co-operation of distributed Electronic Patient Records.

    Science.gov (United States)

    Blobel, Bernd

    2002-01-01

    Electronic Health Records (EHR) are moving towards the core application of health information systems. Enabling informational interoperability of shared care environment including EHR, structure and function of components used have to follow open standards and publicly available specifications. This comprises also methods and tools applied. Security services needed have to be an integral part of architecture and operation of the specified and implemented components. Starting with basic architectural paradigms the Magdeburg Medical Informatics Department was involved in at the early nineties, the secure behaviour of components has been derived. For establishing the required trustworthiness, security models have been introduced and presented in the paper. Beside communication security services based on standardised Public Key Infrastructure (PKI) and security token such as Health Professional Cards (HPC), policy-defined application security services such as authorisation, access control, accountability, etc., of information recorded, stored and processed must be guaranteed. In that context, appropriate resource access decision services have to be established. As the HARP project result, a component-based EHR architecture has been specified and demonstrated for enforcing fine-grained security services by binding certificates to application components, by the way enforcing policies.