WorldWideScience

Sample records for security sponsored research

  1. 45 CFR 2552.24 - What are a sponsor's responsibilities for securing community participation?

    Science.gov (United States)

    2010-10-01

    ...? (a) A sponsor shall secure community participation in local project operation by establishing an Advisory Council or a similar organizational structure with a membership that includes people: (1...

  2. 45 CFR 2551.24 - What are a sponsor's responsibilities for securing community participation?

    Science.gov (United States)

    2010-10-01

    ...? (a) A sponsor shall secure community participation in local project operation by establishing an Advisory Council or a similar organizational structure with a membership that includes people: (1...

  3. 45 CFR 2553.24 - What are a sponsor's responsibilities for securing community participation?

    Science.gov (United States)

    2010-10-01

    ... community participation? (a) A sponsor shall secure community participation in local project operation by establishing an Advisory Council or a similar organizational structure with a membership that includes people...

  4. USAF Institute for National Security Studies 1998 Research Results Conference

    National Research Council Canada - National Science Library

    1998-01-01

    The USAF Institute for National Security Studies (INSS), in cooperation with HQ USAF Nuclear and Counterproliferation Directorate, sponsored its 6th annual Research Results Conference on 19 - 20 November 1998...

  5. DOE-EERC jointly sponsored research program

    Energy Technology Data Exchange (ETDEWEB)

    Hendrikson, J.G.; Sondreal, E.A.

    1999-09-01

    U.S. Department of Energy (DOE) Cooperative Agreement DE-FC21-93MC30098 funded through the Office of Fossil Energy and administered at the Federal Energy Technology Center (FETC) supported the performance of a Jointly Sponsored Research Program (JSRP) at the Energy and Environmental Research Center (EERC) with a minimum 50% nonfederal cost share to assist industry in commercializing and effectively applying efficient, nonpolluting energy technologies that can compete effectively in meeting market demands for clean fuels, chemical feedstocks, and electricity in the 21st century. The objective of the JSRP was to advance the deployment of advanced technologies for improving energy efficiency and environmental performance through jointly sponsored research on topics that would not be adequately addressed by the private sector alone. Examples of such topics include the barriers to hot-gas cleaning impeding the deployment of high-efficiency power systems and the search for practical means for sequestering CO{sub 2} generated by fossil fuel combustion. The selection of particular research projects was guided by a combination of DOE priorities and market needs, as provided by the requirement for joint venture funding approved both by DOE and the private sector sponsor. The research addressed many different energy resource and related environmental problems, with emphasis directed toward the EERC's historic lead mission in low-rank coals (LRCs), which represent approximately half of the U.S. coal resources in the conterminous states, much larger potential resources in Alaska, and a major part of the energy base in the former U.S.S.R., East Central Europe, and the Pacific Rim. The Base and JSRP agreements were tailored to the growing awareness of critical environmental issues, including water supply and quality, air toxics (e.g., mercury), fine respirable particulate matter (PM{sub 2.5}), and the goal of zero net CO{sub 2} emissions.

  6. Sponsored Research & the Freedom of Publication.

    Science.gov (United States)

    Packham, David

    This paper examines conflicts and collaboration between industry and universities regarding sponsored research and freedom of publication, particularly in the United Kingdom. An opening section notes that the values of the market and the university are in fundamental conflict which presents problems for institutions attempting to work in…

  7. Asthma: NIH-Sponsored Research and Clinical Trials | NIH MedlinePlus the Magazine

    Science.gov (United States)

    ... of this page please turn Javascript on. Feature: Asthma Asthma: NIH-Sponsored Research and Clinical Trials Past Issues / Fall 2011 Table of Contents NIH-Sponsored Research Asthma in the Inner City: Recognizing that asthma severity ...

  8. Safety research programs sponsored by Office of Nuclear Regulatory Research

    International Nuclear Information System (INIS)

    Weiss, A.J.; Azarm, A.; Baum, J.W.

    1989-07-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems Research of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through September 30, 1988

  9. Safeguards and Security Research and Development progress report, October 1990--September 1991

    International Nuclear Information System (INIS)

    Smith, D.B.; Jaramillo, G.R.

    1992-07-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research And Development (R ampersand D) program from October 1990 through September 1991. The activities presented in the first three parts--Science and Technology Base Development, Basic Systems Design, and Onsite Test and Evaluation and Facility Support--were, for the most part, sponsored by the Department of Energy's Office of Safeguards and Security (DOE/OSS). The activities described in Part 4--International Safeguards--were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (OACN/IS). Part 5 describes several safeguards or safeguards-related activities that have sponsors other than the DOE/OSS or OACN/IS. The final part of the report lists titles and abstracts of Los Alamos safeguards R ampersand D reports, technical journal articles, and conference papers that were published in 1991

  10. Safeguards and security research and development progress report, October 1993--September 1994

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D.B.; Jaramillo, G.R. [comp.

    1995-08-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research and Development (R&D) program from October 1993 through September 1994. The activities presented in the first part of the report were directed primarily to domestic US safeguards applications and were, for the most part, sponsored by the Department of Energy`s Office of Safeguards and Security (DOE/OSS, NN-50). The activities described in Part 2, International Safeguards, were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (DOE/OACN, NN-40). Part 3 describes several safeguards or safeguards-related activities that have other sponsors. The final part of the report lists titles and abstracts of Los Alamos safeguards R&D reports, technical journal articles, and conference papers that were published or presented in 1994.

  11. Safeguards and security research and development progress report, October 1993--September 1994

    International Nuclear Information System (INIS)

    Smith, D.B.; Jaramillo, G.R.

    1995-08-01

    This report describes the activities carried out by the Los Alamos Safeguards and Security Research and Development (R ampersand D) program from October 1993 through September 1994. The activities presented in the first part of the report were directed primarily to domestic US safeguards applications and were, for the most part, sponsored by the Department of Energy's Office of Safeguards and Security (DOE/OSS, NN-50). The activities described in Part 2, International Safeguards, were supported by the International Safeguards Division of the Office of Arms Control and Nonproliferation (DOE/OACN, NN-40). Part 3 describes several safeguards or safeguards-related activities that have other sponsors. The final part of the report lists titles and abstracts of Los Alamos safeguards R ampersand D reports, technical journal articles, and conference papers that were published or presented in 1994

  12. Jointly Sponsored Research Program Energy Related Research

    Energy Technology Data Exchange (ETDEWEB)

    Western Research Institute

    2009-03-31

    Cooperative Agreement, DE-FC26-98FT40323, Jointly Sponsored Research (JSR) Program at Western Research Institute (WRI) began in 1998. Over the course of the Program, a total of seventy-seven tasks were proposed utilizing a total of $23,202,579 in USDOE funds. Against this funding, cosponsors committed $26,557,649 in private funds to produce a program valued at $49,760,228. The goal of the Jointly Sponsored Research Program was to develop or assist in the development of innovative technology solutions that will: (1) Increase the production of United States energy resources - coal, natural gas, oil, and renewable energy resources; (2) Enhance the competitiveness of United States energy technologies in international markets and assist in technology transfer; (3) Reduce the nation's dependence on foreign energy supplies and strengthen both the United States and regional economies; and (4) Minimize environmental impacts of energy production and utilization. Under the JSR Program, energy-related tasks emphasized enhanced oil recovery, heavy oil upgrading and characterization, coal beneficiation and upgrading, coal combustion systems development including oxy-combustion, emissions monitoring and abatement, coal gasification technologies including gas clean-up and conditioning, hydrogen and liquid fuels production, coal-bed methane recovery, and the development of technologies for the utilization of renewable energy resources. Environmental-related activities emphasized cleaning contaminated soils and waters, processing of oily wastes, mitigating acid mine drainage, and demonstrating uses for solid waste from clean coal technologies, and other advanced coal-based systems. Technology enhancement activities included resource characterization studies, development of improved methods, monitors and sensors. In general the goals of the tasks proposed were to enhance competitiveness of U.S. technology, increase production of domestic resources, and reduce environmental

  13. The University Campus: Why Military Sponsored Research.

    Science.gov (United States)

    Messing, Aubrey E.

    Military-sponsored research on the university campus has been a major issue during the past several years. Opposition has come from radicals, who wish to destroy the university itself, to critics, who feel such activities take needed funds and personnel from the more important task of solving our nation's social problems. These viewpoints and the…

  14. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  15. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  16. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  17. A Case Study of Teaching Marketing Research Using Client-Sponsored Projects: Method, Challenges, and Benefits

    Science.gov (United States)

    Bove, Liliana L.; Davies, W. Martin

    2009-01-01

    This case study outlines the use of client-sponsored research projects in a quantitative postgraduate marketing research subject conducted in a 12-week semester in a research-intensive Australian university. The case study attempts to address the dearth of recent literature on client-sponsored research projects in the discipline of marketing.…

  18. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  19. Jointly Sponsored Research Program

    Energy Technology Data Exchange (ETDEWEB)

    Everett A. Sondreal; John G. Hendrikson; Thomas A. Erickson

    2009-03-31

    U.S. Department of Energy (DOE) Cooperative Agreement DE-FC26-98FT40321 funded through the Office of Fossil Energy and administered at the National Energy Technology Laboratory (NETL) supported the performance of a Jointly Sponsored Research Program (JSRP) at the Energy & Environmental Research Center (EERC) with a minimum 50% nonfederal cost share to assist industry in commercializing and effectively applying highly efficient, nonpolluting energy systems that meet the nation's requirements for clean fuels, chemicals, and electricity in the 21st century. The EERC in partnership with its nonfederal partners jointly performed 131 JSRP projects for which the total DOE cost share was $22,716,634 (38%) and the nonfederal share was $36,776,573 (62%). Summaries of these projects are presented in this report for six program areas: (1) resource characterization and waste management, (2) air quality assessment and control, (3) advanced power systems, (4) advanced fuel forms, (5) value-added coproducts, and (6) advanced materials. The work performed under this agreement addressed DOE goals for reductions in CO{sub 2} emissions through efficiency, capture, and sequestration; near-zero emissions from highly efficient coal-fired power plants; environmental control capabilities for SO{sub 2}, NO{sub x}, fine respirable particulate (PM{sub 2.5}), and mercury; alternative transportation fuels including liquid synfuels and hydrogen; and synergistic integration of fossil and renewable resources.

  20. E-survey with researchers, members of ethics committees and sponsors of clinical research in Brazil: an emerging methodology for scientific research.

    Science.gov (United States)

    Dainesi, Sonia Mansoldo; Goldbaum, Moisés

    2012-12-01

    The growth of Internet users enables epidemiological studies to be conducted electronically, representing a promising methodology for data collection. Members of Ethics Committees, Clinical Researchers and Sponsors were interviewed using questionnaires sent over the Internet. Along with the questionnaire, participants received a message explaining the survey and also the informed consent. Returning the questionnaire meant the consent of the participant was given. No incentive was offered; two reminders were sent. The response rate was 21% (124/599), 20% (58/290) and 45% (24/53) respectively for Ethics Committees, Researchers and Sponsors. The percentage of return before the two reminders was about 62%. Reasons for non-response: participant not found, refusal to participate, lack of experience in clinical research or in the therapeutic field. Characteristics of participants: 45% of Ethics Committee participants, 64% of Researchers and 63% of Sponsors were male; mean age (range), respectively: 47 (28-74), 53 (24-72) and 40 (29-65) years. Among Researchers and Sponsors, all respondents had at least a university degree and, in the Ethics Committees group, only two (1.7%) did not have one. Most of the questionnaires in all groups came from the Southeast Region of Brazil, probably reflecting the highest number of clinical trials and research professionals in this region. Despite the potential limitations of a survey done through the Internet, this study led to a response rate similar to what has been observed with other models, efficiency in obtaining responses (speed and quality), convenience for respondents and low cost.

  1. Undergraduates' Perceptions of Conflict of Interest in Industry-Sponsored Research

    Science.gov (United States)

    Perry, Heather Brodie

    2018-01-01

    The prevalence of industry-sponsored research has led to significant concerns about financial conflicts of interest and the impact on research findings. This case study sought to examine how students considered conflict of interest when establishing the cognitive authority of a journal article. The case study used a mixed methods pretest and…

  2. NICBR-Sponsored Spring Research Festival Set for May 8 and 9 | Poster

    Science.gov (United States)

    By Ashley DeVine, Staff Writer For the first time, the Spring Research Festival (SRF), scheduled for May 8 and 9, will be sponsored by all of the agencies that are part of the National Interagency Confederation for Biological Research (NICBR).

  3. The analysis of the public support, results, and the research field structure of the Czech security R

    Directory of Open Access Journals (Sweden)

    Faťun Martin

    2017-07-01

    Full Text Available The article is devoted to an analysis of the public support and results of the security oriented R&D in Czechia in the years 2011–2015. The aim is to provide a knowledge base for active participation of users of results and existing and potential beneficiaries of public support in the development of the system and programs of the security research after 2017. The introductory part of the text describes the national environment of the security R&D, and the methodology of the data analysis of projects and programs and the bibliometric analyses of results of the security research. The analysis is focused in particular upon the distribution of the public funding, and the results obtained in R&D programs financed by the Ministry of the interior (MoI. The existing overlaps between R&D activities sponsored by MoI and by other governmental bodies are also examined.

  4. Biological research work within the Association of the Government-Sponsored Research Institutions (AGF)

    International Nuclear Information System (INIS)

    1991-01-01

    Six of the thirteen government-sponsored research institutions in the Federal Republic of Germany carry out research work for the protection of the population against the harmful effects of ionizing radiation. Their activities in this field concentrate on the following four points of main interest: analysis of radiation-induced processes resulting in biological radiation injury; description and analysis of complex radiation effects on man; medical applications of ionizing radiation for diagnosis and therapy; concepts and methods for radiological protection. The work reported reviews the main problems encountered in the above-mentioned subject fields and presents examples of significant results, with illustrations. The original research papers and their authors are listed separately under the four points of main interest. (orig./MG) [de

  5. HIV/AIDS research conducted in the developing world and sponsored by the developed world: reporting of research ethics committee review in two countries.

    Science.gov (United States)

    Chin, Lisa Judy; Rifai-Bashjawish, Hoda; Kleinert, Kelly; Saltman, Alexandra; Leu, Cheng-Shiun; Klitzman, Robert

    2011-09-01

    We explored how often journal articles reporting HIV research sponsored by a developed country, but conducted in a developing country, mention research ethics committee (REC) approval from both countries, and what factors are involved. Of all such 2007 articles on Medline conducted in one of four developing countries (N = 154), only 52% mentioned such dual approval. Mention of dual vs. single approval was more likely among articles with ≥ 50% sponsor country authors, and the United States as the sponsor country. Also, dual approval was more likely among articles that mentioned informed consent and funding, had ≥ 50% sponsor country authors, were biomedical (vs. psychosocial), and appeared in journals adopting International Committee Medical Journal Editors (ICMJE) guidelines. Dual approval was thus obtained in only half of the articles and was associated with ethical and logistic issues, indicating the need for clearer and more universally accepted guidelines.

  6. Electric Power Infrastructure Reliability And Security Research And Development Initiative. Final report

    International Nuclear Information System (INIS)

    Dale, S.; Meeker, R.; Steurer, M.; Li, H.; Pamidi, S.; Rodrigo, H.; Suryanarayanan, S.; Cartes, D.; Ordonez, J.; Domijan, A.; Liu, W.; Cox, D.; McLaren, P.; Hovsapian, R.; Edwards, D.; Simmons, S.; Wilde, N.; Woodruff, S.; Kopriva, D.; Hussaini, Y.; Mohammed, O.; Zheng, J.; Baldwin, T.L.

    2008-01-01

    This is the final scientific/technical report for the Electric Power Infrastructure Reliability and Security R and D Initiative sponsored by the U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability, under award number DE-FG02-05CH11292. This report covers results from the FSU-led, multi-institution effort conducted over the period 8/15/05 to 10/14/2007. Building upon existing infrastructure for power systems research, modeling, and simulation, the Center for Advanced Power Systems (CAPS) at Florida State University (FSU) is developing world-class programs in electric power systems research and education to support future electric power system needs and challenges. With U.S. Department of Energy Support, FSU CAPS has engaged in a multi-faceted effort to conduct basic and applied research towards understanding, developing, and deploying technologies and approaches that can lead to improved reliability and security of the North American electric power generation and delivery infrastructure. This wide-reaching project, through a number of carefully selected thrusts cutting across several research disciplines, set out to address key terrestrial electric utility power system issues and challenges. The challenges and the thrusts to address them were arrived at through analysis of a number of national reports and recommendations combined with input from an experienced multi-disciplined team of power systems research staff and faculty at FSU CAPS. The resulting project effort can be grouped into four major areas: - Power Systems and New Technology Insertion - Controls, Protection, and Security - Simulation Development - High Temperature Superconductivity (HTS)

  7. Bibliography of publications related to Nevada-sponsored research of the proposed Yucca Mountain high-level radioactive waste repository site through 1994

    International Nuclear Information System (INIS)

    Johnson, M.

    1994-12-01

    Since 1985, the State of Nevada has sponsored academic/private sector research into various health, safety, and environmental issues identified with the Yucca Mountain site. This research has been documented in scientific peer-reviewed literature, conferences, and workshops, as well as numerous state-sponsored University thesis and dissertation programs. This document is a bibliography of the scientific articles, manuscripts, theses, dissertations, conference symposium abstracts, and meeting presentations produced as a result of state-sponsored research

  8. Safety research programs sponsored by Office of Nuclear Regulatory Research: Progress report, January 1--June 30, 1988

    Energy Technology Data Exchange (ETDEWEB)

    Baum, J W; Boccio, J L; Diamond, D; Fitzpatrick, R; Ginsberg, T; Greene, G A; Guppy, J G; Hall, R E; Higgins, J C; Weiss, A J [comp.

    1988-12-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems Research of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through December 31, 1987.

  9. Safety research programs sponsored by Office of Nuclear Regulatory Research: Progress report, October 1--December 31, 1988

    Energy Technology Data Exchange (ETDEWEB)

    Weiss, A J; Azarm, A; Baum, J W; Boccio, J L; Carew, J; Diamond, D J; Fitzpatrick, R; Ginsberg, T; Greene, G A; Guppy, J G; Haber, S B

    1989-07-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems Research of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through September 30, 1988.

  10. Safety research programs sponsored by Office of Nuclear Regulatory Research: Progress report, January 1--June 30, 1988

    International Nuclear Information System (INIS)

    Baum, J.W.; Boccio, J.L.; Diamond, D.

    1988-12-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems Research of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through December 31, 1987

  11. Development, implementation and critique of a bioethics framework for pharmaceutical sponsors of human biomedical research.

    Science.gov (United States)

    Van Campen, Luann E; Therasse, Donald G; Klopfenstein, Mitchell; Levine, Robert J

    2015-11-01

    Pharmaceutical human biomedical research is a multi-dimensional endeavor that requires collaboration among many parties, including those who sponsor, conduct, participate in, or stand to benefit from the research. Human subjects' protections have been promulgated to ensure that the benefits of such research are accomplished with respect for and minimal risk to individual research participants, and with an overall sense of fairness. Although these protections are foundational to clinical research, most ethics guidance primarily highlights the responsibilities of investigators and ethics review boards. Currently, there is no published resource that comprehensively addresses bioethical responsibilities of industry sponsors; including their responsibilities to parties who are not research participants, but are, nevertheless key stakeholders in the endeavor. To fill this void, in 2010 Eli Lilly and Company instituted a Bioethics Framework for Human Biomedical Research. This paper describes how the framework was developed and implemented and provides a critique based on four years of experience. A companion article provides the actual document used by Eli Lilly and Company to guide ethical decisions regarding all phases of human clinical trials. While many of the concepts presented in this framework are not novel, compiling them in a manner that articulates the ethical responsibilities of a sponsor is novel. By utilizing this type of bioethics framework, we have been able to develop bioethics positions on various topics, provide research ethics consultations, and integrate bioethics into the daily operations of our human biomedical research. We hope that by sharing these companion papers we will stimulate discussion within and outside the biopharmaceutical industry for the benefit of the multiple parties involved in pharmaceutical human biomedical research.

  12. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1986-11-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the research program on reactor safety (RS-projects) are sponsored by the Federal Ministry for Research and Technology (BMFT). Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks also projects on the safety of advanced reactors are sponsored by the BMFT. The individual reports are classified according to the research program on the safety of LWRs 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig./HP) [de

  13. Reports of research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1986-06-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of his research program on reactor safety (RS-projects) are sponsored by the Federal Ministry for Research and Technology (BMFT). Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks also projects on the safety of advanced reactors are sponsored by the BMFT. The individual reports are classified according to the research program on the safety of LWRs 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig./HP) [de

  14. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  15. Paradigma Baru Sponsor sebagai Mitra Penyelenggaraan Event

    Directory of Open Access Journals (Sweden)

    Lidia Evelina

    2011-10-01

    Full Text Available The goals of this article is to know why sponsorship only to be viewed as sources of funding to implement the public relation events or marketing communication events. Method used in this article is qualitative method research to be based on observation, library study and content analysis. The result of this research seems that change happened in role of sponsorship from only fund source to become a partner of cooperation (mutual symbiotism between sponsor and event organizer. This article exploring the change of sponsorship concept from only looking for sponsor as an activity of fund mobilitation to become a partnership cooperation between event organizer and sponsor company. The mean of sponsor itself beside the fund supporter, they are also a side who takes mutual benefit from the cooperation. Conclusion, any close relationship (mutual benefit between two sides who take cooperation in event implementation (sponsor and event organiser. 

  16. Maritime Cyber Security University Research

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-06-16 Maritime Cyber Security...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security University

  17. SPONSORING, BRAND VALUE AND SOCIAL MEDIA

    Directory of Open Access Journals (Sweden)

    Alexander Zauner

    2012-10-01

    Full Text Available The increasing involvement of individuals in social media over the past decade has enabled firms to pursue new avenues in communication and sponsoring activities. Besides general research on either social media or sponsoring, questions regarding the consequences of a joint activity (sponsoring activities in social media remain unexplored. Hence, the present study analyses whether the perceived image of the brand and the celebrity endorser credibility of a top sports team influence the perceived brand value of the sponsoring firm in a social media setting. Moreover, these effects are compared between existing customers and non-customers of the sponsoring firm. Interestingly, perceived celebrity endorser credibility plays no role in forming brand value perceptions in the case of the existing customers. Implications for marketing theory and practice are derived.

  18. Geotechnical aspects of the UK DOE-sponsored radioactive waste disposal research programme

    International Nuclear Information System (INIS)

    Cooling, C.M.; Hudson, J.A.

    1987-01-01

    One of the crucial factors for underground repository design is understanding the engineering properties and behaviour of the host rock. To develop this understanding, the Department of the Environment has sponsored a continuing programme of geotechnical research from 1979 to the present day. The authors describe the structure of the research programme, highlight some of the individual projects, indicate the most important conclusions and provide an overview of both the current state of knowledge and 'the way ahead'. 9 refs.; 9 figs.; 1 table

  19. The Political Economy of Federally Sponsored Data

    Directory of Open Access Journals (Sweden)

    Bart Ragon

    2013-11-01

    Full Text Available Librarian involvement in the Open Access (OA movement has traditionally focused on access to scholarly publications. Recent actions by the White House have focused attention on access on the data produced from federally sponsored research. Questions have emerged concerning access to the output of federally sponsored research and whether it is a public or private good. Understanding the political battle over access to federally funded research is closely tied to the ownership of the peer review process in higher education and associated revenue streams, and as a result, interest groups seeking to influence government regulation have politicized the issues. As a major funder of research in higher education, policies from the federal government are likely to drive change in research practices at higher education institutions and impact library services. The political economy of federally sponsored research data will shape research enterprises in higher education inspire a number of new services distributed throughout the research life cycle.

  20. Reactor safety research program. A description of current and planned reactor safety research sponsored by the Nuclear Regulatory Commission's Division of Reactor Safety Research

    International Nuclear Information System (INIS)

    1975-06-01

    The reactor safety research program, sponsored by the Nuclear Regulatory Commission's Division of Reactor Safety Research, is described in terms of its program objectives, current status, and future plans. Elements of safety research work applicable to water reactors, fast reactors, and gas cooled reactors are presented together with brief descriptions of current and planned test facilities. (U.S.)

  1. What can Bilfinger teach Olympic sponsors?

    OpenAIRE

    Mark Dodds; Mauro Palmero

    2016-01-01

    Bilfinger SE (Bilfinger) is a leading international engineering and services group (Bilfinger.com, 2015), and was a local sponsor of the 2014 FIFA World Cup. The company is accused of paying bribes through its subsidiary company, Mauell, (dw. com, 2015) to public officials in Brazil for contracts related to the 2014 World Cup (Cassin, 2015). The corruption allegations relate to orders to equip security command centers at twelve host cities during the 2014 World Cup in Brazil (dw.com, 2015). B...

  2. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  3. Securing Distributed Research

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Global science calls for global infrastructure. A typical large-scale research group will use a suite of international services and involve hundreds of collaborating institutes and users from around the world. How can these users access those services securely? How can their digital identities be established, verified and maintained? We will explore the motivation for distributed authentication and the ways in which research communities are addressing the challenges. We will discuss security incident response in distributed environments - a particular challenge for the operators of these infrastructures. Through this course you should gain an overview of federated identity technologies and protocols, including x509 certificates, SAML and OIDC.

  4. 45 CFR 2551.25 - What are a sponsor's administrative responsibilities?

    Science.gov (United States)

    2010-10-01

    ... the sponsor organization and/or project service area. (f) Establish risk management policies and... project and carry out its project management responsibilities. (c) Employ a full-time project director to... responsibility for securing maximum and continuing community financial and in-kind support to operate the project...

  5. Good Publication Practice for Communicating Company-Sponsored Medical Research: GPP3.

    Science.gov (United States)

    Battisti, Wendy P; Wager, Elizabeth; Baltzer, Lise; Bridges, Dan; Cairns, Angela; Carswell, Christopher I; Citrome, Leslie; Gurr, James A; Mooney, LaVerne A; Moore, B Jane; Peña, Teresa; Sanes-Miller, Carol H; Veitch, Keith; Woolley, Karen L; Yarker, Yvonne E

    2015-09-15

    This updated Good Publication Practice (GPP) guideline, known as GPP3, builds on earlier versions and provides recommendations for individuals and organizations that contribute to the publication of research results sponsored or supported by pharmaceutical, medical device, diagnostics, and biotechnology companies. The recommendations are designed to help individuals and organizations maintain ethical and transparent publication practices and comply with legal and regulatory requirements. These recommendations cover publications in peer-reviewed journals and presentations (oral or poster) at scientific congresses. The International Society for Medical Publication Professionals invited more than 3000 professionals worldwide to apply for a position on the steering committee, or as a reviewer, for this guideline. The GPP2 authors reviewed all applications (n = 241) and assembled an 18-member steering committee that represented 7 countries and a diversity of publication professions and institutions. From the 174 selected reviewers, 94 sent comments on the second draft, which steering committee members incorporated after discussion and consensus. The resulting guideline includes new sections (Principles of Good Publication Practice for Company-Sponsored Medical Research, Data Sharing, Studies That Should Be Published, and Plagiarism), expands guidance on the International Committee of Medical Journal Editors' authorship criteria and common authorship issues, improves clarity on appropriate author payment and reimbursement, and expands information on the role of medical writers. By following good publication practices (including GPP3), individuals and organizations will show integrity; accountability; and responsibility for accurate, complete, and transparent reporting in their publications and presentations.

  6. Safety research programs sponsored by Office of Nuclear Regulatory Research: Progress report, July 1--September 30, 1988

    Energy Technology Data Exchange (ETDEWEB)

    Weiss, A J [comp.

    1989-02-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through June 30, 1988. 71 figs., 24 tabs.

  7. Safety research programs sponsored by Office of Nuclear Regulatory Research: Progress report, July 1--September 30, 1988

    International Nuclear Information System (INIS)

    Weiss, A.J.

    1989-02-01

    This progress report describes current activities and technical progress in the programs at Brookhaven National Laboratory sponsored by the Division of Regulatory Applications, Division of Engineering, Division of Safety Issue Resolution, and Division of Systems of the US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research following the reorganization in July 1988. The previous reports have covered the period October 1, 1976 through June 30, 1988. 71 figs., 24 tabs

  8. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  9. Bye-laws and partnership agreements of the members of the Association of Government-Sponsored Research Organizations (AGF)

    International Nuclear Information System (INIS)

    1990-01-01

    There are currently thirteen members of the AGF, government-sponsored research organizations who together employ more than 22.000 people and an annual budget of about DM 2.5 billions, thus representing the largest, compact research potential of the Federal Republic of Germany and building one of the most essential elements of the German scientific research system. The research organizations are financed from Federal Government funds and by contributions from the Federal Land the organization is domiciled, each at a ratio of 90 to 10. Influence and control by the Federal Government is exerted by way of Government representatives having a seat and a vote in the executive bodies of the organization, and by way of budgetary powers. Ever since their establishment, the government-sponsored research organizations have to find a balance between the two poles of scientific and legal independence on the one hand, and governmental influence on the other. Their wish for more effectively safeguarding their common interests have induced the research organizations to establish the AGF on January 30, 1970. (orig./HSCH) [de

  10. Reports on research projects sponsored by the Federal Minister for Research and Technology in the field of reactor safety

    International Nuclear Information System (INIS)

    1979-03-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F - Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC European Communities and the OECD. (orig./HP) [de

  11. What can Bilfinger teach Olympic sponsors?

    Directory of Open Access Journals (Sweden)

    Mark Dodds

    2016-10-01

    Full Text Available Bilfinger SE (Bilfinger is a leading international engineering and services group (Bilfinger.com, 2015, and was a local sponsor of the 2014 FIFA World Cup. The company is accused of paying bribes through its subsidiary company, Mauell, (dw. com, 2015 to public officials in Brazil for contracts related to the 2014 World Cup (Cassin, 2015. The corruption allegations relate to orders to equip security command centers at twelve host cities during the 2014 World Cup in Brazil (dw.com, 2015. Because Brazil hosted the 2014 FIFA World Cup and will host the 2016 Summer Olympic Games, companies need to consider the risks of many international anti-corruption laws, such as Brazil’s anti-corruption law commonly referred as The Clean Companies Act and other applicable anticorruption law like the United States’ Foreign Corrupt Practices Act (Rogers, et. al, 2014. This paper will analyze the Bilfinger case involving corruption activity at the 2014 FIFA World Cup and offer insights for sponsors of the 2016 Summer Olympic Games.

  12. The Meaning of Sponsoring : A study on the motives behind sponsoring a sports team and the following effects on brand awareness.

    OpenAIRE

    Skovshoved, Fredrik; Roshandel, Salar

    2009-01-01

    Background: Sponsoring is a topic that has always been present but in different forms. Recently however, it has become even more popular and companies today invest small fortunes on becoming sponsors of different events, individuals and teams. However, there is still not much research done within this field, hence we find it interesting to investigate further. Purpose: The purpose of this thesis is to investigate, from a strategic marketing perspective, what a sponsoring organization wants to...

  13. Australian International Food Security Research Centre | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Australian International Food Security Research Centre. Australian International Food Security Research Centre. http://aciar.gov.au/AIFSC. Cultivate Africa's Future. The Cultivate Africa's Future research partnership is designed to support applied research to combat hunger in sub-Saharan Africa by harnessing the potential ...

  14. Reports on research projects in the field of reactor safety sponsored by the Federal Minister for Research and Technology

    International Nuclear Information System (INIS)

    1978-09-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), der Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC Communities and the OECD. (orig./HP) 891 HP [de

  15. Reports on research projects in the field of reactor safety sponsored by the Federal Ministry for research and technology

    International Nuclear Information System (INIS)

    1979-09-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power-plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F - Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT in the near future. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC Communities and the OECD. (orig.) [de

  16. Report on the research projects in the field of reactor safety sponsored by the Federal Minister for Research and Technology

    International Nuclear Information System (INIS)

    1978-09-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F -Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work, The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC Communities and the OECD. (orig./HP) 891 HP [de

  17. Government support for hvdc research

    Energy Technology Data Exchange (ETDEWEB)

    1968-07-12

    To help secure a place for Britain in hvdc export market beyond the next decade, the Ministry of Technology is sponsoring. Research into thyristor converters as a replacement for the mercury arc valves now used in terminal equipment. English Electric has secured from Mintech a risk sharing contract contributing nearly 250,000 pounds towards the cost of a development program.

  18. A Research Agenda for Security Engineering

    Directory of Open Access Journals (Sweden)

    Rich Goyette

    2013-08-01

    Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific

  19. Physical security at research reactors

    International Nuclear Information System (INIS)

    Clark, R.A.

    1977-01-01

    Of the 84 non-power research facilities licensed under 10 CFR Part 50, 73 are active (two test reactors, 68 research reactors and three critical facilities) and are required by 10 CFR Part 73.40 to provide physical protection against theft of SNM and against industrial sabotage. Each licensee has developed a security plan required by 10 CFR Part 50.34(c) to demonstrate the means of compliance with the applicable requirements of 10 CFR Part 73. In 1974, the Commission provided interim guidance for the organization and content of security plans for (a) test reactors, (b) medium power research and training reactors, and (c) low power research and training reactors. Eleven TRIGA reactors, with power levels greater than 250 kW and all other research and training reactors with power levels greater than 100 kW and less than or equal to 5,000 kW are designated as medium power research and training reactors. Thirteen TRIGA reactors with authorized power levels less than 250 kW are considered to be low power research and training reactors. Additional guidance for complying with the requirements of 73.50 and 73.60, if applicable, is provided in the Commission's Regulatory Guides. The Commission's Office of Inspection and Enforcement inspects each licensed facility to assure that an approved security plan is properly implemented with appropriate procedures and physical protection systems

  20. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  1. Secure coprocessing applications and research issues

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.W.

    1996-08-01

    The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

  2. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  3. Reports on the research projects in the field of nuclear safety sponsored by the Federal Minister for Research and Technology

    International Nuclear Information System (INIS)

    1979-12-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The CRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F - Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT in the near future. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC Communities and the OECD.(orig./HP) [de

  4. Reports on the research projects in the field of nuclear safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1980-06-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS-Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of FBR type reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS-F-Fortschrittsberichte (GRS-F-progress reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT, which will appear in the near future. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC and the OECD. (orig./HP) [de

  5. Improving food security and nutrition through research | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Informing policy through agriculture and food security research. Improving the uptake of agricultural and food security research into policy and practice is a central objective of IDRC's Agriculture and Food Security program. To maximize the impact of proven solutions, the program set out to inform and engage both Canadian ...

  6. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  7. A Critical assesment of IS Security Research Between 1990-2004

    DEFF Research Database (Denmark)

    Willison, Robert Andrew; Siponen, Mikko

    This paper reviews the IS security literature for the period 1990-2004. More specifically three security journals and the top twenty IS journals were examined. In total 1280 papers were analysed in terms of theories, research methods and research topics. Our research found that 1043 of the papers...... with fourteen of these topics totaling 71.05% of the articles. This papers offers implications for future research directions on IS security, scholars to publish IS security research, tenure practice, and IS security classification schemas....

  8. Canadian International Food Security Research Fund (CIFSRF ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canadian International Food Security Research Fund (CIFSRF). The Canadian International Food Security Research Fund (CIFS-RF) is a collaborative program of the Canadian International Development Agency (CIDA) and IDRC valued at CA $61 654 707 (CIDA: CA $50 000 000; IDRC: CA $11 654 707). The program ...

  9. Sponsoring Asia-Pacific Security: PACOM’s Role in Reconciling Bilateral and Multilateral Security Structures

    Science.gov (United States)

    2016-05-13

    regional security order according to realist or liberal-institutionalist international relations theory.3 Realists emphasize the deep-seated...other states has motivated party officials to pursue multilateralism to impress international society with the country’s peaceful rise. 10 The...simultaneous pursuit ofbilateralism and multilateralism within Asia "amounts to outsourcing of great power management ofregional security order in two

  10. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    Energy Technology Data Exchange (ETDEWEB)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  11. 17 CFR 256.188 - Research, development, or demonstration expenditures.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Research, development, or... COMPANIES, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935 4. Deferred Debits § 256.188 Research, development, or... of all expenditures for research, development or demonstration undertaken by or sponsored through the...

  12. Safeguards and security deficiencies fulfilled through technology development

    International Nuclear Information System (INIS)

    Smoot, W.

    1996-01-01

    The Office of Safeguards and Security (OSS) sponsors research and development activities based on identified field and headquarters customer requirements. Annually, a formal solicitation of safeguards and security user needs is conducted. Currently, there are over 300 valid safeguards and security deficiencies that have been identified. These user needs serve as the basis for formulating the OSS Technology Development Program (TDP). Due to budget constraints, the TDP can only address approximately 47% of these needs in FY 1996. This paper will discuss, in a general sense, the current deficiencies and how the TDP is responding to each. Specifically, the paper will highlight technologies in the areas of Material Control and Accounting, Physical Security, and Information Security. A brief discussion of unfulfilled user requirements will also be presented as a catalyst for leveraging available or developing technologies from other similar programs or from private industry

  13. Differential Globalization of Industry- and Non-Industry-Sponsored Clinical Trials.

    Science.gov (United States)

    Atal, Ignacio; Trinquart, Ludovic; Porcher, Raphaël; Ravaud, Philippe

    2015-01-01

    Mapping the international landscape of clinical trials may inform global health research governance, but no large-scale data are available. Industry or non-industry sponsorship may have a major influence in this mapping. We aimed to map the global landscape of industry- and non-industry-sponsored clinical trials and its evolution over time. We analyzed clinical trials initiated between 2006 and 2013 and registered in the WHO International Clinical Trials Registry Platform (ICTRP). We mapped single-country and international trials by World Bank's income groups and by sponsorship (industry- vs. non- industry), including its evolution over time from 2006 to 2012. We identified clusters of countries that collaborated significantly more than expected in industry- and non-industry-sponsored international trials. 119,679 clinical trials conducted in 177 countries were analysed. The median number of trials per million inhabitants in high-income countries was 100 times that in low-income countries (116.0 vs. 1.1). Industry sponsors were involved in three times more trials per million inhabitants than non-industry sponsors in high-income countries (75.0 vs. 24.5) and in ten times fewer trials in low- income countries (0.08 vs. 1.08). Among industry- and non-industry-sponsored trials, 30.3% and 3.2% were international, respectively. In the industry-sponsored network of collaboration, Eastern European and South American countries collaborated more than expected; in the non-industry-sponsored network, collaboration among Scandinavian countries was overrepresented. Industry-sponsored international trials became more inter-continental with time between 2006 and 2012 (from 54.8% to 67.3%) as compared with non-industry-sponsored trials (from 42.4% to 37.2%). Based on trials registered in the WHO ICTRP we documented a substantial gap between the globalization of industry- and non-industry-sponsored clinical research. Only 3% of academic trials but 30% of industry trials are

  14. Differential Globalization of Industry- and Non-Industry–Sponsored Clinical Trials

    Science.gov (United States)

    Atal, Ignacio; Trinquart, Ludovic; Porcher, Raphaël; Ravaud, Philippe

    2015-01-01

    Background Mapping the international landscape of clinical trials may inform global health research governance, but no large-scale data are available. Industry or non-industry sponsorship may have a major influence in this mapping. We aimed to map the global landscape of industry- and non-industry–sponsored clinical trials and its evolution over time. Methods We analyzed clinical trials initiated between 2006 and 2013 and registered in the WHO International Clinical Trials Registry Platform (ICTRP). We mapped single-country and international trials by World Bank's income groups and by sponsorship (industry- vs. non- industry), including its evolution over time from 2006 to 2012. We identified clusters of countries that collaborated significantly more than expected in industry- and non-industry–sponsored international trials. Results 119,679 clinical trials conducted in 177 countries were analysed. The median number of trials per million inhabitants in high-income countries was 100 times that in low-income countries (116.0 vs. 1.1). Industry sponsors were involved in three times more trials per million inhabitants than non-industry sponsors in high-income countries (75.0 vs. 24.5) and in ten times fewer trials in low- income countries (0.08 vs. 1.08). Among industry- and non-industry–sponsored trials, 30.3% and 3.2% were international, respectively. In the industry-sponsored network of collaboration, Eastern European and South American countries collaborated more than expected; in the non-industry–sponsored network, collaboration among Scandinavian countries was overrepresented. Industry-sponsored international trials became more inter-continental with time between 2006 and 2012 (from 54.8% to 67.3%) as compared with non-industry–sponsored trials (from 42.4% to 37.2%). Conclusions Based on trials registered in the WHO ICTRP we documented a substantial gap between the globalization of industry- and non-industry–sponsored clinical research. Only 3% of

  15. Maritime Cyber Security University Research: Phase 1

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Appendices Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-07-16 Maritime ...Macesker Executive Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security

  16. 77 FR 26697 - New Animal Drugs; Change of Sponsor; Change of Sponsor Address; Change of Sponsor Name and...

    Science.gov (United States)

    2012-05-07

    ... rights and interest in, abbreviated new animal drug application (ANADA) 200-472 for Fomepizole for... [Docket No. FDA-2012-N-0002] New Animal Drugs; Change of Sponsor; Change of Sponsor Address; Change of.... SUMMARY: The Food and Drug Administration (FDA) is amending the animal drug regulations to reflect a...

  17. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  18. Safeguards and Security progress report, January--December 1989

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D.B.; Jaramillo, G.R. (comps.)

    1990-11-01

    From January to December 1989, the Los Alamos Safeguards and Security Research and Development (R D) program carried out the activities described in the first four parts of this report: Science and Technology Base Development, Basic Systems Design, Onsite Test and Evaluation and Facility Support, and International Safeguards. For the most part, these activities were sponsored by the Department of Energy's Office of Safeguards and Security. Part 1 covers development of the basic technology essential to continuing improvements in the practice of safeguards and security. It includes our computer security R D and the activities of the DOE Center for Computer Security, which provides the basis for encouraging and disseminating this important technology. Part 2 treats activities aimed at developing methods for designing and evaluating safeguards systems, with special emphasis on the integration of the several subsystems into a real safeguards system. Part 3 describes efforts of direct assistance to the DOE and its contractors and includes consultation on materials control and accounting problems, development and demonstration of specialized techniques and instruments, and comprehensive participation in the design and demonstration of advanced safeguards systems. Part 3 also reports a series of training courses in various aspects of safeguards that makes the technology more accessible to those who must apply it. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Part 5 reports several safeguards-related activities that have sponsors other than the DOE/OSS. 87 refs., 52 figs.

  19. The Sponsored Film.

    Science.gov (United States)

    Klein, Walter J.

    For public relations professionals and would-be sponsors of films, this book provides guidelines for understanding the film medium and its potential as a persuasive force in industry, government, organizations, and religious orders. For filmmakers, it brings together practical information needed to survive in the sponsored-film industry and to…

  20. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-06-01

    The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.

  1. IT Security Specialist | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The IT Security Specialist takes a strategic role in the delivery of Infrastructure ... on IT Security to project managers, business clients and senior management. ... as a team member or a team leader by undertaking research, investigations, ...

  2. Annual report on reactor safety research projects sponsored by the Minister for Research and Technology of the Federal Republic of Germany 1989

    International Nuclear Information System (INIS)

    1990-08-01

    Investigations on the safety of light water reactors (LWR) being performed in the framework of his research program on reactor safety are sponsored by the Bundesminister fuer Forschung und Technologie (BMFT) (Federal Minister for Research and Technology). Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks also projects on the safety of advanced reactors are sponsored by the BMFT. The Gesellschaft fuer Reaktorsicherheit (GRS), (Society for Reactor Safety), by order of the BMFT, informs continuously of the status of such investigations by means of semi-annual and annual publication of progress reports within the series GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the Forschungsbetreuung at the GRS, (FB) (Research Coordination Department), within the framework of general informations of progress in reactor safety research. The individual reports are classified according to the same classification system as applied in the nuclear index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in sequence of their project numbers. (orig./HP)

  3. Research Advances of Social Security Problems in China —Visualization Research based on Bibliometrics

    Institute of Scientific and Technical Information of China (English)

    赵琳

    2016-01-01

    This article summarized the research progress and characteristics of Chinese social security issues from 2000 papers, which record in CNKI. We find that, the topic in the field of social security is board and dispersion. Due to the huge system and complex problem of social security, there is no central theme. Through cluster analysis, multi dimensional scaling analysis and social network analysis, we got the high frequency keywords atlas. Then, we summarized the research topic to six parts. They are rural social security, urban and rural social security co-ordination, vulnerable group social security, social security fund management, the social insurance system, and social security system and government responsibility. It summed up the theme of the module, meanwhile, combined the practice analysis.

  4. why sponsored posts on facebook and instagram are effective online branding tools

    OpenAIRE

    Eggers, Raphael

    2017-01-01

    This research is motivated by the incongruence of how businesses and contemporary research evaluate paid social media advertisement as online branding tools. Therefore, we examine the possibilities of social media marketing: why sponsored posts on Facebook and Instagram are effective online branding tools. A questionnaire was utilized to approach the research, and answer the hypotheses. Results from 316 participants indicated that sponsored posts were effective for brand awaren...

  5. 15 year's summary report on blanket technology and materials of mixed fuel reactor research sponsored by national '863' projects

    International Nuclear Information System (INIS)

    Xu Zengyu; Chen Jiming; Liu Xiang

    2001-01-01

    15 year's achievements of Southwestern Institute of Physics, China, in fusion technology and materials research sponsored by National '863' Engineering Projects are summarized. Many scientific and technical achievements are obtained in the researches on tritium production and recovery, doped carbon basic materials, V-alloys, 316L SS irradiation performance, B 4 C and TiC coatings, etc. Some facilities were built and some were improved for materials research. 108 references are annexed

  6. Army Research Office’s ARO in Review 2014.The Annual Historical Record of the Army Research Laboratory’s Army Research Office (ARO) Programs and Funding Activities

    Science.gov (United States)

    2015-07-01

    MINERVA RESEARCH INITIATIVE ( MRI ) The Minerva Research Initiative ( MRI ) is a DoD-sponsored, university-based social science basic research program...Core, MRI , MURI, PECASE, and DURIP. Received Accepted Declined Pending Withdrawn Chemical Sciences 90 39 28 23 0 Computing Sciences 46 35 3 8...mobile devices (PDAs, tablets , and Smartphones) are subject to tampering and compromise. To secure mobile computing and communication, previous

  7. Research Award: Agriculture and Food Security

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    2013-08-07

    Aug 7, 2013 ... research awards providing a unique opportunity to enhance research skills and gain a fresh perspecve on crucial development issues. These one‐year, paid, ... programming through a research acvity focusing on agriculture and food security, specifically on the gender and social (equity) dimensions of ...

  8. The London 2012 Olympic and Paralympic Games Olympic—Intelligence Centre: Lessons Learned from Working with the Olympic Sponsors and the Private Sector

    Directory of Open Access Journals (Sweden)

    Sue Wilkinson

    2013-06-01

    Full Text Available This paper is a reflective discussion that critically describes the role of the Olympic Intelligence Centre (OIC played in the delivery of a safe and secure London 2012 Olympic and Paralympic Games. In particular, it examines how the OIC worked with the Olympic Sponsors and the wider private sector to provide them with the classified intelligence and information they needed to play their role in the safety and security operation effectively. Issues discussed include the cultural, statutory and systemic challenges that had to be overcome; how relationships were built to allay concerns and build trust and confidence; and the process that was put into place to allow the exchange of classified intelligence that supported the Sponsors and private sector in their operation. It details how the OIC worked with Sponsors to allow them in turn to exchange intelligence they held in their systems with the OIC, thus completing the intelligence cycle, enhancing the security operation. The article concludes with an outline of the lessons learned that were deduced through a reflective process and are offered to practitioners for consideration in future intelligence work involving the private sector.

  9. [Analysis of projects of schistosomiasis sponsored by National Science Foundation of China].

    Science.gov (United States)

    Wen-di, Zhou; Liang, Shi; Xue-Dan, Ke; Jie, Wang

    2017-07-27

    To summarize the present development by analysis of projects in schistosomiasis funded by National Science Foundation of China (NSFC). Based on the ISIS database of NFSC, the projects in the studies of schistosomiasis from 2005 to 2016 were analyzed. The distributions of sponsored numbers, amounts, types, agencies, disciplines and changes in research topics by means of network profiles were described. During the study period, 198 projects were funded by NSFC totally with 76.05 million yuan in which the general and youth projects were main types. The main sponsored agencies were research institutes and medical colleges. The top three fields sponsored were medical pathogenic microbes and infection, veterinary and medical immunology. The funding on schistosomiasis researches has a downward trend, but studies are continuing in depth. In this situation, innovative and interdisciplinary researches need to be encouraged to promote the development of schistosomiasis.

  10. Seven layers of security to help protect biomedical research facilities.

    Science.gov (United States)

    Mortell, Norman

    2010-04-01

    In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.

  11. Federally Sponsored Research at Educational Institutions: A Need for Improved Accountability. Report by the U.S. General Accounting Office.

    Science.gov (United States)

    General Accounting Office, Washington, DC.

    This report discusses federally sponsored research at educational institutions and suggests ways to improve accountability for these funds. The following suggestions are made for minimizing problems presented in this report: (1) development of more definitive cost principles for both the institutions and the Federal auditors to follow; (2) more…

  12. Spins, Stalls, and Shutdowns: Pitfalls of Qualitative Policing and Security Research

    Directory of Open Access Journals (Sweden)

    Randy K. Lippert

    2015-11-01

    Full Text Available This article explores key elements of qualitative research on policing and security agencies, including barriers encountered and strategies to prevent them. While it is oft-assumed that policing/security agencies are difficult to access due to their clandestine or bureaucratic nature, this article demonstrates this is not necessarily the case, as access was gained for three distinct qualitative research projects. Yet, access and subsequent research were not without pitfalls, which we term security spins, security stalls, and security shutdowns. We illustrate how each was encountered and argue these pitfalls are akin to researchers falling into risk categories, not unlike those used by policing/security agents in their work. Before concluding we discuss methodological strategies for scholars to avoid these pitfalls and to advance research that critically interrogates the immense policing/security realm. URN: http://nbn-resolving.de/urn:nbn:de:0114-fqs1601108

  13. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  14. Securing medical research: a cybersecurity point of view.

    Science.gov (United States)

    Schneier, Bruce

    2012-06-22

    The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.

  15. 20 CFR 422.103 - Social security numbers.

    Science.gov (United States)

    2010-04-01

    ... personal interview with the dependent is not required. Form SS-5 may be obtained at: (i) Any local social... previously assigned social security number(s), if any, of the applicant. A personal interview may be required... sponsoring agency of a refugee, if no personal mailing address is available). (d) Social security number...

  16. 75 FR 45153 - National Security Division; Agency Information Collection Activities: Proposed Collection...

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF JUSTICE [OMB Number 1124-0001] National Security Division; Agency Information..., 10th & Constitution Avenue, NW., National Security Division, Counterespionage Section/Registration Unit... Justice sponsoring the collection: Form Number: NSD- 1. National Security Division, U.S. Department of...

  17. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  18. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  19. Reports on research programs in the field of reactor safety sponsored by the Federal Ministry for Research and Technology. Reported period: July 1 to December 31, 1986. Progress report

    International Nuclear Information System (INIS)

    1987-05-01

    Investigations on the safety of light water reactors (LWR) being performed in the framework of the research program on reactor safety (RS-projects) are sponsored by the Federal Ministry for Research and Technology (BMFT). Objective of this program is to investigate in greater detail the safety margins of nuclear power plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks also projects on the safety of advanced reactors are sponsored by the BMFT. The individual reports are classified according to the research program on the safety of LWRs 1977-1980 of the BMFT. Another table of contents uses the same classification system as applied in the nuclear safety index of the CEC (Commission of the European Communities) and the OECD (Organization for Economic Cooperation and Development). The reports are arranged in the sequence of their project numbers. (orig.) [de

  20. Canadian International Food Security Research Fund (CIFSRF)

    International Development Research Centre (IDRC) Digital Library (Canada)

    . The Canadian International Food Security Research Fund(CIFSRF) is a program of Canada's International Development Research. Centre (IDRC) undertaken with the financial support of the. Government of Canada provided through Foreign ...

  1. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  2. Cooperative Research Projects in the Microgravity Combustion Science Programs Sponsored by NASA and NEDO

    Science.gov (United States)

    Ross, Howard (Compiler)

    2000-01-01

    This document contains the results of a collection of selected cooperative research projects between principal investigators in the microgravity combustion science programs, sponsored by NASA and NEDO. Cooperation involved the use of drop towers in Japan and the United States, and the sharing of subsequent research data and findings. The topical areas include: (1) Interacting droplet arrays, (2) high pressure binary fuel sprays, (3) sooting droplet combustion, (4) flammability limits and dynamics of spherical, premixed gaseous flames and, (5) ignition and transition of flame spread across thin solid fuel samples. All of the investigators view this collaboration as a success. Novel flame behaviors were found and later published in archival journals. In some cases the experiments provided verification of the design and behavior in subsequent experiments performed on the Space Shuttle. In other cases, the experiments provided guidance to experiments that are expected to be performed on the International Space Station.

  3. 45 CFR 1226.12 - Sponsor employees.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Sponsor employees. 1226.12 Section 1226.12 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION FOR NATIONAL AND COMMUNITY SERVICE PROHIBITIONS ON ELECTORAL AND LOBBYING ACTIVITIES Sponsor Employee Activities § 1226.12 Sponsor employees...

  4. Exclusion of pregnant women from industry-sponsored clinical trials.

    Science.gov (United States)

    Shields, Kristine E; Lyerly, Anne Drapkin

    2013-11-01

    The lack of human data available to inform evidence-based treatment for illness during pregnancy has led to calls for greater inclusion of pregnant women in research, but the extent of their current representation is poorly characterized. Our objective was to measure the current exclusion of pregnant women from industry-sponsored clinical trials as a baseline for future comparison. We compiled data from studies enrolling women of childbearing potential posted on www.ClinicalTrials.gov between 1 October 2011 and 31 January 2012. The review was limited to open United States-based phase IV interventional studies sponsored by the pharmaceutical industry evaluating treatment of conditions that may be experienced by but are not limited to pregnant women and did not involve a medication classified as potentially teratogenic. If there was no mention of pregnancy in the inclusion or exclusion criteria, we contacted a study representative to confirm that pregnant women could be enrolled. Of 558 qualifying industry-sponsored studies, five (1%) were designed specifically for pregnant women. Of 367 phase IV clinical trials with verified inclusion and exclusion criteria, 348 (95%) excluded pregnant women and 19 (5%) did not. We found the exclusion of pregnant women from industry-sponsored clinical trials to be common practice. Moving beyond reflexive exclusion and developing thoughtful criteria for inclusion of pregnant women in clinical research would likely advance the evidence base to inform treatment decisions during pregnancy and lead to better health outcomes for women and children.

  5. Report on the projects in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1978-12-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS - Projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear power-plants and their systems and the further development of safety technology. Besides the investigations of LWR tasks first projects on the safety of advanced reactors are sponsored by the BMFT. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of such investigations by means of quarterly and annually publication of progress reports within the series GRS - F - Fortschrittsberichte (GRS - F - Progress Reports). Each progress report represents a compilation of individual reports about objectives, the work performed, the results, the next steps of the work etc. The individual reports are prepared in a standard form by the contractors themselves as a documentation of their progress in work and published by the FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of the progress in reactor safety research. The individual reports are arranged according to the amended LWR Safety Research Program of the BMFT which will appear in the near future. Another table contents uses the same classification system as applied in the Nuclear Safety Index of the CEC and the OECD. (orig./HP) [de

  6. The Influence of Sponsor-Event Congruence in Sponsorship of Music Festivals

    Directory of Open Access Journals (Sweden)

    Penny Hutabarat

    2014-04-01

    Full Text Available This paper focuses the research on the Influence of Sponsor-Event Congruence toward Brand Image, Attitudes toward the Brand and Purchase Intention. Having reviewed the literatures and arranged the hypotheses, the data has been gathered by distributing the questionnaire to 155 audiences at the Java Jazz Music Festival, firstly with convenience sampling and then snowballing sampling approach. The analysis of data was executed with Structural Equation Modeling (SEM. The result shows the sponsor-event congruence variable has a positive impact toward brand image and attitudes toward the brand sponsor. Brand Image also has a positive impact toward purchase intention; in contrary attitudes toward the brand do not have a positive purchase intention. With those results, to increase the sponsorship effectiveness, the role of congruency is very significant in the sponsorship event. Congruency is a key influencer to trigger the sponsorship effectiveness. Congruency between the event and the sponsor is able to boost up the brand image and bring out favorable attitudes towards the brand for the success of marketing communication programs, particularly sponsorship. In addition to it, image transfer gets higher due to the congruency existence (fit between sponsor and event and directs the intention creation to buy sponsor brand product/service (purchase intention. In conclusion, sponsor-event congruence has effect on consumer responds toward sponsorship, either on the cognitive level, affective and also behavior.

  7. Addendum to Final Audit Report on Contracting Practices for the Use and Operations of DoD-Sponsored Federally Funded Research and Development Centers

    National Research Council Canada - National Science Library

    1995-01-01

    Inspector General, DoD, Report No. 95-048, "Contracting Practices for the Use and Operations of DoD-Sponsored Federally Funded Research and Development Centers," December 2, 1994, was published without management comments...

  8. 78 FR 10211 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Securities...

    Science.gov (United States)

    2013-02-13

    ... for OMB Review; Comment Request; Securities Lending by Employee Benefit Plans ACTION: Notice. SUMMARY: The Department of Labor (DOL) is submitting the Employee Benefits Security Administration (EBSA) sponsored information collection request (ICR) titled, ``Securities Lending by Employee Benefit Plans,'' to...

  9. Reflecting on the Postgraduate Experience: Teaching Research Methods and Statistics: Review of the DART-P Sponsored Workshop at PsyPAG 2013

    Science.gov (United States)

    Jackson, Emma J.; Davies, Emma. L.

    2014-01-01

    Following the success of last year's teaching and career development workshop, this year's DART-P sponsored workshop at the Psychology Postgraduate Affairs Group (PsyPAG) Annual Conference held at Lancaster University focused on postgraduate's experiences of teaching research methods. This article provides a review of the invited speakers…

  10. [Analysis of projects of infectious disease epidemiology sponsored by National Natural Science Foundation of China].

    Science.gov (United States)

    Jian-Ming, Wang; Yan-Kai, Xia; Hui-Juan, Zhu; Feng, Chen; Hong-Bing, Shen

    2016-05-10

    To analyze the projects on the infectious disease epidemiology sponsored by the National Natural Science Foundation of China (NSFC), explore the hotspot and development trend, and offer a reference for researchers in this field. Based on the NSFC database, the projects on the infectious disease epidemiology (H2609) sponsored from 1987 to 2014 were analyzed. The changes of fund numbers, amounts and research fields were described. During the study period, NSFC sponsored 373 projects, including 228 general projects (61.1%), 78 youth projects (20.9%) and 67 other projects (18.0%). The average amount of the grant was 358.2 thousand Yuan (20 thousand-8 million). The main sponsored research fields were mechanisms of pathogen and immunity (36.2%) and population-based epidemiological studies (33.0%). The top three diseases were hepatitis, HIV/AIDS and tuberculosis. The amount of funding on researches of infectious disease epidemiology has increased continuously, which has played an important role in training scientific talents in the field of prevention and control of infectious diseases.

  11. The Influence of Sponsor-Event Congruence in Sponsorship of Music Festivals

    Directory of Open Access Journals (Sweden)

    Penny Hutabarat

    2014-05-01

    Full Text Available Normal 0 false false false IN X-NONE X-NONE This paper focuses the research on the Influence of Sponsor-Event Congruence toward Brand Image, Attitudes toward the Brand and Purchase Intention. Having reviewed the literatures and arranged the hypotheses, the data has been gathered by distributing the questionnaire to 155 audiences at the Java Jazz Music Festival, firstly with convenience sampling and then snowballing sampling approach. The analysis of data was executed with Structural Equation Modeling (SEM. The result shows the sponsor-event congruence variable has a positive impact toward brand image and attitudes toward the brand sponsor. Brand Image also has a positive impact toward purchase intention; in contrary attitudes toward the brand do not have a positive purchase intention. With those results, to increase the sponsorship effectiveness, the role of congruency is very significant in the sponsorship event. Congruency is a key influencer to trigger the sponsorship effectiveness. Congruency between the event and the sponsor is able to boost up the brand image and bring out favorable attitudes towards the brand for the success of marketing communication programs, particularly sponsorship. In addition to it, image transfer gets higher due to the congruency existence (fit between sponsor and event and directs the intention creation to buy sponsor brand product/service (purchase intention. In conclusion, sponsor-event congruence has effect on consumer responds toward sponsorship, either on the cognitive level, affective and also behavior.

  12. NRC sponsored rotating equipment vibration research: a program description and progress report

    International Nuclear Information System (INIS)

    Nitzel, M.E.

    1986-01-01

    The Idaho National Engineering Laboratory (INEL) is currently involved in a research project sponsored by the United States Nuclear Regulatory Commission (NRC) regarding operational vibration in rotating equipment. The object of this program is to assess the nature of vibrational failures and the effect that improved qualification standards may have in reducing the incidence of failure. In order to limit the scope of the initial effort, safety injection (SI) pumps were chosen as the component group for concentrated study. The task has been oriented to addressing the issues of whether certain SI pumps experience more failures than others, examining the dynamic environments in operation, examining the adequacy of current qualification standards, and examining what performance parameters could be used more efficiently to predict degradation or failure. Results of a literature search performed to survey SI pump failures indicate that failures are due to a diversity of causes, many of which may not be influenced by qualification criteria. Cooperative efforts have been undertaken with a limited number of nuclear utilities to describe the variety of possible operating environments and to analyze available data. The results of this analysis as they apply to the research issues are presented and possibilities for the future direction of the program are discussed

  13. Security and health research databases: the stakeholders and questions to be addressed.

    Science.gov (United States)

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.

  14. Use and Misuse of Industry Sponsored Materials.

    Science.gov (United States)

    DuVall, Charles R.; Krepel, Wayne J.

    A review of educational research reveals that free and inexpensive materials are used today to a much greater extent than they had been in the past. Two studies, sponsored by the American Iron and Steel Institute, are evidence of the producer's interest in determining the strengths and weaknesses of the materials being sent into classrooms and…

  15. The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research

    Directory of Open Access Journals (Sweden)

    Kenneth J. Knapp

    2007-03-01

    Full Text Available This study proposes using an established common body of knowledge (CBK as one means of organizing information security literature.  Consistent with calls for more relevant information systems (IS research, this industry-developed framework can motivate future research towards topics that are important to the security practitioner.  In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK.  Further, we distinguish articles as empirical research, frameworks, or tutorials.  Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal aspects of information security.  Specifically, this study identified a need for additional IS security research relating to applications development, physical security, operations security, and business continuity.  The CBK framework is inherently practitioner oriented and using it will promote relevancy by steering IS research towards topics important to practitioners.  This is important considering the frequent calls by prominent information systems scholars for more relevant research.  Few research frameworks have emerged from the literature that specifically classify the diversity of security threats and range of problems that businesses today face.  With the recent surge of interest in security, the need for a comprehensive framework that also promotes relevant research can be of great value.

  16. Eduroam: Secure WiFi roaming for education and research

    CSIR Research Space (South Africa)

    Miteff, S

    2012-10-01

    Full Text Available In this presentation the author introduces the Eduroam initiative, and explains how it combines existing wireless security technologies in a novel way, to enable secure global roaming for end users at university campuses and research institutions....

  17. Research award: Agriculture and Food Security | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Research shows that appropriate food security interventions can improve ... sector within the context of increased productivity and reduction of post-harvest loss, rural ... The successful candidate will allocate 50% of his/her time for a research ... with a focus on agriculture;; Business administration and/or management, with a ...

  18. Undergraduates with Employer-Sponsored Aid: Comparing Group Differences

    Science.gov (United States)

    Faulk, Dagney G.; Wang, Zhenlei

    2014-01-01

    Tuition assistance offered by employers is an understudied area of financial aid research. The purpose of this study is to compare the demographic, socioeconomic, academic and financial aid characteristics of college students who receive employer-sponsored financial aid with students who receive traditional financial aid (institutional, state, or…

  19. Researchers', Regulators', and Sponsors' Views on Pediatric Clinical Trials: A Multinational Study.

    Science.gov (United States)

    Joseph, Pathma D; Craig, Jonathan C; Tong, Allison; Caldwell, Patrina H Y

    2016-10-01

    The last decade has seen dramatic changes in the regulatory landscape to support more trials involving children, but child-specific challenges and inequitable conduct across income regions persist. The goal of this study was to describe the attitudes and opinions of stakeholders toward trials in children, to inform additional strategies to promote more high-quality, relevant pediatric trials across the globe. Key informant semi-structured interviews were conducted with stakeholders (researchers, regulators, and sponsors) who were purposively sampled from low- to middle-income countries and high-income countries. The transcripts were thematically analyzed. Thirty-five stakeholders from 10 countries were interviewed. Five major themes were identified: addressing pervasive inequities (paucity of safety and efficacy data, knowledge disparities, volatile environment, double standards, contextual relevance, market-driven forces, industry sponsorship bias and prohibitive costs); contending with infrastructural barriers (resource constraints, dearth of pediatric trial expertise, and logistical complexities); navigating complex ethical and regulatory frameworks ("draconian" oversight, ambiguous requirements, exploitation, excessive paternalism and precariousness of coercion versus volunteerism); respecting uniqueness of children (pediatric research paradigms, child-appropriate approaches, and family-centered empowerment); and driving evidence-based child health (advocacy, opportunities, treatment access, best practices, and research prioritization). Stakeholders acknowledge that changes in the regulatory environment have encouraged more trials in children, but they contend that inequities and political, regulatory, and resource barriers continue to exist. Embedding trials as part of routine clinical care, addressing the unique needs of children, and streamlining regulatory approvals were suggested. Stakeholders recommended increasing international collaboration

  20. Factors affecting choice of sponsoring institution for residency among medical students in Singapore.

    Science.gov (United States)

    Ng, Chew Lip; Liu, Xuan Dao; Murali Govind, Renuka; Tan, Jonathan Wei Jian; Ooi, Shirley Beng Suat; Archuleta, Sophia

    2018-03-16

    Postgraduate medical education in Singapore underwent major transition recently, from a British-style system and accreditation to a competency-based residency programme modelled after the American system. We aimed to identify the relative importance of factors influencing the choice of residency sponsoring institutions (SIs) among medical students during this transition period. A questionnaire-based cross-sectional study of Singaporean undergraduate medical students across all years of study was performed in 2011. Participants rated 45 factors (including research, academia and education, marketing, reputation of faculty, working conditions, posting experience and influence by peers/seniors) for degree of importance to their choice of SIs on a five-point Likert scale. Differences with respect to gender and seniority were compared. 705 of 1,274 students completed the survey (response rate 55.3%). The top five influencing factors were guidance by mentor (4.48 ± 0.74), reputation for good teaching (4.46 ± 0.76), personal overall experience in SIs (4.41 ± 0.88), quality of mentorship and supervision (4.41 ± 0.75), and quality and quantity of teaching (4.37 ± 0.78). The five lowest-rated factors were social networking (2.91 ± 1.00), SI security (3.01 ± 1.07), open house impact (3.15 ± 0.96), advertising paraphernalia (3.17 ± 0.95) and research publications (3.21 ± 1.00). Female students attributed more importance to security and positive work environment. Preclinical students rated research and marketing aspects more highly while clinical students valued positive work environment more. Quality of education, mentorship, experiences during clerkship and positive working environment were the most important factors influencing the choice of SIs.

  1. Team sponsors in community-based health leadership programs.

    Science.gov (United States)

    Patterson, Tracy Enright; Dinkin, Donna R; Champion, Heather

    2017-05-02

    Purpose The purpose of this article is to share the lessons learned about the role of team sponsors in action-learning teams as part of community-based health leadership development programs. Design/methodology/approach This case study uses program survey results from fellow participants, action learning coaches and team sponsors to understand the value of sponsors to the teams, the roles they most often filled and the challenges they faced as team sponsors. Findings The extent to which the sponsors were perceived as having contributed to the work of the action learning teams varied greatly from team to team. Most sponsors agreed that they were well informed about their role. The roles sponsors most frequently played were to provide the teams with input and support, serve as a liaison to the community and serve as a sounding board, motivator and cheerleader. The most common challenges or barriers team sponsors faced in this role were keeping engaged in the process, adjusting to the role and feeling disconnected from the program. Practical implications This work provides insights for program developers and community foundations who are interested in building the capacity for health leadership by linking community sponsors with emerging leaders engaged in an action learning experience. Originality/value This work begins to fill a gap in the literature. The role of team sponsors has been studied for single organization work teams but there is a void of understanding about the role of sponsors with multi-organizational teams working to improve health while also learning about leadership.

  2. Theory, Demonstration and Methods: Research on Social Security of Migrant Workers by Domestic Scholar

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker social security, policy defects and equity construction in social security system of migrant workers. Secondly, real studies on social security of migrant workers, including researches on sequence of demand and influencing factors of social security of migrant workers as well as intrinsic motivation forming the perspective on social security. Lastly, road exploration of establishing social security system, including researches on the multi-level development of rural worker social security system, comparison of "Double-low method", "Guangdong Method" and "Shanghai Method" of the social security of migrant workers in Zhejiang Province and establishing multi-level social security system according to the hierarchy after the internal differentiation.

  3. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry... security, including border protection, civil defense capabilities, and coast guard and maritime...

  4. Canadian International Food Security Research Fund | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Canadian International Food Security Research Fund (CIFSRF) invests in scaling up ... for farming families, and improve nutrition throughout the Global South. ... universities, civil society organizations, governments, and the private sector, ...

  5. Employer-sponsored pension plans

    Directory of Open Access Journals (Sweden)

    Rakonjac-Antić Tatjana N.

    2004-01-01

    Full Text Available Apart from pension plans within social insurance, in developed pension systems there are also available to individuals schemes which may to a large extent ensure a significant part of their total pension. Among them are the following: employer-sponsored pension plans or individual pension plans. The most widely used employer-sponsored pension plan in the USA is 401(k, in which both the employer and the employee contribute to the financing of the pension. These contributions as well as the return to their investment have a preferential tax treatment, i.e. do not enter a tax base. The funds are taxed only when drawn from the account in the form of a pension. This paper aims to present the functioning of 401(k pension plan as the most widely used employer sponsored pension plan in the USA, which is likely, in a modified form, to have an important place within our future reformed pension insurance system.

  6. Security and Health Research Databases: The Stakeholders and Questions to Be Addressed

    OpenAIRE

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding s...

  7. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  8. Information Security Issues in Higher Education and Institutional Research

    Science.gov (United States)

    Custer, William L.

    2010-01-01

    Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…

  9. Privacy and Security in Mobile Health (mHealth) Research.

    Science.gov (United States)

    Arora, Shifali; Yttri, Jennifer; Nilse, Wendy

    2014-01-01

    Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions-some in real time-while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.

  10. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security, administrative data standards, and national identifiers. (a) HIPAA covered entities. An endorsed sponsor is a...

  11. Modelling Emotional and Attitudinal Evaluations of Major Sponsors

    DEFF Research Database (Denmark)

    Martensen, Anne; Hansen, Flemming

    2004-01-01

    The paper reports findings from a larger study of sponsors and their relationship to sponsoredparties. In the present reporting, the focus is on sponsors. Rather than evaluating suchsponsorships in traditional effect hierarchical terms, a conceptual Sponsor Value Model isspecified as a structural...

  12. CARONTE project: Creating an Agenda for Research on Transportation Security

    Energy Technology Data Exchange (ETDEWEB)

    Leon Bello, J.; Gonzalez Viosca, E.

    2016-07-01

    Europe’s prosperity relies on effective transport systems. Any attacks and disturbances to land freight and passenger transport would have significant impact on economic growth, territorial cohesion, social development and the environment. Unfortunately, there are weaknesses in the land transport security.The objective of CARONTE project is define a future research agenda for security in land transport that focuses on core gaps caused by emerging risks while avoiding any doubling-up of research elsewhere. Its research agenda will cover all threats, including cyber-crime, and security aspects across all modes of land transportation. At the same time, it will respect the fundamental human rights and privacy of European citizens. The step-by-step method of CARONTE’s consortium has analyzed the state of the art and emerging risks; has identified gaps, analyses and assessments of potential solutions; and has produced an overall research agenda for the future. CARONTE’s results will answer the following questions among others: Which existing research projects merit a follow up and extension? Where are the combinations or synergy effects to be attended? Which themes and topics should be elaborated in new research projects? Who should be involved and integrated in future research projects (stakeholders, authorities, etc.)? The CARONTE consortium includes universities and research institutes, companies, and end-users providing with experience in research and consultancy in transportation, logistics, infrastructure management, security and communications. ITENE - Instituto Tecnológico del Embalaje, Transporte y Logística-has been one of the Project partners among a total of 11 members from eight different countries in the European Union which have also been supported via a High Level Advisory Board. (Author)

  13. 14 CFR 151.121 - Procedures: Offer; sponsor assurances.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Procedures: Offer; sponsor assurances. 151.121 Section 151.121 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... Engineering Proposals § 151.121 Procedures: Offer; sponsor assurances. Each sponsor must adopt the following...

  14. Major issues in the training of security personnel

    International Nuclear Information System (INIS)

    Knauf, W.M.; Robertson, L.P.

    1982-01-01

    The effectiveness of the response component of a physical protection system depends greatly upon the training received by the security personnel. The issues and problems in the area of training which were of greatest concern to the attendees of the 1980 and 1981 INMM sponsored Technical Workshops on Guard Training are discussed. The attendees were training supervisors of managers of security personnel and represented a variety of organizations and companies including DOE facilities, NRC licensees, the military, private security contractors, and governmental agencies. Major categories of concern include: professionalism in security, legal constraints and obligations, physical and psychological testing and standards, governmental requirements, morale and motivation, and tactical training techniques

  15. Unfulfilled translation opportunities in industry sponsored clinical trials

    DEFF Research Database (Denmark)

    Smed, Marie; Getz, Kenneth A.

    2013-01-01

    in the industry and site representatives are changing. The process of clinical trials has increased in complexity over the years, resulting in additional management layers. Besides an increase in internal management layers, sponsors often also outsource various tasks related to clinical trials to a CRO (Contract...... Research Organization) and thereby adding another link in the relationships between site and sponsor. These changes are intended to optimize the time-consuming and costly trial phases; however, there is a need to study whether valuable knowledge and experience is compromised in the process. Limited......' knowledge gained in clinical trials is utilized by the industry. Responses from 451 global investigative site representatives are included in the study. The analysis of the extensive dataset reveals that the current processes of collaboration between sites and the industry restrict the leverage of valuable...

  16. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment

    International Nuclear Information System (INIS)

    Alexandria, Joao Carlos Soares de

    2009-01-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal of

  17. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  18. Ethical Guidelines for Computer Security Researchers: "Be Reasonable"

    Science.gov (United States)

    Sassaman, Len

    For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. The subdisciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed sub-disciplines, such as data mining, social network analysis, behavioral profiling, and general computer security, however, open the door to abuse of users by practitioners and researchers. It is therefore the duty of the men and women who chart the course of these fields to set rules for themselves regarding what sorts of actions on their part are to be considered acceptable and what should be avoided or handled with caution out of ethical concerns. This paper deals solely with the issues faced by computer security researchers, be they vulnerability analysts, privacy system designers, malware experts, or reverse engineers.

  19. Computer science security research and human subjects: emerging considerations for research ethics boards.

    Science.gov (United States)

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  20. 45 CFR 233.51 - Eligibility of sponsored aliens.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Eligibility of sponsored aliens. 233.51 Section... CONDITIONS OF ELIGIBILITY IN FINANCIAL ASSISTANCE PROGRAMS § 233.51 Eligibility of sponsored aliens... affidavit(s) of support or similar agreement on behalf of an alien (who is not the child of the sponsor or...

  1. Organisational Information Security Strategy: Review, Discussion and Future Research

    Directory of Open Access Journals (Sweden)

    Craig A. Horne

    2017-05-01

    Full Text Available Dependence on information, including for some of the world’s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences indicate that attacks are escalating on organisations conducting these information-based activities. Organisations need to formulate strategy to secure their information, however gaps exist in knowledge. Through a thematic review of academic security literature, (1 we analyse the antecedent conditions that motivate the adoption of a comprehensive information security strategy, (2 the conceptual elements of strategy and (3 the benefits that are enjoyed post-adoption. Our contributions include a definition of information security strategy that moves from an internally-focussed protection of information towards a strategic view that considers the organisation, its resources and capabilities, and its external environment. Our findings are then used to suggest future research directions.

  2. 48 CFR 35.017-1 - Sponsoring agreements.

    Science.gov (United States)

    2010-10-01

    ... of the FFRDC's relationship with its sponsor(s). (3) A provision for the identification of retained earnings (reserves) and the development of a plan for their use and disposition. (4) A prohibition against...

  3. The Nuclear Safeguards and Security Activities under Euratom Research and Training Programme

    International Nuclear Information System (INIS)

    Abousahl, S.; Palajova, Z.; Janssens, W.A.M.; Luetzenkirchen, K.; Goncalves, J.G.M.; Aregbe, Y.; )

    2015-01-01

    Nuclear safeguards and security are absolute priorities for the EU. At technical level, the Joint Research Centre (JRC) as the European Commission's in-house science service plays an important role in the field of nuclear research, training and education that include nuclear safety, safeguards and security. The JRC's nuclear research activities are defined in a Council Regulation on the research and training programme of the European Atomic Energy Community. The JRC works closely with EC safeguards authority, whose mission is to ensure that nuclear material within the EU is not diverted from its intended use according to Euratom treaty. Technologies, methodologies and trainings are developed according to the Euratom Safeguards inspectorate's needs. In the area of nuclear security, the JRC contributes to the development of specific expertise in the field of nuclear forensics and border security detection as well as related training efforts for first front-line responders and national experts. The JRC provides its expert support for the implementation of internal EU action plans mainly in the field of radiological and nuclear security. At an international level, the JRC cooperates with the IAEA mainly through the EC support programme on the control of nuclear materials and facilities in order to avoid proliferation or diversion. Close cooperation with IAEA nuclear security is developed through the recent signature of a dedicated practical arrangement. Key partnerships have also been developed in the field of safeguards and security with the US-DoE, Russia, Japan and China. In addition, JRC contributes significantly to the EU nuclear safeguards and security outreach activities implemented under the Instrument for Nuclear Safety Cooperation and Instrument contributing to Stability and Peace. In this paper we will highlight some of the JRC contributions to the enhancement of nuclear safeguards and security at EU and international levels. (author)

  4. Effects of employer-sponsored health insurance costs on Social Security taxable wages.

    Science.gov (United States)

    Burtless, Gary; Milusheva, Sveta

    2013-01-01

    The increasing cost of employer contributions for employee health insurance reduces the share of compensation subject to the Social Security payroll tax. Rising insurance contributions can also have a more subtle effect on the Social Security tax base because they influence the distribution of money wages above and below the taxable maximum amount. This article uses the Medical Expenditure Panel Survey to analyze trends in employer health insurance contributions and the distribution of those costs up and down the wage distribution. Our analysis shows that employer health insurance contributions increased faster than overall compensation during 1996-2008, but such contributions grew only slightly faster among workers earning less than the taxable maximum than they did among those earning more. Because employer health insurance contributions represent a much higher percentage of compensation below the taxable maximum, health insurance cost trends exerted a disproportionate downward pressure on money wages below the taxable maximum.

  5. Research on food security makes a difference for African women ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-05-05

    May 5, 2016 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  6. Research on food security makes a difference for African women ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    17 avr. 2014 ... There is ample evidence that addressing gender inequalities and empowering women are vital to meeting the challenges of improving food and nutrition security, and enabling poor rural people to overcome poverty. A central objective of the Canadian International Food Security Research Fund (CIFSRF) is ...

  7. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  8. The frequency of company-sponsored alcohol brand-related sites on Facebook™-2012.

    Science.gov (United States)

    Nhean, Siphannay; Nyborn, Justin; Hinchey, Danielle; Valerio, Heather; Kinzel, Kathryn; Siegel, Michael; Jernigan, David H

    2014-06-01

    This research provides an estimate of the frequency of company-sponsored alcohol brand-related sites on Facebook™. We conducted a systematic overview of the extent of alcohol brand-related sites on Facebook™ in 2012. We conducted a 2012 Facebook™ search for sites specifically related to 898 alcohol brands across 16 different alcoholic beverage types. Descriptive statistics were produced using Microsoft SQL Server. We identified 1,017 company-sponsored alcohol-brand related sites on Facebook™. Our study advances previous literature by providing a systematic overview of the extent of alcohol brand sites on Facebook™.

  9. Improving food security and nutrition through research | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-10-06

    Oct 6, 2016 ... In Canada, the 2012 federal budget highlighted CIFSRF's success, noting how the ... New animal vaccines could keep more African farmers in business ... Research on food security makes a difference for African women.

  10. On Business-Driven IT Security Management and Mismatches between Security Requirements in Firms, Industry Standards and Research Work

    Science.gov (United States)

    Frühwirth, Christian

    Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.

  11. Theory, Demonstration and Methods Research on Social Security of Migrant Workers by Domestic Scholar

    OpenAIRE

    Yang, Zhen; Wang, Weifang

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker soci...

  12. International University Research Ventures: Implications for U.S. Economic Competitiveness National Security

    Science.gov (United States)

    2018-03-31

    NTERNATIONAL UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY The views, opinions and/or findings...UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY Report Term: 0-Other Email: mzak@gatech.edu...expected to inform political and economic theories about technology transfer, innovation, economic competitiveness, and democratization/civil

  13. Research Market Gap in Law Enforcement Technology: Lessons from Czech Security Research Funding Programmes

    Directory of Open Access Journals (Sweden)

    Luděk Moravec

    2014-12-01

    Full Text Available While security research funding schemes are nothing new to the EU (Horizon 2020 and FP7, or to several Member States, their priorities and procedures are usually decided administratively or shaped by advisory groups of varying membership. Only recently did the EU shift its focus to the role of end users in security research programmes, seeking their input in order to maximise the utility of funded solutions. Such a hint to limited usefulness of some industrial solutions is not exactly inconspicuous. This paper discusses the gap between the stated needs of law enforcement agencies in terms of R&D funding and the grant project applications in the area of law enforcement. It aims to define and describe the gap, and consequently the market opportunities, between the supply and demand sides represented by industry-driven grant project applications and end-user-formulated calls. The study is based on empirical data from two Czech security research funding programmes that have been running since 2010 and should deliver their results by 2015. It seeks to contribute some preliminary observations about the structure of both end user needs and industry capabilities in such a particular area as law enforcement technology.

  14. The Nuclear Security Science and Policy Institute at Texas A&M University

    Directory of Open Access Journals (Sweden)

    Claudio A. Gariazzo

    2015-07-01

    Full Text Available The Nuclear Security Science and Policy Institute (NSSPI is a multidisciplinary organization at Texas A&M University and was the first U.S. academic institution focused on technical graduate education, research, and service related to the safeguarding of nuclear materials and the reduction of nuclear threats. NSSPI employs science, engineering, and policy expertise to: (1 conduct research and development to help detect, prevent, and reverse nuclear and radiological proliferation and guard against nuclear terrorism; (2 educate the next generation of nuclear security and nuclear nonproliferation leaders; (3 analyze the interrelationships between policy and technology in the field of nuclear security; and (4 serve as a public resource for knowledge and skills to reduce nuclear threats. Since 2006, over 31 Doctoral and 73 Master degrees were awarded through NSSPI-sponsored research. Forty-one of those degrees are Master of Science in Nuclear Engineering with a specialization in Nuclear Nonproliferation and 16 were Doctorate of Philosophy degrees with a specific focus on nuclear nonproliferation. Over 200 students from both technical and policy backgrounds have taken classes provided by NSSPI at Texas A&M. The model for creating safeguards and security experts, which has in large part been replicated worldwide, was established at Texas A&M by NSSPI faculty and staff. In addition to conventional classroom lectures, NSSPI faculty have provided practical experiences; advised students on valuable research projects that have contributed substantially to the overall nuclear nonproliferation, safeguards and security arenas; and engaged several similar academic and research institutes around the world in activities and research for the benefit of Texas A&M students. NSSPI has had an enormous impact on the nuclear nonproliferation workforce (across the international community in the past 8 years, and this paper is an attempt to summarize the activities

  15. 45 CFR 1226.13 - Obligations of sponsors.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Obligations of sponsors. 1226.13 Section 1226.13 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION FOR NATIONAL AND COMMUNITY SERVICE PROHIBITIONS ON ELECTORAL AND LOBBYING ACTIVITIES Sponsor Employee Activities § 1226.13...

  16. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    Energy Technology Data Exchange (ETDEWEB)

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  17. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    International Nuclear Information System (INIS)

    Bentz, A.

    2008-01-01

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected

  18. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box ... to pursue their research goals in a dynamic team environment in ... You should have an interest in agriculture, food security, nutrition, rural livelihoods, and.

  19. Biopharmaceutical industry-sponsored global clinical trials in emerging countries.

    Science.gov (United States)

    Alvarenga, Lenio Souza; Martins, Elisabeth Nogueira

    2010-01-01

    To evaluate biopharmaceutical industry-sponsored clinical trials placed in countries previously described as emerging regions for clinical research, and potential differences for those placed in Brazil. Data regarding recruitment of subjects for clinical trials were retrieved from www.clinicaltrials.gov on February 2nd 2009. Proportions of sites in each country were compared among emerging countries. Multiple logistic regressions were performed to evaluate whether trial placement in Brazil could be predicted by trial location in other countries and/or by trial features. A total of 8,501 trials were then active and 1,170 (13.8%) included sites in emerging countries (i.e., Argentina, Brazil, China, Czech Republic, Hungary, India, Mexico, Poland, Russia, South Korea, and South Africa). South Korea and China presented a significantly higher proportion of sites when compared to other countries (pattractiveness for biopharmaceutical industry-sponsored clinical trials.

  20. Securing Cyberspace: Towards an Agenda for Research and Practice

    Directory of Open Access Journals (Sweden)

    Renaud Levesque

    2015-11-01

    Full Text Available In this article, we seek to identify the important challenges preventing security in cyberspace and to identify the key questions that nations should set out to answer to play a leading role in securing cyberspace. An important assertion is that the challenge of securing cyberspace transcends the abilities of any single entity and requires a radical shift in our approach in how: i research is conducted, ii cybersecurity researchers are educated, iii new defendable systems are developed, and iv effective defensive countermeasures are deployed. Our response draws upon extensive source material and our personal experiences as cybersecurity professionals contributing to the establishment of the VENUS Cybersecurity Corporation, a not-for-profit corporation that aims to make Canada a global leader in cybersecurity. We view the challenge to be global and transdisciplinary in nature and this article to be of relevance world-wide to senior decision makers, policy makers, managers, educators, strategists, futurists, scientists, technologists, and others interested in shaping the online world of the future.

  1. A conceptual framework for cyber security awareness and education in SA

    Directory of Open Access Journals (Sweden)

    Noluxolo Kortjan

    2014-06-01

    Full Text Available The Internet is becoming increasingly interwoven in the daily lives of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business; and it has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks, of which many Internet users are not aware. As such, various countries have developed and implemented cyber-security awareness and education measures to counter the perceived ignorance of the Internet users. However, there is currently a definite lack in South Africa (SA in this regard; as there are currently, little government-led and sponsored cyber-security awareness and education initiatives. The primary research objective of this paper, therefore, is to propose a cyber-security awareness and education framework for SA that would assist in creating a cyber-secure culture in SA among all of the users of the Internet. This framework will be developed on the basis of key factors extrapolated from a comparative analysis of relevant developed countries.

  2. A Perspective on Research Challenges in Information Security

    Science.gov (United States)

    2011-11-01

    UNCLASSIFIED A Perspective on Research Challenges in Information Security Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos ...Abstract (U) 4. AUTHORS Tamas Abraham, David Adie, Angela Billard, Paul Buckland, Michael Frangos , Ben Long, Mar- tin Lucas, Paul Montague, Dean Philp

  3. Sponsors' and investigative staffs' perceptions of the current investigational new drug safety reporting process in oncology trials.

    Science.gov (United States)

    Perez, Raymond; Archdeacon, Patrick; Roach, Nancy; Goodwin, Robert; Jarow, Jonathan; Stuccio, Nina; Forrest, Annemarie

    2017-06-01

    The Food and Drug Administration's final rule on investigational new drug application safety reporting, effective from 28 March 2011, clarified the reporting requirements for serious and unexpected suspected adverse reactions occurring in clinical trials. The Clinical Trials Transformation Initiative released recommendations in 2013 to assist implementation of the final rule; however, anecdotal reports and data from a Food and Drug Administration audit indicated that a majority of reports being submitted were still uninformative and did not result in actionable changes. Clinical Trials Transformation Initiative investigated remaining barriers and potential solutions to full implementation of the final rule by polling and interviewing investigators, clinical research staff, and sponsors. In an opinion-gathering effort, two discrete online surveys designed to assess challenges and motivations related to management of expedited (7- to 15-day) investigational new drug safety reporting processes in oncology trials were developed and distributed to two populations: investigators/clinical research staff and sponsors. Data were collected for approximately 1 year. Twenty-hour-long interviews were also conducted with Clinical Trials Transformation Initiative-nominated interview participants who were considered as having extensive knowledge of and experience with the topic. Interviewees included 13 principal investigators/study managers/research team members and 7 directors/vice presidents of pharmacovigilance operations from 5 large global pharmaceutical companies. The investigative site's responses indicate that too many individual reports are still being submitted, which are time-consuming to process and provide little value for patient safety assessments or for informing actionable changes. Fewer but higher quality reports would be more useful, and the investigator and staff would benefit from sponsors'"filtering" of reports and increased sponsor communication. Sponsors

  4. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  5. List of Organizing Committees and Sponsors

    Science.gov (United States)

    2012-03-01

    Organizers DIRECTORS Maria L CalvoPresident of International Commission for Optics, Spain Aram V PapoyanDirector of Institute for Physical Research of NAS, Armenia HEADS OF PROJECT Tigran Dadalyan YSU, Armenia Artsrun MartirosyanIPR, Armenia COORDINATOR Narine GevorgyanIPR, Armenia / ICTP, Italy MANAGERS Paytsar MantashyanIPR, Armenia Karen VardanyanIPR, Armenia INTERNATIONAL ADVISORY COMMITTEE Marcis AuzinshLatvia Roland AvagyanArmenia Tapash ChakrabortyCanada Yuri ChilingaryanArmenia Eduard KazaryanArmenia Albert KirakosyanArmenia Radik KostanyanArmenia Avinash PandeyIndia Marat SoskinUkraine INTERNATIONAL PROGRAM COMMITTEE David Sarkisyan (Chair)Armenia Roman AlaverdyanArmenia Dan ApostolRomania Levon AslanyanArmenia Aranya BhattacherjeeIndia Gagik BuniatyanArmenia Vigen ChaltykyanArmenia Roldao Da RochaBrazil Miltcho DanailovItaly Vladimir GerdtRussia Samvel GevorgyanArmenia Gayane GrigoryanArmenia Rafik HakobyanArmenia Takayuki MiyaderaJapan Levon MouradianArmenia Atom MuradyanArmenia Simon RochesterUSA Hayk SarkisyanArmenia Aleksandr VardanyanArmenia LOCAL ORGANIZING COMMITTEE Narek AghekyanArmenia Anahit GogyanArmenia Melanya GrigoryanArmenia Armen HovhannisyanArmenia Lilit HovhannisyanArmenia Tatevik KhachatryanArmenia Astghik KuzanyanArmenia Satenik KuzanyanArmenia Vladimir LazarevRussia Lilit MantashyanArmenia Hripsime MkrtchyanArmenia Pavel MuzhikyanArmenia Wahi NarsisianArmenia Sahak OrdukhanyanArmenia Anna ReymersArmenia Narine TorosyanArmenia The Symposium was organized by YSU & NAS SPIE Armenian Student Chapter Institute for Physical Research (IPR) of National Academy of Sciences (NAS) Russian-Armenian (Slavonic) University (RAU) LT-PYRKAL cjsc Yerevan State University (YSU) Official Sponsors of the Symposium LT-PYRKAlRussian ArmenianSPIE LT-PYRKAL cjscRussian-Armenian UniversityYSU & NAS SPIE Student Chapter Further sponsors NFSATICTPSCSADevout Generation National Foundation of Science and Advanced TechnologiesThe Abdus Salam International Centre

  6. Awareness and enforcement of guidelines for publishing industry-sponsored medical research among publication professionals: the Global Publication Survey.

    Science.gov (United States)

    Wager, Elizabeth; Woolley, Karen; Adshead, Viv; Cairns, Angela; Fullam, Josh; Gonzalez, John; Grant, Tom; Tortell, Stephanie

    2014-04-19

    To gather information about current practices and implementation of publication guidelines among publication professionals working in or for the pharmaceutical industry. Web-based survey publicised via email and social media to members of the International Society for Medical Publication Professionals (ISMPP) and other organisations from November 2012 to February 2013. 469 individuals involved in publishing industry-sponsored research in peer-reviewed journals, mainly working in pharmaceutical or device companies ('industry', n=144), communication agencies ('agency', n=238), contract research organisations (CRO, n=15) or as freelancers (n=34). Most respondents (78%) had worked on medical publications for ≥5 years and 62% had a PhD/MD. Over 90% of industry, agency and CRO respondents routinely refer to Good Publication Practice (GPP2) and the International Committee of Medical Journal Editors' Uniform Requirements. Most respondents (78% industry, 79% agency) received mandatory training on ethical publication practices. Over 90% of respondents' companies had publication guidelines or policies and required medical writing support to be acknowledged in publications (96% industry, 99% agency). Many industry respondents used publication management tools to monitor compliance with company guidelines and about half (46%) stated that their company had formal publication audits. Fewer agencies audited adherence to guidelines but 20% of agency respondents reported audits of employees and 6% audits of freelancers. Of concern, 37% of agency respondents reported requests from authors or sponsors that they believed were unethical, although 93% of these requests were withdrawn after respondents explained the need for compliance with guidelines. Most respondents' departments (63% industry, 58% agency, 60% CRO) had been involved in publishing studies with negative or inconclusive results. Within this sample, most publication professionals working in or for industry were aware of

  7. A multilayered analysis of energy security research and the energy supply process

    International Nuclear Information System (INIS)

    Kiriyama, Eriko; Kajikawa, Yuya

    2014-01-01

    Highlights: • The analysis reveals that energy security research is highly multidisciplinary. • Diversification is important for ensuring security in the energy supply process. • A multilayered overview of the energy supply process is important for energy risk management. • Consumer lifestyle innovation will be a part of energy security in the future. - Abstract: After the Fukushima nuclear disaster, a reassessment of the energy system is needed in order to include such aspects as human security and resilience. More open and careful discussions are needed concerning the various risks and uncertainties of future energy options, both in Japan and globally. In this paper, we aim to offer a fundamental basis for discourse on energy security by analyzing the status and trends in academic publications on that issue. Our bibliometrics analysis indicates that research has shifted from promoting strategies for ensuring the self-sufficiency of the primary energy to diversification of the secondary energy supply chain by introducing energy networks consisting of an infrastructure established through international coordination. In the literature, the concept of energy security is ambiguous and allows for multiple interpretations. Our results illustrate the existence of highly multidisciplinary topics within energy security, which can be categorized into four perspectives: geopolitical, economic, policy related, and technological

  8. Budget constraints and optimization in sponsored search auctions

    CERN Document Server

    Yang, Yanwu

    2013-01-01

    The Intelligent Systems Series publishes reference works and handbooks in three core sub-topic areas: Intelligent Automation, Intelligent Transportation Systems, and Intelligent Computing. They include theoretical studies, design methods, and real-world implementations and applications. The series' readership is broad, but focuses on engineering, electronics, and computer science. Budget constraints and optimization in sponsored search auctions takes into account consideration of the entire life cycle of campaigns for researchers and developers working on search systems and ROI maximization

  9. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  10. Can the ministry collaborate to form the "next generation" of sponsors?

    Science.gov (United States)

    Stanley, Teresa

    2007-01-01

    In looking to the future of sponsored ministry of Catholic institutions, the formation of future sponsors--both religious and lay alike--is an important issue. As this ministry continues to evolve, and sponsoring groups determine how best to prepare new sponsors, might it not be time to think about how to pool the ministry's collective wisdom on formation? Sponsors act not only in the name of the health care institution (or other ministry) but on behalf of the faith community engaged in continuing the compassionate healing ministry of Jesus. In Catholic ministry, and particularly health care ministry, sponsors carry out their responsibilities through a multiplicity of organizational relationships. Just as structures differ, so too do criteria that guide who will be called to join a sponsoring group. There are several core elements that are incorporated in the majority of sponsor competency sets. Elements identified by a committee of ministry members, and reviewed by hundreds of sponsors and other ministry leaders are: mission oriented, animated, theologically grounded, collaborative, church related, and accountable. If one is looking at the potential for convening dialogues about possible areas of collaboration in formation, these core elements, with examples of how they are lived out, may offer an outline of areas new sponsors might need to learn more about for their personal and professional development. Our Catholic health ministry depends on leaders who can create and steward organizational cultures that incarnate Jesus' healing. The possibilities for collaboration in the formation of future sponsors are endless, but there are challenges. If you are a member of a sponsor body/council/corporate member in Catholic health care, and are interested in nominating potential persons to take part in a representative group that would discuss possibilities for collaboration in sponsor formation, please go to www.chausa.org/sponsorformation and complete all sections of the

  11. Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage

    International Nuclear Information System (INIS)

    Demuth, Scott F.; Mullen, Mark

    2011-01-01

    Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC and A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC and A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

  12. Laser Applications to Chemical, Security, and Environmental Analysis: introduction to the feature issue

    International Nuclear Information System (INIS)

    Dreizler, Andreas; Fried, Alan; Gord, James R.

    2007-01-01

    This Applied Optics feature issue on Laser Applications to Chemical, Security,and Environmental Analysis (LACSEA) highlights papers presented at theLACSEA 2006 Tenth Topical Meeting sponsored by the Optical Society ofAmerica

  13. Laser applications to chemical, security, and environmental analysis: introduction to the feature issue.

    Science.gov (United States)

    Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna

    2017-04-10

    This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.

  14. 14 CFR 151.51 - Performance of construction work: Sponsor force account.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Performance of construction work: Sponsor... Development Projects § 151.51 Performance of construction work: Sponsor force account. (a) Before undertaking any force account construction work, the sponsor (or any public agency acting as agent for the sponsor...

  15. Privacy, security, and the public health researcher in the era of electronic health record research.

    Science.gov (United States)

    Goldstein, Neal D; Sarwate, Anand D

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.

  16. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  17. Managing security and privacy concerns over data storage in healthcare research.

    Science.gov (United States)

    Mackenzie, Isla S; Mantay, Brian J; McDonnell, Patrick G; Wei, Li; MacDonald, Thomas M

    2011-08-01

    Issues surrounding data security and privacy are of great importance when handling sensitive health-related data for research. The emphasis in the past has been on balancing the risks to individuals with the benefit to society of the use of databases for research. However, a new way of looking at such issues is that by optimising procedures and policies regarding security and privacy of data to the extent that there is no appreciable risk to the privacy of individuals, we can create a 'win-win' situation in which everyone benefits, and pharmacoepidemiological research can flourish with public support. We discuss holistic measures, involving both information technology and people, taken to improve the security and privacy of data storage. After an internal review, we commissioned an external audit by an independent consultant with a view to optimising our data storage and handling procedures. Improvements to our policies and procedures were implemented as a result of the audit. By optimising our storage of data, we hope to inspire public confidence and hence cooperation with the use of health care data in research. Copyright © 2011 John Wiley & Sons, Ltd.

  18. Sponsors of Nebraska Indochinese Refugees: Meeting the Challenges.

    Science.gov (United States)

    Meredith, William H.; Cramer, Sheran L.

    This report summarizes the response of 80 sponsors of Indochinese refugees in Nebraska to a survey designed to explore their sponsorship experience. Problem solving areas for sponsors and refugees are named as: acculturation, emotional adjustments, communication, health, housing, transportation, employment, and legal, financial and consumer…

  19. 21 CFR 316.22 - Permanent-resident agent for foreign sponsor.

    Science.gov (United States)

    2010-04-01

    ... SERVICES (CONTINUED) DRUGS FOR HUMAN USE ORPHAN DRUGS Designation of an Orphan Drug § 316.22 Permanent-resident agent for foreign sponsor. Every foreign sponsor that seeks orphan-drug designation shall name a permanent resident of the United States as the sponsor's agent upon whom service of all processes, notices...

  20. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2016-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There is a number of such equipment in use at different institutions and are found to be very useful. (author)

  1. Laboratory research irradiators with enhanced security features

    International Nuclear Information System (INIS)

    Srivastava, Piyush

    2014-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There are a number of such equipment in use at different institutions and are found to be very useful. (author)

  2. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Heo, Gyunyoung; Son, Han Seong

    2016-01-01

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  3. Comparative Study on Cyber Securities between Power Reactor and Research Reactor with Bayesian Update

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jinsoo; Heo, Gyunyoung [Kyung Hee University, Yongin (Korea, Republic of); Son, Han Seong [Joongbu Univiersity, Geumsan (Korea, Republic of)

    2016-10-15

    The Stuxnet has shown that nuclear facilities are no more safe from cyber-attack. Due to practical experiences and concerns on increasing of digital system application, cyber security has become the important issue in nuclear industry. Korea Institute of Nuclear Nonproliferation and control (KINAC) published a regulatory standard (KINAC/RS-015) to establish cyber security framework for nuclear facilities. However, it is difficult to research about cyber security. It is hard to quantify cyber-attack which has malicious activity which is different from existing design basis accidents (DBAs). We previously proposed a methodology on development of a cyber security risk model with BBN. However, the methodology had a limitation in which the input data as prior information was solely on expert opinions. In this study, we propose a cyber security risk model for instrumentation and control (I and C) system of nuclear facilities with some equation for quantification by using Bayesian Belief Network (BBN) in order to overcome the limitation of previous research. The proposed model has been used for comparative study on cyber securities between large-sized nuclear power plants (NPPs) and small-sized Research Reactors (RR). In this study, we proposed the cyber security risk evaluation model with BBN. It includes I and C architecture, which is a target system of cyber-attack, malicious activity, which causes cyber-attack from attacker, and mitigation measure, which mitigates the cyber-attack risk. Likelihood and consequence as prior information are evaluated by considering characteristics of I and C architecture and malicious activity. The BBN model provides posterior information with Bayesian update by adding any of assumed cyber-attack scenarios as evidence. Cyber security risk for nuclear facilities is analyzed by comparing between prior information and posterior information of each node. In this study, we conducted comparative study on cyber securities between power reactor

  4. Outsourcing ethical obligations: should the revised common rule address the responsibilities of investigators and sponsors?

    Science.gov (United States)

    Shah, Seema K

    2013-01-01

    The Common Rule creates a division of moral labor in research. It implies that investigators and sponsors can outsource their ethical obligations to IRBs and participants, thereby fostering a culture of compliance, rather than one of responsibility. The proposed revisions to the Common Rule are likely to exacerbate this problem. To harness the expressive power of the law, I propose the Common Rule be revised to include the ethical responsibilities of investigators and sponsors. © 2013 American Society of Law, Medicine & Ethics, Inc.

  5. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  6. The Politics of International Terrorism in the Security Complexes in ...

    African Journals Online (AJOL)

    sulaiman.adebowale

    2006-06-13

    Jun 13, 2006 ... International Relations and Security Studies, Department of Political Science and .... porary international relations in the Greater Horn of Africa. ..... In the case .... terrorist organisation, and all its sponsors and supporters as terrorist col- ... every act of violence to the label of terrorist, to the extent that public.

  7. Modeling and simulation for cyber-physical system security research, development and applications.

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  8. Research of ios operating system security and the abuse of its exploits

    OpenAIRE

    Jucius, Mindaugas

    2017-01-01

    iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in the market. In the light of worsening human rights conditions, mainly concerning data privacy breaches performed on governmental level, the need to be reassured about the security of software that runs in our pockets is strengthened. This thesis is focused on researching on potential iOS security exploits and their abuse to access private information or perform malicious actions without user’s ...

  9. Awareness and enforcement of guidelines for publishing industry-sponsored medical research among publication professionals: the Global Publication Survey

    Science.gov (United States)

    Wager, Elizabeth; Woolley, Karen; Adshead, Viv; Cairns, Angela; Fullam, Josh; Gonzalez, John; Grant, Tom; Tortell, Stephanie

    2014-01-01

    Objective To gather information about current practices and implementation of publication guidelines among publication professionals working in or for the pharmaceutical industry. Design/setting Web-based survey publicised via email and social media to members of the International Society for Medical Publication Professionals (ISMPP) and other organisations from November 2012 to February 2013. Participants 469 individuals involved in publishing industry-sponsored research in peer-reviewed journals, mainly working in pharmaceutical or device companies (‘industry’, n=144), communication agencies (‘agency’, n=238), contract research organisations (CRO, n=15) or as freelancers (n=34). Most respondents (78%) had worked on medical publications for ≥5 years and 62% had a PhD/MD. Results Over 90% of industry, agency and CRO respondents routinely refer to Good Publication Practice (GPP2) and the International Committee of Medical Journal Editors’ Uniform Requirements. Most respondents (78% industry, 79% agency) received mandatory training on ethical publication practices. Over 90% of respondents’ companies had publication guidelines or policies and required medical writing support to be acknowledged in publications (96% industry, 99% agency). Many industry respondents used publication management tools to monitor compliance with company guidelines and about half (46%) stated that their company had formal publication audits. Fewer agencies audited adherence to guidelines but 20% of agency respondents reported audits of employees and 6% audits of freelancers. Of concern, 37% of agency respondents reported requests from authors or sponsors that they believed were unethical, although 93% of these requests were withdrawn after respondents explained the need for compliance with guidelines. Most respondents’ departments (63% industry, 58% agency, 60% CRO) had been involved in publishing studies with negative or inconclusive results. Conclusions Within this sample

  10. Security approaches in using tablet computers for primary data collection in clinical research.

    Science.gov (United States)

    Wilcox, Adam B; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project.

  11. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan.

  12. Making the world more secure, one research reactor at a time

    International Nuclear Information System (INIS)

    Mutluer, Adem; Rickwood, Peter

    2015-01-01

    During the night of 29 September 2014, a heavy transport plane took off from an air base in Kazakhstan after an operation to remove fuel and increase the security of a research reactor. In its cargo bay sat four massive containers, provided by the IAEA, that had been filled with a total of 10.2 kilograms of highly enriched uranium (HEU), on its way to be diluted to a safe substance or securely stored at the flight’s destination in Russia. The operation represented the latest achievement in a global programme involving the IAEA, the Russian Federation and the United States to assist several countries, including Kazakhstan, in eliminating the risks associated with HEU, while still maintaining the important scientific research conducted at the reactor. HEU is a security risk, as it is an ingredient that can be used to create a nuclear device intended for malicious use. It is not encouraged to use HEU in a research reactor as safer low enriched uranium (LEU) can be used instead (see box). In the 1960s and 1970s, when many of the world’s research reactors were built, technology using LEU was not yet available, so in order to perform experiments HEU fuel was required. As of next year, less proliferation sensitive LEU will be used to fuel the light water research reactor in Alatau near Almaty, the largest city in Kazakhstan. .

  13. The Effect of Massachusetts' Health Reform on Employer-Sponsored Insurance Premiums.

    Science.gov (United States)

    Cogan, John F; Hubbard, R Glenn; Kessler, Daniel

    2010-01-01

    In this paper, we use publicly available data from the Medical Expenditure Panel Survey - Insurance Component (MEPS-IC) to investigate the effect of Massachusetts' health reform plan on employer-sponsored insurance premiums. We tabulate premium growth for private-sector employers in Massachusetts and the United States as a whole for 2004 - 2008. We estimate the effect of the plan as the difference in premium growth between Massachusetts and the United States between 2006 and 2008-that is, before versus after the plan-over and above the difference in premium growth for 2004 to 2006. We find that health reform in Massachusetts increased single-coverage employer-sponsored insurance premiums by about 6 percent, or $262. Although our research design has important limitations, it does suggest that policy makers should be concerned about the consequences of health reform for the cost of private insurance.

  14. Blauwe ogen schieten tekort. Lessen voor sponsoring van landschap

    NARCIS (Netherlands)

    Overbeek, M.M.M.; Graaff, de R.P.M.

    2010-01-01

    Literatuuronderzoek en gesprekken met (ervarings)deskundigen en vertegenwoordigers van bedrijven in Amstelland en in Het Groene Woud over het proces en de voorwaarden van bedrijven om sponsoring van landschap te realiseren. Sponsoring gebeurt meestal in het kader van mvo, waarbij bedrijven de

  15. Ethical considerations in industry-sponsored multiregional clinical trials.

    Science.gov (United States)

    Ibia, Ekopimo; Binkowitz, Bruce; Saillot, Jean-Louis; Talerico, Steven; Koerner, Chin; Ferreira, Irene; Agarwal, Anupam; Metz, Craig; Maman, Marianne

    2010-01-01

    During the last several decades, the scientific and ethics communities have addressed important ethical issues in medical research, resulting in the elaboration and adoption of concepts, guidelines, and codes. Ethical issues in the conduct of Multiregional Clinical Trials have attracted significant attention mainly in the last two decades. With the globalization of clinical research and the rapid expansion to countries with a limited tradition of biomedical research, sponsors must proactively address local ethical issues, the adequacy of oversight as well as the applicability and validity of data, and scientific conclusions drawn from diverse patient populations. This paper highlights some core ethical principles and milestones in medical research, and, from an industry perspective, it discusses ethical issues that the clinical trial team may face when conducting Multiregional Clinical Trials (MRCT, clinical trials conducted at sites located across multiple geographic regions of the world). This paper further highlights the areas of consensus and controversies and proposes points to consider. Copyright © 2010 John Wiley & Sons, Ltd.

  16. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  17. Reports on the research projects in the field of reactor safety sponsored by the Federal Ministry of Science and Technology

    International Nuclear Information System (INIS)

    1975-12-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the safety program 'Reactor Safety' are sponsored by the Bundesminister fuer Forschung und Technologie (BMFT - Secretary of State for Research and Technology). Objective of this program is to continue improving the safety of LWR, in order to minimize the risk for the environment. With grant assistance from the Bundesminister des Innern (BMI - Secretary of State for Home Affairs) research contracts in the field of reactor safety are being performed. Results of these projects should contribute to resolve questions arising nuclear licensing procedures. The Forschungsbetreuung (FB - research supervision department) at the Institute for Reactor Safety (IRS), as consultants to BMFT and BMI, provides information about the progress of investigations. Individual reports will be prepared and put into standard forms by the research contractors. Each report gives information on: 1) the work accomplished, 2) the results obtained, 3) the work planned to be continued. Initial reports of research projects describe in addition the purpose of the work. A BMFT-research program on the safety of Fast Breeders (Schneller Brutreaktor - SBR) is presently under discussion. In order to define several problems, investigations included in the present compilation (RS 139, 140, 143, 162) will be previously performed. (orig.) [de

  18. Reports on the research projects in the field of reactor safety sponsored by the Federal Ministry of Science and Technology

    International Nuclear Information System (INIS)

    1976-12-01

    Investigations on the safety of light water reactors (LWR) being performed in the framework of the safety program 'Reactor Safety' are sponsored by the Bundesminister fuer Forschung und Technologie (BMFT - Secretary of State for Research and Technology). Objective of this program is to continue improving the safety of LWR, in order to minimize the risk for the environment. With grant assistance from the Bundesminister des Innern (BMI - Secretary of State for Home Affairs) research contrcts in the field of reactor safety are being performed. Results of these projects should contribute to resolve questions arising nuclear licensing procedures. The Forschungsbetreuung (FB - research supervision department) at the Institute for Reactor Safety (IRS), as consultants to BMFT and BMI, provides information about the progress of investigations. Individual reports will be prepared and put into standard forms by the research contractors. Each report gives information on: 1) the work accomplished, 2) the results obtained, 3) the work planned to be continued. Initial reports of research projects describe in addition the purpose of the work. A BMFT-research program on the safety of Fast Breeders (Schneller Brutreaktor - SRB) is presently under discussion. In order to define several problems, investigations included in the present compilation (RS 139, 140, 143, 162) will be previously performed. (orig.) [de

  19. "Food company sponsors are kind, generous and cool": (Misconceptions of junior sports players

    Directory of Open Access Journals (Sweden)

    King Lesley

    2011-09-01

    Full Text Available Abstract Background Children's exposure to unhealthy food marketing influences their food knowledge, preferences and consumption. Sport sponsorship by food companies is widespread and industry investment in this marketing is increasing. This study aimed to assess children's awareness of sport sponsors and their brand-related attitudes and purchasing intentions in response to this marketing. Methods Sports clubs known to have food sponsors and representing the most popular sports for Australian children across a range of demographic areas were recruited. Interview-based questionnaires were conducted at clubs with children aged 10-14 years (n = 103 to examine their recall of local sports club and elite sport sponsors, and their attitudes towards sponsors and sponsorship activities. Results Most children (68% could recall sponsors of their sports club, naming a median of two sponsors, including a median of one food company sponsor each. Almost half (47% of children could recall any sponsors of their favourite elite sporting team. Children aged 10-11 years were more likely than older children to report that they thought about sponsors when buying something to eat or drink (P Conclusions Children's high recall of food and beverage company sport sponsors and their positive attitudes towards these sponsors and their promotions is concerning as this is likely to be linked to children's food preferences and consumption. Limiting children's exposure to this marketing is an important initiative to improve children's nutrition.

  20. Security Research on Engineering Database System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, ...

  1. The Rules of Engagement: CTTI Recommendations for Successful Collaborations Between Sponsors and Patient Groups Around Clinical Trials.

    Science.gov (United States)

    Bloom, Diane; Beetsch, Joel; Harker, Matthew; Hesterlee, Sharon; Moreira, Paulo; Patrick-Lake, Bray; Selig, Wendy; Sherman, Jeffrey; Smith, Sophia K; Valentine, James E; Roberts, Jamie N

    2018-03-01

    To identify the elements necessary for successful collaboration between patient groups and academic and industry sponsors of clinical trials, in order to develop recommendations for best practices for effective patient group engagement. In-depth interviews, informed by a previously reported survey, were conducted to identify the fundamentals of successful patient group engagement. Thirty-two respondents from 3 sectors participated: patient groups, academic researchers, and industry. The findings were presented to a multistakeholder group of experts in January 2015. The expert group came to consensus on a set of actionable recommendations for best practices for patient groups and research sponsors. Interview respondents acknowledged that not all patient groups are created equal in terms of what they can contribute to a clinical trial. The most important elements for effective patient group engagement include establishing meaningful partnerships, demonstrating mutual benefits, and collaborating as partners from the planning stage forward. Although there is a growing appreciation by sponsors about the benefits of patient group engagement, there remains some resistance and some uncertainty about how best to engage. Barriers include mismatched expectations and a perception that patient groups lack scientific sophistication and that "wishful thinking" may cloud their recommendations. Patient groups are developing diverse skillsets and acquiring assets to leverage in order to become collaborators with industry and academia on clinical trials. Growing numbers of research sponsors across the clinical trials enterprise are recognizing the benefits of continuous and meaningful patient group engagement, but there are still mindsets to change, and stakeholders need further guidance on operationalizing a new model of clinical trial conduct.

  2. Event seeking for sponsors: Case Helsinki Pride

    OpenAIRE

    Jaakkola, Johanna

    2014-01-01

    This thesis was done for HeSeTa Ry (Helsingin seudun seksuaalinen tasavertaisuus ry) and the goal was to find out how Helsinki Pride could get sponsors more efficiently and how the co-operation could be made more long lasting with the current sponsors. Helsinki Pride is an event organized in Helsinki each year in June. It is also the biggest LGBT event organized in Finland. The biggest event of the week is the Gay Parade and the Party in the Park. In 2014 only these events had over 20 000 par...

  3. Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals.

    Science.gov (United States)

    Kim, Yong-Woon; Cho, Namin; Jang, Hye-Jung

    2018-01-01

    Information technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet. In this study, we investigated medical information security to gain a better understanding of trends in research related to medical information security. We researched papers published on '의료정보' and 'medical information' in various Korean journals during a 10-year period from 2005 to 2015. We also analyzed these journal papers for each fiscal year; these papers were categorized into the areas of literature research and empirical research, and were further subdivided according to themes and subjects. It was confirmed that 48 papers were submitted to 35 academic journals. There were 33 (68.8%) literature review articles, and analysis of secondary data was not carried out at all. In terms of empirical research, 8 (16.7%) surveys and 7 (14.6%) program developments were studied. As a result of analyzing these papers according to the research theme by research method, 17 (35.4%) papers on laws, systems, and policies were the most numerous. It was found that among the literature research papers on medical personnel were the most common, and among the empirical research papers, research on experts in information protection and medical personnel were the most common. We suggest that further research should be done in terms of social perception, human resource development, and technology development to improve risk management in medical information systems.

  4. Proceedings of the 24th Seismic Research Review: Nuclear Explosion Monitoring: Innovation and Integration

    International Nuclear Information System (INIS)

    Warren, N. Jill

    2002-01-01

    These proceedings contain papers prepared for the 24th Seismic Research Review: Nuclear Explosion Monitoring: Innovation and Integration, held 17-19 September, 2002 in Ponte Vedra Beach, Florida. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  5. Proceedings of the 24th Seismic Research Review: Nuclear Explosion Monitoring: Innovation and Integration

    Energy Technology Data Exchange (ETDEWEB)

    Warren, N. Jill [Editor

    2002-09-17

    These proceedings contain papers prepared for the 24th Seismic Research Review: Nuclear Explosion Monitoring: Innovation and Integration, held 17-19 September, 2002 in Ponte Vedra Beach, Florida. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  6. Linguistic and Cultural Challenges in Communication and Translation in US-Sponsored HIV Prevention Research in Emerging Economies.

    Science.gov (United States)

    Hanrahan, Donna; Sexton, Patrina; Hui, Katrina; Teitcher, Jennifer; Sugarman, Jeremy; London, Alex John; Barnes, Mark; Purpura, James; Klitzman, Robert

    2015-01-01

    Linguistic and cultural differences can impede comprehension among potential research participants during the informed consent process, but how researchers and IRBs respond to these challenges in practice is unclear. We conducted in-depth interviews with 15 researchers, research ethics committee (REC) chairs and members from 8 different countries with emerging economies, involved in HIV-related research sponsored by HIV Prevention Trials Network (HPTN), regarding the ethical and regulatory challenges they face in this regard. In the interviews, problems with translating study materials often arose as major concerns. Four sets of challenges were identified concerning linguistic and cultural translations of informed consent documents and other study materials, related to the: (1) context, (2) process, (3) content and (4) translation of these documents. Host country contextual issues included low literacy rates, education (e.g., documents may need to be written below 5th grade reading level), and experiences with research, and different views of written documentation. Certain terms and concepts may not exist in other languages, or have additional connotations that back translations do not always reveal. Challenges arise because of not only the content of word-for-word, literal translation, but the linguistic form of the language, such as tone (e.g., appropriate forms of politeness vs. legalese, seen as harsh), syntax, manner of questions posed, and the concept of the consent); and the contexts of use affect meaning. Problems also emerged in bilateral communications--US IRBs may misunderstand local practices, or communicate insufficiently the reasons for their decisions to foreign RECs. In sum, these data highlight several challenges that have received little, if any, attention in past literature on translation of informed consent and study materials, and have crucial implications for improving practice, education, research and policy, suggesting several strategies

  7. Linguistic and Cultural Challenges in Communication and Translation in US-Sponsored HIV Prevention Research in Emerging Economies

    Science.gov (United States)

    2015-01-01

    Linguistic and cultural differences can impede comprehension among potential research participants during the informed consent process, but how researchers and IRBs respond to these challenges in practice is unclear. We conducted in-depth interviews with 15 researchers, research ethics committee (REC) chairs and members from 8 different countries with emerging economies, involved in HIV-related research sponsored by HIV Prevention Trials Network (HPTN), regarding the ethical and regulatory challenges they face in this regard. In the interviews, problems with translating study materials often arose as major concerns. Four sets of challenges were identified concerning linguistic and cultural translations of informed consent documents and other study materials, related to the: (1) context, (2) process, (3) content and (4) translation of these documents. Host country contextual issues included low literacy rates, education (e.g., documents may need to be written below 5th grade reading level), and experiences with research, and different views of written documentation. Certain terms and concepts may not exist in other languages, or have additional connotations that back translations do not always reveal. Challenges arise because of not only the content of word-for-word, literal translation, but the linguistic form of the language, such as tone (e.g., appropriate forms of politeness vs. legalese, seen as harsh), syntax, manner of questions posed, and the concept of the consent); and the contexts of use affect meaning. Problems also emerged in bilateral communications – US IRBs may misunderstand local practices, or communicate insufficiently the reasons for their decisions to foreign RECs. In sum, these data highlight several challenges that have received little, if any, attention in past literature on translation of informed consent and study materials, and have crucial implications for improving practice, education, research and policy, suggesting several strategies

  8. Linguistic and Cultural Challenges in Communication and Translation in US-Sponsored HIV Prevention Research in Emerging Economies.

    Directory of Open Access Journals (Sweden)

    Donna Hanrahan

    Full Text Available Linguistic and cultural differences can impede comprehension among potential research participants during the informed consent process, but how researchers and IRBs respond to these challenges in practice is unclear. We conducted in-depth interviews with 15 researchers, research ethics committee (REC chairs and members from 8 different countries with emerging economies, involved in HIV-related research sponsored by HIV Prevention Trials Network (HPTN, regarding the ethical and regulatory challenges they face in this regard. In the interviews, problems with translating study materials often arose as major concerns. Four sets of challenges were identified concerning linguistic and cultural translations of informed consent documents and other study materials, related to the: (1 context, (2 process, (3 content and (4 translation of these documents. Host country contextual issues included low literacy rates, education (e.g., documents may need to be written below 5th grade reading level, and experiences with research, and different views of written documentation. Certain terms and concepts may not exist in other languages, or have additional connotations that back translations do not always reveal. Challenges arise because of not only the content of word-for-word, literal translation, but the linguistic form of the language, such as tone (e.g., appropriate forms of politeness vs. legalese, seen as harsh, syntax, manner of questions posed, and the concept of the consent; and the contexts of use affect meaning. Problems also emerged in bilateral communications--US IRBs may misunderstand local practices, or communicate insufficiently the reasons for their decisions to foreign RECs. In sum, these data highlight several challenges that have received little, if any, attention in past literature on translation of informed consent and study materials, and have crucial implications for improving practice, education, research and policy, suggesting several

  9. Criminal implication of sponsoring in medicine: legal ramifactions and recommendations; Strafrechtliche Bedeutung des Sponsorings in der Medizin: Gesetzliche Rahmenbedingungen und Handlungsempfehlungen

    Energy Technology Data Exchange (ETDEWEB)

    Mahnken, A.H.; Guenther, R.W. [Klinik fuer Radiologische Diagnostik, Universitaetsklinikum Aachen (Germany); Theilmann, M. [Rechtsanwalt Martin Theilmann, Osnabrueck (Germany); Bolenz, M. [Fakultaet Wirtschafts- und Sozialwissenschaften, Fachhochschule Osnabrueck (Germany)

    2005-08-01

    As a consequence of the so-called ''Heart-Valve-Affair'' in 1994, the German public became aware of the potential criminal significance of industrial sponsoring and third-party financial support in medicine. Since 1997, when the German Anti-Corruption Law came into effect, the penal regulations regarding bribery and benefits for public officers were tightened. Due to the lack of explicit and generally accepted guidelines in combination with regional differences of jurisdiction, there is a lingering uncertainty regarding the criminal aspects of third-party funding and industrial sponsoring. The aim of this review is to summarize the penal and professional implications of third-party funding and sponsoring in medicine including recent aspects of jurisdiction. The currently available recommendations on this issue are introduced. (orig.)

  10. The international space station: An opportunity for industry-sponsored global education

    Science.gov (United States)

    Shields, Cathleen E.

    1999-01-01

    The International Space Station provides an excellent opportunity for industry sponsorship of international space education. As a highly visible worldwide asset, the space station already commands our interest. It has captured the imagination of the world's researchers and connected the world's governments. Once operational, it can also be used to capture the dreams of the world's children and connect the world's industry through education. The space station's global heritage and ownership; its complex engineering, construction, and operation; its flexible research and technology demonstration capability; and its long duration make it the perfect educational platform. These things also make a space station education program attractive to industry. Such a program will give private industry the opportunity to sponsor space-related activities even though a particular industry may not have a research or technology-driven need for space utilization. Sponsors will benefit through public relations and goodwill, educational promotions and advertising, and the sale and marketing of related products. There is money to be made by supporting, fostering, and enabling education in space through the International Space Station. This paper will explore various ISS education program and sponsorship options and benefits, will examine early industry response to such an opportunity, and will make the case for moving forward with an ISS education program as a private sector initiative.

  11. Beware: this is sponsored! How disclosures of sponsored content affect persuasion knowledge and brand responses

    NARCIS (Netherlands)

    Boerman, S.; van Reijmersdal, E.; Neijens, P.

    2012-01-01

    This study examined how disclosure of sponsored content influences persuasion knowledge and brand responses (i.e., brand memory and brand attitude). Moreover, we tested whether extending disclosure duration increases its effect. We conducted an experiment (N = 116) in which we compared the effects

  12. 42 CFR 423.401 - General requirements for PDP sponsors.

    Science.gov (United States)

    2010-10-01

    ... sponsor is organized and licensed under State law as a risk bearing entity eligible to offer health insurance or health benefits coverage in each State in which it offers a prescription drug plan. If not... with State Law and Preemption by Federal Law § 423.401 General requirements for PDP sponsors. (a...

  13. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  14. Digital watermarking for secure and adaptive teleconferencing

    Science.gov (United States)

    Vorbrueggen, Jan C.; Thorwirth, Niels

    2002-04-01

    The EC-sponsored project ANDROID aims to develop a management system for secure active networks. Active network means allowing the network's customers to execute code (Java-based so-called proxylets) on parts of the network infrastructure. Secure means that the network operator nonetheless retains full control over the network and its resources, and that proxylets use ANDROID-developed facilities to provide secure applications. Management is based on policies and allows autonomous, distributed decisions and actions to be taken. Proxylets interface with the system via policies; among actions they can take is controlling execution of other proxylets or redirection of network traffic. Secure teleconferencing is used as the application to demonstrate the approach's advantages. A way to control a teleconference's data streams is to use digital watermarking of the video, audio and/or shared-whiteboard streams, providing an imperceptible and inseparable side channel that delivers information from originating or intermediate stations to downstream stations. Depending on the information carried by the watermark, these stations can take many different actions. Examples are forwarding decisions based on security classifications (possibly time-varying) at security boundaries, set-up and tear-down of virtual private networks, intelligent and adaptive transcoding, recorder or playback control (e.g., speaking off the record), copyright protection, and sender authentication.

  15. The role of corruption and unethical behaviour in precluding the placement of industry sponsored clinical trials in sub-Saharan Africa: Stakeholder views.

    Science.gov (United States)

    Egharevba, Efe; Atkinson, Jacqueline

    2016-08-15

    Clinical trials still represent the gold standard in testing the safety and efficacy of new and existing treatments. However, developing regions including sub-Saharan Africa remain underrepresented in pharmaceutical industry sponsored trials for a number of reasons including fear of corruption and unethical behaviour. This fear exists both on the part of pharmaceutical companies, and investigators carrying out research in the region. The objective of this research was to understand the ethical considerations associated with the conduct of pharmaceutical industry sponsored clinical trials in sub-Saharan Africa. Corruption was identified as a significant issue by a number of stakeholders who participated in semi-structured interviews and completed questionnaires. Additionally, fear of being perceived as corrupt or unethical even when conducting ethically sound research was raised as a concern. Thus corruption, whether actual or perceived, is one of a number of issues which have precluded the placement of a greater number of pharmaceutical sponsored clinical trials in this region. More discussion around corruption with all relevant stakeholders is required in order for progress to be made and to enable greater involvement of sub-Saharan African countries in the conduct of industry sponsored clinical trials.

  16. "Food company sponsors are kind, generous and cool": (mis)conceptions of junior sports players.

    Science.gov (United States)

    Kelly, Bridget; Baur, Louise A; Bauman, Adrian E; King, Lesley; Chapman, Kathy; Smith, Ben J

    2011-09-05

    Children's exposure to unhealthy food marketing influences their food knowledge, preferences and consumption. Sport sponsorship by food companies is widespread and industry investment in this marketing is increasing. This study aimed to assess children's awareness of sport sponsors and their brand-related attitudes and purchasing intentions in response to this marketing. Sports clubs known to have food sponsors and representing the most popular sports for Australian children across a range of demographic areas were recruited. Interview-based questionnaires were conducted at clubs with children aged 10-14 years (n = 103) to examine their recall of local sports club and elite sport sponsors, and their attitudes towards sponsors and sponsorship activities. Most children (68%) could recall sponsors of their sports club, naming a median of two sponsors, including a median of one food company sponsor each. Almost half (47%) of children could recall any sponsors of their favourite elite sporting team. Children aged 10-11 years were more likely than older children to report that they thought about sponsors when buying something to eat or drink (P return the favour to sponsors by buying their products (P marketing is an important initiative to improve children's nutrition.

  17. Proceedings of the 26th Seismic Research Review: Trends in Nuclear Explosion Monitoring

    International Nuclear Information System (INIS)

    Chavez, Francesca C.; Benson, Jody; Hanson, Stephanie; Mark, Carol; Wetovsky, Marvin A.

    2004-01-01

    These proceedings contain papers prepared for the 26th Seismic Research Review: Trends in Nuclear Explosion Monitoring, held 21-23 September, 2004 in Orlando, Florida. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  18. Proceedings of the 2011 Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

    International Nuclear Information System (INIS)

    Wetovsky, Marvin A.; Patterson, Eileen F.; Sandoval, Marisa N.

    2011-01-01

    These proceedings contain papers prepared for the Monitoring Research Review 2011: Ground-Based Nuclear Explosion Monitoring Technologies, held 13-15 September, 2011 in Tucson, Arizona. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), National Science Foundation (NSF), and other invited sponsors. The scientific objectives of the research are to improve the United States' capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  19. Proceedings of the 2011 Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Wetovsky, Marvin A. [Editor; Patterson, Eileen F. [Editor; Sandoval, Marisa N. [Editor

    2011-09-13

    These proceedings contain papers prepared for the Monitoring Research Review 2011: Ground-Based Nuclear Explosion Monitoring Technologies, held 13-15 September, 2011 in Tucson, Arizona. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), National Science Foundation (NSF), and other invited sponsors. The scientific objectives of the research are to improve the United States' capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  20. Proceedings of the 30th Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Wetovsky, Marv A [Los Alamos National Laboratory; Aguilar-chang, Julio [Los Alamos National Laboratory; Arrowsmith, Marie [Los Alamos National Laboratory; Arrowsmith, Stephen [Los Alamos National Laboratory; Baker, Diane [Los Alamos National Laboratory; Begnaud, Michael [Los Alamos National Laboratory; Harste, Hans [Los Alamos National Laboratory; Maceira, Monica [Los Alamos National Laboratory; Patton, Howard [Los Alamos National Laboratory; Phillips, Scott [Los Alamos National Laboratory; Randall, George [Los Alamos National Laboratory; Revelle, Douglas [Los Alamos National Laboratory; Rowe, Charlotte [Los Alamos National Laboratory; Stead, Richard [Los Alamos National Laboratory; Steck, Lee [Los Alamos National Laboratory; Whitaker, Rod [Los Alamos National Laboratory; Yang, Xiaoning [Los Alamos National Laboratory

    2008-09-23

    These proceedings contain papers prepared for the 30th Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies, held 23-25 September, 2008 in Portsmouth, Virginia. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Air Force Technical Applications Center (AFTAC), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), and other invited sponsors. The scientific objectives of the research are to improve the United States’ capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  1. Proceedings of the 2010 Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Wetovsky, Marvin A [Editor; Patterson, Eileen F [Editor

    2010-09-21

    These proceedings contain papers prepared for the Monitoring Research Review 2010: Ground-Based Nuclear Explosion Monitoring Technologies, held 21-23 September, 2010 in Orlando, Florida,. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, National Science Foundation (NSF), Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  2. Proceedings of the 26th Seismic Research Review: Trends in Nuclear Explosion Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Francesca C [Editor; Benson, Jody [Editor; Hanson, Stephanie [Editor; Mark, Carol [Editor; Wetovsky, Marvin A [Editor

    2004-09-21

    These proceedings contain papers prepared for the 26th Seismic Research Review: Trends in Nuclear Explosion Monitoring, held 21-23 September, 2004 in Orlando, Florida. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  3. Proceedings of the 2009 Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Wetovsky, Marv A [Los Alamos National Laboratory; Aguilar - Chang, Julio [Los Alamos National Laboratory; Anderson, Dale [Los Alamos National Laboratory; Arrowsmith, Marie [Los Alamos National Laboratory; Arrowsmith, Stephen [Los Alamos National Laboratory; Baker, Diane [Los Alamos National Laboratory; Begnaud, Michael [Los Alamos National Laboratory; Harste, Hans [Los Alamos National Laboratory; Maceira, Monica [Los Alamos National Laboratory; Patton, Howard [Los Alamos National Laboratory; Phillips, Scott [Los Alamos National Laboratory; Randall, George [Los Alamos National Laboratory; Rowe, Charlotte [Los Alamos National Laboratory; Stead, Richard [Los Alamos National Laboratory; Steck, Lee [Los Alamos National Laboratory; Whitaker, Rod [Los Alamos National Laboratory; Yang, Xiaoning ( David ) [Los Alamos National Laboratory

    2009-09-21

    These proceedings contain papers prepared for the Monitoring Research Review 2009: Ground -Based Nuclear Explosion Monitoring Technologies, held 21-23 September, 2009 in Tucson, Arizona,. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, Comprehensive Test Ban Treaty Organization (CTBTO), and other invited sponsors. The scientific objectives of the research are to improve the United States’ capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  4. Proceedings of the 2010 Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

    International Nuclear Information System (INIS)

    Wetovsky, Marvin A.; Patterson, Eileen F.

    2010-01-01

    These proceedings contain papers prepared for the Monitoring Research Review 2010: Ground-Based Nuclear Explosion Monitoring Technologies, held 21-23 September, 2010 in Orlando, Florida,. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, National Science Foundation (NSF), Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  5. Reports on research projects in the field of reactor safety sponsored by the Federal Ministry for Education, Science, Research and Technology. Period covered: January 1 - June 30, 1997

    International Nuclear Information System (INIS)

    1997-01-01

    Within the framework of its research programme on reactor safety, the Bundesministerium fuer Bildung, Wissenschaft, Forschung und Technology (BMBF) (Federal Ministry for Education, Science, Research and Technology) sponsors investigations into the safety of nuclear reactors. These investigations that are carried out within the framework of the programme are to provide fundamental knowledge, procedures and methods contributing to realistic safety assessments of nuclear facilities, the further development of safety technology, and the use of the potential of innovative safety-related approaches. Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) bmH, by order of the BMBF, continuously issues information on the status of such investigations by publishing semiannual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work and are published by the Research Management Division of GRS within the framework of general information on the progress in reactor safety research. (orig./SR) [de

  6. Inspection methods for physical protection Task III review of other agencies' physical security activities for research reactors

    International Nuclear Information System (INIS)

    In Task I of this project, the current Nuclear Regulatory Commission (NRC) position-on physical security practices and procedures at research reactors were reviewed. In the second task, a sampling of the physical security plans was presented and the three actual reactor sites described in the security plans were visited. The purpose of Task III is to review other agencies' physical security activities for research reactors. During this phase, the actions, procedures and policies of two domestic and two foreign agencies other than the NRC that relate to the research reactor community were examined. The agencies examined were: International Atomic Energy Agency; Canadian Atomic Energy Control Board; Department of Energy; and American Nuclear Insurers

  7. Research on image reconstruction of DR/SSCT security inspection system

    International Nuclear Information System (INIS)

    Li Jian; Cong Peng

    2008-01-01

    On the basis of DR (Digital Radiography)/CT security inspection system, DR/SSCT (single slice spiral CT) security inspection system was developed. This spiral CT system can improve the CT system's drawbacks. The research work includes in replacing the former data acquisition system by a new system which can acquire projection data of multi-slices and devising the SSCT reconstruction algorithms. Simulation experiments and practical experiments were devised to contrast several algorithms. Interpolation technique was operated in detectors data in order to improve the algorithms. In conclusion, the system exploits an algorithm of weighted average of 360 degree LI (Linear Interpolation) and JH-HI (Jiang Hsieh-Half scan Interpolation). (authors)

  8. Sponsored research on radioactive waste management

    International Nuclear Information System (INIS)

    1983-01-01

    The report is in chapters entitled: introduction (background, responsibilities, options, structure of the programme); strategy development; disposal of accumulations; disposal of radioactive waste arisings; quality assurance for waste conditioning quality assurance related to radioactive waste disposal (effectiveness of different rock types as natural barriers to the movement of radioactivity, and non-site specific factors in the design of repositories; radiological assessment; environmental studies; research and development to meet requirements specific to UKAEA wastes; long term research (processes for the solidification of highly active liquid wastes); plutonium contamination waste minimisation. (U.K.)

  9. Promoting Agricultural Research and Development to Strengthen Food Security in South Asia

    Directory of Open Access Journals (Sweden)

    Ghose Bishwajit

    2014-01-01

    Full Text Available This study aims to highlight the status of agricultural R&D in South Asia and contends that creating an effective agricultural research and innovation systems is a vital element to ensure food security in this region. South Asia is home to around one-fourth of mankind and houses the largest proportion of undernourished people in the world. Despite a period of marked economic growth averaging 6% a year over the past two decades, it remains the world's second poorest region contributing a mere 2.2% in global annual GDP. Agriculture is the mainstay of South Asian economy employing around 60% of the total workforce and generating around 20% of total GDP. South Asia has the recognition of being the second most food-insecure region next only to sub-Saharan Africa. Though there is growing evidence that technological innovation has a key role to play in increasing agricultural production and strengthening food security, agricultural research and development (R&D sector has failed to garner sufficient attention till now. This study also depicts the current situation of food security in South Asia and illustrates how agricultural education and innovation hold the master key to solve the food security issues for the world's most densely populated region.

  10. Information security policies and procedures a practitioner's reference

    CERN Document Server

    Peltier, Thomas R

    2004-01-01

    INFORMATION SECURITY POLICIES AND PROCEDURES Introduction Corporate Policies Organizationwide (Tier 1) Policies Organizationwide Policy Document Legal Requirements Duty of Loyalty Duty of Care Other Laws and Regulations Business Requirements Where to Begin? Summary Why Manage This Process as a Project? Introduction First Things First: Identify the Sponsor Defining the Scope of Work Time Management Cost Management Planning for Quality Managing Human Resources Creating a Communications Plan Summary Planning and Preparation Introduction Objectives of Policies, Stand

  11. The Effects of Employer-Sponsored Child Care on Employee Absenteeism, Turnover, Productivity, Recruitment or Job Satisfaction: What Is Claimed and What Is Known.

    Science.gov (United States)

    Miller, Thomas I.

    1984-01-01

    Evaluates the evidence supporting claims that employer-sponsored child care programs improve employee work behaviors and attitudes. Results indicated that assertions that employer-sponsored child care reduces workers' absenteeism or tardiness, or that it increases workers' productivity or job satisfaction are not supported by credible research.…

  12. Academic Information Security Researchers: Hackers or Specialists?

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-04-01

    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our work is necessary for protecting the integrity of scholarly publishing against emerging cybercrime.

  13. The role of research in global food and nutrition security - Discussion paper

    NARCIS (Netherlands)

    Fischler, F.; Wilkinson, D.; Benton, T.; Daniel, H.; Darcy-Vrillon, B.; Hedlund, K.; Heffernan, P.; Kok, E.J.; Saarela, M.; Jakubczyk, E.; Sorlini, C.; Swinnen, J.; Braun, von J.; Ash, K.; Rojas Briales, E.; Buckwell, A.; Frewen, M.; Karlsson, M.

    2015-01-01

    The present discussion document gives an overview of where European research can add the most value in relation to tackling food and nutrition security challenges and points to areas where we can expand our research potential. Moreover, it highlights the need to develop a governance structure that

  14. Industry sponsorship and research outcome

    DEFF Research Database (Denmark)

    Lundh, Andreas; Lexchin, Joel; Mintzes, Barbara

    2017-01-01

    BACKGROUND: Clinical research affecting how doctors practice medicine is increasingly sponsored by companies that make drugs and medical devices. Previous systematic reviews have found that pharmaceutical-industry sponsored studies are more often favorable to the sponsor's product compared...... on the association between sponsorship and research outcome. OBJECTIVES: To investigate whether industry sponsored drug and device studies have more favorable outcomes and differ in risk of bias, compared with studies having other sources of sponsorship. SEARCH METHODS: In this update we searched MEDLINE (2010......, systematic reviews and meta-analyses that quantitatively compared primary research studies of drugs or medical devices sponsored by industry with studies with other sources of sponsorship. We had no language restrictions. DATA COLLECTION AND ANALYSIS: Two assessors screened abstracts and identified...

  15. Proceedings of the 29th Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Wetovsky, Marvin A. [Editor; Benson, Jody [Editor; Patterson, Eileen F. [Editor

    2007-09-25

    These proceedings contain papers prepared for the 29th Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies, held 25-27 September, 2007 in Denver, Colorado. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Air Force Technical Applications Center (AFTAC), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  16. Proceedings of the 27th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Wetovsky, Marvin A. [Editor; Benson, Jody [Editor; Patterson, Eileen F. [Editor

    2005-09-20

    These proceedings contain papers prepared for the 27th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies, held 20-22 September, 2005 in Rancho Mirage, California. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Air Force Technical Applications Center (AFTAC), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  17. Proceedings of the 27th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

    International Nuclear Information System (INIS)

    Wetovsky, Marvin A.; Benson, Jody; Patterson, Eileen F.

    2005-01-01

    These proceedings contain papers prepared for the 27th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies, held 20-22 September, 2005 in Rancho Mirage, California. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Air Force Technical Applications Center (AFTAC), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  18. Proceedings of the 29th Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

    International Nuclear Information System (INIS)

    Wetovsky, Marvin A.; Benson, Jody; Patterson, Eileen F.

    2007-01-01

    These proceedings contain papers prepared for the 29th Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies, held 25-27 September, 2007 in Denver, Colorado. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Air Force Technical Applications Center (AFTAC), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  19. Proceedings of the 28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Wetovsky, Marvin A. [Editor; Benson, Jody [Editor; Patterson, Eileen F. [Editor

    2006-09-19

    These proceedings contain papers prepared for the 28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies, held 19-21 September, 2006 in Orlando, Florida. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Air Force Technical Applications Center (AFTAC), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  20. Proceedings of the 28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

    International Nuclear Information System (INIS)

    Wetovsky, Marvin A.; Benson, Jody; Patterson, Eileen F.

    2006-01-01

    These proceedings contain papers prepared for the 28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies, held 19-21 September, 2006 in Orlando, Florida. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Air Force Technical Applications Center (AFTAC), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  1. Public information about clinical trials and research.

    Science.gov (United States)

    Plétan, Yannick; Zannad, Faïez; Jaillon, Patrice

    2003-01-01

    Be it to restore the confused image of clinical research in relation to the lay public, or to develop new ways of accruing healthy volunteers or patients for clinical trials, there is a need to draft some guidance on how best to provide information on research. Although the French legal and regulatory armamentarium in this area is essentially liberal, there is currently little-justified reluctance among study sponsors to advertise publicly. A group of academic and pharmaceutical industry researchers, assembled for a workshop, together with regulators, journalists, representatives from ethics committees, social security, patient and health consumer groups and other French institutional bodies, has suggested the following series of recommendations: there is no need for additional legal or regulatory constraints; sponsors should be aware of and make use of direct public information on trials; a 'good practice charter' on public communication about clinical trials should be developed; all professionals should be involved in this communication platform; communication in the patient's immediate vicinity should be preferred (primary-care physician, local press); clinical databases and websites accessible to professionals, but also to patients and non-professionals, should be developed; genuine instruction on clinical trials for physicians and health professionals unfamiliar with such trials should be developed and disseminated; media groups should receive at least some training in the fundamentals of clinical research.

  2. Proceedings of the 23rd Seismic Research Symposium: Worldwide Monitoring of Nuclear Explosions

    International Nuclear Information System (INIS)

    Warren, N. Jill; Chavez, Francesca C.

    2001-01-01

    These proceedings contain papers prepared for the 23rd Seismic Research Review: Worldwide Monitoring of Nuclear Explosions, held 2-5 October, 2001 in Jackson Hole, Wyoming. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Technical Applications Center (AFTAC), the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  3. Reports on the projects in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1977-06-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS-projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear energy plants and their systems and the further development of safety technology. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of these investigations within the series 'GRS-F-Forschrittsberichte' (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the different projects of the search program. The individual reports are prepared by the contractors themselves as a documentation of their progress in work and published by the GRS-FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of the progress in reactor safety research. Each report describes the work performed, the results and the next steps of the work. The individual reports are attached to the classification system established by the CEC (Commission of the European Communities). The GRS-F-Progress Reports also include a list of the current investigations arranged according to the projects of the BMFT-Research Program Reactor Safety. This compilation, in addition to the LWR-investigations, also contains first contributions on the safety of advanced reactors. (orig.) [de

  4. Reports on the projects in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1977-11-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS-projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear energy plants and their systems and the further development of safety technology. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of BMFT, informs continuously of the status of these investigations within the series 'GRS-F-Fortschrittsberichte' (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the different projects of the search program. The individual reports are prepared by the contractors themselves as a documentation of their progress in work and published by the GRS-FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of the progress in reactor safety research. Each report describes the work performed, the results and the next steps of the work. The individual reports are attached to the classification system established by the CEC (Commission of the European Communities). The GRS-F-Progress Reports also include a list of the current investigations arranged according to the projects of the BMFT-Research Program Reactor Safety. This compilation, in addition to the LWR-investigations, also contains first contributions on the safety of advanced reactors. (orig.) [de

  5. Reports on the projects in the field of reactor safety sponsored by the Federal Ministry for Research and Technology

    International Nuclear Information System (INIS)

    1977-12-01

    Investigations on the safety of Light Water Reactors (LWR) being performed in the framework of the Research Program Reactor Safety (RS-projects) are sponsored by the BMFT (Federal Minister for Research and Technology), Bundesminister fuer Forschung und Technologie. Objective of this program is to investigate in greater detail the safety margins of nuclear energy plants and their systems and the further development of safety technology. The GRS (Reactor Safety Association), Gesellschaft fuer Reaktorsicherheit mbH, by order of the BMFT, informs continuously of the status of these investigations within the series 'GRS-F-Fortschrittsberichte' (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the different projects of the search program. The individual reports are prepared by the contractors themselves as a documentation of their progress in work and published by the GRS-FB (Research Coordination Department), Forschungsbetreuung at the GRS, within the framework of general information of the progress in reactor safety research. Each report describes the work performed, the results and the next steps of the work. The individual reports are attached to the classification system established by the CEC (Commission of the European Communities). The GRS-F-Progress Reports also include a list of the current investigations arranged according to the projects of the BMFT-Research Program Reactor Safety. This compilation, in addition to the LWR-investigations, also contains first contributions on the safety of advanced reactors. (orig.) [de

  6. An Analysis of Security Incidents on the Internet 1989-1995

    Science.gov (United States)

    1997-04-07

    intervene. 14.4.2. Government Information Policies and the Computer Security Market - During the history of the Internet , the government has maintained a...the government is already taking to improve the operation of the Internet market by supplying information . The following analysis determined whether the... Information Assurance Technology Analysis Center (IATAC) 3190 Fairview Park Drive Falls Church VA 22042 Performing Organization Number(s) Sponsoring

  7. 14 CFR 152.105 - Sponsors and planning agencies: Airport planning.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Sponsors and planning agencies: Airport planning. 152.105 Section 152.105 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....105 Sponsors and planning agencies: Airport planning. (a) To be eligible to apply for a project for...

  8. Wireless networks of opportunity in support of secure field operations

    Science.gov (United States)

    Stehle, Roy H.; Lewis, Mark

    1997-02-01

    Under funding from the Defense Advanced Research Projects Agency (DARPA) for joint military and law enforcement technologies, demonstrations of secure information transfer in support of law enforcement and military operations other than war, using wireless and wired technology, were held in September 1996 at several locations in the United States. In this paper, the network architecture, protocols, and equipment supporting the demonstration's scenarios are presented, together with initial results, including lessons learned and desired system enhancements. Wireless networks of opportunity encompassed in-building (wireless-LAN), campus-wide (Metricom Inc.), metropolitan (AMPS cellular, CDPD), and national (one- and two-way satellite) systems. Evolving DARPA-sponsored packet radio technology was incorporated. All data was encrypted, using multilevel information system security initiative (MISSI)FORTEZZA technology, for carriage over unsecured and unclassified commercial networks. The identification and authentication process inherent in the security system permitted logging for database accesses and provided an audit trail useful in evidence gathering. Wireless and wireline communications support, to and between modeled crisis management centers, was demonstrated. Mechanisms for the guarded transport of data through the secret-high military tactical Internet were included, to support joint law enforcement and crisis management missions. A secure World Wide Web (WWW) browser forms the primary, user-friendly interface for information retrieval and submission. The WWW pages were structured to be sensitive to the bandwidth, error rate, and cost of the communications medium in use (e.g., the use of and resolution for graphical data). Both still and motion compressed video were demonstrated, along with secure voice transmission from laptop computers in the field. Issues of network bandwidth, airtime costs, and deployment status are discussed.

  9. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  10. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  11. Proceedings of the 25th Seismic Research Review -- Nuclear Explosion Monitoring: Building the Knowledge Base

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Francesca C. [Editor; Mendius, E. Louise [Editor

    2003-09-23

    These proceedings contain papers prepared for the 25th Seismic Research Review -- Nuclear Explosion Monitoring: Building the Knowledge Base, held 23-25 September, 2003 in Tucson, Arizona. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  12. Proceedings of the 25th Seismic Research Review -- Nuclear Explosion Monitoring: Building the Knowledge Base

    International Nuclear Information System (INIS)

    Chavez, Francesca C.; Mendius, E. Louise

    2003-01-01

    These proceedings contain papers prepared for the 25th Seismic Research Review -- Nuclear Explosion Monitoring: Building the Knowledge Base, held 23-25 September, 2003 in Tucson, Arizona. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Research Laboratory (AFRL), US Army Space and Missile Defense Command, and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  13. The Complex Dynamics of Sponsored Search Markets

    Science.gov (United States)

    Robu, Valentin; La Poutré, Han; Bohte, Sander

    This paper provides a comprehensive study of the structure and dynamics of online advertising markets, mostly based on techniques from the emergent discipline of complex systems analysis. First, we look at how the display rank of a URL link influences its click frequency, for both sponsored search and organic search. Second, we study the market structure that emerges from these queries, especially the market share distribution of different advertisers. We show that the sponsored search market is highly concentrated, with less than 5% of all advertisers receiving over 2/3 of the clicks in the market. Furthermore, we show that both the number of ad impressions and the number of clicks follow power law distributions of approximately the same coefficient. However, we find this result does not hold when studying the same distribution of clicks per rank position, which shows considerable variance, most likely due to the way advertisers divide their budget on different keywords. Finally, we turn our attention to how such sponsored search data could be used to provide decision support tools for bidding for combinations of keywords. We provide a method to visualize keywords of interest in graphical form, as well as a method to partition these graphs to obtain desirable subsets of search terms.

  14. Building Strong Bonds with Program Sponsors--Public Relations Ideas To Make It Happen.

    Science.gov (United States)

    Stephens, Karen

    2003-01-01

    Lists public relations strategies for child care center directors seeking to cultivate relationships with their program sponsors. Suggests ways to identify a public relations message, make the sponsor part of the child care family, become part of the sponsor's family, give public recognition, and share the children's accomplishments. (JPB)

  15. Market Imperfections and Firm-Sponsored Training

    NARCIS (Netherlands)

    Picchio, M.; van Ours, J.C.

    2010-01-01

    Recent human capital theories predict that labor market frictions and product market competition influence firm-sponsored training. Using matched worker-firm data from Dutch manufacturing, our paper empirically assesses the validity of these predictions. We find that a decrease in labor market

  16. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  17. 7 CFR 226.16 - Sponsoring organization provisions.

    Science.gov (United States)

    2010-01-01

    ... comparison, reviewers must determine whether the meal counts were accurate. If there is a discrepancy between...) Program payments. The sponsoring organization must continue to pay any claims for reimbursement for...

  18. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  19. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  20. Industry sponsorship and research outcome

    DEFF Research Database (Denmark)

    Lundh, Andreas; Sismondo, Sergio; Lexchin, Joel

    2012-01-01

    Clinical research affecting how doctors practice medicine is increasingly sponsored by companies that make drugs and medical devices. Previous systematic reviews have found that pharmaceutical industry sponsored studies are more often favorable to the sponsor's product compared with studies...

  1. Risk Based Security Management at Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Ek, David R. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    This presentation provides a background of what led to the international emphasis on nuclear security and describes how nuclear security is effectively implemented so as to preserve the societal benefits of nuclear and radioactive materials.

  2. 22 CFR 62.3 - Sponsor eligibility.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Sponsor eligibility. 62.3 Section 62.3 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES EXCHANGE VISITOR PROGRAM General Provisions... visitor program are: (1) United States local, state and federal government agencies; (2) International...

  3. [Criminal implication of sponsoring in medicine: legal ramifactions and recommendations].

    Science.gov (United States)

    Mahnken, A H; Theilmann, M; Bolenz, M; Günther, R W

    2005-08-01

    As a consequence of the so-called "Heart-Valve-Affair" in 1994, the German public became aware of the potential criminal significance of industrial sponsoring and third-party financial support in medicine. Since 1997, when the German Anti-Corruption Law came into effect, the penal regulations regarding bribery and benefits for public officers were tightened. Due to the lack of explicit and generally accepted guidelines in combination with regional differences of jurisdiction, there is a lingering uncertainty regarding the criminal aspects of third-party funding and industrial sponsoring. The aim of this review is to summarize the penal and professional implications of third-party funding and sponsoring in medicine including recent aspects of jurisdiction. The currently available recommendations on this issue are introduced.

  4. Criminal implication of sponsoring in medicine: legal ramifactions and recommendations

    International Nuclear Information System (INIS)

    Mahnken, A.H.; Guenther, R.W.; Theilmann, M.; Bolenz, M.

    2005-01-01

    As a consequence of the so-called ''Heart-Valve-Affair'' in 1994, the German public became aware of the potential criminal significance of industrial sponsoring and third-party financial support in medicine. Since 1997, when the German Anti-Corruption Law came into effect, the penal regulations regarding bribery and benefits for public officers were tightened. Due to the lack of explicit and generally accepted guidelines in combination with regional differences of jurisdiction, there is a lingering uncertainty regarding the criminal aspects of third-party funding and industrial sponsoring. The aim of this review is to summarize the penal and professional implications of third-party funding and sponsoring in medicine including recent aspects of jurisdiction. The currently available recommendations on this issue are introduced. (orig.)

  5. Nevada Natonal Security Site-Directed Research and Development FY 2010 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2011-01-01

    This annual report of the Site-Directed Research and Development (SDRD) program represents the highly significant R and D accomplishments conducted during fiscal year 2010. This year was noteworthy historically, as the Nevada Test Site was renamed to the Nevada National Security Site (NNSS). This change not only recognizes how the site's mission has evolved, but also heralds a future of new challenges and opportunities for the NNSS. In many ways, since its inception in 2002, the SDRD program has helped shape that evolving mission. As we approach 2012, SDRD will also mark a milestone, having completed its first full decade of innovative R and D in support of the site and national security. The program continues to fund advanced science and technology development across traditional Department of Energy (DOE) nuclear security areas such as stockpile stewardship and non-proliferation while also supporting Department of Homeland Security (DHS) needs, and specialized work for government agencies like the Department of Defense (DoD) and others. The NNSS will also contribute technologies in the areas of treaty verification and monitoring, two areas of increasing importance to national security. Keyed to the NNSS's broadened scope, the SDRD program will continue to anticipate and advance R and D projects that will help the NNSS meet forthcoming challenges.

  6. Research on information security in big data era

    Science.gov (United States)

    Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin

    2018-05-01

    Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.

  7. Needed Research on Child Socialization. A Special Report of the USOE-Sponsored Grant Study: Critical Appraisal of Research in the Personality-Emotions-Motivation Domain.

    Science.gov (United States)

    Gorsuch, Richard L.; And Others

    The task group report presented in this publication is one of a series prepared by eminent psychologists who have served as consultants in the U.S. Office of Education-sponsored grant study to conduct a Critical Appraisal of the Personality-Emotions-Motivation Domain. In order to achieve the goal of identifying important problems and areas for new…

  8. Sponsorship investments: do they deliver brand awareness for all sponsors?

    Directory of Open Access Journals (Sweden)

    Mpolokeng Sephapo Catherine

    2017-03-01

    Full Text Available Sponsorship as a marketing communications tool is well adopted in South Africa across various areas such as sports and entertainment. Although world markets have experienced economic turmoil in the last few years, the sponsorship market may be considered to be thriving as companies use this marketing communication tool as a vehicle to create and maintain relationships. The purpose of this study was to explore which sponsors of the South African National Rugby team are sports consumers aware of as a result of the sponsorship. Literature states that awareness also influences the judgments about brands in the consideration set, even without any brand associations in the consumer’s mind. In low involvement decision; where consumers do not need to search extensively for information in order to make a decision; minimal brand awareness levels may be enough to convince the consumer to make their final choice. The study is exploratory in nature however provides a South African perspective on how effective the sponsorship of the Springbok is with regards to creating awareness of the sponsors among sports consumers. The study made use of a qualitative approach whereby primary data was collected by means of focus groups and naïve sketches. Data collected was analyzed by means of content analysis. The findings suggest that participants were predominantly aware of the key sponsors of the Springboks; these were sponsors who had their branding on the Springbok jersey worn during rugby matches. The factors that participants mentioned to contribute to their awareness of the sponsors were the branding on the Springbok playing jersey as well as television adverts along with other promotional tools. This study urges sponsors to not only rely on the sponsorship initiative to create awareness but rather leverage the sponsorship with tools that are relevant to their target audience. This study contributes to sponsorship literature relating to the effectiveness of

  9. Cloud Security: Issues and Research Directions

    Science.gov (United States)

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  10. Jointly Sponsored Research Program on Energy Related Research

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2013-12-31

    Cooperative Agreements, DE-FC26-08NT43293, DOE-WRI Cooperative Research and Development Program for Fossil Energy-Related Resources began in June 2009. The goal of the Program was to develop, commercialize, and deploy technologies of value to the nation’s fossil and renewable energy industries. To ensure relevancy and early commercialization, the involvement of an industrial partner was encouraged. In that regard, the Program stipulated that a minimum of 20% cost share be achieved in a fiscal year. This allowed WRI to carry a diverse portfolio of technologies and projects at various development technology readiness levels. Depending upon the maturity of the research concept and technology, cost share for a given task ranged from none to as high as 67% (two-thirds). Over the course of the Program, a total of twenty six tasks were proposed for DOE approval. Over the period of performance of the Cooperative agreement, WRI has put in place projects utilizing a total of $7,089,581 in USDOE funds. Against this funding, cosponsors have committed $7,398,476 in private funds to produce a program valued at $14,488,057. Tables 1 and 2 presented at the end of this section is a compilation of the funding for all the tasks conducted under the program. The goal of the Cooperative Research and Development Program for Fossil Energy-Related Resources was to through collaborative research with the industry, develop or assist in the development of innovative technology solutions that will: • Increase the production of United States energy resources – coal, natural gas, oil, and renewable energy resources; • Enhance the competitiveness of United States energy technologies in international markets and assist in technology transfer; • Reduce the nation's dependence on foreign energy supplies and strengthen both the United States and regional economies; and • Minimize environmental impacts of energy production and utilization. Success of the Program can be measured by

  11. It Security and EO Systems

    Science.gov (United States)

    Burnett, M.

    2010-12-01

    One topic that is beginning to influence the systems that support these goals is that of Information Technology (IT) Security. Unsecure systems are vulnerable to increasing attacks and other negative consequences; sponsoring agencies are correspondingly responding with more refined policies and more stringent security requirements. These affect how EO systems can meet the goals of data and service interoperability and harmonization through open access, transformation and visualization services. Contemporary systems, including the vision of a system-of-systems (such as GEOSS, the Global Earth Observation System of Systems), utilize technologies that support a distributed, global, net-centric environment. These types of systems have a high reliance on the open systems, web services, shared infrastructure and data standards. The broader IT industry has developed and used these technologies in their business and mission critical systems for many years. Unfortunately, the IT industry, and their customers have learned the importance of protecting their assets and resources (computing and information) as they have been forced to respond to an ever increasing number and more complex illegitimate “attackers”. This presentation will offer an overview of work done by the CEOS WGISS organization in summarizing security threats, the challenges to responding to them and capturing the current state of the practice within the EO community.

  12. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  13. The relationship between absenteeism and employer-sponsored ...

    African Journals Online (AJOL)

    Establishing on- site employer-sponsored child-care facilities is an example of such ..... The sample size and characteristics of each of the groups are presented in Table 1. Table 1: ...... 'A qualitative and quantitative review of antecedents.

  14. Heterogeneous Expectations and Speculative Behavior in Insurance-Linked Securities

    Directory of Open Access Journals (Sweden)

    Min Zheng

    2015-01-01

    Full Text Available Within the framework of heterogeneous agent models, this paper analyzes the impact factors on the issuance of an insurance-linked security (ILS, and gives an ILS pricing formula and the conditions of existence and stability of the issue price. We consider two cases: fixed supply and flexible supply. We find that, in the fixed volume case, to assure the successful issuance of an ILS, an appropriate volume of the ILS is necessary, and to attract investors, the ILS should pay a positive premium which can help investors to enhance the efficient frontier of their portfolio. In the flexible supply case, we show that the issue price of an ILS is given by the weighted average of different beliefs about the discounted ILS return, and the stability of the issue price depends on the numbers of investors and sponsors and the extrapolation rate to the ILS of investors. In addition, whether an ILS has the hedging ability to sponsors depends on their own understanding about the ILS coupon and the relationship between the recovery from the ILS and their liability, but how much the risk of sponsors can be hedged relies on the ILS coupon expected by investors.

  15. Proceedings of the 21st Seismic Research Symposium: Technologies for Monitoring The Comprehensive Nuclear Test-Ban Treaty

    Energy Technology Data Exchange (ETDEWEB)

    Warren, N. Jill [Editor

    1999-09-21

    These proceedings contain papers prepared for the 21st Seismic Research Symposium: Technologies for Monitoring The Comprehensive Nuclear-Test-Ban Treaty, held 21-24 September 1999 in Las Vegas, Nevada. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Technical Applications Center (AFTAC), Department of Defense (DoD), the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  16. 21 CFR 500.84 - Conditions for approval of the sponsored compound.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Conditions for approval of the sponsored compound. 500.84 Section 500.84 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... Used in Food-Producing Animals § 500.84 Conditions for approval of the sponsored compound. (a) On the...

  17. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    Science.gov (United States)

    2016-02-12

    Stockmann, Xiao Qiang. Changing Media, Changing China , New York: Oxford University Press, (01 2011) Dieter Ernst. Indigenous Innovation and...2211 China , science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...ABSTRACT Final Report: The Evolving Relationship Between Technology and National Security in China : Innovation , Defense Transformation, and China’s

  18. 76 FR 68808 - Exchange Visitor Program-Cap on Current Participant Levels and Moratorium on New Sponsor...

    Science.gov (United States)

    2011-11-07

    ... participants for whom sponsors are responsible and the third parties that sponsors rely upon to assist them in administering their programs (i.e., U.S. employers and foreign agents); (b) requires that participants from non... sponsors to fully vet employers and all SWT job offers; and, (d) requires sponsors to contact current...

  19. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  20. Security Approaches in Using Tablet Computers for Primary Data Collection in Clinical Research

    OpenAIRE

    Wilcox, Adam B.; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues asso...

  1. Uranium recovery research sponsored by the Nuclear Regulatory Commission at Pacific Northwest Laboratory. Annual progress report, May 1982-May 1983

    International Nuclear Information System (INIS)

    Foley, M.G.; Opitz, B.E.; Deutsch, W.J.

    1983-06-01

    Pacific Northwest Laboratory (PNL) is currently conducting research for the US Nuclear Regulatory Commission (NRC) on uranium recovery process wastes for both active and inactive operations. NRC-sponsored uranium recovery research at PNL is focused on NRC regulatory responsibilities for uranium-recovery operations: license active milling and in situ extraction operations; concur on the acceptability of DOE remedial-action plans for inactive sites; and license DOE to maintain inactive sites following remedial actions. PNL's program consists of four coordinated projects comprised of a program management task and nine research tasks that address the critical technical and safety issues for uranium recovery. Specifically, the projects endeavor to find and evaluate methods to: prevent erosion of tailings piles and prevent radon release from tailings piles; evaluate the effectiveness of interim stabilization techniques to prevent wind erosion and transport of dry tailings from active piles; estimate the dewatering and consolidation behavior of slurried tailings to promote early cover placement; design a cover-protection system to prevent erosion of the cover by expected environmental stresses; reduce seepage into ground water and prevent ground-water degradation; control solution movement and reaction with ground water in in-situ extraction operations; evaluate natural and induced restoration of ground water in in-situ extraction operations; and monitor releases to the environment from uranium recovery facilities

  2. Uranium recovery research sponsored by the Nuclear Regulatory Commission at Pacific Northwest Laboratory. Annual progress report, May 1982-May 1983

    Energy Technology Data Exchange (ETDEWEB)

    Foley, M.G.; Opitz, B.E.; Deutsch, W.J.; Peterson, S.R.; Gee, G.W.; Serne, R.J.; Hartley, J.N.; Thomas, V.W.; Kalkwarf, D.R.; Walters, W.H.

    1983-06-01

    Pacific Northwest Laboratory (PNL) is currently conducting research for the US Nuclear Regulatory Commission (NRC) on uranium recovery process wastes for both active and inactive operations. NRC-sponsored uranium recovery research at PNL is focused on NRC regulatory responsibilities for uranium-recovery operations: license active milling and in situ extraction operations; concur on the acceptability of DOE remedial-action plans for inactive sites; and license DOE to maintain inactive sites following remedial actions. PNL's program consists of four coordinated projects comprised of a program management task and nine research tasks that address the critical technical and safety issues for uranium recovery. Specifically, the projects endeavor to find and evaluate methods to: prevent erosion of tailings piles and prevent radon release from tailings piles; evaluate the effectiveness of interim stabilization techniques to prevent wind erosion and transport of dry tailings from active piles; estimate the dewatering and consolidation behavior of slurried tailings to promote early cover placement; design a cover-protection system to prevent erosion of the cover by expected environmental stresses; reduce seepage into ground water and prevent ground-water degradation; control solution movement and reaction with ground water in in-situ extraction operations; evaluate natural and induced restoration of ground water in in-situ extraction operations; and monitor releases to the environment from uranium recovery facilities.

  3. Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data

    Science.gov (United States)

    2017-03-02

    AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum- Encrypted Data Philip Walther UNIVERSITT WIEN Final...on Quantum- Encrypted Data 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA9550-16-1-0004 5c.  PROGRAM ELEMENT NUMBER 61102F 6. AUTHOR(S) Philip Walther 5d...1010 AT 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) EOARD Unit 4515 APO AE 09421-4515 10

  4. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  5. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  6. The Y-12 National Security Complex Foreign Research Reactor Uranium Supply Production

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, T. [Nuclear Technology and Nonproliferation Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States); Keller, A.P. [Disposition and Supply Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States)

    2011-07-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the National Nuclear Security Administration (NNSA) HEU Disposition, the Reduced Enrichment Research and Test Reactors (RERTR), and the United States (U.S.) FRR Spent Nuclear Fuel (SNF) Acceptance Programs. The FRR Supply Program supports the important U.S. government nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to Low-Enriched Uranium (LEU) fuel under the RERTR Program. The NNSA Y-12 Site Office maintains the prime contracts with foreign government agencies for the supply of LEU for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. In addition to uranium metal feedstock for fuel fabrication, Y-12 can produce LEU in different forms to support new fuel development or target fabrication for medical isotope production. With production improvements and efficient delivery preparations, Y-12 continues to successfully support the global research reactor community. (author)

  7. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  8. Model Based Cyber Security Analysis for Research Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of)

    2013-07-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN.

  9. Model Based Cyber Security Analysis for Research Reactor Protection System

    International Nuclear Information System (INIS)

    Sho, Jinsoo; Rahman, Khalil Ur; Heo, Gyunyoung; Son, Hanseong

    2013-01-01

    The study on the qualitative risk due to cyber-attacks into research reactors was performed using bayesian Network (BN). This was motivated to solve the issues of cyber security raised due to digitalization of instrumentation and control (I and C) system. As a demonstrative example, we chose the reactor protection system (RPS) of research reactors. Two scenarios of cyber-attacks on RPS were analyzed to develop mitigation measures against vulnerabilities. The one is the 'insertion of reactor trip' and the other is the 'scram halt'. The six mitigation measures are developed for five vulnerability for these scenarios by getting the risk information from BN

  10. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  11. An Analysis of Collaborative Problem-Solving Mechanisms in Sponsored Projects: Applying the 5-Day Sprint Model

    Science.gov (United States)

    Raubenolt, Amy

    2016-01-01

    In May 2016, the office of Finance and Sponsored Projects at The Research Institute at Nationwide Children's Hospital conducted a 5-day design sprint session to re-evaluate and redesign a flawed final reporting process within the department. The department sprint was modeled after the design sprint sessions that occur routinely in software…

  12. Committees and sponsors

    Science.gov (United States)

    2011-10-01

    International Advisory Committee Richard F CastenYale, USA Luiz Carlos ChamonSão Paulo, Brazil Osvaldo CivitareseLa Plata, Argentina Jozsef CsehATOMKI, Hungary Jerry P DraayerLSU, USA Alfredo Galindo-UribarriORNL & UT, USA James J KolataNotre Dame, USA Jorge López UTEP, USA Joseph B NatowitzTexas A & M, USA Ma Esther Ortiz IF-UNAM Stuart PittelDelaware, USA Andrés SandovalIF-UNAM Adam SzczepaniakIndiana, USA Piet Van IsackerGANIL, France Michael WiescherNotre Dame, USA Organizing Committee Libertad Barrón-Palos (Chair)IF-UNAM Roelof BijkerICN-UNAM Ruben FossionICN-UNAM David LizcanoININ Sponsors Instituto de Ciencias Nucleares, UNAMInstituto de Física, UNAMInstituto Nacional de Investigaciones NuclearesDivisión de Física Nuclear de la SMFCentro Latinoamericano de Física

  13. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    Science.gov (United States)

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  14. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  15. The Two Faces of Security in Hybrid Political Orders: A Framework for Analysis and Research

    Directory of Open Access Journals (Sweden)

    Robin Luckham

    2013-09-01

    authority and capacity to deliver security are weak, disputed or compromised by special interests; and (iii “securitised policy spaces” in which international actors collaborate to ensure peace and fulfil their responsibility to protect vulnerable end-users in unsecured regions. In making these distinctions we argue that similar analytical lenses can be turned upon international actors in securitised policy spaces as well as upon state and non-state security actors. The concluding section argues that such a reframing of the security and development debate demands not just new modes of analysis but also fresh approaches to research designed both to provide insights into the vernacular understandings, coping strategies and potential agency of end-users and to uncover the informal networks, alliances and covert strategies of the multiple actors determining their security in hybrid political orders. This paper builds upon a systematic literature search undertaken by the Justice and Security Research Programme (JSRP at the London School of Economics (LSE funded by the UK’s Department for International Development (DFID. The search itself and its main findings are discussed in Luckham and Kirk (2012 and Luckham and Kirk (2013.

  16. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  17. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  18. 22 CFR 42.31 - Family-sponsored immigrants.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Family-sponsored immigrants. 42.31 Section 42.31 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF IMMIGRANTS UNDER THE IMMIGRATION AND NATIONALITY ACT, AS AMENDED Immigrants Subject to Numerical Limitations § 42.31 Family...

  19. 76 FR 2807 - New Animal Drugs; Change of Sponsor; Follicle Stimulating Hormone

    Science.gov (United States)

    2011-01-18

    ... [Docket No. FDA-2010-N-0002] New Animal Drugs; Change of Sponsor; Follicle Stimulating Hormone AGENCY...) is amending the animal drug regulations to reflect a change of sponsor for a new animal drug....O. Box 324-12, Tyler, TX 75703 has informed FDA that it has transferred ownership of, and all rights...

  20. Recycling: Establishing a Citizen-Sponsored Reclamation Center.

    Science.gov (United States)

    Keep America Beautiful, Inc., New York, NY.

    This booklet applies the Clean Community System (CCS) of Keep America Beautiful, Inc. to the development of citizen-sponsored recycling projects. Six initial steps in establishing a reclamation center are given and include information gathering, market analysis, legal requirements, and site location. Suggestions are included for recruiting staff…

  1. Nevada National Security Site Environmental Report 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills (editor), Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple

  2. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    Science.gov (United States)

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  3. The Security Research of Digital Library Network

    Science.gov (United States)

    Zhang, Xin; Song, Ding-Li; Yan, Shu

    Digital library is a self-development needs for the modern library to meet the development requirements of the times, changing the way services and so on. digital library from the hardware, technology, management and other aspects to objective analysis of the factors of threats to digital library network security. We should face up the problems of digital library network security: digital library network hardware are "not hard", the technology of digital library is relatively lag, digital library management system is imperfect and other problems; the government should take active measures to ensure that the library funding, to enhance the level of network hardware, to upgrade LAN and prevention technology, to improve network control technology, network monitoring technology; to strengthen safety management concepts, to prefect the safety management system; and to improve the level of security management modernization for digital library.

  4. Measuring Consumer Reactions to Sponsoring Partnerships Based upon Emotional and Attitudinal Responses

    DEFF Research Database (Denmark)

    Riis Christensen, Sverre

    2004-01-01

    Consumers' reactions from being exposed to sponsorships has primarily been measured and docu-mented applying cognitive information processing models to the phenomenon. In the paper it is argued that such effects are probably better modelled applying models of peripheral information processing...... in consumer reactions towards sponsored objects of different natures as well as towards potential sponsoring organisations. For instance, the charitable institutions measured in the study elicit larger negative emotional re-sponses than positive responses, corresponding to a negative Net Emotional Response...... to the net scores and to the full evaluations on the attitude and emotion batteries and it seems as if the latter approach will be richer in explanatory power for a potential sponsor....

  5. An industry-sponsored, school-focused model for continuing ...

    African Journals Online (AJOL)

    An industry-sponsored, school-focused model for continuing professional ... HEIs and Departments of Education (DoE), could change the traditional concept that CPTD is the responsibility of DoEs into a new model where the business

  6. Research and realization of info-net security controlling system

    Science.gov (United States)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  7. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  8. Why Consumers Misattribute Sponsorships to Non-Sponsor Brands: Differential Roles of Item and Relational Communications.

    Science.gov (United States)

    Weeks, Clinton S; Humphreys, Michael S; Cornwell, T Bettina

    2018-02-01

    Brands engaged in sponsorship of events commonly have objectives that depend on consumer memory for the sponsor-event relationship (e.g., sponsorship awareness). Consumers however, often misattribute sponsorships to nonsponsor competitor brands, indicating erroneous memory for these relationships. The current research uses an item and relational memory framework to reveal sponsor brands may inadvertently foster this misattribution when they communicate relational linkages to events. Effects can be explained via differential roles of communicating item information (information that supports processing item distinctiveness) versus relational information (information that supports processing relationships among items) in contributing to memory outcomes. Experiment 1 uses event-cued brand recall to show that correct memory retrieval is best supported by communicating relational information when sponsorship relationships are not obvious (low congruence). In contrast, correct retrieval is best supported by communicating item information when relationships are obvious (high congruence). Experiment 2 uses brand-cued event recall to show that, against conventional marketing recommendations, relational information increases misattribution, whereas item information guards against misattribution. Results suggest sponsor brands must distinguish between item and relational communications to enhance correct retrieval and limit misattribution. Methodologically, the work shows that choice of cueing direction is critical in differentially revealing patterns of correct and incorrect retrieval with pair relationships. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  9. Cyber Security Research Frameworks For Coevolutionary Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Rush, George D. [Missouri Univ. of Science and Technology, Rolla, MO (United States); Tauritz, Daniel Remy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  10. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.; Espinoza, J.; Murphy, M.D.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSI addressed some of these issues to create a more manageable public key infrastructure.

  11. On a State-Sponsored Sport System in China.

    Science.gov (United States)

    Cao, Jie; Zhiwei, Pan

    The gold medal success of China in recent Olympic Games can be traced to the advancement of the state-sponsored sport system (SSSS). While the program was developed initially through socialist ideals, it is more than a centralized government system to monopolize resources for glorified sport performance. Participation in competition is an inherent part of the human condition. Success in athletics is associated with national identity and has economic, social, and cultural implications. Because of this, it is essential that the SSSS adjust and improve to keep pace with other facets of China's quickly changing national reform. In association with emerging economic reform, some sports now receive equal or more funds from private investments compared to government allocation. The state-sponsored sport system must continue to adapt to maintain the Chinese tradition of excellence in competition.

  12. Computational Equipment for Support of Air Force Sponsored Programs for the Design of Advanced and Miniaturized Explosive and Advanced Propellant Systems

    National Research Council Canada - National Science Library

    Stewart, D. S; Buckmaster, John D; Jackson, Thomas L

    2008-01-01

    This grant funded the acquisition of a 128 node/256 processor cluster computer that now supports the computational needs of the combined, Air Force-sponsored research groups of Prof. D. Scott Stewart (PI...

  13. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  14. 8 CFR 204.1 - General information about immediate relative and family-sponsored petitions.

    Science.gov (United States)

    2010-01-01

    ... relative and family-sponsored petitions. 204.1 Section 204.1 Aliens and Nationality DEPARTMENT OF HOMELAND... about immediate relative and family-sponsored petitions. (a) Types of petitions. Petitions may be filed..., Application to Determine Suitability as Adoptive Parents for a Convention adoptee; and (ii) After USCIS...

  15. CHDS Sponsors Critical Infrastructure Protection Workshop

    OpenAIRE

    Center for Homeland Defense and Security

    2008-01-01

    Center for Homeland Defense and Security, PRESS RELEASES The NPS Center for Homeland Defense and Security in partnership with the U.S. Department of Homeland Security recently hosted its first Critical Infrastructure Protection Workshop. The workshop brought together practitioners and...

  16. Risk sharing between competing health plans and sponsors

    NARCIS (Netherlands)

    E.M. van Barneveld (Erik); W.P.M.M. van de Ven (Wynand); R.C.J.A. van Vliet (René)

    2001-01-01

    textabstractIn many countries, competing health plans receive capitation payments from a sponsor, whether government or a private employer. All capitation payment methods are far from perfect and have raised concerns about risk selection. Paying health plans partly on the basis

  17. Highlight: IDRC sponsors Caribbean symposium on impact of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    12 mai 2015 ... An IDRC-sponsored symposium exploring the impact of the Internet on economic ... Le symposium commandité par le CRDI, qui a eu lieu à Saint Andrew, ... Une nouvelle recherche fait état d'arguments convaincants pour ...

  18. Nevada National Security Site. Site-Directed Research and Development FY 2011 Annual Report

    International Nuclear Information System (INIS)

    Bender, Howard

    2012-01-01

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R and D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R and D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  19. Research on information security system of waste terminal disposal process

    Science.gov (United States)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  20. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  1. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    Science.gov (United States)

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  2. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  3. 7 CFR 225.14 - Requirements for sponsor participation.

    Science.gov (United States)

    2010-01-01

    ... 225.14 Agriculture Regulations of the Department of Agriculture (Continued) FOOD AND NUTRITION SERVICE, DEPARTMENT OF AGRICULTURE CHILD NUTRITION PROGRAMS SUMMER FOOD SERVICE PROGRAM Sponsor and Site Provisions... Youth Sports Program; and (5) Private nonprofit organizations as defined in § 225.2. (c) General...

  4. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  5. An update on research priorities in hydrocephalus: overview of the third National Institutes of Health-sponsored symposium "Opportunities for Hydrocephalus Research: Pathways to Better Outcomes".

    Science.gov (United States)

    McAllister, James P; Williams, Michael A; Walker, Marion L; Kestle, John R W; Relkin, Norman R; Anderson, Amy M; Gross, Paul H; Browd, Samuel R

    2015-12-01

    Building on previous National Institutes of Health-sponsored symposia on hydrocephalus research, "Opportunities for Hydrocephalus Research: Pathways to Better Outcomes" was held in Seattle, Washington, July 9-11, 2012. Plenary sessions were organized into four major themes, each with two subtopics: Causes of Hydrocephalus (Genetics and Pathophysiological Modifications); Diagnosis of Hydrocephalus (Biomarkers and Neuroimaging); Treatment of Hydrocephalus (Bioengineering Advances and Surgical Treatments); and Outcome in Hydrocephalus (Neuropsychological and Neurological). International experts gave plenary talks, and extensive group discussions were held for each of the major themes. The conference emphasized patient-centered care and translational research, with the main objective to arrive at a consensus on priorities in hydrocephalus that have the potential to impact patient care in the next 5 years. The current state of hydrocephalus research and treatment was presented, and the following priorities for research were recommended for each theme. 1) Causes of Hydrocephalus-CSF absorption, production, and related drug therapies; pathogenesis of human hydrocephalus; improved animal and in vitro models of hydrocephalus; developmental and macromolecular transport mechanisms; biomechanical changes in hydrocephalus; and age-dependent mechanisms in the development of hydrocephalus. 2) Diagnosis of Hydrocephalus-implementation of a standardized set of protocols and a shared repository of technical information; prospective studies of multimodal techniques including MRI and CSF biomarkers to test potential pharmacological treatments; and quantitative and cost-effective CSF assessment techniques. 3) Treatment of Hydrocephalus-improved bioengineering efforts to reduce proximal catheter and overall shunt failure; external or implantable diagnostics and support for the biological infrastructure research that informs these efforts; and evidence-based surgical standardization with

  6. Laboratory Directed Research and Development FY2008 Annual Report

    International Nuclear Information System (INIS)

    Kammeraad, J.E.; Jackson, K.J.; Sketchley, J.A.; Kotta, P.R.

    2009-01-01

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Institutional Science and Technology Office at Lawrence Livermore, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the full spectrum of national security interests encompassed by the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration. The accomplishments described in this annual report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $91.5 million for fiscal year 2008 sponsored 176 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with universities

  7. A Dual Perspective on Risks and Security Within Research Assistantships

    Directory of Open Access Journals (Sweden)

    Johannes Petrus Rossouw

    2013-01-01

    Full Text Available Although research assistantships are considered research learning venues in graduate education, there is a scarcity of literature that examines ethical elements attached to the employment of graduate student research assistants or the position of their research supervisors. This article explores the need to implement formal regulations specific to research assistantships in order to increase security and decrease risks for research assistants and research supervisors. Relationships between research assistants and research supervisors have some similarities with regular employment relationships; yet some distinct differences arise due to the educational and developmental nature of research assistantships. The article is written from a dual perspective reflecting the authors’ roles (a research supervisor and a research assistant, respectively and institutional locations (Faculties of Education in South Africa and Canada. The authors draw from existing literature, an analysis of institutional policies and practices at their universities, and their personal and professional experiences to illustrate risks that research assistants and their supervisors may face within research assistantships. They assess the extent to which existing and proposed policies and practices influence working conditions and safeguard experiences within graduate research assistantships. The findings reveal that research assistantships are a unique form of employment focused on educational and professional development that requires specific documentation of expected standards of practice. The authors argue that lack of clear regulations exposes both parties to unnecessary risks and offer recommendations for creating a “Standards of Good Practice” document that will be useful for individuals engaged in research assistantships.

  8. On sponsoring and CSR involvement. Two theories explaining their effects on a company’s attractiveness for candidates

    Directory of Open Access Journals (Sweden)

    Jacek Wozniak

    2016-04-01

    Full Text Available The use of e-recruitment for hiring personnel is constantly expanding. However, the scientific understanding of factors affecting company employer brand during e-recruitment, is still poor. Research into corporate social responsibilities (CSR shows that information about the company’s involvement in these areas makes its image more positive, including its image as an employer. CSR is an umbrella concept, which includes activities similar to traditional sponsoring of sports and cultural events. Two theories explaining the impact of information on attractiveness of the employer’s brand in the e-recruitment process are presented. The aim of the text is to check which of them – cultural fit or signaling theory – more adequately explains the changes in how a candidate perceives a company’s attractiveness, when given information about its’ sports and cultural sponsoring and environment-related activities. The effect of both positive and negative information concerning a company’s activities on its employer image in the e-recruitment situation is analyzed. Data from an questionnaire filled in by 80 young full-time workers shows that positive information about a company’s CSR and sponsoring activities affects candidates according to the cultural fit model, while negative – according to the signaling theory model. The consequences for theory and managerial practice are described.

  9. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  10. A Cyber Security Self-Assessment Method for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.

    2004-11-01

    A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is a digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.

  11. A Cyber Security Self-Assessment Method for Nuclear Power Plants

    International Nuclear Information System (INIS)

    Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.

    2004-01-01

    A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is a digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process

  12. 14 CFR 152.309 - Availability of sponsor's records.

    Science.gov (United States)

    2010-01-01

    ... (CONTINUED) AIRPORTS AIRPORT AID PROGRAM Accounting and Reporting Requirements § 152.309 Availability of... the purposes of accounting and audit. (b) The sponsor or planning agency shall allow appropriate FAA...-term retention value, the FAA may require transfer of custody of those records to the FAA. ...

  13. Consumer Perceptions of Sponsors of Disease Awareness Advertising

    Science.gov (United States)

    Hall, Danika V.; Jones, Sandra C.; Iverson, Donald C.

    2011-01-01

    Purpose: In many countries there is emerging concern regarding alliances between the pharmaceutical industry and health non-profit organizations (NPOs), and the increase of co-sponsored marketing activities such as disease awareness advertising. The current study aims to explore Australian women's perceptions of disease awareness advertising with…

  14. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  15. Identification of NPM and DDX5 as Therapeutic Targets in TSC

    Science.gov (United States)

    2017-12-01

    Medical Research and Materiel Command Fort Detrick, Maryland 21702-5012 DISTRIBUTION STATEMENT: Approved for Public Release; Distribution Unlimited...9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) U.S. Army Medical Research and Materiel Command Fort...complexes in TSC cells. 15. SUBJECT TERMS NPM, DDX5, TSC, chemical library , split-luciferase 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  16. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  17. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  18. Security requirements engineering : the SI* modeling language and the Secure Tropos methodology

    NARCIS (Netherlands)

    Massacci, F.; Mylopoulos, J.; Zannone, N.; Ras, Z.W.; Tsay, L.-S.

    2010-01-01

    Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years, spurred by the realization that security must be dealt with in the earliest phases of the software development process as

  19. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Son, Han Seong; Kim, Young Ki; Park, Jaek Wan

    2012-01-01

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security

  20. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Kyung Hee University, Seoul (Korea, Republic of); Son, Han Seong [Joongbu Univ., Chungnam (Korea, Republic of); Kim, Young Ki; Park, Jaek Wan [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security.

  1. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  2. Usable security history, themes, and challenges

    CERN Document Server

    Garfinkel, Simson

    2014-01-01

    There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to dat

  3. ERC Vision & Research

    Science.gov (United States)

    SRC Engineering Research Center for Environmentally Benign Semiconductor Manufacturing (ERC ) ** Bringing Sustainability to Semiconductor Manufacturing ** A multi-university research center leading the way to environmentally friendly semiconductor manufacturing, sponsored by the Semiconductor Research

  4. Toward the Development of a Sustainable Scientific Research Culture in Azerbaijan (2011-2015).

    Science.gov (United States)

    Aliyeva, Saida; Flanagan, Peter; Johnson, April; Strelow, Lisa

    2016-01-01

    This review especially describes the dangerous pathogens research program in Azerbaijan (AJ) funded by the US Defense Threat Reduction Agency under the Cooperative Biological Engagement Program (CBEP) from 2011 through 2015. The objectives of the CBEP are to prevent the proliferation of biological weapons; to consolidate and secure collections of dangerous pathogens in central repositories; to strengthen biosafety and biosecurity of laboratory facilities; and to improve partner nations' ability to detect, diagnose, report, and respond to outbreaks of disease caused by especially dangerous pathogens. One of the missions of the CBEP is therefore to increase the research skills and proficiency of partner country scientists. The program aims to fulfill this mission by sponsoring scientific research projects that exercise the modern diagnostic techniques available in the CBEP-engaged laboratories and the enhanced disease surveillance/control programs. To strengthen the local scientists' ability to develop research ideas, write grant proposals, and conduct research independently, in-country CBEP integrating contractor personnel have mentored scientists across AJ and conducted workshops to address technical gaps. As a result of CBEP engagement, seven research projects developed and led by AJ scientists have been funded, and five projects are currently in various stages of implementation. The Defense Threat Reduction Agency has also sponsored AJ scientist participation at international scientific conferences to introduce and integrate them into the global scientific community. The efforts summarized in this review represent the first steps in an ongoing process that will ultimately provide AJ scientists with the skills and resources to plan and implement research projects of local and regional relevance.

  5. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Measuring Consumer Reactions to Sponsoring Partnerships Based upon Emotional and Attitudinal Responses

    OpenAIRE

    Riis Christensen, Sverre

    2004-01-01

    Consumers reactions from being exposed to sponsorships has primarily been measured and docu-mented applying cognitive information processing models to the phenomenon. In the paper it is argued that such effects are probably better modelled applying models of peripheral information processing to the measurements, and it is suggested that the effects can be measured on the atti-tudes-towards-the sponsor and on the emotion-towards-the sponsor levels. This type of modelling is known as the ELAM m...

  7. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  8. Management of the Interface between Nuclear Safety and Security for Research Reactors

    International Nuclear Information System (INIS)

    2016-08-01

    The aim of this publication is to provide technical guidelines and practical information to assist Member States, operating organizations and regulatory bodies, on the basis of international good practices, and to manage the interface between nuclear safety and security at research reactor facilities in an integrated and coordinated manner. The publication was developed based on input from IAEA technical and consultants' meetings held between 2013 and 2015

  9. Taiwan's perspective on electronic medical records' security and privacy protection: lessons learned from HIPAA.

    Science.gov (United States)

    Yang, Che-Ming; Lin, Herng-Ching; Chang, Polun; Jian, Wen-Shan

    2006-06-01

    The protection of patients' health information is a very important concern in the information age. The purpose of this study is to ascertain what constitutes an effective legal framework in protecting both the security and privacy of health information, especially electronic medical records. All sorts of bills regarding electronic medical data protection have been proposed around the world including Health Insurance Portability and Accountability Act (HIPAA) of the U.S. The trend of a centralized bill that focuses on managing computerized health information is the part that needs our further attention. Under the sponsor of Taiwan's Department of Health (DOH), our expert panel drafted the "Medical Information Security and Privacy Protection Guidelines", which identifies nine principles and entails 12 articles, in the hope that medical organizations will have an effective reference in how to manage their medical information in a confidential and secured fashion especially in electronic transactions.

  10. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  11. 2015 Cross-Domain Deterrence Seminar Summary Report

    Energy Technology Data Exchange (ETDEWEB)

    Juarez, A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-01-11

    Lawrence Livermore National Laboratory (LLNL) hosted the 2nd Annual Cross-Domain Deterrence Seminar on November 17th, 2015 in Livermore, CA. The seminar was sponsored by LLNL’s Center for Global Security Research (CGSR), National Security Office (NSO), and Global Security program. This summary covers the seminar’s panels and subsequent discussions.

  12. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  13. Research on the security of nuclear power equipment

    International Nuclear Information System (INIS)

    Zhao Jiong; Wu Jinzong

    2008-06-01

    Recently, the rapidly growing economy in conflict with the lack of power in the whole country become more and more seriously in our country. In other hand, there is also various kind of problems such as greenhouse effect and the oil price rising conditions. It greatly promote our country's development of Nuclear power project. As forecast, the number of Nuclear Power Plant will increase greatly in the future. However, the security of the Nuclear Power Plant is one of the topics that people always pay more attention to. Combining with the practice experience of Nuclear Power Plant in Japanese, the security of Nuclear Power Plant in multi-angles is discussed. It is pointed that the risk assesment and management system of nuclear power plant are effective measure for security of the development of nuclear power. (authors)

  14. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  15. Annual report on Reactor Safety Research Projects sponsored by the Ministry of Economics and Technology of the Federal Republic of Germany. Reporting period 1999. Progress report

    International Nuclear Information System (INIS)

    2000-01-01

    Within its competence for energy research, the Bundesministerium fuer Wirtschaft und Technologie (BMWi) (Federal Ministry of Economics and Technology) sponsors investigations into the safety of nuclear power plants. The objective of these investigations is to provide fundamental knowledge, procedures and methods to contribute to realistic safety assessments of nuclear installations, to the further development of safety technology and to make use of the potential of innovative safety-related approaches. The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWi, continuously issues information on the status of such investigations by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work and are published by the Research Management Division of GRS within the framework of general information on the progress in reactor safety research. The compilation of the reports is classified according to the classification system ''Joint Safety Research Index'' of the CEC (commission of the European communities). The reports are arranged in sequence of their project numbers. (orig.)

  16. Nevada National Security Site: Site-Directed Research and Development (SDRD) Fiscal Year 2015 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Bender, Howard A. [National Security Technologies, LLC. (NSTec), Mercury, NV (United States). Site-Directed Research and Development Program

    2016-04-01

    This report presents results of multiple research projects, new and ongoing, funded under the Site-Directed Research and Development Program for the Nevada National Security Site during federal fiscal year 2015. The Site's legacy capabilities in remote sensing combined with new paradigms for emergency response and consequence management help drive the need to develop advanced aerial sensor platforms. Likewise, dynamic materials science is a critical area of scientific research for which basic physics issues are still unresolved. New methods of characterizing materials in extreme states are vitally needed, and these efforts are paving the way with new knowledge. Projects selected in FY 2015 for the Exploratory Research portfolio exhibit a strong balance of NNSS mission relevance. Geoscience, seismology, and techniques for detecting underground nuclear events are still essential focus areas. Many of the project reports in the second major section of this annual report are ongoing continuations in multi-year lifecycles. Diagnostic techniques for stockpile and nuclear security science figured prominently as well, with a few key efforts coming to fruition, such as phase transition detection. In other areas, modeling efforts toward better understanding plasma focus physics has also started to pay dividends for major program needs.

  17. Empirical research on financial capability evaluation of A-share listed companies in the securities industry based on principal component analysis

    Directory of Open Access Journals (Sweden)

    Xiuping Wang

    2017-11-01

    Full Text Available Based on the relevant financial data indicators of A-share markets of Shanghai and Shenzhen in 2009, with all of 29 listed companies in the securities industry as the research objects, this paper selects 10variables that can fully reflect the financial capability indicators and uses the principal component analysis to carry out the empirical research on the financial capability. The research results show that the comprehensive financial capability of listed companies in A-share securities industry must be focused on the following four capabilities, investment and income, profit, capital composition and debt repayment and cash flow indicators. In addition, the principal component analysis can effectively evaluate the financial capability of listed companies in A-share securities industry, and solve the problems in the previous analysis methods, such as excessive indicators, information overlapping and so on.

  18. Evaluating of foreign trade security

    OpenAIRE

    Vasyliev Andriy

    2015-01-01

    A method of evaluating foreign trade security is considered based on horizontally integrated approach to research security issues, taking into account the conditions of management, factors, components and levels of external security. The work was based theories of security, economics, management theory, practice of state regulation of foreign trade.

  19. Enhanced evaluation data initiates a collaborative out-of-school time food sponsors work group.

    Science.gov (United States)

    Rifkin, Robin; Williams, Lauren A; Grode, Gabrielle M; Roberts-Johnson, Wendy-Anne

    2015-01-01

    Philadelphia's Healthy Kids, Healthy Communities Out-of-School Time (OST) Initiative led by the Health Promotion Council developed 10 Healthy Living Guidelines for Out-of-School Time Programs to support a healthy environment for Philadelphia youth in 200 OST programs. Health Promotion Council participated in an enhanced cross-site evaluation with the national Robert Wood Johnson Foundation evaluator during the final year of funding to learn more about food and nutrition in the OST setting, and to share data and engage the OST food providers. A plate waste study measured the quantity and nutrition composition of meals served to youth compared to food not eaten. Staff interviews measured program adherence to the Healthy Living Guidelines, along with other facets of the food environment in 7 Philadelphia OST programs. Online surveys were sent to OST programs. Food providers (sponsors) were interviewed using Appreciative Inquiry methodology to gain insight into systems, goals, and common interests. Aggregated plate waste data from 7 observations showed an average of 42% of the food uneaten after meal/snack consumption, and high sodium content of the meals. Twenty-nine staff at OST programs completed the online survey, and 3 food sponsors were interviewed. Recommendations to improve the food included increasing variety, offering more salads, fruits and vegetables, and culturally appropriate foods. Food sponsor interviews showed a variety of meal production, distribution, service and training systems, and an interest in working together. The food sponsors met to review the data and prioritized common goals. They continue to work together to improve systems and meals for food service. A food sponsors work group formed and continues as a result of sharing enhanced cross-site data about food in OST settings. Food sponsors continue to work together to improve systems and nutritional offerings for Philadelphia OST programs.

  20. 29 CFR 4010.12 - Alternative method of compliance for certain sponsors of multiple employer plans.

    Science.gov (United States)

    2010-07-01

    ... BENEFIT GUARANTY CORPORATION CERTAIN REPORTING AND DISCLOSURE REQUIREMENTS ANNUAL FINANCIAL AND ACTUARIAL INFORMATION REPORTING § 4010.12 Alternative method of compliance for certain sponsors of multiple employer... part for an information year if any contributing sponsor of the multiple employer plan provides a...

  1. Security and privacy in smart grids

    CERN Document Server

    Xiao, Yang

    2013-01-01

    Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today'

  2. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  3. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  4. Student experimenter and sponsor display SE83-9 'Chix in Space' incubator

    Science.gov (United States)

    1988-01-01

    Student experimenter John C. Vellinger (left) explains components of an incubator for his Student Experiment (SE) 83-9 Chicken Embryo Development in Space or 'Chix in Space' to be carried onboard STS-29 Discovery, Orbiter Vehicle (OV) 103. Mark S. Deusser, representing the sponsoring organization, holds up the incubator for inspection by STS-29 crewmembers who will monitor in-space operation of the experiment. Mission Specialist (MS) Robert C. Springer is partially visible in the lower right foreground. The student's sponsor is Kentucky Fried Chicken (KFC).

  5. A scoping review of traditional food security in Alaska.

    Science.gov (United States)

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-12-01

    Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.

  6. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    Science.gov (United States)

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

  7. Security mechanism based on Hospital Authentication Server for secure application of implantable medical devices.

    Science.gov (United States)

    Park, Chang-Seop

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  8. Legitimate Use of Military Force Against State-Sponsored International Terrorism

    National Research Council Canada - National Science Library

    Erickson, Richard

    1989-01-01

    ... is part of a larger strategy that seeks to maximize the risk of punishment for terrorists and their sponsors and supporters while minimizing their potential rewards, In this context military action...

  9. Materials and corrosion programs sponsored by the Gas Research Institute

    International Nuclear Information System (INIS)

    Flowers, A.

    1980-01-01

    The paper deals briefly with the Gas Research Institute and its research in materials and corrosion. As a not-for-profit organization, the Gas Research Institute plans, finances, and manages applied and basic research and technological development programs associated with gaseous fuels. These programs are in the general areas of production, transportation, storage, utilization and conservation of natural and manufactured gases and related products. Research results, whether experimental or analytical, are evaluated and publicly disseminated. Materials and corrosion research is concentrated in the SNG from Coal and Non-fossil Hydrogen subprograms

  10. Research and Technology Report: 1997

    Science.gov (United States)

    Sakimoto, Philip; Friedman, Jonathan (Editor)

    1997-01-01

    This volume highlights the most significant results from research and development projects sponsored through NASA's Office of Equal Opportunity Programs, Minority University Research and Education Division, in collaboration with Headquarters Program Offices, during Academic Year 1996-97 and Summer 1996. It includes the work of major multidisciplinary research groups, such as those sponsored under NASA's University Research Centers at Minority Institutions and Institutional Research Awards programs, as well as that of individual principal investigators sponsored under the Faculty Awards for Research or other MUREP programs. It encompasses contributions from 863 students and 388 faculty-level researchers at institutions eligible to compete for MUREP funding, including: Historically Black Colleges and Universities (HBCU), Hispanic-Serving Institutions (HSI), Tribal Colleges and Universities (TCU), and accredited minority colleges or universities with a 50 percent or greater underrepresented minority student enrollment. It stands as a testimony to NASA's response to Executive Orders 12876, 12900, and 13021, which mandate increased Federal support to these classes of institutions. We firmly believe that maintaining America's leadership in aerospace and related areas depends on fully utilizing the talents available at the Nation's minority universities.

  11. Case Study: Applying the Theory of Planned Behavior as Interventions to Increase Sponsored Project Proposal Submissions from Liberal Arts Faculty

    Science.gov (United States)

    Hartmann, Anita

    2011-01-01

    In the current economic climate, many colleges and universities face similar challenges: the need to increase external sponsorship for research activities and the need to benefit from additional indirect cost recovery. Preparing funding proposals for submission to sponsors is a faculty behavior that can be modified by applying behavioral theory to…

  12. Security Techniques for the Electronic Health Records.

    Science.gov (United States)

    Kruse, Clemens Scott; Smith, Brenna; Vanderlinden, Hannah; Nealand, Alexandra

    2017-08-01

    The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.

  13. Ultra-secure RF Tags for Safeguards and Security - SBIR Phase II Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Twogood, Richard E [Dirac Solutions Inc., Pleasanton, CA (United States)

    2015-01-27

    This is the Final Report for the DOE Phase II SBIR project “Ultra-secure RF Tags for Safeguards and Security.” The topics covered herein include technical progress made, progress against the planned milestones and deliverables, project outcomes (results, collaborations, intellectual property, etc.), and a discussion on future expectations of deployment and impacts of the results of this work. In brief, all planned work for the project was successfully completed, on or ahead of schedule and on budget. The major accomplishment was the successful development of a very advanced passive ultra-secure RFID tag system with combined security features unmatched by any commercially available ones. These tags have high-level dynamic encrypted authentication, a novel tamper-proofing mechanism, system software including graphical user interfaces and networking, and integration with a fiber-optic seal mechanism. This is all accomplished passively (with no battery) by incorporating sophisticated hardware in the tag which harvests the energy from the RFID readers that are interrogating the tag. Based on initial feedback (and deployments) at DOE’s Lawrence Livermore National Laboratory (LLNL), it is anticipated these tags and their offspring will meet DOE and international community needs for highly secure RFID systems. Beyond the accomplishment of those original objectives for the ultra-secure RF tags, major new spin-off thrusts from the original work were identified and successfully pursued with the cognizance of the DOE sponsor office. In particular, new classes of less sophisticated RFID tags were developed whose lineage derives from the core R&D thrusts of this SBIR. These RF “tag variants” have some, but not necessarily all, of the advanced characteristics described above and can therefore be less expensive and meet far wider markets. With customer pull from the DOE and its national laboratories, new RFID tags and systems (including custom readers and software) for

  14. Industry sponsored anti-smoking ads and adolescent reactance: test of a boomerang effect.

    Science.gov (United States)

    Henriksen, L; Dauphinee, A L; Wang, Y; Fortmann, S P

    2006-02-01

    To examine whether adolescents' exposure to youth smoking prevention ads sponsored by tobacco companies promotes intentions to smoke, curiosity about smoking, and positive attitudes toward the tobacco industry. A randomised controlled experiment compared adolescents' responses to five smoking prevention ads sponsored by a tobacco company (Philip Morris or Lorillard), or to five smoking prevention ads sponsored by a non-profit organisation (the American Legacy Foundation), or to five ads about preventing drunk driving. A large public high school in California's central valley. A convenience sample of 9th and 10th graders (n = 832) ages 14-17 years. Perceptions of ad effectiveness, intention to smoke, and attitudes toward tobacco companies measured immediately after exposure. As predicted, adolescents rated Philip Morris and Lorillard ads less favourably than the other youth smoking prevention ads. Adolescents' intention to smoke did not differ as a function of ad exposure. However, exposure to Philip Morris and Lorillard ads engendered more favourable attitudes toward tobacco companies. This study demonstrates that industry sponsored anti-smoking ads do more to promote corporate image than to prevent youth smoking. By cultivating public opinion that is more sympathetic toward tobacco companies, the effect of such advertising is likely to be more harmful than helpful to youth.

  15. Research on Lightweight Information Security System of the Internet of Things

    OpenAIRE

    Ying Li; Li Ping Du; JianWei Guo; Xin Zhao

    2013-01-01

    In order to improve the security of information transmitted in the internet of things, this study designs an information security system architecture of internet of things based on a lightweight cryptography. In this security system, an authentication protocol, encryption/decryption protocol and signature verification protocol are proposed and implemented. All these security protocol are used to verify the legality of access device and to protect the confidentiality and integrity of transform...

  16. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  17. Cyber-crime Science = Crime Science + Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Junger, Marianne; Wieringa, Roelf J.

    2010-01-01

    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality,

  18. Laboratory Directed Research and Development FY2008 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Kammeraad, J E; Jackson, K J; Sketchley, J A; Kotta, P R

    2009-03-24

    The Laboratory Directed Research and Development (LDRD) Program, authorized by Congress in 1991 and administered by the Institutional Science and Technology Office at Lawrence Livermore, is our primary means for pursuing innovative, long-term, high-risk, and potentially high-payoff research that supports the full spectrum of national security interests encompassed by the missions of the Laboratory, the Department of Energy, and National Nuclear Security Administration. The accomplishments described in this annual report demonstrate the strong alignment of the LDRD portfolio with these missions and contribute to the Laboratory's success in meeting its goals. The LDRD budget of $91.5 million for fiscal year 2008 sponsored 176 projects. These projects were selected through an extensive peer-review process to ensure the highest scientific quality and mission relevance. Each year, the number of deserving proposals far exceeds the funding available, making the selection a tough one indeed. Our ongoing investments in LDRD have reaped long-term rewards for the Laboratory and the nation. Many Laboratory programs trace their roots to research thrusts that began several years ago under LDRD sponsorship. In addition, many LDRD projects contribute to more than one mission area, leveraging the Laboratory's multidisciplinary team approach to science and technology. Safeguarding the nation from terrorist activity and the proliferation of weapons of mass destruction will be an enduring mission of this Laboratory, for which LDRD will continue to play a vital role. The LDRD Program is a success story. Our projects continue to win national recognition for excellence through prestigious awards, papers published in peer-reviewed journals, and patents granted. With its reputation for sponsoring innovative projects, the LDRD Program is also a major vehicle for attracting and retaining the best and the brightest technical staff and for establishing collaborations with

  19. Measuring the Perception of Travel Security – Comparative Analysis of Students in Two Different Fields: Tourism and Security

    Directory of Open Access Journals (Sweden)

    Sebastjan Repnik

    2015-01-01

    Full Text Available The aim of the research was to determine how students/respondents perceive security on their travels in Europe. The respondents belong to two different study programmes, one focusing on the field of security (Faculty of Criminal Justice and Security, University of Maribor and the other on the field of tourism (Higher Vocational School for Catering and Tourism. Our main presumption was that students of the two institutions developed a different attitude towards travel security since their studies focus on two substantively different academic-professional fields. We examined their attitude towards security factors such as: security climate, self-protection and collective security. In our research we included a sample of 100 students/respondents. We used an instrument in the form of a questionnaire for the quantitative measurement of responses on a 5-point Likert scale. To portray the results of the research we also used various statistical indicators in the computer programme SPSS such as: arithmetic mean, Man-Whitney test, frequency distribution of responses, where independent variables are displayed. The findings suggest that the students/respondents attitude towards safety and their expectations on individual elements of all three security factors differ in the two target groups. The expectations of students/respondents of FCJS regarding the implementation and provision of security are higher compared to students/respondents of HVC. Respondents have different experience with security on their travels, as the number of travels varies quite substantially between students. Both institutions can use the results of the research in the evaluation processes of their study programmes. On the basis of the results of the research it is substantiated that the field and content of study have an impact on the students’ attitude to elements of security while travelling. The findings are intended to all researchers in the field of security and tourism, as

  20. Database Security: A Historical Perspective

    OpenAIRE

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 ye...

  1. Investigating how everyday people experience security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    In this paper I propose a method for analyzing everyday people's experiences with IT-security. I furthermore report how I applied the method. The proposal is motivated by work of other researchers and their efforts to get beyond secure behavior, and to get an insight in secure or insecure...... experiences that everyday users of technology encounter. The background for introducing this method is a project under the heading of IT Security for Citizens, which bridges between research competencies in HCI and security. In this project we develop methods and concepts to analyze digital signature systems...... and security sensible systems in a broad sense, from the point of view of contemporary CHI. The project includes literature studies of usable security, as well as empirical investigations and design work. This paper reports on my method to target user experiences of and with security technology....

  2. The Informatics Security Cost of Distributed Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2010-01-01

    Full Text Available The objective, necessity, means and estimated efficiency of information security cost modeling are presented. The security requirements of distributed informatics applications are determined. Aspects regarding design, development and implementation are established. Influence factors for informatics security are presented and their correlation is analyzed. The costs associated to security processes are studied. Optimal criteria for informatics security are established. The security cost of the informatics application for validating organizational identifiers is determined using theoretical assumptions made for cost models. The conclusions highlight the validity of research results and offer perspectives for future research.

  3. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  4. Influenza research database: an integrated bioinformatics resource for influenza virus research

    Science.gov (United States)

    The Influenza Research Database (IRD) is a U.S. National Institute of Allergy and Infectious Diseases (NIAID)-sponsored Bioinformatics Resource Center dedicated to providing bioinformatics support for influenza virus research. IRD facilitates the research and development of vaccines, diagnostics, an...

  5. Research and Energy Efficiency: Selected Success Stories

    Science.gov (United States)

    Garland, P. W.; Garland, R. W.

    1997-06-26

    Energy use and energy technology play critical roles in the U.S. economy and modern society. The Department of Energy (DOE) conducts civilian energy research and development (R&D) programs for the purpose of identifying promising technologies that promote energy security, energy efficiency, and renewable energy use. DOE-sponsored research ranges from basic investigation of phenomena all the way through development of applied technology in partnership with industry. DOE`s research programs are conducted in support of national strategic energy objectives, however austere financial times have dictated that R&D programs be measured in terms of cost vs. benefit. In some cases it is difficult to measure the return on investment for the basic "curiosity-driven" research, however many applied technology development programs have resulted in measurable commercial successes. The DOE has published summaries of their most successful applied technology energy R&D programs. In this paper, we will discuss five examples from the Building Technologies area of the DOE Energy Efficiency program. Each story will describe the technology, discuss the level of federal funding, and discuss the returns in terms of energy savings, cost savings, or national economic impacts.

  6. Center for Coastline Security Technology, Year-2

    Science.gov (United States)

    2007-05-01

    cinematic film industry . For the port security application there are several research issues being addressed under this program, specifically...being the cinematic film industry . For the port security application there are several research issues being addressed under this program...the primary customers being the film industry . For the port security application there are several research issues being addressed under this program

  7. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2014-01-01

    Full Text Available After two recent security attacks against implantable medical devices (IMDs have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient’s life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician’s treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  8. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    Science.gov (United States)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  9. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  10. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  11. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  12. How do staff members at science and technology centres consider the impact of sponsors on the scientific content of exhibitions?

    DEFF Research Database (Denmark)

    Davidsson, Eva; Sørensen, Helene

    2009-01-01

    or historical museums. But in what ways may sponsors impact exhibition content and design at science and technology centres? This study seeks to explore how staff members consider the impact of sponsors and donors on exhibit content and design. The data collection involves a survey, interviews and a focus group...... interview with staff members, who work with planning and constructing new exhibitions at their science and technology centre. The results suggest that sponsors may interfere in exhibition construction both directly and indirectly. This means that sponsors could put explicit demands when it comes...... to the choice of scientific content and design and thereby interfere directly. Indirect impact, on the other hand, refers to implicit demands of sponsors where staff members take into account for what they believe are views of the sponsors through self-censorship....

  13. Impact of Security Awareness Programs on End-User Security Behavior: A Quantitative Study of Federal Workers

    Science.gov (United States)

    Smith, Gwendolynn T.

    2012-01-01

    The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…

  14. Cyber Security : Home User's Perspective

    OpenAIRE

    Ikonen, Mikko

    2014-01-01

    Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...

  15. "This program contains advertising": How the timing of sponsorship disclosure influences critical processing of sponsored content

    NARCIS (Netherlands)

    Boerman, S.; van Reijmersdal, E.; Neijens, P.

    2013-01-01

    This study investigates whether the timing of sponsorship disclosure influences the processing of sponsored content. A model is proposed in which sponsorship disclosure activates persuasion knowledge, which leads to critical processing of the sponsored content, and ultimately negatively affects the

  16. Microbial Monitoring from the Frontlines to Space: Department of Defense Small Business Innovation Research Technology Aboard the International Space Station

    Science.gov (United States)

    Oubre, Cherie M.; Khodadad, Christina L.; Castro, Victoria A.; Ott, C. Mark; Flint, Stephanie; Pollack, Lawrence P.; Roman, Monserrate C.

    2017-01-01

    The RAZOR (trademark) EX, a quantitative Polymerase Chain Reaction (qPCR) instrument, is a portable, ruggedized unit that was designed for the Department of Defense (DoD) with its reagent chemistries traceable to a Small Business Innovation Research (SBIR) contract beginning in 2002. The PCR instrument's primary function post 9/11 was to enable frontline soldiers and first responders to detect biological threat agents and bioterrorism activities in remote locations to include field environments. With its success for DoD, the instrument has also been employed by other governmental agencies including Department of Homeland Security (DHS). The RAZOR (Trademark) EX underwent stringent testing by the vendor, as well as through the DoD, and was certified in 2005. In addition, the RAZOR (trademark) EX passed DHS security sponsored Stakeholder Panel on Agent Detection Assays (SPADA) rigorous evaluation in 2011. The identification and quantitation of microbial pathogens is necessary both on the ground as well as during spaceflight to maintain the health of astronauts and to prevent biofouling of equipment. Currently, culture-based monitoring technology has been adequate for short-term spaceflight missions but may not be robust enough to meet the requirements for long-duration missions. During a NASA-sponsored workshop in 2011, it was determined that the more traditional culture-based method should be replaced or supplemented with more robust technologies. NASA scientists began investigating innovative molecular technologies for future space exploration and as a result, PCR was recommended. Shortly after, NASA sponsored market research in 2012 to identify and review current, commercial, cutting edge PCR technologies for potential applicability to spaceflight operations. Scientists identified and extensively evaluated three candidate technologies with the potential to function in microgravity. After a thorough voice-of-the-customer trade study and extensive functional and

  17. E-survey with researchers, members of ethics committees and sponsors of clinical research in Brazil: an emerging methodology for scientific research Inquérito pela Internet com pesquisadores clínicos, membros de comitês de ética e patrocinadores de pesquisa clínica no Brasil: uma metodologia emergente para pesquisa científica

    Directory of Open Access Journals (Sweden)

    Sonia Mansoldo Dainesi

    2012-12-01

    Full Text Available INTRODUCTION: The growth of Internet users enables epidemiological studies to be conducted electronically, representing a promising methodology for data collection. METHODS: Members of Ethics Committees, Clinical Researchers and Sponsors were interviewed using questionnaires sent over the Internet. Along with the questionnaire, participants received a message explaining the survey and also the informed consent. Returning the questionnaire meant the consent of the participant was given. No incentive was offered; two reminders were sent. RESULTS: The response rate was 21% (124/599, 20% (58/290 and 45% (24/53 respectively for Ethics Committees, Researchers and Sponsors. The percentage of return before the two reminders was about 62%. Reasons for non-response: participant not found, refusal to participate, lack of experience in clinical research or in the therapeutic field. Characteristics of participants: 45% of Ethics Committee participants, 64% of Researchers and 63% of Sponsors were male; mean age (range, respectively: 47 (28-74, 53 (24-72 and 40 (29-65 years. Among Researchers and Sponsors, all respondents had at least a university degree and, in the Ethics Committees group, only two (1.7% did not have one. Most of the questionnaires in all groups came from the Southeast Region of Brazil, probably reflecting the highest number of clinical trials and research professionals in this region. CONCLUSION: Despite the potential limitations of a survey done through the Internet, this study led to a response rate similar to what has been observed with other models, efficiency in obtaining responses (speed and quality, convenience for respondents and low cost.INTRODUÇÃO: O crescimento de usuários da Internet possibilita que estudos epidemiológicos sejam conduzidos eletronicamente, representando uma promissora metodologia para coleta de dados. MÉTODOS: Membros de Comitês de Ética, pesquisadores clínicos e patrocinadores foram entrevistados com

  18. Research on Issues concerning Social Security for Migrant Workers in Harmonious Society

    OpenAIRE

    Zhang, Hua

    2013-01-01

    This article analyzes the status quo of social security for migrant workers in China, and points out that there are deep system and concept reasons for the lack of labor rights and interests security, social security, equality and the right to development, political participation channels for the current migrant workers. This article then expounds the adverse effects of lack of social security for migrant workers on building a harmonious society: the lack of social security for migrant worker...

  19. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  20. 75 FR 5637 - Bureau of Educational and Cultural Affairs; Secondary School Student Sponsor On-Site Reviews

    Science.gov (United States)

    2010-02-03

    ... will include, but are not limited to, decision-making processes (including the numbers of students... the changing demographics of potential American host families, however, are having an impact on the... attention; cap program growth; more closely monitor sponsor performance; evaluate sponsor compliance; and...

  1. 76 FR 2807 - New Animal Drugs; Change of Sponsor

    Science.gov (United States)

    2011-01-18

    .... FDA-2010-N-0002] New Animal Drugs; Change of Sponsor AGENCY: Food and Drug Administration, HHS. ACTION: Final rule. SUMMARY: The Food and Drug Administration (FDA) is amending the animal drug regulations to...., Cambridge, MA 02141 has informed FDA that it has transferred ownership of, and all rights and interest in...

  2. Security Controls for NPP I and C Systems

    International Nuclear Information System (INIS)

    Kim, Y. M.; Jeong, C. H.; Kim, T. H.

    2014-01-01

    In Korea, regulatory body have required cyber security plan for nuclear I and C system. Also, all I and C systems and equipment must be classified according to cyber security level and technical, operational and managerial security controls must be provided based on each level. It is necessary to determine the best set of security controls for NPP I and C system. In our research, selection, implementation and verification process of security controls which can be used for I and C systems has developed. For establishing the cyber security of the nuclear I and C system, special cyber security system which consider the difference between general IT system and nuclear I and C system is needed. This research, we developed security improvement methodology for NPP I and C system through establishing security control, applying and verifying activity. Also, the cyber security activities which are needed during development are defined. It is expected that the methodology which has been developed by this research can be used for establish, implement, evaluate the security controls for protecting nuclear I and C system from cyber-attacks

  3. Security Controls for NPP I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Y. M.; Jeong, C. H. [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, T. H. [Formal Works Inc., Seoul (Korea, Republic of)

    2014-05-15

    In Korea, regulatory body have required cyber security plan for nuclear I and C system. Also, all I and C systems and equipment must be classified according to cyber security level and technical, operational and managerial security controls must be provided based on each level. It is necessary to determine the best set of security controls for NPP I and C system. In our research, selection, implementation and verification process of security controls which can be used for I and C systems has developed. For establishing the cyber security of the nuclear I and C system, special cyber security system which consider the difference between general IT system and nuclear I and C system is needed. This research, we developed security improvement methodology for NPP I and C system through establishing security control, applying and verifying activity. Also, the cyber security activities which are needed during development are defined. It is expected that the methodology which has been developed by this research can be used for establish, implement, evaluate the security controls for protecting nuclear I and C system from cyber-attacks.

  4. Brazilian Hybrid Security in South America

    Directory of Open Access Journals (Sweden)

    Rafael Duarte Villa

    2017-10-01

    Full Text Available Abstract Existing research on security governance in South America functions on dichotomous lines. Analysis of Brazil’s security practices is a case in point. On the one hand, scholars point out the balance of power and hegemonic institutions as the main discourse in the security practices between Brazil and its South American neighbors. On the other hand, some other emphasize the importance of democracy, cooperation on defense and security, and peaceful conflict resolution between states in the region as indicators for the emergence of a security community between Brazil and its neighbors in the South American region. The way in which multiple orders coexist is not given adequate attention in empirical research. This article seeks to overcome this dichotomy. By foregrounding Brazil’s regional security practices, particularly during the Lula and Rousseff administration, I show the hybrid and sometimes ambivalent security governance system in Brazil, where mechanisms of balance of power and security community overlap in important ways.

  5. Effects of sponsorship disclosure timing on the processing of sponsored content: a study on the effectiveness of European disclosure regulations

    NARCIS (Netherlands)

    Boerman, S.C.; van Reijmersdal, E.A.; Neijens, P.C.

    2014-01-01

    This study investigates whether the timing of sponsorship disclosure affects viewers’ processing of sponsored content, and whether a disclosure influences the persuasive effect of the sponsored content. A model is proposed in which sponsorship disclosure enhances the recognition of sponsored

  6. Enabling International Safeguards Research and Development in the United States

    International Nuclear Information System (INIS)

    Dwight, John E.; Schanfein, Mark J.; Bjornard, Trond A.

    2009-01-01

    Idaho National Laboratory (INL) is the lead laboratory in nuclear energy research and development within the U.S. Department of Energy national laboratory complex. INL is tasked with the advancement of nuclear energy research and development, and leadership in the renaissance of nuclear power globally. INL scientists have been central to the assessment of needs and the integration of technical programs aimed at the world-wide growth of nuclear power. One of the grand challenges of the nuclear energy resurgence is nuclear nonproliferation. Nonproliferation technology development is key to meeting this challenge. The needed advances in nonproliferation technologies are being made more difficult by the growing gap between increasing demands for nuclear materials to support technology development, and reduced availability of these materials. The gap is caused by the reduction, consolidation and more stringent lockdown of nuclear materials, made necessary by heightened and evolving security concerns, in the face of increased demand for materials to support technology development. Ironically, the increased demand for materials for technology development is made necessary by these same security concerns. The situation will continue to worsen if safeguards and security budgets remain limited for the International Atomic Energy Agency (IAEA) and many member states, while growth in global nuclear energy becomes a reality. Effective U.S. leadership in the closing of this gap is vital to homeland security and global stability. INL has taken positive steps, described in this paper, to close this gap by reestablishing a viable base for the development, testing and demonstration of safeguards and security technologies. Key attributes of this technology development base are (1) the availability of a wide variety of special nuclear materials in forms that allow for enhanced accessibility; (2) ease of access by U.S. government, national laboratory, industry and academic institution

  7. Security careers skills, compensation, and career paths

    CERN Document Server

    Walker, Stephen W

    2014-01-01

    The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, ethics, environmental, health and safety occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushée Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a th

  8. Proceedings of the 22nd Annual DoD/DOE Seismic Research Symposium: Planning for Verification of and Compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT)

    Energy Technology Data Exchange (ETDEWEB)

    Nichols, James W., LTC [Editor

    2000-09-15

    These proceedings contain papers prepared for the 22nd Annual DoD/DOE Seismic Research Symposium: Planning for Verification of and Compliance with the Comprehensive Nuclear-Test-Ban Treaty (CTBT), held 13-15 September 2000 in New Orleans, Louisiana. These papers represent the combined research related to ground-based nuclear explosion monitoring funded by the National Nuclear Security Administration (NNSA), Defense Threat Reduction Agency (DTRA), Air Force Technical Applications Center (AFTAC), Department of Defense (DoD), US Army Space and Missile Defense Command, Defense Special Weapons Agency (DSWA), and other invited sponsors. The scientific objectives of the research are to improve the United States capability to detect, locate, and identify nuclear explosions. The purpose of the meeting is to provide the sponsoring agencies, as well as potential users, an opportunity to review research accomplished during the preceding year and to discuss areas of investigation for the coming year. For the researchers, it provides a forum for the exchange of scientific information toward achieving program goals, and an opportunity to discuss results and future plans. Paper topics include: seismic regionalization and calibration; detection and location of sources; wave propagation from source to receiver; the nature of seismic sources, including mining practices; hydroacoustic, infrasound, and radionuclide methods; on-site inspection; and data processing.

  9. A Commentary on Literacy Narratives as Sponsors of Literacy

    Science.gov (United States)

    Brandt, Deborah

    2015-01-01

    This brief commentary first clarifies Brandt's concept of sponsors of literacy in light of the way the concept has been taken up in writing studies. Then it treats Brandt's methods for handling accounts of literacy learning in comparison with other ways of analyzing biographical material. Finally it takes up Lawrence's argument about literacy…

  10. School-Sponsored Health Insurance: Planning for a New Reality

    Science.gov (United States)

    Liang, Bryan A.

    2010-01-01

    Health care reform efforts in both the Clinton and Obama administrations have attempted to address college and university health. Yet, although the world of health care delivery has almost universally evolved to managed care, school health programs have not. In general, school-sponsored health plans do little to improve access and have adopted…

  11. E-learning stakeholders information security vulnerability model

    OpenAIRE

    Mohd Alwi, Najwa Hayaati

    2012-01-01

    The motivation to conduct this research has come from awareness that the Internet exposes the e-learning environment to information security threats and vulnerabilities. Information security management as practised as a top down approach in many organisations tend to detach of people’s responsibility in ensuring the security of e-learning. Literature has pointed out that people’s behaviour required to be addressed to control the information security threats. This research proposes an ISM huma...

  12. Does industry-sponsored education foster overdiagnosis and overtreatment of depression, osteoporosis and over-active bladder syndrome? An Australian cohort study.

    Science.gov (United States)

    Mintzes, Barbara; Swandari, Swestika; Fabbri, Alice; Grundy, Quinn; Moynihan, Ray; Bero, Lisa

    2018-02-13

    To investigate patterns of industry-sponsored educational events that focus on specific health conditions for which there are concerns about overdiagnosis and overtreatment. This retrospective cohort study examines publicly reported industry-sponsored events in Australia from October 2011 to September 2015 for three conditions potentially subject to overdiagnosis and overtreatment: depression, osteoporosis and overactive bladder. We used a database of transparency reports to identify events with a focus on depression, osteoporosis and overactive bladder and compared these with other sponsored events. We hypothesised that companies marketing treatments for each condition would sponsor related events and that target audiences would mainly work in primary care, reflecting a broad patient population. Event and attendee characteristics, sponsoring companies, related marketed treatments, cost-effectiveness ratings and dispensing rates. Over the study period, we identified 1567 events focusing on depression, 1375 on osteoporosis and 190 on overactive bladder (total n=3132, with 96 660 attendees). These events were attended by primary care doctors more often than sponsored events without a focus on these three conditions: relative risk (RR)=3.06 (95% CI 2.81 to 3.32) for depression, RR=1.48 (95% CI 1.41 to 1.55) for osteoporosis and RR=2.59 (95% CI 2.09 to 3.21) for overactive bladder. Servier, which markets agomelatine and AstraZeneca (quetiapine) sponsored 51.2% and 23.0% of depression events, respectively. Amgen and GlaxoSmithKline, which co-market denosumab, sponsored 49.5% of osteoporosis events and Astellas and Commonwealth Serum Laboratories (CSL) (mirabegron and solifenacin) sponsored 80.5% of overactive bladder events. This 4-year overview of industry-sponsored events on three overdiagnosed and overtreated conditions found that primary care clinicians were often targeted, dinner was often provided and that a few companies sponsored most events. In most cases

  13. Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

    OpenAIRE

    Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje

    2015-01-01

    - This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, and taking into account security issues identified in recent research on Cloud security. The document is intended to be used by potential cloud customers that need to assess the security of a c...

  14. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  15. University Research and Development Activities: The Federal Income Tax Consequences of Research Contracts, Research Subsidiaries and Joint Ventures.

    Science.gov (United States)

    Kertz, Consuelo Lauda; Hasson, James K., Jr.

    1986-01-01

    Features of the federal income tax law applying to income received from commercially funded university-based scientific research and development activities are discussed, including: industry-sponsored research contracts, separately incorporated entities, partnerships and joint ventures, subsidiaries and unrelated income consequences of…

  16. Detailed Information Security in Cloud Computing

    OpenAIRE

    Pavel Valerievich Ivonin

    2013-01-01

    The object of research in this article is technology of public clouds, structure and security system of clouds. Problems of information security in clouds are considered, elements of security system in public clouds are described.

  17. Information Security for Compliance with Select Agent Regulations

    Science.gov (United States)

    Lewis, Nick; Campbell, Mark J.

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864

  18. Information security for compliance with select agent regulations.

    Science.gov (United States)

    Lewis, Nick; Campbell, Mark J; Baskin, Carole R

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.

  19. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  20. Computer Science Research Institute 2004 annual report of activities.

    Energy Technology Data Exchange (ETDEWEB)

    DeLap, Barbara J.; Womble, David Eugene; Ceballos, Deanna Rose

    2006-03-01

    This report summarizes the activities of the Computer Science Research Institute (CSRI) at Sandia National Laboratories during the period January 1, 2004 to December 31, 2004. During this period the CSRI hosted 166 visitors representing 81 universities, companies and laboratories. Of these 65 were summer students or faculty. The CSRI partially sponsored 2 workshops and also organized and was the primary host for 4 workshops. These 4 CSRI sponsored workshops had 140 participants--74 from universities, companies and laboratories, and 66 from Sandia. Finally, the CSRI sponsored 14 long-term collaborative research projects and 5 Sabbaticals.

  1. Computer Science Research Institute 2003 annual report of activities.

    Energy Technology Data Exchange (ETDEWEB)

    DeLap, Barbara J.; Womble, David Eugene; Ceballos, Deanna Rose

    2006-03-01

    This report summarizes the activities of the Computer Science Research Institute (CSRI) at Sandia National Laboratories during the period January 1, 2003 to December 31, 2003. During this period the CSRI hosted 164 visitors representing 78 universities, companies and laboratories. Of these 78 were summer students or faculty members. The CSRI partially sponsored 5 workshops and also organized and was the primary host for 3 workshops. These 3 CSRI sponsored workshops had 178 participants--137 from universities, companies and laboratories, and 41 from Sandia. Finally, the CSRI sponsored 18 long-term collaborative research projects and 5 Sabbaticals.

  2. Computer Science Research Institute 2005 annual report of activities.

    Energy Technology Data Exchange (ETDEWEB)

    Watts, Bernadette M.; Collis, Samuel Scott; Ceballos, Deanna Rose; Womble, David Eugene

    2008-04-01

    This report summarizes the activities of the Computer Science Research Institute (CSRI) at Sandia National Laboratories during the period January 1, 2005 to December 31, 2005. During this period, the CSRI hosted 182 visitors representing 83 universities, companies and laboratories. Of these, 60 were summer students or faculty. The CSRI partially sponsored 2 workshops and also organized and was the primary host for 3 workshops. These 3 CSRI sponsored workshops had 105 participants, 78 from universities, companies and laboratories, and 27 from Sandia. Finally, the CSRI sponsored 12 long-term collaborative research projects and 3 Sabbaticals.

  3. Overview of the projects sponsored within th EU-R and D framework programme

    International Nuclear Information System (INIS)

    Zurita, A.; Goethem, G. van; Bermejo, J.M.

    1999-01-01

    Assuming that preventive measures to avoid reactor pressure vessel (RPV) failure under core degradation scenarios have failed, the stabilisation of the core melts after its release from the RPV is a key issue. Adequate cooling of the ex-vessel corium and the control of its interactions with the coolant and structures are the main challenges to mitigate and stabilise the situation preserving the containment integrity. In this regard, the on-going Fourth Euratom Framework Programme (4 th EFP) contributes with experimental and theoretical research activities aimed at responding to the main challenges mentioned, by satisfying three objectives: - To improve the understanding of the basic physics related to ex-vessel corium behaviour from the phenomenological and technological viewpoints, as well as to provide a methodology for investigating it and setting up joint multi-partner projects to be co-sponsored and co-ordinated by the EC; - to quantify and reduce the uncertainties associated with the risk issues by conducting experimental and numerical investigations and eventually to achieve a European consensus on the phenomenology and on accident mitigation strategies; - to provide a technological response to the risk issues by developing engineered safety systems (e.g. core-catchers) and severe accident management strategies (e.g. guidelines), and to discuss such a technological response with the end users of these technologies, i.e. designers and licensers. To fulfil these objectives, the 4 th EFP co-sponsors a total of five projects within the cluster 'Ex-Vessel Corium Behaviour and Coolability' of the Nuclear Fission Safety Programme. The research undertaken addresses the main different aspects such as the determination of the composition and thermodynamic data of the melt; experiments on spreading behaviour on various types of surfaces, as well as on corium coolability by flooding or water injection; investigation of corium stratification, crust and heat transfer

  4. Coordinated Analysis 101: A Joint Training Session Sponsored by LPI and ARES/JSC

    Science.gov (United States)

    Draper, D. S.; Treiman, A. H.

    2017-01-01

    The Lunar and Planetary Institute (LPI) and the Astromaterials Research and Exploration Science (ARES) Division, part of the Exploration Integration and Science Directorate at NASA Johnson Space Center (JSC), co-sponsored a training session in November 2016 for four early-career scientists in the techniques of coordinated analysis. Coordinated analysis refers to the approach of systematically performing high-resolution and -precision analytical studies on astromaterials, particularly the very small particles typical of recent and near-future sample return missions such as Stardust, Hayabusa, Hayabusa2, and OSIRIS-REx. A series of successive analytical steps is chosen to be performed on the same particle, as opposed to separate subsections of a sample, in such a way that the initial steps do not compromise the results from later steps in the sequence. The data from the entire series can then be integrated for these individual specimens, revealing important in-sights obtainable no other way. ARES/JSC scientists have played a leading role in the development and application of this approach for many years. Because the coming years will bring new sample collections from these and other planned NASA and international exploration missions, it is timely to begin disseminating specialized techniques for the study of small and precious astromaterial samples. As part of the Cooperative Agreement between NASA and the LPI, this training workshop was intended as the first in a series of similar training exercises that the two organizations will jointly sponsor in the coming years. These workshops will span the range of analytical capabilities and sample types available at ARES/JSC in the Astromaterials Research and Astro-materials Acquisition and Curation Offices. Here we summarize the activities and participants in this initial training.

  5. Medical malpractice reform and employer-sponsored health insurance premiums.

    Science.gov (United States)

    Morrisey, Michael A; Kilgore, Meredith L; Nelson, Leonard Jack

    2008-12-01

    Tort reform may affect health insurance premiums both by reducing medical malpractice premiums and by reducing the extent of defensive medicine. The objective of this study is to estimate the effects of noneconomic damage caps on the premiums for employer-sponsored health insurance. Employer premium data and plan/establishment characteristics were obtained from the 1999 through 2004 Kaiser/HRET Employer Health Insurance Surveys. Damage caps were obtained and dated based on state annotated codes, statutes, and judicial decisions. Fixed effects regression models were run to estimate the effects of the size of inflation-adjusted damage caps on the weighted average single premiums. State tort reform laws were identified using Westlaw, LEXIS, and statutory compilations. Legislative repeal and amendment of statutes and court decisions resulting in the overturning or repealing state statutes were also identified using LEXIS. Using a variety of empirical specifications, there was no statistically significant evidence that noneconomic damage caps exerted any meaningful influence on the cost of employer-sponsored health insurance. The findings suggest that tort reforms have not translated into insurance savings.

  6. On Protocol Security in the Cryptographic Model

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    you as possible. This is the general problem of secure multiparty computation. The usual way of formalizing the problem is to say that a number of parties who do not trust each other wish to compute some function of their local inputs, while keeping their inputs as secret as possible and guaranteeing...... the channels by which they communicate. A general solution to the secure multiparty computation problem is a compiler which given any feasible function describes an efficient protocol which allows the parties to compute the function securely on their local inputs over an open network. Over the past twenty...... years the secure multiparty computation problem has been the subject of a large body of research, both research into the models of multiparty computation and research aimed at realizing general secure multiparty computation. The main approach to realizing secure multiparty computation has been based...

  7. Proposal to establish a Sponsoring Consortium for Open Access Publishing in Particle Physics

    CERN Document Server

    CERN. Geneva

    2007-01-01

    In the present proposal, the publishers' subscription income from multiple institutions is replaced by an "author-side" funding. Journals are paid through contracts between publishers and a single financial partner, the "Sponsoring Consortium for Open Access Publishing in Particle Physics" (SCOAP3). SCOAP3 is envisioned as a global network of funding agencies, research laboratories, and libraries that will contribute the necessary funding; each SCOAP3 partner will recover its contribution from the cancellation of journal subscriptions. This model avoids the obvious disadvantage of authors being directly charged for the OA publication of their articles, which is perceived as an even higher barrier than subscription charges, in particular for theoretical physicists from small institutions who account for the vast majority of HEP papers. The financing and governance of SCOAP3 will follow as much as possible the example of the memoranda of understanding governing large research collaborations. Its partners will c...

  8. China’s Foreign Aid and Government-Sponsored Investment Activities: Scale, Content, Destinations, and Implications

    Science.gov (United States)

    2013-01-01

    this document Browse Reports & Bookstore Make a charitable contribution Limited Electronic Distribution Rights This document and trademark(s...sponsors. Support RAND—make a tax-deductible charitable contribution at www.rand.org/giving/contribute.html R® is a registered trademark © Copyright 2013...cooperation organizations such as the xvi China’s Foreign Aid and Government-Sponsored Investment Activities Shanghai Cooperation Organisation have

  9. Computational Intelligence, Cyber Security and Computational Models

    CERN Document Server

    Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel

    2014-01-01

    This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

  10. Political and Military Challenges of the Republic of Moldova in the Context of Security in the Black Sea Basin

    Science.gov (United States)

    2014-12-01

    ONSORING /MONIT ORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING NIA AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES TI1e views expressed...Priorities and Actions, European Commission - SPEECH/14/ 505 - 25/06/2014, College of Europe and European Commission: First Joint High-Level Roundtable...Security Strategy: Key Priorities and Actions. European Commission - SPEECH/14/ 505 - 25/06/2014. College of Europe and European Commission: First Joint

  11. Control system security in nuclear power plant

    International Nuclear Information System (INIS)

    Li Jianghai; Huang Xiaojin

    2012-01-01

    The digitalization and networking of control systems in nuclear power plants has brought significant improvements in system control, operation and maintenance. However, the highly digitalized control system also introduces additional security vulnerabilities. Moreover, the replacement of conventional proprietary systems with common protocols, software and devices makes these vulnerabilities easy to be exploited. Through the interaction between control systems and the physical world, security issues in control systems impose high risks on health, safety and environment. These security issues may even cause damages of critical infrastructures and threaten national security. The importance of control system security by reviewing several control system security incidents that happened in nuclear power plants was showed in recent years. Several key difficulties in addressing these security issues were described. Finally, existing researches on control system security and propose several promising research directions were reviewed. (authors)

  12. Security basics for computer architects

    CERN Document Server

    Lee, Ruby B

    2013-01-01

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support fo

  13. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  14. Information fusion for cyber-security analytics

    CERN Document Server

    Karabatis, George; Aleroud, Ahmed

    2017-01-01

    This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers. .

  15. 77 FR 43345 - Agency Information Collection Activities: Sponsor's Notice of Change of Address, Form I-865...

    Science.gov (United States)

    2012-07-24

    ...-0076] Agency Information Collection Activities: Sponsor's Notice of Change of Address, Form I-865...: Sponsor's Notice of Change of Address. (3) Agency form number, if any, and the applicable component of the.... During this 60-day period, USCIS will be evaluating whether to revise the Form I-865. Should USCIS decide...

  16. 14 CFR 1214.306 - Payload specialist relationship with sponsoring institutions.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Payload specialist relationship with... ADMINISTRATION SPACE FLIGHT Payload Specialists for Space Transportation System (STS) Missions § 1214.306 Payload specialist relationship with sponsoring institutions. Specialists who are not U.S. Government employees must...

  17. State Regulatory Authority (SRA) Coordination of Safety, Security, and Safeguards of Nuclear Facilities: A Framework for Analysis

    International Nuclear Information System (INIS)

    Mladineo, S.; Frazar, S.; Kurzrok, A.; Martikka, E.; Hack, T.; Wiander, T.

    2013-01-01

    In November 2012 the International Atomic Energy Agency (IAEA) sponsored a Technical Meeting on the Interfaces and Synergies in Safety, Security, and Safeguards for the Development of a Nuclear Power Program. The goal of the meeting was to explore whether and how safeguards, safety, and security systems could be coordinated or integrated to support more effective and efficient nonproliferation infrastructures. While no clear consensus emerged, participants identified practical challenges to and opportunities for integrating the three disciplines’ regulations and implementation activities. Simultaneously, participants also recognized that independent implementation of safeguards, safety, and security systems may be more effective or efficient at times. This paper will explore the development of a framework for conducting an assessment of safety-security-safeguards integration within a State. The goal is to examine State regulatory structures to identify conflicts and gaps that hinder management of the three disciplines at nuclear facilities. Such an analysis could be performed by a State Regulatory Authority (SRA) to provide a self-assessment or as part of technical cooperation either with a newcomer State, or to a State with a fully developed SRA.

  18. EVALUATING EFFECTIVENESS OF MOBILE BROWSER SECURITY WARNINGS

    Directory of Open Access Journals (Sweden)

    Ronak Shah

    2016-09-01

    Full Text Available This work precisely evaluates whether browser security warnings are as ineffective as proposed by popular sentiments and past writings. This research used different kinds of Android mobile browsers as well as desktop browsers to evaluate security warnings. Security experts and developers should give emphasis on making a user aware of security warnings and should not neglect aim of communicating this to users. Security experts and system architects should emphasis the goal of communicating security information to end users. In most of the browsers, security warnings are not emphasized, and browsers simply do not show warnings, or there are a number of ways to hide those warnings of malicious sites. This work precisely finds that how inconsistent browsers really are in prompting security warnings. In particular, majority of the modern mobile web browsers are vulnerable to these security threats. We find inconsistency in SSL warnings among web browsers. Based on this work, we make recommendations for warning designers and researchers.

  19. Virtualization of open-source secure web services to support data exchange in a pediatric critical care research network.

    Science.gov (United States)

    Frey, Lewis J; Sward, Katherine A; Newth, Christopher J L; Khemani, Robinder G; Cryer, Martin E; Thelen, Julie L; Enriquez, Rene; Shaoyu, Su; Pollack, Murray M; Harrison, Rick E; Meert, Kathleen L; Berg, Robert A; Wessel, David L; Shanley, Thomas P; Dalton, Heidi; Carcillo, Joseph; Jenkins, Tammara L; Dean, J Michael

    2015-11-01

    To examine the feasibility of deploying a virtual web service for sharing data within a research network, and to evaluate the impact on data consistency and quality. Virtual machines (VMs) encapsulated an open-source, semantically and syntactically interoperable secure web service infrastructure along with a shadow database. The VMs were deployed to 8 Collaborative Pediatric Critical Care Research Network Clinical Centers. Virtual web services could be deployed in hours. The interoperability of the web services reduced format misalignment from 56% to 1% and demonstrated that 99% of the data consistently transferred using the data dictionary and 1% needed human curation. Use of virtualized open-source secure web service technology could enable direct electronic abstraction of data from hospital databases for research purposes. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  20. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  1. Sponsoring surgeons; an investigation on the influence of the da Vinci robot.

    Science.gov (United States)

    Criss, Cory N; Gadepalli, Samir K

    2017-08-26

    The integrity of the medical literature about robotic surgery remains unclear despite wide-spread adoption. We sought to determine if payment from Intuitive Surgical Incorporated (ISI) affected quality of the research produced by surgeons. Publicly available financial data from the CMS website regarding the top-20 earners from ISI for 2015 was gathered. Studies conducted by these surgeons were identified using PubMed. Inclusion criteria consisted of publications about the da Vinci ® robot on patient outcomes. The primary outcome of our study was if the study conclusion was positive/equivocal/negative towards the robot. Secondary outcomes included authorship, sponsorship, study controls, and disclosure. The top earners received $3,296,844 in 2015, with a median of $141,959. Sub-specialties included general surgery (55%), colorectal (20%), thoracic (15%), and obstetrics/gynecology (10%). Of the 37 studies, there was 1 RCT, with observational studies comprising the rest. The majority of the studies (n = 16, 43%) had no control population, with 11 (30%) comparing to same institution/surgeon, Though ISI sponsored only 6 (16%) studies, all with positive conclusions, 27 (73%) studies had positive conclusions for robot use, 9 (24%) equivocal, and only 1 (3%) negative. Overall, 13 earners had lead authorship and 11 senior. This initial pilot study highlights a potential bias as current literature published by benefactors demonstrates low quality and highly positive conclusions towards approval of the robot. This substantiates the need for a large, systematic review of the potential influence of sponsoring surgeons on medical literature. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. Cyber security threats in the power sector: Need for a domain specific regulatory framework in India

    International Nuclear Information System (INIS)

    Ananda Kumar, V.; Pandey, Krishan K.; Punia, Devendra Kumar

    2014-01-01

    India is poised to spend over USD 5.8 billion as part of the National Smart Grid Mission aimed to alleviate India's ailing power sector as part of its 12th Five year plan (2012–2017). The federal government sponsored Restructured Accelerated Power Development and Reforms Program (R-APDRP) is also focused on building ICT capability in the state electricity boards. Presently however, there is no power sector specific cyber security mandates or policies in India. The Stuxnet, Shamoon and Anonymous incidents have shown that cyber attacks can cause significant damage and pose a risk to National Critical Infrastructure. A lack of security planning as part of designing the Smart grids can potentially leave gaping holes in the country's power sector stability. The paper highlights key cyber security threats across the entire power sector value chain—from generation, to transmission and distribution. It is aimed at building the case for power sector specific cyber security regulations based on the experience of regulators in other critical infrastructure sectors like Banking and Telecom in India and power sector regulations internationally. - Highlights: • Cyber security in power sector is key to protecting national critical infrastructure. • Poor cyber security planning would impact the power sector in India. • A laissez-faire approach to cyber security in power sector may not yield results. • There is a need for power sector specific cyber security regulations

  3. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  4. Research on a Valuation Standard and the Actual Condition About Security Management in PACS

    International Nuclear Information System (INIS)

    Jeong, Jae Ho; Son, Gi Gyeong; Kang, Hee Doo; Dong, Kyung Rae; Kweon, Dae Cheol; Kim, Hyun Soo

    2008-01-01

    This study is to prepare an evaluation standard about personal information protection and security management of a medical institution and to build up a grade standard of evaluation in PACS environment. We built up evaluation index based on 10 detailed items in four big categories (political security, technical security, data management security and physical security) by referring to ISO17799 (BS 7799), HIPPA (Health Insurance and Portability and Accountability Act of 1996) and domestic medical law. We have investigated at the thirty places where medical facility with the extracted security criteria and security evaluation index. Average score of physical security list, one of the big categories, was 18.5/20 (93%) at all medical institutions. Political security score was 18.5/30 (62%), data management security score was 12/20 (60%) and technical security score was 17.5/30 (58%). Therefore, security evaluation score was average 67 in 30 general hospitals, which was 4th level. The results showed that it is necessary to establish evaluation and management standard about personal information protection and security consciousness which are weak in PACS environment.

  5. OPSAID improvements and capabilities report.

    Energy Technology Data Exchange (ETDEWEB)

    Halbgewachs, Ronald D.; Chavez, Adrian R.

    2011-08-01

    Process Control System (PCS) and Industrial Control System (ICS) security is critical to our national security. But there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. Sandia National Laboratories has performed the research and development of the OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy Office of Electricity Delivery and Energy Reliability (DOE/OE), to address this issue. OPSAID is an open-source architecture for PCS/ICS security that provides a design basis for vendors to build add-on security devices for legacy systems, while providing a path forward for the development of inherently-secure PCS elements in the future. Using standardized hardware, a proof-of-concept prototype system was also developed. This report describes the improvements and capabilities that have been added to OPSAID since an initial report was released. Testing and validation of this architecture has been conducted in another project, Lemnos Interoperable Security Project, sponsored by DOE/OE and managed by the National Energy Technology Laboratory (NETL).

  6. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  7. Report on {open_quotes}inspection of human subject research in intelligence and intelligence-related projects{close_quotes}

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-01-16

    Executive Order 12333, {open_quotes}United States Intelligence Activities,{close_quotes} (1) designates the Department`s intelligence element as a member of the Intelligence Community, and (2) states that no agency within the Intelligence community shall sponsor, contract for or conduct research on human subjects except in accordance with guidelines issued by the Department of Health and Human Services. The Federal policy for the Protection of Human Subjects, which was based on Department of Health and Human Services regulations, was promulgated in Title 10 Code of Federal Regulations Part 745 by the Department of Energy. The purpose of this inspection was to review the internal control procedures used by the Office of Nonproliferation and National Security to manage selected intelligence and intelligence-related projects that involve human subject research.

  8. Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants

    Science.gov (United States)

    2017-02-12

    any commercial carriers for shipment of the Goods . WESCO will use its reasonable efforts to comply with Buyer’s requests as to method and route of...and includes a small electrical substation control environment. The lab has already been used to support the research of the PI and his student ...large gToup of gTaduate and undergTadnatc students . The PI is also dcvclopiug a course on control systems security, and t lms wi ll use the lab to

  9. A research on the security of wisdom campus based on geospatial big data

    Science.gov (United States)

    Wang, Haiying

    2018-05-01

    There are some difficulties in wisdom campus, such as geospatial big data sharing, function expansion, data management, analysis and mining geospatial big data for a characteristic, especially the problem of data security can't guarantee cause prominent attention increasingly. In this article we put forward a data-oriented software architecture which is designed by the ideology of orienting data and data as kernel, solve the problem of traditional software architecture broaden the campus space data research, develop the application of wisdom campus.

  10. Security analysis of cyber-physical system

    Science.gov (United States)

    Li, Bo; Zhang, Lichen

    2017-05-01

    In recent years, Cyber-Physical System (CPS) has become an important research direction of academic circles and scientific and technological circles at home and abroad, is considered to be following the third wave of world information technology after the computer, the Internet. PS is a multi-dimensional, heterogeneous, deep integration of open systems, Involving the computer, communication, control and other disciplines of knowledge. As the various disciplines in the research theory and methods are significantly different, so the application of CPS has brought great challenges. This paper introduces the definition and characteristics of CPS, analyzes the current situation of CPS, analyzes the security threats faced by CPS, and gives the security solution for security threats. It also discusses CPS-specific security technology, to promote the healthy development of CPS in information security.

  11. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  12. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  13. Design and Research of a New secure Authentication Protocol in GSM networks

    Directory of Open Access Journals (Sweden)

    Qi Ai-qin

    2016-01-01

    Full Text Available As the first line of defense in the security application system, Authentication is an important security service. Its typical scheme is challenge/response mechanism and this scheme which is simple-structured and easy to realize has been used worldwide. But these protocols have many following problems In the GSM networks such as the leakage of user indentity privacy, no security protection between home registers and foreign registers and the vicious intruders’ information stealing and so on. This paper presents an authentication protocol in GSM networks based on maths operation and modular square root technique . The analysis of the security and performance has also been done. The results show that it is more robust and secure compared to the previous agreements.

  14. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  15. A Survey of E-Commerce Security

    Institute of Scientific and Technical Information of China (English)

    QIN Zhiguang; LUO Xucheng; GAO Rong

    2004-01-01

    E-commerce is a very active field of Intemet research. A very important aspect of e-commerce is its security. Because of the variety of e-commerce applications, many security policies,protocols and techniques are involved in the deployment of the security. The related standards and protocols ofe-commerce are studied in this paper. The general model of e-commerce security is set forth.In this model, two most important e-commerce protocols including secure sockets layer (SSL) and secure electronic transaction (SET) are analyzed. The open problems and new trends of e-commerce security are presented.

  16. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NARCIS (Netherlands)

    Wolthuis, R.; Broenink, E.G.; Fransen, F.; Schultz, S.; Vries, A. de

    2010-01-01

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more

  17. A New Typology for State-Sponsored International Terrorism

    Science.gov (United States)

    2011-12-01

    tolerated the stacks of books with “ scary people” on the covers. xiv THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION State sponsorship of...sponsors of terrorism list in August of 1993.133 The explanation of the State Department’s update to the list stated that despite warnings , “the... warning signs, Qaddafi directed his associates to attempt to re- establish communications with the U.S in 1992. At that point, however, the U.S. was not

  18. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  19. Annual report on reactor safety research projects sponsored by the Ministry of Economics and Technology of the Federal Republic of Germany. Reporting period 2007. Progress report

    International Nuclear Information System (INIS)

    2007-01-01

    Within its competence for energy research the Federal Ministry of Economics and Technology (BMWi) sponsors research projects on the safety of nuclear power plants currently in operation. The objective of these projects is to provide fundamental knowledge, procedures and methods to contribute to realistic safety assessments of nuclear installations, to the further development of safety technology and to make use of the potential of innovative safety-related approaches. The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWi, continuously issues information on the status of such research projects by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work. The progress reports are published by the Research Management Division of GRS. The reports as of the year 2000 are available in the Internet-based information system on results and data of reactor safety research (http://www.grs-fbw.de). The compilation of the reports is classified according to the classification system 'Joint Safety Research Index (JSRI)'. The reports are arranged in sequence of their project numbers. It has to be pointed out that the authors of the reports are responsible for the contents of this compilation. The BMWi does not take any responsibility for the correctness, exactness and completeness of the information nor for the observance of private claims of third parties. (orig.)

  20. Research award: Agriculture and Food Security 2019 | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The AFS program works with organizations to intensify and diversify small‐scale ... and social) without adversely impacting societies and the environment. ... loss, rural economic development, improved food and nutrition security, and the ...

  1. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  2. Cyber security issues in online games

    Science.gov (United States)

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  3. Proof of Concept: Iraqi Enrollment via Voice Authentication Project

    National Research Council Canada - National Science Library

    Lee, Samuel K

    2005-01-01

    ...). The IEVAP is an Office of the Secretary of Defense sponsored research project commissioned to study the feasibility of speaker verification technology in support of the Global War on Terrorism security requirements...

  4. Optical and digital techniques for information security

    CERN Document Server

    2005-01-01

    Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications. This book encompases the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This Information Security book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies that can be applied to information security issues. The Advanced Sciences and Technologies for Security Applications series focuses on research monographs in the areas of: -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection...

  5. 76 FR 48714 - New Animal Drugs; Change of Sponsor; Moxidectin

    Science.gov (United States)

    2011-08-09

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration 21 CFR Parts 520, 522, and 524 [Docket No. FDA-2011-N-0003] New Animal Drugs; Change of Sponsor; Moxidectin AGENCY: Food and Drug Administration, HHS. ACTION: Final rule. SUMMARY: The Food and Drug Administration (FDA) is amending the animal...

  6. Media exposure and sponsor recall: Cricket World Cup 2003 | Van ...

    African Journals Online (AJOL)

    This paper reports on a study into the relationship between media exposure and sponsor recall relating to an international event, namely the Cricket World Cup 2003 (CWC 2003). The application of sponsorship as a communication construct and recall as a media vehicle effect is investigated. Recall has been widely ...

  7. Mathematical and Statistical Opportunities in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-03-23

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.

  8. Energy security in the post-Cold War era: Identifying future courses for crises

    Energy Technology Data Exchange (ETDEWEB)

    Freund, M.T.; Wise, J.A.; Ulibarri, C.A.; Shaw, B.R.; Seely, H.E.; Roop, J.M.

    1994-11-01

    This paper addresses US energy security in the post-Cold War era for a conference on energy security jointly sponsored by the Department of Energy and the National Defense University. It examines the evolving nature of energy security based on analysis of past crisis-inducing events and-discusses potentially important geopolitical, environmental, regulatory, and economic developments during the next twenty-five years. The paper steps beyond the traditional economic focus of energy security issues to examine the interplay between fundamental economic and technical drivers on the one hand, and political, environmental, and perceptual phenomena, on the other hand, that can combine to create crises where none were expected. The paper expands on the premise that the recent demise of the Soviet Union and other changing world conditions have created a new set of energy dynamics, and that it is imperative that the United States revise its energy security perspective accordingly. It proceeds by reviewing key factors that comprise the concepts of ``energy security`` and ``energy crisis`` and how they may fit into the new world energy security equation. The study also presents a series of crisis scenarios that could develop during the next twenty-five years, paying particular attention to mechanisms and linked crisis causes and responses. It concludes with a discussion of factors that may serve to warn analysts and decision makers of impending future crises conditions. The crisis scenarios contained in this report should be viewed only as a representative sample of the types of situations that could occur. They serve to illustrate the variety of factors that can coalesce to produce a ``crisis.``

  9. Transparency for Sponsored Content : Analysing Codes of Ethics in Public Relations, Marketing, Advertising and Journalism

    OpenAIRE

    Ikonen, Pasi; Luoma-aho, Vilma; Bowen, Shannon A.

    2017-01-01

    As sponsored content is gaining ground globally, the boundaries between strategic communication, advertising and journalism are blurring. As sponsored content becomes more common, it raises novel ethical concerns that no industry alone can answer, such as How much disclosure is needed for transparency? Self-regulation via codes of ethics has been suggested as a remedy to meet the rising transparency expectations, and this article analysed 40 codes of ethics in the fields of communication, adv...

  10. Securing the United States' power infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Happenny, Sean F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  11. Current state in the research on electronic monitoring systems for the security and flow of objects and individuals

    Directory of Open Access Journals (Sweden)

    Man Dietrich Marcela

    2017-01-01

    Full Text Available This paper sets forth the current state of security systems in prisons from Romania and around the world, particularly aiming electronic systems of monitoring the flow of people, materials control and perimeter security, focusing on the research results concluded by motion detection tests and devices. The currently used systems were observed in order to put an analysis of the methodology together and implement and perfect these systems in protected areas. The protection of citizens must be performed to the extent that is allowed by the legislation.

  12. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment; Gestao da seguranca da informacao: uma proposta para potencializar a efetividade da seguranca da informacao em ambiente de pesquisa cientifica

    Energy Technology Data Exchange (ETDEWEB)

    Alexandria, Joao Carlos Soares de

    2009-07-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal

  13. Strategic Environmental Research and Development Project FY 1994: Assessing national remote sensing technologies for use in US Department of Energy Environmental Restoration Activities, Oak Ridge Solid Waste Storage Area 4 case study

    International Nuclear Information System (INIS)

    King, A.L.; Smyre, J.L.; Evers, T.K.

    1995-02-01

    During FY 1994, the Oak Ridge Environmental Restoration (ER) Remote Sensing Program teamed with members of the Oak Ridge National Security Program Office (NSPO), the Environmental Research Institute of Michigan (ERIM) under contract to the National Exploitation Laboratory (NEL), the Oak Ridge Waste Area Group 4 (WAG 4) ER Program, and the US Department of Energy (DOE), Offices of Technology Development, Nonproliferation and National Security, and Environmental Restoration, to conduct a test and demonstration of the uses of national remote sensing technologies at DOE hazardous waste sites located in Oak Ridge, Tennessee. Objectives of the Oak Ridge study were to determine if national remote sensing technologies are useful in conducting prescreening, characterization, and/or monitoring activities to expedite the clean-up process at hazardous waste sites and to cut clean-up costs wherever possible. This project was sponsored by the Strategic Environmental Research and Development Project (SERDP)

  14. Information security value in e-entrepreneurship

    OpenAIRE

    Nunes, Sérgio

    2012-01-01

    This paper researches the information security value in e-entrepreneurship by revising the literature that establishes the entrepreneurial domain and by relating it with the development of technological resources that create value for the customer in an online business. It details multiple paradigms regarding consumer’s values of information security, while relating them with common practices and previous researches in technological entrepreneurship. This research presents and discusses the b...

  15. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  16. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  17. Kiruna research mine

    Energy Technology Data Exchange (ETDEWEB)

    Oestensen, A

    1983-12-01

    The research mine at Kiruna is the first large-scale mining research project sponsored by the Swedish government. Under the leadership of the Swedish Mining Research Foundation, a five-year project involving development of new mining systems and machinery will be carried out in cooperation with the Lulea Institute of Technology and a number of Swedish industrial companies.

  18. Cyber Security Analysis of Turkey

    OpenAIRE

    Senturk, Hakan; Çil, Zaim; Sağıroğlu, Şeref

    2016-01-01

    Considering the criticality of the cyber security threat in the 21st century, it is presumed that the nations are busy with series of activities in order to protect their security in the cyber space domain. In this paper, in light of the recent developments in the cyber security field, Turkey’s cyber security analysis is performed using a macro analysis model. We researched for the measures taken in Turkey with respect to those in the other countries, reviewed the posture, the activities and ...

  19. Strategic management of government-sponsored R&D portfolios

    OpenAIRE

    Barry Bozeman; Juan Rogers

    2001-01-01

    Although strategic management of R&D portfolios is common practice in private sector R&D, government R&D management tends to be more discrete and ad hoc, focusing on generating maximum output from individual projects. Often, there is no clear notion of the desired public sector output. Whereas private sector R&D evaluation is generally straightforward, with the function of R&D being measured in terms of a company's internal return on investment, the benefits of public-sponsored R&D tend to be...

  20. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  1. New directions for African security

    NARCIS (Netherlands)

    Haastrup, Toni; Dijkstra, Hylke

    2017-01-01

    African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the

  2. Information Governance: A Model for Security in Medical Practice

    Directory of Open Access Journals (Sweden)

    Patricia A.H. Williams

    2007-03-01

    Full Text Available Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security.  In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing research into how to meet governance requirements. The limited research that exists describes information security governance frameworks at a strategic level. However, since medical practice is already lagging in the implementation of appropriate security, such definition may not be practical although it is obviously desirable. This paper describes an on-going action research project undertaken in the area of medical information security, and presents a tactical approach model aimed at addressing information security governance and the protection of medical data. 

  3. Transition secured? A follow-up study of adolescents who have left secure residential care

    NARCIS (Netherlands)

    Harder, Annemiek; Knorth, Erik J.; Kalverboer, Margrite E.

    2011-01-01

    Many adolescents who make the transition to adulthood experience problems after their departure from secure residential care. Research suggests that these young people are often in need of support after they have left secure care. Little is known about the experiences and perceptions of adolescents

  4. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  5. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  6. Annual report on reactor safety research projects sponsored by the Ministry of Economics and Technology of the Federal Republic of Germany. Reporting period 2005. Progress report

    International Nuclear Information System (INIS)

    2005-01-01

    Within its competence for energy research, the Bundesministerium fuer Wirtschaft und Technology (BMWi) (Federal Ministry of Economics and Technology) sponsors investigations into the safety of nuclear power plants. The objective of these investigations is to provide fundamental knowledge, procedures and methods to contribute to realistic safety assessments of nuclear installations, to the further development of safety technology and to make use of the potential of innovative safety-related approaches. The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWi, continuously issues information on the status of such investigations by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work and are published by the Research Management Division of GRS within the framework of general information on the progress in reactor safety research. The compilation of the reports is classified according to general topics related to reactor safety research. Further, use is made of the classification system 'Joint Safety Research Index' of the CEC (Commission of the European Communities). The reports are arranged in sequence of their project numbers. It has to be pointed out that the authors of the reports are responsible for the contents of this compilation. The BMWi does not take any responsibility for the correctness, exactness and completeness of the information nor for the observance of private claims of third parties. (orig.)

  7. Annual report on reactor safety research projects sponsored by the Ministry of Economics and Labour of the Federal Republic of Germany. Reporting period 2004. Progress report

    International Nuclear Information System (INIS)

    2004-01-01

    Within its competence for energy research, the Bundesministerium fuer Wirtschaft und Technology (BMWi) (Federal Ministry of Economics and Technology) sponsors investigations into the safety of nuclear power plants. The objective of these investigations is to provide fundamental knowledge, procedures and methods to contribute to realistic safety assessments of nuclear installations, to the further development of safety technology and to make use of the potential of innovative safety-related approaches. The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWi, continuously issues information on the status of such investigations by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work and are published by the Research Management Division of GRS within the framework of general information on the progress in reactor safety research. The compilation of the reports is classified according to general topics related to reactor safety research. Further, use is made of the classification system 'Joint Safety Research Index' of the CEC (Commission of the European Communities). The reports are arranged in sequence of their project numbers. It has to be pointed out that the authors of the reports are responsible for the contents of this compilation. The BMWi does not take any responsibility for the correctness, exactness and completeness of the information nor for the observance of private claims of third parties. (orig.)

  8. Annual report on reactor safety research projects sponsored by the Ministry of Economics and Labour of the Federal Republic of Germany. Reporting period 2004. Progress report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    Within its competence for energy research, the Bundesministerium fuer Wirtschaft und Technology (BMWi) (Federal Ministry of Economics and Technology) sponsors investigations into the safety of nuclear power plants. The objective of these investigations is to provide fundamental knowledge, procedures and methods to contribute to realistic safety assessments of nuclear installations, to the further development of safety technology and to make use of the potential of innovative safety-related approaches. The Gesellschaft fuer Anlagen- und Reaktorsicherheit (GRS) mbH, by order of the BMWi, continuously issues information on the status of such investigations by publishing semi-annual and annual progress reports within the series of GRS-F-Fortschrittsberichte (GRS-F-Progress Reports). Each progress report represents a compilation of individual reports about the objectives, work performed, results achieved, next steps of the work etc. The individual reports are prepared in a standard form by the research organisations themselves as documentation of their progress in work and are published by the Research Management Division of GRS within the framework of general information on the progress in reactor safety research. The compilation of the reports is classified according to general topics related to reactor safety research. Further, use is made of the classification system 'Joint Safety Research Index' of the CEC (Commission of the European Communities). The reports are arranged in sequence of their project numbers. It has to be pointed out that the authors of the reports are responsible for the contents of this compilation. The BMWi does not take any responsibility for the correctness, exactness and completeness of the information nor for the observance of private claims of third parties. (orig.)

  9. 75 FR 54017 - New Animal Drugs; Change of Sponsor; Penicillin G Benzathine and Penicillin G Procaine Suspension...

    Science.gov (United States)

    2010-09-03

    ... [Docket No. FDA-2010-N-0002] New Animal Drugs; Change of Sponsor; Penicillin G Benzathine and Penicillin G... animal drug regulations to reflect a change of sponsor for two new animal drug applications (NADAs) from..., Syracuse, NY 13201, has informed FDA that it has transferred ownership of, and all rights and interest in...

  10. Hotel Security Management : Case: Original Sokos Hotel Vaakuna Vaasa

    OpenAIRE

    Koskela, Jere

    2016-01-01

    This thesis studied hotel security management and examined one case hotel more closely on matters of security management. The case hotel in this research was Original Sokos Hotel Vaakuna Vaasa. The aim of the thesis was to find out how security aspects are managed and how they could be developed in the case hotel. This research was conducted to help the case hotel’s security supervisor to develop and improve security. The thesis consists of a theoretical framework and an empirical study. The ...

  11. Computer Security for Commercial Nuclear Power Plants - Literature Review for Korea Hydro Nuclear Power Central Research Institute

    Energy Technology Data Exchange (ETDEWEB)

    Duran, Felicia Angelica [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Security Systems Analysis Dept.; Waymire, Russell L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Security Systems Analysis Dept.

    2013-10-01

    Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documents have also been provided to KHNP-CRI.

  12. Computer Security for Commercial Nuclear Power Plants - Literature Review for Korea Hydro Nuclear Power Central Research Institute

    International Nuclear Information System (INIS)

    Duran, Felicia Angelica; Waymire, Russell L.

    2013-01-01

    Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documents have also been provided to KHNP-CRI.

  13. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    Science.gov (United States)

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  14. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    Science.gov (United States)

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  15. Canadian International Food Security Research Fund - Phase II ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The fund was designed to finance initiatives to solve global food and ... food security and enhance nutrition in developing countries; -increase food ... In a context of rising food prices, millions of Africans in marginal areas rely on a range of ...

  16. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  17. Seismic safety research program plan

    International Nuclear Information System (INIS)

    1985-06-01

    This plan describes the safety issues, regulatory needs, and the research necessary to address these needs. The plan also discusses the relationship between current and proposed research within the NRC and research sponsored by other government agencies, universities, industry groups, professional societies, and foreign sources

  18. Main Issues in Big Data Security

    Directory of Open Access Journals (Sweden)

    Julio Moreno

    2016-09-01

    Full Text Available Data is currently one of the most important assets for companies in every field. The continuous growth in the importance and volume of data has created a new problem: it cannot be handled by traditional analysis techniques. This problem was, therefore, solved through the creation of a new paradigm: Big Data. However, Big Data originated new issues related not only to the volume or the variety of the data, but also to data security and privacy. In order to obtain a full perspective of the problem, we decided to carry out an investigation with the objective of highlighting the main issues regarding Big Data security, and also the solutions proposed by the scientific community to solve them. In this paper, we explain the results obtained after applying a systematic mapping study to security in the Big Data ecosystem. It is almost impossible to carry out detailed research into the entire topic of security, and the outcome of this research is, therefore, a big picture of the main problems related to security in a Big Data system, along with the principal solutions to them proposed by the research community.

  19. Environmental research on actinide elements

    International Nuclear Information System (INIS)

    Pinder, J.E. III; Alberts, J.J.; McLeod, K.W.; Schreckhise, R.G.

    1987-08-01

    The papers synthesize the results of research sponsored by DOE's Office of Health and Environmental Research on the behavior of transuranic and actinide elements in the environment. Separate abstracts have been prepared for the 21 individual papers

  20. Secure system design and trustable computing

    CERN Document Server

    Potkonjak, Miodrag

    2016-01-01

    This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.