WorldWideScience

Sample records for security stakes changement

  1. Climatic change and security stakes

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  2. Cyber-security of nuclear facilities: stakes and challenges

    Marquez, T.

    2016-01-01

    Major players in the French nuclear industry have implemented the concept of cyber-resilience that aims at anticipating and identifying real threats and detecting the weaknesses of the critical installations in order to protect them more efficiently. French law imposes for some categories of installations including nuclear power plants the implementation of advanced protection solutions to reach a high standard of cyber security. Sentryo, a start-up has developed a system that allows the detection of intruders in a digital network by analysing the interactions between the nodes of the network. The intruder is detected when the interaction mapping appears to be different from a configuration considered as normal. The feedback experience shows that any function in an enterprise must be made aware of the cyber risk. (A.C.)

  3. The cyber security of French nuclear installations: stakes and opportunities

    Marquez, Thierry

    2016-01-01

    Notably due to the development of the number of connected objects, nuclear installations, their supply chain and all the actors of the chain value are exposed to cyber risks, even if a recent study noticed that successful cyber attacks involving nuclear plants are rare, but real. Thus, the threat is actual and growing, and the IAEA is already working with Interpol on this issue. The author then describes how French actors (EDF, Areva, CEA) have introduced cyber-resilience to better anticipate and identify actual threats and critical vulnerabilities in order to protect infrastructures. He comments some strengthened regulatory measures introduced for the French nuclear sector, and continuous improvements brought in the field of cyber security. He shows that handling these risks is also an opportunity to develop crisis management tools through the development of a specific know-how which also has an industrial value

  4. Lethal stakes: rig-hand killings show rising security risks abroad

    Lorenz, A.

    1999-01-01

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards

  5. Lethal stakes: rig-hand killings show rising security risks abroad

    Lorenz, A

    1999-05-03

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards.

  6. Higher Stakes--The Hidden Risks of School Security Fences for Children's Learning Environments

    Rooney, Tonya

    2015-01-01

    In a move away from the open or low-fenced grounds that have traditionally been a feature of Australian school design, the last decade has seen a growth in the installation of high-security fences around schools. These structures, far from being passive and neutral, act to redefine the possibilities for movement and connectivity in the local…

  7. Countries in transition and the developing countries in the negotiation on the climatic change. Stakes of the Kyoto conference; Les pays en transition et les pays en developpement dans la negociation sur le changement climatique. Les enjeux de la conference de Kyoto

    Blanchard, O; Cavard, D; Faudry, D; Girod, J; Menanteau, P; Viguier, L

    1997-10-01

    This document presents the positions of the countries in transition and the developing countries in the phase of the negotiations on the climatic change between 1994 and 1997, then takes stock on the pilot phase of the actions of the associated implementation. The negotiations stakes and the frame of the discussions are also presented. (A.L.B.)

  8. Changements climatiques, innovation et technologies de l ...

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  9. Programme de bourses de recherche sur le changement climatique ...

    Une faculté d'adaptation limitée est souvent reconnue comme l'un des principaux facteurs de vulnérabilité aux changements climatiques. Le programme Adaptation aux changements climatiques en Afrique (ACCA) du CRDI vise à aider les sociétés africaines à faire face aux changements climatiques. Cette subvention ...

  10. Perceptions locales de la manifestation des changements ...

    SARAH

    . PRPR. ERMA. DC. UD cluster 1 cluster 2. Pauvres. Riches et moyens. Figure 4. Positionnement des classes d'impacts socio-économiques des changements climatiques dans un système d'axes de l'analyse factorielle des ...

  11. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    Zakaria, M.; Mandere, N.; Olsson, L. [Lund Univ., Centre for Sustainability Studies (LUCSUS) (Sweden)

    2006-07-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  12. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    Zakaria, M.; Mandere, N.; Olsson, L.

    2006-01-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  13. Stakes Matter in Ultimatum Games

    Andersen, Steffen; Ertaç, Seda; Gneezy, Uri

    2011-01-01

    One of the most robust findings in experimental economics is that individuals in one-shot ultimatum games reject unfair offers. Puzzlingly, rejections have been found robust to substantial increases in stakes. By using a novel experimental design that elicits frequent low offers and uses much...... larger stakes than in the literature, we are able to examine stakes' effects over ranges of data that are heretofore unexplored. Our main result is that proportionally equivalent offers are less likely to be rejected with high stakes. In fact, our paper is the first to present evidence that as stakes...

  14. RWE sells Nafta stake

    Janoska, J.

    2004-01-01

    At year-end 2000, state-owned Slovensky plynarensky priemysel (SPP) signed a Memorandum of Understanding that set the conditions for the German concern RWE to purchase a 40 % stake in Nafta Gbely. This partnership agreement was meant to grant RWE participation in the management of the gas storage operator, which is controlled by SPP, and allow RWE to increase the use of Nafta's capacities. But in the 3 years since then, these objectives were not met. RWE representatives were not appointed to the Nafta Board and not a single cubic meter of RWE gas was stored at Nafta. RWE denied that it was considering leaving Nafta. Control of Nafta and SPP gradually passed to RWE's major competitors. The attitude of RWE only changed last week, when it sold its stake in Nafta to Ruhrgas under favourable conditions. Although Ruhrgas already more or less controlled Nafta via SPP, it paid RWE 62.22 million Eur for its stake. This represents a price per share of about 12.44 Eur more than RWE paid over two years ago and about double the market price. One of the possible reasons why RWE decided to leave the company is, apart from uncertainty surrounding future participation in the company management, uncertainty regarding whether there is a profit to be made on future dividends. Another reason may be the joint operation of both rivals in a number of companies. And so the Nafta trade may be part of the establishment of areas of influence

  15. L'adaptation aux changements climatiques

    Cathy Egan

    plus équitables et plus prospères. Centre de recherches pour le développement international, CP 8500, Ottawa (Ontario) Canada K1G 3H9. Tél. : 613-236-6163 • Télécopieur : 613-238-7230 • Courriel : info@crdi.ca. L'ADAPTATION AUX. CHANGEMENTS CLIMATIQUES. LE RECOURS AUX. ONDES. Les petits exploitants ...

  16. COP21: defense stakes

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  17. Changements climatiques | CRDI - Centre de recherches pour le ...

    L'objectif du programme Changements climatiques consiste à appuyer des partenariats et des réseaux visant à rassembler des données probantes pour trouver des solutions et utiliser les technologies en vue d'obtenir des gains sociaux et économiques et d'atténuer les effets des changements climatiques pour l'avenir.

  18. Nouveau webinaire IWRA/CRDI sur les changements climatiques et ...

    18 avr. 2018 ... Contrats d'options d'eau pour l'adaptation aux changements climatiques à Santiago (Chili);. • Adaptation aux changements climatiques dans les bassins hydrographiques en voie d'urbanisation rapide: enseignements issues d'une approche tenant compte des préoccupations et des facteurs de stress ...

  19. To break away from fossil fuels : a contribution to solve climatic change and energy security for Quebec; S'affranchir des carburants fossiles : une contribution a la lutte aux changements climatiques et a la securite energetique du Quebec

    Bonin, P.; Seguin, H.; Waridel, L.

    2006-06-15

    In response to growing energy demands, Quebec has proposed the construction of 3 deep water terminals to accommodate methane tankers which transport liquefied natural gas (LNG). This paper focused on the proposed Gros Cacouna Port project in the St. Lawrence Seaway which is currently under study and subject to approval. Equiterre, questioned the energy security aspect of the proposal and argued that increasing Quebec's reliance on increasingly expensive energy would decrease energy security. In addition, importation of LNG would bring a clear exit of capital outside the province. Equiterre also argued that reliance on fossil fuels should be decreased in order to mitigate greenhouse gas emissions which contribute to climate change. The organization questioned whether the economic and social need for the proposed project justifies a greater dependency on fossil fuels and the associated impact on the environment and fragile ecosystems of the St. Lawrence. It was suggested that alternative solutions such as renewable energy sources and energy efficiency should be explored in order to promote sustainable development, increase energy security and reduce greenhouse gases. Equiterre argued that Quebec can and must decrease, and even eliminate, its dependence on fossil fuels, including natural gas, for Quebec's economic, social and environmental well-being. For these reasons, Equiterre recommended that the proposed project be rejected, particularly since the project proponents failed to show the real impact that the project would have on Quebec markets. 72 refs., 10 tabs., 21 figs.

  20. Power supply security: what stakes for regulation?

    Marty, Frederic

    2007-02-01

    Prices on electricity markets induce two kinds of debates. If the first ones lie on their constant increase, the seconds are relative to their volatility. Such volatility disrupts price signals for investors and could induce an insufficient level of generating capacity. The risks are all the more significant since the profitability of peak-load capacities is especially sensitive to the level of prices that are realised during the small number of hours in which they produce energy. But, the difficulty to balance between scarcity rents and abuses of market power could induce regulatory interventions as too stringent price-caps. These ones could make worse the spontaneous market under-investment. They restrict the scarcity rents expected by the investors and reinforce the law uncertainty. Our purpose is to analyse the mechanisms which are used to provide an optimal level of generating capacity, as capacity obligations, payments or markets, and to underline the complementarities between decentralised investment decisions and public action. (author)

  1. Le littoral face aux changements climatiques

    Mulot, Vanessa; Vigneron, Anne-Laure; Lambert-Hadid, Marie-Laure

    2011-01-01

    Le changement climatique et l’anthropisation du littoral accentuent le risque de submersion marine sur l’ensemble des côtes. Malgré l’élévation en cours du niveau des mers, l’attractivité du littoral ne décroît pas malgré la connaissance du risque. Ce risque aggravera dans les années à venir les enjeux liés à la submersion marine, parmi lesquels le danger pour les vies humaines, comme l’a malheureusement illustré l’actualité (Xynhia), mais aussi la question de la propriété des biens et des te...

  2. Adaptation dans les zones cruciales au regard des changements ...

    ) vise à accroître la résilience des populations pauvres dans trois « zones cruciales » au regard des changements climatiques : les bassins hydrographiques, les deltas et les régions semi-arides.

  3. The climatic change; Le changement climatique

    NONE

    2002-07-01

    For a long time the climatic change was the prerogative of the scientists. It is today a stake of the international policy. After a short presentation of a scientific evaluation of the situation, this document presents the policies of the fight against the climatic warming (Kyoto protocol, economical instruments), debates on the Usa attitude and the nuclear and general information on the topic (chronology, bibliography, glossary and Internet addresses references). (A.L.B.)

  4. Small Stakes Risk Aversion in the Laboratory

    Harrison, Glenn W.; Lau, Morten I.; Ross, Don

    2017-01-01

    Evidence of risk aversion in laboratory settings over small stakes leads to a priori implausible levels of risk aversion over large stakes under certain assumptions. One core assumption in statements of this calibration puzzle is that small-stakes risk aversion is observed over all levels of wealth...

  5. Les agriculteurs s'adaptent aux changements climatiques en Tunisie ...

    23 août 2011 ... À La Soukra, en Tunisie, des centaines de familles à faible revenu vivent des produits de la terre qu'elles cultivent. Or, depuis quelques décennies, ce mode de vie est menacé par l'urbanisation et les changements climatiques.

  6. Changements climatiques | Page 39 | CRDI - Centre de recherches ...

    Le Moyen-Orient et l'Afrique du Nord connaissent une urbanisation effrénée qui entraîne un grave stress hydrique et nuit à la production alimentaire. Mais la recherche montre comment l'expansion urbaine et la croissance agricole peuvent aller de pair. Axe de recherche. Examiner en quoi les changements climatiques et ...

  7. Les agriculteurs s'adaptent aux changements climatiques en Tunisie ...

    23 août 2011 ... Les eaux grises et la culture en serre augmentent la production alimentaire en Tunisie ... Des chercheurs insistent sur l'importance de favoriser la résilience aux ... Vulnérabilité et adaptation aux changements climatiques des ...

  8. Perceptions locales du changement climatique et mesures d ...

    Perceptions locales du changement climatique et mesures d'adaptation dans la ... village, de l'importance représentée par le karité pour les groupes socioculturels. ... l'adaptation de nouvelles cultures en association, la protection des jeunes ...

  9. Recherche sur l'adaptation aux changements climatiques

    Corey Piccioni

    consortiums travaillent dans des zones vulnérables aux changements climatiques en Afrique et en Asie, notamment dans les bassins hydrographiques alimentés .... Le projet de recherche Pathways to Resilience in Semi-Arid Economies (PRISE) vise à réduire les risques et à opti- miser les possibilités de développement ...

  10. Adaptation de collectivités africaines aux changements climatiques ...

    Mis en oeuvre par des organisations non gouvernementales, les projets adopteront une démarche d'apprentissage par la pratique et viseront à trouver des façons de communiquer l'information au sujet des changements ... Managing Risk, Reducing Vulnerability and Enhancing Productivity under a Changing Climate.

  11. Les changements climatiques et l'urbanisation menacent les ...

    5 sept. 2014 ... Cette perception correspond-elle aux données scientifiques ? Shah Alam Khan. Dans les quatre villes étudiées, on observe effectivement de réels changements dans les précipitations annuelles, mais pas nécessairement une diminution. À Gurgaon, il y aurait diminution selon l'opinion générale, ce qui ...

  12. Technologies agricoles modernes et changements dans la vie socio ...

    Ainsi les anciennes habitudes en matière d'organisation économique, sociale et culturelle sont-elles loin d'avoir été préservées. La présente étude vise à analyser l'ensemble des changements induits par les nouvelles technologies agricoles sur les structures économique, culturelle, politique, religieuse et sociale de ladite ...

  13. Aquaculture intérieure et adaptation aux changements climatiques ...

    Ce projet porte sur l'élevage du tilapia dans de petits étangs fermiers ou des cages flottantes dans les rivières et les réservoirs du nord de la Thaïlande. Les chercheurs exploreront des façons d'adapter les pratiques aquacoles aux changements climatiques et analyseront la valeur de l'aquaculture comme stratégie ...

  14. Des changements en Asie, surtout pour les femmes | CRDI - Centre ...

    23 mars 2016 ... Deux femmes qui regardent l'écran d'un ordinateur en Inde. Photo : CRDI. Les femmes sont les agentes du changement en Inde, au Bangladesh, et au Cambodge. Je reviens tout juste d'un voyage en Inde, au Bangladesh, et au Cambodge. Bien que ces pays soient très différents, j'ai remarqué plusieurs ...

  15. Multilevel stake holder consensus building in radioactive waste management

    Dreimanis, Andrejs

    2008-01-01

    Full text: The increased demand of our society to its quality of life, global security and environmental safety as well as to observing a basic ethical principle of equity have advanced our attitude towards the recent proposals to develop shared multinational projects in the use of nuclear energy technologies, in particular, to: a) Siting of shared deep repositories for high-level radioactive waste (RW) and spent nuclear fuel safe disposal. In turn, arrangement of multinational facilities requires to gain more complex consensus between all involved parties. Method: We propose an interdisciplinary synergetic approach to multilevel consensus building for siting and construction of shared multinational repositories for RW deep disposal, based on self-organization (SO) of various stake holders, chaos and fuzziness concepts as well as Ashby principle of requisite variety. In the siting of a multi-national repository there appears an essential novel component of stake holder consensus building, namely: to reach consent - political, social, economic, ecological - among international partners, in addition to solving the whole set of intra-national consensus building items. An entire partnering country is considered as a national stake holder, represented by the national government, being faced to simultaneous seeking an upward (international) and a downward (intra-national) consensus in a psychologically stressed environment, having possibly diverse political, economic and social interests. Main Results: Following inferences about building of multilevel consensus are developed: 1) The basis of synergetic approach to stake holder interaction - informational SO, by forming a knowledge-creating stake holder community via cooperation and competition among individuals, public bodies/groups, companies, institutions; 2) Building of international stake holder consensus could be promoted by activating and diversifying multilateral interactions between intra- and international stake

  16. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  17. Markets, Managerialism and Teachers' Work: The Invisible Hand of High Stakes Testing in England

    Stevenson, Howard; Wood, Phil

    2013-01-01

    High stakes testing has been long established in the English school system. In this article, we seek to demonstrate how testing has become pivotal to securing the neo-liberal restructuring of schools, that commenced during the Thatcher era, and is reaching a critical point at the current time. Central to this project has been the need to assert…

  18. Small Stakes Risk Aversion in the Laboratory

    Harrison, Glenn W.; Lau, Morten; Ross, Don

    Evidence of risk aversion in laboratory settings over small stakes leads to a priori implausible levels of risk aversion over large stakes under certain assumptions. One core assumption in standard statements of this calibration puzzle is that individuals define utility over terminal wealth......, and that terminal wealth is defined as the sum of extra-lab wealth and any wealth accumulated in the lab. This assumption is often used in Expected Utility Theory, as well as popular alternatives such as RankDependent Utility theory. Another core assumption is that the small-stakes risk aversion is observed over...... all levels of wealth, or over a “sufficiently large” range of wealth. Although this second assumption if often viewed as self-evident from the vast experimental literature showing risk aversion over laboratory stakes, it actually requires that lab wealth be varied for a given subject as one takes...

  19. changement climatique, mécanisme actuel de prévention

    ACSS

    19 févr. 2015 ... Ainsi, dans un contexte des changements climatiques, cette étude vise ... Mots Clés: Adaptations, Banikoara, Bénin, changement climatique, ...... pastorale sahélienne: cas de l'arrondissement ... Global Environmental Politics.

  20. Adaptation aux changements climatiques et résilience en Asie du Sud

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  1. Vulnérabilité et adaptation face aux changements climatiques et au ...

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  2. Agro-fuels, a cartography of stakes

    2008-09-01

    This document proposes a dashboard of the main issues regarding agro-fuels. Nine sheets propose basic information and data on these issues: 1- agro-fuel production and consumption in the world (ethanol, vegetable oils, perspective for demand in the transport sector), 2- energy efficiency and greenhouse gas emissions (energy assessments and greenhouse effect of agro-fuels, discrepancies of results between first-generation European agro-fuels, case of agro-fuels produced in Southern countries), 3- needed surfaces in Europe (land use and cultivable areas for agro-fuel production in Europe and in France, competition between food and energy crops), 4- deforestation in the South (relationship between agriculture, deforestation and agro-fuels, between deforestation and greenhouse gas emissions), 5- impacts on biodiversity (use of pesticides and fertilizers, large scale cultivations and single-crop farming, cultivation of fallow land and permanent meadows, deforestation in the South, relationship between agro-fuels and GMOs), 6- impacts on water, soil and air (water quality and availability, soil erosion, compaction and fertility loss, air quality), 7- food-related and social stakes (issue of food security, social impacts of agro-fuel production with pressure on family agriculture and issues of land property), 8- public supports and economic efficiency (public promotion of agro-fuels, agro-fuel and oil prices, assessment of the 'avoided' CO 2 ton), and 9- perspectives for second-generation agro-fuels (definitions and processes, benefits with respect to first-generation fuels, possible impacts on the environment, barriers to their development)

  3. Trans-Saharan geopolitics. The game and the stakes

    Chegrouche, L.

    2010-01-01

    The geopolitics of energy exports from the trans-Saharan region are similar to the Caspian great game' at the end of the last century. In North/West Africa as in West/Central Asia, the question of control over hydrocarbon reserves and lines of access to those reserves lies at the source of various conflicts. Rivalries are expressed through open and complex conflicts in which powers confront one another over oil-rich zones through proxy ethnic, religious or cultural groups, as dictated by the colossal economic interests at stake. The increasing number of conflicts - the Niger Delta, Darfur, the Azawak, etc. - is an illustration of this. The shock waves from this rivalry undermine regional peace and security, as well as the security of international energy supplies. The question here is to understand the game and the stakes of this trans-Saharan chess-board, to study its principal features and its energetic consequences. The national oil companies and states of the region can work around or through the geopolitical rifts caused by local rivalries and extra-regional appetites. There is therefore a need to understand the ways in which the players in the trans-Saharan 'great game' interact with one another, an to identifies the effects these interactions may have in the field of energy, in terms of potential reserves and transport projects. The TSGP is presented as an illustration of this geopolitical dynamics. (author)

  4. A stake in the business.

    Sullivan, Chris T

    2005-09-01

    When Chris Sullivan and three friends opened the first Outback Steakhouse in March 1988, in Tampa, Florida, they were hoping it would be successful enough to spawn a few more and maybe some other kinds of restaurants as well. Since then, their chain of Australia-themed restaurants has grown to some 900 locations and counting-plus another 300 or so "concept" restaurants that operate from under Outback's corporate umbrella. Growth like that doesn't happen accidentally, Sullivan says, but it certainly wasn't part of the original plan. In this first-person account, Outback's chairman describes the organization's formula for growth and development, which is consciously rooted in the founders' belief in putting people first. They've created an organizational model in which field managers make most of the decisions, garner the rewards, and live with the consequences. Specifically, the founders believe that the most effective way to make customers happy is to first take care of the people who cook for them, serve them, and supervise operations at the restaurants. Outback servers have fewer tables to worry about than those at other restaurant chains; the cooks have bigger, cooler, better-equipped kitchens; and the supervisors work their way up the ranks toward an equity stake in the restaurant or region they run. There are no administrative layers between field managers and the executives at headquarters. Giving employees good working conditions and the chance to become owners has proved to be good business: Turnover among hourly employees is low, and Outback and its subsidiaries opened 120 restaurants last year, increasing sales by 20.1%. The company must grow in order to keep offering career opportunities to its workers; in turn, those opportunities ensure that Outbackers remain committed to making customers happy and the company successful.

  5. Interaction entre zones urbaines et rurales et changements ...

    Ce projet vise à réduire la vulnérabilité des systèmes ruraux-urbains du Nigeria face aux changements climatiques en diffusant les résultats du projet pilote mené dans la ville d'Aba, dans le sud-est du pays, et les environs. L'équipe du projet aidera le comité de conseillers-superviseurs d'Aba à déterminer les bonnes ...

  6. High-stakes educational testing and democracy

    Ydesen, Christian

    2014-01-01

    This article investigates the relation between high-stakes educational testing and democracy drawn from the experiences of 20th-century high-stakes educational testing practices in the Danish history of education. The article presents various concepts of democracy using leading propositions within...... the field of education. Then a sample of relevant historic case studies are examined in light of these definitions. Among other things, the article concludes that a combination of different evaluation technologies – some formative and some summative – might be the safest way to go from a democratic...

  7. The energy stakes - After Fukushima. 2. ed.

    Iacona, Estelle; Taine, Jean; Tamain, Bernard

    2012-01-01

    The energy question today is worldwide and depends on major geopolitical stakes (demography, development, water, health, environment, research, risks). The energy must be universally produced and distributed together with minimizing pollutions, nuclear risks and CO 2 emissions. This new edition of 'the energy stakes' is fully updated and approaches some of the main questions that any responsible citizen should ask. It comprises 3 parts dealing with: a comprehensive review of the energy question in most of countries in the world, the constraints and challenges to take up to manage energy in an optimum way, and a prospective study about the control of energy consumption and about the existing technical solutions. (J.S)

  8. Validating High-Stakes Testing Programs.

    Kane, Michael

    2002-01-01

    Makes the point that the interpretations and use of high-stakes test scores rely on policy assumptions about what should be taught and the content standards and performance standards that should be applied. The assumptions built into an assessment need to be subjected to scrutiny and criticism if a strong case is to be made for the validity of the…

  9. Des données locales sur les changements climatiques assurent la ...

    13 mai 2015 ... Les changements climatiques et la variabilité du climat représentent une menace importante pour l'agriculture, la sécurité alimentaire et les moyens de subsistance en Afrique subsaharienne.

  10. Oil dependence. Myths and realities of a strategic stake

    Chaliand, G.; Jafalian, A.

    2005-04-01

    Using a series of regional studies, this collective book proposes to evaluate the strategic dimensions of the oil dependence and to determine its geopolitical impacts in the Middle East, Russia, China, USA and Europe. Content: the oil stakes at the beginning of the 21. century; in the center of the oil scene: the Middle East; oil dependence and US foreign policy: beyond myths; the Russian oil, instrument of influence and of alliances re-knitting; China and oil: security feelings and strategic approach; towards a European supply strategy; beyond petroleum: what alternatives; 150 years of petroleum history; the energy dependence; energy economy; automotive fuels and pollution abatement; limitation of greenhouse gas emissions; glossary; bibliography; index; Web links. (J.S.)

  11. La dévalorisation des filles au Bangladesh : continuité ou changement

    Le déséquilibre du ratio hommes-femmes se concentre en grande partie dans des ... le contrôle masculin du travail et des ressources de la famille en vertu d'un ... à savoir qu'une meilleure compréhension de la dynamique du changement qui a ... IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau.

  12. Une stratégie adaptive au changement climatique dans le Moyen ...

    Des pratiques d'adaptation et de gestion de risques dans le secteur de l'eau sont en voie d'application dans différents pays et régions du monde à la lumière des impacts de changement climatique prévus. Dans la région MENA, la sensibilisation de toutes les parties prenantes sur la signification du changement climatique ...

  13. Raising the stakes: How students' motivation for mathematics associates with high- and low-stakes test achievement.

    Simzar, Rahila M; Martinez, Marcela; Rutherford, Teomara; Domina, Thurston; Conley, AnneMarie M

    2015-04-01

    This study uses data from an urban school district to examine the relation between students' motivational beliefs about mathematics and high- versus low-stakes math test performance. We use ordinary least squares and quantile regression analyses and find that the association between students' motivation and test performance differs based on the stakes of the exam. Students' math self-efficacy and performance avoidance goal orientation were the strongest predictors for both exams; however, students' math self-efficacy was more strongly related to achievement on the low-stakes exam. Students' motivational beliefs had a stronger association at the low-stakes exam proficiency cutoff than they did at the high-stakes passing cutoff. Lastly, the negative association between performance avoidance goals and high-stakes performance showed a decreasing trend across the achievement distribution, suggesting that performance avoidance goals are more detrimental for lower achieving students. These findings help parse out the ways motivation influences achievement under different stakes.

  14. Etude du processus de changement vecu par des familles ayant decide d'adopter volontairement des comportements d'attenuation des changements climatiques

    Leger, Michel T.

    Les activites humaines energivores telles l'utilisation intensive de l'automobile, la surconsommation de biens et l'usage excessif d'electricite contribuent aux changements climatiques et autres problemes environnementaux. Bien que plusieurs recherches rapportent que l'etre humain est de plus en plus conscient de ses impacts sur le climat de la planete, ces memes recherches indiquent qu'en general, les gens continuent a se comporter de facon non ecologique. Que ce soit a l'ecole ou dans la communaute, plusieurs chercheurs en education relative a l'environnement estiment qu'une personne bien intentionnee est capable d'adopter des comportements plus respectueux de l'environnement. Le but de cette these etait de comprendre le processus d'integration de comportements d'attenuation des changements climatiques dans des familles. A cette fin, nous nous sommes fixe deux objectifs : 1) decrire les competences et les procedes qui favorisent l'adoption de comportements d'attenuation des changements climatiques dans des familles et 2) decrire les facteurs et les dynamiques familiales qui facilitent et limitent l'adoption de comportements d'attenuation des changements climatiques dans des familles. Des familles ont ete invitees a essayer des comportements personnels et collectifs d'attenuation des changements climatiques de sorte a integrer des modes de vie plus ecologiques. Sur une periode de huit mois, nous avons suivi leur experience de changement afin de mieux comprendre comment se produit le processus de changement dans des familles qui decident volontairement d'adopter des comportements d'attenuation des changements climatiques. Apres leur avoir fourni quelques connaissances de base sur les changements climatiques, nous avons observe le vecu de changement des familles durant huit mois d'essais a l'aide de journaux reflexifs, d'entretiens d'explicitation et du journal du chercheur. La these comporte trois articles scientifiques. Dans le premier article, nous presentons une

  15. City and energy: which common stakes?

    Saujot, Mathieu; Peiffer-Smadja, Oceane; Renard, Vincent

    2014-01-01

    This publication proposes a synthesis of several issues addressed during sessions hold during a year. The addressed topics have been: the interactions between forms of urban development and energy transition, energetic vulnerability in relationship with mobility, the role and participation of inhabitants in the making of the city and in energy transition (the challenge of ways of life and usages in eco-districts), stakes and consequences of a more integrated urban production, the local governance of energy. Each of these topics is discussed, and the main lessons learned are highlighted

  16. Marine renewable energies. Stakes and technical solutions

    Lacroix, Olivier; Macadre, Laura-Mae

    2012-05-01

    Marine renewable energies are able to supply carbon free energy from various ocean resources (tides, waves, currents, winds, salinity and temperature gradients). This sector, currently at an early stage of deployment, has good prospects of development in the coming years. ENEA releases a report on marine renewable energies giving a transversal vision of the associated stakes and prospects of development. Technical and economic characteristics, maturity level and specificities of each marine energy are analyzed. French and European sources of funding, regulatory framework and potential environmental and social impacts are also reported

  17. Raising the Stakes: High-Stakes Testing and the Attack on Public Education in New York

    Hursh, David

    2013-01-01

    Over the last almost two decades, high-stakes testing has become increasingly central to New York's schools. In the 1990s, the State Department of Education began requiring that secondary students pass five standardized exams to graduate. In 2002, the federal No Child Left Behind Act required students in grades three through eight to take math and…

  18. A Study on consensus development through stake holder engagement for the use of nuclear energy in Japan

    Aoyama, Yoshiko; Sawada, Tetsuo; Fujii, Yasuhiko

    2008-01-01

    In order to alleviate the distrust surrounding the use of nuclear energy and operation of nuclear facilities, as well as to foster trust and find better ways to live in harmony with society, it is essential for the state and electric power utilities not to provide one-sided information, but to formulate adequate bilateral communication and dialogue with stake holders. In this study, we conducted a case study focused on four stake holder meetings with a view to ensuring safety in the use of nuclear energy and operation of nuclear facilities in Japan; the 'Community Meeting for Securing the Transparency of Kashiwazaki-Kariwa Nuclear Power Station (Chiiki-no-kai)'; the 'Monitoring and Evaluation Conference on Environmental Radiation', established by communities where nuclear facilities are installed; the 'Round-Table Conference on Nuclear Power Policy' and the 'Conference for Public Participation and Decision Making for Nuclear Energy Policy' organized by Japan Atomic Energy Commission. As a consequence, it has been observed that in each case varying opinions were summarized through stake holder meetings, but the fact that no system exists to reflect these opinions in design of the nuclear energy policy has emerged as a controversial point. This study suggests future efforts in regard to the requirements in Japan for stake holder meetings that are necessary for fostering trust and mutual understanding among stake holders including the state and local government, electric power utilities and local residents. (author)

  19. Huntsman takes a stake in Chemplex

    Wood, A.

    1993-01-01

    Huntsman Chemical (Salt Lake City) has bought a 50% stake in Australian styrenics maker Chemplex (Melbourne) from Consolidated Press Holdings (Sydney). Huntsman stepped in after a previous acquisition plan by South Africa's Sentrachem (Johannesburg) broke down because of a failure to agree on price. Chemplex has two production locations near Melbourne: West Footscray, with capacity for 100,000 m.t./year of styrene, plus polystyrene, phenol, and acetone; and Dandenong, with production of acrylonitrile butadiene styrene and latex. The company was originally Monsanto Australia, before being acquired by Consolidated Press in 1988. The deal will give Huntsman its first major production position in the Asia/Pacific region, apart from a 50% stake in a 25,000-m.t./year polystyrene plant in Taiwan, with Grand Pacific Petrochemical (Taipei) as a partner. In 1991, Huntsman abandoned plans to invest in a 25,000-m.t./year polystyrene plant in Thailand with Mitsubishi Corp. and Toa (Bangkok). Huntsman Chemical has annual revenues of $1.3 billion

  20. Split or Steal? Cooperative Behavior When the Stakes Are Large

    M.J. van den Assem (Martijn); D. van Dolder (Dennie); R.H. Thaler (Richard)

    2012-01-01

    textabstractWe examine cooperative behavior when large sums of money are at stake, using data from the television game show Golden Balls. At the end of each episode, contestants play a variant on the classic prisoner's dilemma for large and widely ranging stakes averaging over $20,000. Cooperation

  1. Evaluation des changements physico-chimiques caractérisant le ...

    Evaluation des changements physico-chimiques caractérisant le mûrissement au cours de l'entreposage de trois variétés de bananes Musa spp. (AAB, cv. Corne 1 ; AAA, cv. Poyo et AA, cv. Figue Sucrée)

  2. Lorsque la recherche locale est source de changements véritables ...

    18 févr. 2011 ... Les think tanks africains se penchent sur certaines des difficultés les plus ... Lorsque la recherche locale est source de changements véritables en Afrique ... De quel type d'information les acteurs de la sphère politique ont-ils ...

  3. Mise en place d'un réseau d'adaptation aux changements ...

    Ce projet a pour objectif de concevoir un mécanisme de gestion des risques accrus liés aux changements climatiques en appliquant le principe reconnu des ... Adaptation to Climate Change: Stakeholder engagement and understanding impacts - International Council for Local Environment Initiatives (ICLEI) (Section 21).

  4. The stakes of radiation protection: introduction

    Cordoliani, Y.S.

    2005-01-01

    The benefit/risk ratio of radiological examinations, particularly with the multi-cut scanner, can be insured only if the justification and optimization principles are respected. the justification stands on the reference to the guide of good practice of imaging examinations and the respect of the public health code that imposes an exchange of written information between the requester and the achiever. The optimization stands on the dosimetry evaluation of his practice and the comparison with the diagnosis reference levels, to realize the examinations at the lowest radiological cost. The stakes are the certainty not to be harmful for the patient, the rehabilitation of the radiologist in his consultant part rather than in this performer one and the protection against eventual legal consequences. (N.C.)

  5. Urbanisation et changements climatiques : une menace pour la ...

    22 juin 2016 ... Dans son article intitulé Periurban water security in a context of ... have distinct environmental, social, and institutional characteristics. ... Protecting food, energy, and livelihoods in Punjab through water-efficient agriculture.

  6. Economic games on the internet: the effect of $1 stakes.

    Ofra Amir

    Full Text Available Online labor markets such as Amazon Mechanical Turk (MTurk offer an unprecedented opportunity to run economic game experiments quickly and inexpensively. Using Mturk, we recruited 756 subjects and examined their behavior in four canonical economic games, with two payoff conditions each: a stakes condition, in which subjects' earnings were based on the outcome of the game (maximum earnings of $1; and a no-stakes condition, in which subjects' earnings are unaffected by the outcome of the game. Our results demonstrate that economic game experiments run on MTurk are comparable to those run in laboratory settings, even when using very low stakes.

  7. Economic games on the internet: the effect of $1 stakes.

    Amir, Ofra; Rand, David G; Gal, Ya'akov Kobi

    2012-01-01

    Online labor markets such as Amazon Mechanical Turk (MTurk) offer an unprecedented opportunity to run economic game experiments quickly and inexpensively. Using Mturk, we recruited 756 subjects and examined their behavior in four canonical economic games, with two payoff conditions each: a stakes condition, in which subjects' earnings were based on the outcome of the game (maximum earnings of $1); and a no-stakes condition, in which subjects' earnings are unaffected by the outcome of the game. Our results demonstrate that economic game experiments run on MTurk are comparable to those run in laboratory settings, even when using very low stakes.

  8. Dwelling thermal renovation: which stakes, which solutions?

    Delduc, Paul; Demeulenaere, Laurence; Verdure, Mathieu; Ayong Le Kama, Alain; Fuk Chun Wing, Dimitri; Kiefer, Noemie; Mauroux, Amelie; Charlier, Dorothee; Hini, Sihame; Pinto Silva, Kleber; Giraudet, Louis Gaetan; Nauleau, Marie-Laure; Daussin-Benichou, Jeanne-Marie; Teissier, Olivier; Finidori, Esther; Grandjean, Alain; Allibe, Benoit; Gadrat, Pierre; Couriol, Aude; Menard, Francois; Rouquette, Celine; Houriez, Guillaume; Francois, Dominique; Aubert, Celine; Canardon, Daniel

    2015-01-01

    This publication proposes three sets of contributions. The first one addresses context and stakes. The contributions propose: a literature review on household behaviour and investments in energy efficiency, a focus on the key role of dwellings in energy transition through a comparative study of the four pathways of the National Debate for Energy Transition, and a discussion about consensus and uncertainties regarding the determining factors of heating temperature in dwellings. The second set addresses public policies and their assessment: improvement of the technical-economical assessment of the benefit of dwelling energetic renovations, discussion of the organisation and results of a survey on dwelling, equipment, and energy needs and uses, an analysis of several measures aimed at reaching objectives of energy efficiency of dwellings, a discussion of renovation works quality, a discussion of the impact of the sustainable development tax credit on thermal renovation, the optimisation of energy renovation in co-properties by third party financing, some foreign examples of policies in favour of dwelling thermal renovation. The third set of contributions addresses the needed technical, organisational and market evolutions: how the building sector can face the challenges of energy transition, the possibilities to propose innovative solutions adapted to existing housing buildings, and a comparative analysis of material and building equipment costs and market structures in Europe. Other texts are proposed in appendix: the origin of the Phebus survey, a description of incentive arrangements, and a map of climate zones in France

  9. Special COP 21 - Stakes and actors

    Chauveau, Loic; Dupain, Julien; Descamps, Olivier; Blosseville, Thomas; Connors, Anne; Canto, Albane; Robischon, Christian; Boedec, Morgan; Tubiana, Fabian; Bomstein, Dominique

    2015-01-01

    A first set of article comments and discusses the various stakes and challenges of the 21. Conference of Parties (COP 21): the negotiation process which resulted in a synthesis which is to be signed by 95 States in Paris, the elaboration of an Agenda of solutions with the commitment of enterprises and local authorities, the issue of international financing as some promises remained not kept for the support to adaptation of developing countries. A second set of articles addresses the involved actors and their technological or economic challenges: the needed evolution of energy (electricity, heat, gas, fuel) producers away from fossil energies to reduce greenhouse gas emissions, the strategy of the French company Engie in the field of photovoltaic, wind and more generally renewable energies, innovating trends of decentralisation of energy production (offshore wind energy, hydrogen, plasma torch, flexible photovoltaic arrays, the wind tree, the floating wind turbine, new technologies for solar arrays), the perspectives for industrial sectors concerned by energy transition (with the example of Schneider Electric), emerging technologies (oil lamp, new boilers, desalination equipment, storage of wind energy, co-generation), developments and perspectives in the transport sector (example of Renault, new technologies for hybrid propulsion, bio-refineries, reduction of fuel consumption, hybrid aircraft, and heat management in railways) and in the building sector (new standards and applications, new building materials). A last article outlines the threat that climate can be for profitability and the taking of the carbon risk into account by the insurance and financial sectors

  10. Electric power from renewable energy: resources and stakes for France

    2001-01-01

    This paper presents the essential of the last thematic letter published by the IFEN (French institute of the environment), devoted to the resources and stakes of the electric power produced by the renewable energies in France. (A.L.B.)

  11. Design Optimization and Fatigue Analysis of Laser Stake Welded Connections

    Singh, Anshuman; Vel, Senthil S; Caccese, Vincent

    2008-01-01

    This report summanzes research on the design and fatigue analysis of laser-stake welded connections performed at the University of Maine from January 2006 to December 2007 for the Structural Response...

  12. French government to trim direct stake in Total

    Anon.

    1992-01-01

    This paper reports that the French government has decided to slash its direct stake in partly state owned oil company Total to 5% from 31.7%, a surprise move expected to raise 10 billion francs ($1.8 billion). At the same time, other state owned entities will be asked to boost their combined 2.2% stake in Total to 10%, leaving the government with a net 15% interest in Total vs. the current 34%. Initially, state owned insurance companies Groupe des Assurances Nationales and Assurances Generale de France will be asked to hike their stakes in Total, but others could be asked to join if needed to meet the 10% target. The government the its phase-down of participation in Total, established in 1924 to manage French interests in Iraq Petroleum Co., was prompted by the evolution of the oil context, which differs greatly from what had prompted a significant stake of the state in Total's capital

  13. Upping the stakes. Some lessons for the EU from the recent Russia-Ukraine gas crisis

    Van der Linde, Coby; De Jong, Jacques

    2009-02-01

    The stakes in the gas conflict between Russia and the Ukraine were upped up to an unprecedented level. The reputation of both countries, one as a reliable supplier to EU markets and the other as a reliable transit country have been dramatically shocked. The disruption of supply and the impact on gas markets in Eastern Europe will require a new round of thinking on how best to improve on security of gas supply. These responses should not include a turning away from the Ukraine as a transit country or from Russia as an important supplier, but rather the opposite, a renewed engagement of these two countries to help them construct a stable and healthy relationship in which (also) gas flows can be secured throughout the value chain, EU security of supply is the mirror image of security of transit and security of demand, and it is clear that all three securities should be addressed and integrated into one security for all. Integrating the securities along the gas value chain will allow us to move away from increasingly politicising the conflict and instead deal with the diverging interests at a more economic level. The politicising of the conflict is increasingly holding all the stakeholders hostage, preventing progress in integrating our markets and preventing large investments along the value chain to take place that are important for Russian security of supply, Ukrainian security of supply and EU security of supply. Perhaps that the recent escalation of the conflict can serve as a sombre warning signal that all parties mismanaged the vital gas relations with the short disruption in 2006 and the longer disruption in 2009 as a sorry result

  14. Possibilité de financement pour l'égalité des sexes et le changement ...

    8 mars 2018 ... Le CRDI est heureux d'annoncer une nouvelle occasion de financement qui vise à favoriser des mesures de lutte contre les changements climatiques efficaces et à long terme, afin de réduire les inégalités sociales, de promouvoir une plus grande égalité entre les sexes, et d'autonomiser les femmes et les ...

  15. Adaptation aux changements climatiques au Malawi grâce à l ...

    28 avr. 2016 ... Depuis 2001, le programme Écosystèmes et santé humaine du CRDI finance au Malawi des recherches centrées sur les liens entre la fertilité des sols, ... L'équipe examine la façon dont la recherche participative peut guider l'élaboration de stratégies d'adaptation aux changements climatiques, dans un ...

  16. 184 Estimation des changements de la ligne de rivage de la zone ...

    youness

    Estimation des changements de la ligne de rivage de la zone côtière sablonneuse de Kénitra au Maroc. Mohamed AHIZOUN1*, Eric MAIRE2, Souad HAIDA1,. José DARROZES2 et Jean-Luc PROBST3. 1 Laboratoire géophysique, mécanique des fluides, environnement et ingénierie mathématique - Equipe de recherche ...

  17. Renforcement de la capacité d'adaptation aux changements ...

    Ce projet vise à améliorer les mesures incitatives et les possibilités qui s'offrent aux ménages du sud de la Zambie et du sud-ouest du Zimbabwe pour composer avec les changements climatiques. Pour ce faire, les responsables investiront dans des technologies de production améliorées d'une grande valeur pratique ...

  18. Vulnérabilité et adaptation aux changements climatiques des ...

    21 avr. 2016 ... Pour certains, les changements se produisent progressivement, tandis que pour d'autres, des transformations radicales surviennent après des événements déterminants tels que des cyclones violents. Les agriculteurs pensent que la détérioration de l'environnement – et surtout la déforestation rapide – en ...

  19. Communication des risques reliés aux changements climatiques en ...

    1 janv. 2012 ... Il incombe bien sûr aux gouvernements locaux et nationaux de prendre les décisions relatives à l'adaptation aux changements climatiques; ils doivent toutefois les communiquer aux ménages, aux groupes communautaires et aux entreprises privées afin que ceux-ci prennent les décisions qui s'imposent ...

  20. Résumé sur l'eau : Une stratégie adaptive au changement ...

    4 janv. 2011 ... Historiquement parlant, le climat de la Terre a changé plusieurs fois et plusieurs événements climatiques se sont succédés au fil des âges, tels que des périodes glaciaires et de longues périodes de réchauffement. Les changements climatiques sont dûs à de causes variées, tant naturelles qu'humaines.

  1. Impacts économiques et sociaux des changements climatiques sur l ...

    Le projet étudiera l'attribution de l'eau dans les divers secteurs productifs des trois bassins et estimera la demande d'eau pour l'agriculture, l'industrie et la consommation domestique. La recherche identifiera les groupes vulnérables touchés par le stress hydrique engendré par les changements climatiques. On fera appel à ...

  2. La vulnérabilité aux changements climatiques, une expérience ...

    21 avr. 2011 ... Madagascar, la quatrième plus grande île au monde, héberge une multitude de formes de vie qu'on ne trouve nulle part ailleurs sur la planète. Dans la plupart des cas, cette biodiversité est extrêmement vulnérable aux changements climatiques, tout comme l'agriculture pluviale, la pêche et la foresterie, ...

  3. Les changements climatiques brouillent les prédictions des faiseurs ...

    8 oct. 2010 ... Depuis des générations, les autochtones de l'ouest du Kenya comptent sur les pouvoirs mystiques que possèdent les « faiseurs de pluie » du clan Nganyi pour prédire la météo. Cependant, le temps instable amené par les changements climatiques brouille les indices grâce auxquels les faiseurs de pluie ...

  4. Stake holders involvement in emergency preparedness

    Oudiz, A.

    2002-01-01

    The management of a nuclear crisis involves many actors apart from the radiation protection and nuclear safety experts. More than stakeholders involvement, what is at stake is a better co-operation and mutual understanding amongst the various actors. This mutual understanding requires that a minimal common nuclear risk culture exists. Presently, in France, the representation of the nuclear risk is split into two clear-cut misconceptions: risk denial or catastrophe, with almost nothing in between. In order to contribute to building progressively a common nuclear risk culture, the information about the risk and its management needs to be discussed and criticized by various actors, including non institutional actors who play an important role for the diffusion of the risk culture. Hence, IPSN decided in year 2000 to elaborate a specific feature allowing information and debate on the nuclear risk and its short and long terms management. It will take the form of a CD-ROM, which is currently elaborated by a task group taking into account: - the 'social expectancies', as they have been identified by a sociologist, - the available documents about the nuclear risk, the crisis and its management, which were analysed. The analysis shows that there is a need for a new type of feature. The feature contains first a common bulk which addresses all types of nuclear accidents and then, specific developments for each type of accidents occurring in different nuclear installations. Specialists in CD-ROM design are involved in the project. It is very important to design the structure of the CD-ROM in such a way as it presents the technical information in an understandable manner for non-specialists. This CD-ROM, which should be widely distributed and will serve as a support for debates, may contribute to building up progressively a common risk culture. It should help to aim at a better mutual understanding between experts and lay people whose points of view about the nuclear risk

  5. Climate change: which stakes? Stakes of climate change. Man and the trajectory of the Earth ship

    Bramy, Herve; Rogalski, Michel; Sachs, Ignacy

    2011-12-01

    A first article recalls what the greenhouse effect is, outlines that the increase of CO 2 concentration due to human activity is indisputable, that the future of the Kyoto Protocol remains hypothetical, that evolving towards a new development mode is a crucial necessity. It also addresses the issue of financing this struggle against climate change, and outlines the importance of international negotiations. A second article outlines the stakes of climate change, notably by referring to the different international summits and to the associated issues (commitments of most countries, technology transfers, and so on). The third article comments the entry into the Anthropocene as a disruption for the joint evolution of mankind and biosphere. The author outlines the need of a new planning for development, and briefly discusses the question of energies

  6. Politics in evaluation: Politically responsive evaluation in high stakes environments.

    Azzam, Tarek; Levine, Bret

    2015-12-01

    The role of politics has often been discussed in evaluation theory and practice. The political influence of the situation can have major effects on the evaluation design, approach and methods. Politics also has the potential to influence the decisions made from the evaluation findings. The current study focuses on the influence of the political context on stakeholder decision making. Utilizing a simulation scenario, this study compares stakeholder decision making in high and low stakes evaluation contexts. Findings suggest that high stakes political environments are more likely than low stakes environments to lead to reduced reliance on technically appropriate measures and increased dependence on measures better reflect the broader political environment. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Changements organisationnels, structures industrielles et innovations environnementales : le cas des firmes industrielles françaises

    Nadel, Simon

    2014-01-01

    La thèse analyse les déterminants de l’adoption des innovations environnementales dans l’industrie française et ses interactions avec les changements organisationnels, d’une part, et les structures industrielles, d’autre part. Elle offre tout d’abord une revue de la littérature économique qui fonde l’analyse de l’innovation environnementale. Elle propose ensuite une analyse empirique, sur données d’entreprise, du comportement éco-innovateur des firmes autour de trois éclairages. La première p...

  8. TRANSFERT THERMIQUE INSTATIONNAIRE DANS UN MUR TRICOUCHES SUBISSANT UN CHANGEMENT DE PHASE PAR SOLIDIFICATION.

    O Arfi; E Mezaache

    2016-01-01

    Une étude numérique du transfert de chaleur instationnaire dans un mur tricouches est présentée. Le modèle physique est basé sur l’équation de conduction thermique unidirectionnelle en tenant compte des équations de couplages au niveau des interfaces et des conditions convectives de surfaces. Les équations de transfert sont données en représentation enthalpique pour le matériau à changement de phase (MCP), et en formulation générale pour les régions solides. La formulation adimensionnelle a p...

  9. Energy storage. Stakes, technical solutions and valorization opportunities

    2012-03-01

    As a key factor to allow the continuous growth of renewable energies, energy storage technologies are now more than ever in the spotlight. In order to grasp the stakes, understand the technology diversity, learn relevant orders of magnitudes and comprehend the close intricacy of energy storage with energy and environmental issues, ENEA has published a detailed and well-documented publication on the subject

  10. High Stakes Testing and Its Impact on Rural Schools.

    Hodges, V. Pauline

    2002-01-01

    The movement to standardization and high-stakes testing has been driven by ideological and political concerns and has adversely affected teaching/learning, democratic discourse, and educational equity. Rural schools are hit harder because of geographic isolation and insufficient staff and resources. Testing used for purposes other than measuring…

  11. The Impact of High Stakes Testing: The Australian Story

    Klenowski, Val; Wyatt-Smith, Claire

    2012-01-01

    High stakes testing in Australia was introduced in 2008 by way of the National Assessment Program--Literacy and Numeracy (NAPLAN). Currently, every year all students in Years 3, 5, 7 and 9 are assessed on the same days using national tests in Reading, Writing, Language Conventions (Spelling, Grammar and Punctuation) and Numeracy. In 2010 the…

  12. Measuring Motivation in Low-Stakes Assessments. Research Report. ETS RR-15-19

    Finn, Bridgid

    2015-01-01

    There is a growing concern that when scores from low-stakes assessments are reported without considering student motivation as a construct of interest, biased conclusions about how much students know will result. Low motivation is a problem particularly relevant to low-stakes testing scenarios, which may be low stakes for the test taker but have…

  13. Perceptions of industrial and nuclear risks. Stakes, negotiations and social development of levels of risk acceptance

    Bernier, S.Ch.

    2007-11-01

    In this thesis we will question the perceptions of industrial risks in the occidental world at the beginning of the 21. century. For this purpose we will try to understand how concepts such as sustainable development, precautionary principle, liability, or even zero-risk bias have progressively developed around a thought model based on the scientific rationality. This model is now undermined by its incapacity to fully address the issues it raises and completely avoid the potential risks. However, despite consistent weaknesses, it remains a reference value moulded by past accidents which have led to the making of laws aiming mainly at defining liability and protecting those who are held liable. Thus, public information becomes a requirement for democracy and the protection of this thought model. In this context, the protagonists at stake are security-conscious, economical and political lobbies that constantly redefine the limits of risk acceptance. We come to the realization that our lifestyle and value system remain unchallenged even though undergoing a crisis. The specificity of this research lies into the importance we give to the local approach, dealing with registered Seveso sites and nuclear plants located in Indre et Loire. We have polled five categories of respondents through interviews or questionnaires in order to understand their opinion regarding situations involving technological risks. The result of this survey helps us understand and set the levels of risk acceptance that they define with regard to the industrial risks and show the complexity of a situation involving political stakes, environmental pressures, a profit-driven economy and security constraints, in a vague and complex context. This work gives us a contrasted picture of today's perceptions of risks. (author)

  14. Risk preferences over small stakes: Evidence from deductible choice

    Janko Gorter; Paul Schilp

    2012-01-01

    This paper provides new field evidence on risk preferences over small stakes. Using unique population and survey data on deductible choice in Dutch universal health insurance, we find that risk preferences are a dominant factor in decision aking. In fact, our results indicate that risk preferences are both statistically and quantitatively more significant in explaining deductible choice behavior than risk type. This finding contrasts with classical expected utility theory, as it implies risk ...

  15. Design Optimization and Fatigue Analysis of Laser Stake Welded Connections

    2008-06-01

    is ultimately envisioned that laser welding will be as common in the shipyard as other processes such -- as MIG, TIG and SMAW. Laser stake- welding of...input from conventional welding techniques can be detrimental to the polymer matrix composite material. In comparison, the laser welding process allows...more discrete frequencies. In the laser welding process , the photons are targeted on the work piece surface which needs to be welded . Highly

  16. Colloquium on the stakes and new realities of renewable energies

    2001-01-01

    Today, renewable energies represent 23% of the French energy production and should become a real advantage to overcome the greenhouse effect stakes and to optimize the durable development policy. This book brings together the interventions of the different participants to this colloquium on renewable energies. The following aspects were covered: how to make renewable energies profitable in the framework of an industrial facility; which specific renewable energy models would allow to overcome the greenhouse effect stake; how emission permits can incite to the use of renewable energies and reduce the pollution tax amount; how to take advantage of the new wastes valorization techniques in the rationalization of energy expenses; advantages and limitations of renewable energies in the on-site energy optimization; opportunities and stakes of the climate risk for renewable energies; last developments of the national regulatory framework applicable to renewable energies; status and perspectives of the European directive project on renewable energies; the suitability of renewable energies with respect to the energy needs of the industry and tertiary sectors; how to insert renewable energies in a durable development policy; how to exploit the diversity of renewable energies in order to maximize their economical and environmental potentialities; how to integrate the solar thermal and photovoltaic energies in the framework of a global environmental policy. (J.S.)

  17. Reconsidering the Impact of High-stakes Testing

    Henry Braun

    2004-01-01

    Full Text Available Over the last fifteen years, many states have implemented high-stakes tests as part of an effort to strengthen accountability for schools, teachers, and students. Predictably, there has been vigorous disagreement regarding the contributions of such policies to increasing test scores and, more importantly, to improving student learning. A recent study by Amrein and Berliner (2002a has received a great deal of media attention. Employing various databases covering the period 1990-2000, the authors conclude that there is no evidence that states that implemented high-stakes tests demonstrated improved student achievement on various external measures such as performance on the SAT, ACT, AP, or NAEP. In a subsequent study in which they conducted a more extensive analysis of state policies (Amrein & Berliner, 2002b, they reach a similar conclusion. However, both their methodology and their findings have been challenged by a number of authors. In this article, we undertake an extended reanalysis of one component of Amrein and Berliner (2002a. We focus on the performance of states, over the period 1992 to 2000, on the NAEP mathematics assessments for grades 4 and 8. In particular, we compare the performance of the high-stakes testing states, as designated by Amrein and Berliner, with the performance of the remaining states (conditioning, of course, on a state’s participation in the relevant NAEP assessments. For each grade, when we examine the relative gains of states over the period, we find that the comparisons strongly favor the high-stakes testing states. Moreover, the results cannot be accounted for by differences between the two groups of states with respect to changes in percent of students excluded from NAEP over the same period. On the other hand, when we follow a particular cohort (grade 4, 1992 to grade 8, 1996 or grade 4, 1996 to grade 8, 2000, we find the comparisons slightly favor the low-stakes testing states, although the discrepancy can

  18. Trans-Saharan geopolitics. The game and the stakes; Geopolitique transsaharienne. Le jeu et l'enjeu

    Chegrouche, L. [Universite Paris 1, 75 (France)

    2010-02-15

    The geopolitics of energy exports from the trans-Saharan region are similar to the Caspian great game' at the end of the last century. In North/West Africa as in West/Central Asia, the question of control over hydrocarbon reserves and lines of access to those reserves lies at the source of various conflicts. Rivalries are expressed through open and complex conflicts in which powers confront one another over oil-rich zones through proxy ethnic, religious or cultural groups, as dictated by the colossal economic interests at stake. The increasing number of conflicts - the Niger Delta, Darfur, the Azawak, etc. - is an illustration of this. The shock waves from this rivalry undermine regional peace and security, as well as the security of international energy supplies. The question here is to understand the game and the stakes of this trans-Saharan chess-board, to study its principal features and its energetic consequences. The national oil companies and states of the region can work around or through the geopolitical rifts caused by local rivalries and extra-regional appetites. There is therefore a need to understand the ways in which the players in the trans-Saharan 'great game' interact with one another, an to identifies the effects these interactions may have in the field of energy, in terms of potential reserves and transport projects. The TSGP is presented as an illustration of this geopolitical dynamics. (author)

  19. TRANSFERT THERMIQUE INSTATIONNAIRE DANS UN MUR TRICOUCHES SUBISSANT UN CHANGEMENT DE PHASE PAR SOLIDIFICATION.

    O Arfi

    2016-05-01

    Full Text Available Une étude numérique du transfert de chaleur instationnaire dans un mur tricouches est présentée. Le modèle physique est basé sur l’équation de conduction thermique unidirectionnelle en tenant compte des équations de couplages au niveau des interfaces et des conditions convectives de surfaces. Les équations de transfert sont données en représentation enthalpique pour le matériau à changement de phase (MCP, et en formulation générale pour les régions solides. La formulation adimensionnelle a permis de dégager les principaux paramètres affectant le transfert : nombre de Biot (Bi, nombre de Stephan (Ste et le degré de surchauffe (qm. La discrétisation des équations est réalisée en utilisant la méthode des volumes finis selon un schéma explicite. La solution numérique est obtenue par une méthode itérative basée sur la notion d’enthalpie critique. L’étude de l’influence de la condition convective chaude, gouvernée par  Bi¥,cet θ¥,c , a montré que la présence des couches solides affecte la cinétique de la solidification, les limites de la solidification et le transfert de chaleur par un effet de stockage et de déstockage d’énergie sensible. L’influence de la température θ¥,c sur le processus de changement de phase est fortement dépendante du nombre de Biot Bi¥,c.

  20. Changement climatique et domaines skiables: simulation en Savoie et Haute-Savoie à l’horizon 2015

    Jean-Christophe Loubier

    2007-03-01

    Full Text Available Les domaines skiables et le changement climatique posent des questions importantes et nouvelles pour les espaces montagnards. Dans les hautes vallées où ces domaines sont souvent le moteur principal du développement local, on peut s'interroger sur la pérennité du modèle économique de l'or blanc à moyen terme quand les modèles de simulation du climat tablent sur une élévation de la température moyenne comprise entre 1,5° et 5° en 2100. Nous avons tenté de simuler les effets du changement climatique à l'horizon 2015, sur les domaines skiables de Savoie et Haute Savoie.

  1. Caucasus and the petroleum stakes of Caspian Sea

    Jalillosoltan, N.

    2001-01-01

    The splitting of the former USSR block in 1991 has generated a shock wave in the Caucasus area with the will of all ex-soviet republics to reach their complete independence. Because of the historical and geographical complexity of Caucasus, both geopolitical and human, this disorder has generated even more hazardous results, enhanced by the coveted oil and gas reserves of the Caspian Sea. This article analyses the petroleum stakes as factors of rivalry and instability (sovereignty of oil and gas fields, rivalries about the exploitation and transport of hydrocarbons), but also as factors of cooperation and re-composition. (J.S.)

  2. Wind power: Areva acquires a 51% stake in Multibrid

    2007-01-01

    AREVA announced the acquisition of a 51% stake in Multibrid, a designer and manufacturer of multi-megawatt off-shore wind turbines based in Germany. With this acquisition, AREVA has entered into a joint venture with Prokon Nord, a German off-shore wind turbine and biomass plant developer and current owner of Multibrid. This transaction values Multibrid at euro 150 million. AREVA plans to rapidly further develop Multibrid's activities by giving the company access to its industrial resources, financial base and international commercial network. In return, Multibrid will provide AREVA with its leading-edge technology which, developed for 5 MW turbines, can achieve a very high output while reducing operating costs thanks to a simplified maintenance system. With this stake in Multibrid, AREVA aims to increase its presence on the offshore wind market that meets land settlement requirements and that should grow significantly in the years to come (from 300 MW in Europe today to an expected 1400 MW by 2011). As an exclusive supplier of Prokon Nord, Multibrid will participate in projects such as Borkum West (30 MW), the first offshore project in Germany, Borkum West 2 (400 MW), and Cote d'Albatre (105 MW), the first offshore wind farm project in France. The stake in Multibrid strengthens AREVA's strategic positioning on the CO 2 -free energy market, thanks to complementary solutions ranging from nuclear technologies to renewables. A number of recent achievements illustrate this strategy: - bio-energy (crucial energy supply in numerous rural areas): delivery of turnkey biomass power plants; ongoing construction of 10 plants in India, Thailand and Brazil; future development plans in fast-growing regions, such as Latin America; - wind power: Multibrid adds to the Group's stake in REpower and to its partnership with Suzlon for which AREVA is the number one supplier of transmission and distribution solutions for wind power; - hydrogen and fuel cells: design and manufacture of

  3. La modélisation intégrée des changements climatiques et les liens ...

    Les changements climatiques influencent la fréquence et l'intensité des phénomènes météorologiques extrêmes, exposant à la fois les populations et les économies à des pertes de vie, de productivité et de propriété. Ce projet aidera les planificateurs et les responsables des politiques à réagir de manière plus efficace en ...

  4. Globalisation et changement d’échelle dans le gouvernement urbain

    H.V. Savitch

    2007-10-01

    Full Text Available Cet article analyse les relations entre la mondialisation et le changement d’échelle urbaine. Il considère que les dynamiques à l’œuvre dans le processus de mondialisation (politiques néo-libérales, compétition territoriale, suburbanisation conduisent à de nouvelles contraintes pesant sur les villes. Une des réponses les plus pertinentes que les villes peuvent générer repose sur le changement d’échelle de leurs institutions en bâtissant de nouvelles structures ou en les restructurant pour renforcer leur capacité d’action. Ce processus conduit à reconfigurer les modes de gouvernance et donc le pouvoir urbain sur de nouvelles bases géographiques. Ce type de manipulation territoriale est un instrument qui agit sur l’allocation des ressources entre acteurs, en inclus certains, en exclue d’autres, établit de nouvelles priorités sur l’agenda politique. Cinq types de dynamiques institutionnelles sont présentées et analysées à partir de cas concrets: 1 les villes fusionnées 2 le gouvernement à plusieurs niveaux 3 la coopération partagée 4 les communautés urbaines et 5 les villes non contiguës. Une première évaluation est menée en tentant de mettre jour l’efficacité, le contrôle démocratique et la capacité à générer du développement économique respectifs de ces cinq modèles qui présentent tous des avantages et des inconvénients. Le recours à l’un ou l’autre de ces modèles s’explique essentiellement par les valeurs auxquels il renvoie et par des contingences politiques et économiques. Ils ne garantissent pas non plus un type particulier d’effet même si un changement d’échelle bien maîtrisé peut renforcer la position d’une ville face à la mondialisation.This article explores the relationship between globalization and urban rescaling. It suggests that forces emanating from globalization (neo liberal politics, increased competition, economic restructuring and suburbanization have

  5. Introducing Computer-Based Testing in High-Stakes Exams in Higher Education: Results of a Field Experiment

    Boevé, Anja J.; Meijer, Rob R.; Albers, Casper J.; Beetsma, Yta; Bosker, Roel J.

    2015-01-01

    The introduction of computer-based testing in high-stakes examining in higher education is developing rather slowly due to institutional barriers (the need of extra facilities, ensuring test security) and teacher and student acceptance. From the existing literature it is unclear whether computer-based exams will result in similar results as paper-based exams and whether student acceptance can change as a result of administering computer-based exams. In this study, we compared results from a computer-based and paper-based exam in a sample of psychology students and found no differences in total scores across the two modes. Furthermore, we investigated student acceptance and change in acceptance of computer-based examining. After taking the computer-based exam, fifty percent of the students preferred paper-and-pencil exams over computer-based exams and about a quarter preferred a computer-based exam. We conclude that computer-based exam total scores are similar as paper-based exam scores, but that for the acceptance of high-stakes computer-based exams it is important that students practice and get familiar with this new mode of test administration. PMID:26641632

  6. Introducing Computer-Based Testing in High-Stakes Exams in Higher Education: Results of a Field Experiment.

    Boevé, Anja J; Meijer, Rob R; Albers, Casper J; Beetsma, Yta; Bosker, Roel J

    2015-01-01

    The introduction of computer-based testing in high-stakes examining in higher education is developing rather slowly due to institutional barriers (the need of extra facilities, ensuring test security) and teacher and student acceptance. From the existing literature it is unclear whether computer-based exams will result in similar results as paper-based exams and whether student acceptance can change as a result of administering computer-based exams. In this study, we compared results from a computer-based and paper-based exam in a sample of psychology students and found no differences in total scores across the two modes. Furthermore, we investigated student acceptance and change in acceptance of computer-based examining. After taking the computer-based exam, fifty percent of the students preferred paper-and-pencil exams over computer-based exams and about a quarter preferred a computer-based exam. We conclude that computer-based exam total scores are similar as paper-based exam scores, but that for the acceptance of high-stakes computer-based exams it is important that students practice and get familiar with this new mode of test administration.

  7. Hiding behind High-Stakes Testing: Meritocracy, Objectivity and Inequality in U.S. Education

    Au, Wayne

    2013-01-01

    This paper analyses how high-stakes, standardised testing became the policy tool in the U.S. that it is today and discusses its role in advancing an ideology of meritocracy that fundamentally masks structural inequalities related to race and economic class. This paper first traces the early history of high-stakes testing within the U.S. context,…

  8. Student Motivation in Low-Stakes Assessment Contexts: An Exploratory Analysis in Engineering Mechanics

    Musekamp, Frank; Pearce, Jacob

    2016-01-01

    The goal of this paper is to examine the relationship of student motivation and achievement in low-stakes assessment contexts. Using Pearson product-moment correlations and hierarchical linear regression modelling to analyse data on 794 tertiary students who undertook a low-stakes engineering mechanics assessment (along with the questionnaire of…

  9. Small- and large-stakes risk aversion: implications of concavity calabration for decision theory

    Cox, J.C.; Sadiraj, V.

    2006-01-01

    A growing literature reports the conclusions that: (a) expected utility theory does not provide a plausible theory of risk aversion for both small-stakes and large-stakes gambles; and (b) this decision theory should be replaced with an alternative theory characterized by loss aversion. This paper

  10. Learning to Label: Socialisation, Gender, and the Hidden Curriculum of High-Stakes Testing

    Booher-Jennings, Jennifer

    2008-01-01

    Although high-stakes tests play an increasing role in students' schooling experiences, scholars have not examined these tests as sites for socialisation. Drawing on qualitative data collected at an American urban primary school, this study explores what educators teach students about motivation and effort through high-stakes testing, how students…

  11. Why Has High-Stakes Testing So Easily Slipped into Contemporary American Life?

    Nichols, Sharon L.; Berliner, David C.

    2008-01-01

    High-stakes testing is the practice of attaching important consequences to standardized test scores, and it is the engine that drives the No Child Left Behind (NCLB) Act. The rationale for high-stakes testing is that the promise of rewards and the threat of punishments will cause teachers to work more effectively, students to be more motivated,…

  12. High-Stakes Educational Testing and Democracy--Antagonistic or Symbiotic Relationship?

    Ydesen, Christian

    2014-01-01

    This article argues that high-stakes educational testing, along with the attendant questions of power, education access, education management and social selection, cannot be considered in isolation from society at large. Thus, high-stakes testing practices bear numerous implications for democratic conditions in society. For decades, advocates of…

  13. Billions at stake in climate finance: four key lessons

    Newell, Peter [University of East Anglia (United Kingdom); Roberts, J. Timmons [Brown University (United States); Boyd, Emily [University of Leeds (United Kingdom); Huq, Saleemul

    2009-11-15

    How can we break through the impasse on the road to Copenhagen? As the climate talks stall over the size of emissions cuts and who pays for them, it is increasingly clear that funding will be key to breaking the deadlock. Guaranteeing adequate levels of climate finance will be a deal maker or breaker for the poorest nations as the December summit approaches. But on the brink of a new chapter in climate funding, with unprecedented flows at stake, donor countries need to learn from decades of aid experience – mistakes as well as successes. Failure to do this risks wasting a great opportunity to kickstart low-carbon, climate-resilient development for the world's poor.

  14. Stakes and modalities of the climatic risk covering

    Marteau, D.

    2006-01-01

    Several econometric works show that climatic volatility is at the first rank of the risk factors in several economic sectors like energy, textile, agriculture and food, tourism, leisure, building industries etc. However, climate remains an underestimated economic factor for several reasons: lack of awareness about the comparative stakes of climate risks management and market risks management, difficulties in the measurement of climate risk exposure, weak knowledge of covering techniques for private contract and organized markets, and unsolved question of risk sharing between shareholders and managers. This document analyzes the sensitivity of companies with respect to climate risk and describes the 5 steps of implementation of a climate covering policy: risk exposure measurement, risk bearing or transfer decision, definition of the optimum covering profile, choice of markets and covering instruments, efficiency measurement. A practical example is shown with its related questions. (J.S.)

  15. Biofuels: stakes, perspectives and researches; Biocarburants: enjeux, perspectives et recherches

    Appert, O.; Ballerin, D.; Montagne, X.

    2004-07-01

    The French institute of petroleum (IFP) is a major intervener of the biofuels sector, from the production to the end-use in engines. In this press conference, the IFP takes stock of the technological, environmental and economical stakes of today and future biofuel production processes and of their impact on transports. This document gathers 2 presentations dealing with: IFP's research strategy on biofuels (transparencies: context; today's processes: ethanol, ETBE, bio-diesel; tomorrows processes: biomass to liquid; perspectives), bio-diesel fuel: the Axens process selected by Diester Industrie company for its Sete site project of bio-diesel production unit. The researches carried out at the IFP on biofuels and biomass are summarized in an appendix: advantage and drawbacks of biofuels, the ethanol fuel industry, the bio-diesel industry, biomass to liquid fuels, French coordinated research program, statistical data of biofuel consumption in France, Spain and Germany. (J.S.)

  16. EVALUASI PROGRAM PEMBELAJARAN IPA SMP MENGGUNAKAN MODEL COUNTENANCE STAKE

    Astin Lukum

    2015-06-01

    THE EVALUATION OF SCIENCE TEACHING ON JUNIOR HIGH SCHOOL USING STAKE’S COUNTENANCE MODEL Abstract The purpose of the study was to describe the science learning program on junior high school in Bone Bolanga district based on the Regulation of Minister of Education and Culture of the Republic of Indonesia, Number 65 of 2013 about Processing Standard of Primary and Secondary Education. This study used Stake’s Countanance evaluation model. The data were collected using observation, interview and documentation techniques. The conclusion was: (1 the planning of science learning was categorized fair (68%, it was found that lesson plan was not in accordance with the learning processing standard. (2 The implementation of science learning was categorized fair (57%, that unconformitted with learning processing implementation standard. (3 Student learning outcomes have not met the completeness of minimum criteria (KKM that categorized enough (65% and (4 There were the contingency of planing learning proces and outcome. Keywords: Program Evaluation, Stake's Countenance, Science Learning

  17. Security as a Power Element within Contemporary International Relations

    Gabor Gabriel

    2015-06-01

    Full Text Available Today, more than ever, in a globalized and constantly changing world, Europe has to face new stakes and challenges. The globalization, climate change, power supply and the new threats to security are challenges that Europe of the XXIst century has to cope with. The early XXIst century coincides with a new era in the international politics, the future evolution of the worls and the new international order, with the economy and security being the central spots.

  18. High stakes. HITECH's privacy provisions will make costly security breaches even more painful to bear.

    Gamble, Kate Huvane

    2009-07-01

    * The HITECH section of ARRA includes provisions relating to protected health information that could significantly alter the C-suite leader's strategy. * Patients will be entitled to request an accounting of disclosure for up to three years after the date of request. The onus will be on hospital leaders to put in place a process that makes accounting available without disrupting operations or patient care. * Because of the increased risks hospitals now face, it is critical that executives are aware of the new requirements, and are either involved in or have a solid understanding of the organization's breach notification policies.

  19. Failure to End the Kivu Conflict: Is Rwanda’s Security and Stability at Stake?

    2011-12-16

    faculty: Mr. Dave Seigel, Mr. Bill Latham, Mr. Gene King, Dr. Randy Mullis, and Lt Col White. My thanks also go out to my colleagues of Staff Group 2A who...ruled by the “Mafia- 17 type” organizations serving the selfish interests of Mobutu and his entourage, he continues to say. The same view is

  20. Communication des organisations, territoires et TIC au coeur du changement et du développement durable

    DEBOS, Franck; BOILLOT, Florence

    2014-01-01

    Notre point de départ est que l'organisation, ' entreprises, collectivités, ONG, institution territoriale, etc.', tend à se revendiquer écocitoyenne, ce qui sous-tend qu'elle s'arroge un rôle d'animateur de territoire, facteur d'innovation et de changement dans le domaine public, professionnel mais aussi privé (De Backer, 1998 ; Cohen-Bacrie, 2006). Dans un contexte de crises économiques répétitives depuis l'éclatement de la bulle Internet en 2000 avec comme points d'orgue la crise des « Subp...

  1. Implications of Fuzziness for the Practical Management of High-Stakes Risks

    Mark Jablonowski

    2010-04-01

    Full Text Available High-stakes (dangerous, catastrophic risks take on a wider profile as progress unfolds. What are the impacts of technological and social change on the risk landscape? Due to the complexities and dynamics involved, we can only answer these questions approximately. By using the concept of fuzziness, we can formalize our imprecision about high-stakes risk, and therefore place their management on a stronger footing. We review here the impacts of fuzziness, i.e., knowledge imperfection, on high-stakes risk management, including its implementation via computationally intelligent decision aids.

  2. Lutte contre le changement climatique et maîtrise de la demande d’énergie : introduction au dossier thématique

    Aubrée, Loïc; Calvo-Mendieta, Iratxe

    2017-01-01

    Cet article constitue l’introduction du dossier thématique consacré à la lutte contre le changement climatique et la maîtrise de la demande d’énergie. Après un dossier de la Revue Développement Durable et Territoires, paru en décembre 2015 et en juillet 2016, abordant la question du climat sous l’angle de l’adaptation, les articles de ce dossier s’intéressent aux politiques, aux programmes et aux instruments qui contribuent à l’atténuation du changement climatique. L’objectif est la diminutio...

  3. Management of radioactive materials and wastes: status, stakes and perspectives

    Champion, Didier; Devin, Patrick; Tanguy, Loic; Bernard, Herve; Minon, Jean-Paul; Leclaire, Arnaud; Gilli, Ludivine; Lheureux, Yves; Pescatore, Claudio; Barbey, Pierre; Schneider, Thierry; Gay, Didier; Forest, Isabelle; Hemidy, Pierre-Yves; Baglan, Nicolas; Desnoyers, Bruno; Pieraccini, Michel; Poncet, Philippe; Seguin, Bertille; Calvez, Marianne; Leclerc, Elisabeth; Bancelin, Estelle; Fillion, Eric; Segura, Yannick; Vernaz, Etienne; Granier, Guy; De Preter, Peter; Petitfrere, Michael; Laye, Frederic; Nakamura, Takashi; Gin, Stephane; Lebaron-Jacobs, Laurence; Dinant, Sophie; Vacquier, Blandine; Crochon, Philippe; Griffault, Lise; Smith, Graham

    2013-10-01

    These technical days were organized by the Environment section of the French Society of Radiation Protection (SFRP). Time was given to some exchange about the societal aspects of radioactive waste management as well as about the legal context but the most part of the debates delt with the actual management modalities of the different types of wastes, both in France and in foreign countries, and with the related stakes, in particular in terms of impact. This document brings together the presentations (slides) of the following talks: - Contributions of radiation protection to the long-term safety management of radioactive wastes (Jean-Paul MINON - ONDRAF); - The national inventory of radioactive materials and wastes (Arnaud LECLAIRE - ANDRA); - The high activity, medium activity-long living wastes in debate - a co-building approach (ANCCLI/Clis of Bure/IRSN) to share stakes, enlighten, and develop thought (Ludivine GILLI - IRSN, Yves LHEUREUX - ANCCLI); - Social aspects of Radioactive Waste Management - The International Learning (Claudio PESCATORE - AEN/OCDE); - Citizens involvement and ACRO's point of view on radioactive wastes management (Pierre BARBEY - ACRO); - New CIPR recommendations about the geologic disposal of long-living radioactive wastes (Thierry SCHNEIDER - CEPN); - Overview of processes under the views of radiation protection principles (Didier GAY - IRSN); - The national plan of radioactive materials and wastes management (Loic TANGUY - ASN); - Joint convention on spent fuel management safety and on radioactive waste management safety - status and main stakes (Isabelle FOREST - ASN); - Transport of radioactive wastes (Bruno DESNOYERS - AREVA); - Optimisation and limitation of the environmental impacts of very-low level wastes - valorisation and processes selection (Michel PIERACCINI - EDF), Philippe PONCET - AREVA); - Management of hospital wastes - Example of Montpellier's University Regional Hospital (Bertille SEGUIN - CHRU de Montpellier); - Waste

  4. Changements climatiques au Maroc: quels systèmes de culture et quelles biotechnologies pour s’y adapter ?

    Abdelhadi AIT HOUSSA

    2017-09-01

    scale use of seawater in agriculture or finding new salinity tolerant cultivars. In Morocco, we should think of desalinization with renewable energies (solar, wind and the use of this water mainly in coastal areas where climate, land quality, sun and wind are adequate to these projects. To anticipate the future of food security of the country, attention should be given to the use of readily available resources to overcome the structural deficit in wheat starch and animal protein. The study suggests the use of other starch sources that Morocco can produce easily such as potato. For animal protein, we suggest fisheries resources which are still underused by the population. Résumé On présente une étude prospective concernant l’impact probable des changements climatiques sur les systèmes de culture et d’élevage au Maroc. D’après le constat de terrain et dans les limites de ce que signifie ce genre d’étude, l’effet direct du réchauffement climatique peut conduire à terme (et c’est déjà le cas dans certaines contrées à la nécessité d’une redistribution variétale pour des espèces exigeantes en froid comme les rosacées. Des variétés de pomme, telle que le groupe des Golden, risquent de disparaître des montagnes pour laisser la place à d’autres moins exigeantes comme le groupe des Gala. Le bananier et l’avocatier risquent de migrer vers les régions un peu plus continentales, l’olivier et les agrumes un peu plus vers le pied de la montagne. Le réchauffement climatique peut aussi obliger à faire évoluer les systèmes d’élevage et de culture en faisant déplacer la frontière de la sécheresse un peu plus vers le centre et le nord du pays; l’aride serait peut-être envahi par la désertification, le semi-aride passerait en partie à l’étage aride et le Bour dit favorable en partie dans le semi-aride. Comme corollaire à ce changement, il faudrait s’attendre à une perte de potentiel de ressources en eau qui obligerait

  5. Alternative security

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  6. Homeland Security

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  7. What does social research say about high-stakes tests?

    Rafael Feito Alonso

    2017-03-01

    Full Text Available High-stake tests, which students need to pass in order to gain a Secondary education certificate, have aroused a lot of controversy whenever they have been implemented. Especially in the USA these tests have produced a dramatic shrinking of school knowledge as they have been focused into questions posed by the very tests. At the same time, there has been a critical modification of the learning processes due to the fact that these tests encourage students to pay more attention to factual knowledge, which is far away from hands-on learning, debating in class or working in teams. In spite of certain discrepancies, by and large, research casts serious doubts about whether these tests are conductive to better academic performance. Nevertheless, the dropout rate is on the rise. More often than not, school principals have been found preventing struggling students to sit the exams. A review of the research into this matter allows us to put into context the debate surrounding external exams posed by the current education law (LOMCE: Law for the Improvement of Educational Quality passed by the parliamentary majority of the Popular Party in Spain in 2013.

  8. The stakes of the park management in the lasting quality

    Caseau, P.

    1996-01-01

    The goal of this paper is to surround the stakes of the management in the lasting quality and not to give a table of problems. The actual situation shows two characteristics; the profit margins in the nuclear industry are very small, the economic growth is small too. The advantage of the operating park on any other kind electric source is extremely strong. So it is important to keep the actual park even if operating and maintenance costs increase. If a forty years life time allows to go until 2020 and fifty years until 2030 it is possible to consider that the comparison 'installed park cost/any other production mean cost' leads to keep the actual park until 2015-2025. The first reason is an economic reason. The second reason is connected to what will happen after, that is to say the replacement conditions.To be able to define in the best conditions a new park, devoted to last 60 years or more, that is the second reason to manage the actual park in the lasting quality. (N.C)

  9. Rich, poor share stake in poverty, pollution link

    DeCanio, S.J.

    1993-01-01

    A dirty environment and poverty go together, and this link between environmental protection and economic development is creating a new basis for international cooperation, says Stephen J. DeCanio of the University of California at Santa Barbara. open-quotes Both developed and developing countries have a stake in solving the development/environment impasse,close quotes DeCanio adds. open-quotes Furthermore, the link between these problems offers a fresh opportunity to make progress on both fronts.close quotes He says environmental protection expenditures by developed countries can be used to promote the sustainable economic growth of those countries struggling to escape from poverty. The money could be collected in several ways, he notes: from various types of environmental taxes, such as a carbon tax; from environmental user fees; from open-quotes debt-for natureclose quotes swaps; and from tradable emissions permits. Such mechanisms transfer resources to developing countries, where they can be applied to economic development-a desired objective, according to DeCanio. open-quotes The benefits of equitable worldwide growth and development outweigh any temporary loss of wealth developed countries may experience as a result of environmental transfers,close quotes he asserts

  10. High School Students with Learning Disabilities: Mathematics Instruction, Study Skills, and High Stakes Tests

    Steele, Marcee M.

    2010-01-01

    This article reviews characteristics of high school students with learning disabilities and presents instructional modifications and study skills to help them succeed in algebra and geometry courses and on high stakes mathematics assessments.

  11. Les ecarts de financement en matiere d'adaptation aux changements climatiques - avec la perspective des CPDN

    Olhoff, Anne; Bee, Skylar; Puig, Daniel

    En 2014, le Programme des Nations Unies pour l’Environnement (PNUE) a publié son premier rapport sur les écarts entre besoins et perspectives en matière d’adaptation (AGR 2014) (PNUE, 2014), lequel a permis de poser un cadre préliminaire pour évaluer ces écarts et d’établir une évaluation...... rapport sur les écarts financiers et les options permettant de les combler. Le rapport sera publié au printemps 2016. Cette mise à jour doit contribuer aux débats lors de la 21ème session de la Conférence des Parties (COP 21) à la Convention-Cadre des Nations Unies sur les Changements Climatiques (CCNUCC...... les besoins de financement présentes dans les composantes adaptation des Contributions Prévues Déterminées au niveau National (CPDN) (INDC) – soit les engagements post 2020 que les pays se proposent mettre en oeuvre dans le cadre d’un nouvel accord mondial sur les changements climatiques....

  12. China’s Air Defense Identification Zone: Concept, Issues at Stake and Regional Impact

    2013-12-23

    early Chinese legal culture ” Karen Turner “War, Punishment, and The Law of Nature in Early Chinese Concepts of The State”, Harvard Journal of Asiatic...lack of strategic direction, moral relativism , a failure to gauge the significance of what is at stake, and distraction with events in other regions of...WORKING PAPER 1 posted 23 December 2013 CHINA’S AIR DEFENSE IDENTIFICATION ZONE: CONCEPT , ISSUES AT STAKE AND REGIONAL IMPACT

  13. Large Stroke High Fidelity PZN-PT Single-Crystal "Stake" Actuator.

    Huang, Yu; Xia, Yuexue; Lin, Dian Hua; Yao, Kui; Lim, Leong Chew

    2017-10-01

    A new piezoelectric actuator design, called "Stake" actuator, is proposed and demonstrated in this paper. As an example, the stake actuator is made of four d 32 -mode PZN-5.5%PT single crystals (SCs), each of 25 mm ( L ) ×8 mm ( W ) ×0.4 mm (T) in dimensions, bonded with the aid of polycarbonate edge guide-cum-stiffeners into a square-pipe configuration for improved bending and twisting strengths and capped with top and bottom pedestals made of 1.5-mm-thick anodized aluminum. The resultant stake actuator measured 9 mm ×9 mm ×28 mm. The hollow structure is a key design feature, which optimizes SC usage efficiency and lowers the overall cost of the actuator. The displacement-voltage responses, blocking forces, resonance characteristics of the fabricated stake actuator, as well as the load and temperature effects, are measured and discussed. Since d 32 is negative for [011]-poled SC, the "Stake" actuator contracts in the axial direction when a positive-polarity field is applied to the crystals. Biased drive is thus recommended when extensional displacement is desired. The SC stake actuator has negligible (0.13% when driven up to +300 V (i.e., 0.75 kV/mm), which is close to the rhombohedral-to-orthorhombic transformation field ( E RO ) of 0.85 kV/mm of the SC used. The stake actuator displays a stroke of [Formula: see text] (at +300 V) despite its small overall dimensions, and has a blocking force of 114 N. The SC d 32 stake actuator fabricated displays more than 30% larger axial strain than the state-of-the-art PZT stack actuators of comparable length as well as moderate blocking forces. Said actuators are thus ideal for applications when large displacements with simple open-loop control are preferred.

  14. Security Dilemma

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  15. Inquiry-Based Instruction and High Stakes Testing

    Cothern, Rebecca L.

    Science education is a key to economic success for a country in terms of promoting advances in national industry and technology and maximizing competitive advantage in a global marketplace. The December 2010 Program for International Student Assessment (PISA) ranked the United States 23rd of 65 countries in science. That dismal standing in science proficiency impedes the ability of American school graduates to compete in the global market place. Furthermore, the implementation of high stakes testing in science mandated by the 2007 No Child Left Behind (NCLB) Act has created an additional need for educators to find effective science pedagogy. Research has shown that inquiry-based science instruction is one of the predominant science instructional methods. Inquiry-based instruction is a multifaceted teaching method with its theoretical foundation in constructivism. A correlational survey research design was used to determine the relationship between levels of inquiry-based science instruction and student performance on a standardized state science test. A self-report survey, using a Likert-type scale, was completed by 26 fifth grade teachers. Participants' responses were analyzed and grouped as high, medium, or low level inquiry instruction. The unit of analysis for the achievement variable was the student scale score average from the state science test. Spearman's Rho correlation data showed a positive relationship between the level of inquiry-based instruction and student achievement on the state assessment. The findings can assist teachers and administrators by providing additional research on the benefits of the inquiry-based instructional method. Implications for positive social change include increases in student proficiency and decision-making skills related to science policy issues which can help make them more competitive in the global marketplace.

  16. After Kyoto: equity stakes and efficiency in the negotiation on the climatic change; Au-dela de Kyoto: enjeux d'equite et d'efficacite dans la negociation sur le changement climatique

    Blanchard, O.; Criqui, P.; Viguier, L. [Institut d' Economie et de Politique de l' Energie - IEPE-CNRS/ Universite Pierre Mendes-France, 38 - Grenoble (France); Trommetter, M. [Institut National de Recherches Agronomiques (INRA), 38 - Grenoble (France)

    2000-07-01

    The first difficulty to get over in the international negotiation on the climatic change, has been and still remain the distribution of the efforts and the research of the equity in the objective determination. This paper aims to show that facing the different interests of each countries, a single rule of differentiation is not possible. The first part is a review of the different charts of the objectives differentiation discussed or proposed in the international negotiation process on the greenhouse effect. It aims to find a bond between the the charts and the equity. The second part proposes the quantification of a scenario of the emission licenses attribution for 2030 for all the world countries. (A.L.B.)

  17. Challenges to regional security and disarmament measures

    Clements, K.P.

    1993-01-01

    The new agenda for peace is providing an extremely useful road map for current international and regional discussions about new ways and means of securing and maintaining peace and security. It underlines the central role of the United nations Security Council in relation to international conflicts and the maintenance of the peace, but it underlines an increasingly important role of the regional organisations as well. In all, there is a recognition that the end of the cold war has generated possibilities for peace-building that have not existed before. To take advantage of these opportunities requires an enhancement of consultation and dialogue at national, regional and global levels so that all nations and all peoples feel and know that they have a stake in the new peace and security architecture that will govern international relations into the twenty first century

  18. Les discours de François Hollande (2009-2012: la force axiologico-affective du changement

    Maria Immacolata Spagna

    2014-03-01

    Full Text Available Abstract – Within the field of argumentative analysis, our purpose is to underline the function and the effectiveness of the axiological-emotional content of the change proposed by François Hollande in his speeches (2009-2012.On the basis of the emotional orientation, given in a dysphoric register towards the previous government and in a euphoric one towards the auspicious future, the argumentation of the change claimed by the “normal” president is based on values. To not change would mean to accept the current situation and therefore all its negative values.Putting the reader in a condition of emotional tension with the aim of energizing him to find a remedy, Hollande’s proposition becomes, thus, a call to action, an implicit request for social, politic and moral engagement, to change the course of history and to realize a better future. Keywords: Argumentation, political discourse, emotion, axiological, change.  Résumé – Dans le cadre de l’analyse argumentative, cet article vise à souligner la fonction et l’efficacité de la charge axiologico-affective du changement proposé par François Hollande dans ses discours (2009-2012.Sur la base de l’orientation émotionnelle, donnée dans un registre dysphorique à l’égard du gouvernement passé et euphorique vers l’avenir prometteur, l’argumentation du changement invoqué par le président “normal” se fonde sur les valeurs. Ne pas changer signifierait accepter la situation actuelle et, par là, toutes ces valeurs négatives.Mettant le lecteur dans une condition de tension émotive pour le motiver à trouver un remède, la proposition de Hollande devient ainsi un appel à agir, une requête implicite d’engagement social, politique et moral pour changer le cours de l’histoire et réaliser un futur meilleur. Mots clés: argumentation, discours politique, émotion, axiologique, changement

  19. Cognitive Psychology and Low-Stakes Testing without Guarantees

    Dennis, Nick

    2016-01-01

    The emphasis on the power of secure substantive knowledge reflected in recent curriculum reforms has prompted considerable interest in strategies to help students retain and deploy such knowledge effectively. One strategy that has been strongly endorsed by some cognitive psychologists is regular testing; an idea that Nick Dennis set out to test…

  20. Emigration, mutations sociales et changements culinaires en pays mixtèque (Oaxaca, Mexique

    Esther Katz

    2008-05-01

    Full Text Available Comme dans d’autres régions du Mexique, les paysans du haut pays mixtèque (Etat d’Oaxaca ne vivent pratiquement plus de l’agriculture, sinon des revenus de leurs parents émigrés aux États-Unis. Dans la région, le phénomène de la migration a énormément augmenté au cours des dix dernières années. Comme la majorité des jeunes adultes émigrent, de nombreux foyers ne sont plus composés que de la mère et des enfants ou des grands-parents et des petits-enfants. Avec des ressources monétaires plus importantes, l’équipement des cuisines se modernise, impliquant des bouleversements techniques dans les préparations culinaires ; la consommation de viande et d’aliments industriels augmente tandis que celle de légumes spontanés diminue. Simultanément, divers programmes de développement, impulsés par le gouvernement, provoquent des changements profonds au niveau de l’économie familiale, de l’organisation sociale et du rôle des femmes. Actuellement le statut économique des familles ne dépend plus de l’étendue de leurs terres, mais du nombre de leurs membres qui travaillent « au Nord ». Néanmoins, le riche patrimoine culinaire de cette population est préservé, en particulier à l’occasion des repas festifs.Emigration, Social Mutations And Food Changes In The Mixtec Highlands (Oaxaca, MexicoLike in many regions of Mexico, farmers of the Mixtec Highlands, for the most part, no longer make a living from agriculture, but rather rely on money sent home by migrant family members. People from this region have been migrating for several decades, but this phenomenon, now mainly to the United States, has tremendously increased in the past ten years. Since most young adults have migrated, many households are composed of mothers and children or grandparents and grandchildren. As more monetary resources are available, the kitchen equipment is more modern, resulting in technical changes in culinary preparations. Meat and

  1. Securing SQL Server Protecting Your Database from Attackers

    Cherry, Denny

    2011-01-01

    There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protec

  2. Security Evolution.

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  3. Communication des organisations, territoires et TIC au cœur du changement et du développement durable

    Debos , Franck; BOILLOT , F

    2014-01-01

    Il s'agit d'une réflexion issue des travaux de recherche d'une des axes du laboratoire I3M; Notre point de départ est que l’organisation, – entreprises, collectivités, ONG, institution territoriale, etc.—, tend à se revendiquer écocitoyenne, ce qui sous-tend qu’elle s’arroge un rôle d’animateur de territoire, facteur d’innovation et de changement dans le domaine public, professionnel mais aussi privé (De Backer, 1998 ; Cohen-Bacrie, 2006). Dans un contexte de crises économiques répétitives de...

  4. The effect of $1, $5 and $10 stakes in an online dictator game.

    Raihani, Nichola J; Mace, Ruth; Lamba, Shakti

    2013-01-01

    The decision rules underpinning human cooperative behaviour are often investigated under laboratory conditions using monetary incentives. A major concern with this approach is that stake size may bias subjects' decisions. This concern is particularly acute in online studies, where stakes are often far lower than those used in laboratory or field settings. We address this concern by conducting a Dictator Game using Amazon Mechanical Turk. In this two-player game, one player (the dictator) determines the division of an endowment between himself and the other player. We recruited subjects from India and the USA to play an online Dictator Game. Dictators received endowments of $1, $5 or $10. We collected two batches of data over two consecutive years. We found that players from India were less generous when playing with a $10 stake. By contrast, the effect of stake size among players from the USA was very small. This study indicates that the effects of stake size on decision making in economic games may vary across populations.

  5. The effect of $1, $5 and $10 stakes in an online dictator game.

    Nichola J Raihani

    Full Text Available The decision rules underpinning human cooperative behaviour are often investigated under laboratory conditions using monetary incentives. A major concern with this approach is that stake size may bias subjects' decisions. This concern is particularly acute in online studies, where stakes are often far lower than those used in laboratory or field settings. We address this concern by conducting a Dictator Game using Amazon Mechanical Turk. In this two-player game, one player (the dictator determines the division of an endowment between himself and the other player. We recruited subjects from India and the USA to play an online Dictator Game. Dictators received endowments of $1, $5 or $10. We collected two batches of data over two consecutive years. We found that players from India were less generous when playing with a $10 stake. By contrast, the effect of stake size among players from the USA was very small. This study indicates that the effects of stake size on decision making in economic games may vary across populations.

  6. Correlates of cooperation in a one-shot high-stakes televised prisoners' dilemma.

    Maxwell N Burton-Chellew

    Full Text Available Explaining cooperation between non-relatives is a puzzle for both evolutionary biology and the social sciences. In humans, cooperation is often studied in a laboratory setting using economic games such as the prisoners' dilemma. However, such experiments are sometimes criticized for being played for low stakes and by misrepresentative student samples. Golden balls is a televised game show that uses the prisoners' dilemma, with a diverse range of participants, often playing for very large stakes. We use this non-experimental dataset to investigate the factors that influence cooperation when "playing" for considerably larger stakes than found in economic experiments. The game show has earlier stages that allow for an analysis of lying and voting decisions. We found that contestants were sensitive to the stakes involved, cooperating less when the stakes were larger in both absolute and relative terms. We also found that older contestants were more likely to cooperate, that liars received less cooperative behavior, but only if they told a certain type of lie, and that physical contact was associated with reduced cooperation, whereas laughter and promises were reliable signals or cues of cooperation, but were not necessarily detected.

  7. Staking solutions to tube vibration problems (developed by Technos et Compagnie - FRANCE)

    Hewitt, E.W.; Bizard, A.; Horn, M.J.

    1989-01-01

    Electric generating plant steam surface condensers have been prone to vibration induced tube failures. One common and effective method for stopping this vibration has been to insert stakes into the bundle to provide additional support. Stakes have been fabricated of a variety of rigid and semi-rigid materials of fixed dimensions. Installation difficulties and problems of incomplete tube support have been associated with this approach. New developments in the application of plastic technology has offered another approach. Stakes made of plastic tubes which are flattened, by evacuation, at the time of manufacture may now be easily inserted into the tube bundle. After insertion, the vacuum is released and the memory of the plastic causes the stakes to expand and assume their original form. The spring force of the plastic cradles the adjacent condenser tubes and stops the vibration. Developed for Electricite de France (EDF), the stakes are currently installed in 19 units of the French utility system, and two units in the United States

  8. Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance

    Mather, Tim; Latif, Shahed

    2009-01-01

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn deta

  9. Does high-stakes testing increase cultural capital among low-income and racial minority students?

    Won-Pyo Hong

    2008-03-01

    Full Text Available This article draws on research from Texas and Chicago to examine whether high-stakes testing enables low-income and racial minority students to acquire cultural capital. While students' performance on state or district tests rose after the implementation of high-stakes testing and accountability policies in Texas and Chicago in the 1990s, several studies indicate that these policies seemed to have had deleterious effects on curriculum, instruction, the percentage of students excluded from the tests, and student dropout rates. As a result, the policies seemed to have had mixed effects on students' opportunities to acquire embodied and institutionalized cultural capital. These findings are consistent with the work of Shepard (2000, Darling-Hammond (2004a, and others who have written of the likely negative repercussions of high-stakes testing and accountability policies.

  10. The European Union as an Area of Freedom, Security and Justice

    Fletcher, Maria; Herlin-Karnell, Ester; Matera, Claudio

    2016-01-01

    Europe’s area of freedom, security and justice is of increasing importance in contemporary EU law and legislation. It is worthy of special research attention because of its high-stakes content (particularly from an individual and a state perspective) and because its development to date has

  11. Adaptation à la variabilité du climat et aux changements climatiques ...

    25 avr. 2014 ... ... l'équipe évalue la disponibilité et la qualité de l'eau, les pressions de l'offre et de ... En ce qui concerne l'offre, les chercheurs étudient l'évolution de la .... Water management and food security in vulnerable regions of China.

  12. Teacher and headmaster attitudes towards benchmarking and high-stakes testing in adult teaching in Denmark

    Petersen, Karen Bjerg

    Based on research, surveys and interviews the paper traces teacher and headmaster attitudes towards the introduction of benchmarking and high-stakes language testing introduced in the wake of a neo-liberal education policy in adult teaching for migrants in Denmark in the 2000s. The findings show...... students, reduced use of both project work and non test related activities and stressful working conditions....... that the majority of teachers and headmasters reject benchmarking. Meanwhile, due to both headmasters and language teachers the introduction of high stakes language testing has had an immense impact on the organization, content and quality of adult language teaching. On the one side teachers do not necessarily...

  13. The myth of secure computing.

    Austin, Robert D; Darby, Christopher A

    2003-06-01

    Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.

  14. Stakes and consequences of the opening of energy markets

    Anon.

    2002-01-01

    This colloquium on the European energy market was organized by the group of energy studies of the commission of economic affairs of the French Senate. The aim of the colloquium was to debate the industrial organization of France in the context of opened energy markets. This article summarizes the point of view of the different participants concerning: the security of energy supplies, the situation of the opening of energy markets in the different European countries, the role of market regulation authorities, the necessary evolutions, the legal risks linked with open markets, and the examples of the German and US markets. (J.S.)

  15. Financial security

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  16. Cyber security

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  17. Canadian Public and Stake holder Engagement Approach to a Spent Nuclear Fuel Management

    Hwang, Yong Soo; Kim, Youn Ok [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Whang, Joo Ho [Kyunghee University, Yongin (Korea, Republic of)

    2008-09-15

    After Canada has struggled with a radioactive waste problem over for 20 years, the Canadian government finally found out that its approach by far has been lack of social acceptance, and needed a program such as public and stake holder engagement (PSE) which involves the public in decision-making process. Therefore, the government made a special law, called Nuclear Fuel Waste Act (NFWA), to search for an appropriate nuclear waste management approach. NFWA laid out three possible approaches which were already prepared in advance by a nuclear expert group, and required Nuclear Waste Management Organization (NWMO) to be established to report a recommendation as to which of the proposed approaches should be adopted. However, NFWA allowed NWMO to consider additional management approach if the other three were not acceptable enough. Thus, NWMO studied and created a fourth management approach after it had undertaken an comparison of the benefits, risks and costs of each management approach: Adaptive Phased Management. This approach was intended to enable the implementers to accept any technological advancement or changes even in the middle of the implementation of the plan. The Canadian PSE case well shows that technological R and D are deeply connected with social acceptance. Even though the developments and technological advancement are carried out by the scientists and experts, but it is important to collect the public opinion by involving them to the decision-making process in order to achieve objective validity on the R and D programs. Moreover, in an effort to ensure the principles such as fairness, public health and safety, security, and adoptability, NWMO tried to make those abstract ideas more specific and help the public understand the meaning of each concept more in detail. Also, they utilized a variety of communication methods from face-to-face meeting to e-dialogue to encourage people to participate in the program as much as possible. Given the fact that Korea

  18. Canadian Public and Stake holder Engagement Approach to a Spent Nuclear Fuel Management

    Hwang, Yong Soo; Kim, Youn Ok; Whang, Joo Ho

    2008-01-01

    After Canada has struggled with a radioactive waste problem over for 20 years, the Canadian government finally found out that its approach by far has been lack of social acceptance, and needed a program such as public and stake holder engagement (PSE) which involves the public in decision-making process. Therefore, the government made a special law, called Nuclear Fuel Waste Act (NFWA), to search for an appropriate nuclear waste management approach. NFWA laid out three possible approaches which were already prepared in advance by a nuclear expert group, and required Nuclear Waste Management Organization (NWMO) to be established to report a recommendation as to which of the proposed approaches should be adopted. However, NFWA allowed NWMO to consider additional management approach if the other three were not acceptable enough. Thus, NWMO studied and created a fourth management approach after it had undertaken an comparison of the benefits, risks and costs of each management approach: Adaptive Phased Management. This approach was intended to enable the implementers to accept any technological advancement or changes even in the middle of the implementation of the plan. The Canadian PSE case well shows that technological R and D are deeply connected with social acceptance. Even though the developments and technological advancement are carried out by the scientists and experts, but it is important to collect the public opinion by involving them to the decision-making process in order to achieve objective validity on the R and D programs. Moreover, in an effort to ensure the principles such as fairness, public health and safety, security, and adoptability, NWMO tried to make those abstract ideas more specific and help the public understand the meaning of each concept more in detail. Also, they utilized a variety of communication methods from face-to-face meeting to e-dialogue to encourage people to participate in the program as much as possible. Given the fact that Korea

  19. Expectations of stake holders voice from the location

    Shinada, H.

    2007-01-01

    In this presentation, the expectations for transparency of the nuclear regulatory authorities are discussed from the viewpoint of a local government, where the nuclear power station is sited. Since the problems yet to be solved by the local government, are visibly existent right in front of our eyes, both the policy information and the technical information required for that purpose must he altogether trustworthy. Consequently, established transparency of the regulatory authorities is also an extremely important point for the local government. To begin with, the outline of Kariwa-mura, Kariwa-gun, Niigata Prefecture, where I myself serve as village mayor, the overview of the Kashiwazaki-Kariwa Nuclear Power Station and the relationship between Kariwa-mura and the power station are explained. Next in place, the peculiarity of Kariwa-mura involved in the nuclear power station will be mentioned after defining the transparency required in relation to the regulations in order to clarify in what respect we are seeking accountability from the regulatory authorities. In conclusion, the roles of the local residents (local government) involved in the nuclear safety regulations are discussed introducing the 'Regional Association for Securing the Transparency of Kashiwazaki Nuclear Power Station' as an sure example to the solution for securing transparency. (author)

  20. Security negotiation

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  1. Strengthening the abilities of French-speaking NGOs. Post-2012 climate stakes. Adaptation - Energy - Deforestation, France - Africa - Canada

    Creach, Morgane; Margot, Stephanie; Connor, Richard; Angerand, Sylvain

    2007-10-01

    The first part of this report discusses the possibilities of an international response to face the challenge of adaptation to climate change (presentation of the main notions, discussion of the United Nations Framework Convention on Climate Change and international stakes about adaptation). The second part discusses the perspectives of access to energy in African countries: description of the African energy context, applications of existing mechanisms of struggle against climate change to the field of energy, stakes for post-2012 negotiations. The next part addresses the stakes of the avoided deforestation: definitions and key figures, direct and underlying causes of deforestation and assessment of the cost for slowing down or stopping it, stakes and struggle of interests about the 'avoided deforestation'. The last part reports the 'post-2012 climate stakes' workshop which addressed these same topics (access to energy in African countries, adaptation to climate change, avoided deforestation)

  2. The Effects of High-Stakes Testing Policy on Arts Education

    Baker, Richard A., Jr.

    2012-01-01

    This study examined high-stakes test scores for 37,222 eighth grade students enrolled in music and/or visual arts classes and those students not enrolled in arts courses. Students enrolled in music had significantly higher mean scores than those not enrolled in music (p less than 0.001). Results for visual arts and dual arts were not as…

  3. What are the stakes of the hydroelectric power? Supplement: report on the renewable energies

    2003-01-01

    The document presents the regulation and the stakes concerning the hydroelectricity development in France: contribution to the greenhouse effect fight, the environment preservation, possible uses. It proposes then, a grid of a socio-economical evaluation of the projects. In this framework, the impacts of the little hydroelectric power and the possible corrective measures are described. (A.L.B.)

  4. Laser welded steel sandwich panel bridge deck development : finite element analysis and stake weld strength tests.

    2009-09-01

    This report summarizes the analysis of laser welded steel sandwich panels for use in bridge structures and : static testing of laser stake welded lap shear coupons. Steel sandwich panels consist of two face sheets : connected by a relatively low-dens...

  5. The Mediating Role of Textbooks in High-Stakes Assessment Reform

    Leung, Ching Yin; Andrews, Stephen

    2012-01-01

    Whenever high-stakes assessment/curriculum reforms take place, new textbooks appear on the market. These textbooks inevitably play a significant mediating role in the implementation of any reform and on teaching and learning. This paper reports on a small-scale study which attempts to investigate the role of textbooks in the mediation of a…

  6. Of Mother Tongues and Other Tongues: The Stakes of Linguistically Inclusive Pedagogy in Minority Contexts

    Taylor, Lisa K.

    2008-01-01

    This article addresses two key challenges that globalization poses to literacy research: the need for new models of literacy and literacy education, and the stakes of adopting multiliteracies pedagogies in different contexts--that is, the tensions between competing hegemonic discourses of collective identity in the public sphere of ethnolinguistic…

  7. Academically Buoyant Students Are Less Anxious about and Perform Better in High-Stakes Examinations

    Putwain, David W.; Daly, Anthony L.; Chamberlain, Suzanne; Sadreddini, Shireen

    2015-01-01

    Background: Prior research has shown that test anxiety is negatively related to academic buoyancy, but it is not known whether test anxiety is an antecedent or outcome of academic buoyancy. Furthermore, it is not known whether academic buoyancy is related to performance on high-stakes examinations. Aims: To test a model specifying reciprocal…

  8. The Complex and Unequal Impact of High Stakes Accountability on Untested Social Studies

    Pace, Judith L.

    2011-01-01

    This article contributes to research on the impact of high stakes accountability on social studies teaching where it is "not" tested by the state, and addresses the question of what is happening in middle and higher performing versus struggling schools (Wills, 2007). The author presents complex findings from a qualitative study in five…

  9. Negotiating the Literacy Block: Constructing Spaces for Critical Literacy in a High Stakes Setting

    Paugh, Patricia; Carey, Jane; King-Jackson, Valerie; Russell, Shelley

    2007-01-01

    This article focuses on the evolution of the classroom literacy block as a learning space where teachers and students renegotiated activities for independent vocabulary and word work within a high-stakes reform environment. When a second grade classroom teacher and literacy support specialist decided to co-teach, they invited all students in the…

  10. Students' Attitudes toward High-Stakes Testing and Its Effect on Educational Decisions

    Moran, Aldo Alfredo

    2010-01-01

    With the recent increase in accountability due to No Child Left Behind, graduation rates and drop-out rates are important indicators of how well a school district is performing. High-stakes testing scores are at the forefront of a school's success and recognition as a school that is preparing and graduating students to meet society's challenging…

  11. The Disproportionate Erosion of Local Control: Urban School Boards, High-Stakes Accountability, and Democracy

    Trujillo, Tina M.

    2013-01-01

    This case study of an urban school board's experiences under high-stakes accountability demonstrates how the district leaders eschewed democratic governance processes in favor of autocratic behaviors. They possessed narrowly defined goals for teaching and learning that emphasized competitive, individualized means of achievement. Their decision…

  12. We Save, We Go to College. Creating a Financial Stake in College: Report III of IV

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings and college…

  13. The Role of Policy Assumptions in Validating High-stakes Testing Programs.

    Kane, Michael

    L. Cronbach has made the point that for validity arguments to be convincing to diverse audiences, they need to be based on assumptions that are credible to these audiences. The interpretations and uses of high stakes test scores rely on a number of policy assumptions about what should be taught in schools, and more specifically, about the content…

  14. Philosophical Questions about Teaching Philosophy: What's at Stake in High School Philosophy Education?

    Norris, Trevor

    2015-01-01

    What is at stake in high school philosophy education, and why? Why is it a good idea to teach philosophy at this level? This essay seeks to address some issues that arose in revising the Ontario grade 12 philosophy curriculum documents, significant insights from philosophy teacher education, and some early results of recent research funded by the…

  15. Effect of Staking and Pruning on the Growth and Yield of Cucumber ...

    A field trial was conducted to evaluate the effect of pruning and staking on the vegetative growth and yield of cucumber ( Cucumis sativus L.). The experiment was a 3 x 2 factorial laid out in Randomized Complete Block Design (RCBD) with five replications. The results showed that vine length, number of flowers, total ...

  16. Commission on Social Security

    Staff Association

    2010-01-01

    A commission studying past, present, and future social stakes ! For many years we have been hearing about the problems of funding of health insurance benefits in our different Member States. At CERN we are not totally immune from this problem.  To start with, let us recall that we have a mutual-benefit scheme which covers everyone for the consequences of the uncertainties in life (illness and accidents). The rules of our scheme are established by CERN in the framework of a sub-group of the Standing Concertation Committee, the CERN Health Insurance Scheme Board (CHISB), which is also in charge of managing the scheme.  The work of the “ProtSoc” (Protection Sociale – Social Security) commission, as we like to call it at the Staff Association, is to help your representatives on the CHISB, by preparing together with them the subjects and positions to be put forward and defended. This commission, which groups together the staff delegates who wish to invest their ...

  17. The European Refining Crisis: what is at stake for Europe?

    Boncourt, Maite de

    2013-03-01

    he European Refining sector is in crisis. The wave of refineries closures has spared no EU Member States. In less than five years, eleven refineries were simply shut down and no less than seventeen changed ownership in the UK, in France, in Germany, in the Netherlands, in Sweden or in Spain. As closure is a last resort measure, given its high costs, this gives an indication of the situation's seriousness. The present situation reflects more than just the widespread effects of the economic crisis. If the sector has always been known as cyclical, the change however comes from the shift in demand and trade patterns for oil products. In the ongoing globalization of the oil market products, Europe appears to be the most vulnerable piece and this raises questions as regard the European security of oil product supplies. (author)

  18. Security Expertise

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  19. World Energy Prospects and Stakes. A New Paradigm

    Laponche, Bernard; DEVERNOIS, Nils

    2008-01-01

    To pursue the present path in the development of energy systems would lead to growing insecurity of supply and an unacceptable increase in greenhouse gas emissions. Both climate change (and other environmental hazards) and security of supply would rapidly become formidable obstacles for peace and development if energy consumption follows such an 'impossible path'. Energy security and environmental constraints converge to offer mankind both a challenge and opportunity: to invent a new model compatible with sustainable development, in order to 'meet the needs of the present without compromising the ability of future generations to meet their own needs'. Energy efficiency comes first, because it presents the largest potential, it is applicable to all sectors of activities in all countries and because it is a pre-requisite to slow down the depletion rate of fossil fuel resources and to ensure a rational and significant increase of the share of renewable energy sources in total energy requirements. An energy efficiency strategy is not a slight adjustment to an energy supply policy but a new concept of economic policy which takes into account the costs of environmental degradation, growing energy insecurity and the medium and long term trend of increasing energy costs. Industrialised countries can and must reduce their total energy consumption. Most developing countries must increase their energy consumption for their economic development, but they can reach this objective with much lower growth than industrialised countries in the past by applying energy efficiency strategies. At world level, priority should be given to energy efficiency in the Transport sector, literally tied to oil products, and to electricity consumption in the household and service sectors since electricity production is a voracious and expensive consumer of natural resources. (author)

  20. World Energy Prospects and Stakes. A New Paradigm

    Laponche, B.

    2008-01-01

    To pursue the present path in the development of energy systems would lead to growing insecurity of supply and an unacceptable increase in greenhouse gas emissions. Both climate change (and other environmental hazards) and security of supply would rapidly become formidable obstacles for peace and development if energy consumption follows such an 'impossible path'. Energy security and environmental constraints converge to offer mankind both a challenge and opportunity: to invent a new model compatible with sustainable development, in order to 'meet the needs of the present without compromising the ability of future generations to meet their own needs'. Energy efficiency comes first, because it presents the largest potential, it is applicable to all sectors of activities in all countries and because it is a pre-requisite to slow down the depletion rate of fossil fuel resources and to ensure a rational and significant increase of the share of renewable energy sources in total energy requirements. An energy efficiency strategy is not a slight adjustment to an energy supply policy but a new concept of economic policy which takes into account the costs of environmental degradation, growing energy insecurity and the medium and long term trend of increasing energy costs. Industrialized countries can and must reduce their total energy consumption. Most developing countries must increase their energy consumption for their economic development, but they can reach this objective with much lower growth than industrialized countries in the past by applying energy efficiency strategies. At world level, priority should be given to energy efficiency in the Transport sector, literally tied to oil products, and to electricity consumption in the household and service sectors since electricity production is a voracious and expensive consumer of natural resources. (authors)

  1. Impact des changements climatiques sur l’agriculture dans la plaine de Jeffara sud-est tunisien

    Houcine Jeder

    2013-12-01

    Full Text Available Cette étude évalue la vulnérabilité de l’agriculture dans la plaine de Jeffera sud-est tunisien aux changements climatiques en utilisant la méthode Ricardienne. Cette méthode consiste à exprimer les revenus nets agricoles en fonction des variables climatiques, édaphiques et socio-économiques. Ces modèles ricardiens ont été testés sur la base des données d’une enquête réalisée dans le cadre de projet de développement dans la plaine Jeffera pour la compagne agricole 2002-2003.  Ces modèles ont permis d’exprimer d’une part la relation qui existe entre le revenu agricole et les variables climatiques (température et précipitation et d’autre part, d’analyser la sensibilité des revenus agricoles par rapport à ces variables climatiques. Des simulations ont été faites sur la base de scenario A2 résultat de la projection faite par le modèle HadCM3 à l’échelle nationale et régionale de la Tunisie.Les résultats de l’étude ont montré que la relation entre le revenu agricole et le climat est non linéaire. De même, les effets négatifs de certaines options d’adaptation ont montré que  l’agriculture dans la plaine de Jeffera est une agriculture paysanne basée sur le travail familial qui nécessite aujourd’hui un capital financier important et une marge de modernisation afin d’améliorer l’activité agricole dans les années futures. Tandis que les effets positifs de certaines autres options peuvent être servir comme des points de réflexion dans l’élaboration des stratégies d’adaptation aux changements climatiques comme l’utilisation des nouvelles technologies d’irrigation et l’intégration de l’activité de l’élevage dans l’exploitation agricole.

  2. Oil dependence. Myths and realities of a strategic stake; La dependance petroliere. Mythes et realites d'un enjeu strategique

    Chaliand, G.; Jafalian, A

    2005-04-15

    Using a series of regional studies, this collective book proposes to evaluate the strategic dimensions of the oil dependence and to determine its geopolitical impacts in the Middle East, Russia, China, USA and Europe. Content: the oil stakes at the beginning of the 21. century; in the center of the oil scene: the Middle East; oil dependence and US foreign policy: beyond myths; the Russian oil, instrument of influence and of alliances re-knitting; China and oil: security feelings and strategic approach; towards a European supply strategy; beyond petroleum: what alternatives; 150 years of petroleum history; the energy dependence; energy economy; automotive fuels and pollution abatement; limitation of greenhouse gas emissions; glossary; bibliography; index; Web links. (J.S.)

  3. CO2 capture and sequestration. Technological and social stakes in France

    Minh, Ha-Duong; Naceur, Chaabane

    2010-01-01

    Industrial technology already tested in Norway, North America and Algeria, the CO 2 capture and sequestration (CCS) consists in collecting carbon dioxide and to inject it into deep geological traps. This solution, which contributes to the fight against climatic change, arouses a growing up interest in France as a consequence of the Grenelle Environnement meetings. At a time when big research and demonstration programs are launched everywhere in Europe, this book proposes for the first time a status of the knowledge gathered so far by the specialists of the IPG (World Physics Institute), of the BRGM (Bureau of Geologic and Mining Researches), of the IFP (French Petroleum Institute), and of the CNRS (National Center of Scientific Research). It takes stock of the stakes of this new technology in France. Beyond the technical discussions between experts, the book deals with the external communication stakes and the open public debates. The point of views of the different intervening parties (research organizations, environmental non-governmental organizations, European lobby (Zero Emission Platform), citizens, journalists and companies are compared. A large part of the book aims at shading light on the social acceptability question of this technology. In addition to a synthesis of the available literature, it presents and analyses two participation instruments: a dialogue workshop and a geographical information web site. Content: 1 - scientific stakes of CO 2 geologic sequestration; 2 - technical stakes; 3 - economical stakes; 4 - risks and public opinion; 5 - social acceptability and territorial planning, the wind energy experience; 6 - the point of view of Action-Climat-France network (RAC-F); 7 - citizens' recommendations; 8 - the comeback of coal on the international energy scene; 9 - some consensus from a 'dialogue workshop': the social acceptability of CCS; 10 - bibliographic synthesis about the social acceptability of CCS; 11 - METSTOR, the interactive maping at

  4. [Personalized medicine, privatized medicine? legal and public health stakes].

    Rial-Sebbag, Emmanuelle

    2014-11-01

    Personalized medicine is booming. It tends to provide a medical management "tailored" for groups of patients, or for one unique patient, but also to identify risk groups to develop public health strategies. In this context, some radicalization phenomenon can emerge, leading to not only personalized medicine but also privatized medicine, which can lead to a capture of the medical public resource. If the "privatization" of medicine is not limited to producing adverse effects, several potentially destabilizing phenomena for patients still remain. First, some objective factors, like the adjustment of scientific prerequisites, are emerging from personalized medicine practices (clinical trial, public health policy) and are interfering with the medical doctor/patient relationship. Another risk emerges for patients concomitantly to their demand for controlling their own health, in terms of patients' security although these risks are not clearly identified and not effectively communicated. These practices, related to a privatized medicine, develop within the healthcare system but also outside, and the government and legislators will have to take into account these new dimensions in drafting their future regulations and policies. © 2014 médecine/sciences – Inserm.

  5. Watermarking security

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  6. Security Locks

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  7. The many facets of climate change - Conference proceedings; Les multiples facettes du changement climatique - Recueil des presentations

    NONE

    2011-03-15

    This conference day on climate change was organized by the French meteorological society (SMF) at the Ecole Normale Superieure of Paris. This document brings together the available presentations given at the conference. Eight presentations (slides) are compiled in this document and deal with: 1 - Climate change today and tomorrow, the research stakes (Herve Le Treut, IPSL); 2 - Rise of sea levels: estimations and regional variability (Guy Woeppelmann, La Rochelle Univ.); 3 - Polar ice caps and continental cryo-sphere as seen from space (A. Kouraev, F. Remy, E. Berthier, LEGOS); 4 - Impacts of climate change on exploited marine populations: projections and uncertainties (Patrick Lehodey, CLS); 5 - Climate change stakes on agricultural and winery activities in France (Eric Duchene, INRA); 6 - Impacts of climate change on forest trees phenology and their consequences on trees life and survival (Francois Lebourgeois, ENGREF); 7 - Remote-epidemiology: a health-aid in a climate change context (Murielle Lafaye, CNES); 8 - Socio-economic aspects and adaptation: a climate history, for what? (Emmanuel Garnier, Caen Univ.)

  8. Climatic servitude: climate change, business and politics; La servitude climatique: Changement climatique, Business et Politique

    Belouve, J.M.

    2009-07-01

    This book is together a contemporary history book and a global dossier about a topic of prime importance in our civilization. It treats of the history of science, of ideas and events put in the modern civilization context, of science situation and scientific controversies, of the media aspects, of carbon economy and its related business, of Al Gore's and Maurice Strong's biographies, and finally, it makes a critical geopolitical analysis and makes proposals for a renovated ecology. In the conclusion, the author shows how climate change has become the hobbyhorse of a new thinking trend, namely the New World Order, aiming at conducting people to the acceptance of constraining policies encompassing the energy security of nations, new taxes, a worldwide economic disruption, the limitation of the World's population, and a World governance supported by the United Nations and not constrained by classical democratic rules. (J.S.)

  9. Vehicular Internet: Security & Privacy Challenges and Opportunities

    Kamran Zaidi

    2015-07-01

    Full Text Available The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS. Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road travel. Governments and companies are pursuing driver-less vehicles as they are considered to be more reliable than humans and, therefore, safer. The vehicles today are not just a means of transportation but are also equipped with a wide range of sensors that provide valuable data. If vehicles are enabled to share data that they collect with other vehicles or authorities for decision-making and safer driving, they thereby form a vehicular network. However, there is a lot at stake in vehicular networks if they are compromised. With the stakes so high, it is imperative that the vehicular networks are secured and made resilient to any attack or attempt that may have serious consequences. The vehicular internet can also be the target of a cyber attack, which can be devastating. In this paper, the opportunities that the vehicular internet offers are presented and then various security and privacy aspects are discussed and some solutions are presented.

  10. Selfish play increases during high-stakes NBA games and is rewarded with more lucrative contracts.

    Uhlmann, Eric Luis; Barnes, Christopher M

    2014-01-01

    High-stakes team competitions can present a social dilemma in which participants must choose between concentrating on their personal performance and assisting teammates as a means of achieving group objectives. We find that despite the seemingly strong group incentive to win the NBA title, cooperative play actually diminishes during playoff games, negatively affecting team performance. Thus team cooperation decreases in the very high stakes contexts in which it is most important to perform well together. Highlighting the mixed incentives that underlie selfish play, personal scoring is rewarded with more lucrative future contracts, whereas assisting teammates to score is associated with reduced pay due to lost opportunities for personal scoring. A combination of misaligned incentives and psychological biases in performance evaluation bring out the "I" in "team" when cooperation is most critical.

  11. Social stakes of the reversibility in the deep storage of high level radioactive wastes

    Heriard-Dubreuil, G.; Schieber, C.; Schneider, T.

    1998-06-01

    This document proposes a study of the conditions which surrounded the reversibility introduction in high activity wastes deep storage at an international scale, as well as a reflexion on the social stakes associated there. In France, the law of december 30, 1991 concerning the research on the radioactive wastes prescribes '' the study of possibilities retrieval or non retrieval storage in deep geological deposits''. The analysis of the reversibility associated social stakes emphasizes the necessity to prevent irreversible consequences, to take care to the choices reversibility, to preserve the future generations autonomy. Thus to elaborate a more satisfactory solution between deep disposal and surface storage, a deep storage, capable of gradually evolution, concept is defined. (A.L.B.)

  12. Achievement goal orientation and situational motivation for a low-stakes test of content knowledge.

    Waskiewicz, Rhonda A

    2012-05-10

    To determine the extent of the relationship between students' inherent motivation to achieve in a doctor of pharmacy program and their motivation to achieve on a single low-stakes test of content knowledge. The Attitude Toward Learning Questionnaire (ATL) was administered to 66 third-year pharmacy students at the beginning of the spring 2011 semester, and the Student Opinion Scale (SOS) was administered to the same group immediately following completion of the Pharmacy Curricular Outcomes Assessment (PCOA). Significant differences were found in performance approach and work avoidance based on situational motivation scores. Situational motivation was also found to be directly correlated with performance and mastery approaches and inversely correlated with work avoidance. Criteria were met for predicting importance and effort from performance and mastery approaches and work avoidance scores of pharmacy students. The ability to predict pharmacy students' motivation to perform on a low-stakes standardized test of content knowledge increases the test's usefulness as a measure of curricular effectiveness.

  13. Local governance of energy. Clarification of stakes and illustration by spatial planning

    Saujot, Mathieu; Ruedinger, Andreas; Guerry, Anais

    2014-01-01

    As energy transition implies important societal transformations, the authors developed an analysis framework about the main questions raised by local governance: role of the different levels of local communities in the definition and implementation of strategies, key stakes of the sharing of skills between the State and communities, and stakes regarding spatial planning in this context. The authors first address the issue of relevance of the different territorial scales in a context of evolution of energy policies. They propose an overview of this issue with reference to the debate on local governance of transition. They discuss the return on experience of decentralisation in other fields of action of local policies, notably urban planning and spatial planning

  14. Pharmacy students' test-taking motivation-effort on a low-stakes standardized test.

    Waskiewicz, Rhonda A

    2011-04-11

    To measure third-year pharmacy students' level of motivation while completing the Pharmacy Curriculum Outcomes Assessment (PCOA) administered as a low-stakes test to better understand use of the PCOA as a measure of student content knowledge. Student motivation was manipulated through an incentive (ie, personal letter from the dean) and a process of statistical motivation filtering. Data were analyzed to determine any differences between the experimental and control groups in PCOA test performance, motivation to perform well, and test performance after filtering for low motivation-effort. Incentivizing students diminished the need for filtering PCOA scores for low effort. Where filtering was used, performance scores improved, providing a more realistic measure of aggregate student performance. To ensure that PCOA scores are an accurate reflection of student knowledge, incentivizing and/or filtering for low motivation-effort among pharmacy students should be considered fundamental best practice when the PCOA is administered as a low-stakes test.

  15. Selfish play increases during high-stakes NBA games and is rewarded with more lucrative contracts.

    Eric Luis Uhlmann

    Full Text Available High-stakes team competitions can present a social dilemma in which participants must choose between concentrating on their personal performance and assisting teammates as a means of achieving group objectives. We find that despite the seemingly strong group incentive to win the NBA title, cooperative play actually diminishes during playoff games, negatively affecting team performance. Thus team cooperation decreases in the very high stakes contexts in which it is most important to perform well together. Highlighting the mixed incentives that underlie selfish play, personal scoring is rewarded with more lucrative future contracts, whereas assisting teammates to score is associated with reduced pay due to lost opportunities for personal scoring. A combination of misaligned incentives and psychological biases in performance evaluation bring out the "I" in "team" when cooperation is most critical.

  16. The Rise of High-Stakes Educational Testing in Denmark (1920-1970)

    Ydesen, Christian

    The Rise of High-Stakes Educational Testing in Denmark (1920–1970) is an attempt to determine why and how tests rose to prominence in an educational system that used to rely on qualitative tests and teacher evaluations. The study addresses the important issues of how testing interacts...... with and influences an educational system, and which common factors are involved in order to implement testing in an educational system. The study is based on three relatively unknown case studies – illustrious examples of high-stakes educational testing practices in the Danish public school system. The first case...... to 1959. The third case study examines the testing of Greenlandic children during the preparation scheme in the Greenlandic educational system from 1961 to 1976....

  17. The nuclear: energy and environmental stakes and political and strategic context

    Lauvergeon, A.

    2003-01-01

    This document mentions the intervention of Anne Lauvergeon, at the colloquium Adapes, ''the nuclear: energy and environmental stakes and political and geo-strategic context''. Anne Lauvergeon is president of the Areva board. This speech takes stock on the energy resources and demand facing the economic development in a context of an environmental quality and especially the part of the nuclear energy in the future. (A.L.B.)

  18. Rationality on the rise: Why relative risk aversion increases with stake size

    Fehr-Duda, Helga; Bruhin, Adrian; Epper, Thomas F.; Schubert, Renate

    2008-01-01

    How does risk tolerance vary with stake size? This important question cannot be adequately answered if framing effects, nonlinear probability weighting, and heterogeneity of preference types are neglected. We show that, contrary to gains, no coherent change in relative risk aversion is observed for losses. The increase in relative risk aversion over gains cannot be captured by the curvature of the utility function. It is driven predominantly by a change in probability weighting of a majority ...

  19. Group Differences in Test-Taking Behaviour: An Example from a High-Stakes Testing Program

    Stenlund, Tova; Eklöf, Hanna; Lyrén, Per-Erik

    2017-01-01

    This study investigated whether different groups of test-takers vary in their reported test-taking behaviour in a high-stakes test situation. A between-group design (N = 1129) was used to examine whether high and low achievers, as well as females and males, differ in their use of test-taking strategies, and in level of reported test anxiety and…

  20. International economy. 82, controlling greenhouse effect: the stake of the international public policy

    Godard, O.; Oliveira-Martins, J.; Sgard, J.

    2000-01-01

    The greenhouse effect is one of the first stake of public policy which needs to be considered at the worldwide level. The climate changes shade doubts on the economic growth strategies adopted by all countries, and, if no major effort is made in the mastery of energy demand, worldwide greenhouse gas emissions will rapidly reach dangerous thresholds. This book gives a status of the research carried out on the economical impact of these policies. (J.S.)

  1. The stakes of iraqi petroleum: what is the role of France ?

    Sarkis, N.

    1995-01-01

    This work deals with some socio-economic and political aspects about the stakes of iraqi petroleum for France. After having described the history of iraqi petroleum, the author gives the estimation of the actual petroleum reserves, the production objective, the petroleum and gaseous projects and the exporting way. Then is given the economic and political role played by France: the increase of importation uses, the economic interests and the political responsibility. (O.L.). 10 tabs

  2. Mindfulness, anxiety, and high-stakes mathematics performance in the laboratory and classroom.

    Bellinger, David B; DeCaro, Marci S; Ralston, Patricia A S

    2015-12-01

    Mindfulness enhances emotion regulation and cognitive performance. A mindful approach may be especially beneficial in high-stakes academic testing environments, in which anxious thoughts disrupt cognitive control. The current studies examined whether mindfulness improves the emotional response to anxiety-producing testing situations, freeing working memory resources, and improving performance. In Study 1, we examined performance in a high-pressure laboratory setting. Mindfulness indirectly benefited math performance by reducing the experience of state anxiety. This benefit occurred selectively for problems that required greater working memory resources. Study 2 extended these findings to a calculus course taken by undergraduate engineering majors. Mindfulness indirectly benefited students' performance on high-stakes quizzes and exams by reducing their cognitive test anxiety. Mindfulness did not impact performance on lower-stakes homework assignments. These findings reveal an important mechanism by which mindfulness benefits academic performance, and suggest that mindfulness may help attenuate the negative effects of test anxiety. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Curricular constraints, high-stakes testing and the reality of reform in high school science classrooms

    Coble, Jennifer

    Through a series of open-ended interviews, this study investigated the beliefs of six third year high school science teachers about how they implement science education reform ideals in their practice and the contextual challenges they face as they attempt to implement reform. The teachers argue that the lack of connection between their curricula and students' lives serves as a significant obstacle to them utilizing more inquiry-based and student-centered strategies. In their science classes that are not subject to a high stakes exam, the teachers shared instances where they engage students in inquiry by refraining the focus of their curricula away from the decontextualized factual information and onto how the information relates to human experience. In their science classes subject to a high stakes test, however, the teachers confessed to feeling no choice but to utilize more teacher-centered strategies focused on information transmission. This study provides an in depth analysis of how the presence of high stakes tests discourages teachers from utilizing reform based teaching strategies within high school science classrooms.

  4. Des stratégies de changement dans les organisations internationales : une analyse comparée du HCR et de l’OIT

    Louis, Marieke; Maertens, Lucile

    2014-01-01

    Partant d’une comparaison inédite entre le Haut Commissariat des Nations Unies pour les réfugiés (HCR) et l’Organisation internationale du travail (OIT), cet article suggère de revisiter la problématique du changement dans les organisations internationales en montrant, dans une perspective de sociologie des relations internationales, l’existence d’un continuum de stratégies organisationnelles mises en place par ces dernières pour légitimer leur existence et leur action, stratégies allant de l...

  5. Securing Hadoop

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  6. Grid Security

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  7. Design and fabrication hazard stakes golf course polymeric foam material empty bunch (EFB) fiber reinforced

    Zulfahmi; Syam, B.; Wirjosentono, B.

    2018-02-01

    A golf course with obstacles in the forms of water obstacle and lateral water obstacle marked with the stakes which are called golf course obstacle stake in this study. This study focused on the design and fabrication of the golf course obstacle stake with a solid cylindrical geometry using EFB fiber-reinforced polimeric foam composite materials. To obtain the EFB fiber which is free from fat content and other elements, EFB is soaked in the water with 1% (of the watre total volume) NaOH. The model of the mould designed is permanent mould that can be used for the further refabrication process. The mould was designed based on resin-compound paste materials with talc powder plus E-glass fiber to make the mould strong. The composition of polimeric foam materials comprised unsaturated resin Bqtn-Ex 157 (70%), blowing agent (10%), fiber (10%), and catalyst (10%). The process of casting the polimeric foam composit materials into the mould cavity should be at vertical casting position, accurate interval time of material stirring, and periodical casting. To find out the strength value of the golf course obstacle stake product, a model was made and simulated by using the software of Ansys workbench 14.0, an impact loading was given at the height of 400 mm and 460 mm with the variation of golf ball speed (USGA standard) v = 18 m/s, v = 35 m/s, v = 66.2 m/s, v = 70 m/s, and v = 78.2 m/s. The clarification showed that the biggest dynamic explicit loading impact of Fmax = 142.5 N at the height of 460 mm with the maximum golf ball speed of 78.2 m/s did not experience the hysteresis effect and inertia effect. The largest deformation area occurred at the golf ball speed v = 66.2 mm/s, that is 18.029 mm (time: 2.5514e-004) was only concentrated around the sectional area of contact point of impact, meaning that the golf course obstacle stakes made of EFB fiber-reinforced polymeric foam materials have the geometric functional strength that are able to absorb the energy of golf ball

  8. Social Security.

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  9. Security management

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  10. Safety and security of radiation sources and radioactive materials: A case of Zambia - least developed country

    Banda, S.C.

    1998-01-01

    In Zambia, which is current (1998) classified as a Least Developed Country has applications of nuclear science and technology that cover the medical, industrial, education and research. However, the application is mainly in medical and industry. Through the responsibility of radiation source is within the mandate of the Radiation Protection Board. The aspects involving security fall on different stake holders some that have no technical knowledge on what radiation is about. The stake holders in this category include customs clearing and forwarding agents, state security/defence agencies and the operators. Such a situation demands a national system that should be instituted to meet the safety and security requirements but takes into account the involvement of the diverse stake holders. In addition such system should avoid unnecessary exposure, ensure safety of radioactive materials and sources, detect illicit trade and maintain integrity of such materials or sources. This paper will provide the status on issue in Zambia and the challenges that exist to ensure further development in application of Nuclear Science and Technology (S and T) in the country takes into account the safety and security requirements that avoid deliberate and accidental loss of radiation sources and radioactive materials. The Government has a responsibility to ensure that effective system is established and operated to protect radiation sources and radioactive materials from theft, sabotage and ensure safety. (author)

  11. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  12. Information security management handbook

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  13. Strategic information security

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  14. Security Bingo

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  15. Quel futur pour les services écosystémiques de la forêt alpine dans un contexte de changement climatique ?

    Benoît Courbaud

    2011-01-01

    Full Text Available La forêt de montagne produit de nombreux services écosystémiques qui vont être affectés par les changements climatiques. On attend une remontée des essences en altitude qui pourrait conduire à une diminution des résineux et des espèces du subalpin. Ces changements d’essences pourraient avoir un impact négatif sur la biodiversité et sur la production de bois d’œuvre. On observe cependant également une augmentation de la productivité favorable à la production de bois énergie et au moins temporairement de bois d’œuvre, ainsi qu’au stockage de carbone. Face à une augmentation possible des évènements climatiques extrêmes, les changements de végétation pourront être marqués par des épisodes de dépérissements, très négatifs pour la filière économique, la protection contre les risques naturels et la biodiversité. Le changement climatique affectera la forêt également de manière indirecte en augmentant la demande en énergie renouvelable et en stockage de carbone. Les incertitudes sur les prédictions de changements de végétation sont élevées, ce qui rend délicate la définition de stratégies d’adaptation de la gestion forestière. Une gestion de crises efficace, un accompagnement des évolutions naturelles de la forêt basé sur une interaction recherche-gestion (gestion adaptative, et la prise en compte explicite de la notion d’incertitude paraissent des éléments essentiels au maintien des services écosystémiques fournis par la forêt.Mountain forests produce a large number of ecosystem services that are going to be affected by climate change. We are expecting an increase in high altitude species that could result in the decrease in resinous and subalpine species. These changes in species could adversely affect biodiversity and timber production. However, we also observe an increase in productivity that favours the production of energy wood and, at least temporarily, timber, as well as carbon

  16. Computer security

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  17. Secure PVM

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  18. Junos Security

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  19. The International Atomic Energy Agency Nuclear Security Education Strategies

    BRAUNEGGER-GUELICH, A.; RUKHLO, V.; GREGORIC, M.; COLGAN, P.

    2011-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA provides a comprehensive nuclear security training programme to States on a regular basis, and has developed a concept that seeks to effectively pass ownership of nuclear security knowledge and skills to States through the establishment of a Nuclear Security Support Centre. In addition, the IAEA has developed a technical guidance titled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model of a Master of Science (M.Sc.) and assists educational institutions to provide nuclear security education. The article sets out IAEA efforts in the area of nuclear security training and education, including the assistance to States for establishing a Nuclear Security Support Centre. It underlines the objective and content of the IAEA Nuclear Security Series No. 12, discusses different concepts on how to establish nuclear security at universities and, emphasizes on the IAEA efforts to assist educational and research institutions, and other stake holders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (author)

  20. Collective Security

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  1. Security Transformation

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  2. Seven thematic sheets 'solar and building' to understand the stakes of solar for the building industry

    2016-01-01

    In order to highlight the interest of solar energy for building for commissioning clients and public authorities, in terms of quality and competitiveness, this document proposes seven sheets which respectively address: the positive energy building, the development of solar energy in buildings with local authorities, photovoltaic self-consumption, the competitiveness of solar PV, an offer of quality by professionals of the solar PV, the competitiveness of solar heating. Each sheet proposes an overview of stakes, technical solutions, and local or professional commitment, and formulates some proposals for the future

  3. Negotiating the terrain of high-stakes accountability in science teaching

    Aronson, Isaak

    Teachers interact with their students on behalf of the entire educational system. The aim of this study is to explore how biology teachers understand and construct their practice in a high-stakes accountability environment that is likely to be riddled with tensions. By critically questioning the technical paradigms of accountability this study challenges the fundamental assumptions of accountability. Such a critical approach may help teachers develop empowerment strategies that can free them from the de-skilling effects of the educational accountability system. This interpretive case study of a high-school in Maryland is grounded in three streams of research literature: quality science instruction based on scientific inquiry, the effects of educational accountability on the curriculum, and the influence of policy on classroom practice with a specific focus on how teachers balance competing tensions. This study theoretically occurs at the intersection of educational accountability and pedagogy. In terms of data collection, I conduct two interviews with all six biology teachers in the school. I observe each teacher for at least fifteen class periods. I review high-stakes accountability policy documents from the federal, state, and district levels of the education system. Three themes emerge from the research. The first theme, "re-defining science teaching," captures how deeply accountability structures have penetrated the science curriculum. The second theme, "the pressure mounts," explores how high-stakes accountability in science has increased the stress placed on teachers. The third theme, "teaching-in-between," explores how teachers compromise between accountability mandates and their own understandings of quality teaching. Together, the three themes shed light on the current high-stakes climate in which teachers currently work. This study's findings inform the myriad paradoxes at all levels of the educational system. As Congress and advocacy groups battle over

  4. Re-analysis of NAEP Math and Reading Scores in States with and without High-stakes Tests: Response to Rosenshine

    Audrey Amrein-Beardsley

    2003-08-01

    Full Text Available Here we address the criticism of our NAEP analyses by Rosenshine (2003. On the basis of his thoughtful critique we redid some of the analyses on which he focused. Our findings contradict his. This is no fault of his, the reasons for which are explained in this paper. Our findings do support our position that high-stakes tests do not do much to improve academic achievement. The extent to which states with high-stakes tests outperform states without high-stakes tests is, at best, indeterminable. Using 1994-1998 NAEP reading and 1996-2000 NAEP math data and accounting for NAEP exemption rates for the same years, we found that states with high-stakes tests are not outperforming states without high-stakes tests in reading in the 4th grade or math in the 8th grade at a statistically significant level. States with high-stakes tests are, however, outperforming states without high-stakes tests in math in the 4th grade at a statistically significant level. Our findings also support our earlier stance that states with high-stakes tests are exempting more students from participating in the NAEP than are states without high-stakes tests. This is more prevalent the more recent the NAEP test administration. This is illustrated in the tables below.

  5. European Security

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  6. Data Security

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  7. Nuclear security

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  8. FOOD SECURITY

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  9. Security an introduction

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  10. Whither probabilistic security management for real-time operation of power systems ?

    Karangelos, Efthymios; Panciatici, Patrick; Wehenkel, Louis

    2016-01-01

    This paper investigates the stakes of introducing probabilistic approaches for the management of power system’s security. In real-time operation, the aim is to arbitrate in a rational way between preventive and corrective control, while taking into account i) the prior probabilities of contingencies, ii) the possible failure modes of corrective control actions, iii) the socio-economic consequences of service interruptions. This work is a first step towards the construction of a globally co...

  11. Multiple aspects of climate change - Summary of presentations; Les multiples facettes du changement climatique - Resume des presentations

    Andre, Jean-Claude; Bauer, Pierre; Le Treut, Herve [Institut Pierre Simon Laplace, 78280 Guyancourt Cedex (France); Woeppelmann, Guy [Universite de la Rochelle, 17000 La Rochelle (France); Kouraev, Alexei; Remy, Frederique; Berthier, Etienne [Legos, 31401 Toulouse cedex 9 (France); Lehodey, Patrick [CLS, 31520 Ramonville St Agne (France); Lebourgeois, Francois [ENGREF, AgroParisTech, 54042 Nancy Cedex (France); Chuine, Isabelle [CEFE, CNRS, Montpellier (France); Vennetier, Michel [CEMAGREF, 13182 Aix en Provence cedex 5 (France); Duchene, Eric [INRA-Universite de Strasbourg, 68021 Colmar Cedex (France); Lafaye, Murielle [CNES, 31401 Toulouse cedex 9 (France)

    2011-08-15

    The French Meteorological Society (SMF) organized its annual scientific day on March 23, 2011 on the topic of the multiple aspects of climate change. The aim was to take stock of the lessons learnt from the different meteorological markers in several domains (agriculture, forests, ecosystems, rise of sea level, changes in marine biodiversity, health, snow and ice caps..). This paper summarizes the seven presentations given at this meeting: 1 - climate change today and tomorrow (H. Le Treut); 2 - rise of oceans level: estimations and regional variability (G. Woeppelmann); 3 - polar caps and continental cryo-sphere as seen from space (A. Kouraev, F. Remy and E. Berthier); 4 - impact of climate change on exploited marine populations: projections and uncertainties (P. Lehodey); 5 - stakes of climate change on agricultural and winery activities in France (E. Duchene); 6 - impact of climate change on forest trees phenology and consequence on their survival and operation (F. Lebourgeois, I. Chuine and M. Vennetier); 7 - 'tele-epidemiology': a health-aid in a climate change context. (J.S.)

  12. Security Threats Emerging from the Middle East and North Africa

    Çınar, Bekir

    2015-01-01

    The main security threats affecting the Middle East and North African (MENA) region arise from energy insecurity, immigration and terrorism. These threats would remain if authorities and other stake holders do not address the root causes of the problems, which are artificial national borders, authoritarian regimes and lack of pluralist education. This paper suggests that lifting state borders and setting up regional economic communities such as the EU may ease conflicts in the region which ca...

  13. Examining a Public Montessori School’s Response to the Pressures of High-Stakes Accountability

    Corrie Rebecca Block

    2015-11-01

    Full Text Available In order to succeed in the current school assessment and accountability era, a public Montessori school is expected to achieve high student scores on standardized assessments. A problem for a public Montessori elementary school is how to make sense of the school’s high-stakes assessment scores in terms of its unique educational approach. This case study examined a public Montessori elementary school’s efforts as the school implemented the Montessori Method within the accountability era. The research revealed the ways the principal, teachers, and parents on the school council modified Montessori practices, curriculum, and assessment procedures based on test scores. A quality Montessori education is designed to offer children opportunities to develop both cognitive skills and affective components such as student motivation and socio-emotional skills that will serve them beyond their public school experiences. Sadly, the high-stakes testing environment influences so much of public education today. When quality education was measured through only one narrow measure of success the result in this school was clearly a restriction of priorities to areas that were easily assessed.

  14. Experimental Investigation on Electric Current-Aided Laser Stake Welding of Aluminum Alloy T-Joints

    Xinge Zhang

    2017-11-01

    Full Text Available In the present study, aluminum alloy T-joints were welded using the laser stake-welding process. In order to improve the welding quality of the T-joints, an external electric current was used to aid the laser stake-welding process. The effects of the process parameters on the weld morphology, mechanical properties, and microstructure of the welded joints were analyzed and discussed in detail. The results indicate that the aided electric current should be no greater than a certain maximum value. Upon increasing the aided electric current, the weld width at the skin and stringer faying surface obviously increased, but there was an insignificant change in the penetration depth. Furthermore, the electric current and pressing force should be chosen to produce an expected weld width at the faying surface, whereas the laser power and welding speed should be primarily considered to obtain an optimal penetration depth. The tensile shear specimens failed across the faying surface or failed in the weld zone of the skin. The specimens that failed in the weld of the skin could resist a higher tensile shear load compared with specimens that failed across the faying surface. The microstructural observations and microhardness results demonstrated that the tensile shear load capacity of the aluminum alloy welded T-joint was mainly determined by the weld width at the faying surface.

  15. Competing with peers: mentalizing-related brain activity reflects what is at stake.

    Halko, Marja-Liisa; Hlushchuk, Yevhen; Hari, Riitta; Schürmann, Martin

    2009-06-01

    Competition imposes constraints for humans who make decisions. Concomitantly, people do not only maximize their personal profit but they also try to punish unfair conspecifics. In bargaining games, subjects typically accept equal-share offers but reject unduly small offers; competition affects this balance. Here we used functional magnetic resonance imaging (fMRI) to study adjustment to competition in a bargaining game where subjects competed against another person for a share of the stake. For medium-sized, but not for minimum offers, competition increased the likelihood of acceptance and thus shifted behavior towards maximizing personal profits, emphasizing the importance of financial incentives. Specifically for medium-sized offers, competition was associated with increased brain activation bilaterally in the temporo-parietal junction, a region associated with mentalizing. In the right inferior frontal region, competition-related brain activation was strongest in subjects whose high acceptance rates in the standard ultimatum game hinted at a profit-oriented approach. The results suggest a network of brain areas supporting decision making under competition, with incentive-dependent mentalizing engaged when the competitor's behavior is difficult to predict and when the stake is attractive enough to justify the effort.

  16. How many stakes are required to measure the mass balance of a glacier?

    Fountain, A.G.; Vecchia, A.

    1999-01-01

    Glacier mass balance is estimated for South Cascade Glacier and Maclure Glacier using a one-dimensional regression of mass balance with altitude as an alternative to the traditional approach of contouring mass balance values. One attractive feature of regression is that it can be applied to sparse data sets where contouring is not possible and can provide an objective error of the resulting estimate. Regression methods yielded mass balance values equivalent to contouring methods. The effect of the number of mass balance measurements on the final value for the glacier showed that sample sizes as small as five stakes provided reasonable estimates, although the error estimates were greater than for larger sample sizes. Different spatial patterns of measurement locations showed no appreciable influence on the final value as long as different surface altitudes were intermittently sampled over the altitude range of the glacier. Two different regression equations were examined, a quadratic, and a piecewise linear spline, and comparison of results showed little sensitivity to the type of equation. These results point to the dominant effect of the gradient of mass balance with altitude of alpine glaciers compared to transverse variations. The number of mass balance measurements required to determine the glacier balance appears to be scale invariant for small glaciers and five to ten stakes are sufficient.

  17. Social Perception of Hydrogen Technologies: The View of Spanish Stake holders

    Ferri Anglada, S.

    2013-01-01

    This technical report presents an overview of the social perception and vision of a sample of Spanish stake holders on hydrogen technologies. The study is based on the implementation of a survey, combining both quantitative and qualitative data. An ad hoc electronic survey was design to collect views and perceptions on several key factors regarding this innovative energy alternative. The group of experts participating (N=130) in the study, comes mainly from research centers, universities and private companies. The survey addresses three major themes: expert views, social acceptability, and contextual factors of hydrogen technologies. The aim is to capture both the current and the future scene as viewed by the experts on hydrogen technologies, identifying key factors in terms of changes, uncertainties, obstacles and opportunities. The objective is to identify potential key features for the introduction, development, promotion, implementation, and large-scale deployment of a highly successful energy proposal in countries such as Iceland, one of the pioneers in base its economy on hydrogen technologies. To conclude, this report illustrates the positive engagement of a sample of Spanish stake holders towards hydrogen technologies that may prove vital in the transition towards the Hydrogen Economy in Spain. (Author)

  18. DIRAC Security

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  19. The US proliferation security initiative (PSI)

    Gregoire, B.

    2004-01-01

    The proliferation security initiative (PSI), launched by President Bush on May 31, 2003, aims at intercepting any transfer of mass destruction weapons, of their vectors and related equipments, towards or coming from countries or organizations suspected to have a proliferation activity. This initiative, which involves coercive means to fight against proliferation, raises international lawfulness and legal questions, the answers of which are today under construction. This article analyzes the place of the European Union in the PSI, the action means (optimization of existing means, cooperation between intelligence and interception services), and the PSI stakes (lawfulness with respect to the international law, bilateral agreements, draft boarding agreement, sustain of the United Nations, widening of the partnership and of the field of action). (J.S.)

  20. IFRI's notebooks. Energy, development and security

    Finon, D.; Jacquet, P.

    1999-01-01

    Today, the concept of energy security has been greatly modified by the worldwide trade, the markets deregulation, the technical progress and the nuclear contestation. This notebook is the synthesis of a colloquium jointly organized in December 16, 1997 by the IFRI and the Institute of Economy and Energy Policy (IEPE) with the sustain of the French delegation of strategic affairs of the defense ministry. It analyzes the evolution of energy markets at the year 2030 prospects and stresses on the role of Middle-East and on the stakes of the economical development and energy policy of China. Finally, it treats of the goals and modalities of the French and European energy policies. (J.S.)

  1. Security Sector Reform in the Arab Region | CRDI - Centre de ...

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  2. Recherche et changement

    Éducation ont conjugué leurs efforts. – une première dans les Caraïbes – et conclu un protocole d'entente ministériel en vue de combattre l'obésité chez les enfants. Ce protocole prévoit des interventions en matière de nutrition en milieu scolaire, ainsi ...

  3. Privatising Security

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  4. Fossil energy and food security

    Folke, G.

    2001-01-01

    To fulfil the basic goal of delivering food for the tables of the citizens, modern Western agriculture is extremely dependent on supporting material flows, infrastructure, and fossil energy. According to several observers, fossil fuel production is about to peak, i.e., oil extraction is no longer capable of keeping pace with the increasing demand. This situation may trigger an unprecedented increase in fossil energy prices, which may make the current highly energy dependent food production-distribution system highly vulnerable. The paper starts with a survey of this vulnerability. Also, the supply of phosphorus, a key factor in agriculture, may be at stake under such circumstances. The paper analyses this situation and discusses settlement structures integrated with agriculture that might increase food security by reducing energy demands. In the proposed ideal societal structure, agriculture is integrated with settlements and most of the food needed by the population is produced locally, and the nutrients for food production are recycled from households and animals by means of biological processes demanding considerably less mechanical investment and fossil support energy than the conventional type of agriculture. The vulnerability of this structure would be considerably lower, than that of the current system. (author)

  5. Is the Physical Being Taken out of Physical Education? On the Possible Effects of High-Stakes Testing on an Embattled Profession's Curriculum Goals

    Seymour, Clancy; Garrison, Mark

    2015-01-01

    Building on recent discussions regarding how current national standards for physical education promote cognitive outcomes over physical outcomes, the authors explore how a new era in high-stakes testing is also contributing to an emphasis on the cognitive, over the physical. While high-stakes testing has been linked to reducing the amount of…

  6. Figuring out How to Be a Teacher in a High-Stakes Context: A Case Study of First-Year Teachers' Conceptual and Practical Development

    Brown, Christopher P.; Bay-Borelli, Debra E.; Scott, Jill

    2015-01-01

    High-stakes education reforms across the United States and the globe continue to alter the landscape of teaching and teacher education. One key but understudied aspect of this reform process is the experiences of first-year teachers, particularly those who participated in these high-stakes education systems as students and as a…

  7. Information Security

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  8. Food security

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  9. High-Stakes and Non-Stakes Testing States and the Transfer of Knowledge to Students' Advanced Placement Test, Advanced Placement U.S. History Test, and SAT Exam Scores

    Lessler, Karen Jean

    2010-01-01

    The Federal education policy No Child Left Behind Act (NCLB) has initiated high-stakes testing among U.S. public schools. The premise of the NCLB initiative is that all students reach proficiency in reading and math by 2014. Under NCLB, individual state education departments were required to implement annual assessments in grades two through eight…

  10. High Stakes Trigger the Use of Multiple Memories to Enhance the Control of Attention

    Reinhart, Robert M.G.; Woodman, Geoffrey F.

    2014-01-01

    We can more precisely tune attention to highly rewarding objects than other objects in our environment, but how our brains do this is unknown. After a few trials of searching for the same object, subjects' electrical brain activity indicated that they handed off the memory representations used to control attention from working memory to long-term memory. However, when a large reward was possible, the neural signature of working memory returned as subjects recruited working memory to supplement the cognitive control afforded by the representations accumulated in long-term memory. The amplitude of this neural signature of working memory predicted the magnitude of the subsequent behavioral reward-based attention effects across tasks and individuals, showing the ubiquity of this cognitive reaction to high-stakes situations. PMID:23448876

  11. The Kyoto protocol: assessment and perspectives. Towards a new regime up to the climate stake

    Gautier, Celia

    2012-01-01

    This report proposes an analysis within the context of transition of the climate regime from the 'before-2012' regime to the 'post-2020' regime. It first gives an overview of international stakes and context (lack of ambition for climate policy, perspective of an international agreement from 2020). Then, the authors recall the history and achievements of the Kyoto protocol which is the basis of the present climate policy regime. They propose an assessment of actions performed by countries during the first period of the protocol, and focus on the present climate regime elements which are to be safeguarded. They analyse the weaknesses of the present regime, and propose possible improvements for the future post-2020 climate regime

  12. Electric power trading. The first study on stakes and consequences of power trading

    2000-06-01

    Power trading (purchase/sale of electricity on a stock exchange) is an emerging activity in continental Europe while it already came to maturity in the US, in the UK and in Scandinavia. Several stock exchanges have opened since 1988, in particular in Germany, Spain and in The Netherlands. New projects of creation are under study, except in France where public authorities remain reticent with respect to this evolution. Power trade is deeply overturning the organization of power markets with offering an alternative to the direct supply from producers and distributors. This study presents the functioning modes of the main stock exchanges in operation today. It analyzes the stakes of power trade for all intervening parties of the market (historical actors, newcomers and consumers). The situation and the strategic behaviour of 12 key-actors of the power sector are also examined. (J.S.)

  13. The strategic industrial sectors of the green economy: stakes and perspectives

    Albertini, Jean-Paul; Larrieu, Catherine; Griot, Alain

    2013-03-01

    Proposing a transverse analysis and a synthesis, the first part of this voluminous report discusses the evolution of the context since 2009 for the green industry sector, outlines and comments the development stakes for the different sectors, analyses and comments their main evolutions for the last three years, outlines the development potential and perspectives of these activities in France, and proposes an overview of strategic policies implemented in the field of green economy in different countries (USA, Germany, United Kingdom, Japan, China, South Korea). The second part addresses the evolution and perspectives of each sector: energy production from renewable sources (biofuels, biomass, marine energies, wind energy, geothermal energy, solar energy), optimization of natural energy consumption (building with low environmental impact, green chemistry, hydrogen and fuel cells, biomaterials, optimization of industrial processes, smart grids, energy storage, low-carbon vehicles), natural resource life cycle management (CO 2 capture and storage, water, purification and ecologic engineering, metrology and instrumentation, recycling and waste valorization)

  14. Energy policy: the stakes of a global overview. Synthesis of the afternoon works

    Destot, M.

    1999-10-01

    This document is a report of the debates that took place at the French national assembly in October 1999 concerning the French energy policy and more particularly the new electricity and gas directives, the energy choices, the development of renewable energies, the building of the future EPR European Pressurized water reactor, the development of more efficient transportation systems, the reduction of air pollution and the fight against the greenhouse effect, and the mastery of energy consumptions. This synthesis of the afternoon works reports on the point of views exchanged during the last round table of the day about the stakes of the opening of the European energy market (internationalization and decentralization of the electricity and natural gas markets). (J.S.)

  15. The role of stake holders in the Italian debate on the national radioactive waste deposit

    Cantone, Marie C.

    2008-01-01

    Full text: In early 2003, following an increased concern about the international terrorist threat, the Italian Government declared an emergency status for national nuclear installations, and in particular for radioactive waste deposits. A working group of experts - mainly from the Society for the Management of Nuclear Installations (SOGIN) and the Agency for New Technologies, Energy and Environment (ENEA) - was appointed and charged with the analysis of the technical aspects implied in the creation of a repository to host permanently LLRW and MLRW as well as to host temporarily HLRW. In November 2003 the Italian Government passed a decree to authorize the creation of a national nuclear waste repository within a geological salt deposit in the territory of Scanzano Jonico, in the Basilicata Region. The decision was made without any negotiation with the local population and the authorities of Scanzano Jonico. The lack of transparent communication and the attempt to impose the project 'from the top' was perceived as a 'deceptive strategy'. The population of the entire region spontaneously organized a mass protest movement against the project; blockades were carried out on the major highway connecting Northern to Southern Italy and the controversy gained the attention of the national mass media. Two weeks later, the Italian government withdrew the decree. Presently, the Italian nuclear waste is distributed over more than 20 locations in 11 different Regions, and the creation of a national disposal site has been postponed. The present study aims at highlighting the reasons behind social conflicts on nuclear waste risks. We will examine the attitudes and the communication strategies of the different stake holders which took part in the public debate on the Italian nuclear waste dump. Drawing on methodologies used in media studies, we are carrying out a quantitative and qualitative analysis of the main national and local newspapers in order to draw a 'map' of the

  16. 2009 public meetings: To inform and exchange ideas on the issues at stake

    Association du personnel

    2009-01-01

    The summer holidays are over. And like every year around this time the Staff Association comes to meet you in your Departments to inform you about the topics currently being discussed at CERN. We count very much on the exchange of views and opinions between you and us that takes place during these meetings. Once again in 2009 there are a wide range of topics to be discussed. If the stakes are generally high, this year and the next ones they are huge. This is an additional reason for the need to see a maximum number of motivated candidates stand at the forthcoming elections for the Staff Council in November 2009. For all these reasons and to help us prepare optimally for these critical deadlines, we invite all of you to attend our public meetings.

  17. The Power Stakes Between those who Finance itThe New Managerial Models

    Solomia Andres

    2009-10-01

    Full Text Available The paper presents the conceptual background and aspects concerning the governing that means the system by which the organizations are leaded and controlled, covering the ensemble of dispositions that allow the insurance that the objectives wanted by the managers are legitimate and the means put to work are adapted to reach these objectives. Considering that the presented models (Stareholder and Stakeholder are stakes of power between those who lead and those that finance the organization, the convergence of the European and international governing models and systems that involve the existence of some superior governing models, economically, socially and political efficient, the approach of these issues presents special interest being a challenge to Romanian economy. The globalization gives a plus to the convergence - pleading for the Stareholder model and the cultural differences plead for the resort to one of the Stakeholder model's variants.

  18. CO2 emissions abatement and geologic sequestration - industrial innovations and stakes - status of researches in progress

    2005-01-01

    This colloquium was jointly organized by the French institute of petroleum (IFP), the French agency of environmental and energy mastery (Ademe) and the geological and mining research office (BRGM). This press kit makes a status of the advances made in CO 2 emissions abatement and geological sequestration: technological advances of CO 2 capture and sequestration, geological reservoir dimensioning with respect to the problem scale, duration of such an interim solution, CO 2 emissions abatement potentialities of geological sequestration, regulatory, economical and financial implications, international stakes of greenhouse gas emissions. This press kit comprises a press release about the IFP-Ademe-BRGM colloquium, a slide presentation about CO 2 abatement and sequestration, and four papers: a joint IFP-Ademe-BRGM press conference, IFP's answers to CO 2 emissions abatement, Ademe's actions in CO 2 abatement and sequestration, and BRGM's experience in CO 2 sequestration and climatic change expertise. (J.S.)

  19. High-stakes conflicts and the link between theory and practice : celebrating the work of Ellen Giebels

    Oostinga, Miriam S.D.; Rispens, Sonja; Taylor, Paul J.; Ufkes, Elze G.

    2018-01-01

    In this tribute to the 2012 recipient of the IACM's Jeffrey Rubin's Theory-to-Practice Award, we celebrate the work of Ellen Giebels. We highlight her groundbreaking research on influence tactics in crisis negotiations and other high-stakes conflict situations, showing how her focus on theoretical

  20. High-Stakes Conflicts and the Link between Theory and Practice : Celebrating the Work of Ellen Giebels

    Oostinga, Miriam S.D.; Rispens, Sonja; Taylor, Paul J.; Ufkes, Elze G.

    2018-01-01

    In this tribute to the 2012 recipient of the IACM's Jeffrey Rubin's Theory-to-Practice Award, we celebrate the work of Ellen Giebels. We highlight her groundbreaking research on influence tactics in crisis negotiations and other high-stakes conflict situations, showing how her focus on theoretical

  1. Examining a Public Montessori School's Response to the Pressures of High-Stakes Accountability

    Block, Corrie Rebecca

    2015-01-01

    A public Montessori school is expected to demonstrate high student scores on standardized assessments to succeed in the current school accountability era. A problem for a public Montessori elementary school is how to make sense of the school's high-stakes assessment scores in terms of Montessori's unique educational approach. This case study…

  2. A Case Study of Co-Teaching in an Inclusive Secondary High-Stakes World History I Classroom

    van Hover, Stephanie; Hicks, David; Sayeski, Kristin

    2012-01-01

    In order to provide increasing support for students with disabilities in inclusive classrooms in high-stakes testing contexts, some schools have implemented co-teaching models. This qualitative case study explores how 1 special education teacher (Anna) and 1 general education history teacher (John) make sense of working together in an inclusive…

  3. Stakes at the edge of participation: Where words and things are the entirely serious title of a problem

    Jönsson, Li; Ulv Lenskjold, Tau

    2015-01-01

    language and discourse. Drawing on examples from the recent research project Urban Animals and Us (UA&Us), we suggest that experimental prototypes hold the promise of material enactments of relations that enable a re-articulation of what it means to have a stake in a socio-material event. In the specific...

  4. Teaching under the New Taylorism: High-Stakes Testing and the Standardization of the 21st Century Curriculum

    Au, Wayne

    2011-01-01

    The application of the principles of scientific management within the structure, organization, and curriculum of public schools in the US became dominant during the early 1900s. Based upon research evidence from the modern day era of high-stakes testing in US public education, the fundamental logics guiding scientific management have resurfaced…

  5. The impact of high-stakes school admission exams on study achievements: quasi-experimental evidence from Slovakia

    Federičová, Miroslava; Münich, Daniel

    2017-01-01

    Roč. 30, č. 4 (2017), s. 1069-1092 ISSN 0933-1433 R&D Projects: GA ČR(CZ) GBP402/12/G130 Institutional support: RVO:67985998 Keywords : high-stakes exams * students’ motivation * achievement Subject RIV: AH - Economics OBOR OECD: Applied Economics , Econometrics Impact factor: 1.136, year: 2016

  6. The impact of high-stakes school admission exams on study achievements: quasi-experimental evidence from Slovakia

    Federičová, Miroslava; Münich, Daniel

    2017-01-01

    Roč. 30, č. 4 (2017), s. 1069-1092 ISSN 0933-1433 Institutional support: Progres-Q24 Keywords : high-stakes exams * students’ motivation * achievement Subject RIV: AH - Economics OBOR OECD: Applied Economics , Econometrics Impact factor: 1.136, year: 2016

  7. Countries in transition and the developing countries in the negotiation on the climatic change. Stakes of the Kyoto conference

    Blanchard, O.; Cavard, D.; Faudry, D.; Girod, J.; Menanteau, P.; Viguier, L.

    1997-10-01

    This document presents the positions of the countries in transition and the developing countries in the phase of the negotiations on the climatic change between 1994 and 1997, then takes stock on the pilot phase of the actions of the associated implementation. The negotiations stakes and the frame of the discussions are also presented. (A.L.B.)

  8. Diving in or Guarding the Tower: Mina Shaughnessy's Resistance and Capitulation to High-Stakes Writing Tests at City College

    Molloy, Sean

    2012-01-01

    Mina Shaughnessy continues to exert powerful influences over Basic Writing practices, discourses and pedagogy thirty-five years after her death: Basic Writing remains in some ways trapped by Shaughnessy's legacy in what Min-Zhan Lu labeled as essentialism, accommodationism and linguistic innocence. High-stakes writing tests, a troubling hallmark…

  9. "I'm Just Going through the Motions": High-Stakes Accountability and Teachers' Access to Intrinsic Rewards

    Rooney, Erin

    2015-01-01

    This article explores teachers' experiences under high-stakes accountability and shows how the narrowing of curriculum depleted teachers' intrinsic work rewards. The article analyzes data from an ethnographic study of teachers' work in two high-poverty urban public schools. The study shows that as instructional mandates emphasized a narrowed…

  10. High-­Stakes Schooling: What We Can Learn from Japan's Experiences with Testing, Accountability, and Education Reform

    Bjork, Christopher

    2015-01-01

    If there is one thing that describes the trajectory of American education, it is this: more high-stakes testing. In the United States, the debates surrounding this trajectory can be so fierce that it feels like we are in uncharted waters. As Christopher Bjork reminds us in this study, however, we are not the first to make testing so central to…

  11. Does Structural Inequality Begin with a Bank Account? Creating a Financial Stake in College: Report II of IV

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings and college…

  12. Why Policymakers Should Care about Children's Savings. Creating a Financial Stake in College: Report I of IV

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings and college…

  13. Ideas for Refining Children's Savings Account Proposals. Creating a Financial Stake in College: Report IV of IV

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings…

  14. The Contradictions of High-Stakes Accountability "Success": A Case Study of Focused Leadership and Performance Agency

    Black, William R.

    2008-01-01

    This article seeks to advance the discussion of the availability of contemporary notions of school leadership for school leaders working within high-stakes accountability reform environment that produce discourses of urgency and legitimize practices of performance that implicitly favour centralized, neo-Tayloristic managerial approaches. Drawing…

  15. Computer Security: the security marathon

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  16. Security Administration Reports Application

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  17. Security Investigation Database (SID)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  18. Nuclear security

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  19. Security seal

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Security system

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  1. Security studies

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  2. Perceptions of industrial and nuclear risks. Stakes, negotiations and social development of levels of risk acceptance; Perceptions des risques industriels et nucleaires: enjeux, negociations et construction sociale des seuils d'acception des risques

    Bernier, S.Ch

    2007-11-15

    In this thesis we will question the perceptions of industrial risks in the occidental world at the beginning of the 21. century. For this purpose we will try to understand how concepts such as sustainable development, precautionary principle, liability, or even zero-risk bias have progressively developed around a thought model based on the scientific rationality. This model is now undermined by its incapacity to fully address the issues it raises and completely avoid the potential risks. However, despite consistent weaknesses, it remains a reference value moulded by past accidents which have led to the making of laws aiming mainly at defining liability and protecting those who are held liable. Thus, public information becomes a requirement for democracy and the protection of this thought model. In this context, the protagonists at stake are security-conscious, economical and political lobbies that constantly redefine the limits of risk acceptance. We come to the realization that our lifestyle and value system remain unchallenged even though undergoing a crisis. The specificity of this research lies into the importance we give to the local approach, dealing with registered Seveso sites and nuclear plants located in Indre et Loire. We have polled five categories of respondents through interviews or questionnaires in order to understand their opinion regarding situations involving technological risks. The result of this survey helps us understand and set the levels of risk acceptance that they define with regard to the industrial risks and show the complexity of a situation involving political stakes, environmental pressures, a profit-driven economy and security constraints, in a vague and complex context. This work gives us a contrasted picture of today's perceptions of risks. (author)

  3. National Cyber Security Policy

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  4. Improving computer security by health smart card.

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual

  5. Statistical security for Social Security.

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  6. Network security

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  7. Information Security

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  8. Adaptation to the climatic change: the propositions of the ONERC; Adaptation au changement climatique: les propositions de l'ONERC

    NONE

    2006-06-15

    This document aims to be compromise step between the scientific analysis and the implementing of an action plan. It presents four main objectives: actions for the public security and safety,reduction of the inequalities facing the risks, limitation of the costs and preservation of the natural patrimony. It proposes a synthesis and actions principles in nine axis, applicable to every topics and studied geographical levels. (A.L.B.)

  9. Modelisation de l'erosion et des sources de pollution dans le bassin versant Iroquois/Blanchette dans un contexte de changements climatiques

    Coulibaly, Issa

    Principale source d'approvisionnement en eau potable de la municipalite d'Edmundston, le bassin versant Iroquois/Blanchette est un enjeu capital pour cette derniere, d'ou les efforts constants deployes pour assurer la preservation de la qualite de son eau. A cet effet, plusieurs etudes y ont ete menees. Les plus recentes ont identifie des menaces de pollution de diverses origines dont celles associees aux changements climatiques (e.g. Maaref 2012). Au regard des impacts des modifications climatiques annonces a l'echelle du Nouveau-Brunswick, le bassin versant Iroquois/Blanchette pourrait etre fortement affecte, et cela de diverses facons. Plusieurs scenarios d'impacts sont envisageables, notamment les risques d'inondation, d'erosion et de pollution a travers une augmentation des precipitations et du ruissellement. Face a toutes ces menaces eventuelles, l'objectif de cette etude est d'evaluer les impacts potentiels des changements climatiques sur les risques d'erosion et de pollution a l'echelle du bassin versant Iroquois/Blanchette. Pour ce faire, la version canadienne de l'equation universelle revisee des pertes en sol RUSLE-CAN et le modele hydrologique SWAT ( Soil and Water Assessment Tool) ont ete utilises pour modeliser les risques d'erosion et de pollution au niveau dans la zone d'etude. Les donnees utilisees pour realiser ce travail proviennent de sources diverses et variees (teledetections, pedologiques, topographiques, meteorologiques, etc.). Les simulations ont ete realisees en deux etapes distinctes, d'abord dans les conditions actuelles ou l'annee 2013 a ete choisie comme annee de reference, ensuite en 2025 et 2050. Les resultats obtenus montrent une tendance a la hausse de la production de sediments dans les prochaines annees. La production maximale annuelle augmente de 8,34 % et 8,08 % respectivement en 2025 et 2050 selon notre scenario le plus optimiste, et de 29,99 % en 2025 et 29,72 % en 2050 selon le scenario le plus pessimiste par rapport a celle

  10. Reduction of emissions and geological storage of CO2. Innovation an industrial stakes

    Mandil, C.; Podkanski, J.; Socolow, R.; Dron, D.; Reiner, D.; Horrocks, P.; Fernandez Ruiz, P.; Dechamps, P.; Stromberg, L.; Wright, I.; Gazeau, J.C.; Wiederkehr, P.; Morcheoine, A.; Vesseron, P.; Feron, P.; Feraud, A.; Torp, N.T.; Christensen, N.P.; Le Thiez, P.; Czernichowski, I.; Hartman, J.; Roulet, C.; Roberts, J.; Zakkour, P.; Von Goerne, G.; Armand, R.; Allinson, G.; Segalen, L.; Gires, J.M.; Metz, B.; Brillet, B.

    2005-01-01

    An international symposium on the reduction of emissions and geological storage of CO 2 was held in Paris from 15 to 16 September 2005. The event, jointly organized by IFP, ADEME and BRGM, brought together over 400 people from more than 25 countries. It was an opportunity to review the international stakes related to global warming and also to debate ways of reducing CO 2 emissions, taking examples from the energy and transport sectors. The last day was dedicated to technological advances in the capture and geological storage of CO 2 and their regulatory and economic implications. This document gathers the available transparencies and talks presented during the colloquium: Opening address by F. Loos, French Minister-delegate for Industry; Session I - Greenhouse gas emissions: the international stakes. Outlook for global CO 2 emissions. The global and regional scenarios: Alternative scenarios for energy use and CO 2 emissions until 2050 by C. Mandil and J. Podkanski (IEA), The stabilization of CO 2 emissions in the coming 50 years by R. Socolow (Princeton University). Evolution of the international context: the stakes and 'factor 4' issues: Costs of climate impacts and ways towards 'factor 4' by D. Dron (ENS Mines de Paris), CO 2 emissions reduction policy: the situation in the United States by D. Reiner (MIT/Cambridge University), Post-Kyoto scenarios by P. Horrocks (European Commission), Possibilities for R and D in CO 2 capture and storage in the future FP7 program by P. Fernandez Ruiz and P. Dechamps (European Commission). Session II - CO 2 emission reductions in the energy and transport sectors. Reducing CO 2 emissions during the production and conversion of fossil energies (fixed installations): Combined cycles using hydrogen by G. Haupt (Siemens), CO 2 emission reductions in the oil and gas industry by I. Wright (BP). Reducing CO 2 emissions in the transport sector: Sustainable transport systems by P. Wiederkehr (EST International), The prospects for reducing

  11. Karm betoon, roheline kanjon : STAKES-i ja Senati kinnisvara büroo, Lintulahdenkuja 4, Sörnäinen, Helsingi = Office Facilities for the National Research and Development Centre for Welfare an Health (STAKES) and Senate Properties / Mikko Heikkinen,

    Heikkinen, Mikko

    2004-01-01

    Senati kinnisvarafirma valis oma peakorteri asukohaks endise lao. Samas ehitati STAKES-i uus hoone. Projekteerija: Heikkinen-Komonen OY. Autorid Mikko Heikkinen, Markku Komonen. Sisekujundus: Suunnittelupalvelut (STAKES), Heikkinen-Komonen (Senat). Maastikukujundus: Byman & Ruokonen. Valmis 2002. I korruse plaan, välis- ja sisevaated

  12. Capture and geological storage of CO2. Innovation, industrial stakes and realizations

    Lavergne, R.; Podkanski, J.; Rohner, H.; Otter, N.; Swift, J.; Dance, T.; Vesseron, Ph.; Reich, J.P.; Reynen, B.; Wright, L.; Marliave, L. de; Stromberg, L.; Aimard, N.; Wendel, H.; Erdol, E.; Dino, R.; Renzenbrink, W.; Birat, J.P.; Czernichowski-Lauriol, I.; Christensen, N.P.; Le Thiez, P.; Paelinck, Ph.; David, M.; Pappalardo, M.; Moisan, F.; Marston, Ph.; Law, M.; Zakkour, P.; Singer, St.; Philippe, Th.; Philippe, Th.

    2007-01-01

    The awareness of the international community and the convergence of scientific data about the global warming confirm the urgency of implementing greenhouse gases abatement technologies at the world scale. The growth of world energy demand will not allow to rapidly get rid of the use of fossil fuels which are the main sources of greenhouse gases. Therefore, the capture and disposal of CO 2 is a promising way to conciliate the use of fossil fuels and the abatement of pollutants responsible for the global warming. The economical and industrial stakes of this technique are enormous. In front of the success of a first international colloquium on this topic held in Paris in 2005, the IFP, the BRGM and the Ademe have jointly organized a second colloquium in October 2007, in particular to present the first experience feedbacks of several pilot experiments all over the world. This document gathers the transparencies of 27 presentations given at this colloquium and dealing with: the 4. IPCC report on the stakes of CO 2 capture and storage; the factor 4: how to organize the French economy transition from now to 2050; the technology perspectives, scenarios and strategies up to 2050; the European technological platform on 'zero-emission thermal plants'; the CO 2 capture and storage road-map in the USA; research, development and implementation of CO 2 capture and storage in Australia; the Canadian experience; ten years of CO 2 capture and storage in Norway; the In Salah operations (Algeria); CO 2 capture and storage: from vision to realisation; the oxi-combustion and storage pilot unit of Lacq (France); the Altmark gas field (Germany): analysis of CO 2 capture and storage potentialities in the framework of a gas assisted recovery project; oil assisted recovery and CO 2 related storage activities in Brazil: the Buracica and Miranga fields experience; carbon capture and storage, an option for coal power generation; steel-making industries and their CO 2 capture and storage needs

  13. Security infrastructures: towards the INDECT system security

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  14. Internet Banking Security Strategy: Securing Customer Trust

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  15. Planning security for supply security

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  16. Information security fundamentals

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  17. ORACLE DATABASE SECURITY

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  18. World and energy. Geopolitical stakes. 1 - the clues to understand. 2 - the maps in hands

    Furfari, S.

    2007-01-01

    In the energy domain, globalization has become a visible reality since several decades, in particular since the first petroleum shock of 1974/1975, but in reality since the first world war when petroleum started to play a key role. The aim of this book is to explain geopolitics and to foresee the Earth's future at the time of a major energy turn. In the first volume, the author explores the different eras of the energy world. A large part is devoted to the main energy resources with some precision about reserves, exploitation means and their impacts on the environment and on the climatic change. The second volume describes the main energy markets and their foreseeable evolution through a geopolitical analysis of maps. A large part is devoted to the European supplies and to the East-West relations which control them, in particular because of the huge gas reserves of Russia and of its former satellite countries. Another part is devoted to the big wold consumers, the present day ones (the USA) and the new ones (China and India), who stake both on North-South relations (Middle East and South America for the USA and Africa for China and India), and on areas which were traditionally of Europe's interests. (J.S.)

  19. Hierarchical cultural values predict success and mortality in high-stakes teams

    Anicich, Eric M.; Swaab, Roderick I.; Galinsky, Adam D.

    2015-01-01

    Functional accounts of hierarchy propose that hierarchy increases group coordination and reduces conflict. In contrast, dysfunctional accounts claim that hierarchy impairs performance by preventing low-ranking team members from voicing their potentially valuable perspectives and insights. The current research presents evidence for both the functional and dysfunctional accounts of hierarchy within the same dataset. Specifically, we offer empirical evidence that hierarchical cultural values affect the outcomes of teams in high-stakes environments through group processes. Experimental data from a sample of expert mountain climbers from 27 countries confirmed that climbers expect that a hierarchical culture leads to improved team coordination among climbing teams, but impaired psychological safety and information sharing compared with an egalitarian culture. An archival analysis of 30,625 Himalayan mountain climbers from 56 countries on 5,104 expeditions found that hierarchy both elevated and killed in the Himalayas: Expeditions from more hierarchical countries had more climbers reach the summit, but also more climbers die along the way. Importantly, we established the role of group processes by showing that these effects occurred only for group, but not solo, expeditions. These findings were robust to controlling for environmental factors, risk preferences, expedition-level characteristics, country-level characteristics, and other cultural values. Overall, this research demonstrates that endorsing cultural values related to hierarchy can simultaneously improve and undermine group performance. PMID:25605883

  20. New and renewable energies. Stakes, driving forces and perspectives of the renewable energies market

    2000-09-01

    New and renewable energies (hydro-power, wind-power, solar, biomass, biogas, geothermal and fuel cells) are progressively entering the industrialization phase (except for hydro-power which is already largely developed). Thus they are no more considered as solutions for utopian ecologists but have reached the status of alternative technologies. This study takes stock of the following questions: what are the applications of renewable energies, what is their stage of development and their potential with respect to fossil fuels, what are their perspectives of development, and what are the strategies developed by the actors of the sector? The main stakes of the renewable energy sector are: fulfilling the increasing power needs (in particular with the wind and solar power in isolated areas), improving the competitiveness (reduction of the investment costs), developing financial incentives (tax relief, financial helps, eco-taxes..), participating to the reduction of pollutant emissions. The renewable energy sector is progressively structuring and profits by the increasing implication of major energy actors, such as the oil companies. The behaviour and strategy of 14 major actors of the renewable energy sector is also analyzed. (J.S.)

  1. Middle school science teachers' reaction and pedagogical response to high stakes accountability: A multiple case study

    Tse, Kenneth

    The purpose of this study was to understand how science teachers reacted to the high stakes accountability and standardized testing in California. In a multiple case study of middle and intermediate schools in Southern California, four research questions focused on the perceptions of secondary science teachers and how they responded to the changes in the accountability specifically geared towards science as a content area, the pedagogical skills teachers were using both outside and inside of the classroom that impact instruction, the pedagogical training received that related specifically to the content standards, the tools or impediments that existed for teachers to successfully utilize these pedagogical methods and types of support and assistance the school site administration and/or school district offered in learning about the California Science Standards and the STAR test. Interviews were conducted with multiple middle/intermediate school teachers, science department chairpersons and school site administrators to gather information about what the classroom teachers were doing pedagogically to improve student performance on the STAR tests. Moreover, the study described the issues that supported the professional development of the teacher and what schools and districts were doing to support them.

  2. The socio-technical setting of economic stakes of global environment risks

    Salles, J.M.

    1993-01-01

    For policy-making for fighting acid rain, protecting the ozone layer and initiating action to prevent global climate change related to the growth of the greenhouse effect, the economic approach requires more precise consideration of how the economic stakes attached to these threats have been built up by their social actors. Global environmental risks (GER) are not directly perceivable nor can they be easily related to any activity or phenomena at local level (in time or space). There are scientific controversies about the reality of damage and establishing credible responsibility links. Moreover, these controversies are brought to media and social debate before any scientific clarification is possible. The media representations of GER emphasize the fact they could have catastrophic and irreversible consequences. So, the social demand for public action becomes very heavy when delay, possibly of several years between the causes and consequences of global environmental change, prevents any rapid clarification in the controversies. These difficulties have led to the evolution of a decision process in several steps: firstly, an international convention is prepared in which signatory countries commit themselves to cooperate and to take action; secondly, one or several agreements are signed with clear technical objectives and a timetable for implementations. 23 refs

  3. Outline of surface mass balance at Dome Fuji, East Antarctica, by the stake method from 1995 to 2006

    Takao Kameda

    2008-06-01

    Full Text Available This paper describes observational results of surface mass balance (SMB at Dome Fuji (77°19'01″S, 39°42'11″E; 3810m a.s.l., East Antarctica from 1995 to 2006. The SMB was estimated using 36 bamboo stakes (grid of 6×6, placed at 20m intervals. The heights of the stake tops from the snow surface were measured at 0.5cm resolution twice monthly in 1995, 1996, 1997, and 2003, and once a year for the rest of the study period. The annual SMB from 1995 to 2006 at Dome Fuji was 27.3±1.5kgm^a^. This result agrees well with the annual SMB from AD 1260 to 1993 (26.4kgm^a^, estimated from volcanic signals in the Dome Fuji ice core. From 1995 to 2006, there were 37 incidences of negative or zero annual SMB, which was 8.6%. Compared with similar studies at Vostok, South Pole and Dome C, we found that a site with SMB over 190kgm^a^ is expected to have annual snow accumulation at the 95% confidence level. Sites from 1500 to 2500m above sea level fit the criteria on the Antarctic ice sheet. According to stake and snow pit observations at Vostok, we estimated that the probability of an annual layer missing (hiatus at Dome Fuji under present-day and glacial conditions are 9.4% and 11.4%, respectively. Variations of SMB measured by 36-stakes for 12 years were also analyzed.

  4. T-Pattern Analysis and Cognitive Load Manipulation to Detect Low-Stake Lies: An Exploratory Study.

    Diana, Barbara; Zurloni, Valentino; Elia, Massimiliano; Cavalera, Cesare; Realdon, Olivia; Jonsson, Gudberg K; Anguera, M Teresa

    2018-01-01

    Deception has evolved to become a fundamental aspect of human interaction. Despite the prolonged efforts in many disciplines, there has been no definite finding of a univocally "deceptive" signal. This work proposes an approach to deception detection combining cognitive load manipulation and T-pattern methodology with the objective of: (a) testing the efficacy of dual task-procedure in enhancing differences between truth tellers and liars in a low-stakes situation; (b) exploring the efficacy of T-pattern methodology in discriminating truthful reports from deceitful ones in a low-stakes situation; (c) setting the experimental design and procedure for following research. We manipulated cognitive load to enhance differences between truth tellers and liars, because of the low-stakes lies involved in our experiment. We conducted an experimental study with a convenience sample of 40 students. We carried out a first analysis on the behaviors' frequencies coded through the observation software, using SPSS (22). The aim was to describe shape and characteristics of behavior's distributions and explore differences between groups. Datasets were then analyzed with Theme 6.0 software which detects repeated patterns (T-patterns) of coded events (non-verbal behaviors) that regularly or irregularly occur within a period of observation. A descriptive analysis on T-pattern frequencies was carried out to explore differences between groups. An in-depth analysis on more complex patterns was performed to get qualitative information on the behavior structure expressed by the participants. Results show that the dual-task procedure enhances differences observed between liars and truth tellers with T-pattern methodology; moreover, T-pattern detection reveals a higher variety and complexity of behavior in truth tellers than in liars. These findings support the combination of cognitive load manipulation and T-pattern methodology for deception detection in low-stakes situations, suggesting the

  5. T-Pattern Analysis and Cognitive Load Manipulation to Detect Low-Stake Lies: An Exploratory Study

    Barbara Diana

    2018-03-01

    Full Text Available Deception has evolved to become a fundamental aspect of human interaction. Despite the prolonged efforts in many disciplines, there has been no definite finding of a univocally “deceptive” signal. This work proposes an approach to deception detection combining cognitive load manipulation and T-pattern methodology with the objective of: (a testing the efficacy of dual task-procedure in enhancing differences between truth tellers and liars in a low-stakes situation; (b exploring the efficacy of T-pattern methodology in discriminating truthful reports from deceitful ones in a low-stakes situation; (c setting the experimental design and procedure for following research. We manipulated cognitive load to enhance differences between truth tellers and liars, because of the low-stakes lies involved in our experiment. We conducted an experimental study with a convenience sample of 40 students. We carried out a first analysis on the behaviors’ frequencies coded through the observation software, using SPSS (22. The aim was to describe shape and characteristics of behavior’s distributions and explore differences between groups. Datasets were then analyzed with Theme 6.0 software which detects repeated patterns (T-patterns of coded events (non-verbal behaviors that regularly or irregularly occur within a period of observation. A descriptive analysis on T-pattern frequencies was carried out to explore differences between groups. An in-depth analysis on more complex patterns was performed to get qualitative information on the behavior structure expressed by the participants. Results show that the dual-task procedure enhances differences observed between liars and truth tellers with T-pattern methodology; moreover, T-pattern detection reveals a higher variety and complexity of behavior in truth tellers than in liars. These findings support the combination of cognitive load manipulation and T-pattern methodology for deception detection in low-stakes

  6. Computer Security: the security marathon, part 2

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  7. How much is our fairness worth? The effect of raising stakes on offers by Proposers and minimum acceptable offers in Dictator and Ultimatum Games.

    Julie Novakova

    Full Text Available BACKGROUND: The aim of this study was to determine whether people respond differently to low and high stakes in Dictator and Ultimatum Games. We assumed that if we raised the stakes high enough, we would observe more self-orientated behavior because fairness would become too costly, in spite of a possible risk of a higher punishment. METHODS: A questionnaire was completed by a sample of 524 university students of biology. A mixed linear model was used to test the relation between the amount at stake (CZK 20, 200, 2,000, 20,000 and 200,000, i.e., approximately $1-$10,000 and the shares, as well as the subjects' gender and the design of the study (single vs. multiple games for different amounts. RESULTS: We have discovered a significant relationship between the amount at stake and the minimum acceptable offer in the Ultimatum Game and the proposed shares in both Ultimatum and Dictator Games (p = 0.001, p<0.001, p = 0.0034. The difference between playing a single game or more games with several amounts at stake did not influence the relation between the stakes and the offered and minimum acceptable shares. Women proved significantly more generous than men in their offers in the Dictator Game (p = 0.007. CONCLUSION: Our results suggest that people's behavior in the Dictator and Ultimatum Games depends on the amount at stake. The players tended to lower their relative proposed shares, as well as their relative minimum acceptable offers. We propose that the Responders' sense of equity and fair play depends on the stakes because of the costs of maintaining fairness. However, our results also suggest that the price of fairness is very high and that it is very difficult, probably even impossible, to buy the transition of Homo sociologicus into Homo economicus.

  8. Dynamique de changement de l’arganeraie entre sur-usage et mutations sociales : une opportunité d’équilibre socio-écologique ?

    Farid El Wahidi

    2014-12-01

    Full Text Available Detecting and characterizing forest cover change over time is the first step towards the identification of driving forces and understanding their mechanisms. Using remote sensing data and socio-economic surveys, this work tries to understand man-environment interactions in the Haha argan forest (14.7 % of the entire Moroccan argan forest. It consists, in a first step, on detecting and characterizing forest cover changes. The second step seeks to link the estimated change to specific factors from the analysis of traditional land management and demographic, socio-economic dynamics in the study area. The obtained results contribute to clarify the ambiguous speech around the argan forest degradation, at least in the mountain and along the Atlantic band. It implies a small rate of decline in forest area, barely exceeding a rate of 0.2% between 1993 and 2006. As for the stumps density, it almost does not decrease (averaging 0.6 stump/ha between 1984 and 2006. These changes, often subtle, are observed in 96.5% in the common area (mouchaa for free use and not submitted to the traditional land management regulation (agdals set by the local community. The Haha argan forest is experiencing a long-term of ecological dynamic change corollary to a demographic, social and economic dynamics so called favorable to its preservation. Nevertheless, it suffers from a qualitative degradation and a dysfunction of natural processes limiting any restoration dynamic and making questionable the reliability and the sustainability of this agro-ecosystem. Détecter et caractériser les changements du couvert forestier au fil du temps est la première étape vers l'identification des forces motrices et la compréhension de leurs mécanismes. Ce travail consiste, en combinant données de télédétection et enquêtes socio-économiques, à construire une image de l’ensemble des interactions homme-environnement autour de l’arganeraie des Haha (sud-ouest marocain. Il s

  9. Information Systems Security Audit

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  10. Security for grids

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  11. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-06-15

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  12. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-01-01

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358

  13. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Muhammad Awais Javed

    2016-06-01

    Full Text Available Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  14. Quality of Security Service: Adaptive Security

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  15. Social Security Bulletin

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  16. Transportation Security Administration

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  17. Security, Fraud Detection

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  18. Computer security engineering management

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  19. USCG Security Plan Review

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  20. THE ARTWORK IN THE FIELD OF ART: THE STAKE, THE CAPITAL, THE HABITUÉS

    A. A. Kalashnikova

    2017-01-01

    the position in the field. Looking at the social and individual significance of time and space, we prove the ability to treat a single work as the agent’s stake, which is a replica of his habitués at any given time. Agent’s success from this perspective is analyzed as determined by the winning of one or more of these stakes at the moment when they are relevant to the objective conditions, the definition of the field core value. In turn, for mediating agents the purchasing and possession of artworks is an attempt to both guess and provide to works a certain measure of symbolic power sufficient to win. Having considered the mentioned connections, we come to the conclusion that artworks are really involved in the structuring of art the field by obtaining capital and positions for agents with which they are associated. Since the examination of the objects through the research optics of fields theory helps to clarify the mechanism of symbolic game (struggle, we conclude that this approach may be useful in studying other fields of symbolic production, as well as to provide the basis for art field empirical studies.

  1. Kyrgyzstan's security problems today

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  2. Information Security Maturity Model

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  3. Security By Design

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  4. Foundational aspects of security

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  5. Security guide for subcontractors

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  6. High-Stakes Systematic Reviews: A Case Study From the Field of Teen Pregnancy Prevention.

    Goesling, Brian; Oberlander, Sarah; Trivits, Lisa

    2016-08-19

    Systematic reviews help policy makers and practitioners make sense of research findings in a particular program, policy, or practice area by synthesizing evidence across multiple studies. However, the link between review findings and practical decision-making is rarely one-to-one. Policy makers and practitioners may use systematic review findings to help guide their decisions, but they may also rely on other information sources or personal judgment. To describe a recent effort by the U.S. federal government to narrow the gap between review findings and practical decision-making. The Teen Pregnancy Prevention (TPP) Evidence Review was launched by the U.S. Department of Health and Human Services (HHS) in 2009 as a systematic review of the TPP literature. HHS has used the review findings to determine eligibility for federal funding for TPP programs, marking one of the first attempts to directly link systematic review findings with federal funding decisions. The high stakes attached to the review findings required special considerations in designing and conducting the review. To provide a sound basis for federal funding decisions, the review had to meet accepted methodological standards. However, the review team also had to account for practical constraints of the funding legislation and needs of the federal agencies responsible for administering the grant programs. The review team also had to develop a transparent process for both releasing the review findings and updating them over time. Prospective review authors and sponsors must recognize both the strengths and limitations of this approach before applying it in other areas. © The Author(s) 2016.

  7. Higher Stakes: Generational Differences in Mother and Daughters’ Feelings about Combining Motherhood with a Career

    Jill Armstrong

    2017-08-01

    Full Text Available The purpose of this article is to illuminate differences in feelings and attitudes about managing motherhood and work between career women and their adult daughters. Intergenerational narrative interviews with 30 mother and daughter pairs are used to explore the relative influences of contemporary motherhood culture and the experience of being mothered by a woman who also worked full-time or close to full-time in a professional or managerial career. Almost all the daughters felt well-mothered and planned or had embarked upon a high-status career path. Despite this, a clear majority did not want to emulate their mothers and instead embraced a dominant idea that part-time work offers ‘the best of both worlds’. The daughters are strongly influenced by the contemporary culture of motherhood with its growing emphasis on ‘balance’ (measured by time, individualisation and parental determinism. It appears that the stakes have been raised to make it feel too risky to one’s child’s well-being and progress to emulate the more pragmatic attitude to combining work and motherhood demonstrated by many of their own mothers. Much research demonstrates that part-time work presents strong barriers both to career satisfaction and progress. This reinforces the need for organisations to offer more genuinely flexible ways of working in senior roles and for policy initiatives to facilitate the greater involvement of fathers in caring for their children. For individuals, I advocate challenging the idea of measuring good mothering by ‘balanced’ hours spent at work and at home.

  8. Nuclear systems of the future. Stakes, R and D strategy, and international cooperation

    2005-01-01

    As demonstrated by prospective studies, nuclear energy will represent a decisive contribution in the future energy mix. The long-term strategy of development of nuclear energy requires to foresee a new generation of nuclear systems, named generation 4. The goal of these new systems is to optimize the use of nuclear fuels, to minimize the generation of wastes and to enlarge the field of applications of nuclear energy to other applications like: hydrogen and synthetic fuels generation, heat generation for the industry etc. This document presents the French R and D strategy on nuclear systems of 4. generation that has been approved by the public authorities. This strategy follows three axes: a priority research on fast neutron systems with fuel recycle (sodium fast reactors (SFR) and gas fast reactors (GFR)), a research on key-technologies for the supply of very high temperature heat (very high temperature reactor (VHTR), fast and thermal neutron reactors, and water decomposition processes), and a continuation of researches on PWR reactors improvement. An integral recycling of all actinides in fast neutron reactors requires the development of new fuel reprocessing and fuel re-fabrication processes. A reference scenario for the progressive renewal of French nuclear facilities foresees the simultaneous development of fast neutron systems and the start-up of a new spent fuel reprocessing plant. France in involved in the development of the SFR, GFR and VHTR systems thanks to its participation to the Generation 4 international forum and to bilateral cooperation with other big nuclear partners like Russia and China. One of the main stakes of the French nuclear industry is to be able to invest in the R and D of future nuclear systems in order to valorize the experience gained so far in sodium FBR systems and in fuel cycle processes. (J.S.)

  9. "The stakes are so high": interviews with progressive journalists reporting on abortion.

    Sisson, Gretchen; Herold, Stephanie; Woodruff, Katie

    2017-12-01

    Because news frames can influence public and policy agendas, proponents of abortion access should be concerned with how this issue is covered in the news. While previous research has examined the content of news on abortion, this analysis explores the process of newsmaking on abortion, examining how journalists understand their role in and experience of covering abortion. We recruited journalists with experience reporting on abortion through listservs for progressive and feminist reporters. Thirty-one participants, with experiences at 75 diverse media outlets, completed in-depth, open-ended interviews. We used grounded theory to code interview transcripts in Dedoose to identity emergent themes. Journalists described many challenges that applied to reporting generally, but that they perceived to be more difficult around abortion: grappling with the meaning of "neutrality" on this issue, finding new angles for articles, and handling editors with varying knowledge of abortion. Over one-third (n=13) of participants mentioned feeling that the stakes were higher around abortion: this urgency and polarization left journalists frustrated by efforts to find new sources or angles on abortion stories. Finally, over 80% (n=28) of participants reported experiencing anti-abortion harassment as a result of their abortion work. The difficulties journalists described when reporting on abortion were often rooted in abortion stigma and the political polarization around the issue. This pattern was true even for reporters who worked to counter abortion stigma through their reporting. Advocates interested in accurate, destigmatizing news frames might work pro-actively to educate editors and increase reporters' access to providers, patients, and advocates. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Redefining security.

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  11. Personnel Security Investigations -

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  12. Security 2020 Reduce Security Risks This Decade

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  13. The corporate security professional

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  14. Security guide for subcontractors

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  15. Emotion at Stake—The Role of Stake Size and Emotions in a Power-to-Take Game Experiment in China with a Comparison to Europe

    Ronald Bosman

    2017-03-01

    Full Text Available This paper experimentally investigates how monetary incentives and emotions influence behavior in a two-player power-to-take game (PTTG. In this game, one player can claim any part of the other's endowment (take rate, and the second player can respond by destroying any part of his or her own endowment. The experiment is run in China. We further compare our findings with the behavior of two European subject pools. Our results give new insights regarding emotion regulation. Even though stake size does not appear to matter for take rates and destruction rates, it does matter for the reaction function of the responder regarding the take rate. When stakes are high, there is less destruction for low and intermediate take rates, and more destruction for high take rates, compared to relatively low stakes. Under low incentives, ‘hot’ anger-type emotions are important for destruction, while ‘cool’ contempt becomes prominent under high monetary incentives. These results suggest emotion regulation in the high-stake condition. Moreover, emotions are found to fully mediate the impact of the take rate on destruction when stakes are low, whereas they only partially do so if stakes are high. Comparing the low-stakes data for China with existing European data, we find similarities in behavior, emotions and emotion intensities, as well as the full mediation of the take rate by emotions. We find some differences related to the type of emotions that are important for destruction. Whereas anger and joy are important in both, in addition, irritation and fear play a role in China, while this holds for contempt in the EU.

  16. Secure data exchange between intelligent devices and computing centers

    Naqvi, Syed; Riguidel, Michel

    2005-03-01

    The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.

  17. Security research roadmap; Security-tutkimuksen roadmap

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  18. Water, agriculture, energy: a growing interweaving. Towards an extended water security

    Taithe, Alexandre

    2009-01-01

    In this paper, the author first notices that the definition of water security according to the United Nations Development Program (UNDP) is a rather restrictive one. Thus, the search for a global security takes all forms of insufficiencies and (military or not) instabilities into account, and is then related to strategic stakes of State stability such as agriculture production, water or energy. He discusses the determining factors and vulnerabilities of a renewed water security and its implications. He highlights how internal political and social constraints are sources of local and regional tensions. In this respect, agriculture is at the heart of use conflicts (difficult and necessary reform of the sector, rivalries between rural and urban users), and water stress directly affects daily domestic uses. The author then outlines the necessary integration stakes related to water, food and energy by discussing the use of water in energy production, the use of energy to produce drinkable water, the relationship between agriculture and energy, and, of course between agriculture and water as agriculture is the main water consumer

  19. Unix Security Cookbook

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  20. Untangle network security

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  1. Arguing Against Security Communitarianism

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  2. Security research roadmap

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  3. IAEA nuclear security program

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  4. IAEA nuclear security program

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  5. Professional Cocoa Application Security

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  6. Understanding the Reading Attributes and Their Cognitive Relationships on a High-Stakes Biology Assessment

    Rawlusyk, Kevin James

    Test items used to assess learners' knowledge on high-stakes science examinations contain contextualized questions that unintentionally assess reading skill along with conceptual knowledge. Therefore, students who are not proficient readers are unable to comprehend the text within the test item to demonstrate effectively their level of science knowledge. The purpose of this quantitative study was to understand what reading attributes were required to successfully answer the Biology 30 Diploma Exam. Furthermore, the research sought to understand the cognitive relationships among the reading attributes through quantitative analysis structured by the Attribute Hierarchy Model (AHM). The research consisted of two phases: (1) Cognitive development, where the cognitive attributes of the Biology 30 Exam were specified and hierarchy structures were developed; and (2) Psychometric analysis, that statistically tested the attribute hierarchy using the Hierarchy Consistency Index (HCI), and calculate attribute probabilities. Phase one of the research used January 2011, Biology 30 Diploma Exam, while phase two accessed archival data for the 9985 examinees who took the assessment on January 24th, 2011. Phase one identified ten specific reading attributes, of which five were identified as unique subsets of vocabulary, two were identified as reading visual representations, and three corresponded to general reading skills. Four hierarchical cognitive model were proposed then analyzed using the HCI as a mechanism to explain the relationship among the attributes. Model A had the highest HCI value (0.337), indicating an overall poor data fit, yet for the top achieving examinees the model had an excellent model fit with an HCI value of 0.888, and for examinees that scored over 60% there was a moderate model fit (HCI = 0.592). Linear regressions of the attribute probability estimates suggest that there is a cognitive relationship among six of the ten reading attributes (R2 = 0.958 and 0

  7. Analisis pengelolaan peralatan praktikum fisika kelas XI SMA Muhammadiyah 1 Yogyakarta menggunakan model countenance stake

    Hanin Fathan Nurfina Istiqomah

    2016-11-01

    Full Text Available Penelitian ini bertujuan untuk mengetahui ketersediaan dan pengelolaan peralatan praktikum serta mengetahui hasil dari pengelolaan dan penggunaan peralatan praktikum fisika kelas XI di laboratorium fisika SMA Muhammadiyah 1 Yogyakarta. Penelitian ini merupakan penelitian evalusi model countenance stake. Subjek penelitian meliputi penanggungjawab laboratorium fisika, guru, laboran, dan siswa kelas XI MIA SMA Muhammadiyah 1 Yogyakarta. Penelitian dilakukan pada akhir pelaksanaan praktikum pada semester genap tahun pelajaran 2015-2016. Data dikumpulkan dengan wawancara terstruktur, pengamatan (observasi, angket, dokumentasi. Hasil penelitian menunjukkan bahwa ketersediaan peralatan praktikum (masukan [antecedents] yang terdiri dari sarana, prasarana dan alat praktikum tersedia sangat baik dengan persentase sebesar 78,16%. Pengelolaan laboratorium fisika (proses [transaction] yang terdiri dari persiapan pelaksanaan praktikum; kesiapan siswa, guru, laboran; dan pelaksanaan praktikum mendapatkan hasil sangat baik dengan persentase sebesar 81,78%. Hasil yang diperoleh (outcomes dari ketersediaan dan pengelolaan peralatan praktikum di laboratorium fisika termasuk kategori baik (B+ dengan pencapaian Kriteria Ketuntasan Minimal (KKM 100% dari total 233 siswa kelas XI MIA (Matematika dan Ilmu Alam dan beberapa siswa berhasil meraih juara 1 Olimpiade Fisika. This research is aimed to know the availability, management of the laboratory equipment’s and also the result of maintaining and using physics laboratory equipment’s in 11th class of MIA SMA 1 Muhammadiyah Yogyakarta. And this evaluation research used “countenance stake” approach, hence, such as the objects of it is the physics laboratory care taker, teachers, laboratory assistant, and the students. This research was conducted in the last meeting of practicum on last semester 2015-2016 periods. The data was assembled by interview, observation, questionnaire and documentation. The result of this

  8. Lecture 2: Software Security

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  9. Scenarios for transition towards a low-carbon world in 2050: What's at stake for heavy industries?

    2008-11-01

    Launched in 2004, the study Scenarios for transition towards a low-carbon world in 2050: What's at stake for heavy industries explores how major industrial sectors will be impacted by a carbon constraint stabilizing atmospheric CO 2 concentration at 450 ppm. By means of an innovative hybrid modelling platform and ongoing dialogue between researchers and industrialists, the study produces conclusions concerning both general climate policy as well as the economic response of industrial sectors - specifically of the steel, aluminium, cement, and sheet glass sectors, as well as of the energy sector. (authors)

  10. Caucasus and the petroleum stakes of Caspian Sea; Le Caucase et les enjeux petroliers de la Mer Caspienne

    Jalillosoltan, N. [Universite de Franche Comte, 25 - Montbeliard (France); Faculte de Droit de Besancon, 25 (France)

    2001-07-01

    The splitting of the former USSR block in 1991 has generated a shock wave in the Caucasus area with the will of all ex-soviet republics to reach their complete independence. Because of the historical and geographical complexity of Caucasus, both geopolitical and human, this disorder has generated even more hazardous results, enhanced by the coveted oil and gas reserves of the Caspian Sea. This article analyses the petroleum stakes as factors of rivalry and instability (sovereignty of oil and gas fields, rivalries about the exploitation and transport of hydrocarbons), but also as factors of cooperation and re-composition. (J.S.)

  11. What can Iran gain by having a nuclear weapons program that threatens to destabilize security in the Middle East?

    Nielsen, Thomas Galasz

    and a lot of neigh- bouring countries fear such a development for security reasons. But why is Iran following a nuclear path that may further destabilise the fragile security situation in the Middle East? It is to do with Iran’s own perception of security risks, its desire for greatness in the region......- bination with its important strategic location by the Strait of Hormuz, and supports various political groupings in and around Syria and Iraq to attract the attention of the United States of American in an attempt to become recognised as the most important player in the Middle East. Should Iran succeed...... in its brinkmanship and the outcome could be the lifting of the UN sanctions, international recognition, improved security, and even a possible end to internal political power struggles due to likely economic reforms post-sanctions. Much is at stake for Iran, but, if it succeeds, it could shift...

  12. HIGH STAKES CHESS: HASHEMITE MONARCHY MASTERS THE GAME IN SPITE OF ALL ODDS

    2017-05-01

    today . According to Ryan, “Jordan exists – sometimes tenuously – in a very difficult neighborhood, surrounded by more powerful states whose problems...continue to play out, and wonders whether 2011 represented an anomaly or a precursor of much greater turmoil yet to come. Globalization and the... business or government district – both regimes clamped down with security forces and progovernment thugs (baltagiya) causing a number of casualties

  13. Defining Information Security.

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  14. Managing Cisco network security

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  15. Changements et alimentation dans le cadre d'une colonisation spontanée: le cas des immigrants de l'Inambari (Pérou

    1975-01-01

    éfiance le pousse à chercher la sécurité dans une structure alimentaire connue et il le démontre en essayant de recréer le type d'alimentation auquel 11 était habitué. La deuxième partie traite des techniques de conservation des aliments. Les opérations de conservation ne concernent que les produits végétaux, le gibier et le poisson. L'apport de la cueillette, en effet, est pratiquement inexistant les produits de la basse-cour, peu importants, sont accessibles chaque jour les denrées importées, enfin, lorsqu'elles arrivent dans la région considérée, ont déjà subi une transformation qui en assure la conservation. Qu'il s'agisse de conserver le riz, le maïs, les « papas japonesas », les bananes ou les produits de la chasse et de la pèche, l'immigrant doit assimiler de nouvelles techniques: par exemple, pour conserver la viande, remplacer le gel et le soleil par la fumée et la chaleur du feu. La troisième partie aborde les différentes opérations qui, placées entre la récolte et la réserve d'une part, la consommation d'autre part, permettent à l'immigrant de transformer le produit acquis - frais ou déjà séché - en produit consommable. Le colon doit se familiariser avec de nouvelles techniques, apprendre à confectionner et d'utiliser aussi bien le mortier à riz et son marteau de bois dur, que le pressoir à levier. Apres quelques mots sur l'eau, on examine la cuisson des aliments. Et c'est l'occasion de remarquer, entre autres, que le feu n'est surélevé qu'à partir du moment ou l'immigrant édifie son habitation définitive, c'est-à-dire s'installe en permanence dans la région considérée. La quatrième partie traite de l'absorption des aliments et répond aux questions suivantes: quand, où et avec qui, comment et avec quoi mange-t-on? Il apparaît à travers cette étude que le processus de changement n'a pas été le même dans toutes les étapes du cycle alimentaire. Certes, l'immigrant a bien été obligé d'accepter les nouveaux

  16. Companies and energy transition: The stakes of mobility. A case study in the cities of Lille and Lyon

    Lejoux Patricia

    2014-07-01

    Full Text Available Regarding energy transition in the area of mobility, the literature gives prominence to two types of actor which appear to play leading roles: public authorities and households. However, the role played by companies in this energy transition appears to have attracted only marginal attention. Nonetheless, companies influence mobility through the transport of goods, professional travel and commuter trips they generate. If they participate in the growth of this mobility, might they not also contribute to reducing it? What is the viewpoint held by companies regarding these questions? The aim of this article is to highlight the stakes of this energy transition in the domain of mobility in order to represent the viewpoint of companies. The results show that company managers are effectively concerned by the stakes of energy transition in the domain of mobility and that they have already taken measures in favour of more sustainable mobility. But this is more for economic (increased transport costs and social (recruitment problems, turnover linked to the increased cost of car mobility reasons than for environmental ones (reduction of greenhouse gas emissions.

  17. Securing the Vista Environment

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  18. Digital security technology simplified.

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  19. ICT security management

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  20. Android apps security

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  1. Smart security proven practices

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  2. Nation State as Security Provider in Human Security Issue

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  3. Modelling security and trust with Secure Tropos

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  4. Securing abundance : The politics of energy security

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  5. Embedded Java security security for mobile devices

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  6. Specific transport and storage solutions: Waste management facing current and future stakes of the nuclear fuel cycle

    Deniau, Helene; Gagner, Laurent; Gendreau, Francoise; Presta, Anne

    2006-01-01

    With major projects ongoing or being planned, and also with the daily management of radioactive waste from nuclear facilities, the role of transport and/or storage packaging has been often overlooked. Indeed, the packaging development process and transport solutions implemented are a key part of the waste management challenge: protection of people and environment. During over four decades, the AREVA Group has developed a complete and coherent system for the transport of waste produced by nuclear industries. The transport solutions integrate the factors to consider, as industrial transportation needs, various waste forms, associated hazards and current regulations. Thus, COGEMA LOGISTICS has designed, licensed and manufactured a large number of different transport, storage and dual purpose cask models for residues and all kinds of radioactive wastes. The present paper proposes to illustrate how a company acting both as a cask designer and a carrier is key to the waste management issue and how it can support the waste management policy of nuclear producers through their operational choices. We will focus on the COGEMA LOGISTICS technical solutions implemented to guarantee safe and secure transportation and storage solutions. We will describe different aspects of the cask design process, insisting on how it enables to fulfill both customer needs and regulation requirements. We will also mention the associated services developed by the AREVA Business Unit Logistics (COGEMA LOGISTICS, TRANSNUCLEAR, MAINCO, and LEMARECHAL CELESTIN) in order to manage transportation of liquid and solid waste towards interim or final storage sites. The paper has the following contents: About radioactive waste; - Radioactive waste classification; - High level activity waste and long-lived intermediate level waste; - Long-lived low level waste; - Short-lived low- and intermediate level waste; - Very low level waste; - The radioactive waste in nuclear fuel cycle; - Packaging design and

  7. Security of pipeline facilities

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  8. Les défis de la réconciliation des objectifs de développement dans le contexte du changement démographique 

    John Provo

    2011-04-01

    Full Text Available Cet article cherche à déterminer si l’initiative de développement basé sur les ressources (ABDI, Asset-Based Development Initiative de la Commission régionale des Appalaches (ARC, Appalachian Regional Commission aux États-Unis réconcilie les objectifs de développement économique dans les communautés qui présentent un changement démographique. À travers des études de cas reposant sur des entretiens informatifs clés menés dans les communautés de la Virginie Occidentale et un examen de projets financés par l’ARC, les auteurs tentent de répondre à deux questions fondamentales : « Le leadership communautaire a-t-il évolué et s’est-il adapté au programme ? » et « Les nouveaux projets différaient-ils clairement, en termes d’objectifs, de contenu ou de résultats, des projets antérieurs ? ». Les similitudes économiques et démographiques entre les communautés alpines et appalachiennes, notamment en ce qui concerne le rôle des immigrants, suggèrent que les conclusions de cette étude seront pertinentes pour d’autres régions de montagnes et pourraient contribuer à un débat entre spécialistes du développement en montagne.This paper considers whether the US Appalachian Regional Commission (ARC Asset-Based Development Initiative (ABDI reconciles economic development objectives in communities experiencing demographic change. Through a case study approach utilizing key informant interviews in Southwest Virginia communities and a review of ARC-funded projects, the authors consider two main questions. Did community leadership change or adapt to the program? Were new projects demonstrably different in objectives, content, or outcomes than past projects? Economic and demographic similarities between Alpine and Appalachian communities, particularly in the role of in-migrants, suggest that this study’s findings will be relevant for other mountain regions and could contribute to a conversation among

  9. Early Post-Irradiation Changes in the Metabolism of Biogenic Amines; Les Changements Precoces du Metabolisme des Amines Biogenes apres Irradiation

    Deanovic, Z [Institut Rudjer Boskovic, Zagreb, Yugoslavia (Croatia)

    1971-03-15

    There is accumulating evidence for the radiation-induced release of biogenic amines from their body stores. Having in mind the high patho-physiological activity of these ''local'' hormones and ''neuro-hormones'', it is reasonable to assume that they play an important role in the pathogenesis of the acute radiation syndrome. Under these pathological conditions the possible synergic and antagonistic effects of biogenic amines due to their complex interactions must be taken into consideration. The extent and dose-dependence of post-irradiation changes in the metabolism of histamine, serotonin, catecholamines and acetylcholine will be examined regarding particularly the search for biochemical indicators of radiation injury. The determination of bio-amines and their metabolites in urine seems to be a suitable method for following up those metabolic changes which could be of a biodosimetrical and/or prognostical value. Data published on this subject, obtained in experimental animals as well as in man, have been reviewed and the applicability of these tests is discussed. (author) [French] Des preuves se sont accumulees, qui demontrent que les amines biogenes sont liberees de leurs depots sous l'effet des rayonnements ionisants. Etant donne la grande activite pathophysiologique de ces hormones 'locales' et 'neurohormones', il est raisonnable de considerer que ces substances biogenes jouent un role important dans la pathogenese du syndrome aigu d'irradiation. Dans ces conditions pathologiques il faut tenir compte des effets synergiques et antagonistes des bio-amines, lies a des interactions compliquees. Les changements metaboliques en fonction de la dose recue font l'objet d'un examen qui englobe les alterations quantitatives de .'histamine, de la serotonine, des catecholamines et de l'acetylcholine et dont l'objectif est la recherche sur des indicateurs biochimiques de la lesion provoquee par l'irradiation. L'analyse des bio-amines et de leurs metabolites dans les urines

  10. IoT: Their Conveniences, Security Challenges and Possible Solutions

    Davar Pishva

    2017-07-01

    Full Text Available The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security challenges of these devices are becoming realities in the present day life. The paper initially provides some introductory information about the topic, mostly by means of survey and citations of previous work. It then highlights the devastating effects of October 21, 2016 DDoS attack which mainly utilized IoT devices. It emphasizes the danger of recently revealed Mirai IoT botnet which serves as the basis for the DDoS-for-hire ‘booter’/ ‘stresser’ service. In terms of counter measures, after highlighting IoT security implementation challenges, numerous approaches are presented. As a long-term solution, an architecture wherein security issues are managed through universal home gateway by network operators in a product based fashion is emphasized. The author shows its technical feasibility and demonstrates its partial materialization in proprietary manners. It then explains why and how numerous stake holders are needed to get together for its wide range commercial implementation. Some immediate necessary safeguard actions and intermediate schemes which include soft infrastructures are also presented for the purpose of risk reduction.

  11. Security Protocols in a Nutshell

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  12. Institutionalizing Security Force Assistance

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  13. Security of Dependable Systems

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  14. Security in Computer Applications

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  15. Wireshark network security

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  16. Medical Information Security

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  17. Windows Security patch required

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  18. Cloud security mechanisms

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  19. Security system signal supervision

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  20. Android application security essentials

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  1. Finance/security/life.

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  2. Electronic healthcare information security

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  3. Hybrid Security Policies

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  4. Mobile platform security

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  5. Stereotype Threat, Inquiring about Test Takers' Race and Gender, and Performance on Low-Stakes Tests in a Large-Scale Assessment. Research Report. ETS RR-15-02

    Stricker, Lawrence J.; Rock, Donald A.; Bridgeman, Brent

    2015-01-01

    This study explores stereotype threat on low-stakes tests used in a large-scale assessment, math and reading tests in the Education Longitudinal Study of 2002 (ELS). Issues identified in laboratory research (though not observed in studies of high-stakes tests) were assessed: whether inquiring about their race and gender is related to the…

  6. EMI Security Architecture

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  7. Secure pairing with biometrics

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  8. Selecting Security Technology Providers

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  9. Microsoft Azure security

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  10. Operations Security (OPSEC) Guide

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  11. SOCIAL MEDIA SECURITY

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  12. Mobile communication security

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  13. Learning Puppet security

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  14. Refelctions on the security

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  15. The creation of a pedagogy of promise: Examples of educational excellence in high-stakes science classrooms

    McCollough, Cherie A.

    The current reform movement in education has two forces that appear contradictory in nature. The first is an emphasis on rigor and accountability that is assessed through high-stakes testing. The second is the recommendation to have student centered approaches to teaching and learning, especially those that emphasize inquiry methodology and constructivist pedagogy. Literature reports that current reform efforts involving accountability through high-stakes tests are detrimental to student learning and are contradictory to student-centered teaching approaches. However, by focusing attention on those teachers who "teach against the grain" and raise the achievement levels of students from diverse backgrounds, instructional strategies and personal characteristics of exemplary teachers can be identified. This mixed-methods research study investigated four exemplary urban high school science teachers in high-stakes (TAKS) tested science classrooms. Classroom observations, teacher and student interviews, pre-/postcontent tests and the Constructivist Learning Environment Survey (CLES) (Johnson & McClure, 2004) provided the main data sources. The How People Learn (National Research Council, 2000) theoretical framework provided evidence of elements of inquiry-based, student-centered teaching. Descriptive case analysis (Yin, 1994) and quantitative analysis of pre/post tests and the CLES revealed the following results. First, all participating teachers included elements of learner-centeredness, knowledge-centeredness, assessment-centeredness and community-centeredness in their teaching as recommended by the National Research Council, (2000), thus creating student-centered classroom environments. Second, by establishing a climate of caring where students felt supported and motivated to learn, teachers managed tensions resulting from the incorporation of student-centered elements and the accountability-based instructional mandates outlined by their school district and state

  16. Core software security security at the source

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  17. Secure Transportation Management

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  18. Pro Spring security

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  19. Android security cookbook

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  20. Information security management handbook

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  1. European [Security] Union

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  2. Quality of Security Service: Adaptive Security

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  3. Securing collaborative environments

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  4. Contemporary security management

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  5. Introduction to Hardware Security

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  6. DNS security management

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  7. Information security cost management

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  8. Cross-Cultural Comparative Analysis of Lay and Stake holder Reasoning about Fusion Energy in Spain and the UK

    Prades, A; Horlick-Jones, T; Oltra, C; Navajas, J

    2009-07-01

    This report presents the results of a cross-cultural comparative analysis of two corpora of data from Spain and the UK on lay and stake holders understanding and reasoning about fusion energy. The very same novel methodological approach was applied in Spain and the UK to promote a learning and deliberative process about fusion energy. A brief description of the method is included first, followed by the description of the two corpora of data. Next the main Spanish findings data are discussed in the light of the UK data and then vice versa (in other words, we first interrogate the UK corpus of data to look for resonances or places of tension with the Spanish findings, and then the other way around). Then we present the results of evaluating the Spanish and UK group-based processes as engagement exercises. Finally, the key conclusions of this cross-cultural data analysis are summarized. (Author) 40 refs.

  9. Stakes and modalities of the climatic risk covering; Enjeu et modalites de la couverture du risque climatique

    Marteau, D

    2006-07-01

    Several econometric works show that climatic volatility is at the first rank of the risk factors in several economic sectors like energy, textile, agriculture and food, tourism, leisure, building industries etc. However, climate remains an underestimated economic factor for several reasons: lack of awareness about the comparative stakes of climate risks management and market risks management, difficulties in the measurement of climate risk exposure, weak knowledge of covering techniques for private contract and organized markets, and unsolved question of risk sharing between shareholders and managers. This document analyzes the sensitivity of companies with respect to climate risk and describes the 5 steps of implementation of a climate covering policy: risk exposure measurement, risk bearing or transfer decision, definition of the optimum covering profile, choice of markets and covering instruments, efficiency measurement. A practical example is shown with its related questions. (J.S.)

  10. A moderated mediated path analysis of factors influencing student performance on a standardized high-stakes science test

    Pelkey, Ramona K.

    Gender, ethnicity, family economic status, reading score, mathematics score, and number of science semesters successfully completed were examined for their contributory role to a student's science score on a high-stakes, high school exit examination. Path analysis and analysis of variance procedures were used to quantify each variable's influence on science score. Gender, ethnicity, and family economic status were found to be moderators while reading proved to mediate within the model. The path model was created using a calibration sample and cross-validated using a hold-out validation sample. Bootstrapping was used to verify the goodness of fit of the model. A predictive equation explained 66% (R2 = .66) of the variance in observed TAKS science score.

  11. Cross-Cultural Comparative Analysis of Lay and Stake holder Reasoning about Fusion Energy in Spain and the UK

    Prades, A.; Horlick-Jones, T.; Oltra, C.; Navajas, J.

    2009-01-01

    This report presents the results of a cross-cultural comparative analysis of two corpora of data from Spain and the UK on lay and stake holders understanding and reasoning about fusion energy. The very same novel methodological approach was applied in Spain and the UK to promote a learning and deliberative process about fusion energy. A brief description of the method is included first, followed by the description of the two corpora of data. Next the main Spanish findings data are discussed in the light of the UK data and then vice versa (in other words, we first interrogate the UK corpus of data to look for resonances or places of tension with the Spanish findings, and then the other way around). Then we present the results of evaluating the Spanish and UK group-based processes as engagement exercises. Finally, the key conclusions of this cross-cultural data analysis are summarized. (Author) 40 refs.

  12. Computer Security Systems Enable Access.

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  13. Home - Defense Technology Security Administration

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  14. The Perceived Value of Maths and Academic Self-Efficacy in the Appraisal of Fear Appeals Used Prior to a High-Stakes Test as Threatening or Challenging

    Putwain, David William; Symes, Wendy

    2014-01-01

    Previous work has examined how messages communicated to students prior to high-stakes exams, that emphasise the importance of avoiding failure for subsequent life trajectory, may be appraised as threatening. In two studies, we extended this work to examine how students may also appraise such messages as challenging or disregard them as being of…

  15. "I Like to Read, but I Know I'm Not Good at It": Children's Perspectives on High-Stakes Testing in a High-Poverty School

    Dutro, Elizabeth; Selland, Makenzie

    2012-01-01

    A significant body of research articulates concerns about the current emphasis on high-stakes testing as the primary lever of education reform in the United States. However, relatively little research has focused on how children make sense of the assessment policies in which they are centrally located. In this article, we share analyses of…

  16. What's at Stake in the Lives of People with Intellectual Disability? Part I: The Power of Naming, Defining, Diagnosing, Classifying, and Planning Supports

    Schalock, Robert L.; Luckasson, Ruth

    2013-01-01

    This article focuses on the power of naming, defining, diagnosing, classifying, and planning supports for people with intellectual disability. The article summarizes current thinking regarding these five functions, states the essential question addressed by the respective function, and provides an overview of the high stakes involved for people…

  17. Sophisticated Epistemologies of Physics versus High-Stakes Tests: How Do Elite High School Students Respond to Competing Influences about How to Learn Physics?

    Yerdelen-Damar, Sevda; Elby, Andrew

    2016-01-01

    This study investigates how elite Turkish high school physics students claim to approach learning physics when they are simultaneously (i) engaged in a curriculum that led to significant gains in their epistemological sophistication and (ii) subject to a high-stakes college entrance exam. Students reported taking surface (rote) approaches to…

  18. Let's Poem: The Essential Guide to Teaching Poetry in a High-Stakes, Multimodal World (Middle through High School). Language & Literacy Practitioners Bookshelf

    Dressman, Mark

    2010-01-01

    This cutting-edge guide presents multiple approaches to teaching poetry at the middle and high school levels. The author provides field-tested activities with detailed how-to instructions, as well as advice for how educators can "justify" their teaching within a high-stakes curriculum environment. "Let's Poem" will show pre- and inservice teachers…

  19. A Better Leveled Playing Field for Assessing Satisfactory Job Performance of Superintendents on the Basis of High-Stakes Testing Outcomes

    Young, I. Phillip; Cox, Edward P.; Buckman, David G.

    2014-01-01

    To assess satisfactory job performance of superintendents on the basis of school districts' high-stakes testing outcomes, existing teacher models were reviewed and critiqued as potential options for retrofit. For these models, specific problems were identified relative to the choice of referent groups. An alternate referent group (statewide…

  20. "It's Important for Them to Know Who They Are": Teachers' Efforts to Sustain Students' Cultural Competence in an Age of High-Stakes Testing

    Zoch, Melody

    2017-01-01

    This article examines how four urban elementary teachers designed their literacy instruction in ways that sought to sustain students' cultural competence--maintaining their language and cultural practices while also gaining access to more dominant ones--amid expectations to prepare students for high-stakes testing. A large part of their teaching…

  1. The Validity of Value-Added Estimates from Low-Stakes Testing Contexts: The Impact of Change in Test-Taking Motivation and Test Consequences

    Finney, Sara J.; Sundre, Donna L.; Swain, Matthew S.; Williams, Laura M.

    2016-01-01

    Accountability mandates often prompt assessment of student learning gains (e.g., value-added estimates) via achievement tests. The validity of these estimates have been questioned when performance on tests is low stakes for students. To assess the effects of motivation on value-added estimates, we assigned students to one of three test consequence…

  2. High Stakes Principalship--Sleepless Nights, Heart Attacks and Sudden Death Accountabilities: Reading Media Representations of the United States Principal Shortage.

    Thomson, Pat; Blackmore, Jill; Sachs, Judyth; Tregenza, Karen

    2003-01-01

    Subjects a corpus of predominantly United States news articles to deconstructive narrative analysis and finds that the dominant media representation of principals' work is one of long hours, low salary, high stress, and sudden death from high stakes accountabilities. Notes that the media picture may perpetuate the problem, and that it is at odds…

  3. Policy Implications for Continuous Employment Decisions of High School Principals: An Alternative Methodological Approach for Using High-Stakes Testing Outcomes

    Young, I. Phillip; Fawcett, Paul

    2013-01-01

    Several teacher models exist for using high-stakes testing outcomes to make continuous employment decisions for principals. These models are reviewed, and specific flaws are noted if these models are retrofitted for principals. To address these flaws, a different methodology is proposed on the basis of actual field data. Specially addressed are…

  4. StakeMeter: value-based stakeholder identification and quantification framework for value-based software systems.

    Babar, Muhammad Imran; Ghazali, Masitah; Jawawi, Dayang N A; Bin Zaheer, Kashif

    2015-01-01

    Value-based requirements engineering plays a vital role in the development of value-based software (VBS). Stakeholders are the key players in the requirements engineering process, and the selection of critical stakeholders for the VBS systems is highly desirable. Based on the stakeholder requirements, the innovative or value-based idea is realized. The quality of the VBS system is associated with the concrete set of valuable requirements, and the valuable requirements can only be obtained if all the relevant valuable stakeholders participate in the requirements elicitation phase. The existing value-based approaches focus on the design of the VBS systems. However, the focus on the valuable stakeholders and requirements is inadequate. The current stakeholder identification and quantification (SIQ) approaches are neither state-of-the-art nor systematic for the VBS systems. The existing approaches are time-consuming, complex and inconsistent which makes the initiation process difficult. Moreover, the main motivation of this research is that the existing SIQ approaches do not provide the low level implementation details for SIQ initiation and stakeholder metrics for quantification. Hence, keeping in view the existing SIQ problems, this research contributes in the form of a new SIQ framework called 'StakeMeter'. The StakeMeter framework is verified and validated through case studies. The proposed framework provides low-level implementation guidelines, attributes, metrics, quantification criteria and application procedure as compared to the other methods. The proposed framework solves the issues of stakeholder quantification or prioritization, higher time consumption, complexity, and process initiation. The framework helps in the selection of highly critical stakeholders for the VBS systems with less judgmental error.

  5. StakeMeter: value-based stakeholder identification and quantification framework for value-based software systems.

    Muhammad Imran Babar

    Full Text Available Value-based requirements engineering plays a vital role in the development of value-based software (VBS. Stakeholders are the key players in the requirements engineering process, and the selection of critical stakeholders for the VBS systems is highly desirable. Based on the stakeholder requirements, the innovative or value-based idea is realized. The quality of the VBS system is associated with the concrete set of valuable requirements, and the valuable requirements can only be obtained if all the relevant valuable stakeholders participate in the requirements elicitation phase. The existing value-based approaches focus on the design of the VBS systems. However, the focus on the valuable stakeholders and requirements is inadequate. The current stakeholder identification and quantification (SIQ approaches are neither state-of-the-art nor systematic for the VBS systems. The existing approaches are time-consuming, complex and inconsistent which makes the initiation process difficult. Moreover, the main motivation of this research is that the existing SIQ approaches do not provide the low level implementation details for SIQ initiation and stakeholder metrics for quantification. Hence, keeping in view the existing SIQ problems, this research contributes in the form of a new SIQ framework called 'StakeMeter'. The StakeMeter framework is verified and validated through case studies. The proposed framework provides low-level implementation guidelines, attributes, metrics, quantification criteria and application procedure as compared to the other methods. The proposed framework solves the issues of stakeholder quantification or prioritization, higher time consumption, complexity, and process initiation. The framework helps in the selection of highly critical stakeholders for the VBS systems with less judgmental error.

  6. Staking-out projected boundaries of natural property Vršac Mountains using the RTK GPS/glonass method

    Gučević Jelena

    2012-01-01

    Full Text Available The existing topographic and cadastral maps of the former Yugoslav republics are in Gauss-Krüger projection on Bessel ellipsoid. For the collected GPS data to comply with the existing cartographic material, it is necessary to provide the transformation parameters from WGS84 to Bessel ellipsoid and according to the principles of cartographic mapping, to make mappings in the plane of the State Coordinate System (SCS. The aim of this research is to present the surveying activities necessary for the establishment and maintenance of digital cartographic basis, which is shown in the test area of “VRŠAC MOUNTAINS”, a Serbian region with outstanding characteristics. In order to establish a connection between the collected data, it is necessary to primarily calculate the parameters of transformation from WGS84 into the SCS. After the vectorisation of projected boundaries from bases made in the SCS, the transformation of vectorised boundary lines from SCS into the WGS84 is carried out, followed by staking the boundaries. To understand the fundamental differences in the methodology of using GPS receivers, it is important to emphasise that the concept of GPS determination of the coordinates is generally divided into absolute and relative positioning. If the correct procedure of GPS positioning, applied to certain environmental conditions, is not followed, the error up to 200 m could be expected. Conclusions are drawn about the selection of staking methods, related to the applied instruments and specific field conditions. The stakeout procedures are given in accordance with the principles of geodetic positioning. [Projekat Ministarstva nauke Republike Srbije, br. 043007: Istraživanje klimatskih promena i njihovog uticaja na životnu sredinu: praćenje uticaja, adaptacija i ublažavanje

  7. StakeMeter: Value-Based Stakeholder Identification and Quantification Framework for Value-Based Software Systems

    Babar, Muhammad Imran; Ghazali, Masitah; Jawawi, Dayang N. A.; Zaheer, Kashif Bin

    2015-01-01

    Value-based requirements engineering plays a vital role in the development of value-based software (VBS). Stakeholders are the key players in the requirements engineering process, and the selection of critical stakeholders for the VBS systems is highly desirable. Based on the stakeholder requirements, the innovative or value-based idea is realized. The quality of the VBS system is associated with the concrete set of valuable requirements, and the valuable requirements can only be obtained if all the relevant valuable stakeholders participate in the requirements elicitation phase. The existing value-based approaches focus on the design of the VBS systems. However, the focus on the valuable stakeholders and requirements is inadequate. The current stakeholder identification and quantification (SIQ) approaches are neither state-of-the-art nor systematic for the VBS systems. The existing approaches are time-consuming, complex and inconsistent which makes the initiation process difficult. Moreover, the main motivation of this research is that the existing SIQ approaches do not provide the low level implementation details for SIQ initiation and stakeholder metrics for quantification. Hence, keeping in view the existing SIQ problems, this research contributes in the form of a new SIQ framework called ‘StakeMeter’. The StakeMeter framework is verified and validated through case studies. The proposed framework provides low-level implementation guidelines, attributes, metrics, quantification criteria and application procedure as compared to the other methods. The proposed framework solves the issues of stakeholder quantification or prioritization, higher time consumption, complexity, and process initiation. The framework helps in the selection of highly critical stakeholders for the VBS systems with less judgmental error. PMID:25799490

  8. The impact of language and high-stakes testing policies on elementary school English language learners in Arizona.

    Wayne E. Wright

    2006-05-01

    Full Text Available This article reports the results of a survey of third-grade teachers of English Language Learners (ELLs in Arizona regarding school language and accountability policies—Proposition 203, which restricts bilingual education and mandates sheltered English Immersion; the federal No Child Left Behind Act of 2001 (NCLB; and Arizona LEARNS, the state’s high-stakes testing and accountability program. The instrument, consisting of 126 survey questions plus open-ended interview question, was designed to obtain teacher’s views, to ascertain the impact of these polices, and to explore their effectiveness in improving the education of ELL students. The survey was administered via telephone to 40 teacher participants from different urban, rural and reservation schools across the state. Each participant represents the elementary school in their respective school district which has the largest population of ELL students. Analyses of both quantitative and qualitative data reveal that these policies have mostly resulted in confusion in schools throughout the state over what is and is not allowed, and what constitutes quality instruction for ELLs, that there is little evidence that such policies have led to improvements in the education of ELL students, and that these policies may be causing more harm than good. Specifically, teachers report they have been given little to no guidance over what constitutes sheltered English immersion, and provide evidence that most ELL students in their schools are receiving mainstream sink-or-swim instruction. In terms of accountability, while the overwhelming majority of teachers support the general principle, they believe that high-stakes tests are inappropriate for ELLs and participants provided evidence that the focus on testing is leading to instruction practices for ELLs which fail to meet their unique linguistic and academic needs. The article concludes with suggestions for needed changes to improve the quality of

  9. Brexit: what is at stake for trade and nuclear partnership with Great-Britain?

    Le Ngoc, B.

    2017-01-01

    The exit of the United-Kingdom from the European Union rises a lot of issues but even if the divorce process has been launched, it is nearly impossible to bring clear responses to issues like the belonging to EURATOM. In any case the exit will weaken the political balance of power in favor of nuclear energy inside the European Union. Another consequence would be to have on the British side a legal void that would be harmful for trade and nuclear cooperation. The United-Kingdom will no longer benefit from European financing for upgrading the electricity grid and inter-connection networks that link the country to Europe, which may jeopardize the security of supply on both sides of the Channel. (A.C.)

  10. Le changement comme tradition dans la recherche et la formation a la recherche en biotechnologie et en peripherie Etude de cas en sciences de la sante, sciences naturelles et genie

    Bourque, Claude Julie

    Le champ de la recherche scientifique et de la formation a la recherche est traverse depuis quelques dizaines d'annees par plusieurs courants et discours associes au changement, mais peu de travaux empiriques permettent de comprendre ce qui change concretement. C'est la contribution originale de cette these au champ de l'education, plus specifiquement a l'etude sociologique de l'enseignement superieur ou sont concentrees les activites liees a la triade thematique du programme doctoral dans lequel elle a ete produite : recherche, formation et pratique. L'enquete-terrain a ete realisee en 2009 et 2010 aupres de 808 repondants affilies a 60 etablissements au Quebec et a produit un vaste materiau de nature mixte (donnees quantitatives et qualitatives). Un portrait de la nebuleuse biotechnologique qui touche les secteurs des sciences de la sante, des sciences naturelles et du genie a ete realise. Ce domaine concerne des dizaines de disciplines et se revele de nature transdisciplinaire, mais les pratiques n'y sont pas davantage marquees par le changement que celles d'autres domaines connexes. Les dynamiques sociales ont fait l'objet d'analyses comparatives dans quatre contextes: le choix des programmes, des objets et des methodes, le financement, la diffusion et la planification de la carriere. Les resultats indiquent que les echanges entre les agents traditionnellement situes au coeur des activites de recherche dominent ces dynamiques dans tous les contextes etudies. L'etude des representations au fondement des pratiques a revele l'existence de trois ecoles de pensee qui coexistent dans le champ scientifique: academique, pragmatique et economiste. Ces ecoles permettent de categoriser les agents en fonction des zones de fractures qui marquent leurs oppositions tout en identifiant ce qu'ils ont en commun. Les representations et les pratiques liees a la formation temoignent d'un habitus plutot homogene, alors que les contradictions semblent plus souvent ancrees dans des

  11. Cyberspace Security Econometrics System (CSES) - U.S. Copyright TXu 1-901-039

    Abercrombie, Robert K [ORNL; Schlicher, Bob G [ORNL; Sheldon, Frederick T [ORNL; Lantz, Margaret W [ORNL; Hauser, Katie R [ORNL

    2014-01-01

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. The Cyberspace Security Econometrics System (CSES) provides a measure (i.e., a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement. The basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings contained in this copyright.

  12. Security and privacy in cyber-physical systems foundations, principles, and applications

    Song, Houbing; Jeschke, Sabina

    2017-01-01

    Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today's simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovat...

  13. Game theoretic analysis of congestion, safety and security traffic and transportation theory

    Zhuang, Jun

    2015-01-01

    Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements in traffic and transportation theory, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analyzing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways – this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security. Addressing the multiple actors who may hold different concerns regarding system reliability; e.g. one or several terrorists, a government, various local or regional government agencies, or others with stakes for or against system reliability, this book describes how ...

  14. Game theoretic analysis of congestion, safety and security networks, air traffic and emergency departments

    Zhuang, Jun

    2015-01-01

    Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments, this volume focuses on congestion in systems where safety and security are at stake, devoting special attention to applying game theoretic analysis of congestion to: protocols in wired and wireless networks; power generation, air transportation and emergency department overcrowding. Reviewing exhaustively the key recent research into the interactions between game theory, excessive crowding, and safety and security elements, this book establishes a new research angle by illustrating linkages between the different research approaches and serves to lay the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analyzing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both way...

  15. An Analysis Of Wireless Security

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  16. What is Security? A perspective on achieving security

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  17. Overview of security culture

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  18. Bien-être émotionnel au travail et changement organisationnel Emotional Well-Being at Work and Organizational Change: The Essilor Case Bienestar emocional en el trabajo y cambio organizacional : el caso de Essilor

    Catherine Remoussenard

    2013-05-01

    Full Text Available Aujourd’hui, la plupart des entreprises mettent en place des projets de changements organisationnels afin de s’adapter aux modifications d’un environnement très concurrentiel. Ce faisant, elles se heurtent à des difficultés liées notamment aux situations de mal-être que ces changements peuvent induire. Notre étude vise à explorer les effets de nouvelles politiques managériales sur le bien-être émotionnel des salariés. Plus précisément, nous explorons les politiques mises en œuvre par un des sites du Groupe Essilor dans le contexte d’un changement organisationnel. Nous analysons d’un point de vue quantitatif et qualitatif les effets induits par ces politiques sur les salariés et sur la façon dont Essilor-Dijon en tient compte dans sa gestion des collaborateurs pour améliorer le bien-être au travail. À la lumière de nos résultats, il apparaît que les émotions sont au cœur de la conduite du changement, pouvant jouer le rôle de freins ou de leviers en fonction des choix managériaux.Nowadays, companies are implementing organizational change in order to be able to adapt to an increasingly competitive environment. Because of this context, firms are often confronted with problems linked to stressful situations that they themselves have brought about. We explored the policies which were applied by one of the branches of the Essilor Group in an organizational change context. First, we quantitatively and qualitatively analyzed the effects which this policy has had on stress-related issues. Second, we looked at how Essilor-Dijon took into account these effects in managing its staff so as to improve their well-being at work. Our results show that emotions appear to be at the heart of managing change and can either be obstacles or facilitators, depending on the choices made by management.Hoy en día, la mayoría de las empresas están llevando a cabo proyectos de cambio organizacional con el objetivo de adaptarse a las

  19. Adaptation de l'agriculture aux politiques de gestion de l'eau et aux changements globaux : l'apport des modèles de programmation mathématique

    Graveline, Nina

    2013-01-01

    Cette thèse développe et discute différentes approches micro-économiques de modélisation de l’agriculture pour représenter l’effet de changements globaux et de politiques de gestion de l’eau sur l’adaptation de l’agriculture et sur les ressources en eau. Après un chapitre de synthèse et une revue de la littérature, quatre essais sont présentés. Le premier essai décrit la représentation du comportement de dix exploitations agricoles en Alsace et en Bade (Allemagne) à partir de modèles de progr...

  20. SecurID

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  1. Hybrid-secure MPC 

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  2. The strategic security officer.

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  3. Materialism and food security.

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  4. PRIVATE SECURITY IN SPORT

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  5. While Working Around Security

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  6. While working around security

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  7. Security Engine Management of Router based on Security Policy

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  8. ITIL® and information security

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-01-01

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework

  9. Towards Information Security Awareness

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  10. Outsourcing information security

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  11. Cloud Infrastructure Security

    Velev , Dimiter; Zlateva , Plamena

    2010-01-01

    Part 4: Security for Clouds; International audience; Cloud computing can help companies accomplish more by eliminating the physical bonds between an IT infrastructure and its users. Users can purchase services from a cloud environment that could allow them to save money and focus on their core business. At the same time certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Usually the information security professiona...

  12. Automated security management

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  13. Addressing Software Security

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  14. Auditing Organizational Security

    2017-01-01

    Organi- zation for Standardiza- tion ( ISO ): ISO 27000 : Information Systems Se- curity Management. A robust program of internal auditing of a...improvement is the basis and underpinning of the ISO . All processes must be considered ongoing and never at an “end state.” Top management develops a...security management system, including security policies and security objectives, plus threats and risks. Orga- nizations already working with ISO 9000

  15. Intercorporate Security Event Correlation

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  16. Chemical Security Analysis Center

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  17. Beyond grid security

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  18. VoIP Security

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  19. Secure Virtual Enclaves

    Shands, Deborah

    2002-01-01

    The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources...

  20. Beginning ASPNET Security

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  1. Governing for Enterprise Security

    Allen, Julia

    2005-01-01

    ... business. If an organization's management -- including boards of directors, senior executives, and all managers -- does not establish and reinforce the business need for effective enterprise security...

  2. Microsoft Windows Security Essentials

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  3. National Security Whistleblowers

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  4. Linux Security Cookbook

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  5. Information security management handbook

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  6. Operating System Security

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  7. Lecture 1: General Security

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  8. Smart security and securing data through watermarking

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  9. Strategic planning and security analysis

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  10. 21st Century Security Manager

    Stelian ARION

    2010-01-01

    We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers ...

  11. Energy shortages in Europe? strategic meetings on energy security

    Derdevet, M.

    2005-01-01

    On the RTE's initiative, the Economic and Social Council welcome the first 'Strategic Meetings on Energy Security' event on July 11, 2005. With its 'Energy Shortages in Europe?' subtitle, the convention was in line with the topical issue of oil price increases. Opening the convention, Hubert Bouchet, the vice-president of the Research and Technology Productive Activities section of the Economic and Social Council (CES) stated that with its 400 million citizens, Europe uses over 2 500 tWh of electricity a year, and that its demand for primary energy is growing, making it the largest importer of energy in the world and the top second user after the United States. The trend should continue at least until 2030. H Bouchet also stress that though the worlds is using increasing amounts of energy, over 1.5 billion people do not have access to modern energy sources. Therefore, there are huge needs. There were four round-tables introducing rich debates with the room. The first one was about the issue of the 'energy market: the end of overcapacity', and the second one, dedicated so secure supplies, was titled: 'An ill adapted regulatory framework and European context'. In the afternoon, exchanges covered 'Strategies to prepare the energy offer for new stakes' and 'Major strategies for France and Europe'. (author)

  12. Center for computer security: Computer Security Group conference. Summary

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  13. Security dialogues: building better relationships between security and business

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  14. Social Security Administration

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  15. Network Security Is Manageable

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  16. Women and social security

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  17. Sustainability and National Security

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  18. Information security management principles

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  19. School Security Technologies

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  20. Energy systems security

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  1. VMware view security essentials

    Langenhan, Daniel

    2013-01-01

    A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a ""how-to"" for the novice, a ""reference guide"" for the advanced user, and a ""go to"" for the experienced user in all the aspects of VMware View desktop virtualization security.

  2. Security in the Sahel

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  3. Reconciling privacy and security

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  4. Security in the cloud.

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  5. Systems Security Engineering

    2010-08-22

    environment that contains network- borne cybersecurity threats, an argument may be made that the firewall increases overall system functionality by reserving...the number of administered devices. This approach to security analysis is at once old and new. In the early days of eCommerce , security

  6. Smart grid security

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  7. Formalizing physical security procedures

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  8. No energy security without climate security

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  9. Depth and breadth: Bridging the gap between scientific inquiry and high-stakes testing with diverse junior high school students

    Kang, Jee Sun Emily

    This study explored how inquiry-based teaching and learning processes occurred in two teachers' diverse 8th grade Physical Science classrooms in a Program Improvement junior high school within the context of high-stakes standardized testing. Instructors for the courses examined included not only the two 8th grade science teachers, but also graduate fellows from a nearby university. Research was drawn from inquiry-based instruction in science education, the achievement gap, and the high stakes testing movement, as well as situated learning theory to understand how opportunities for inquiry were negotiated within the diverse classroom context. Transcripts of taped class sessions; student work samples; interviews of teachers and students; and scores from the California Standards Test in science were collected and analyzed. Findings indicated that the teachers provided structured inquiry in order to support their students in learning about forces and to prepare them for the standardized test. Teachers also supported students in generating evidence-based explanations, connecting inquiry-based investigations with content on forces, proficiently using science vocabulary, and connecting concepts about forces to their daily lives. Findings from classroom data revealed constraints to student learning: students' limited language proficiency, peer counter culture, and limited time. Supports were evidenced as well: graduate fellows' support during investigations, teachers' guided questioning, standardized test preparation, literacy support, and home-school connections. There was no statistical difference in achievement on the Forces Unit test or science standardized test between classes with graduate fellows and without fellows. There was also no statistical difference in student performance between the two teachers' classrooms, even though their teaching styles were very different. However, there was a strong correlation between students' achievement on the chapter test and

  10. Relaxing Chosen-Ciphertext Security

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  11. Moving towards Cloud Security

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  12. The secure heating reactor

    Pind, C.

    1987-01-01

    The SECURE heating reactor was designed by ASEA-ATOM as a realistic alternative for district heating in urban areas and for supplying heat to process industries. SECURE has unique safety characteristics, that are based on fundamental laws of physics. The safety does not depend on active components or operator intervention for shutdown and cooling of the reactor. The inherent safety characteristics of the plant cannot be affected by operator errors. Due to its very low environment impact, it can be sited close to heat consumers. The SECURE heating reactor has been shown to be competitive in comparison with other alternatives for heating Helsinki and Seoul. The SECURE heating reactor forms a basis for the power-producing SECURE-P reactor known as PIUS (Process Inherent Ultimate Safety), which is based on the same inherent safety principles. The thermohydraulic function and transient response have been demonstrated in a large electrically heated loop at the ASEA-ATOM laboratories

  13. Unconditionally Secure Protocols

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  14. Energy security in Yemen

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  15. Network systems security analysis

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  16. Indirection and computer security.

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  17. Wireless physical layer security

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  18. International Nuclear Security

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  19. Human factors in network security

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  20. 76 FR 8946 - Security Ratings

    2011-02-16

    ... grade securities (such as foreign currency or other cash settled derivative securities). See... investment grade securities (such as foreign currency or other cash settled derivative securities). See... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 [Release No...