WorldWideScience

Sample records for security stakes changement

  1. Programme de bourses de recherche sur le changement climatique ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Une faculté d'adaptation limitée est souvent reconnue comme l'un des principaux facteurs de vulnérabilité aux changements climatiques. Le programme Adaptation aux changements climatiques en Afrique (ACCA) du CRDI vise à aider les sociétés africaines à faire face aux changements climatiques. Cette subvention ...

  2. Changements climatiques, innovation et technologies de l ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  3. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  4. Changements climatiques | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    L'objectif du programme Changements climatiques consiste à appuyer des partenariats et des réseaux visant à rassembler des données probantes pour trouver des solutions et utiliser les technologies en vue d'obtenir des gains sociaux et économiques et d'atténuer les effets des changements climatiques pour l'avenir.

  5. Etude du processus de changement vecu par des familles ayant decide d'adopter volontairement des comportements d'attenuation des changements climatiques

    Science.gov (United States)

    Leger, Michel T.

    Les activites humaines energivores telles l'utilisation intensive de l'automobile, la surconsommation de biens et l'usage excessif d'electricite contribuent aux changements climatiques et autres problemes environnementaux. Bien que plusieurs recherches rapportent que l'etre humain est de plus en plus conscient de ses impacts sur le climat de la planete, ces memes recherches indiquent qu'en general, les gens continuent a se comporter de facon non ecologique. Que ce soit a l'ecole ou dans la communaute, plusieurs chercheurs en education relative a l'environnement estiment qu'une personne bien intentionnee est capable d'adopter des comportements plus respectueux de l'environnement. Le but de cette these etait de comprendre le processus d'integration de comportements d'attenuation des changements climatiques dans des familles. A cette fin, nous nous sommes fixe deux objectifs : 1) decrire les competences et les procedes qui favorisent l'adoption de comportements d'attenuation des changements climatiques dans des familles et 2) decrire les facteurs et les dynamiques familiales qui facilitent et limitent l'adoption de comportements d'attenuation des changements climatiques dans des familles. Des familles ont ete invitees a essayer des comportements personnels et collectifs d'attenuation des changements climatiques de sorte a integrer des modes de vie plus ecologiques. Sur une periode de huit mois, nous avons suivi leur experience de changement afin de mieux comprendre comment se produit le processus de changement dans des familles qui decident volontairement d'adopter des comportements d'attenuation des changements climatiques. Apres leur avoir fourni quelques connaissances de base sur les changements climatiques, nous avons observe le vecu de changement des familles durant huit mois d'essais a l'aide de journaux reflexifs, d'entretiens d'explicitation et du journal du chercheur. La these comporte trois articles scientifiques. Dans le premier article, nous presentons une

  6. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  7. Nouveau webinaire IWRA/CRDI sur les changements climatiques et ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    18 avr. 2018 ... Contrats d'options d'eau pour l'adaptation aux changements climatiques à Santiago (Chili);. • Adaptation aux changements climatiques dans les bassins hydrographiques en voie d'urbanisation rapide: enseignements issues d'une approche tenant compte des préoccupations et des facteurs de stress ...

  8. changement climatique, mécanisme actuel de prévention

    African Journals Online (AJOL)

    ACSS

    19 févr. 2015 ... Ainsi, dans un contexte des changements climatiques, cette étude vise ... Mots Clés: Adaptations, Banikoara, Bénin, changement climatique, ...... pastorale sahélienne: cas de l'arrondissement ... Global Environmental Politics.

  9. Adaptation aux changements climatiques et résilience en Asie du Sud

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  10. Vulnérabilité et adaptation face aux changements climatiques et au ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  11. L'adaptation aux changements climatiques

    International Development Research Centre (IDRC) Digital Library (Canada)

    Cathy Egan

    plus équitables et plus prospères. Centre de recherches pour le développement international, CP 8500, Ottawa (Ontario) Canada K1G 3H9. Tél. : 613-236-6163 • Télécopieur : 613-238-7230 • Courriel : info@crdi.ca. L'ADAPTATION AUX. CHANGEMENTS CLIMATIQUES. LE RECOURS AUX. ONDES. Les petits exploitants ...

  12. Une stratégie adaptive au changement climatique dans le Moyen ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Des pratiques d'adaptation et de gestion de risques dans le secteur de l'eau sont en voie d'application dans différents pays et régions du monde à la lumière des impacts de changement climatique prévus. Dans la région MENA, la sensibilisation de toutes les parties prenantes sur la signification du changement climatique ...

  13. Stakes Matter in Ultimatum Games

    DEFF Research Database (Denmark)

    Andersen, Steffen; Ertaç, Seda; Gneezy, Uri

    2011-01-01

    One of the most robust findings in experimental economics is that individuals in one-shot ultimatum games reject unfair offers. Puzzlingly, rejections have been found robust to substantial increases in stakes. By using a novel experimental design that elicits frequent low offers and uses much...... larger stakes than in the literature, we are able to examine stakes' effects over ranges of data that are heretofore unexplored. Our main result is that proportionally equivalent offers are less likely to be rejected with high stakes. In fact, our paper is the first to present evidence that as stakes...

  14. Perceptions locales de la manifestation des changements ...

    African Journals Online (AJOL)

    SARAH

    . PRPR. ERMA. DC. UD cluster 1 cluster 2. Pauvres. Riches et moyens. Figure 4. Positionnement des classes d'impacts socio-économiques des changements climatiques dans un système d'axes de l'analyse factorielle des ...

  15. La dévalorisation des filles au Bangladesh : continuité ou changement

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le déséquilibre du ratio hommes-femmes se concentre en grande partie dans des ... le contrôle masculin du travail et des ressources de la famille en vertu d'un ... à savoir qu'une meilleure compréhension de la dynamique du changement qui a ... IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau.

  16. Raising the stakes: How students' motivation for mathematics associates with high- and low-stakes test achievement.

    Science.gov (United States)

    Simzar, Rahila M; Martinez, Marcela; Rutherford, Teomara; Domina, Thurston; Conley, AnneMarie M

    2015-04-01

    This study uses data from an urban school district to examine the relation between students' motivational beliefs about mathematics and high- versus low-stakes math test performance. We use ordinary least squares and quantile regression analyses and find that the association between students' motivation and test performance differs based on the stakes of the exam. Students' math self-efficacy and performance avoidance goal orientation were the strongest predictors for both exams; however, students' math self-efficacy was more strongly related to achievement on the low-stakes exam. Students' motivational beliefs had a stronger association at the low-stakes exam proficiency cutoff than they did at the high-stakes passing cutoff. Lastly, the negative association between performance avoidance goals and high-stakes performance showed a decreasing trend across the achievement distribution, suggesting that performance avoidance goals are more detrimental for lower achieving students. These findings help parse out the ways motivation influences achievement under different stakes.

  17. Perceptions locales du changement climatique et mesures d ...

    African Journals Online (AJOL)

    Perceptions locales du changement climatique et mesures d'adaptation dans la ... village, de l'importance représentée par le karité pour les groupes socioculturels. ... l'adaptation de nouvelles cultures en association, la protection des jeunes ...

  18. Trans-Saharan geopolitics. The game and the stakes

    International Nuclear Information System (INIS)

    Chegrouche, L.

    2010-01-01

    The geopolitics of energy exports from the trans-Saharan region are similar to the Caspian great game' at the end of the last century. In North/West Africa as in West/Central Asia, the question of control over hydrocarbon reserves and lines of access to those reserves lies at the source of various conflicts. Rivalries are expressed through open and complex conflicts in which powers confront one another over oil-rich zones through proxy ethnic, religious or cultural groups, as dictated by the colossal economic interests at stake. The increasing number of conflicts - the Niger Delta, Darfur, the Azawak, etc. - is an illustration of this. The shock waves from this rivalry undermine regional peace and security, as well as the security of international energy supplies. The question here is to understand the game and the stakes of this trans-Saharan chess-board, to study its principal features and its energetic consequences. The national oil companies and states of the region can work around or through the geopolitical rifts caused by local rivalries and extra-regional appetites. There is therefore a need to understand the ways in which the players in the trans-Saharan 'great game' interact with one another, an to identifies the effects these interactions may have in the field of energy, in terms of potential reserves and transport projects. The TSGP is presented as an illustration of this geopolitical dynamics. (author)

  19. Multilevel stake holder consensus building in radioactive waste management

    International Nuclear Information System (INIS)

    Dreimanis, Andrejs

    2008-01-01

    Full text: The increased demand of our society to its quality of life, global security and environmental safety as well as to observing a basic ethical principle of equity have advanced our attitude towards the recent proposals to develop shared multinational projects in the use of nuclear energy technologies, in particular, to: a) Siting of shared deep repositories for high-level radioactive waste (RW) and spent nuclear fuel safe disposal. In turn, arrangement of multinational facilities requires to gain more complex consensus between all involved parties. Method: We propose an interdisciplinary synergetic approach to multilevel consensus building for siting and construction of shared multinational repositories for RW deep disposal, based on self-organization (SO) of various stake holders, chaos and fuzziness concepts as well as Ashby principle of requisite variety. In the siting of a multi-national repository there appears an essential novel component of stake holder consensus building, namely: to reach consent - political, social, economic, ecological - among international partners, in addition to solving the whole set of intra-national consensus building items. An entire partnering country is considered as a national stake holder, represented by the national government, being faced to simultaneous seeking an upward (international) and a downward (intra-national) consensus in a psychologically stressed environment, having possibly diverse political, economic and social interests. Main Results: Following inferences about building of multilevel consensus are developed: 1) The basis of synergetic approach to stake holder interaction - informational SO, by forming a knowledge-creating stake holder community via cooperation and competition among individuals, public bodies/groups, companies, institutions; 2) Building of international stake holder consensus could be promoted by activating and diversifying multilateral interactions between intra- and international stake

  20. Adaptation dans les zones cruciales au regard des changements ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ) vise à accroître la résilience des populations pauvres dans trois « zones cruciales » au regard des changements climatiques : les bassins hydrographiques, les deltas et les régions semi-arides.

  1. Recherche sur l'adaptation aux changements climatiques

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    consortiums travaillent dans des zones vulnérables aux changements climatiques en Afrique et en Asie, notamment dans les bassins hydrographiques alimentés .... Le projet de recherche Pathways to Resilience in Semi-Arid Economies (PRISE) vise à réduire les risques et à opti- miser les possibilités de développement ...

  2. Small Stakes Risk Aversion in the Laboratory

    DEFF Research Database (Denmark)

    Harrison, Glenn W.; Lau, Morten I.; Ross, Don

    2017-01-01

    Evidence of risk aversion in laboratory settings over small stakes leads to a priori implausible levels of risk aversion over large stakes under certain assumptions. One core assumption in statements of this calibration puzzle is that small-stakes risk aversion is observed over all levels of wealth...

  3. Evaluation des changements physico-chimiques caractérisant le ...

    African Journals Online (AJOL)

    Evaluation des changements physico-chimiques caractérisant le mûrissement au cours de l'entreposage de trois variétés de bananes Musa spp. (AAB, cv. Corne 1 ; AAA, cv. Poyo et AA, cv. Figue Sucrée)

  4. Les agriculteurs s'adaptent aux changements climatiques en Tunisie ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    23 août 2011 ... Les eaux grises et la culture en serre augmentent la production alimentaire en Tunisie ... Des chercheurs insistent sur l'importance de favoriser la résilience aux ... Vulnérabilité et adaptation aux changements climatiques des ...

  5. Markets, Managerialism and Teachers' Work: The Invisible Hand of High Stakes Testing in England

    Science.gov (United States)

    Stevenson, Howard; Wood, Phil

    2013-01-01

    High stakes testing has been long established in the English school system. In this article, we seek to demonstrate how testing has become pivotal to securing the neo-liberal restructuring of schools, that commenced during the Thatcher era, and is reaching a critical point at the current time. Central to this project has been the need to assert…

  6. Changements climatiques | Page 39 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le Moyen-Orient et l'Afrique du Nord connaissent une urbanisation effrénée qui entraîne un grave stress hydrique et nuit à la production alimentaire. Mais la recherche montre comment l'expansion urbaine et la croissance agricole peuvent aller de pair. Axe de recherche. Examiner en quoi les changements climatiques et ...

  7. Les agriculteurs s'adaptent aux changements climatiques en Tunisie ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    23 août 2011 ... À La Soukra, en Tunisie, des centaines de familles à faible revenu vivent des produits de la terre qu'elles cultivent. Or, depuis quelques décennies, ce mode de vie est menacé par l'urbanisation et les changements climatiques.

  8. Adaptation de collectivités africaines aux changements climatiques ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Mis en oeuvre par des organisations non gouvernementales, les projets adopteront une démarche d'apprentissage par la pratique et viseront à trouver des façons de communiquer l'information au sujet des changements ... Managing Risk, Reducing Vulnerability and Enhancing Productivity under a Changing Climate.

  9. Lethal stakes: rig-hand killings show rising security risks abroad

    Energy Technology Data Exchange (ETDEWEB)

    Lorenz, A

    1999-05-03

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards.

  10. Lethal stakes: rig-hand killings show rising security risks abroad

    International Nuclear Information System (INIS)

    Lorenz, A.

    1999-01-01

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards

  11. Les changements climatiques et l'urbanisation menacent les ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    5 sept. 2014 ... Cette perception correspond-elle aux données scientifiques ? Shah Alam Khan. Dans les quatre villes étudiées, on observe effectivement de réels changements dans les précipitations annuelles, mais pas nécessairement une diminution. À Gurgaon, il y aurait diminution selon l'opinion générale, ce qui ...

  12. Des données locales sur les changements climatiques assurent la ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    13 mai 2015 ... Les changements climatiques et la variabilité du climat représentent une menace importante pour l'agriculture, la sécurité alimentaire et les moyens de subsistance en Afrique subsaharienne.

  13. A Study on consensus development through stake holder engagement for the use of nuclear energy in Japan

    International Nuclear Information System (INIS)

    Aoyama, Yoshiko; Sawada, Tetsuo; Fujii, Yasuhiko

    2008-01-01

    In order to alleviate the distrust surrounding the use of nuclear energy and operation of nuclear facilities, as well as to foster trust and find better ways to live in harmony with society, it is essential for the state and electric power utilities not to provide one-sided information, but to formulate adequate bilateral communication and dialogue with stake holders. In this study, we conducted a case study focused on four stake holder meetings with a view to ensuring safety in the use of nuclear energy and operation of nuclear facilities in Japan; the 'Community Meeting for Securing the Transparency of Kashiwazaki-Kariwa Nuclear Power Station (Chiiki-no-kai)'; the 'Monitoring and Evaluation Conference on Environmental Radiation', established by communities where nuclear facilities are installed; the 'Round-Table Conference on Nuclear Power Policy' and the 'Conference for Public Participation and Decision Making for Nuclear Energy Policy' organized by Japan Atomic Energy Commission. As a consequence, it has been observed that in each case varying opinions were summarized through stake holder meetings, but the fact that no system exists to reflect these opinions in design of the nuclear energy policy has emerged as a controversial point. This study suggests future efforts in regard to the requirements in Japan for stake holder meetings that are necessary for fostering trust and mutual understanding among stake holders including the state and local government, electric power utilities and local residents. (author)

  14. Interaction entre zones urbaines et rurales et changements ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Ce projet vise à réduire la vulnérabilité des systèmes ruraux-urbains du Nigeria face aux changements climatiques en diffusant les résultats du projet pilote mené dans la ville d'Aba, dans le sud-est du pays, et les environs. L'équipe du projet aidera le comité de conseillers-superviseurs d'Aba à déterminer les bonnes ...

  15. Renforcement de la capacité d'adaptation aux changements ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Ce projet vise à améliorer les mesures incitatives et les possibilités qui s'offrent aux ménages du sud de la Zambie et du sud-ouest du Zimbabwe pour composer avec les changements climatiques. Pour ce faire, les responsables investiront dans des technologies de production améliorées d'une grande valeur pratique ...

  16. Technologies agricoles modernes et changements dans la vie socio ...

    African Journals Online (AJOL)

    Ainsi les anciennes habitudes en matière d'organisation économique, sociale et culturelle sont-elles loin d'avoir été préservées. La présente étude vise à analyser l'ensemble des changements induits par les nouvelles technologies agricoles sur les structures économique, culturelle, politique, religieuse et sociale de ladite ...

  17. Aquaculture intérieure et adaptation aux changements climatiques ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Ce projet porte sur l'élevage du tilapia dans de petits étangs fermiers ou des cages flottantes dans les rivières et les réservoirs du nord de la Thaïlande. Les chercheurs exploreront des façons d'adapter les pratiques aquacoles aux changements climatiques et analyseront la valeur de l'aquaculture comme stratégie ...

  18. Small Stakes Risk Aversion in the Laboratory

    DEFF Research Database (Denmark)

    Harrison, Glenn W.; Lau, Morten; Ross, Don

    Evidence of risk aversion in laboratory settings over small stakes leads to a priori implausible levels of risk aversion over large stakes under certain assumptions. One core assumption in standard statements of this calibration puzzle is that individuals define utility over terminal wealth......, and that terminal wealth is defined as the sum of extra-lab wealth and any wealth accumulated in the lab. This assumption is often used in Expected Utility Theory, as well as popular alternatives such as RankDependent Utility theory. Another core assumption is that the small-stakes risk aversion is observed over...... all levels of wealth, or over a “sufficiently large” range of wealth. Although this second assumption if often viewed as self-evident from the vast experimental literature showing risk aversion over laboratory stakes, it actually requires that lab wealth be varied for a given subject as one takes...

  19. Le littoral face aux changements climatiques

    OpenAIRE

    Mulot, Vanessa; Vigneron, Anne-Laure; Lambert-Hadid, Marie-Laure

    2011-01-01

    Le changement climatique et l’anthropisation du littoral accentuent le risque de submersion marine sur l’ensemble des côtes. Malgré l’élévation en cours du niveau des mers, l’attractivité du littoral ne décroît pas malgré la connaissance du risque. Ce risque aggravera dans les années à venir les enjeux liés à la submersion marine, parmi lesquels le danger pour les vies humaines, comme l’a malheureusement illustré l’actualité (Xynhia), mais aussi la question de la propriété des biens et des te...

  20. Oil dependence. Myths and realities of a strategic stake

    International Nuclear Information System (INIS)

    Chaliand, G.; Jafalian, A.

    2005-04-01

    Using a series of regional studies, this collective book proposes to evaluate the strategic dimensions of the oil dependence and to determine its geopolitical impacts in the Middle East, Russia, China, USA and Europe. Content: the oil stakes at the beginning of the 21. century; in the center of the oil scene: the Middle East; oil dependence and US foreign policy: beyond myths; the Russian oil, instrument of influence and of alliances re-knitting; China and oil: security feelings and strategic approach; towards a European supply strategy; beyond petroleum: what alternatives; 150 years of petroleum history; the energy dependence; energy economy; automotive fuels and pollution abatement; limitation of greenhouse gas emissions; glossary; bibliography; index; Web links. (J.S.)

  1. Communication des risques reliés aux changements climatiques en ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    1 janv. 2012 ... Il incombe bien sûr aux gouvernements locaux et nationaux de prendre les décisions relatives à l'adaptation aux changements climatiques; ils doivent toutefois les communiquer aux ménages, aux groupes communautaires et aux entreprises privées afin que ceux-ci prennent les décisions qui s'imposent ...

  2. Impacts économiques et sociaux des changements climatiques sur l ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le projet étudiera l'attribution de l'eau dans les divers secteurs productifs des trois bassins et estimera la demande d'eau pour l'agriculture, l'industrie et la consommation domestique. La recherche identifiera les groupes vulnérables touchés par le stress hydrique engendré par les changements climatiques. On fera appel à ...

  3. Vulnérabilité et adaptation aux changements climatiques des ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 avr. 2016 ... Pour certains, les changements se produisent progressivement, tandis que pour d'autres, des transformations radicales surviennent après des événements déterminants tels que des cyclones violents. Les agriculteurs pensent que la détérioration de l'environnement – et surtout la déforestation rapide – en ...

  4. Lorsque la recherche locale est source de changements véritables ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    18 févr. 2011 ... Les think tanks africains se penchent sur certaines des difficultés les plus ... Lorsque la recherche locale est source de changements véritables en Afrique ... De quel type d'information les acteurs de la sphère politique ont-ils ...

  5. Des changements en Asie, surtout pour les femmes | CRDI - Centre ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    23 mars 2016 ... Deux femmes qui regardent l'écran d'un ordinateur en Inde. Photo : CRDI. Les femmes sont les agentes du changement en Inde, au Bangladesh, et au Cambodge. Je reviens tout juste d'un voyage en Inde, au Bangladesh, et au Cambodge. Bien que ces pays soient très différents, j'ai remarqué plusieurs ...

  6. Mise en place d'un réseau d'adaptation aux changements ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Ce projet a pour objectif de concevoir un mécanisme de gestion des risques accrus liés aux changements climatiques en appliquant le principe reconnu des ... Adaptation to Climate Change: Stakeholder engagement and understanding impacts - International Council for Local Environment Initiatives (ICLEI) (Section 21).

  7. Les changements climatiques brouillent les prédictions des faiseurs ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    8 oct. 2010 ... Depuis des générations, les autochtones de l'ouest du Kenya comptent sur les pouvoirs mystiques que possèdent les « faiseurs de pluie » du clan Nganyi pour prédire la météo. Cependant, le temps instable amené par les changements climatiques brouille les indices grâce auxquels les faiseurs de pluie ...

  8. Changement climatique et domaines skiables: simulation en Savoie et Haute-Savoie à l’horizon 2015

    Directory of Open Access Journals (Sweden)

    Jean-Christophe Loubier

    2007-03-01

    Full Text Available Les domaines skiables et le changement climatique posent des questions importantes et nouvelles pour les espaces montagnards. Dans les hautes vallées où ces domaines sont souvent le moteur principal du développement local, on peut s'interroger sur la pérennité du modèle économique de l'or blanc à moyen terme quand les modèles de simulation du climat tablent sur une élévation de la température moyenne comprise entre 1,5° et 5° en 2100. Nous avons tenté de simuler les effets du changement climatique à l'horizon 2015, sur les domaines skiables de Savoie et Haute Savoie.

  9. French government to trim direct stake in Total

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that the French government has decided to slash its direct stake in partly state owned oil company Total to 5% from 31.7%, a surprise move expected to raise 10 billion francs ($1.8 billion). At the same time, other state owned entities will be asked to boost their combined 2.2% stake in Total to 10%, leaving the government with a net 15% interest in Total vs. the current 34%. Initially, state owned insurance companies Groupe des Assurances Nationales and Assurances Generale de France will be asked to hike their stakes in Total, but others could be asked to join if needed to meet the 10% target. The government the its phase-down of participation in Total, established in 1924 to manage French interests in Iraq Petroleum Co., was prompted by the evolution of the oil context, which differs greatly from what had prompted a significant stake of the state in Total's capital

  10. High-stakes educational testing and democracy

    DEFF Research Database (Denmark)

    Ydesen, Christian

    2014-01-01

    This article investigates the relation between high-stakes educational testing and democracy drawn from the experiences of 20th-century high-stakes educational testing practices in the Danish history of education. The article presents various concepts of democracy using leading propositions within...... the field of education. Then a sample of relevant historic case studies are examined in light of these definitions. Among other things, the article concludes that a combination of different evaluation technologies – some formative and some summative – might be the safest way to go from a democratic...

  11. Large Stroke High Fidelity PZN-PT Single-Crystal "Stake" Actuator.

    Science.gov (United States)

    Huang, Yu; Xia, Yuexue; Lin, Dian Hua; Yao, Kui; Lim, Leong Chew

    2017-10-01

    A new piezoelectric actuator design, called "Stake" actuator, is proposed and demonstrated in this paper. As an example, the stake actuator is made of four d 32 -mode PZN-5.5%PT single crystals (SCs), each of 25 mm ( L ) ×8 mm ( W ) ×0.4 mm (T) in dimensions, bonded with the aid of polycarbonate edge guide-cum-stiffeners into a square-pipe configuration for improved bending and twisting strengths and capped with top and bottom pedestals made of 1.5-mm-thick anodized aluminum. The resultant stake actuator measured 9 mm ×9 mm ×28 mm. The hollow structure is a key design feature, which optimizes SC usage efficiency and lowers the overall cost of the actuator. The displacement-voltage responses, blocking forces, resonance characteristics of the fabricated stake actuator, as well as the load and temperature effects, are measured and discussed. Since d 32 is negative for [011]-poled SC, the "Stake" actuator contracts in the axial direction when a positive-polarity field is applied to the crystals. Biased drive is thus recommended when extensional displacement is desired. The SC stake actuator has negligible (0.13% when driven up to +300 V (i.e., 0.75 kV/mm), which is close to the rhombohedral-to-orthorhombic transformation field ( E RO ) of 0.85 kV/mm of the SC used. The stake actuator displays a stroke of [Formula: see text] (at +300 V) despite its small overall dimensions, and has a blocking force of 114 N. The SC d 32 stake actuator fabricated displays more than 30% larger axial strain than the state-of-the-art PZT stack actuators of comparable length as well as moderate blocking forces. Said actuators are thus ideal for applications when large displacements with simple open-loop control are preferred.

  12. Adaptation aux changements climatiques au Malawi grâce à l ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    28 avr. 2016 ... Depuis 2001, le programme Écosystèmes et santé humaine du CRDI finance au Malawi des recherches centrées sur les liens entre la fertilité des sols, ... L'équipe examine la façon dont la recherche participative peut guider l'élaboration de stratégies d'adaptation aux changements climatiques, dans un ...

  13. RWE sells Nafta stake

    International Nuclear Information System (INIS)

    Janoska, J.

    2004-01-01

    At year-end 2000, state-owned Slovensky plynarensky priemysel (SPP) signed a Memorandum of Understanding that set the conditions for the German concern RWE to purchase a 40 % stake in Nafta Gbely. This partnership agreement was meant to grant RWE participation in the management of the gas storage operator, which is controlled by SPP, and allow RWE to increase the use of Nafta's capacities. But in the 3 years since then, these objectives were not met. RWE representatives were not appointed to the Nafta Board and not a single cubic meter of RWE gas was stored at Nafta. RWE denied that it was considering leaving Nafta. Control of Nafta and SPP gradually passed to RWE's major competitors. The attitude of RWE only changed last week, when it sold its stake in Nafta to Ruhrgas under favourable conditions. Although Ruhrgas already more or less controlled Nafta via SPP, it paid RWE 62.22 million Eur for its stake. This represents a price per share of about 12.44 Eur more than RWE paid over two years ago and about double the market price. One of the possible reasons why RWE decided to leave the company is, apart from uncertainty surrounding future participation in the company management, uncertainty regarding whether there is a profit to be made on future dividends. Another reason may be the joint operation of both rivals in a number of companies. And so the Nafta trade may be part of the establishment of areas of influence

  14. 184 Estimation des changements de la ligne de rivage de la zone ...

    African Journals Online (AJOL)

    youness

    Estimation des changements de la ligne de rivage de la zone côtière sablonneuse de Kénitra au Maroc. Mohamed AHIZOUN1*, Eric MAIRE2, Souad HAIDA1,. José DARROZES2 et Jean-Luc PROBST3. 1 Laboratoire géophysique, mécanique des fluides, environnement et ingénierie mathématique - Equipe de recherche ...

  15. Measuring Motivation in Low-Stakes Assessments. Research Report. ETS RR-15-19

    Science.gov (United States)

    Finn, Bridgid

    2015-01-01

    There is a growing concern that when scores from low-stakes assessments are reported without considering student motivation as a construct of interest, biased conclusions about how much students know will result. Low motivation is a problem particularly relevant to low-stakes testing scenarios, which may be low stakes for the test taker but have…

  16. Trans-Saharan geopolitics. The game and the stakes; Geopolitique transsaharienne. Le jeu et l'enjeu

    Energy Technology Data Exchange (ETDEWEB)

    Chegrouche, L. [Universite Paris 1, 75 (France)

    2010-02-15

    The geopolitics of energy exports from the trans-Saharan region are similar to the Caspian great game' at the end of the last century. In North/West Africa as in West/Central Asia, the question of control over hydrocarbon reserves and lines of access to those reserves lies at the source of various conflicts. Rivalries are expressed through open and complex conflicts in which powers confront one another over oil-rich zones through proxy ethnic, religious or cultural groups, as dictated by the colossal economic interests at stake. The increasing number of conflicts - the Niger Delta, Darfur, the Azawak, etc. - is an illustration of this. The shock waves from this rivalry undermine regional peace and security, as well as the security of international energy supplies. The question here is to understand the game and the stakes of this trans-Saharan chess-board, to study its principal features and its energetic consequences. The national oil companies and states of the region can work around or through the geopolitical rifts caused by local rivalries and extra-regional appetites. There is therefore a need to understand the ways in which the players in the trans-Saharan 'great game' interact with one another, an to identifies the effects these interactions may have in the field of energy, in terms of potential reserves and transport projects. The TSGP is presented as an illustration of this geopolitical dynamics. (author)

  17. Securing SQL Server Protecting Your Database from Attackers

    CERN Document Server

    Cherry, Denny

    2011-01-01

    There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protec

  18. Economic games on the internet: the effect of $1 stakes.

    Science.gov (United States)

    Amir, Ofra; Rand, David G; Gal, Ya'akov Kobi

    2012-01-01

    Online labor markets such as Amazon Mechanical Turk (MTurk) offer an unprecedented opportunity to run economic game experiments quickly and inexpensively. Using Mturk, we recruited 756 subjects and examined their behavior in four canonical economic games, with two payoff conditions each: a stakes condition, in which subjects' earnings were based on the outcome of the game (maximum earnings of $1); and a no-stakes condition, in which subjects' earnings are unaffected by the outcome of the game. Our results demonstrate that economic game experiments run on MTurk are comparable to those run in laboratory settings, even when using very low stakes.

  19. Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance

    CERN Document Server

    Mather, Tim; Latif, Shahed

    2009-01-01

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn deta

  20. Introducing Computer-Based Testing in High-Stakes Exams in Higher Education: Results of a Field Experiment.

    Science.gov (United States)

    Boevé, Anja J; Meijer, Rob R; Albers, Casper J; Beetsma, Yta; Bosker, Roel J

    2015-01-01

    The introduction of computer-based testing in high-stakes examining in higher education is developing rather slowly due to institutional barriers (the need of extra facilities, ensuring test security) and teacher and student acceptance. From the existing literature it is unclear whether computer-based exams will result in similar results as paper-based exams and whether student acceptance can change as a result of administering computer-based exams. In this study, we compared results from a computer-based and paper-based exam in a sample of psychology students and found no differences in total scores across the two modes. Furthermore, we investigated student acceptance and change in acceptance of computer-based examining. After taking the computer-based exam, fifty percent of the students preferred paper-and-pencil exams over computer-based exams and about a quarter preferred a computer-based exam. We conclude that computer-based exam total scores are similar as paper-based exam scores, but that for the acceptance of high-stakes computer-based exams it is important that students practice and get familiar with this new mode of test administration.

  1. Safety and security of radiation sources and radioactive materials: A case of Zambia - least developed country

    International Nuclear Information System (INIS)

    Banda, S.C.

    1998-01-01

    In Zambia, which is current (1998) classified as a Least Developed Country has applications of nuclear science and technology that cover the medical, industrial, education and research. However, the application is mainly in medical and industry. Through the responsibility of radiation source is within the mandate of the Radiation Protection Board. The aspects involving security fall on different stake holders some that have no technical knowledge on what radiation is about. The stake holders in this category include customs clearing and forwarding agents, state security/defence agencies and the operators. Such a situation demands a national system that should be instituted to meet the safety and security requirements but takes into account the involvement of the diverse stake holders. In addition such system should avoid unnecessary exposure, ensure safety of radioactive materials and sources, detect illicit trade and maintain integrity of such materials or sources. This paper will provide the status on issue in Zambia and the challenges that exist to ensure further development in application of Nuclear Science and Technology (S and T) in the country takes into account the safety and security requirements that avoid deliberate and accidental loss of radiation sources and radioactive materials. The Government has a responsibility to ensure that effective system is established and operated to protect radiation sources and radioactive materials from theft, sabotage and ensure safety. (author)

  2. La vulnérabilité aux changements climatiques, une expérience ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 avr. 2011 ... Madagascar, la quatrième plus grande île au monde, héberge une multitude de formes de vie qu'on ne trouve nulle part ailleurs sur la planète. Dans la plupart des cas, cette biodiversité est extrêmement vulnérable aux changements climatiques, tout comme l'agriculture pluviale, la pêche et la foresterie, ...

  3. The climatic change; Le changement climatique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    For a long time the climatic change was the prerogative of the scientists. It is today a stake of the international policy. After a short presentation of a scientific evaluation of the situation, this document presents the policies of the fight against the climatic warming (Kyoto protocol, economical instruments), debates on the Usa attitude and the nuclear and general information on the topic (chronology, bibliography, glossary and Internet addresses references). (A.L.B.)

  4. Water, agriculture, energy: a growing interweaving. Towards an extended water security

    International Nuclear Information System (INIS)

    Taithe, Alexandre

    2009-01-01

    In this paper, the author first notices that the definition of water security according to the United Nations Development Program (UNDP) is a rather restrictive one. Thus, the search for a global security takes all forms of insufficiencies and (military or not) instabilities into account, and is then related to strategic stakes of State stability such as agriculture production, water or energy. He discusses the determining factors and vulnerabilities of a renewed water security and its implications. He highlights how internal political and social constraints are sources of local and regional tensions. In this respect, agriculture is at the heart of use conflicts (difficult and necessary reform of the sector, rivalries between rural and urban users), and water stress directly affects daily domestic uses. The author then outlines the necessary integration stakes related to water, food and energy by discussing the use of water in energy production, the use of energy to produce drinkable water, the relationship between agriculture and energy, and, of course between agriculture and water as agriculture is the main water consumer

  5. High-Stakes Educational Testing and Democracy--Antagonistic or Symbiotic Relationship?

    Science.gov (United States)

    Ydesen, Christian

    2014-01-01

    This article argues that high-stakes educational testing, along with the attendant questions of power, education access, education management and social selection, cannot be considered in isolation from society at large. Thus, high-stakes testing practices bear numerous implications for democratic conditions in society. For decades, advocates of…

  6. Split or Steal? Cooperative Behavior When the Stakes Are Large

    NARCIS (Netherlands)

    M.J. van den Assem (Martijn); D. van Dolder (Dennie); R.H. Thaler (Richard)

    2012-01-01

    textabstractWe examine cooperative behavior when large sums of money are at stake, using data from the television game show Golden Balls. At the end of each episode, contestants play a variant on the classic prisoner's dilemma for large and widely ranging stakes averaging over $20,000. Cooperation

  7. Security as a Power Element within Contemporary International Relations

    Directory of Open Access Journals (Sweden)

    Gabor Gabriel

    2015-06-01

    Full Text Available Today, more than ever, in a globalized and constantly changing world, Europe has to face new stakes and challenges. The globalization, climate change, power supply and the new threats to security are challenges that Europe of the XXIst century has to cope with. The early XXIst century coincides with a new era in the international politics, the future evolution of the worls and the new international order, with the economy and security being the central spots.

  8. Economic games on the internet: the effect of $1 stakes.

    Directory of Open Access Journals (Sweden)

    Ofra Amir

    Full Text Available Online labor markets such as Amazon Mechanical Turk (MTurk offer an unprecedented opportunity to run economic game experiments quickly and inexpensively. Using Mturk, we recruited 756 subjects and examined their behavior in four canonical economic games, with two payoff conditions each: a stakes condition, in which subjects' earnings were based on the outcome of the game (maximum earnings of $1; and a no-stakes condition, in which subjects' earnings are unaffected by the outcome of the game. Our results demonstrate that economic game experiments run on MTurk are comparable to those run in laboratory settings, even when using very low stakes.

  9. Staking solutions to tube vibration problems (developed by Technos et Compagnie - FRANCE)

    International Nuclear Information System (INIS)

    Hewitt, E.W.; Bizard, A.; Horn, M.J.

    1989-01-01

    Electric generating plant steam surface condensers have been prone to vibration induced tube failures. One common and effective method for stopping this vibration has been to insert stakes into the bundle to provide additional support. Stakes have been fabricated of a variety of rigid and semi-rigid materials of fixed dimensions. Installation difficulties and problems of incomplete tube support have been associated with this approach. New developments in the application of plastic technology has offered another approach. Stakes made of plastic tubes which are flattened, by evacuation, at the time of manufacture may now be easily inserted into the tube bundle. After insertion, the vacuum is released and the memory of the plastic causes the stakes to expand and assume their original form. The spring force of the plastic cradles the adjacent condenser tubes and stops the vibration. Developed for Electricite de France (EDF), the stakes are currently installed in 19 units of the French utility system, and two units in the United States

  10. Upping the stakes. Some lessons for the EU from the recent Russia-Ukraine gas crisis

    International Nuclear Information System (INIS)

    Van der Linde, Coby; De Jong, Jacques

    2009-02-01

    The stakes in the gas conflict between Russia and the Ukraine were upped up to an unprecedented level. The reputation of both countries, one as a reliable supplier to EU markets and the other as a reliable transit country have been dramatically shocked. The disruption of supply and the impact on gas markets in Eastern Europe will require a new round of thinking on how best to improve on security of gas supply. These responses should not include a turning away from the Ukraine as a transit country or from Russia as an important supplier, but rather the opposite, a renewed engagement of these two countries to help them construct a stable and healthy relationship in which (also) gas flows can be secured throughout the value chain, EU security of supply is the mirror image of security of transit and security of demand, and it is clear that all three securities should be addressed and integrated into one security for all. Integrating the securities along the gas value chain will allow us to move away from increasingly politicising the conflict and instead deal with the diverging interests at a more economic level. The politicising of the conflict is increasingly holding all the stakeholders hostage, preventing progress in integrating our markets and preventing large investments along the value chain to take place that are important for Russian security of supply, Ukrainian security of supply and EU security of supply. Perhaps that the recent escalation of the conflict can serve as a sombre warning signal that all parties mismanaged the vital gas relations with the short disruption in 2006 and the longer disruption in 2009 as a sorry result

  11. Reconsidering the Impact of High-stakes Testing

    Directory of Open Access Journals (Sweden)

    Henry Braun

    2004-01-01

    Full Text Available Over the last fifteen years, many states have implemented high-stakes tests as part of an effort to strengthen accountability for schools, teachers, and students. Predictably, there has been vigorous disagreement regarding the contributions of such policies to increasing test scores and, more importantly, to improving student learning. A recent study by Amrein and Berliner (2002a has received a great deal of media attention. Employing various databases covering the period 1990-2000, the authors conclude that there is no evidence that states that implemented high-stakes tests demonstrated improved student achievement on various external measures such as performance on the SAT, ACT, AP, or NAEP. In a subsequent study in which they conducted a more extensive analysis of state policies (Amrein & Berliner, 2002b, they reach a similar conclusion. However, both their methodology and their findings have been challenged by a number of authors. In this article, we undertake an extended reanalysis of one component of Amrein and Berliner (2002a. We focus on the performance of states, over the period 1992 to 2000, on the NAEP mathematics assessments for grades 4 and 8. In particular, we compare the performance of the high-stakes testing states, as designated by Amrein and Berliner, with the performance of the remaining states (conditioning, of course, on a state’s participation in the relevant NAEP assessments. For each grade, when we examine the relative gains of states over the period, we find that the comparisons strongly favor the high-stakes testing states. Moreover, the results cannot be accounted for by differences between the two groups of states with respect to changes in percent of students excluded from NAEP over the same period. On the other hand, when we follow a particular cohort (grade 4, 1992 to grade 8, 1996 or grade 4, 1996 to grade 8, 2000, we find the comparisons slightly favor the low-stakes testing states, although the discrepancy can

  12. Implications of Fuzziness for the Practical Management of High-Stakes Risks

    Directory of Open Access Journals (Sweden)

    Mark Jablonowski

    2010-04-01

    Full Text Available High-stakes (dangerous, catastrophic risks take on a wider profile as progress unfolds. What are the impacts of technological and social change on the risk landscape? Due to the complexities and dynamics involved, we can only answer these questions approximately. By using the concept of fuzziness, we can formalize our imprecision about high-stakes risk, and therefore place their management on a stronger footing. We review here the impacts of fuzziness, i.e., knowledge imperfection, on high-stakes risk management, including its implementation via computationally intelligent decision aids.

  13. Politics in evaluation: Politically responsive evaluation in high stakes environments.

    Science.gov (United States)

    Azzam, Tarek; Levine, Bret

    2015-12-01

    The role of politics has often been discussed in evaluation theory and practice. The political influence of the situation can have major effects on the evaluation design, approach and methods. Politics also has the potential to influence the decisions made from the evaluation findings. The current study focuses on the influence of the political context on stakeholder decision making. Utilizing a simulation scenario, this study compares stakeholder decision making in high and low stakes evaluation contexts. Findings suggest that high stakes political environments are more likely than low stakes environments to lead to reduced reliance on technically appropriate measures and increased dependence on measures better reflect the broader political environment. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Cyber-security of nuclear facilities: stakes and challenges

    International Nuclear Information System (INIS)

    Marquez, T.

    2016-01-01

    Major players in the French nuclear industry have implemented the concept of cyber-resilience that aims at anticipating and identifying real threats and detecting the weaknesses of the critical installations in order to protect them more efficiently. French law imposes for some categories of installations including nuclear power plants the implementation of advanced protection solutions to reach a high standard of cyber security. Sentryo, a start-up has developed a system that allows the detection of intruders in a digital network by analysing the interactions between the nodes of the network. The intruder is detected when the interaction mapping appears to be different from a configuration considered as normal. The feedback experience shows that any function in an enterprise must be made aware of the cyber risk. (A.C.)

  15. Lutte contre le changement climatique et maîtrise de la demande d’énergie : introduction au dossier thématique

    OpenAIRE

    Aubrée, Loïc; Calvo-Mendieta, Iratxe

    2017-01-01

    Cet article constitue l’introduction du dossier thématique consacré à la lutte contre le changement climatique et la maîtrise de la demande d’énergie. Après un dossier de la Revue Développement Durable et Territoires, paru en décembre 2015 et en juillet 2016, abordant la question du climat sous l’angle de l’adaptation, les articles de ce dossier s’intéressent aux politiques, aux programmes et aux instruments qui contribuent à l’atténuation du changement climatique. L’objectif est la diminutio...

  16. Vehicular Internet: Security & Privacy Challenges and Opportunities

    Directory of Open Access Journals (Sweden)

    Kamran Zaidi

    2015-07-01

    Full Text Available The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS. Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road travel. Governments and companies are pursuing driver-less vehicles as they are considered to be more reliable than humans and, therefore, safer. The vehicles today are not just a means of transportation but are also equipped with a wide range of sensors that provide valuable data. If vehicles are enabled to share data that they collect with other vehicles or authorities for decision-making and safer driving, they thereby form a vehicular network. However, there is a lot at stake in vehicular networks if they are compromised. With the stakes so high, it is imperative that the vehicular networks are secured and made resilient to any attack or attempt that may have serious consequences. The vehicular internet can also be the target of a cyber attack, which can be devastating. In this paper, the opportunities that the vehicular internet offers are presented and then various security and privacy aspects are discussed and some solutions are presented.

  17. The energy stakes - After Fukushima. 2. ed.

    International Nuclear Information System (INIS)

    Iacona, Estelle; Taine, Jean; Tamain, Bernard

    2012-01-01

    The energy question today is worldwide and depends on major geopolitical stakes (demography, development, water, health, environment, research, risks). The energy must be universally produced and distributed together with minimizing pollutions, nuclear risks and CO 2 emissions. This new edition of 'the energy stakes' is fully updated and approaches some of the main questions that any responsible citizen should ask. It comprises 3 parts dealing with: a comprehensive review of the energy question in most of countries in the world, the constraints and challenges to take up to manage energy in an optimum way, and a prospective study about the control of energy consumption and about the existing technical solutions. (J.S)

  18. Introducing Computer-Based Testing in High-Stakes Exams in Higher Education: Results of a Field Experiment

    Science.gov (United States)

    Boevé, Anja J.; Meijer, Rob R.; Albers, Casper J.; Beetsma, Yta; Bosker, Roel J.

    2015-01-01

    The introduction of computer-based testing in high-stakes examining in higher education is developing rather slowly due to institutional barriers (the need of extra facilities, ensuring test security) and teacher and student acceptance. From the existing literature it is unclear whether computer-based exams will result in similar results as paper-based exams and whether student acceptance can change as a result of administering computer-based exams. In this study, we compared results from a computer-based and paper-based exam in a sample of psychology students and found no differences in total scores across the two modes. Furthermore, we investigated student acceptance and change in acceptance of computer-based examining. After taking the computer-based exam, fifty percent of the students preferred paper-and-pencil exams over computer-based exams and about a quarter preferred a computer-based exam. We conclude that computer-based exam total scores are similar as paper-based exam scores, but that for the acceptance of high-stakes computer-based exams it is important that students practice and get familiar with this new mode of test administration. PMID:26641632

  19. The effect of $1, $5 and $10 stakes in an online dictator game.

    Science.gov (United States)

    Raihani, Nichola J; Mace, Ruth; Lamba, Shakti

    2013-01-01

    The decision rules underpinning human cooperative behaviour are often investigated under laboratory conditions using monetary incentives. A major concern with this approach is that stake size may bias subjects' decisions. This concern is particularly acute in online studies, where stakes are often far lower than those used in laboratory or field settings. We address this concern by conducting a Dictator Game using Amazon Mechanical Turk. In this two-player game, one player (the dictator) determines the division of an endowment between himself and the other player. We recruited subjects from India and the USA to play an online Dictator Game. Dictators received endowments of $1, $5 or $10. We collected two batches of data over two consecutive years. We found that players from India were less generous when playing with a $10 stake. By contrast, the effect of stake size among players from the USA was very small. This study indicates that the effects of stake size on decision making in economic games may vary across populations.

  20. The European Union as an Area of Freedom, Security and Justice

    NARCIS (Netherlands)

    Fletcher, Maria; Herlin-Karnell, Ester; Matera, Claudio

    2016-01-01

    Europe’s area of freedom, security and justice is of increasing importance in contemporary EU law and legislation. It is worthy of special research attention because of its high-stakes content (particularly from an individual and a state perspective) and because its development to date has

  1. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  2. Correlates of cooperation in a one-shot high-stakes televised prisoners' dilemma.

    Directory of Open Access Journals (Sweden)

    Maxwell N Burton-Chellew

    Full Text Available Explaining cooperation between non-relatives is a puzzle for both evolutionary biology and the social sciences. In humans, cooperation is often studied in a laboratory setting using economic games such as the prisoners' dilemma. However, such experiments are sometimes criticized for being played for low stakes and by misrepresentative student samples. Golden balls is a televised game show that uses the prisoners' dilemma, with a diverse range of participants, often playing for very large stakes. We use this non-experimental dataset to investigate the factors that influence cooperation when "playing" for considerably larger stakes than found in economic experiments. The game show has earlier stages that allow for an analysis of lying and voting decisions. We found that contestants were sensitive to the stakes involved, cooperating less when the stakes were larger in both absolute and relative terms. We also found that older contestants were more likely to cooperate, that liars received less cooperative behavior, but only if they told a certain type of lie, and that physical contact was associated with reduced cooperation, whereas laughter and promises were reliable signals or cues of cooperation, but were not necessarily detected.

  3. Résumé sur l'eau : Une stratégie adaptive au changement ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    4 janv. 2011 ... Historiquement parlant, le climat de la Terre a changé plusieurs fois et plusieurs événements climatiques se sont succédés au fil des âges, tels que des périodes glaciaires et de longues périodes de réchauffement. Les changements climatiques sont dûs à de causes variées, tant naturelles qu'humaines.

  4. Possibilité de financement pour l'égalité des sexes et le changement ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    8 mars 2018 ... Le CRDI est heureux d'annoncer une nouvelle occasion de financement qui vise à favoriser des mesures de lutte contre les changements climatiques efficaces et à long terme, afin de réduire les inégalités sociales, de promouvoir une plus grande égalité entre les sexes, et d'autonomiser les femmes et les ...

  5. Challenges to regional security and disarmament measures

    International Nuclear Information System (INIS)

    Clements, K.P.

    1993-01-01

    The new agenda for peace is providing an extremely useful road map for current international and regional discussions about new ways and means of securing and maintaining peace and security. It underlines the central role of the United nations Security Council in relation to international conflicts and the maintenance of the peace, but it underlines an increasingly important role of the regional organisations as well. In all, there is a recognition that the end of the cold war has generated possibilities for peace-building that have not existed before. To take advantage of these opportunities requires an enhancement of consultation and dialogue at national, regional and global levels so that all nations and all peoples feel and know that they have a stake in the new peace and security architecture that will govern international relations into the twenty first century

  6. Perceptions of industrial and nuclear risks. Stakes, negotiations and social development of levels of risk acceptance

    International Nuclear Information System (INIS)

    Bernier, S.Ch.

    2007-11-01

    In this thesis we will question the perceptions of industrial risks in the occidental world at the beginning of the 21. century. For this purpose we will try to understand how concepts such as sustainable development, precautionary principle, liability, or even zero-risk bias have progressively developed around a thought model based on the scientific rationality. This model is now undermined by its incapacity to fully address the issues it raises and completely avoid the potential risks. However, despite consistent weaknesses, it remains a reference value moulded by past accidents which have led to the making of laws aiming mainly at defining liability and protecting those who are held liable. Thus, public information becomes a requirement for democracy and the protection of this thought model. In this context, the protagonists at stake are security-conscious, economical and political lobbies that constantly redefine the limits of risk acceptance. We come to the realization that our lifestyle and value system remain unchallenged even though undergoing a crisis. The specificity of this research lies into the importance we give to the local approach, dealing with registered Seveso sites and nuclear plants located in Indre et Loire. We have polled five categories of respondents through interviews or questionnaires in order to understand their opinion regarding situations involving technological risks. The result of this survey helps us understand and set the levels of risk acceptance that they define with regard to the industrial risks and show the complexity of a situation involving political stakes, environmental pressures, a profit-driven economy and security constraints, in a vague and complex context. This work gives us a contrasted picture of today's perceptions of risks. (author)

  7. Raising the Stakes: High-Stakes Testing and the Attack on Public Education in New York

    Science.gov (United States)

    Hursh, David

    2013-01-01

    Over the last almost two decades, high-stakes testing has become increasingly central to New York's schools. In the 1990s, the State Department of Education began requiring that secondary students pass five standardized exams to graduate. In 2002, the federal No Child Left Behind Act required students in grades three through eight to take math and…

  8. The effect of $1, $5 and $10 stakes in an online dictator game.

    Directory of Open Access Journals (Sweden)

    Nichola J Raihani

    Full Text Available The decision rules underpinning human cooperative behaviour are often investigated under laboratory conditions using monetary incentives. A major concern with this approach is that stake size may bias subjects' decisions. This concern is particularly acute in online studies, where stakes are often far lower than those used in laboratory or field settings. We address this concern by conducting a Dictator Game using Amazon Mechanical Turk. In this two-player game, one player (the dictator determines the division of an endowment between himself and the other player. We recruited subjects from India and the USA to play an online Dictator Game. Dictators received endowments of $1, $5 or $10. We collected two batches of data over two consecutive years. We found that players from India were less generous when playing with a $10 stake. By contrast, the effect of stake size among players from the USA was very small. This study indicates that the effects of stake size on decision making in economic games may vary across populations.

  9. Validating High-Stakes Testing Programs.

    Science.gov (United States)

    Kane, Michael

    2002-01-01

    Makes the point that the interpretations and use of high-stakes test scores rely on policy assumptions about what should be taught and the content standards and performance standards that should be applied. The assumptions built into an assessment need to be subjected to scrutiny and criticism if a strong case is to be made for the validity of the…

  10. Huntsman takes a stake in Chemplex

    International Nuclear Information System (INIS)

    Wood, A.

    1993-01-01

    Huntsman Chemical (Salt Lake City) has bought a 50% stake in Australian styrenics maker Chemplex (Melbourne) from Consolidated Press Holdings (Sydney). Huntsman stepped in after a previous acquisition plan by South Africa's Sentrachem (Johannesburg) broke down because of a failure to agree on price. Chemplex has two production locations near Melbourne: West Footscray, with capacity for 100,000 m.t./year of styrene, plus polystyrene, phenol, and acetone; and Dandenong, with production of acrylonitrile butadiene styrene and latex. The company was originally Monsanto Australia, before being acquired by Consolidated Press in 1988. The deal will give Huntsman its first major production position in the Asia/Pacific region, apart from a 50% stake in a 25,000-m.t./year polystyrene plant in Taiwan, with Grand Pacific Petrochemical (Taipei) as a partner. In 1991, Huntsman abandoned plans to invest in a 25,000-m.t./year polystyrene plant in Thailand with Mitsubishi Corp. and Toa (Bangkok). Huntsman Chemical has annual revenues of $1.3 billion

  11. Les ecarts de financement en matiere d'adaptation aux changements climatiques - avec la perspective des CPDN

    DEFF Research Database (Denmark)

    Olhoff, Anne; Bee, Skylar; Puig, Daniel

    En 2014, le Programme des Nations Unies pour l’Environnement (PNUE) a publié son premier rapport sur les écarts entre besoins et perspectives en matière d’adaptation (AGR 2014) (PNUE, 2014), lequel a permis de poser un cadre préliminaire pour évaluer ces écarts et d’établir une évaluation...... rapport sur les écarts financiers et les options permettant de les combler. Le rapport sera publié au printemps 2016. Cette mise à jour doit contribuer aux débats lors de la 21ème session de la Conférence des Parties (COP 21) à la Convention-Cadre des Nations Unies sur les Changements Climatiques (CCNUCC...... les besoins de financement présentes dans les composantes adaptation des Contributions Prévues Déterminées au niveau National (CPDN) (INDC) – soit les engagements post 2020 que les pays se proposent mettre en oeuvre dans le cadre d’un nouvel accord mondial sur les changements climatiques....

  12. Why Has High-Stakes Testing So Easily Slipped into Contemporary American Life?

    Science.gov (United States)

    Nichols, Sharon L.; Berliner, David C.

    2008-01-01

    High-stakes testing is the practice of attaching important consequences to standardized test scores, and it is the engine that drives the No Child Left Behind (NCLB) Act. The rationale for high-stakes testing is that the promise of rewards and the threat of punishments will cause teachers to work more effectively, students to be more motivated,…

  13. Les discours de François Hollande (2009-2012: la force axiologico-affective du changement

    Directory of Open Access Journals (Sweden)

    Maria Immacolata Spagna

    2014-03-01

    Full Text Available Abstract – Within the field of argumentative analysis, our purpose is to underline the function and the effectiveness of the axiological-emotional content of the change proposed by François Hollande in his speeches (2009-2012.On the basis of the emotional orientation, given in a dysphoric register towards the previous government and in a euphoric one towards the auspicious future, the argumentation of the change claimed by the “normal” president is based on values. To not change would mean to accept the current situation and therefore all its negative values.Putting the reader in a condition of emotional tension with the aim of energizing him to find a remedy, Hollande’s proposition becomes, thus, a call to action, an implicit request for social, politic and moral engagement, to change the course of history and to realize a better future. Keywords: Argumentation, political discourse, emotion, axiological, change.  Résumé – Dans le cadre de l’analyse argumentative, cet article vise à souligner la fonction et l’efficacité de la charge axiologico-affective du changement proposé par François Hollande dans ses discours (2009-2012.Sur la base de l’orientation émotionnelle, donnée dans un registre dysphorique à l’égard du gouvernement passé et euphorique vers l’avenir prometteur, l’argumentation du changement invoqué par le président “normal” se fonde sur les valeurs. Ne pas changer signifierait accepter la situation actuelle et, par là, toutes ces valeurs négatives.Mettant le lecteur dans une condition de tension émotive pour le motiver à trouver un remède, la proposition de Hollande devient ainsi un appel à agir, une requête implicite d’engagement social, politique et moral pour changer le cours de l’histoire et réaliser un futur meilleur. Mots clés: argumentation, discours politique, émotion, axiologique, changement

  14. Agro-fuels, a cartography of stakes

    International Nuclear Information System (INIS)

    2008-09-01

    This document proposes a dashboard of the main issues regarding agro-fuels. Nine sheets propose basic information and data on these issues: 1- agro-fuel production and consumption in the world (ethanol, vegetable oils, perspective for demand in the transport sector), 2- energy efficiency and greenhouse gas emissions (energy assessments and greenhouse effect of agro-fuels, discrepancies of results between first-generation European agro-fuels, case of agro-fuels produced in Southern countries), 3- needed surfaces in Europe (land use and cultivable areas for agro-fuel production in Europe and in France, competition between food and energy crops), 4- deforestation in the South (relationship between agriculture, deforestation and agro-fuels, between deforestation and greenhouse gas emissions), 5- impacts on biodiversity (use of pesticides and fertilizers, large scale cultivations and single-crop farming, cultivation of fallow land and permanent meadows, deforestation in the South, relationship between agro-fuels and GMOs), 6- impacts on water, soil and air (water quality and availability, soil erosion, compaction and fertility loss, air quality), 7- food-related and social stakes (issue of food security, social impacts of agro-fuel production with pressure on family agriculture and issues of land property), 8- public supports and economic efficiency (public promotion of agro-fuels, agro-fuel and oil prices, assessment of the 'avoided' CO 2 ton), and 9- perspectives for second-generation agro-fuels (definitions and processes, benefits with respect to first-generation fuels, possible impacts on the environment, barriers to their development)

  15. Small- and large-stakes risk aversion: implications of concavity calabration for decision theory

    NARCIS (Netherlands)

    Cox, J.C.; Sadiraj, V.

    2006-01-01

    A growing literature reports the conclusions that: (a) expected utility theory does not provide a plausible theory of risk aversion for both small-stakes and large-stakes gambles; and (b) this decision theory should be replaced with an alternative theory characterized by loss aversion. This paper

  16. Learning to Label: Socialisation, Gender, and the Hidden Curriculum of High-Stakes Testing

    Science.gov (United States)

    Booher-Jennings, Jennifer

    2008-01-01

    Although high-stakes tests play an increasing role in students' schooling experiences, scholars have not examined these tests as sites for socialisation. Drawing on qualitative data collected at an American urban primary school, this study explores what educators teach students about motivation and effort through high-stakes testing, how students…

  17. Student Motivation in Low-Stakes Assessment Contexts: An Exploratory Analysis in Engineering Mechanics

    Science.gov (United States)

    Musekamp, Frank; Pearce, Jacob

    2016-01-01

    The goal of this paper is to examine the relationship of student motivation and achievement in low-stakes assessment contexts. Using Pearson product-moment correlations and hierarchical linear regression modelling to analyse data on 794 tertiary students who undertook a low-stakes engineering mechanics assessment (along with the questionnaire of…

  18. La modélisation intégrée des changements climatiques et les liens ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Les changements climatiques influencent la fréquence et l'intensité des phénomènes météorologiques extrêmes, exposant à la fois les populations et les économies à des pertes de vie, de productivité et de propriété. Ce projet aidera les planificateurs et les responsables des politiques à réagir de manière plus efficace en ...

  19. Security Sector Reform in the Arab Region | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Nouveau webinaire IWRA/CRDI sur les changements climatiques et la gestion adaptive de l'eau. L'Association internationale de ressources en eau (IWRA), en étroite collaboration avec le CRDI, organise un webinaire intitulé "Changements climatiques et gestion adaptive de l'eau: des... Voir davantageNouveau webinaire ...

  20. Re-analysis of NAEP Math and Reading Scores in States with and without High-stakes Tests: Response to Rosenshine

    Directory of Open Access Journals (Sweden)

    Audrey Amrein-Beardsley

    2003-08-01

    Full Text Available Here we address the criticism of our NAEP analyses by Rosenshine (2003. On the basis of his thoughtful critique we redid some of the analyses on which he focused. Our findings contradict his. This is no fault of his, the reasons for which are explained in this paper. Our findings do support our position that high-stakes tests do not do much to improve academic achievement. The extent to which states with high-stakes tests outperform states without high-stakes tests is, at best, indeterminable. Using 1994-1998 NAEP reading and 1996-2000 NAEP math data and accounting for NAEP exemption rates for the same years, we found that states with high-stakes tests are not outperforming states without high-stakes tests in reading in the 4th grade or math in the 8th grade at a statistically significant level. States with high-stakes tests are, however, outperforming states without high-stakes tests in math in the 4th grade at a statistically significant level. Our findings also support our earlier stance that states with high-stakes tests are exempting more students from participating in the NAEP than are states without high-stakes tests. This is more prevalent the more recent the NAEP test administration. This is illustrated in the tables below.

  1. Hiding behind High-Stakes Testing: Meritocracy, Objectivity and Inequality in U.S. Education

    Science.gov (United States)

    Au, Wayne

    2013-01-01

    This paper analyses how high-stakes, standardised testing became the policy tool in the U.S. that it is today and discusses its role in advancing an ideology of meritocracy that fundamentally masks structural inequalities related to race and economic class. This paper first traces the early history of high-stakes testing within the U.S. context,…

  2. Strengthening the abilities of French-speaking NGOs. Post-2012 climate stakes. Adaptation - Energy - Deforestation, France - Africa - Canada

    International Nuclear Information System (INIS)

    Creach, Morgane; Margot, Stephanie; Connor, Richard; Angerand, Sylvain

    2007-10-01

    The first part of this report discusses the possibilities of an international response to face the challenge of adaptation to climate change (presentation of the main notions, discussion of the United Nations Framework Convention on Climate Change and international stakes about adaptation). The second part discusses the perspectives of access to energy in African countries: description of the African energy context, applications of existing mechanisms of struggle against climate change to the field of energy, stakes for post-2012 negotiations. The next part addresses the stakes of the avoided deforestation: definitions and key figures, direct and underlying causes of deforestation and assessment of the cost for slowing down or stopping it, stakes and struggle of interests about the 'avoided deforestation'. The last part reports the 'post-2012 climate stakes' workshop which addressed these same topics (access to energy in African countries, adaptation to climate change, avoided deforestation)

  3. CO2 capture and sequestration. Technological and social stakes in France

    International Nuclear Information System (INIS)

    Minh, Ha-Duong; Naceur, Chaabane

    2010-01-01

    Industrial technology already tested in Norway, North America and Algeria, the CO 2 capture and sequestration (CCS) consists in collecting carbon dioxide and to inject it into deep geological traps. This solution, which contributes to the fight against climatic change, arouses a growing up interest in France as a consequence of the Grenelle Environnement meetings. At a time when big research and demonstration programs are launched everywhere in Europe, this book proposes for the first time a status of the knowledge gathered so far by the specialists of the IPG (World Physics Institute), of the BRGM (Bureau of Geologic and Mining Researches), of the IFP (French Petroleum Institute), and of the CNRS (National Center of Scientific Research). It takes stock of the stakes of this new technology in France. Beyond the technical discussions between experts, the book deals with the external communication stakes and the open public debates. The point of views of the different intervening parties (research organizations, environmental non-governmental organizations, European lobby (Zero Emission Platform), citizens, journalists and companies are compared. A large part of the book aims at shading light on the social acceptability question of this technology. In addition to a synthesis of the available literature, it presents and analyses two participation instruments: a dialogue workshop and a geographical information web site. Content: 1 - scientific stakes of CO 2 geologic sequestration; 2 - technical stakes; 3 - economical stakes; 4 - risks and public opinion; 5 - social acceptability and territorial planning, the wind energy experience; 6 - the point of view of Action-Climat-France network (RAC-F); 7 - citizens' recommendations; 8 - the comeback of coal on the international energy scene; 9 - some consensus from a 'dialogue workshop': the social acceptability of CCS; 10 - bibliographic synthesis about the social acceptability of CCS; 11 - METSTOR, the interactive maping at

  4. Wind power: Areva acquires a 51% stake in Multibrid

    International Nuclear Information System (INIS)

    2007-01-01

    AREVA announced the acquisition of a 51% stake in Multibrid, a designer and manufacturer of multi-megawatt off-shore wind turbines based in Germany. With this acquisition, AREVA has entered into a joint venture with Prokon Nord, a German off-shore wind turbine and biomass plant developer and current owner of Multibrid. This transaction values Multibrid at euro 150 million. AREVA plans to rapidly further develop Multibrid's activities by giving the company access to its industrial resources, financial base and international commercial network. In return, Multibrid will provide AREVA with its leading-edge technology which, developed for 5 MW turbines, can achieve a very high output while reducing operating costs thanks to a simplified maintenance system. With this stake in Multibrid, AREVA aims to increase its presence on the offshore wind market that meets land settlement requirements and that should grow significantly in the years to come (from 300 MW in Europe today to an expected 1400 MW by 2011). As an exclusive supplier of Prokon Nord, Multibrid will participate in projects such as Borkum West (30 MW), the first offshore project in Germany, Borkum West 2 (400 MW), and Cote d'Albatre (105 MW), the first offshore wind farm project in France. The stake in Multibrid strengthens AREVA's strategic positioning on the CO 2 -free energy market, thanks to complementary solutions ranging from nuclear technologies to renewables. A number of recent achievements illustrate this strategy: - bio-energy (crucial energy supply in numerous rural areas): delivery of turnkey biomass power plants; ongoing construction of 10 plants in India, Thailand and Brazil; future development plans in fast-growing regions, such as Latin America; - wind power: Multibrid adds to the Group's stake in REpower and to its partnership with Suzlon for which AREVA is the number one supplier of transmission and distribution solutions for wind power; - hydrogen and fuel cells: design and manufacture of

  5. Mindfulness, anxiety, and high-stakes mathematics performance in the laboratory and classroom.

    Science.gov (United States)

    Bellinger, David B; DeCaro, Marci S; Ralston, Patricia A S

    2015-12-01

    Mindfulness enhances emotion regulation and cognitive performance. A mindful approach may be especially beneficial in high-stakes academic testing environments, in which anxious thoughts disrupt cognitive control. The current studies examined whether mindfulness improves the emotional response to anxiety-producing testing situations, freeing working memory resources, and improving performance. In Study 1, we examined performance in a high-pressure laboratory setting. Mindfulness indirectly benefited math performance by reducing the experience of state anxiety. This benefit occurred selectively for problems that required greater working memory resources. Study 2 extended these findings to a calculus course taken by undergraduate engineering majors. Mindfulness indirectly benefited students' performance on high-stakes quizzes and exams by reducing their cognitive test anxiety. Mindfulness did not impact performance on lower-stakes homework assignments. These findings reveal an important mechanism by which mindfulness benefits academic performance, and suggest that mindfulness may help attenuate the negative effects of test anxiety. Copyright © 2015 Elsevier Inc. All rights reserved.

  6. Globalisation et changement d’échelle dans le gouvernement urbain

    Directory of Open Access Journals (Sweden)

    H.V. Savitch

    2007-10-01

    Full Text Available Cet article analyse les relations entre la mondialisation et le changement d’échelle urbaine. Il considère que les dynamiques à l’œuvre dans le processus de mondialisation (politiques néo-libérales, compétition territoriale, suburbanisation conduisent à de nouvelles contraintes pesant sur les villes. Une des réponses les plus pertinentes que les villes peuvent générer repose sur le changement d’échelle de leurs institutions en bâtissant de nouvelles structures ou en les restructurant pour renforcer leur capacité d’action. Ce processus conduit à reconfigurer les modes de gouvernance et donc le pouvoir urbain sur de nouvelles bases géographiques. Ce type de manipulation territoriale est un instrument qui agit sur l’allocation des ressources entre acteurs, en inclus certains, en exclue d’autres, établit de nouvelles priorités sur l’agenda politique. Cinq types de dynamiques institutionnelles sont présentées et analysées à partir de cas concrets: 1 les villes fusionnées 2 le gouvernement à plusieurs niveaux 3 la coopération partagée 4 les communautés urbaines et 5 les villes non contiguës. Une première évaluation est menée en tentant de mettre jour l’efficacité, le contrôle démocratique et la capacité à générer du développement économique respectifs de ces cinq modèles qui présentent tous des avantages et des inconvénients. Le recours à l’un ou l’autre de ces modèles s’explique essentiellement par les valeurs auxquels il renvoie et par des contingences politiques et économiques. Ils ne garantissent pas non plus un type particulier d’effet même si un changement d’échelle bien maîtrisé peut renforcer la position d’une ville face à la mondialisation.This article explores the relationship between globalization and urban rescaling. It suggests that forces emanating from globalization (neo liberal politics, increased competition, economic restructuring and suburbanization have

  7. Design Optimization and Fatigue Analysis of Laser Stake Welded Connections

    National Research Council Canada - National Science Library

    Singh, Anshuman; Vel, Senthil S; Caccese, Vincent

    2008-01-01

    This report summanzes research on the design and fatigue analysis of laser-stake welded connections performed at the University of Maine from January 2006 to December 2007 for the Structural Response...

  8. Quel futur pour les services écosystémiques de la forêt alpine dans un contexte de changement climatique ?

    Directory of Open Access Journals (Sweden)

    Benoît Courbaud

    2011-01-01

    Full Text Available La forêt de montagne produit de nombreux services écosystémiques qui vont être affectés par les changements climatiques. On attend une remontée des essences en altitude qui pourrait conduire à une diminution des résineux et des espèces du subalpin. Ces changements d’essences pourraient avoir un impact négatif sur la biodiversité et sur la production de bois d’œuvre. On observe cependant également une augmentation de la productivité favorable à la production de bois énergie et au moins temporairement de bois d’œuvre, ainsi qu’au stockage de carbone. Face à une augmentation possible des évènements climatiques extrêmes, les changements de végétation pourront être marqués par des épisodes de dépérissements, très négatifs pour la filière économique, la protection contre les risques naturels et la biodiversité. Le changement climatique affectera la forêt également de manière indirecte en augmentant la demande en énergie renouvelable et en stockage de carbone. Les incertitudes sur les prédictions de changements de végétation sont élevées, ce qui rend délicate la définition de stratégies d’adaptation de la gestion forestière. Une gestion de crises efficace, un accompagnement des évolutions naturelles de la forêt basé sur une interaction recherche-gestion (gestion adaptative, et la prise en compte explicite de la notion d’incertitude paraissent des éléments essentiels au maintien des services écosystémiques fournis par la forêt.Mountain forests produce a large number of ecosystem services that are going to be affected by climate change. We are expecting an increase in high altitude species that could result in the decrease in resinous and subalpine species. These changes in species could adversely affect biodiversity and timber production. However, we also observe an increase in productivity that favours the production of energy wood and, at least temporarily, timber, as well as carbon

  9. The cyber security of French nuclear installations: stakes and opportunities

    International Nuclear Information System (INIS)

    Marquez, Thierry

    2016-01-01

    Notably due to the development of the number of connected objects, nuclear installations, their supply chain and all the actors of the chain value are exposed to cyber risks, even if a recent study noticed that successful cyber attacks involving nuclear plants are rare, but real. Thus, the threat is actual and growing, and the IAEA is already working with Interpol on this issue. The author then describes how French actors (EDF, Areva, CEA) have introduced cyber-resilience to better anticipate and identify actual threats and critical vulnerabilities in order to protect infrastructures. He comments some strengthened regulatory measures introduced for the French nuclear sector, and continuous improvements brought in the field of cyber security. He shows that handling these risks is also an opportunity to develop crisis management tools through the development of a specific know-how which also has an industrial value

  10. Does high-stakes testing increase cultural capital among low-income and racial minority students?

    Directory of Open Access Journals (Sweden)

    Won-Pyo Hong

    2008-03-01

    Full Text Available This article draws on research from Texas and Chicago to examine whether high-stakes testing enables low-income and racial minority students to acquire cultural capital. While students' performance on state or district tests rose after the implementation of high-stakes testing and accountability policies in Texas and Chicago in the 1990s, several studies indicate that these policies seemed to have had deleterious effects on curriculum, instruction, the percentage of students excluded from the tests, and student dropout rates. As a result, the policies seemed to have had mixed effects on students' opportunities to acquire embodied and institutionalized cultural capital. These findings are consistent with the work of Shepard (2000, Darling-Hammond (2004a, and others who have written of the likely negative repercussions of high-stakes testing and accountability policies.

  11. Whither probabilistic security management for real-time operation of power systems ?

    OpenAIRE

    Karangelos, Efthymios; Panciatici, Patrick; Wehenkel, Louis

    2016-01-01

    This paper investigates the stakes of introducing probabilistic approaches for the management of power system’s security. In real-time operation, the aim is to arbitrate in a rational way between preventive and corrective control, while taking into account i) the prior probabilities of contingencies, ii) the possible failure modes of corrective control actions, iii) the socio-economic consequences of service interruptions. This work is a first step towards the construction of a globally co...

  12. TRANSFERT THERMIQUE INSTATIONNAIRE DANS UN MUR TRICOUCHES SUBISSANT UN CHANGEMENT DE PHASE PAR SOLIDIFICATION.

    OpenAIRE

    O Arfi; E Mezaache

    2016-01-01

    Une étude numérique du transfert de chaleur instationnaire dans un mur tricouches est présentée. Le modèle physique est basé sur l’équation de conduction thermique unidirectionnelle en tenant compte des équations de couplages au niveau des interfaces et des conditions convectives de surfaces. Les équations de transfert sont données en représentation enthalpique pour le matériau à changement de phase (MCP), et en formulation générale pour les régions solides. La formulation adimensionnelle a p...

  13. Colloquium on the stakes and new realities of renewable energies

    International Nuclear Information System (INIS)

    2001-01-01

    Today, renewable energies represent 23% of the French energy production and should become a real advantage to overcome the greenhouse effect stakes and to optimize the durable development policy. This book brings together the interventions of the different participants to this colloquium on renewable energies. The following aspects were covered: how to make renewable energies profitable in the framework of an industrial facility; which specific renewable energy models would allow to overcome the greenhouse effect stake; how emission permits can incite to the use of renewable energies and reduce the pollution tax amount; how to take advantage of the new wastes valorization techniques in the rationalization of energy expenses; advantages and limitations of renewable energies in the on-site energy optimization; opportunities and stakes of the climate risk for renewable energies; last developments of the national regulatory framework applicable to renewable energies; status and perspectives of the European directive project on renewable energies; the suitability of renewable energies with respect to the energy needs of the industry and tertiary sectors; how to insert renewable energies in a durable development policy; how to exploit the diversity of renewable energies in order to maximize their economical and environmental potentialities; how to integrate the solar thermal and photovoltaic energies in the framework of a global environmental policy. (J.S.)

  14. Changements organisationnels, structures industrielles et innovations environnementales : le cas des firmes industrielles françaises

    OpenAIRE

    Nadel, Simon

    2014-01-01

    La thèse analyse les déterminants de l’adoption des innovations environnementales dans l’industrie française et ses interactions avec les changements organisationnels, d’une part, et les structures industrielles, d’autre part. Elle offre tout d’abord une revue de la littérature économique qui fonde l’analyse de l’innovation environnementale. Elle propose ensuite une analyse empirique, sur données d’entreprise, du comportement éco-innovateur des firmes autour de trois éclairages. La première p...

  15. Karm betoon, roheline kanjon : STAKES-i ja Senati kinnisvara büroo, Lintulahdenkuja 4, Sörnäinen, Helsingi = Office Facilities for the National Research and Development Centre for Welfare an Health (STAKES) and Senate Properties / Mikko Heikkinen,

    Index Scriptorium Estoniae

    Heikkinen, Mikko

    2004-01-01

    Senati kinnisvarafirma valis oma peakorteri asukohaks endise lao. Samas ehitati STAKES-i uus hoone. Projekteerija: Heikkinen-Komonen OY. Autorid Mikko Heikkinen, Markku Komonen. Sisekujundus: Suunnittelupalvelut (STAKES), Heikkinen-Komonen (Senat). Maastikukujundus: Byman & Ruokonen. Valmis 2002. I korruse plaan, välis- ja sisevaated

  16. Oil dependence. Myths and realities of a strategic stake; La dependance petroliere. Mythes et realites d'un enjeu strategique

    Energy Technology Data Exchange (ETDEWEB)

    Chaliand, G.; Jafalian, A

    2005-04-15

    Using a series of regional studies, this collective book proposes to evaluate the strategic dimensions of the oil dependence and to determine its geopolitical impacts in the Middle East, Russia, China, USA and Europe. Content: the oil stakes at the beginning of the 21. century; in the center of the oil scene: the Middle East; oil dependence and US foreign policy: beyond myths; the Russian oil, instrument of influence and of alliances re-knitting; China and oil: security feelings and strategic approach; towards a European supply strategy; beyond petroleum: what alternatives; 150 years of petroleum history; the energy dependence; energy economy; automotive fuels and pollution abatement; limitation of greenhouse gas emissions; glossary; bibliography; index; Web links. (J.S.)

  17. China’s Air Defense Identification Zone: Concept, Issues at Stake and Regional Impact

    Science.gov (United States)

    2013-12-23

    early Chinese legal culture ” Karen Turner “War, Punishment, and The Law of Nature in Early Chinese Concepts of The State”, Harvard Journal of Asiatic...lack of strategic direction, moral relativism , a failure to gauge the significance of what is at stake, and distraction with events in other regions of...WORKING PAPER 1 posted 23 December 2013 CHINA’S AIR DEFENSE IDENTIFICATION ZONE: CONCEPT , ISSUES AT STAKE AND REGIONAL IMPACT

  18. Security Threats Emerging from the Middle East and North Africa

    OpenAIRE

    Çınar, Bekir

    2015-01-01

    The main security threats affecting the Middle East and North African (MENA) region arise from energy insecurity, immigration and terrorism. These threats would remain if authorities and other stake holders do not address the root causes of the problems, which are artificial national borders, authoritarian regimes and lack of pluralist education. This paper suggests that lifting state borders and setting up regional economic communities such as the EU may ease conflicts in the region which ca...

  19. TRANSFERT THERMIQUE INSTATIONNAIRE DANS UN MUR TRICOUCHES SUBISSANT UN CHANGEMENT DE PHASE PAR SOLIDIFICATION.

    Directory of Open Access Journals (Sweden)

    O Arfi

    2016-05-01

    Full Text Available Une étude numérique du transfert de chaleur instationnaire dans un mur tricouches est présentée. Le modèle physique est basé sur l’équation de conduction thermique unidirectionnelle en tenant compte des équations de couplages au niveau des interfaces et des conditions convectives de surfaces. Les équations de transfert sont données en représentation enthalpique pour le matériau à changement de phase (MCP, et en formulation générale pour les régions solides. La formulation adimensionnelle a permis de dégager les principaux paramètres affectant le transfert : nombre de Biot (Bi, nombre de Stephan (Ste et le degré de surchauffe (qm. La discrétisation des équations est réalisée en utilisant la méthode des volumes finis selon un schéma explicite. La solution numérique est obtenue par une méthode itérative basée sur la notion d’enthalpie critique. L’étude de l’influence de la condition convective chaude, gouvernée par  Bi¥,cet θ¥,c , a montré que la présence des couches solides affecte la cinétique de la solidification, les limites de la solidification et le transfert de chaleur par un effet de stockage et de déstockage d’énergie sensible. L’influence de la température θ¥,c sur le processus de changement de phase est fortement dépendante du nombre de Biot Bi¥,c.

  20. City and energy: which common stakes?

    International Nuclear Information System (INIS)

    Saujot, Mathieu; Peiffer-Smadja, Oceane; Renard, Vincent

    2014-01-01

    This publication proposes a synthesis of several issues addressed during sessions hold during a year. The addressed topics have been: the interactions between forms of urban development and energy transition, energetic vulnerability in relationship with mobility, the role and participation of inhabitants in the making of the city and in energy transition (the challenge of ways of life and usages in eco-districts), stakes and consequences of a more integrated urban production, the local governance of energy. Each of these topics is discussed, and the main lessons learned are highlighted

  1. The International Atomic Energy Agency Nuclear Security Education Strategies

    International Nuclear Information System (INIS)

    BRAUNEGGER-GUELICH, A.; RUKHLO, V.; GREGORIC, M.; COLGAN, P.

    2011-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA provides a comprehensive nuclear security training programme to States on a regular basis, and has developed a concept that seeks to effectively pass ownership of nuclear security knowledge and skills to States through the establishment of a Nuclear Security Support Centre. In addition, the IAEA has developed a technical guidance titled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model of a Master of Science (M.Sc.) and assists educational institutions to provide nuclear security education. The article sets out IAEA efforts in the area of nuclear security training and education, including the assistance to States for establishing a Nuclear Security Support Centre. It underlines the objective and content of the IAEA Nuclear Security Series No. 12, discusses different concepts on how to establish nuclear security at universities and, emphasizes on the IAEA efforts to assist educational and research institutions, and other stake holders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (author)

  2. High Stakes Testing and Its Impact on Rural Schools.

    Science.gov (United States)

    Hodges, V. Pauline

    2002-01-01

    The movement to standardization and high-stakes testing has been driven by ideological and political concerns and has adversely affected teaching/learning, democratic discourse, and educational equity. Rural schools are hit harder because of geographic isolation and insufficient staff and resources. Testing used for purposes other than measuring…

  3. Higher Stakes--The Hidden Risks of School Security Fences for Children's Learning Environments

    Science.gov (United States)

    Rooney, Tonya

    2015-01-01

    In a move away from the open or low-fenced grounds that have traditionally been a feature of Australian school design, the last decade has seen a growth in the installation of high-security fences around schools. These structures, far from being passive and neutral, act to redefine the possibilities for movement and connectivity in the local…

  4. Energy storage. Stakes, technical solutions and valorization opportunities

    International Nuclear Information System (INIS)

    2012-03-01

    As a key factor to allow the continuous growth of renewable energies, energy storage technologies are now more than ever in the spotlight. In order to grasp the stakes, understand the technology diversity, learn relevant orders of magnitudes and comprehend the close intricacy of energy storage with energy and environmental issues, ENEA has published a detailed and well-documented publication on the subject

  5. Electric power from renewable energy: resources and stakes for France

    International Nuclear Information System (INIS)

    2001-01-01

    This paper presents the essential of the last thematic letter published by the IFEN (French institute of the environment), devoted to the resources and stakes of the electric power produced by the renewable energies in France. (A.L.B.)

  6. The Rise of High-Stakes Educational Testing in Denmark (1920-1970)

    DEFF Research Database (Denmark)

    Ydesen, Christian

    The Rise of High-Stakes Educational Testing in Denmark (1920–1970) is an attempt to determine why and how tests rose to prominence in an educational system that used to rely on qualitative tests and teacher evaluations. The study addresses the important issues of how testing interacts...... with and influences an educational system, and which common factors are involved in order to implement testing in an educational system. The study is based on three relatively unknown case studies – illustrious examples of high-stakes educational testing practices in the Danish public school system. The first case...... to 1959. The third case study examines the testing of Greenlandic children during the preparation scheme in the Greenlandic educational system from 1961 to 1976....

  7. Communication des organisations, territoires et TIC au coeur du changement et du développement durable

    OpenAIRE

    DEBOS, Franck; BOILLOT, Florence

    2014-01-01

    Notre point de départ est que l'organisation, ' entreprises, collectivités, ONG, institution territoriale, etc.', tend à se revendiquer écocitoyenne, ce qui sous-tend qu'elle s'arroge un rôle d'animateur de territoire, facteur d'innovation et de changement dans le domaine public, professionnel mais aussi privé (De Backer, 1998 ; Cohen-Bacrie, 2006). Dans un contexte de crises économiques répétitives depuis l'éclatement de la bulle Internet en 2000 avec comme points d'orgue la crise des « Subp...

  8. Negotiating the terrain of high-stakes accountability in science teaching

    Science.gov (United States)

    Aronson, Isaak

    Teachers interact with their students on behalf of the entire educational system. The aim of this study is to explore how biology teachers understand and construct their practice in a high-stakes accountability environment that is likely to be riddled with tensions. By critically questioning the technical paradigms of accountability this study challenges the fundamental assumptions of accountability. Such a critical approach may help teachers develop empowerment strategies that can free them from the de-skilling effects of the educational accountability system. This interpretive case study of a high-school in Maryland is grounded in three streams of research literature: quality science instruction based on scientific inquiry, the effects of educational accountability on the curriculum, and the influence of policy on classroom practice with a specific focus on how teachers balance competing tensions. This study theoretically occurs at the intersection of educational accountability and pedagogy. In terms of data collection, I conduct two interviews with all six biology teachers in the school. I observe each teacher for at least fifteen class periods. I review high-stakes accountability policy documents from the federal, state, and district levels of the education system. Three themes emerge from the research. The first theme, "re-defining science teaching," captures how deeply accountability structures have penetrated the science curriculum. The second theme, "the pressure mounts," explores how high-stakes accountability in science has increased the stress placed on teachers. The third theme, "teaching-in-between," explores how teachers compromise between accountability mandates and their own understandings of quality teaching. Together, the three themes shed light on the current high-stakes climate in which teachers currently work. This study's findings inform the myriad paradoxes at all levels of the educational system. As Congress and advocacy groups battle over

  9. The myth of secure computing.

    Science.gov (United States)

    Austin, Robert D; Darby, Christopher A

    2003-06-01

    Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.

  10. The Impact of High Stakes Testing: The Australian Story

    Science.gov (United States)

    Klenowski, Val; Wyatt-Smith, Claire

    2012-01-01

    High stakes testing in Australia was introduced in 2008 by way of the National Assessment Program--Literacy and Numeracy (NAPLAN). Currently, every year all students in Years 3, 5, 7 and 9 are assessed on the same days using national tests in Reading, Writing, Language Conventions (Spelling, Grammar and Punctuation) and Numeracy. In 2010 the…

  11. Local governance of energy. Clarification of stakes and illustration by spatial planning

    International Nuclear Information System (INIS)

    Saujot, Mathieu; Ruedinger, Andreas; Guerry, Anais

    2014-01-01

    As energy transition implies important societal transformations, the authors developed an analysis framework about the main questions raised by local governance: role of the different levels of local communities in the definition and implementation of strategies, key stakes of the sharing of skills between the State and communities, and stakes regarding spatial planning in this context. The authors first address the issue of relevance of the different territorial scales in a context of evolution of energy policies. They propose an overview of this issue with reference to the debate on local governance of transition. They discuss the return on experience of decentralisation in other fields of action of local policies, notably urban planning and spatial planning

  12. IFRI's notebooks. Energy, development and security

    International Nuclear Information System (INIS)

    Finon, D.; Jacquet, P.

    1999-01-01

    Today, the concept of energy security has been greatly modified by the worldwide trade, the markets deregulation, the technical progress and the nuclear contestation. This notebook is the synthesis of a colloquium jointly organized in December 16, 1997 by the IFRI and the Institute of Economy and Energy Policy (IEPE) with the sustain of the French delegation of strategic affairs of the defense ministry. It analyzes the evolution of energy markets at the year 2030 prospects and stresses on the role of Middle-East and on the stakes of the economical development and energy policy of China. Finally, it treats of the goals and modalities of the French and European energy policies. (J.S.)

  13. Countries in transition and the developing countries in the negotiation on the climatic change. Stakes of the Kyoto conference; Les pays en transition et les pays en developpement dans la negociation sur le changement climatique. Les enjeux de la conference de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Blanchard, O; Cavard, D; Faudry, D; Girod, J; Menanteau, P; Viguier, L

    1997-10-01

    This document presents the positions of the countries in transition and the developing countries in the phase of the negotiations on the climatic change between 1994 and 1997, then takes stock on the pilot phase of the actions of the associated implementation. The negotiations stakes and the frame of the discussions are also presented. (A.L.B.)

  14. Marine renewable energies. Stakes and technical solutions

    International Nuclear Information System (INIS)

    Lacroix, Olivier; Macadre, Laura-Mae

    2012-05-01

    Marine renewable energies are able to supply carbon free energy from various ocean resources (tides, waves, currents, winds, salinity and temperature gradients). This sector, currently at an early stage of deployment, has good prospects of development in the coming years. ENEA releases a report on marine renewable energies giving a transversal vision of the associated stakes and prospects of development. Technical and economic characteristics, maturity level and specificities of each marine energy are analyzed. French and European sources of funding, regulatory framework and potential environmental and social impacts are also reported

  15. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Science.gov (United States)

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-01-01

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358

  16. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    Directory of Open Access Journals (Sweden)

    Muhammad Awais Javed

    2016-06-01

    Full Text Available Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  17. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.

    Science.gov (United States)

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-06-15

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  18. The US proliferation security initiative (PSI)

    International Nuclear Information System (INIS)

    Gregoire, B.

    2004-01-01

    The proliferation security initiative (PSI), launched by President Bush on May 31, 2003, aims at intercepting any transfer of mass destruction weapons, of their vectors and related equipments, towards or coming from countries or organizations suspected to have a proliferation activity. This initiative, which involves coercive means to fight against proliferation, raises international lawfulness and legal questions, the answers of which are today under construction. This article analyzes the place of the European Union in the PSI, the action means (optimization of existing means, cooperation between intelligence and interception services), and the PSI stakes (lawfulness with respect to the international law, bilateral agreements, draft boarding agreement, sustain of the United Nations, widening of the partnership and of the field of action). (J.S.)

  19. The Mediating Role of Textbooks in High-Stakes Assessment Reform

    Science.gov (United States)

    Leung, Ching Yin; Andrews, Stephen

    2012-01-01

    Whenever high-stakes assessment/curriculum reforms take place, new textbooks appear on the market. These textbooks inevitably play a significant mediating role in the implementation of any reform and on teaching and learning. This paper reports on a small-scale study which attempts to investigate the role of textbooks in the mediation of a…

  20. The Effects of High-Stakes Testing Policy on Arts Education

    Science.gov (United States)

    Baker, Richard A., Jr.

    2012-01-01

    This study examined high-stakes test scores for 37,222 eighth grade students enrolled in music and/or visual arts classes and those students not enrolled in arts courses. Students enrolled in music had significantly higher mean scores than those not enrolled in music (p less than 0.001). Results for visual arts and dual arts were not as…

  1. Curricular constraints, high-stakes testing and the reality of reform in high school science classrooms

    Science.gov (United States)

    Coble, Jennifer

    Through a series of open-ended interviews, this study investigated the beliefs of six third year high school science teachers about how they implement science education reform ideals in their practice and the contextual challenges they face as they attempt to implement reform. The teachers argue that the lack of connection between their curricula and students' lives serves as a significant obstacle to them utilizing more inquiry-based and student-centered strategies. In their science classes that are not subject to a high stakes exam, the teachers shared instances where they engage students in inquiry by refraining the focus of their curricula away from the decontextualized factual information and onto how the information relates to human experience. In their science classes subject to a high stakes test, however, the teachers confessed to feeling no choice but to utilize more teacher-centered strategies focused on information transmission. This study provides an in depth analysis of how the presence of high stakes tests discourages teachers from utilizing reform based teaching strategies within high school science classrooms.

  2. Risk preferences over small stakes: Evidence from deductible choice

    OpenAIRE

    Janko Gorter; Paul Schilp

    2012-01-01

    This paper provides new field evidence on risk preferences over small stakes. Using unique population and survey data on deductible choice in Dutch universal health insurance, we find that risk preferences are a dominant factor in decision aking. In fact, our results indicate that risk preferences are both statistically and quantitatively more significant in explaining deductible choice behavior than risk type. This finding contrasts with classical expected utility theory, as it implies risk ...

  3. Social stakes of the reversibility in the deep storage of high level radioactive wastes

    International Nuclear Information System (INIS)

    Heriard-Dubreuil, G.; Schieber, C.; Schneider, T.

    1998-06-01

    This document proposes a study of the conditions which surrounded the reversibility introduction in high activity wastes deep storage at an international scale, as well as a reflexion on the social stakes associated there. In France, the law of december 30, 1991 concerning the research on the radioactive wastes prescribes '' the study of possibilities retrieval or non retrieval storage in deep geological deposits''. The analysis of the reversibility associated social stakes emphasizes the necessity to prevent irreversible consequences, to take care to the choices reversibility, to preserve the future generations autonomy. Thus to elaborate a more satisfactory solution between deep disposal and surface storage, a deep storage, capable of gradually evolution, concept is defined. (A.L.B.)

  4. The stakes of radiation protection: introduction

    International Nuclear Information System (INIS)

    Cordoliani, Y.S.

    2005-01-01

    The benefit/risk ratio of radiological examinations, particularly with the multi-cut scanner, can be insured only if the justification and optimization principles are respected. the justification stands on the reference to the guide of good practice of imaging examinations and the respect of the public health code that imposes an exchange of written information between the requester and the achiever. The optimization stands on the dosimetry evaluation of his practice and the comparison with the diagnosis reference levels, to realize the examinations at the lowest radiological cost. The stakes are the certainty not to be harmful for the patient, the rehabilitation of the radiologist in his consultant part rather than in this performer one and the protection against eventual legal consequences. (N.C.)

  5. Climate change: which stakes? Stakes of climate change. Man and the trajectory of the Earth ship

    International Nuclear Information System (INIS)

    Bramy, Herve; Rogalski, Michel; Sachs, Ignacy

    2011-12-01

    A first article recalls what the greenhouse effect is, outlines that the increase of CO 2 concentration due to human activity is indisputable, that the future of the Kyoto Protocol remains hypothetical, that evolving towards a new development mode is a crucial necessity. It also addresses the issue of financing this struggle against climate change, and outlines the importance of international negotiations. A second article outlines the stakes of climate change, notably by referring to the different international summits and to the associated issues (commitments of most countries, technology transfers, and so on). The third article comments the entry into the Anthropocene as a disruption for the joint evolution of mankind and biosphere. The author outlines the need of a new planning for development, and briefly discusses the question of energies

  6. How much is our fairness worth? The effect of raising stakes on offers by Proposers and minimum acceptable offers in Dictator and Ultimatum Games.

    Directory of Open Access Journals (Sweden)

    Julie Novakova

    Full Text Available BACKGROUND: The aim of this study was to determine whether people respond differently to low and high stakes in Dictator and Ultimatum Games. We assumed that if we raised the stakes high enough, we would observe more self-orientated behavior because fairness would become too costly, in spite of a possible risk of a higher punishment. METHODS: A questionnaire was completed by a sample of 524 university students of biology. A mixed linear model was used to test the relation between the amount at stake (CZK 20, 200, 2,000, 20,000 and 200,000, i.e., approximately $1-$10,000 and the shares, as well as the subjects' gender and the design of the study (single vs. multiple games for different amounts. RESULTS: We have discovered a significant relationship between the amount at stake and the minimum acceptable offer in the Ultimatum Game and the proposed shares in both Ultimatum and Dictator Games (p = 0.001, p<0.001, p = 0.0034. The difference between playing a single game or more games with several amounts at stake did not influence the relation between the stakes and the offered and minimum acceptable shares. Women proved significantly more generous than men in their offers in the Dictator Game (p = 0.007. CONCLUSION: Our results suggest that people's behavior in the Dictator and Ultimatum Games depends on the amount at stake. The players tended to lower their relative proposed shares, as well as their relative minimum acceptable offers. We propose that the Responders' sense of equity and fair play depends on the stakes because of the costs of maintaining fairness. However, our results also suggest that the price of fairness is very high and that it is very difficult, probably even impossible, to buy the transition of Homo sociologicus into Homo economicus.

  7. Design and fabrication hazard stakes golf course polymeric foam material empty bunch (EFB) fiber reinforced

    Science.gov (United States)

    Zulfahmi; Syam, B.; Wirjosentono, B.

    2018-02-01

    A golf course with obstacles in the forms of water obstacle and lateral water obstacle marked with the stakes which are called golf course obstacle stake in this study. This study focused on the design and fabrication of the golf course obstacle stake with a solid cylindrical geometry using EFB fiber-reinforced polimeric foam composite materials. To obtain the EFB fiber which is free from fat content and other elements, EFB is soaked in the water with 1% (of the watre total volume) NaOH. The model of the mould designed is permanent mould that can be used for the further refabrication process. The mould was designed based on resin-compound paste materials with talc powder plus E-glass fiber to make the mould strong. The composition of polimeric foam materials comprised unsaturated resin Bqtn-Ex 157 (70%), blowing agent (10%), fiber (10%), and catalyst (10%). The process of casting the polimeric foam composit materials into the mould cavity should be at vertical casting position, accurate interval time of material stirring, and periodical casting. To find out the strength value of the golf course obstacle stake product, a model was made and simulated by using the software of Ansys workbench 14.0, an impact loading was given at the height of 400 mm and 460 mm with the variation of golf ball speed (USGA standard) v = 18 m/s, v = 35 m/s, v = 66.2 m/s, v = 70 m/s, and v = 78.2 m/s. The clarification showed that the biggest dynamic explicit loading impact of Fmax = 142.5 N at the height of 460 mm with the maximum golf ball speed of 78.2 m/s did not experience the hysteresis effect and inertia effect. The largest deformation area occurred at the golf ball speed v = 66.2 mm/s, that is 18.029 mm (time: 2.5514e-004) was only concentrated around the sectional area of contact point of impact, meaning that the golf course obstacle stakes made of EFB fiber-reinforced polymeric foam materials have the geometric functional strength that are able to absorb the energy of golf ball

  8. Communication des organisations, territoires et TIC au cœur du changement et du développement durable

    OpenAIRE

    Debos , Franck; BOILLOT , F

    2014-01-01

    Il s'agit d'une réflexion issue des travaux de recherche d'une des axes du laboratoire I3M; Notre point de départ est que l’organisation, – entreprises, collectivités, ONG, institution territoriale, etc.—, tend à se revendiquer écocitoyenne, ce qui sous-tend qu’elle s’arroge un rôle d’animateur de territoire, facteur d’innovation et de changement dans le domaine public, professionnel mais aussi privé (De Backer, 1998 ; Cohen-Bacrie, 2006). Dans un contexte de crises économiques répétitives de...

  9. Teacher and headmaster attitudes towards benchmarking and high-stakes testing in adult teaching in Denmark

    DEFF Research Database (Denmark)

    Petersen, Karen Bjerg

    Based on research, surveys and interviews the paper traces teacher and headmaster attitudes towards the introduction of benchmarking and high-stakes language testing introduced in the wake of a neo-liberal education policy in adult teaching for migrants in Denmark in the 2000s. The findings show...... students, reduced use of both project work and non test related activities and stressful working conditions....... that the majority of teachers and headmasters reject benchmarking. Meanwhile, due to both headmasters and language teachers the introduction of high stakes language testing has had an immense impact on the organization, content and quality of adult language teaching. On the one side teachers do not necessarily...

  10. Cyberspace Security Econometrics System (CSES) - U.S. Copyright TXu 1-901-039

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Schlicher, Bob G [ORNL; Sheldon, Frederick T [ORNL; Lantz, Margaret W [ORNL; Hauser, Katie R [ORNL

    2014-01-01

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. The Cyberspace Security Econometrics System (CSES) provides a measure (i.e., a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement. The basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings contained in this copyright.

  11. High-Stakes and Non-Stakes Testing States and the Transfer of Knowledge to Students' Advanced Placement Test, Advanced Placement U.S. History Test, and SAT Exam Scores

    Science.gov (United States)

    Lessler, Karen Jean

    2010-01-01

    The Federal education policy No Child Left Behind Act (NCLB) has initiated high-stakes testing among U.S. public schools. The premise of the NCLB initiative is that all students reach proficiency in reading and math by 2014. Under NCLB, individual state education departments were required to implement annual assessments in grades two through eight…

  12. Pharmacy students' test-taking motivation-effort on a low-stakes standardized test.

    Science.gov (United States)

    Waskiewicz, Rhonda A

    2011-04-11

    To measure third-year pharmacy students' level of motivation while completing the Pharmacy Curriculum Outcomes Assessment (PCOA) administered as a low-stakes test to better understand use of the PCOA as a measure of student content knowledge. Student motivation was manipulated through an incentive (ie, personal letter from the dean) and a process of statistical motivation filtering. Data were analyzed to determine any differences between the experimental and control groups in PCOA test performance, motivation to perform well, and test performance after filtering for low motivation-effort. Incentivizing students diminished the need for filtering PCOA scores for low effort. Where filtering was used, performance scores improved, providing a more realistic measure of aggregate student performance. To ensure that PCOA scores are an accurate reflection of student knowledge, incentivizing and/or filtering for low motivation-effort among pharmacy students should be considered fundamental best practice when the PCOA is administered as a low-stakes test.

  13. Commission on Social Security

    CERN Multimedia

    Staff Association

    2010-01-01

    A commission studying past, present, and future social stakes ! For many years we have been hearing about the problems of funding of health insurance benefits in our different Member States. At CERN we are not totally immune from this problem.  To start with, let us recall that we have a mutual-benefit scheme which covers everyone for the consequences of the uncertainties in life (illness and accidents). The rules of our scheme are established by CERN in the framework of a sub-group of the Standing Concertation Committee, the CERN Health Insurance Scheme Board (CHISB), which is also in charge of managing the scheme.  The work of the “ProtSoc” (Protection Sociale – Social Security) commission, as we like to call it at the Staff Association, is to help your representatives on the CHISB, by preparing together with them the subjects and positions to be put forward and defended. This commission, which groups together the staff delegates who wish to invest their ...

  14. The Role of Policy Assumptions in Validating High-stakes Testing Programs.

    Science.gov (United States)

    Kane, Michael

    L. Cronbach has made the point that for validity arguments to be convincing to diverse audiences, they need to be based on assumptions that are credible to these audiences. The interpretations and uses of high stakes test scores rely on a number of policy assumptions about what should be taught in schools, and more specifically, about the content…

  15. Impact des changements climatiques sur l’agriculture dans la plaine de Jeffara sud-est tunisien

    Directory of Open Access Journals (Sweden)

    Houcine Jeder

    2013-12-01

    Full Text Available Cette étude évalue la vulnérabilité de l’agriculture dans la plaine de Jeffera sud-est tunisien aux changements climatiques en utilisant la méthode Ricardienne. Cette méthode consiste à exprimer les revenus nets agricoles en fonction des variables climatiques, édaphiques et socio-économiques. Ces modèles ricardiens ont été testés sur la base des données d’une enquête réalisée dans le cadre de projet de développement dans la plaine Jeffera pour la compagne agricole 2002-2003.  Ces modèles ont permis d’exprimer d’une part la relation qui existe entre le revenu agricole et les variables climatiques (température et précipitation et d’autre part, d’analyser la sensibilité des revenus agricoles par rapport à ces variables climatiques. Des simulations ont été faites sur la base de scenario A2 résultat de la projection faite par le modèle HadCM3 à l’échelle nationale et régionale de la Tunisie.Les résultats de l’étude ont montré que la relation entre le revenu agricole et le climat est non linéaire. De même, les effets négatifs de certaines options d’adaptation ont montré que  l’agriculture dans la plaine de Jeffera est une agriculture paysanne basée sur le travail familial qui nécessite aujourd’hui un capital financier important et une marge de modernisation afin d’améliorer l’activité agricole dans les années futures. Tandis que les effets positifs de certaines autres options peuvent être servir comme des points de réflexion dans l’élaboration des stratégies d’adaptation aux changements climatiques comme l’utilisation des nouvelles technologies d’irrigation et l’intégration de l’activité de l’élevage dans l’exploitation agricole.

  16. Design Optimization and Fatigue Analysis of Laser Stake Welded Connections

    Science.gov (United States)

    2008-06-01

    is ultimately envisioned that laser welding will be as common in the shipyard as other processes such -- as MIG, TIG and SMAW. Laser stake- welding of...input from conventional welding techniques can be detrimental to the polymer matrix composite material. In comparison, the laser welding process allows...more discrete frequencies. In the laser welding process , the photons are targeted on the work piece surface which needs to be welded . Highly

  17. T-Pattern Analysis and Cognitive Load Manipulation to Detect Low-Stake Lies: An Exploratory Study.

    Science.gov (United States)

    Diana, Barbara; Zurloni, Valentino; Elia, Massimiliano; Cavalera, Cesare; Realdon, Olivia; Jonsson, Gudberg K; Anguera, M Teresa

    2018-01-01

    Deception has evolved to become a fundamental aspect of human interaction. Despite the prolonged efforts in many disciplines, there has been no definite finding of a univocally "deceptive" signal. This work proposes an approach to deception detection combining cognitive load manipulation and T-pattern methodology with the objective of: (a) testing the efficacy of dual task-procedure in enhancing differences between truth tellers and liars in a low-stakes situation; (b) exploring the efficacy of T-pattern methodology in discriminating truthful reports from deceitful ones in a low-stakes situation; (c) setting the experimental design and procedure for following research. We manipulated cognitive load to enhance differences between truth tellers and liars, because of the low-stakes lies involved in our experiment. We conducted an experimental study with a convenience sample of 40 students. We carried out a first analysis on the behaviors' frequencies coded through the observation software, using SPSS (22). The aim was to describe shape and characteristics of behavior's distributions and explore differences between groups. Datasets were then analyzed with Theme 6.0 software which detects repeated patterns (T-patterns) of coded events (non-verbal behaviors) that regularly or irregularly occur within a period of observation. A descriptive analysis on T-pattern frequencies was carried out to explore differences between groups. An in-depth analysis on more complex patterns was performed to get qualitative information on the behavior structure expressed by the participants. Results show that the dual-task procedure enhances differences observed between liars and truth tellers with T-pattern methodology; moreover, T-pattern detection reveals a higher variety and complexity of behavior in truth tellers than in liars. These findings support the combination of cognitive load manipulation and T-pattern methodology for deception detection in low-stakes situations, suggesting the

  18. T-Pattern Analysis and Cognitive Load Manipulation to Detect Low-Stake Lies: An Exploratory Study

    Directory of Open Access Journals (Sweden)

    Barbara Diana

    2018-03-01

    Full Text Available Deception has evolved to become a fundamental aspect of human interaction. Despite the prolonged efforts in many disciplines, there has been no definite finding of a univocally “deceptive” signal. This work proposes an approach to deception detection combining cognitive load manipulation and T-pattern methodology with the objective of: (a testing the efficacy of dual task-procedure in enhancing differences between truth tellers and liars in a low-stakes situation; (b exploring the efficacy of T-pattern methodology in discriminating truthful reports from deceitful ones in a low-stakes situation; (c setting the experimental design and procedure for following research. We manipulated cognitive load to enhance differences between truth tellers and liars, because of the low-stakes lies involved in our experiment. We conducted an experimental study with a convenience sample of 40 students. We carried out a first analysis on the behaviors’ frequencies coded through the observation software, using SPSS (22. The aim was to describe shape and characteristics of behavior’s distributions and explore differences between groups. Datasets were then analyzed with Theme 6.0 software which detects repeated patterns (T-patterns of coded events (non-verbal behaviors that regularly or irregularly occur within a period of observation. A descriptive analysis on T-pattern frequencies was carried out to explore differences between groups. An in-depth analysis on more complex patterns was performed to get qualitative information on the behavior structure expressed by the participants. Results show that the dual-task procedure enhances differences observed between liars and truth tellers with T-pattern methodology; moreover, T-pattern detection reveals a higher variety and complexity of behavior in truth tellers than in liars. These findings support the combination of cognitive load manipulation and T-pattern methodology for deception detection in low-stakes

  19. What can Iran gain by having a nuclear weapons program that threatens to destabilize security in the Middle East?

    DEFF Research Database (Denmark)

    Nielsen, Thomas Galasz

    and a lot of neigh- bouring countries fear such a development for security reasons. But why is Iran following a nuclear path that may further destabilise the fragile security situation in the Middle East? It is to do with Iran’s own perception of security risks, its desire for greatness in the region......- bination with its important strategic location by the Strait of Hormuz, and supports various political groupings in and around Syria and Iraq to attract the attention of the United States of American in an attempt to become recognised as the most important player in the Middle East. Should Iran succeed...... in its brinkmanship and the outcome could be the lifting of the UN sanctions, international recognition, improved security, and even a possible end to internal political power struggles due to likely economic reforms post-sanctions. Much is at stake for Iran, but, if it succeeds, it could shift...

  20. High School Students with Learning Disabilities: Mathematics Instruction, Study Skills, and High Stakes Tests

    Science.gov (United States)

    Steele, Marcee M.

    2010-01-01

    This article reviews characteristics of high school students with learning disabilities and presents instructional modifications and study skills to help them succeed in algebra and geometry courses and on high stakes mathematics assessments.

  1. Emotion at Stake—The Role of Stake Size and Emotions in a Power-to-Take Game Experiment in China with a Comparison to Europe

    Directory of Open Access Journals (Sweden)

    Ronald Bosman

    2017-03-01

    Full Text Available This paper experimentally investigates how monetary incentives and emotions influence behavior in a two-player power-to-take game (PTTG. In this game, one player can claim any part of the other's endowment (take rate, and the second player can respond by destroying any part of his or her own endowment. The experiment is run in China. We further compare our findings with the behavior of two European subject pools. Our results give new insights regarding emotion regulation. Even though stake size does not appear to matter for take rates and destruction rates, it does matter for the reaction function of the responder regarding the take rate. When stakes are high, there is less destruction for low and intermediate take rates, and more destruction for high take rates, compared to relatively low stakes. Under low incentives, ‘hot’ anger-type emotions are important for destruction, while ‘cool’ contempt becomes prominent under high monetary incentives. These results suggest emotion regulation in the high-stake condition. Moreover, emotions are found to fully mediate the impact of the take rate on destruction when stakes are low, whereas they only partially do so if stakes are high. Comparing the low-stakes data for China with existing European data, we find similarities in behavior, emotions and emotion intensities, as well as the full mediation of the take rate by emotions. We find some differences related to the type of emotions that are important for destruction. Whereas anger and joy are important in both, in addition, irritation and fear play a role in China, while this holds for contempt in the EU.

  2. Caucasus and the petroleum stakes of Caspian Sea

    International Nuclear Information System (INIS)

    Jalillosoltan, N.

    2001-01-01

    The splitting of the former USSR block in 1991 has generated a shock wave in the Caucasus area with the will of all ex-soviet republics to reach their complete independence. Because of the historical and geographical complexity of Caucasus, both geopolitical and human, this disorder has generated even more hazardous results, enhanced by the coveted oil and gas reserves of the Caspian Sea. This article analyses the petroleum stakes as factors of rivalry and instability (sovereignty of oil and gas fields, rivalries about the exploitation and transport of hydrocarbons), but also as factors of cooperation and re-composition. (J.S.)

  3. Social Perception of Hydrogen Technologies: The View of Spanish Stake holders

    International Nuclear Information System (INIS)

    Ferri Anglada, S.

    2013-01-01

    This technical report presents an overview of the social perception and vision of a sample of Spanish stake holders on hydrogen technologies. The study is based on the implementation of a survey, combining both quantitative and qualitative data. An ad hoc electronic survey was design to collect views and perceptions on several key factors regarding this innovative energy alternative. The group of experts participating (N=130) in the study, comes mainly from research centers, universities and private companies. The survey addresses three major themes: expert views, social acceptability, and contextual factors of hydrogen technologies. The aim is to capture both the current and the future scene as viewed by the experts on hydrogen technologies, identifying key factors in terms of changes, uncertainties, obstacles and opportunities. The objective is to identify potential key features for the introduction, development, promotion, implementation, and large-scale deployment of a highly successful energy proposal in countries such as Iceland, one of the pioneers in base its economy on hydrogen technologies. To conclude, this report illustrates the positive engagement of a sample of Spanish stake holders towards hydrogen technologies that may prove vital in the transition towards the Hydrogen Economy in Spain. (Author)

  4. Game theoretic analysis of congestion, safety and security traffic and transportation theory

    CERN Document Server

    Zhuang, Jun

    2015-01-01

    Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements in traffic and transportation theory, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analyzing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways – this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security. Addressing the multiple actors who may hold different concerns regarding system reliability; e.g. one or several terrorists, a government, various local or regional government agencies, or others with stakes for or against system reliability, this book describes how ...

  5. Effect of Staking and Pruning on the Growth and Yield of Cucumber ...

    African Journals Online (AJOL)

    A field trial was conducted to evaluate the effect of pruning and staking on the vegetative growth and yield of cucumber ( Cucumis sativus L.). The experiment was a 3 x 2 factorial laid out in Randomized Complete Block Design (RCBD) with five replications. The results showed that vine length, number of flowers, total ...

  6. The nuclear: energy and environmental stakes and political and strategic context

    International Nuclear Information System (INIS)

    Lauvergeon, A.

    2003-01-01

    This document mentions the intervention of Anne Lauvergeon, at the colloquium Adapes, ''the nuclear: energy and environmental stakes and political and geo-strategic context''. Anne Lauvergeon is president of the Areva board. This speech takes stock on the energy resources and demand facing the economic development in a context of an environmental quality and especially the part of the nuclear energy in the future. (A.L.B.)

  7. Security and privacy in cyber-physical systems foundations, principles, and applications

    CERN Document Server

    Song, Houbing; Jeschke, Sabina

    2017-01-01

    Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today's simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovat...

  8. The many facets of climate change - Conference proceedings; Les multiples facettes du changement climatique - Recueil des presentations

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-03-15

    This conference day on climate change was organized by the French meteorological society (SMF) at the Ecole Normale Superieure of Paris. This document brings together the available presentations given at the conference. Eight presentations (slides) are compiled in this document and deal with: 1 - Climate change today and tomorrow, the research stakes (Herve Le Treut, IPSL); 2 - Rise of sea levels: estimations and regional variability (Guy Woeppelmann, La Rochelle Univ.); 3 - Polar ice caps and continental cryo-sphere as seen from space (A. Kouraev, F. Remy, E. Berthier, LEGOS); 4 - Impacts of climate change on exploited marine populations: projections and uncertainties (Patrick Lehodey, CLS); 5 - Climate change stakes on agricultural and winery activities in France (Eric Duchene, INRA); 6 - Impacts of climate change on forest trees phenology and their consequences on trees life and survival (Francois Lebourgeois, ENGREF); 7 - Remote-epidemiology: a health-aid in a climate change context (Murielle Lafaye, CNES); 8 - Socio-economic aspects and adaptation: a climate history, for what? (Emmanuel Garnier, Caen Univ.)

  9. Students' Attitudes toward High-Stakes Testing and Its Effect on Educational Decisions

    Science.gov (United States)

    Moran, Aldo Alfredo

    2010-01-01

    With the recent increase in accountability due to No Child Left Behind, graduation rates and drop-out rates are important indicators of how well a school district is performing. High-stakes testing scores are at the forefront of a school's success and recognition as a school that is preparing and graduating students to meet society's challenging…

  10. Des stratégies de changement dans les organisations internationales : une analyse comparée du HCR et de l’OIT

    OpenAIRE

    Louis, Marieke; Maertens, Lucile

    2014-01-01

    Partant d’une comparaison inédite entre le Haut Commissariat des Nations Unies pour les réfugiés (HCR) et l’Organisation internationale du travail (OIT), cet article suggère de revisiter la problématique du changement dans les organisations internationales en montrant, dans une perspective de sociologie des relations internationales, l’existence d’un continuum de stratégies organisationnelles mises en place par ces dernières pour légitimer leur existence et leur action, stratégies allant de l...

  11. Improving computer security by health smart card.

    Science.gov (United States)

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual

  12. Selfish play increases during high-stakes NBA games and is rewarded with more lucrative contracts.

    Science.gov (United States)

    Uhlmann, Eric Luis; Barnes, Christopher M

    2014-01-01

    High-stakes team competitions can present a social dilemma in which participants must choose between concentrating on their personal performance and assisting teammates as a means of achieving group objectives. We find that despite the seemingly strong group incentive to win the NBA title, cooperative play actually diminishes during playoff games, negatively affecting team performance. Thus team cooperation decreases in the very high stakes contexts in which it is most important to perform well together. Highlighting the mixed incentives that underlie selfish play, personal scoring is rewarded with more lucrative future contracts, whereas assisting teammates to score is associated with reduced pay due to lost opportunities for personal scoring. A combination of misaligned incentives and psychological biases in performance evaluation bring out the "I" in "team" when cooperation is most critical.

  13. Selfish play increases during high-stakes NBA games and is rewarded with more lucrative contracts.

    Directory of Open Access Journals (Sweden)

    Eric Luis Uhlmann

    Full Text Available High-stakes team competitions can present a social dilemma in which participants must choose between concentrating on their personal performance and assisting teammates as a means of achieving group objectives. We find that despite the seemingly strong group incentive to win the NBA title, cooperative play actually diminishes during playoff games, negatively affecting team performance. Thus team cooperation decreases in the very high stakes contexts in which it is most important to perform well together. Highlighting the mixed incentives that underlie selfish play, personal scoring is rewarded with more lucrative future contracts, whereas assisting teammates to score is associated with reduced pay due to lost opportunities for personal scoring. A combination of misaligned incentives and psychological biases in performance evaluation bring out the "I" in "team" when cooperation is most critical.

  14. Is the Physical Being Taken out of Physical Education? On the Possible Effects of High-Stakes Testing on an Embattled Profession's Curriculum Goals

    Science.gov (United States)

    Seymour, Clancy; Garrison, Mark

    2015-01-01

    Building on recent discussions regarding how current national standards for physical education promote cognitive outcomes over physical outcomes, the authors explore how a new era in high-stakes testing is also contributing to an emphasis on the cognitive, over the physical. While high-stakes testing has been linked to reducing the amount of…

  15. Figuring out How to Be a Teacher in a High-Stakes Context: A Case Study of First-Year Teachers' Conceptual and Practical Development

    Science.gov (United States)

    Brown, Christopher P.; Bay-Borelli, Debra E.; Scott, Jill

    2015-01-01

    High-stakes education reforms across the United States and the globe continue to alter the landscape of teaching and teacher education. One key but understudied aspect of this reform process is the experiences of first-year teachers, particularly those who participated in these high-stakes education systems as students and as a…

  16. Outline of surface mass balance at Dome Fuji, East Antarctica, by the stake method from 1995 to 2006

    Directory of Open Access Journals (Sweden)

    Takao Kameda

    2008-06-01

    Full Text Available This paper describes observational results of surface mass balance (SMB at Dome Fuji (77°19'01″S, 39°42'11″E; 3810m a.s.l., East Antarctica from 1995 to 2006. The SMB was estimated using 36 bamboo stakes (grid of 6×6, placed at 20m intervals. The heights of the stake tops from the snow surface were measured at 0.5cm resolution twice monthly in 1995, 1996, 1997, and 2003, and once a year for the rest of the study period. The annual SMB from 1995 to 2006 at Dome Fuji was 27.3±1.5kgm^a^. This result agrees well with the annual SMB from AD 1260 to 1993 (26.4kgm^a^, estimated from volcanic signals in the Dome Fuji ice core. From 1995 to 2006, there were 37 incidences of negative or zero annual SMB, which was 8.6%. Compared with similar studies at Vostok, South Pole and Dome C, we found that a site with SMB over 190kgm^a^ is expected to have annual snow accumulation at the 95% confidence level. Sites from 1500 to 2500m above sea level fit the criteria on the Antarctic ice sheet. According to stake and snow pit observations at Vostok, we estimated that the probability of an annual layer missing (hiatus at Dome Fuji under present-day and glacial conditions are 9.4% and 11.4%, respectively. Variations of SMB measured by 36-stakes for 12 years were also analyzed.

  17. The Complex and Unequal Impact of High Stakes Accountability on Untested Social Studies

    Science.gov (United States)

    Pace, Judith L.

    2011-01-01

    This article contributes to research on the impact of high stakes accountability on social studies teaching where it is "not" tested by the state, and addresses the question of what is happening in middle and higher performing versus struggling schools (Wills, 2007). The author presents complex findings from a qualitative study in five…

  18. The Disproportionate Erosion of Local Control: Urban School Boards, High-Stakes Accountability, and Democracy

    Science.gov (United States)

    Trujillo, Tina M.

    2013-01-01

    This case study of an urban school board's experiences under high-stakes accountability demonstrates how the district leaders eschewed democratic governance processes in favor of autocratic behaviors. They possessed narrowly defined goals for teaching and learning that emphasized competitive, individualized means of achievement. Their decision…

  19. The stakes of iraqi petroleum: what is the role of France ?

    International Nuclear Information System (INIS)

    Sarkis, N.

    1995-01-01

    This work deals with some socio-economic and political aspects about the stakes of iraqi petroleum for France. After having described the history of iraqi petroleum, the author gives the estimation of the actual petroleum reserves, the production objective, the petroleum and gaseous projects and the exporting way. Then is given the economic and political role played by France: the increase of importation uses, the economic interests and the political responsibility. (O.L.). 10 tabs

  20. Competing with peers: mentalizing-related brain activity reflects what is at stake.

    Science.gov (United States)

    Halko, Marja-Liisa; Hlushchuk, Yevhen; Hari, Riitta; Schürmann, Martin

    2009-06-01

    Competition imposes constraints for humans who make decisions. Concomitantly, people do not only maximize their personal profit but they also try to punish unfair conspecifics. In bargaining games, subjects typically accept equal-share offers but reject unduly small offers; competition affects this balance. Here we used functional magnetic resonance imaging (fMRI) to study adjustment to competition in a bargaining game where subjects competed against another person for a share of the stake. For medium-sized, but not for minimum offers, competition increased the likelihood of acceptance and thus shifted behavior towards maximizing personal profits, emphasizing the importance of financial incentives. Specifically for medium-sized offers, competition was associated with increased brain activation bilaterally in the temporo-parietal junction, a region associated with mentalizing. In the right inferior frontal region, competition-related brain activation was strongest in subjects whose high acceptance rates in the standard ultimatum game hinted at a profit-oriented approach. The results suggest a network of brain areas supporting decision making under competition, with incentive-dependent mentalizing engaged when the competitor's behavior is difficult to predict and when the stake is attractive enough to justify the effort.

  1. Achievement goal orientation and situational motivation for a low-stakes test of content knowledge.

    Science.gov (United States)

    Waskiewicz, Rhonda A

    2012-05-10

    To determine the extent of the relationship between students' inherent motivation to achieve in a doctor of pharmacy program and their motivation to achieve on a single low-stakes test of content knowledge. The Attitude Toward Learning Questionnaire (ATL) was administered to 66 third-year pharmacy students at the beginning of the spring 2011 semester, and the Student Opinion Scale (SOS) was administered to the same group immediately following completion of the Pharmacy Curricular Outcomes Assessment (PCOA). Significant differences were found in performance approach and work avoidance based on situational motivation scores. Situational motivation was also found to be directly correlated with performance and mastery approaches and inversely correlated with work avoidance. Criteria were met for predicting importance and effort from performance and mastery approaches and work avoidance scores of pharmacy students. The ability to predict pharmacy students' motivation to perform on a low-stakes standardized test of content knowledge increases the test's usefulness as a measure of curricular effectiveness.

  2. Perceptions of industrial and nuclear risks. Stakes, negotiations and social development of levels of risk acceptance; Perceptions des risques industriels et nucleaires: enjeux, negociations et construction sociale des seuils d'acception des risques

    Energy Technology Data Exchange (ETDEWEB)

    Bernier, S.Ch

    2007-11-15

    In this thesis we will question the perceptions of industrial risks in the occidental world at the beginning of the 21. century. For this purpose we will try to understand how concepts such as sustainable development, precautionary principle, liability, or even zero-risk bias have progressively developed around a thought model based on the scientific rationality. This model is now undermined by its incapacity to fully address the issues it raises and completely avoid the potential risks. However, despite consistent weaknesses, it remains a reference value moulded by past accidents which have led to the making of laws aiming mainly at defining liability and protecting those who are held liable. Thus, public information becomes a requirement for democracy and the protection of this thought model. In this context, the protagonists at stake are security-conscious, economical and political lobbies that constantly redefine the limits of risk acceptance. We come to the realization that our lifestyle and value system remain unchallenged even though undergoing a crisis. The specificity of this research lies into the importance we give to the local approach, dealing with registered Seveso sites and nuclear plants located in Indre et Loire. We have polled five categories of respondents through interviews or questionnaires in order to understand their opinion regarding situations involving technological risks. The result of this survey helps us understand and set the levels of risk acceptance that they define with regard to the industrial risks and show the complexity of a situation involving political stakes, environmental pressures, a profit-driven economy and security constraints, in a vague and complex context. This work gives us a contrasted picture of today's perceptions of risks. (author)

  3. Game theoretic analysis of congestion, safety and security networks, air traffic and emergency departments

    CERN Document Server

    Zhuang, Jun

    2015-01-01

    Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments, this volume focuses on congestion in systems where safety and security are at stake, devoting special attention to applying game theoretic analysis of congestion to: protocols in wired and wireless networks; power generation, air transportation and emergency department overcrowding. Reviewing exhaustively the key recent research into the interactions between game theory, excessive crowding, and safety and security elements, this book establishes a new research angle by illustrating linkages between the different research approaches and serves to lay the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analyzing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both way...

  4. Philosophical Questions about Teaching Philosophy: What's at Stake in High School Philosophy Education?

    Science.gov (United States)

    Norris, Trevor

    2015-01-01

    What is at stake in high school philosophy education, and why? Why is it a good idea to teach philosophy at this level? This essay seeks to address some issues that arose in revising the Ontario grade 12 philosophy curriculum documents, significant insights from philosophy teacher education, and some early results of recent research funded by the…

  5. Secure data exchange between intelligent devices and computing centers

    Science.gov (United States)

    Naqvi, Syed; Riguidel, Michel

    2005-03-01

    The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.

  6. Negotiating the Literacy Block: Constructing Spaces for Critical Literacy in a High Stakes Setting

    Science.gov (United States)

    Paugh, Patricia; Carey, Jane; King-Jackson, Valerie; Russell, Shelley

    2007-01-01

    This article focuses on the evolution of the classroom literacy block as a learning space where teachers and students renegotiated activities for independent vocabulary and word work within a high-stakes reform environment. When a second grade classroom teacher and literacy support specialist decided to co-teach, they invited all students in the…

  7. Academically Buoyant Students Are Less Anxious about and Perform Better in High-Stakes Examinations

    Science.gov (United States)

    Putwain, David W.; Daly, Anthony L.; Chamberlain, Suzanne; Sadreddini, Shireen

    2015-01-01

    Background: Prior research has shown that test anxiety is negatively related to academic buoyancy, but it is not known whether test anxiety is an antecedent or outcome of academic buoyancy. Furthermore, it is not known whether academic buoyancy is related to performance on high-stakes examinations. Aims: To test a model specifying reciprocal…

  8. The impact of high-stakes school admission exams on study achievements: quasi-experimental evidence from Slovakia

    Czech Academy of Sciences Publication Activity Database

    Federičová, Miroslava; Münich, Daniel

    2017-01-01

    Roč. 30, č. 4 (2017), s. 1069-1092 ISSN 0933-1433 Institutional support: Progres-Q24 Keywords : high-stakes exams * students’ motivation * achievement Subject RIV: AH - Economics OBOR OECD: Applied Economics , Econometrics Impact factor: 1.136, year: 2016

  9. Examining a Public Montessori School’s Response to the Pressures of High-Stakes Accountability

    Directory of Open Access Journals (Sweden)

    Corrie Rebecca Block

    2015-11-01

    Full Text Available In order to succeed in the current school assessment and accountability era, a public Montessori school is expected to achieve high student scores on standardized assessments. A problem for a public Montessori elementary school is how to make sense of the school’s high-stakes assessment scores in terms of its unique educational approach. This case study examined a public Montessori elementary school’s efforts as the school implemented the Montessori Method within the accountability era. The research revealed the ways the principal, teachers, and parents on the school council modified Montessori practices, curriculum, and assessment procedures based on test scores. A quality Montessori education is designed to offer children opportunities to develop both cognitive skills and affective components such as student motivation and socio-emotional skills that will serve them beyond their public school experiences. Sadly, the high-stakes testing environment influences so much of public education today. When quality education was measured through only one narrow measure of success the result in this school was clearly a restriction of priorities to areas that were easily assessed.

  10. Laser welded steel sandwich panel bridge deck development : finite element analysis and stake weld strength tests.

    Science.gov (United States)

    2009-09-01

    This report summarizes the analysis of laser welded steel sandwich panels for use in bridge structures and : static testing of laser stake welded lap shear coupons. Steel sandwich panels consist of two face sheets : connected by a relatively low-dens...

  11. Billions at stake in climate finance: four key lessons

    Energy Technology Data Exchange (ETDEWEB)

    Newell, Peter [University of East Anglia (United Kingdom); Roberts, J. Timmons [Brown University (United States); Boyd, Emily [University of Leeds (United Kingdom); Huq, Saleemul

    2009-11-15

    How can we break through the impasse on the road to Copenhagen? As the climate talks stall over the size of emissions cuts and who pays for them, it is increasingly clear that funding will be key to breaking the deadlock. Guaranteeing adequate levels of climate finance will be a deal maker or breaker for the poorest nations as the December summit approaches. But on the brink of a new chapter in climate funding, with unprecedented flows at stake, donor countries need to learn from decades of aid experience – mistakes as well as successes. Failure to do this risks wasting a great opportunity to kickstart low-carbon, climate-resilient development for the world's poor.

  12. Dynamique de changement de l’arganeraie entre sur-usage et mutations sociales : une opportunité d’équilibre socio-écologique ?

    Directory of Open Access Journals (Sweden)

    Farid El Wahidi

    2014-12-01

    Full Text Available Detecting and characterizing forest cover change over time is the first step towards the identification of driving forces and understanding their mechanisms. Using remote sensing data and socio-economic surveys, this work tries to understand man-environment interactions in the Haha argan forest (14.7 % of the entire Moroccan argan forest. It consists, in a first step, on detecting and characterizing forest cover changes. The second step seeks to link the estimated change to specific factors from the analysis of traditional land management and demographic, socio-economic dynamics in the study area. The obtained results contribute to clarify the ambiguous speech around the argan forest degradation, at least in the mountain and along the Atlantic band. It implies a small rate of decline in forest area, barely exceeding a rate of 0.2% between 1993 and 2006. As for the stumps density, it almost does not decrease (averaging 0.6 stump/ha between 1984 and 2006. These changes, often subtle, are observed in 96.5% in the common area (mouchaa for free use and not submitted to the traditional land management regulation (agdals set by the local community. The Haha argan forest is experiencing a long-term of ecological dynamic change corollary to a demographic, social and economic dynamics so called favorable to its preservation. Nevertheless, it suffers from a qualitative degradation and a dysfunction of natural processes limiting any restoration dynamic and making questionable the reliability and the sustainability of this agro-ecosystem. Détecter et caractériser les changements du couvert forestier au fil du temps est la première étape vers l'identification des forces motrices et la compréhension de leurs mécanismes. Ce travail consiste, en combinant données de télédétection et enquêtes socio-économiques, à construire une image de l’ensemble des interactions homme-environnement autour de l’arganeraie des Haha (sud-ouest marocain. Il s

  13. Of Mother Tongues and Other Tongues: The Stakes of Linguistically Inclusive Pedagogy in Minority Contexts

    Science.gov (United States)

    Taylor, Lisa K.

    2008-01-01

    This article addresses two key challenges that globalization poses to literacy research: the need for new models of literacy and literacy education, and the stakes of adopting multiliteracies pedagogies in different contexts--that is, the tensions between competing hegemonic discourses of collective identity in the public sphere of ethnolinguistic…

  14. What are the stakes of the hydroelectric power? Supplement: report on the renewable energies

    International Nuclear Information System (INIS)

    2003-01-01

    The document presents the regulation and the stakes concerning the hydroelectricity development in France: contribution to the greenhouse effect fight, the environment preservation, possible uses. It proposes then, a grid of a socio-economical evaluation of the projects. In this framework, the impacts of the little hydroelectric power and the possible corrective measures are described. (A.L.B.)

  15. Modelisation de l'erosion et des sources de pollution dans le bassin versant Iroquois/Blanchette dans un contexte de changements climatiques

    Science.gov (United States)

    Coulibaly, Issa

    Principale source d'approvisionnement en eau potable de la municipalite d'Edmundston, le bassin versant Iroquois/Blanchette est un enjeu capital pour cette derniere, d'ou les efforts constants deployes pour assurer la preservation de la qualite de son eau. A cet effet, plusieurs etudes y ont ete menees. Les plus recentes ont identifie des menaces de pollution de diverses origines dont celles associees aux changements climatiques (e.g. Maaref 2012). Au regard des impacts des modifications climatiques annonces a l'echelle du Nouveau-Brunswick, le bassin versant Iroquois/Blanchette pourrait etre fortement affecte, et cela de diverses facons. Plusieurs scenarios d'impacts sont envisageables, notamment les risques d'inondation, d'erosion et de pollution a travers une augmentation des precipitations et du ruissellement. Face a toutes ces menaces eventuelles, l'objectif de cette etude est d'evaluer les impacts potentiels des changements climatiques sur les risques d'erosion et de pollution a l'echelle du bassin versant Iroquois/Blanchette. Pour ce faire, la version canadienne de l'equation universelle revisee des pertes en sol RUSLE-CAN et le modele hydrologique SWAT ( Soil and Water Assessment Tool) ont ete utilises pour modeliser les risques d'erosion et de pollution au niveau dans la zone d'etude. Les donnees utilisees pour realiser ce travail proviennent de sources diverses et variees (teledetections, pedologiques, topographiques, meteorologiques, etc.). Les simulations ont ete realisees en deux etapes distinctes, d'abord dans les conditions actuelles ou l'annee 2013 a ete choisie comme annee de reference, ensuite en 2025 et 2050. Les resultats obtenus montrent une tendance a la hausse de la production de sediments dans les prochaines annees. La production maximale annuelle augmente de 8,34 % et 8,08 % respectivement en 2025 et 2050 selon notre scenario le plus optimiste, et de 29,99 % en 2025 et 29,72 % en 2050 selon le scenario le plus pessimiste par rapport a celle

  16. Stereotype Threat, Inquiring about Test Takers' Race and Gender, and Performance on Low-Stakes Tests in a Large-Scale Assessment. Research Report. ETS RR-15-02

    Science.gov (United States)

    Stricker, Lawrence J.; Rock, Donald A.; Bridgeman, Brent

    2015-01-01

    This study explores stereotype threat on low-stakes tests used in a large-scale assessment, math and reading tests in the Education Longitudinal Study of 2002 (ELS). Issues identified in laboratory research (though not observed in studies of high-stakes tests) were assessed: whether inquiring about their race and gender is related to the…

  17. Rationality on the rise: Why relative risk aversion increases with stake size

    OpenAIRE

    Fehr-Duda, Helga; Bruhin, Adrian; Epper, Thomas F.; Schubert, Renate

    2008-01-01

    How does risk tolerance vary with stake size? This important question cannot be adequately answered if framing effects, nonlinear probability weighting, and heterogeneity of preference types are neglected. We show that, contrary to gains, no coherent change in relative risk aversion is observed for losses. The increase in relative risk aversion over gains cannot be captured by the curvature of the utility function. It is driven predominantly by a change in probability weighting of a majority ...

  18. IoT: Their Conveniences, Security Challenges and Possible Solutions

    Directory of Open Access Journals (Sweden)

    Davar Pishva

    2017-07-01

    Full Text Available The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security challenges of these devices are becoming realities in the present day life. The paper initially provides some introductory information about the topic, mostly by means of survey and citations of previous work. It then highlights the devastating effects of October 21, 2016 DDoS attack which mainly utilized IoT devices. It emphasizes the danger of recently revealed Mirai IoT botnet which serves as the basis for the DDoS-for-hire ‘booter’/ ‘stresser’ service. In terms of counter measures, after highlighting IoT security implementation challenges, numerous approaches are presented. As a long-term solution, an architecture wherein security issues are managed through universal home gateway by network operators in a product based fashion is emphasized. The author shows its technical feasibility and demonstrates its partial materialization in proprietary manners. It then explains why and how numerous stake holders are needed to get together for its wide range commercial implementation. Some immediate necessary safeguard actions and intermediate schemes which include soft infrastructures are also presented for the purpose of risk reduction.

  19. The Contradictions of High-Stakes Accountability "Success": A Case Study of Focused Leadership and Performance Agency

    Science.gov (United States)

    Black, William R.

    2008-01-01

    This article seeks to advance the discussion of the availability of contemporary notions of school leadership for school leaders working within high-stakes accountability reform environment that produce discourses of urgency and legitimize practices of performance that implicitly favour centralized, neo-Tayloristic managerial approaches. Drawing…

  20. Stakes and modalities of the climatic risk covering

    International Nuclear Information System (INIS)

    Marteau, D.

    2006-01-01

    Several econometric works show that climatic volatility is at the first rank of the risk factors in several economic sectors like energy, textile, agriculture and food, tourism, leisure, building industries etc. However, climate remains an underestimated economic factor for several reasons: lack of awareness about the comparative stakes of climate risks management and market risks management, difficulties in the measurement of climate risk exposure, weak knowledge of covering techniques for private contract and organized markets, and unsolved question of risk sharing between shareholders and managers. This document analyzes the sensitivity of companies with respect to climate risk and describes the 5 steps of implementation of a climate covering policy: risk exposure measurement, risk bearing or transfer decision, definition of the optimum covering profile, choice of markets and covering instruments, efficiency measurement. A practical example is shown with its related questions. (J.S.)

  1. Group Differences in Test-Taking Behaviour: An Example from a High-Stakes Testing Program

    Science.gov (United States)

    Stenlund, Tova; Eklöf, Hanna; Lyrén, Per-Erik

    2017-01-01

    This study investigated whether different groups of test-takers vary in their reported test-taking behaviour in a high-stakes test situation. A between-group design (N = 1129) was used to examine whether high and low achievers, as well as females and males, differ in their use of test-taking strategies, and in level of reported test anxiety and…

  2. Examining a Public Montessori School's Response to the Pressures of High-Stakes Accountability

    Science.gov (United States)

    Block, Corrie Rebecca

    2015-01-01

    A public Montessori school is expected to demonstrate high student scores on standardized assessments to succeed in the current school accountability era. A problem for a public Montessori elementary school is how to make sense of the school's high-stakes assessment scores in terms of Montessori's unique educational approach. This case study…

  3. High-stakes conflicts and the link between theory and practice : celebrating the work of Ellen Giebels

    NARCIS (Netherlands)

    Oostinga, Miriam S.D.; Rispens, Sonja; Taylor, Paul J.; Ufkes, Elze G.

    2018-01-01

    In this tribute to the 2012 recipient of the IACM's Jeffrey Rubin's Theory-to-Practice Award, we celebrate the work of Ellen Giebels. We highlight her groundbreaking research on influence tactics in crisis negotiations and other high-stakes conflict situations, showing how her focus on theoretical

  4. High-Stakes Conflicts and the Link between Theory and Practice : Celebrating the Work of Ellen Giebels

    NARCIS (Netherlands)

    Oostinga, Miriam S.D.; Rispens, Sonja; Taylor, Paul J.; Ufkes, Elze G.

    2018-01-01

    In this tribute to the 2012 recipient of the IACM's Jeffrey Rubin's Theory-to-Practice Award, we celebrate the work of Ellen Giebels. We highlight her groundbreaking research on influence tactics in crisis negotiations and other high-stakes conflict situations, showing how her focus on theoretical

  5. Management of radioactive materials and wastes: status, stakes and perspectives

    International Nuclear Information System (INIS)

    Champion, Didier; Devin, Patrick; Tanguy, Loic; Bernard, Herve; Minon, Jean-Paul; Leclaire, Arnaud; Gilli, Ludivine; Lheureux, Yves; Pescatore, Claudio; Barbey, Pierre; Schneider, Thierry; Gay, Didier; Forest, Isabelle; Hemidy, Pierre-Yves; Baglan, Nicolas; Desnoyers, Bruno; Pieraccini, Michel; Poncet, Philippe; Seguin, Bertille; Calvez, Marianne; Leclerc, Elisabeth; Bancelin, Estelle; Fillion, Eric; Segura, Yannick; Vernaz, Etienne; Granier, Guy; De Preter, Peter; Petitfrere, Michael; Laye, Frederic; Nakamura, Takashi; Gin, Stephane; Lebaron-Jacobs, Laurence; Dinant, Sophie; Vacquier, Blandine; Crochon, Philippe; Griffault, Lise; Smith, Graham

    2013-10-01

    These technical days were organized by the Environment section of the French Society of Radiation Protection (SFRP). Time was given to some exchange about the societal aspects of radioactive waste management as well as about the legal context but the most part of the debates delt with the actual management modalities of the different types of wastes, both in France and in foreign countries, and with the related stakes, in particular in terms of impact. This document brings together the presentations (slides) of the following talks: - Contributions of radiation protection to the long-term safety management of radioactive wastes (Jean-Paul MINON - ONDRAF); - The national inventory of radioactive materials and wastes (Arnaud LECLAIRE - ANDRA); - The high activity, medium activity-long living wastes in debate - a co-building approach (ANCCLI/Clis of Bure/IRSN) to share stakes, enlighten, and develop thought (Ludivine GILLI - IRSN, Yves LHEUREUX - ANCCLI); - Social aspects of Radioactive Waste Management - The International Learning (Claudio PESCATORE - AEN/OCDE); - Citizens involvement and ACRO's point of view on radioactive wastes management (Pierre BARBEY - ACRO); - New CIPR recommendations about the geologic disposal of long-living radioactive wastes (Thierry SCHNEIDER - CEPN); - Overview of processes under the views of radiation protection principles (Didier GAY - IRSN); - The national plan of radioactive materials and wastes management (Loic TANGUY - ASN); - Joint convention on spent fuel management safety and on radioactive waste management safety - status and main stakes (Isabelle FOREST - ASN); - Transport of radioactive wastes (Bruno DESNOYERS - AREVA); - Optimisation and limitation of the environmental impacts of very-low level wastes - valorisation and processes selection (Michel PIERACCINI - EDF), Philippe PONCET - AREVA); - Management of hospital wastes - Example of Montpellier's University Regional Hospital (Bertille SEGUIN - CHRU de Montpellier); - Waste

  6. "I'm Just Going through the Motions": High-Stakes Accountability and Teachers' Access to Intrinsic Rewards

    Science.gov (United States)

    Rooney, Erin

    2015-01-01

    This article explores teachers' experiences under high-stakes accountability and shows how the narrowing of curriculum depleted teachers' intrinsic work rewards. The article analyzes data from an ethnographic study of teachers' work in two high-poverty urban public schools. The study shows that as instructional mandates emphasized a narrowed…

  7. Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques

    Science.gov (United States)

    Bhadauria, Rohit; Sanyal, Sugata

    2012-06-01

    Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow multi-fold increase in the capacity or capabilities of the existing and new software. In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines. Since these data-centers may lie in any corner of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and taken care of. Also, one can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders linked to it.

  8. The impact of high-stakes school admission exams on study achievements: quasi-experimental evidence from Slovakia

    Czech Academy of Sciences Publication Activity Database

    Federičová, Miroslava; Münich, Daniel

    2017-01-01

    Roč. 30, č. 4 (2017), s. 1069-1092 ISSN 0933-1433 R&D Projects: GA ČR(CZ) GBP402/12/G130 Institutional support: RVO:67985998 Keywords : high-stakes exams * students’ motivation * achievement Subject RIV: AH - Economics OBOR OECD: Applied Economics , Econometrics Impact factor: 1.136, year: 2016

  9. A Case Study of Co-Teaching in an Inclusive Secondary High-Stakes World History I Classroom

    Science.gov (United States)

    van Hover, Stephanie; Hicks, David; Sayeski, Kristin

    2012-01-01

    In order to provide increasing support for students with disabilities in inclusive classrooms in high-stakes testing contexts, some schools have implemented co-teaching models. This qualitative case study explores how 1 special education teacher (Anna) and 1 general education history teacher (John) make sense of working together in an inclusive…

  10. We Save, We Go to College. Creating a Financial Stake in College: Report III of IV

    Science.gov (United States)

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings and college…

  11. Fossil energy and food security

    International Nuclear Information System (INIS)

    Folke, G.

    2001-01-01

    To fulfil the basic goal of delivering food for the tables of the citizens, modern Western agriculture is extremely dependent on supporting material flows, infrastructure, and fossil energy. According to several observers, fossil fuel production is about to peak, i.e., oil extraction is no longer capable of keeping pace with the increasing demand. This situation may trigger an unprecedented increase in fossil energy prices, which may make the current highly energy dependent food production-distribution system highly vulnerable. The paper starts with a survey of this vulnerability. Also, the supply of phosphorus, a key factor in agriculture, may be at stake under such circumstances. The paper analyses this situation and discusses settlement structures integrated with agriculture that might increase food security by reducing energy demands. In the proposed ideal societal structure, agriculture is integrated with settlements and most of the food needed by the population is produced locally, and the nutrients for food production are recycled from households and animals by means of biological processes demanding considerably less mechanical investment and fossil support energy than the conventional type of agriculture. The vulnerability of this structure would be considerably lower, than that of the current system. (author)

  12. International economy. 82, controlling greenhouse effect: the stake of the international public policy

    International Nuclear Information System (INIS)

    Godard, O.; Oliveira-Martins, J.; Sgard, J.

    2000-01-01

    The greenhouse effect is one of the first stake of public policy which needs to be considered at the worldwide level. The climate changes shade doubts on the economic growth strategies adopted by all countries, and, if no major effort is made in the mastery of energy demand, worldwide greenhouse gas emissions will rapidly reach dangerous thresholds. This book gives a status of the research carried out on the economical impact of these policies. (J.S.)

  13. South Asia | Page 97 | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Language English. Read more about Sécurité alimentaire et changements climatiques au Cambodge. Language French. Read more about Food Security and Climate Change in Cambodia. Language English. Read more about Diaspora Impact on the Capacity for Recovery from Conflict and Crisis. Language English ...

  14. How many stakes are required to measure the mass balance of a glacier?

    Science.gov (United States)

    Fountain, A.G.; Vecchia, A.

    1999-01-01

    Glacier mass balance is estimated for South Cascade Glacier and Maclure Glacier using a one-dimensional regression of mass balance with altitude as an alternative to the traditional approach of contouring mass balance values. One attractive feature of regression is that it can be applied to sparse data sets where contouring is not possible and can provide an objective error of the resulting estimate. Regression methods yielded mass balance values equivalent to contouring methods. The effect of the number of mass balance measurements on the final value for the glacier showed that sample sizes as small as five stakes provided reasonable estimates, although the error estimates were greater than for larger sample sizes. Different spatial patterns of measurement locations showed no appreciable influence on the final value as long as different surface altitudes were intermittently sampled over the altitude range of the glacier. Two different regression equations were examined, a quadratic, and a piecewise linear spline, and comparison of results showed little sensitivity to the type of equation. These results point to the dominant effect of the gradient of mass balance with altitude of alpine glaciers compared to transverse variations. The number of mass balance measurements required to determine the glacier balance appears to be scale invariant for small glaciers and five to ten stakes are sufficient.

  15. Ideas for Refining Children's Savings Account Proposals. Creating a Financial Stake in College: Report IV of IV

    Science.gov (United States)

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings…

  16. Why Policymakers Should Care about Children's Savings. Creating a Financial Stake in College: Report I of IV

    Science.gov (United States)

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings and college…

  17. The role of stake holders in the Italian debate on the national radioactive waste deposit

    International Nuclear Information System (INIS)

    Cantone, Marie C.

    2008-01-01

    Full text: In early 2003, following an increased concern about the international terrorist threat, the Italian Government declared an emergency status for national nuclear installations, and in particular for radioactive waste deposits. A working group of experts - mainly from the Society for the Management of Nuclear Installations (SOGIN) and the Agency for New Technologies, Energy and Environment (ENEA) - was appointed and charged with the analysis of the technical aspects implied in the creation of a repository to host permanently LLRW and MLRW as well as to host temporarily HLRW. In November 2003 the Italian Government passed a decree to authorize the creation of a national nuclear waste repository within a geological salt deposit in the territory of Scanzano Jonico, in the Basilicata Region. The decision was made without any negotiation with the local population and the authorities of Scanzano Jonico. The lack of transparent communication and the attempt to impose the project 'from the top' was perceived as a 'deceptive strategy'. The population of the entire region spontaneously organized a mass protest movement against the project; blockades were carried out on the major highway connecting Northern to Southern Italy and the controversy gained the attention of the national mass media. Two weeks later, the Italian government withdrew the decree. Presently, the Italian nuclear waste is distributed over more than 20 locations in 11 different Regions, and the creation of a national disposal site has been postponed. The present study aims at highlighting the reasons behind social conflicts on nuclear waste risks. We will examine the attitudes and the communication strategies of the different stake holders which took part in the public debate on the Italian nuclear waste dump. Drawing on methodologies used in media studies, we are carrying out a quantitative and qualitative analysis of the main national and local newspapers in order to draw a 'map' of the

  18. Energy shortages in Europe? strategic meetings on energy security

    International Nuclear Information System (INIS)

    Derdevet, M.

    2005-01-01

    On the RTE's initiative, the Economic and Social Council welcome the first 'Strategic Meetings on Energy Security' event on July 11, 2005. With its 'Energy Shortages in Europe?' subtitle, the convention was in line with the topical issue of oil price increases. Opening the convention, Hubert Bouchet, the vice-president of the Research and Technology Productive Activities section of the Economic and Social Council (CES) stated that with its 400 million citizens, Europe uses over 2 500 tWh of electricity a year, and that its demand for primary energy is growing, making it the largest importer of energy in the world and the top second user after the United States. The trend should continue at least until 2030. H Bouchet also stress that though the worlds is using increasing amounts of energy, over 1.5 billion people do not have access to modern energy sources. Therefore, there are huge needs. There were four round-tables introducing rich debates with the room. The first one was about the issue of the 'energy market: the end of overcapacity', and the second one, dedicated so secure supplies, was titled: 'An ill adapted regulatory framework and European context'. In the afternoon, exchanges covered 'Strategies to prepare the energy offer for new stakes' and 'Major strategies for France and Europe'. (author)

  19. Power supply security: what stakes for regulation?

    International Nuclear Information System (INIS)

    Marty, Frederic

    2007-02-01

    Prices on electricity markets induce two kinds of debates. If the first ones lie on their constant increase, the seconds are relative to their volatility. Such volatility disrupts price signals for investors and could induce an insufficient level of generating capacity. The risks are all the more significant since the profitability of peak-load capacities is especially sensitive to the level of prices that are realised during the small number of hours in which they produce energy. But, the difficulty to balance between scarcity rents and abuses of market power could induce regulatory interventions as too stringent price-caps. These ones could make worse the spontaneous market under-investment. They restrict the scarcity rents expected by the investors and reinforce the law uncertainty. Our purpose is to analyse the mechanisms which are used to provide an optimal level of generating capacity, as capacity obligations, payments or markets, and to underline the complementarities between decentralised investment decisions and public action. (author)

  20. Teaching under the New Taylorism: High-Stakes Testing and the Standardization of the 21st Century Curriculum

    Science.gov (United States)

    Au, Wayne

    2011-01-01

    The application of the principles of scientific management within the structure, organization, and curriculum of public schools in the US became dominant during the early 1900s. Based upon research evidence from the modern day era of high-stakes testing in US public education, the fundamental logics guiding scientific management have resurfaced…

  1. Urbanisation et changements climatiques : une menace pour la ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    22 juin 2016 ... Dans son article intitulé Periurban water security in a context of ... have distinct environmental, social, and institutional characteristics. ... Protecting food, energy, and livelihoods in Punjab through water-efficient agriculture.

  2. Experimental Investigation on Electric Current-Aided Laser Stake Welding of Aluminum Alloy T-Joints

    Directory of Open Access Journals (Sweden)

    Xinge Zhang

    2017-11-01

    Full Text Available In the present study, aluminum alloy T-joints were welded using the laser stake-welding process. In order to improve the welding quality of the T-joints, an external electric current was used to aid the laser stake-welding process. The effects of the process parameters on the weld morphology, mechanical properties, and microstructure of the welded joints were analyzed and discussed in detail. The results indicate that the aided electric current should be no greater than a certain maximum value. Upon increasing the aided electric current, the weld width at the skin and stringer faying surface obviously increased, but there was an insignificant change in the penetration depth. Furthermore, the electric current and pressing force should be chosen to produce an expected weld width at the faying surface, whereas the laser power and welding speed should be primarily considered to obtain an optimal penetration depth. The tensile shear specimens failed across the faying surface or failed in the weld zone of the skin. The specimens that failed in the weld of the skin could resist a higher tensile shear load compared with specimens that failed across the faying surface. The microstructural observations and microhardness results demonstrated that the tensile shear load capacity of the aluminum alloy welded T-joint was mainly determined by the weld width at the faying surface.

  3. What is at stake? Exploring the moral experience of stigma with Indian-Australians and Anglo-Australians living with depression.

    Science.gov (United States)

    Brijnath, Bianca; Antoniades, Josefine

    2018-04-01

    This article applies the framework of moral experience to examine the cultural experience of stigma with Indian-Australians and Anglo-Australians living with depression in Melbourne, Australia. To date few studies have examined this dynamic in relation to mental illness and culture, and no studies have applied this framework in a culturally comparative way. Based on 58 in-depth interviews with people with depression recruited from the community, we explicate how stigma modulates what is at stake upon disclosure of depression, participants' lived experience following that disclosure, and how practices of health-seeking become stigmatised. Findings show that the social acceptance of depression jars against participants' experience of living with it. Denialism and fear of disclosure were overwhelming themes to emerge from our analysis with significant cultural differences; the Anglo-Australians disclosed their depression to family and friends and encountered significant resistance about the legitimacy of their illness. In contrast, many Indian-Australians, especially men, did not disclose their illness for fear of a damaged reputation and damaged social relations. For Indian-Australians, social relations in the community were at stake, whereas for Anglo-Australians workplace relations (but not community relations) were at stake. Participants' experiences in these settings also influenced their patterns of health-seeking behaviors and age and inter-generational relationships were important mediators of stigma and social support. These findings illuminate how stigma, culture, and setting are linked and they provide critical information necessary to identify and develop customised strategies to mitigate the harmful effects of stigma in particular cultural groups.

  4. The US proliferation security initiative (PSI); L'initiative americaine de securite contre la proliferation (PSI)

    Energy Technology Data Exchange (ETDEWEB)

    Gregoire, B

    2004-10-01

    The proliferation security initiative (PSI), launched by President Bush on May 31, 2003, aims at intercepting any transfer of mass destruction weapons, of their vectors and related equipments, towards or coming from countries or organizations suspected to have a proliferation activity. This initiative, which involves coercive means to fight against proliferation, raises international lawfulness and legal questions, the answers of which are today under construction. This article analyzes the place of the European Union in the PSI, the action means (optimization of existing means, cooperation between intelligence and interception services), and the PSI stakes (lawfulness with respect to the international law, bilateral agreements, draft boarding agreement, sustain of the United Nations, widening of the partnership and of the field of action). (J.S.)

  5. Stakes at the edge of participation: Where words and things are the entirely serious title of a problem

    DEFF Research Database (Denmark)

    Jönsson, Li; Ulv Lenskjold, Tau

    2015-01-01

    language and discourse. Drawing on examples from the recent research project Urban Animals and Us (UA&Us), we suggest that experimental prototypes hold the promise of material enactments of relations that enable a re-articulation of what it means to have a stake in a socio-material event. In the specific...

  6. Does Structural Inequality Begin with a Bank Account? Creating a Financial Stake in College: Report II of IV

    Science.gov (United States)

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings and college…

  7. EVALUASI PROGRAM PEMBELAJARAN IPA SMP MENGGUNAKAN MODEL COUNTENANCE STAKE

    Directory of Open Access Journals (Sweden)

    Astin Lukum

    2015-06-01

    THE EVALUATION OF SCIENCE TEACHING ON JUNIOR HIGH SCHOOL USING STAKE’S COUNTENANCE MODEL Abstract The purpose of the study was to describe the science learning program on junior high school in Bone Bolanga district based on the Regulation of Minister of Education and Culture of the Republic of Indonesia, Number 65 of 2013 about Processing Standard of Primary and Secondary Education. This study used Stake’s Countanance evaluation model. The data were collected using observation, interview and documentation techniques. The conclusion was: (1 the planning of science learning was categorized fair (68%, it was found that lesson plan was not in accordance with the learning processing standard. (2 The implementation of science learning was categorized fair (57%, that unconformitted with learning processing implementation standard. (3 Student learning outcomes have not met the completeness of minimum criteria (KKM that categorized enough (65% and (4 There were the contingency of planing learning proces and outcome. Keywords: Program Evaluation, Stake's Countenance, Science Learning

  8. Sistemas de tutoramento e condução do tomateiro visando produção de frutos para consumo in natura Tomato plant staking and training systems for fresh fruit production

    Directory of Open Access Journals (Sweden)

    Bruno G. Marim

    2005-12-01

    Full Text Available Os sistemas de tutoramento e condução influem no desenvolvimento da planta do tomateiro e na qualidade do fruto produzido. Para avaliar a influência de três sistemas de tutoramento e dois de condução da planta do tomateiro na produção classificada de frutos comercializáveis, foram conduzidos dois experimentos, de agosto a dezembro/1999 (exp. 1 e de 2000 (exp. 2 em Viçosa (MG. O delineamento foi em blocos ao acaso com três repetições, no esquema fatorial 3x2, tutoramento e condução, respectivamente. Avaliaram-se os seguintes métodos de tutoramento: T1, tradicional (V invertido, T2, triangular e T3, vertical e duas formas de condução, com uma e duas hastes por planta. Independentemente do tratamento, as plantas foram podadas acima do sexto cacho. Observaram-se diferenças entre os sistemas de tutoramento, condução e entre os anos de cultivo em relação às características avaliadas, sendo que ocorreu interação entre estes efeitos apenas para as características produção de frutos comercializáveis e produção total. O tutoramento vertical proporcionou aumento na produção de frutos de tamanho grande e diminuição na produção de frutos de tamanho médio e frutos não comercializáveis, quando comparado com os outros métodos de tutoramento. Independentemente do sistema de tutoramento, o tomateiro cultivado com uma haste produziu mais frutos de tamanho grande, de maior valor comercial, enquanto as plantas conduzidas com duas hastes produziram mais frutos de tamanho médio e pequeno.The main reason for staking and training tomato plants is to keep plants and fruits off the ground to reduce losses and to improve the quality of the production. To evaluate the influence of three plant staking and two training systems of the tomato production for fresh market, two experiments were conducted during the period of August 1999 (exp.1 and 2000 (exp.2 in Viçosa, Brazil. The experimental design was a randomized complete block

  9. High-­Stakes Schooling: What We Can Learn from Japan's Experiences with Testing, Accountability, and Education Reform

    Science.gov (United States)

    Bjork, Christopher

    2015-01-01

    If there is one thing that describes the trajectory of American education, it is this: more high-stakes testing. In the United States, the debates surrounding this trajectory can be so fierce that it feels like we are in uncharted waters. As Christopher Bjork reminds us in this study, however, we are not the first to make testing so central to…

  10. Adaptation de l'agriculture aux politiques de gestion de l'eau et aux changements globaux : l'apport des modèles de programmation mathématique

    OpenAIRE

    Graveline, Nina

    2013-01-01

    Cette thèse développe et discute différentes approches micro-économiques de modélisation de l’agriculture pour représenter l’effet de changements globaux et de politiques de gestion de l’eau sur l’adaptation de l’agriculture et sur les ressources en eau. Après un chapitre de synthèse et une revue de la littérature, quatre essais sont présentés. Le premier essai décrit la représentation du comportement de dix exploitations agricoles en Alsace et en Bade (Allemagne) à partir de modèles de progr...

  11. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    International Nuclear Information System (INIS)

    Zakaria, M.; Mandere, N.; Olsson, L.

    2006-01-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  12. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, M.; Mandere, N.; Olsson, L. [Lund Univ., Centre for Sustainability Studies (LUCSUS) (Sweden)

    2006-07-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  13. Le changement comme tradition dans la recherche et la formation a la recherche en biotechnologie et en peripherie Etude de cas en sciences de la sante, sciences naturelles et genie

    Science.gov (United States)

    Bourque, Claude Julie

    Le champ de la recherche scientifique et de la formation a la recherche est traverse depuis quelques dizaines d'annees par plusieurs courants et discours associes au changement, mais peu de travaux empiriques permettent de comprendre ce qui change concretement. C'est la contribution originale de cette these au champ de l'education, plus specifiquement a l'etude sociologique de l'enseignement superieur ou sont concentrees les activites liees a la triade thematique du programme doctoral dans lequel elle a ete produite : recherche, formation et pratique. L'enquete-terrain a ete realisee en 2009 et 2010 aupres de 808 repondants affilies a 60 etablissements au Quebec et a produit un vaste materiau de nature mixte (donnees quantitatives et qualitatives). Un portrait de la nebuleuse biotechnologique qui touche les secteurs des sciences de la sante, des sciences naturelles et du genie a ete realise. Ce domaine concerne des dizaines de disciplines et se revele de nature transdisciplinaire, mais les pratiques n'y sont pas davantage marquees par le changement que celles d'autres domaines connexes. Les dynamiques sociales ont fait l'objet d'analyses comparatives dans quatre contextes: le choix des programmes, des objets et des methodes, le financement, la diffusion et la planification de la carriere. Les resultats indiquent que les echanges entre les agents traditionnellement situes au coeur des activites de recherche dominent ces dynamiques dans tous les contextes etudies. L'etude des representations au fondement des pratiques a revele l'existence de trois ecoles de pensee qui coexistent dans le champ scientifique: academique, pragmatique et economiste. Ces ecoles permettent de categoriser les agents en fonction des zones de fractures qui marquent leurs oppositions tout en identifiant ce qu'ils ont en commun. Les representations et les pratiques liees a la formation temoignent d'un habitus plutot homogene, alors que les contradictions semblent plus souvent ancrees dans des

  14. Diving in or Guarding the Tower: Mina Shaughnessy's Resistance and Capitulation to High-Stakes Writing Tests at City College

    Science.gov (United States)

    Molloy, Sean

    2012-01-01

    Mina Shaughnessy continues to exert powerful influences over Basic Writing practices, discourses and pedagogy thirty-five years after her death: Basic Writing remains in some ways trapped by Shaughnessy's legacy in what Min-Zhan Lu labeled as essentialism, accommodationism and linguistic innocence. High-stakes writing tests, a troubling hallmark…

  15. Companies and energy transition: The stakes of mobility. A case study in the cities of Lille and Lyon

    Directory of Open Access Journals (Sweden)

    Lejoux Patricia

    2014-07-01

    Full Text Available Regarding energy transition in the area of mobility, the literature gives prominence to two types of actor which appear to play leading roles: public authorities and households. However, the role played by companies in this energy transition appears to have attracted only marginal attention. Nonetheless, companies influence mobility through the transport of goods, professional travel and commuter trips they generate. If they participate in the growth of this mobility, might they not also contribute to reducing it? What is the viewpoint held by companies regarding these questions? The aim of this article is to highlight the stakes of this energy transition in the domain of mobility in order to represent the viewpoint of companies. The results show that company managers are effectively concerned by the stakes of energy transition in the domain of mobility and that they have already taken measures in favour of more sustainable mobility. But this is more for economic (increased transport costs and social (recruitment problems, turnover linked to the increased cost of car mobility reasons than for environmental ones (reduction of greenhouse gas emissions.

  16. Design of cloud security in the EHR for Indian healthcare services

    Directory of Open Access Journals (Sweden)

    Pradeep Deshmukh

    2017-07-01

    Full Text Available An ease of data or record sharing at will has compelled most of the physicians to adopt EHR (Electronic Health Record for record-keeping of patients. It also makes convenient to the other stake holders of healthcare ecosystem such as nurses, specialists and patient. Due to lower costs and scalability of application, the cloud is becoming the infrastructure for most of the EHR but without comprising the privacy of data. In this paper we have proposed a frame work for storing the health records and accessing them by patients and physicians as authorized by key-control scheme. The scenarios we have considered here are of rural and urban health care centers and hence more appropriate for Indian health care services. The proposed scheme has double data security by introducing isolation between encryption schemes of transmitted data and stored data. The experimental result shows that it has a capability of scaling in number of patients and also no of elements in health record.

  17. A stake in the business.

    Science.gov (United States)

    Sullivan, Chris T

    2005-09-01

    When Chris Sullivan and three friends opened the first Outback Steakhouse in March 1988, in Tampa, Florida, they were hoping it would be successful enough to spawn a few more and maybe some other kinds of restaurants as well. Since then, their chain of Australia-themed restaurants has grown to some 900 locations and counting-plus another 300 or so "concept" restaurants that operate from under Outback's corporate umbrella. Growth like that doesn't happen accidentally, Sullivan says, but it certainly wasn't part of the original plan. In this first-person account, Outback's chairman describes the organization's formula for growth and development, which is consciously rooted in the founders' belief in putting people first. They've created an organizational model in which field managers make most of the decisions, garner the rewards, and live with the consequences. Specifically, the founders believe that the most effective way to make customers happy is to first take care of the people who cook for them, serve them, and supervise operations at the restaurants. Outback servers have fewer tables to worry about than those at other restaurant chains; the cooks have bigger, cooler, better-equipped kitchens; and the supervisors work their way up the ranks toward an equity stake in the restaurant or region they run. There are no administrative layers between field managers and the executives at headquarters. Giving employees good working conditions and the chance to become owners has proved to be good business: Turnover among hourly employees is low, and Outback and its subsidiaries opened 120 restaurants last year, increasing sales by 20.1%. The company must grow in order to keep offering career opportunities to its workers; in turn, those opportunities ensure that Outbackers remain committed to making customers happy and the company successful.

  18. Rich, poor share stake in poverty, pollution link

    International Nuclear Information System (INIS)

    DeCanio, S.J.

    1993-01-01

    A dirty environment and poverty go together, and this link between environmental protection and economic development is creating a new basis for international cooperation, says Stephen J. DeCanio of the University of California at Santa Barbara. open-quotes Both developed and developing countries have a stake in solving the development/environment impasse,close quotes DeCanio adds. open-quotes Furthermore, the link between these problems offers a fresh opportunity to make progress on both fronts.close quotes He says environmental protection expenditures by developed countries can be used to promote the sustainable economic growth of those countries struggling to escape from poverty. The money could be collected in several ways, he notes: from various types of environmental taxes, such as a carbon tax; from environmental user fees; from open-quotes debt-for natureclose quotes swaps; and from tradable emissions permits. Such mechanisms transfer resources to developing countries, where they can be applied to economic development-a desired objective, according to DeCanio. open-quotes The benefits of equitable worldwide growth and development outweigh any temporary loss of wealth developed countries may experience as a result of environmental transfers,close quotes he asserts

  19. Biofuels: stakes, perspectives and researches; Biocarburants: enjeux, perspectives et recherches

    Energy Technology Data Exchange (ETDEWEB)

    Appert, O.; Ballerin, D.; Montagne, X.

    2004-07-01

    The French institute of petroleum (IFP) is a major intervener of the biofuels sector, from the production to the end-use in engines. In this press conference, the IFP takes stock of the technological, environmental and economical stakes of today and future biofuel production processes and of their impact on transports. This document gathers 2 presentations dealing with: IFP's research strategy on biofuels (transparencies: context; today's processes: ethanol, ETBE, bio-diesel; tomorrows processes: biomass to liquid; perspectives), bio-diesel fuel: the Axens process selected by Diester Industrie company for its Sete site project of bio-diesel production unit. The researches carried out at the IFP on biofuels and biomass are summarized in an appendix: advantage and drawbacks of biofuels, the ethanol fuel industry, the bio-diesel industry, biomass to liquid fuels, French coordinated research program, statistical data of biofuel consumption in France, Spain and Germany. (J.S.)

  20. Special COP 21 - Stakes and actors

    International Nuclear Information System (INIS)

    Chauveau, Loic; Dupain, Julien; Descamps, Olivier; Blosseville, Thomas; Connors, Anne; Canto, Albane; Robischon, Christian; Boedec, Morgan; Tubiana, Fabian; Bomstein, Dominique

    2015-01-01

    A first set of article comments and discusses the various stakes and challenges of the 21. Conference of Parties (COP 21): the negotiation process which resulted in a synthesis which is to be signed by 95 States in Paris, the elaboration of an Agenda of solutions with the commitment of enterprises and local authorities, the issue of international financing as some promises remained not kept for the support to adaptation of developing countries. A second set of articles addresses the involved actors and their technological or economic challenges: the needed evolution of energy (electricity, heat, gas, fuel) producers away from fossil energies to reduce greenhouse gas emissions, the strategy of the French company Engie in the field of photovoltaic, wind and more generally renewable energies, innovating trends of decentralisation of energy production (offshore wind energy, hydrogen, plasma torch, flexible photovoltaic arrays, the wind tree, the floating wind turbine, new technologies for solar arrays), the perspectives for industrial sectors concerned by energy transition (with the example of Schneider Electric), emerging technologies (oil lamp, new boilers, desalination equipment, storage of wind energy, co-generation), developments and perspectives in the transport sector (example of Renault, new technologies for hybrid propulsion, bio-refineries, reduction of fuel consumption, hybrid aircraft, and heat management in railways) and in the building sector (new standards and applications, new building materials). A last article outlines the threat that climate can be for profitability and the taking of the carbon risk into account by the insurance and financial sectors

  1. The creation of a pedagogy of promise: Examples of educational excellence in high-stakes science classrooms

    Science.gov (United States)

    McCollough, Cherie A.

    The current reform movement in education has two forces that appear contradictory in nature. The first is an emphasis on rigor and accountability that is assessed through high-stakes testing. The second is the recommendation to have student centered approaches to teaching and learning, especially those that emphasize inquiry methodology and constructivist pedagogy. Literature reports that current reform efforts involving accountability through high-stakes tests are detrimental to student learning and are contradictory to student-centered teaching approaches. However, by focusing attention on those teachers who "teach against the grain" and raise the achievement levels of students from diverse backgrounds, instructional strategies and personal characteristics of exemplary teachers can be identified. This mixed-methods research study investigated four exemplary urban high school science teachers in high-stakes (TAKS) tested science classrooms. Classroom observations, teacher and student interviews, pre-/postcontent tests and the Constructivist Learning Environment Survey (CLES) (Johnson & McClure, 2004) provided the main data sources. The How People Learn (National Research Council, 2000) theoretical framework provided evidence of elements of inquiry-based, student-centered teaching. Descriptive case analysis (Yin, 1994) and quantitative analysis of pre/post tests and the CLES revealed the following results. First, all participating teachers included elements of learner-centeredness, knowledge-centeredness, assessment-centeredness and community-centeredness in their teaching as recommended by the National Research Council, (2000), thus creating student-centered classroom environments. Second, by establishing a climate of caring where students felt supported and motivated to learn, teachers managed tensions resulting from the incorporation of student-centered elements and the accountability-based instructional mandates outlined by their school district and state

  2. Les Caisses d’épargne face à l’avènement d’un groupe bancaire universel : le changement organisationnel entre ingénierie managériale de la mémoire et attachement au passé The Caisses d'Epargne, a mutual savings bank in transition to a global banking Group: Organisational change between managing institutional memory and attachment to the past

    Directory of Open Access Journals (Sweden)

    Julien Tassel

    2011-12-01

    Full Text Available Il est d’usage d’aborder le changement organisationnel sous l’angle de sa gestion, de son accompagnement ou de sa conduite. Si l’on ne peut nier le caractère opératoire de ces approches, elles passent sous silence la dimension essentielle pour la compréhension du changement que constitue le rapport à la mémoire et au passé.A partir d’une enquête ethnographique de terrain menée de 2003 à 2007 au sein d’une grande institution bancaire (le Groupe Caisse d’Epargne, cet article entend montrer quelques uns des enjeux proprement mémoriels que le changement engage : difficultés à reconnaître l’entreprise dans ce qu’il advient d’elle, production managériales visant à renouer le lien entre présent et passé que le changement est venu altérer, mise en place, par les collaborateurs de pratiques qui permettent de maintenir l’engagement originel de l’organisation.Organisational change is usually considered from a management or an implementation point of view. This approach, as operational as it may be, ignores the relationship to memory and the past generally, which is fundamental in order to understand changes.Based on ethnographic field studies carried out from 2003 and 2007 at a major financial institution (Caisse d'Epargne Group, this article purports to shed light on certain memory-based challenges induced by change: difficulties to recognise the company as it evolves, managerial efforts to link the current situation with the past, which has been altered by the changes, conducts of staff members influenced by a willingness to uphold the original mission of the organisation. 

  3. A Better Leveled Playing Field for Assessing Satisfactory Job Performance of Superintendents on the Basis of High-Stakes Testing Outcomes

    Science.gov (United States)

    Young, I. Phillip; Cox, Edward P.; Buckman, David G.

    2014-01-01

    To assess satisfactory job performance of superintendents on the basis of school districts' high-stakes testing outcomes, existing teacher models were reviewed and critiqued as potential options for retrofit. For these models, specific problems were identified relative to the choice of referent groups. An alternate referent group (statewide…

  4. Résultats de recherche | Page 445 | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Un organisme de surveillance presse la société civile de se mettre à niveau en matière de cybersécurité. Research in Action. Crops Food security FOREST RESOURCES Gender. L'huile d'argan du Maroc, première IGP africaine. Research in Action. Climate change. Les changements climatiques brouillent les prédictions ...

  5. : tous les projets | Page 111 | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Au cours des dernières décennies, différents types d'ententes contractuelles entre les agriculteurs et les fabricants de produits alimentaires ont gagné en popularité. Région: Middle East, Algeria. Programme: Agriculture and Food Security. Financement total : CA$ 147,200.00. Solutions d'adaptation liées aux changements ...

  6. Bien-être émotionnel au travail et changement organisationnel Emotional Well-Being at Work and Organizational Change: The Essilor Case Bienestar emocional en el trabajo y cambio organizacional : el caso de Essilor

    Directory of Open Access Journals (Sweden)

    Catherine Remoussenard

    2013-05-01

    Full Text Available Aujourd’hui, la plupart des entreprises mettent en place des projets de changements organisationnels afin de s’adapter aux modifications d’un environnement très concurrentiel. Ce faisant, elles se heurtent à des difficultés liées notamment aux situations de mal-être que ces changements peuvent induire. Notre étude vise à explorer les effets de nouvelles politiques managériales sur le bien-être émotionnel des salariés. Plus précisément, nous explorons les politiques mises en œuvre par un des sites du Groupe Essilor dans le contexte d’un changement organisationnel. Nous analysons d’un point de vue quantitatif et qualitatif les effets induits par ces politiques sur les salariés et sur la façon dont Essilor-Dijon en tient compte dans sa gestion des collaborateurs pour améliorer le bien-être au travail. À la lumière de nos résultats, il apparaît que les émotions sont au cœur de la conduite du changement, pouvant jouer le rôle de freins ou de leviers en fonction des choix managériaux.Nowadays, companies are implementing organizational change in order to be able to adapt to an increasingly competitive environment. Because of this context, firms are often confronted with problems linked to stressful situations that they themselves have brought about. We explored the policies which were applied by one of the branches of the Essilor Group in an organizational change context. First, we quantitatively and qualitatively analyzed the effects which this policy has had on stress-related issues. Second, we looked at how Essilor-Dijon took into account these effects in managing its staff so as to improve their well-being at work. Our results show that emotions appear to be at the heart of managing change and can either be obstacles or facilitators, depending on the choices made by management.Hoy en día, la mayoría de las empresas están llevando a cabo proyectos de cambio organizacional con el objetivo de adaptarse a las

  7. Countries in transition and the developing countries in the negotiation on the climatic change. Stakes of the Kyoto conference

    International Nuclear Information System (INIS)

    Blanchard, O.; Cavard, D.; Faudry, D.; Girod, J.; Menanteau, P.; Viguier, L.

    1997-10-01

    This document presents the positions of the countries in transition and the developing countries in the phase of the negotiations on the climatic change between 1994 and 1997, then takes stock on the pilot phase of the actions of the associated implementation. The negotiations stakes and the frame of the discussions are also presented. (A.L.B.)

  8. Policy Implications for Continuous Employment Decisions of High School Principals: An Alternative Methodological Approach for Using High-Stakes Testing Outcomes

    Science.gov (United States)

    Young, I. Phillip; Fawcett, Paul

    2013-01-01

    Several teacher models exist for using high-stakes testing outcomes to make continuous employment decisions for principals. These models are reviewed, and specific flaws are noted if these models are retrofitted for principals. To address these flaws, a different methodology is proposed on the basis of actual field data. Specially addressed are…

  9. High Stakes Principalship--Sleepless Nights, Heart Attacks and Sudden Death Accountabilities: Reading Media Representations of the United States Principal Shortage.

    Science.gov (United States)

    Thomson, Pat; Blackmore, Jill; Sachs, Judyth; Tregenza, Karen

    2003-01-01

    Subjects a corpus of predominantly United States news articles to deconstructive narrative analysis and finds that the dominant media representation of principals' work is one of long hours, low salary, high stress, and sudden death from high stakes accountabilities. Notes that the media picture may perpetuate the problem, and that it is at odds…

  10. Dwelling thermal renovation: which stakes, which solutions?

    International Nuclear Information System (INIS)

    Delduc, Paul; Demeulenaere, Laurence; Verdure, Mathieu; Ayong Le Kama, Alain; Fuk Chun Wing, Dimitri; Kiefer, Noemie; Mauroux, Amelie; Charlier, Dorothee; Hini, Sihame; Pinto Silva, Kleber; Giraudet, Louis Gaetan; Nauleau, Marie-Laure; Daussin-Benichou, Jeanne-Marie; Teissier, Olivier; Finidori, Esther; Grandjean, Alain; Allibe, Benoit; Gadrat, Pierre; Couriol, Aude; Menard, Francois; Rouquette, Celine; Houriez, Guillaume; Francois, Dominique; Aubert, Celine; Canardon, Daniel

    2015-01-01

    This publication proposes three sets of contributions. The first one addresses context and stakes. The contributions propose: a literature review on household behaviour and investments in energy efficiency, a focus on the key role of dwellings in energy transition through a comparative study of the four pathways of the National Debate for Energy Transition, and a discussion about consensus and uncertainties regarding the determining factors of heating temperature in dwellings. The second set addresses public policies and their assessment: improvement of the technical-economical assessment of the benefit of dwelling energetic renovations, discussion of the organisation and results of a survey on dwelling, equipment, and energy needs and uses, an analysis of several measures aimed at reaching objectives of energy efficiency of dwellings, a discussion of renovation works quality, a discussion of the impact of the sustainable development tax credit on thermal renovation, the optimisation of energy renovation in co-properties by third party financing, some foreign examples of policies in favour of dwelling thermal renovation. The third set of contributions addresses the needed technical, organisational and market evolutions: how the building sector can face the challenges of energy transition, the possibilities to propose innovative solutions adapted to existing housing buildings, and a comparative analysis of material and building equipment costs and market structures in Europe. Other texts are proposed in appendix: the origin of the Phebus survey, a description of incentive arrangements, and a map of climate zones in France

  11. StakeMeter: value-based stakeholder identification and quantification framework for value-based software systems.

    Science.gov (United States)

    Babar, Muhammad Imran; Ghazali, Masitah; Jawawi, Dayang N A; Bin Zaheer, Kashif

    2015-01-01

    Value-based requirements engineering plays a vital role in the development of value-based software (VBS). Stakeholders are the key players in the requirements engineering process, and the selection of critical stakeholders for the VBS systems is highly desirable. Based on the stakeholder requirements, the innovative or value-based idea is realized. The quality of the VBS system is associated with the concrete set of valuable requirements, and the valuable requirements can only be obtained if all the relevant valuable stakeholders participate in the requirements elicitation phase. The existing value-based approaches focus on the design of the VBS systems. However, the focus on the valuable stakeholders and requirements is inadequate. The current stakeholder identification and quantification (SIQ) approaches are neither state-of-the-art nor systematic for the VBS systems. The existing approaches are time-consuming, complex and inconsistent which makes the initiation process difficult. Moreover, the main motivation of this research is that the existing SIQ approaches do not provide the low level implementation details for SIQ initiation and stakeholder metrics for quantification. Hence, keeping in view the existing SIQ problems, this research contributes in the form of a new SIQ framework called 'StakeMeter'. The StakeMeter framework is verified and validated through case studies. The proposed framework provides low-level implementation guidelines, attributes, metrics, quantification criteria and application procedure as compared to the other methods. The proposed framework solves the issues of stakeholder quantification or prioritization, higher time consumption, complexity, and process initiation. The framework helps in the selection of highly critical stakeholders for the VBS systems with less judgmental error.

  12. StakeMeter: value-based stakeholder identification and quantification framework for value-based software systems.

    Directory of Open Access Journals (Sweden)

    Muhammad Imran Babar

    Full Text Available Value-based requirements engineering plays a vital role in the development of value-based software (VBS. Stakeholders are the key players in the requirements engineering process, and the selection of critical stakeholders for the VBS systems is highly desirable. Based on the stakeholder requirements, the innovative or value-based idea is realized. The quality of the VBS system is associated with the concrete set of valuable requirements, and the valuable requirements can only be obtained if all the relevant valuable stakeholders participate in the requirements elicitation phase. The existing value-based approaches focus on the design of the VBS systems. However, the focus on the valuable stakeholders and requirements is inadequate. The current stakeholder identification and quantification (SIQ approaches are neither state-of-the-art nor systematic for the VBS systems. The existing approaches are time-consuming, complex and inconsistent which makes the initiation process difficult. Moreover, the main motivation of this research is that the existing SIQ approaches do not provide the low level implementation details for SIQ initiation and stakeholder metrics for quantification. Hence, keeping in view the existing SIQ problems, this research contributes in the form of a new SIQ framework called 'StakeMeter'. The StakeMeter framework is verified and validated through case studies. The proposed framework provides low-level implementation guidelines, attributes, metrics, quantification criteria and application procedure as compared to the other methods. The proposed framework solves the issues of stakeholder quantification or prioritization, higher time consumption, complexity, and process initiation. The framework helps in the selection of highly critical stakeholders for the VBS systems with less judgmental error.

  13. StakeMeter: Value-Based Stakeholder Identification and Quantification Framework for Value-Based Software Systems

    Science.gov (United States)

    Babar, Muhammad Imran; Ghazali, Masitah; Jawawi, Dayang N. A.; Zaheer, Kashif Bin

    2015-01-01

    Value-based requirements engineering plays a vital role in the development of value-based software (VBS). Stakeholders are the key players in the requirements engineering process, and the selection of critical stakeholders for the VBS systems is highly desirable. Based on the stakeholder requirements, the innovative or value-based idea is realized. The quality of the VBS system is associated with the concrete set of valuable requirements, and the valuable requirements can only be obtained if all the relevant valuable stakeholders participate in the requirements elicitation phase. The existing value-based approaches focus on the design of the VBS systems. However, the focus on the valuable stakeholders and requirements is inadequate. The current stakeholder identification and quantification (SIQ) approaches are neither state-of-the-art nor systematic for the VBS systems. The existing approaches are time-consuming, complex and inconsistent which makes the initiation process difficult. Moreover, the main motivation of this research is that the existing SIQ approaches do not provide the low level implementation details for SIQ initiation and stakeholder metrics for quantification. Hence, keeping in view the existing SIQ problems, this research contributes in the form of a new SIQ framework called ‘StakeMeter’. The StakeMeter framework is verified and validated through case studies. The proposed framework provides low-level implementation guidelines, attributes, metrics, quantification criteria and application procedure as compared to the other methods. The proposed framework solves the issues of stakeholder quantification or prioritization, higher time consumption, complexity, and process initiation. The framework helps in the selection of highly critical stakeholders for the VBS systems with less judgmental error. PMID:25799490

  14. Soil Degradation, Land Scarcity and Food Security: Reviewing a Complex Challenge

    Directory of Open Access Journals (Sweden)

    Tiziano Gomiero

    2016-03-01

    Full Text Available Soil health, along with water supply, is the most valuable resource for humans, as human life depends on the soil’s generosity. Soil degradation, therefore, poses a threat to food security, as it reduces yield, forces farmers to use more inputs, and may eventually lead to soil abandonment. Unfortunately, the importance of preserving soil health appears to be overlooked by policy makers. In this paper, I first briefly introduce the present situation concerning agricultural production, natural resources, soil degradation, land use and the challenge ahead, to show how these issues are strictly interwoven. Then, I define soil degradation and present a review of its typologies and estimates at a global level. I discuss the importance of preserving soil capital, and its relationship to human civilization and food security. Trends concerning the availability of arable agricultural land, different scenarios, and their limitations, are analyzed and discussed. The possible relation between an increase in a country’s GNP, population and future availability of arable land is also analyzed, using the World Bank’s database. I argue that because of the many sources of uncertainty in the data, and the high risks at stake, a precautionary approach should be adopted when drawing scenarios. The paper ends with a discussion on the key role of preserving soil organic matter, and the need to adopt more sustainable agricultural practices. I also argue that both our relation with nature and natural resources and our lifestyle need to be reconsidered.

  15. What does social research say about high-stakes tests?

    Directory of Open Access Journals (Sweden)

    Rafael Feito Alonso

    2017-03-01

    Full Text Available High-stake tests, which students need to pass in order to gain a Secondary education certificate, have aroused a lot of controversy whenever they have been implemented. Especially in the USA these tests have produced a dramatic shrinking of school knowledge as they have been focused into questions posed by the very tests. At the same time, there has been a critical modification of the learning processes due to the fact that these tests encourage students to pay more attention to factual knowledge, which is far away from hands-on learning, debating in class or working in teams. In spite of certain discrepancies, by and large, research casts serious doubts about whether these tests are conductive to better academic performance. Nevertheless, the dropout rate is on the rise. More often than not, school principals have been found preventing struggling students to sit the exams. A review of the research into this matter allows us to put into context the debate surrounding external exams posed by the current education law (LOMCE: Law for the Improvement of Educational Quality passed by the parliamentary majority of the Popular Party in Spain in 2013.

  16. Scenarios for transition towards a low-carbon world in 2050: What's at stake for heavy industries?

    International Nuclear Information System (INIS)

    2008-11-01

    Launched in 2004, the study Scenarios for transition towards a low-carbon world in 2050: What's at stake for heavy industries explores how major industrial sectors will be impacted by a carbon constraint stabilizing atmospheric CO 2 concentration at 450 ppm. By means of an innovative hybrid modelling platform and ongoing dialogue between researchers and industrialists, the study produces conclusions concerning both general climate policy as well as the economic response of industrial sectors - specifically of the steel, aluminium, cement, and sheet glass sectors, as well as of the energy sector. (authors)

  17. Seven thematic sheets 'solar and building' to understand the stakes of solar for the building industry

    International Nuclear Information System (INIS)

    2016-01-01

    In order to highlight the interest of solar energy for building for commissioning clients and public authorities, in terms of quality and competitiveness, this document proposes seven sheets which respectively address: the positive energy building, the development of solar energy in buildings with local authorities, photovoltaic self-consumption, the competitiveness of solar PV, an offer of quality by professionals of the solar PV, the competitiveness of solar heating. Each sheet proposes an overview of stakes, technical solutions, and local or professional commitment, and formulates some proposals for the future

  18. Energy policy: the stakes of a global overview. Synthesis of the afternoon works

    International Nuclear Information System (INIS)

    Destot, M.

    1999-10-01

    This document is a report of the debates that took place at the French national assembly in October 1999 concerning the French energy policy and more particularly the new electricity and gas directives, the energy choices, the development of renewable energies, the building of the future EPR European Pressurized water reactor, the development of more efficient transportation systems, the reduction of air pollution and the fight against the greenhouse effect, and the mastery of energy consumptions. This synthesis of the afternoon works reports on the point of views exchanged during the last round table of the day about the stakes of the opening of the European energy market (internationalization and decentralization of the electricity and natural gas markets). (J.S.)

  19. The stakes of the park management in the lasting quality

    International Nuclear Information System (INIS)

    Caseau, P.

    1996-01-01

    The goal of this paper is to surround the stakes of the management in the lasting quality and not to give a table of problems. The actual situation shows two characteristics; the profit margins in the nuclear industry are very small, the economic growth is small too. The advantage of the operating park on any other kind electric source is extremely strong. So it is important to keep the actual park even if operating and maintenance costs increase. If a forty years life time allows to go until 2020 and fifty years until 2030 it is possible to consider that the comparison 'installed park cost/any other production mean cost' leads to keep the actual park until 2015-2025. The first reason is an economic reason. The second reason is connected to what will happen after, that is to say the replacement conditions.To be able to define in the best conditions a new park, devoted to last 60 years or more, that is the second reason to manage the actual park in the lasting quality. (N.C)

  20. The impact of high-stakes, state-mandated student performance assessment on 10th grade English, mathematics, and science teachers' instructional practices

    Science.gov (United States)

    Vogler, Kenneth E.

    The purpose of this study was to determine if the public release of student results on high-stakes, state-mandated performance assessments influence instructional practices, and if so in what manner. The research focused on changes in teachers' instructional practices and factors that may have influenced such changes since the public release of high-stakes, state-mandated student performance assessment scores. The data for this study were obtained from a 54-question survey instrument given to a stratified random sample of teachers teaching at least one section of 10th grade English, mathematics, or science in an academic public high school within Massachusetts. Two hundred and fifty-seven (257) teachers, or 62% of the total sample, completed the survey instrument. An analysis of the data found that teachers are making changes in their instructional practices. The data show notable increases in the use of open-response questions, creative/critical thinking questions, problem-solving activities, use of rubrics or scoring guides, writing assignments, and inquiry/investigation. Teachers also have decreased the use of multiple-choice and true-false questions, textbook-based assignments, and lecturing. Also, the data show that teachers felt that changes made in their instructional practices were most influenced by an "interest in helping my students attain MCAS assessment scores that will allow them to graduate high school" and by an "interest in helping my school improve student (MCAS) assessment scores," Finally, mathematics teachers and teachers with 13--19 years of experience report making significantly more changes than did others. It may be interpreted from the data that the use of state-mandated student performance assessments and the high-stakes attached to this type of testing program contributed to changes in teachers' instructional practices. The changes in teachers' instructional practices have included increases in the use of instructional practices deemed

  1. The strategic industrial sectors of the green economy: stakes and perspectives

    International Nuclear Information System (INIS)

    Albertini, Jean-Paul; Larrieu, Catherine; Griot, Alain

    2013-03-01

    Proposing a transverse analysis and a synthesis, the first part of this voluminous report discusses the evolution of the context since 2009 for the green industry sector, outlines and comments the development stakes for the different sectors, analyses and comments their main evolutions for the last three years, outlines the development potential and perspectives of these activities in France, and proposes an overview of strategic policies implemented in the field of green economy in different countries (USA, Germany, United Kingdom, Japan, China, South Korea). The second part addresses the evolution and perspectives of each sector: energy production from renewable sources (biofuels, biomass, marine energies, wind energy, geothermal energy, solar energy), optimization of natural energy consumption (building with low environmental impact, green chemistry, hydrogen and fuel cells, biomaterials, optimization of industrial processes, smart grids, energy storage, low-carbon vehicles), natural resource life cycle management (CO 2 capture and storage, water, purification and ecologic engineering, metrology and instrumentation, recycling and waste valorization)

  2. Thorny roses: The motivations and economic consequences of holding equity stakes in financial institutions for China’s listed nonfinancial firms

    Directory of Open Access Journals (Sweden)

    Liping Xu

    2017-06-01

    Full Text Available The reforms of China’s financial system have significantly changed the country’s financial sector. One noteworthy phenomenon is that many nonfinancial firms have obtained equity stakes in financial institutions. This study investigates the motivations behind and economic consequences of this recent proliferation of investments in financial institutions by nonfinancial listed firms. We find that the motivations for holding equity stakes in financial institutions include alleviating the pressure of industry competition, reducing transaction costs, and diversification to reduce risk. These investments, however, have double-edged effects on the performance of the investing firms. While their investment income increases, their operating income and overall return on assets decrease, as the investment income cannot compensate for the decrease in other operating income. The investing firms’ cost of debt also increases, their cash-holding decreases, and stock price performance does not improve after investing in financial institutions. These effects contrast with the enthusiasm nonfinancial listed firms have for investing in financial institutions. The empirical findings in this study can inform financial industry regulators and decision-makers in listed firms. We advise nonfinancial firms to be cautious when considering investing in financial institutions.

  3. Canadian Public and Stake holder Engagement Approach to a Spent Nuclear Fuel Management

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Yong Soo; Kim, Youn Ok [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Whang, Joo Ho [Kyunghee University, Yongin (Korea, Republic of)

    2008-09-15

    After Canada has struggled with a radioactive waste problem over for 20 years, the Canadian government finally found out that its approach by far has been lack of social acceptance, and needed a program such as public and stake holder engagement (PSE) which involves the public in decision-making process. Therefore, the government made a special law, called Nuclear Fuel Waste Act (NFWA), to search for an appropriate nuclear waste management approach. NFWA laid out three possible approaches which were already prepared in advance by a nuclear expert group, and required Nuclear Waste Management Organization (NWMO) to be established to report a recommendation as to which of the proposed approaches should be adopted. However, NFWA allowed NWMO to consider additional management approach if the other three were not acceptable enough. Thus, NWMO studied and created a fourth management approach after it had undertaken an comparison of the benefits, risks and costs of each management approach: Adaptive Phased Management. This approach was intended to enable the implementers to accept any technological advancement or changes even in the middle of the implementation of the plan. The Canadian PSE case well shows that technological R and D are deeply connected with social acceptance. Even though the developments and technological advancement are carried out by the scientists and experts, but it is important to collect the public opinion by involving them to the decision-making process in order to achieve objective validity on the R and D programs. Moreover, in an effort to ensure the principles such as fairness, public health and safety, security, and adoptability, NWMO tried to make those abstract ideas more specific and help the public understand the meaning of each concept more in detail. Also, they utilized a variety of communication methods from face-to-face meeting to e-dialogue to encourage people to participate in the program as much as possible. Given the fact that Korea

  4. Canadian Public and Stake holder Engagement Approach to a Spent Nuclear Fuel Management

    International Nuclear Information System (INIS)

    Hwang, Yong Soo; Kim, Youn Ok; Whang, Joo Ho

    2008-01-01

    After Canada has struggled with a radioactive waste problem over for 20 years, the Canadian government finally found out that its approach by far has been lack of social acceptance, and needed a program such as public and stake holder engagement (PSE) which involves the public in decision-making process. Therefore, the government made a special law, called Nuclear Fuel Waste Act (NFWA), to search for an appropriate nuclear waste management approach. NFWA laid out three possible approaches which were already prepared in advance by a nuclear expert group, and required Nuclear Waste Management Organization (NWMO) to be established to report a recommendation as to which of the proposed approaches should be adopted. However, NFWA allowed NWMO to consider additional management approach if the other three were not acceptable enough. Thus, NWMO studied and created a fourth management approach after it had undertaken an comparison of the benefits, risks and costs of each management approach: Adaptive Phased Management. This approach was intended to enable the implementers to accept any technological advancement or changes even in the middle of the implementation of the plan. The Canadian PSE case well shows that technological R and D are deeply connected with social acceptance. Even though the developments and technological advancement are carried out by the scientists and experts, but it is important to collect the public opinion by involving them to the decision-making process in order to achieve objective validity on the R and D programs. Moreover, in an effort to ensure the principles such as fairness, public health and safety, security, and adoptability, NWMO tried to make those abstract ideas more specific and help the public understand the meaning of each concept more in detail. Also, they utilized a variety of communication methods from face-to-face meeting to e-dialogue to encourage people to participate in the program as much as possible. Given the fact that Korea

  5. Let's Poem: The Essential Guide to Teaching Poetry in a High-Stakes, Multimodal World (Middle through High School). Language & Literacy Practitioners Bookshelf

    Science.gov (United States)

    Dressman, Mark

    2010-01-01

    This cutting-edge guide presents multiple approaches to teaching poetry at the middle and high school levels. The author provides field-tested activities with detailed how-to instructions, as well as advice for how educators can "justify" their teaching within a high-stakes curriculum environment. "Let's Poem" will show pre- and inservice teachers…

  6. The Validity of Value-Added Estimates from Low-Stakes Testing Contexts: The Impact of Change in Test-Taking Motivation and Test Consequences

    Science.gov (United States)

    Finney, Sara J.; Sundre, Donna L.; Swain, Matthew S.; Williams, Laura M.

    2016-01-01

    Accountability mandates often prompt assessment of student learning gains (e.g., value-added estimates) via achievement tests. The validity of these estimates have been questioned when performance on tests is low stakes for students. To assess the effects of motivation on value-added estimates, we assigned students to one of three test consequence…

  7. 2009 public meetings: To inform and exchange ideas on the issues at stake

    CERN Multimedia

    Association du personnel

    2009-01-01

    The summer holidays are over. And like every year around this time the Staff Association comes to meet you in your Departments to inform you about the topics currently being discussed at CERN. We count very much on the exchange of views and opinions between you and us that takes place during these meetings. Once again in 2009 there are a wide range of topics to be discussed. If the stakes are generally high, this year and the next ones they are huge. This is an additional reason for the need to see a maximum number of motivated candidates stand at the forthcoming elections for the Staff Council in November 2009. For all these reasons and to help us prepare optimally for these critical deadlines, we invite all of you to attend our public meetings.

  8. What's at Stake in the Lives of People with Intellectual Disability? Part I: The Power of Naming, Defining, Diagnosing, Classifying, and Planning Supports

    Science.gov (United States)

    Schalock, Robert L.; Luckasson, Ruth

    2013-01-01

    This article focuses on the power of naming, defining, diagnosing, classifying, and planning supports for people with intellectual disability. The article summarizes current thinking regarding these five functions, states the essential question addressed by the respective function, and provides an overview of the high stakes involved for people…

  9. The Power Stakes Between those who Finance itThe New Managerial Models

    Directory of Open Access Journals (Sweden)

    Solomia Andres

    2009-10-01

    Full Text Available The paper presents the conceptual background and aspects concerning the governing that means the system by which the organizations are leaded and controlled, covering the ensemble of dispositions that allow the insurance that the objectives wanted by the managers are legitimate and the means put to work are adapted to reach these objectives. Considering that the presented models (Stareholder and Stakeholder are stakes of power between those who lead and those that finance the organization, the convergence of the European and international governing models and systems that involve the existence of some superior governing models, economically, socially and political efficient, the approach of these issues presents special interest being a challenge to Romanian economy. The globalization gives a plus to the convergence - pleading for the Stareholder model and the cultural differences plead for the resort to one of the Stakeholder model's variants.

  10. Inquiry-Based Instruction and High Stakes Testing

    Science.gov (United States)

    Cothern, Rebecca L.

    Science education is a key to economic success for a country in terms of promoting advances in national industry and technology and maximizing competitive advantage in a global marketplace. The December 2010 Program for International Student Assessment (PISA) ranked the United States 23rd of 65 countries in science. That dismal standing in science proficiency impedes the ability of American school graduates to compete in the global market place. Furthermore, the implementation of high stakes testing in science mandated by the 2007 No Child Left Behind (NCLB) Act has created an additional need for educators to find effective science pedagogy. Research has shown that inquiry-based science instruction is one of the predominant science instructional methods. Inquiry-based instruction is a multifaceted teaching method with its theoretical foundation in constructivism. A correlational survey research design was used to determine the relationship between levels of inquiry-based science instruction and student performance on a standardized state science test. A self-report survey, using a Likert-type scale, was completed by 26 fifth grade teachers. Participants' responses were analyzed and grouped as high, medium, or low level inquiry instruction. The unit of analysis for the achievement variable was the student scale score average from the state science test. Spearman's Rho correlation data showed a positive relationship between the level of inquiry-based instruction and student achievement on the state assessment. The findings can assist teachers and administrators by providing additional research on the benefits of the inquiry-based instructional method. Implications for positive social change include increases in student proficiency and decision-making skills related to science policy issues which can help make them more competitive in the global marketplace.

  11. "It's Important for Them to Know Who They Are": Teachers' Efforts to Sustain Students' Cultural Competence in an Age of High-Stakes Testing

    Science.gov (United States)

    Zoch, Melody

    2017-01-01

    This article examines how four urban elementary teachers designed their literacy instruction in ways that sought to sustain students' cultural competence--maintaining their language and cultural practices while also gaining access to more dominant ones--amid expectations to prepare students for high-stakes testing. A large part of their teaching…

  12. Sophisticated Epistemologies of Physics versus High-Stakes Tests: How Do Elite High School Students Respond to Competing Influences about How to Learn Physics?

    Science.gov (United States)

    Yerdelen-Damar, Sevda; Elby, Andrew

    2016-01-01

    This study investigates how elite Turkish high school physics students claim to approach learning physics when they are simultaneously (i) engaged in a curriculum that led to significant gains in their epistemological sophistication and (ii) subject to a high-stakes college entrance exam. Students reported taking surface (rote) approaches to…

  13. High Stakes Trigger the Use of Multiple Memories to Enhance the Control of Attention

    Science.gov (United States)

    Reinhart, Robert M.G.; Woodman, Geoffrey F.

    2014-01-01

    We can more precisely tune attention to highly rewarding objects than other objects in our environment, but how our brains do this is unknown. After a few trials of searching for the same object, subjects' electrical brain activity indicated that they handed off the memory representations used to control attention from working memory to long-term memory. However, when a large reward was possible, the neural signature of working memory returned as subjects recruited working memory to supplement the cognitive control afforded by the representations accumulated in long-term memory. The amplitude of this neural signature of working memory predicted the magnitude of the subsequent behavioral reward-based attention effects across tasks and individuals, showing the ubiquity of this cognitive reaction to high-stakes situations. PMID:23448876

  14. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  15. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  16. Electric power trading. The first study on stakes and consequences of power trading

    International Nuclear Information System (INIS)

    2000-06-01

    Power trading (purchase/sale of electricity on a stock exchange) is an emerging activity in continental Europe while it already came to maturity in the US, in the UK and in Scandinavia. Several stock exchanges have opened since 1988, in particular in Germany, Spain and in The Netherlands. New projects of creation are under study, except in France where public authorities remain reticent with respect to this evolution. Power trade is deeply overturning the organization of power markets with offering an alternative to the direct supply from producers and distributors. This study presents the functioning modes of the main stock exchanges in operation today. It analyzes the stakes of power trade for all intervening parties of the market (historical actors, newcomers and consumers). The situation and the strategic behaviour of 12 key-actors of the power sector are also examined. (J.S.)

  17. The Kyoto protocol: assessment and perspectives. Towards a new regime up to the climate stake

    International Nuclear Information System (INIS)

    Gautier, Celia

    2012-01-01

    This report proposes an analysis within the context of transition of the climate regime from the 'before-2012' regime to the 'post-2020' regime. It first gives an overview of international stakes and context (lack of ambition for climate policy, perspective of an international agreement from 2020). Then, the authors recall the history and achievements of the Kyoto protocol which is the basis of the present climate policy regime. They propose an assessment of actions performed by countries during the first period of the protocol, and focus on the present climate regime elements which are to be safeguarded. They analyse the weaknesses of the present regime, and propose possible improvements for the future post-2020 climate regime

  18. The Validity and Incremental Validity of Knowledge Tests, Low-Fidelity Simulations, and High-Fidelity Simulations for Predicting Job Performance in Advanced-Level High-Stakes Selection

    Science.gov (United States)

    Lievens, Filip; Patterson, Fiona

    2011-01-01

    In high-stakes selection among candidates with considerable domain-specific knowledge and experience, investigations of whether high-fidelity simulations (assessment centers; ACs) have incremental validity over low-fidelity simulations (situational judgment tests; SJTs) are lacking. Therefore, this article integrates research on the validity of…

  19. Reduction of emissions and geological storage of CO2. Innovation an industrial stakes

    International Nuclear Information System (INIS)

    Mandil, C.; Podkanski, J.; Socolow, R.; Dron, D.; Reiner, D.; Horrocks, P.; Fernandez Ruiz, P.; Dechamps, P.; Stromberg, L.; Wright, I.; Gazeau, J.C.; Wiederkehr, P.; Morcheoine, A.; Vesseron, P.; Feron, P.; Feraud, A.; Torp, N.T.; Christensen, N.P.; Le Thiez, P.; Czernichowski, I.; Hartman, J.; Roulet, C.; Roberts, J.; Zakkour, P.; Von Goerne, G.; Armand, R.; Allinson, G.; Segalen, L.; Gires, J.M.; Metz, B.; Brillet, B.

    2005-01-01

    An international symposium on the reduction of emissions and geological storage of CO 2 was held in Paris from 15 to 16 September 2005. The event, jointly organized by IFP, ADEME and BRGM, brought together over 400 people from more than 25 countries. It was an opportunity to review the international stakes related to global warming and also to debate ways of reducing CO 2 emissions, taking examples from the energy and transport sectors. The last day was dedicated to technological advances in the capture and geological storage of CO 2 and their regulatory and economic implications. This document gathers the available transparencies and talks presented during the colloquium: Opening address by F. Loos, French Minister-delegate for Industry; Session I - Greenhouse gas emissions: the international stakes. Outlook for global CO 2 emissions. The global and regional scenarios: Alternative scenarios for energy use and CO 2 emissions until 2050 by C. Mandil and J. Podkanski (IEA), The stabilization of CO 2 emissions in the coming 50 years by R. Socolow (Princeton University). Evolution of the international context: the stakes and 'factor 4' issues: Costs of climate impacts and ways towards 'factor 4' by D. Dron (ENS Mines de Paris), CO 2 emissions reduction policy: the situation in the United States by D. Reiner (MIT/Cambridge University), Post-Kyoto scenarios by P. Horrocks (European Commission), Possibilities for R and D in CO 2 capture and storage in the future FP7 program by P. Fernandez Ruiz and P. Dechamps (European Commission). Session II - CO 2 emission reductions in the energy and transport sectors. Reducing CO 2 emissions during the production and conversion of fossil energies (fixed installations): Combined cycles using hydrogen by G. Haupt (Siemens), CO 2 emission reductions in the oil and gas industry by I. Wright (BP). Reducing CO 2 emissions in the transport sector: Sustainable transport systems by P. Wiederkehr (EST International), The prospects for reducing

  20. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  1. The liberalization of the European electric and gas industries through the firms' M and A and investment strategies: propositions for a better energy security

    International Nuclear Information System (INIS)

    Benhassine, W.

    2009-04-01

    The electric and gas industries have been traditionally managed by public monopolies. The post World War II context was supportive to such an industrial organization. In fact, Europe was getting engaged in a long period of economic growth and was benefiting a favorable energetic context. At the end of the 90's, Europe decides to liberalize the national energy industries in order to create a unique European energy market. This liberalization has occurred in a context that as dramatically changed from the economic and energetic perspective. Indeed, the globalization phenomenon has strengthened the competitiveness of the emerging economies. The strong growth of the energy demand and the stagnation of the supply on the offer side have created tensions which have been increasingly frequent and important on the energy markets. Besides, facing greater budget restrictions and financial difficulties, the states have wished to get financially disengaged from these industries. Many factors show that the economic and energetic context will not get better in the next decades. Hence, in this new context, the liberalization of the energy industries should respond to two major stakes for the energy security of the European countries: the sustainability of the investments and the control of the energy demand. After having studied the merger and investment strategies of the energy firms, operating within a freshly liberalized sector, we make some propositions to draw up a new industrial organization which would allow a more efficient response to these two stakes. (author)

  2. "I Like to Read, but I Know I'm Not Good at It": Children's Perspectives on High-Stakes Testing in a High-Poverty School

    Science.gov (United States)

    Dutro, Elizabeth; Selland, Makenzie

    2012-01-01

    A significant body of research articulates concerns about the current emphasis on high-stakes testing as the primary lever of education reform in the United States. However, relatively little research has focused on how children make sense of the assessment policies in which they are centrally located. In this article, we share analyses of…

  3. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  4. Stake holders involvement in emergency preparedness

    International Nuclear Information System (INIS)

    Oudiz, A.

    2002-01-01

    The management of a nuclear crisis involves many actors apart from the radiation protection and nuclear safety experts. More than stakeholders involvement, what is at stake is a better co-operation and mutual understanding amongst the various actors. This mutual understanding requires that a minimal common nuclear risk culture exists. Presently, in France, the representation of the nuclear risk is split into two clear-cut misconceptions: risk denial or catastrophe, with almost nothing in between. In order to contribute to building progressively a common nuclear risk culture, the information about the risk and its management needs to be discussed and criticized by various actors, including non institutional actors who play an important role for the diffusion of the risk culture. Hence, IPSN decided in year 2000 to elaborate a specific feature allowing information and debate on the nuclear risk and its short and long terms management. It will take the form of a CD-ROM, which is currently elaborated by a task group taking into account: - the 'social expectancies', as they have been identified by a sociologist, - the available documents about the nuclear risk, the crisis and its management, which were analysed. The analysis shows that there is a need for a new type of feature. The feature contains first a common bulk which addresses all types of nuclear accidents and then, specific developments for each type of accidents occurring in different nuclear installations. Specialists in CD-ROM design are involved in the project. It is very important to design the structure of the CD-ROM in such a way as it presents the technical information in an understandable manner for non-specialists. This CD-ROM, which should be widely distributed and will serve as a support for debates, may contribute to building up progressively a common risk culture. It should help to aim at a better mutual understanding between experts and lay people whose points of view about the nuclear risk

  5. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  6. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  7. Caucasus and the petroleum stakes of Caspian Sea; Le Caucase et les enjeux petroliers de la Mer Caspienne

    Energy Technology Data Exchange (ETDEWEB)

    Jalillosoltan, N. [Universite de Franche Comte, 25 - Montbeliard (France); Faculte de Droit de Besancon, 25 (France)

    2001-07-01

    The splitting of the former USSR block in 1991 has generated a shock wave in the Caucasus area with the will of all ex-soviet republics to reach their complete independence. Because of the historical and geographical complexity of Caucasus, both geopolitical and human, this disorder has generated even more hazardous results, enhanced by the coveted oil and gas reserves of the Caspian Sea. This article analyses the petroleum stakes as factors of rivalry and instability (sovereignty of oil and gas fields, rivalries about the exploitation and transport of hydrocarbons), but also as factors of cooperation and re-composition. (J.S.)

  8. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  9. Società sicure e mutamento sociale: possibili sfide per il futuro/Secure societies and social changes: possible challenges in the future

    Directory of Open Access Journals (Sweden)

    Sette Raffaella

    2014-06-01

    Full Text Available L’obiettivo di questo articolo è quello di focalizzare l’attenzione su possibili strategie di intervento nell'ambito del settore correlato alla sicurezza urbana. Il punto di partenza riguarda l’impatto del mutamento sociale sullo spazio urbano relativamente alla sicurezza, uno degli argomenti al centro delle politiche e della ricerca dell’Unione Europea fino al 2020. L’autrice intende, in particolare, analizzare alcuni dei fattori che attualmente giocano un ruolo di primaria importanza nelle dinamiche di sicurezza/insicurezza, tra i quali: la crisi economica globale, che sta producendo una vasta serie di cambiamenti sulle strutture non solo economiche, ma anche politiche, sociali e culturali delle società contemporanee; l'infiltrazione della criminalità organizzata mafiosa nel tessuto socio-economico di svariati territori; i fenomeni dell'immigrazione e dell'invecchiamento della popolazione; la questione giustizia con particolare riferimento al reinserimento sociale dei detenuti. Infine, vengono proposti interventi e progettualità concreti per lo sviluppo di forme di interazione e di solidarietà sul territorio che mirino al riconoscimento della pluralità delle identità culturali e personali. Cet article a pour but d'indiquer des stratégies d’intervention possibles dans le domaine de la sécurité urbaine. Le point de départ est celui de l’impact du changement social sur l’espace urbain en matière de sécurité. Il s’agit de l’un des thèmes clés des politiques et de la recherche de l’Union Européenne jusqu’en 2020. L’auteur analyse certains facteurs qui jouent un rôle majeur dans les dynamiques de la sécurité/insécurité, parmi lesquels : la crise économique mondiale qui produit actuellement de profonds changements non seulement dans le domaine politique mais aussi dans les domaines économiques et sociaux ; l’infiltration du crime organisé mafieux dans la structure socio-économique de diff

  10. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  11. Salinity a Serious Threat to Food Security – Where Do We Stand?

    International Nuclear Information System (INIS)

    Zaman, M.; Shahid, Shabbir A; Pharis, Richard P.

    2016-01-01

    Over the past many years, overexploitation has shrunk the soil resources to an unprecedented level and there is great concern that it may not be able to provide the needed food to mankind in future, especially the food for the growing population. This shows that we are using soil resources as they are inexhaustible, continuing withdrawing from an account but never paying in and thus jeopardizing our and our children future. Thus soil resources are at the stake of diminishing capacity for ecosystem services including food production. Increasing human population, demographic pressures, climate change, increased competition between land and water resources, water scarcity, land degradation by salinity are likely to increase vulnerability to food security. The Food and Agricultural Organization (FAO) of the United Nations jointly with International Technical Panel on Soils (ITPS) has published the first-ever comprehensive report “status of the world’s soil resources” and the overwhelming conclusion drawn is very astonishing “the majority of the world’s soil resources are in only fair, poor or very poor conditions…” and conditions are getting worse in far more cases than they are improving. It also states that further loss of productive soils will seriously damage food production and food security, amplify food price volatility, and potentially plunge millions of people into hunger and poverty. Globally 33 percent land is in the state of degradation. The report offers evidence that this loss of soil resources and functions can be avoided (FAO and ITPS 2015). The latter part of the above quote gave hope; however, the question is how this damage can be reversed.

  12. Adaptation à la variabilité du climat et aux changements climatiques ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    25 avr. 2014 ... ... l'équipe évalue la disponibilité et la qualité de l'eau, les pressions de l'offre et de ... En ce qui concerne l'offre, les chercheurs étudient l'évolution de la .... Water management and food security in vulnerable regions of China.

  13. Une année d’immersion dans un dispositif de formation aux technologies : prise de conscience du potentiel éducatif des TICE, intentions d’action et changement de pratique

    Directory of Open Access Journals (Sweden)

    Daniel Peraya

    2012-01-01

    Full Text Available Cette contribution traite des effets d’un dispositif de formation hybride destiné à des étudiants de première année de psychologie et des sciences de l’éducation. La recherche se base sur une analyse qualitative de 66 rapports réflexifs d’étudiants rédigés dans le cadre d’un dispositif dont l’approche pédagogique se veut immersive et située. Cette approche favorise une meilleure compréhension du potentiel des TICE (médiation épistémique ainsi que, dans certains cas, un changement d’attitude par rapport à celles-ci (médiation posturale et, dans d’autres cas, un transfert d’usage à diverses sphères d’activité : académique, professionnelle ou personnelle (médiation praxéologique.

  14. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  15. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  16. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  17. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  18. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  19. Staking-out projected boundaries of natural property Vršac Mountains using the RTK GPS/glonass method

    Directory of Open Access Journals (Sweden)

    Gučević Jelena

    2012-01-01

    Full Text Available The existing topographic and cadastral maps of the former Yugoslav republics are in Gauss-Krüger projection on Bessel ellipsoid. For the collected GPS data to comply with the existing cartographic material, it is necessary to provide the transformation parameters from WGS84 to Bessel ellipsoid and according to the principles of cartographic mapping, to make mappings in the plane of the State Coordinate System (SCS. The aim of this research is to present the surveying activities necessary for the establishment and maintenance of digital cartographic basis, which is shown in the test area of “VRŠAC MOUNTAINS”, a Serbian region with outstanding characteristics. In order to establish a connection between the collected data, it is necessary to primarily calculate the parameters of transformation from WGS84 into the SCS. After the vectorisation of projected boundaries from bases made in the SCS, the transformation of vectorised boundary lines from SCS into the WGS84 is carried out, followed by staking the boundaries. To understand the fundamental differences in the methodology of using GPS receivers, it is important to emphasise that the concept of GPS determination of the coordinates is generally divided into absolute and relative positioning. If the correct procedure of GPS positioning, applied to certain environmental conditions, is not followed, the error up to 200 m could be expected. Conclusions are drawn about the selection of staking methods, related to the applied instruments and specific field conditions. The stakeout procedures are given in accordance with the principles of geodetic positioning. [Projekat Ministarstva nauke Republike Srbije, br. 043007: Istraživanje klimatskih promena i njihovog uticaja na životnu sredinu: praćenje uticaja, adaptacija i ublažavanje

  20. The impact of language and high-stakes testing policies on elementary school English language learners in Arizona.

    Directory of Open Access Journals (Sweden)

    Wayne E. Wright

    2006-05-01

    Full Text Available This article reports the results of a survey of third-grade teachers of English Language Learners (ELLs in Arizona regarding school language and accountability policies—Proposition 203, which restricts bilingual education and mandates sheltered English Immersion; the federal No Child Left Behind Act of 2001 (NCLB; and Arizona LEARNS, the state’s high-stakes testing and accountability program. The instrument, consisting of 126 survey questions plus open-ended interview question, was designed to obtain teacher’s views, to ascertain the impact of these polices, and to explore their effectiveness in improving the education of ELL students. The survey was administered via telephone to 40 teacher participants from different urban, rural and reservation schools across the state. Each participant represents the elementary school in their respective school district which has the largest population of ELL students. Analyses of both quantitative and qualitative data reveal that these policies have mostly resulted in confusion in schools throughout the state over what is and is not allowed, and what constitutes quality instruction for ELLs, that there is little evidence that such policies have led to improvements in the education of ELL students, and that these policies may be causing more harm than good. Specifically, teachers report they have been given little to no guidance over what constitutes sheltered English immersion, and provide evidence that most ELL students in their schools are receiving mainstream sink-or-swim instruction. In terms of accountability, while the overwhelming majority of teachers support the general principle, they believe that high-stakes tests are inappropriate for ELLs and participants provided evidence that the focus on testing is leading to instruction practices for ELLs which fail to meet their unique linguistic and academic needs. The article concludes with suggestions for needed changes to improve the quality of

  1. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  2. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  3. Social Perception of Hydrogen Technologies: The View of Spanish Stake holders; Percepcion Social de las Tecnologias del Hidrogeno. La Vision de los Stakeholders Espanoles

    Energy Technology Data Exchange (ETDEWEB)

    Ferri Anglada, S.

    2013-07-01

    This technical report presents an overview of the social perception and vision of a sample of Spanish stake holders on hydrogen technologies. The study is based on the implementation of a survey, combining both quantitative and qualitative data. An ad hoc electronic survey was design to collect views and perceptions on several key factors regarding this innovative energy alternative. The group of experts participating (N=130) in the study, comes mainly from research centers, universities and private companies. The survey addresses three major themes: expert views, social acceptability, and contextual factors of hydrogen technologies. The aim is to capture both the current and the future scene as viewed by the experts on hydrogen technologies, identifying key factors in terms of changes, uncertainties, obstacles and opportunities. The objective is to identify potential key features for the introduction, development, promotion, implementation, and large-scale deployment of a highly successful energy proposal in countries such as Iceland, one of the pioneers in base its economy on hydrogen technologies. To conclude, this report illustrates the positive engagement of a sample of Spanish stake holders towards hydrogen technologies that may prove vital in the transition towards the Hydrogen Economy in Spain. (Author)

  4. A moderated mediated path analysis of factors influencing student performance on a standardized high-stakes science test

    Science.gov (United States)

    Pelkey, Ramona K.

    Gender, ethnicity, family economic status, reading score, mathematics score, and number of science semesters successfully completed were examined for their contributory role to a student's science score on a high-stakes, high school exit examination. Path analysis and analysis of variance procedures were used to quantify each variable's influence on science score. Gender, ethnicity, and family economic status were found to be moderators while reading proved to mediate within the model. The path model was created using a calibration sample and cross-validated using a hold-out validation sample. Bootstrapping was used to verify the goodness of fit of the model. A predictive equation explained 66% (R2 = .66) of the variance in observed TAKS science score.

  5. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  6. Strategy for research, development and demonstration regarding hydrogen technology in Denmark. Phase 1 - Background and appendix report; Strategi for forskning, udvikling og demonstration vedroerende brintteknologi i Danmark. Fase 1 - Baggrunds- og bilagsrapport

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-08-01

    Hydrogen as an energy carrier is rapidly ascending the international energy and research political agenda. Around the world great things are expected from hydrogen as a future solution to the challenges within the energy and transport sector. Staking on hydrogen is tightly connected to security of supply and to climatic and environmental issues. The oil production will peak within the next decades and at the same time the energy demand will rise. A significant reason for using hydrogen as an energy carrier is to locate alternatives to fossil fuels, hereby securing future energy supplies. Furthermore, hydrogen is a clean energy carrier and will contribute to a reduction of greenhouse gas emission and local pollution. Finally, staking on hydrogen might create interesting high-tech business sectors benefiting job creation and economic growth. (BA)

  7. World governance for energy

    International Nuclear Information System (INIS)

    Kerebel, C.; Keppler, J.H.

    2009-01-01

    As energy is a strategic stake for industrial societies through supply security, economical competitiveness and environmental performance, it is well-founded and useful to consider the way that energy production and consumption are organized. This document introduces the notion of energy governance and its different interpretations, then analyses its stakes and challenges (petroleum, natural gas, investment needs), and discusses some of the debates already in progress, such as the UNO's negotiations on greenhouse gas emission reduction or the impact of the WTO talks on energy exchanges

  8. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  9. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  10. The Perceived Value of Maths and Academic Self-Efficacy in the Appraisal of Fear Appeals Used Prior to a High-Stakes Test as Threatening or Challenging

    Science.gov (United States)

    Putwain, David William; Symes, Wendy

    2014-01-01

    Previous work has examined how messages communicated to students prior to high-stakes exams, that emphasise the importance of avoiding failure for subsequent life trajectory, may be appraised as threatening. In two studies, we extended this work to examine how students may also appraise such messages as challenging or disregard them as being of…

  11. The socio-technical setting of economic stakes of global environment risks

    International Nuclear Information System (INIS)

    Salles, J.M.

    1993-01-01

    For policy-making for fighting acid rain, protecting the ozone layer and initiating action to prevent global climate change related to the growth of the greenhouse effect, the economic approach requires more precise consideration of how the economic stakes attached to these threats have been built up by their social actors. Global environmental risks (GER) are not directly perceivable nor can they be easily related to any activity or phenomena at local level (in time or space). There are scientific controversies about the reality of damage and establishing credible responsibility links. Moreover, these controversies are brought to media and social debate before any scientific clarification is possible. The media representations of GER emphasize the fact they could have catastrophic and irreversible consequences. So, the social demand for public action becomes very heavy when delay, possibly of several years between the causes and consequences of global environmental change, prevents any rapid clarification in the controversies. These difficulties have led to the evolution of a decision process in several steps: firstly, an international convention is prepared in which signatory countries commit themselves to cooperate and to take action; secondly, one or several agreements are signed with clear technical objectives and a timetable for implementations. 23 refs

  12. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  13. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  14. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  15. Cognitive Psychology and Low-Stakes Testing without Guarantees

    Science.gov (United States)

    Dennis, Nick

    2016-01-01

    The emphasis on the power of secure substantive knowledge reflected in recent curriculum reforms has prompted considerable interest in strategies to help students retain and deploy such knowledge effectively. One strategy that has been strongly endorsed by some cognitive psychologists is regular testing; an idea that Nick Dennis set out to test…

  16. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  17. School-based assessments in high-stakes examinations in Bhutan: a question of trust? : exploring inconsistencies between external exam scores, school-based assessments, detailed teacher ratings, and student self-ratings

    NARCIS (Netherlands)

    Luyten, Johannes W.; Dolkar, Dechen

    2010-01-01

    This study explores the validity of school-based assessments when they serve to supplement scores on central tests in high-stakes examinations. The school-based continuous assessment (CA) marks are compared to the marks scored on the central written Bhutan Certificate of Secondary Education (BCSE)

  18. Multiple aspects of climate change - Summary of presentations; Les multiples facettes du changement climatique - Resume des presentations

    Energy Technology Data Exchange (ETDEWEB)

    Andre, Jean-Claude; Bauer, Pierre; Le Treut, Herve [Institut Pierre Simon Laplace, 78280 Guyancourt Cedex (France); Woeppelmann, Guy [Universite de la Rochelle, 17000 La Rochelle (France); Kouraev, Alexei; Remy, Frederique; Berthier, Etienne [Legos, 31401 Toulouse cedex 9 (France); Lehodey, Patrick [CLS, 31520 Ramonville St Agne (France); Lebourgeois, Francois [ENGREF, AgroParisTech, 54042 Nancy Cedex (France); Chuine, Isabelle [CEFE, CNRS, Montpellier (France); Vennetier, Michel [CEMAGREF, 13182 Aix en Provence cedex 5 (France); Duchene, Eric [INRA-Universite de Strasbourg, 68021 Colmar Cedex (France); Lafaye, Murielle [CNES, 31401 Toulouse cedex 9 (France)

    2011-08-15

    The French Meteorological Society (SMF) organized its annual scientific day on March 23, 2011 on the topic of the multiple aspects of climate change. The aim was to take stock of the lessons learnt from the different meteorological markers in several domains (agriculture, forests, ecosystems, rise of sea level, changes in marine biodiversity, health, snow and ice caps..). This paper summarizes the seven presentations given at this meeting: 1 - climate change today and tomorrow (H. Le Treut); 2 - rise of oceans level: estimations and regional variability (G. Woeppelmann); 3 - polar caps and continental cryo-sphere as seen from space (A. Kouraev, F. Remy and E. Berthier); 4 - impact of climate change on exploited marine populations: projections and uncertainties (P. Lehodey); 5 - stakes of climate change on agricultural and winery activities in France (E. Duchene); 6 - impact of climate change on forest trees phenology and consequence on their survival and operation (F. Lebourgeois, I. Chuine and M. Vennetier); 7 - 'tele-epidemiology': a health-aid in a climate change context. (J.S.)

  19. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  20. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  1. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  2. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  3. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  4. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  5. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  6. Capture and geological storage of CO2. Innovation, industrial stakes and realizations

    International Nuclear Information System (INIS)

    Lavergne, R.; Podkanski, J.; Rohner, H.; Otter, N.; Swift, J.; Dance, T.; Vesseron, Ph.; Reich, J.P.; Reynen, B.; Wright, L.; Marliave, L. de; Stromberg, L.; Aimard, N.; Wendel, H.; Erdol, E.; Dino, R.; Renzenbrink, W.; Birat, J.P.; Czernichowski-Lauriol, I.; Christensen, N.P.; Le Thiez, P.; Paelinck, Ph.; David, M.; Pappalardo, M.; Moisan, F.; Marston, Ph.; Law, M.; Zakkour, P.; Singer, St.; Philippe, Th.; Philippe, Th.

    2007-01-01

    The awareness of the international community and the convergence of scientific data about the global warming confirm the urgency of implementing greenhouse gases abatement technologies at the world scale. The growth of world energy demand will not allow to rapidly get rid of the use of fossil fuels which are the main sources of greenhouse gases. Therefore, the capture and disposal of CO 2 is a promising way to conciliate the use of fossil fuels and the abatement of pollutants responsible for the global warming. The economical and industrial stakes of this technique are enormous. In front of the success of a first international colloquium on this topic held in Paris in 2005, the IFP, the BRGM and the Ademe have jointly organized a second colloquium in October 2007, in particular to present the first experience feedbacks of several pilot experiments all over the world. This document gathers the transparencies of 27 presentations given at this colloquium and dealing with: the 4. IPCC report on the stakes of CO 2 capture and storage; the factor 4: how to organize the French economy transition from now to 2050; the technology perspectives, scenarios and strategies up to 2050; the European technological platform on 'zero-emission thermal plants'; the CO 2 capture and storage road-map in the USA; research, development and implementation of CO 2 capture and storage in Australia; the Canadian experience; ten years of CO 2 capture and storage in Norway; the In Salah operations (Algeria); CO 2 capture and storage: from vision to realisation; the oxi-combustion and storage pilot unit of Lacq (France); the Altmark gas field (Germany): analysis of CO 2 capture and storage potentialities in the framework of a gas assisted recovery project; oil assisted recovery and CO 2 related storage activities in Brazil: the Buracica and Miranga fields experience; carbon capture and storage, an option for coal power generation; steel-making industries and their CO 2 capture and storage needs

  7. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  8. Modélisation du changement d’échelles en télédétection par une méthode neuronale : application a l’étude de l’évolution de l’occupation hivernale des sols en Bretagne

    Directory of Open Access Journals (Sweden)

    Thomas Houet

    2004-05-01

    Full Text Available Le suivi de la couverture hivernale des sols constitue un des principaux enjeux de la réduction de la pollution de la ressource en eau en Bretagne, la présence de la végétation entravant les transferts de flux polluants vers les cours d’eau. Le suivi du ratio « sols nus / sols couverts » peut être réalisé à l’aide d’instruments satellitaires de façon quotidienne à une échelle régionale, mais à une résolution spatiale grossière par des capteurs de type SPOT VEGETATION (1 km. Il peut également être effectué à une résolution spatiale fine par des capteurs tel que SPOT HRVIR (20 m mais avec une acquisition d’images une ou deux fois par hiver seulement sur un territoire plus limité. Toute évolution de ce ratio, détectée à l’échelle régionale, peut être issue de variations de la couverture hivernale des sols, mais également de l’influence de facteurs climatiques. Les changements observés doivent alors être validés par une analyse à l’échelle locale. Le lien entre les images des deux capteurs est établi à partir du développement d’une méthode neuronale basée sur une carte de Kohonen. L’originalité de cette méthode réside dans l’utilisation de la dimension temporelle pour résoudre ce problème de changement d’échelles.

  9. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  10. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  11. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  12. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  13. Hierarchical cultural values predict success and mortality in high-stakes teams

    Science.gov (United States)

    Anicich, Eric M.; Swaab, Roderick I.; Galinsky, Adam D.

    2015-01-01

    Functional accounts of hierarchy propose that hierarchy increases group coordination and reduces conflict. In contrast, dysfunctional accounts claim that hierarchy impairs performance by preventing low-ranking team members from voicing their potentially valuable perspectives and insights. The current research presents evidence for both the functional and dysfunctional accounts of hierarchy within the same dataset. Specifically, we offer empirical evidence that hierarchical cultural values affect the outcomes of teams in high-stakes environments through group processes. Experimental data from a sample of expert mountain climbers from 27 countries confirmed that climbers expect that a hierarchical culture leads to improved team coordination among climbing teams, but impaired psychological safety and information sharing compared with an egalitarian culture. An archival analysis of 30,625 Himalayan mountain climbers from 56 countries on 5,104 expeditions found that hierarchy both elevated and killed in the Himalayas: Expeditions from more hierarchical countries had more climbers reach the summit, but also more climbers die along the way. Importantly, we established the role of group processes by showing that these effects occurred only for group, but not solo, expeditions. These findings were robust to controlling for environmental factors, risk preferences, expedition-level characteristics, country-level characteristics, and other cultural values. Overall, this research demonstrates that endorsing cultural values related to hierarchy can simultaneously improve and undermine group performance. PMID:25605883

  14. Securing Land Tenure, Improving Food Security and Reducing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  15. Gaz de France and the sustainable development in 2005; Gaz de France et le developpement durable en 2005

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    This booklet provides information on the Gaz de France group involvement in the sustainable development: the stakes, the approach, the energy challenge answers, the security and the solidarity and the active part in the territories development. (A.L.B.)

  16. Gaz de France and the sustainable development in 2005

    International Nuclear Information System (INIS)

    2006-01-01

    This booklet provides information on the Gaz de France group involvement in the sustainable development: the stakes, the approach, the energy challenge answers, the security and the solidarity and the active part in the territories development. (A.L.B.)

  17. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  18. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  19. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  20. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  1. Enterprise Mac Security Mac OS X Snow Leopard Security

    CERN Document Server

    Edge, Stephen Charles; Hunter, Beau; Sullivan, Gene; LeBlanc, Dee-Ann

    2010-01-01

    A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing s

  2. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  3. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  4. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  5. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  6. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  7. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  8. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  9. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  10. Securing the Cloud Cloud Computer Security Techniques and Tactics

    CERN Document Server

    Winkler, Vic (JR)

    2011-01-01

    As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o

  11. Expectations of stake holders voice from the location

    International Nuclear Information System (INIS)

    Shinada, H.

    2007-01-01

    In this presentation, the expectations for transparency of the nuclear regulatory authorities are discussed from the viewpoint of a local government, where the nuclear power station is sited. Since the problems yet to be solved by the local government, are visibly existent right in front of our eyes, both the policy information and the technical information required for that purpose must he altogether trustworthy. Consequently, established transparency of the regulatory authorities is also an extremely important point for the local government. To begin with, the outline of Kariwa-mura, Kariwa-gun, Niigata Prefecture, where I myself serve as village mayor, the overview of the Kashiwazaki-Kariwa Nuclear Power Station and the relationship between Kariwa-mura and the power station are explained. Next in place, the peculiarity of Kariwa-mura involved in the nuclear power station will be mentioned after defining the transparency required in relation to the regulations in order to clarify in what respect we are seeking accountability from the regulatory authorities. In conclusion, the roles of the local residents (local government) involved in the nuclear safety regulations are discussed introducing the 'Regional Association for Securing the Transparency of Kashiwazaki Nuclear Power Station' as an sure example to the solution for securing transparency. (author)

  12. Syrian Refugees: Are They a Non Traditional Threat to Water Supplies in Lebanon and Jordan

    Science.gov (United States)

    2016-09-01

    effects of Syrian refugees on the water supplies of each country as a non-traditional security threat. Political stability is the ultimate goal of each...security.html. 11 against Syrians sets the stage for political instability because the Syrians represent an increasing portion of the population, if...of political instability could send shockwaves through the region and drastically alter U.S. foreign policy in the Middle East. Though the stakes

  13. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  14. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  15. CO2 emissions abatement and geologic sequestration - industrial innovations and stakes - status of researches in progress

    International Nuclear Information System (INIS)

    2005-01-01

    This colloquium was jointly organized by the French institute of petroleum (IFP), the French agency of environmental and energy mastery (Ademe) and the geological and mining research office (BRGM). This press kit makes a status of the advances made in CO 2 emissions abatement and geological sequestration: technological advances of CO 2 capture and sequestration, geological reservoir dimensioning with respect to the problem scale, duration of such an interim solution, CO 2 emissions abatement potentialities of geological sequestration, regulatory, economical and financial implications, international stakes of greenhouse gas emissions. This press kit comprises a press release about the IFP-Ademe-BRGM colloquium, a slide presentation about CO 2 abatement and sequestration, and four papers: a joint IFP-Ademe-BRGM press conference, IFP's answers to CO 2 emissions abatement, Ademe's actions in CO 2 abatement and sequestration, and BRGM's experience in CO 2 sequestration and climatic change expertise. (J.S.)

  16. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  17. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  18. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  19. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    OpenAIRE

    Sen-Tarng Lai

    2015-01-01

    E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...

  20. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  1. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  2. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  3. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  4. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  5. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  6. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  7. Stakes and modalities of the climatic risk covering; Enjeu et modalites de la couverture du risque climatique

    Energy Technology Data Exchange (ETDEWEB)

    Marteau, D

    2006-07-01

    Several econometric works show that climatic volatility is at the first rank of the risk factors in several economic sectors like energy, textile, agriculture and food, tourism, leisure, building industries etc. However, climate remains an underestimated economic factor for several reasons: lack of awareness about the comparative stakes of climate risks management and market risks management, difficulties in the measurement of climate risk exposure, weak knowledge of covering techniques for private contract and organized markets, and unsolved question of risk sharing between shareholders and managers. This document analyzes the sensitivity of companies with respect to climate risk and describes the 5 steps of implementation of a climate covering policy: risk exposure measurement, risk bearing or transfer decision, definition of the optimum covering profile, choice of markets and covering instruments, efficiency measurement. A practical example is shown with its related questions. (J.S.)

  8. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  9. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  10. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2000-01-01

    An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions to provide an adequate and appropriate level of security.Information Security Architecture: An Integrated Approach to Security in the Organization details the five key components of an information security architecture. It provides C-level executives

  11. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  12. Security threads: effective security devices in the past, present, and future

    Science.gov (United States)

    Wolpert, Gary R.

    2002-04-01

    Security threads were first used to secure banknotes in the mid 1800's. The key to their anti-counterfeiting success was the fact that by being embedded in the paper, they became an integral part of the banknote substrate. Today, all major currencies still utilize this effective security feature. Technological developments have allowed security threads to evolve from a feature authenticated by only visual means to devices that incorporate both visual and machine detectable components. When viewed from the perspective of a thread being a carrier of various security technologies and the fact that they can be incorporated into the core substrate of banknotes, documents, labels, packaging and some high valued articles, it is clear that security threads will remain as effective security devices well into the future. This paper discusses a brief historical background of security threads, current visual and machine authentication technologies incorporated into threads today and a look to the future of threads as effective security devices.

  13. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  14. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  15. Obsessive-Compulsive Homeland Security: Insights from the Neurobiological Security Motivation System

    Science.gov (United States)

    2018-03-01

    HOMELAND SECURITY: INSIGHTS FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM by Marissa D. Madrigal March 2018 Thesis Advisor...FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM 5. FUNDING NUMBERS 6. AUTHOR(S) Marissa D. Madrigal 7. PERFORMING ORGANIZATION NAME(S) AND...how activation of the neurobiological security- motivation system can lead to securitization in response to a security speech act. It explores the model

  16. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  17. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  18. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  19. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  20. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  1. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  2. Job security or employment security : What's in a name?

    NARCIS (Netherlands)

    Zekic, Nuna

    2016-01-01

    The main aim of the article is to survey and conceptualize the place of employment security in labour law, and to explore a number of important legal questions relating to this concept. After scrutinizing the notion of employment security, the author endorses the view that job security that exists

  3. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  4. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  5. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  6. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Science.gov (United States)

    2010-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing Requirements—National...

  7. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  8. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  9. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  10. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  11. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  12. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  13. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    Directory of Open Access Journals (Sweden)

    Triana Mugia Rahayu

    2015-06-01

    Full Text Available The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  14. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  15. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  16. What kind of cyber security? Theorising cyber security and mapping approaches

    OpenAIRE

    Laura Fichtner

    2018-01-01

    Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances...

  17. 17 CFR 404.5 - Securities counts by registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... registered government securities brokers and dealers. 404.5 Section 404.5 Commodity and Securities Exchanges... AND PRESERVATION OF RECORDS § 404.5 Securities counts by registered government securities brokers and dealers. (a) Securities counts. Every registered government securities broker or dealer shall comply with...

  18. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Creation of participant's security entitlement... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security... public money, including without limitation deposits to the Treasury tax and loan accounts, or other...

  19. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests... to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  20. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    Science.gov (United States)

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  1. New and renewable energies. Stakes, driving forces and perspectives of the renewable energies market

    International Nuclear Information System (INIS)

    2000-09-01

    New and renewable energies (hydro-power, wind-power, solar, biomass, biogas, geothermal and fuel cells) are progressively entering the industrialization phase (except for hydro-power which is already largely developed). Thus they are no more considered as solutions for utopian ecologists but have reached the status of alternative technologies. This study takes stock of the following questions: what are the applications of renewable energies, what is their stage of development and their potential with respect to fossil fuels, what are their perspectives of development, and what are the strategies developed by the actors of the sector? The main stakes of the renewable energy sector are: fulfilling the increasing power needs (in particular with the wind and solar power in isolated areas), improving the competitiveness (reduction of the investment costs), developing financial incentives (tax relief, financial helps, eco-taxes..), participating to the reduction of pollutant emissions. The renewable energy sector is progressively structuring and profits by the increasing implication of major energy actors, such as the oil companies. The behaviour and strategy of 14 major actors of the renewable energy sector is also analyzed. (J.S.)

  2. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  3. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  4. Polish Security Printing Works in the system of public and economic security

    OpenAIRE

    Remigiusz Lewandowski

    2013-01-01

    The article raises the issue of placing PWPW in the system of economic and public security. Two particular categories of security connected with PWPW business activity, i.e. identification and transactional security, have been defined and discussed in the article. The most essential factors affecting the above security categories as well as relations between identification/transactional security and economic/public security. The article indicates that PWPW plays an important role in the state...

  5. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  6. Reinventing agricultural research : Changing context and moving targets

    NARCIS (Netherlands)

    Struik, P.C.

    2006-01-01

    Future food security for the rapidly increasing human population is at stake because farmers need to produce more food on less land and with less water and energy. Natural resources will be less and less available for agriculture due to economic development, which diverts these resources to

  7. A Leadership Behavior Study of African American Middle School Principals in South Carolina

    Science.gov (United States)

    Dean, Mark D.

    2009-01-01

    An era of high stakes accountability has expanded the necessity for school districts to secure principals with leadership behaviors that encourage successful academic performance. School leaders are sought to deliver practices that guide and empower entire school communities through unprecedented times of educational change. Research studies…

  8. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's... Entitlement of a Participant in favor of the United States to secure deposits of public money, including...

  9. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  10. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  11. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  12. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  13. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  14. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  15. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  16. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  17. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  18. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  19. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  20. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  1. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  2. Audit Teknologiinformasiatas Physical Security Control Dan Logical Security Control Serta Penentuan Kondisi Security Risk Studi Kasus: PT Talc Indonesia

    OpenAIRE

    Inggrid; Arfianti, Rizka I; Utami, Viany

    2009-01-01

    Abstract The fast growth of technology has an impact to the accounting field. This relates to the term of information technology (17) auditing. One of the risI6 of using information technology in business which can be fatal enough i fignored is security risk Security risk can be reduced by security controls which include physical security control and logical security contra Information technology auditing is the process of collecting and evaluating evidence to determine whether or not a co...

  3. PCI DSS: Security Standard and Security in Fact

    OpenAIRE

    M. V. Kuzin

    2011-01-01

    The article focuses on Payment Card Industry Data Security Standard (PCI DSS) requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  4. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  5. Teaching to the test: A very large red herring

    Directory of Open Access Journals (Sweden)

    Richard P. Phelps

    2016-05-01

    Full Text Available Elevating teaching-to-the-test to dogma, from the beginning with the distortion of Dr. Cannell’s findings, has served to divert attention from scandals that should have threatened US educators’ almost complete control of their own evaluation.[10] Had the scandal Dr. Cannell uncovered been portrayed honestly to the public—educators cheat on tests administered internally with lax security—the obvious solution would have been to externally manage all assessments (Oliphant, 2011. Recent test cheating scandals in Atlanta, Washington, DC, and elsewhere once again drew attention to a serious problem. But, instead of blaming lax security and internally managed test administration, most educators blamed the stakes and alleged undue pressure that ensues (Phelps 2011a. Their recommendation, as usual: drop the stakes and reduce the amount of testing. Never mind the ironies: they want oversight lifted so they may operate with none, and they admit that they cannot be trusted to administer tests to our children properly, but we should trust them to educate our children properly if we leave them alone. Perhaps the most profound factoids revealed by the more recent scandals were, first, that the cheating had continued for ten years in Atlanta before any responsible person attempted to stop it and, even then, it required authorities outside the education industry to report the situation honestly. Second, in both Atlanta and Washington, DC, education industry test security consultants repeatedly declared the systems free of wrongdoing (Phelps 2011b. Meanwhile, thirty years after J. J. Cannell first showed us how lax security leads to corrupted test scores, regardless the stakes, test security remains cavalierly loose. We have teachers administering state tests in their own classrooms to their own students, principals distributing and collecting test forms in their own schools. Security may be high outside the schoolhouse door, but inside, too much is left

  6. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  7. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  8. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  9. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  10. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  11. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  12. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  13. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  14. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  15. PCI DSS: Security Standard and Security in Fact

    Directory of Open Access Journals (Sweden)

    M. V. Kuzin

    2011-12-01

    Full Text Available The article focuses on Payment Card Industry Data Security Standard (PCI DSS requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  16. Why SCADA security is NOT like Computer Centre Security

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Today, the industralized world lives in symbiosis with control systems (aka SCADA systems): it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and discuss the differences (or not) between computer center cyber-security and control system cyber-security.

  17. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  18. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  19. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  20. Parents Need Access to Education Data--and Need to Know It's Secure

    Science.gov (United States)

    Guidera, Aimee Rogstad

    2015-01-01

    Everyone with a stake in education--especially parents--should understand the value of data and how they can benefit their children's education. But most people aren't hearing from their schools, districts, and states about how those data are being used and how their children's and family's privacy is being protected. Communicating clearly about…

  1. The Big Three: Our Greatest Security Risks and How to Address Them

    National Research Council Canada - National Science Library

    Danzig, Richard

    1995-01-01

    .... Ethnic and national groups lock in conflict so extensive and bitter that even when U.S. interests are not directly at stake, as in Bosnia or Rwanda, there are imperatives for intervention. The challenges at the end of the 20th century are immensely demanding. But beyond the present lie other, probably even more.

  2. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  3. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  4. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear... PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security background checks for secure transfer of nuclear materials. Licensees are excepted from the security...

  5. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  6. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  7. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  8. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  9. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  10. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  11. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  12. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  13. What kind of cyber security? Theorising cyber security and mapping approaches

    Directory of Open Access Journals (Sweden)

    Laura Fichtner

    2018-05-01

    Full Text Available Building on conceptual work on security and cyber security, the paper explores how different approaches to cyber security are constructed. It outlines structural components and presents four common approaches. Each of them suggests a different role for the actors involved and is motivated and justified by different values such as privacy, economic order and national security. When a cyber security policy or initiative is chosen by policymakers, the analysis of the underlying approach enhances our understanding of how this shapes relationships between actors and of the values prioritised, promoted and inscribed into the concerned technologies.

  14. Information and analysis document. Hydrocarbons of the Caspian sea: actors and stakes; Dossier d'information et d'analyse. Les hydrocarbures de mer Caspienne: acteurs et enjeux

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    1998-03-01

    The Caspian sea basin constitutes an important petroleum reserve from which the exploration and development just begin. It should provide near 5 % of the world petroleum offer in 2015. To evaluate the stakes of the situation, the author presents an analysis of the Caspian sea reserves in three main parts: the Caspian sea hydrocarbons and the energy geo-politics, the realizations and the projects of the transport infrastructures, the international participations in the main petroleum and gaseous contracts. (A.L.B.)

  15. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  16. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  17. Emigration, mutations sociales et changements culinaires en pays mixtèque (Oaxaca, Mexique

    Directory of Open Access Journals (Sweden)

    Esther Katz

    2008-05-01

    Full Text Available Comme dans d’autres régions du Mexique, les paysans du haut pays mixtèque (Etat d’Oaxaca ne vivent pratiquement plus de l’agriculture, sinon des revenus de leurs parents émigrés aux États-Unis. Dans la région, le phénomène de la migration a énormément augmenté au cours des dix dernières années. Comme la majorité des jeunes adultes émigrent, de nombreux foyers ne sont plus composés que de la mère et des enfants ou des grands-parents et des petits-enfants. Avec des ressources monétaires plus importantes, l’équipement des cuisines se modernise, impliquant des bouleversements techniques dans les préparations culinaires ; la consommation de viande et d’aliments industriels augmente tandis que celle de légumes spontanés diminue. Simultanément, divers programmes de développement, impulsés par le gouvernement, provoquent des changements profonds au niveau de l’économie familiale, de l’organisation sociale et du rôle des femmes. Actuellement le statut économique des familles ne dépend plus de l’étendue de leurs terres, mais du nombre de leurs membres qui travaillent « au Nord ». Néanmoins, le riche patrimoine culinaire de cette population est préservé, en particulier à l’occasion des repas festifs.Emigration, Social Mutations And Food Changes In The Mixtec Highlands (Oaxaca, MexicoLike in many regions of Mexico, farmers of the Mixtec Highlands, for the most part, no longer make a living from agriculture, but rather rely on money sent home by migrant family members. People from this region have been migrating for several decades, but this phenomenon, now mainly to the United States, has tremendously increased in the past ten years. Since most young adults have migrated, many households are composed of mothers and children or grandparents and grandchildren. As more monetary resources are available, the kitchen equipment is more modern, resulting in technical changes in culinary preparations. Meat and

  18. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  19. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  20. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Science.gov (United States)

    2010-10-01

    ... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...

  1. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  2. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  3. CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY

    OpenAIRE

    Kalaiprasath, R.; Elankavi, R.; Udayakumar, R.

    2017-01-01

    The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether thes...

  4. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  5. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  6. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  7. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  8. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  9. The Security Gap in Syria: Individual and Collective Security in ‘Rebel-held’ Territories

    OpenAIRE

    Ali, Ali Abdul Kadir

    2015-01-01

    This paper examines security in Syria through the conceptual lens of the security gap, understood as the gap between security practices and objectives which have implications for individual and collective security. Practices of security can be the state apparatus, the military, and militias. The objective – safety – can refer to the safety or security of a range of collectives including the state, political parties, and ethnic groups, while individual security re...

  10. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  11. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  12. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  13. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  14. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  15. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  16. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  17. Usable Security and E-Banking: ease of use vis-a-vis security

    Directory of Open Access Journals (Sweden)

    Morten Hertzum

    2004-05-01

    Full Text Available Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.

  18. Computer security at ukrainian nuclear facilities: interface between nuclear safety and security

    International Nuclear Information System (INIS)

    Chumak, D.; Klevtsov, O.

    2015-01-01

    Active introduction of information technology, computer instrumentation and control systems (I and C systems) in the nuclear field leads to a greater efficiency and management of technological processes at nuclear facilities. However, this trend brings a number of challenges related to cyber-attacks on the above elements, which violates computer security as well as nuclear safety and security of a nuclear facility. This paper considers regulatory support to computer security at the nuclear facilities in Ukraine. The issue of computer and information security considered in the context of physical protection, because it is an integral component. The paper focuses on the computer security of I and C systems important to nuclear safety. These systems are potentially vulnerable to cyber threats and, in case of cyber-attacks, the potential negative impact on the normal operational processes can lead to a breach of the nuclear facility security. While ensuring nuclear security of I and C systems, it interacts with nuclear safety, therefore, the paper considers an example of an integrated approach to the requirements of nuclear safety and security

  19. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  20. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  1. Web security a whitehat perspective

    CERN Document Server

    Wu, Hanqing

    2015-01-01

    MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code

  2. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  3. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  4. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security... of the United States to secure deposits of public money, including, without limitation, deposits to...

  5. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  6. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  7. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  8. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  9. Des filets à nuages sur la crête d'El Tofo | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    adaptation aux changements climatiques que le CRDI subventionne. Entretien avec…propose des entrevues vidéos avec des chercheurs participant à des projets portant sur l'adaptation aux changements climati.

  10. 21st Century Security Manager

    Directory of Open Access Journals (Sweden)

    Stelian ARION

    2010-11-01

    Full Text Available We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers thah have government backgroud, or IT security backgroud, or are promoted from organization’s inside leaders. There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base of their leaders or in the collective knowledge of the leading staff. They are government elements, security organization, emerging issue awareness, IT security, business elements and executive leadership.

  11. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  12. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  13. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  14. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  15. 24 CFR 350.5 - Creation of Participant's Security Entitlement; Security Interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Creation of Participant's Security... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.5 Creation of Participant's Security Entitlement... States to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  16. Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

    Directory of Open Access Journals (Sweden)

    Christian Schmitt

    2015-07-01

    Full Text Available This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security information and knowledge sources and relevant compliance obligations, in a structured and reusable form. The resulting repository is intended to be used by development teams during the elicitation and analysis of security requirements with the goal to understand the security problem space, incorporate all relevant requirements sources, and to avoid unnecessary effort for identifying, understanding, and correlating applicable security requirements sources on a project-wise basis. We start with an overview and categorization of important security requirements sources, followed by the description of the generic model. To demonstrate the applicability and benefits of the model, the instantiation approach and details of the resulting repository of security requirements sources are presented.

  17. Multimedia Security System for Security and Medical Applications

    Science.gov (United States)

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  18. Human security and the quest for peace in the Middle East, 24 October 2006, University of Maryland

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M

    2006-10-24

    mentioned. (1) The Security Council has often been unable to intervene in a timely manner in humanitarian crisis, and in cases of gross violations of human rights. (2) We have allowed some conflicts to fester for decades, with devastating effects. (3) A number of the central tenets of international law have been challenged or undermined in recent years. For reform to be effective three things must occur: (1) We must view both the problems and their solutions through the lens of human security. The sovereign rights of the individual must take precedence over the sovereignty of the state. (2) Our security mechanism and institutions must be reformed. At the IAEA for example we have at times ignored the linkage between the nuclear non-proliferation and the nuclear disarmament. (3) We must commit to resolve longstanding conflicts, which brings us to the Middle East. . The Arab Israeli conflict, at its most basic level, comes down to two passionate peoples claiming the same piece of land. Only two countries - Egypt and Jordan - formally recognize and have peace agreements with Israel. If the recent history of the Middle East teaches us nothing else, it should teach us that these conflicts cannot be solved through military force. The resolution will not lie in reconstructing history and not in redressing all past injustice. The first key success will be to start from the end-point. The second key condition is steady commitment by all parties. In parallel with the dialogue on the peace process, there should be a dialogue open regional security. This discussion should cover the elimination of weapons of mass destruction, limitations on conventional weapons, and an array of confidence building measures. Another important condition is that all parties with a stake in the solution be engaged in a dialogue. Like any other aspect of cultural diversity, the Christian, Jewish and Moslem religions should be treated with mutual deference.

  19. Human security and the quest for peace in the Middle East, 24 October 2006, University of Maryland

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2006-01-01

    mentioned. (1) The Security Council has often been unable to intervene in a timely manner in humanitarian crisis, and in cases of gross violations of human rights. (2) We have allowed some conflicts to fester for decades, with devastating effects. (3) A number of the central tenets of international law have been challenged or undermined in recent years. For reform to be effective three things must occur: (1) We must view both the problems and their solutions through the lens of human security. The sovereign rights of the individual must take precedence over the sovereignty of the state. (2) Our security mechanism and institutions must be reformed. At the IAEA for example we have at times ignored the linkage between the nuclear non-proliferation and the nuclear disarmament. (3) We must commit to resolve longstanding conflicts, which brings us to the Middle East. . The Arab Israeli conflict, at its most basic level, comes down to two passionate peoples claiming the same piece of land. Only two countries - Egypt and Jordan - formally recognize and have peace agreements with Israel. If the recent history of the Middle East teaches us nothing else, it should teach us that these conflicts cannot be solved through military force. The resolution will not lie in reconstructing history and not in redressing all past injustice. The first key success will be to start from the end-point. The second key condition is steady commitment by all parties. In parallel with the dialogue on the peace process, there should be a dialogue open regional security. This discussion should cover the elimination of weapons of mass destruction, limitations on conventional weapons, and an array of confidence building measures. Another important condition is that all parties with a stake in the solution be engaged in a dialogue. Like any other aspect of cultural diversity, the Christian, Jewish and Moslem religions should be treated with mutual deference

  20. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag