WorldWideScience

Sample records for security technology incubator

  1. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  2. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  3. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  4. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  5. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  6. Technology Business Incubators as Engines of Growth: Towards a distinction between Technology Incubators and Non-Technology Incubators.

    NARCIS (Netherlands)

    Ratinho, Tiago; Harms, Rainer; Groen, Arend J.

    2009-01-01

    Business incubators are an increasingly popular tool for promoting job and wealth creation. Yet given the heterogeneity of incubation models, it is not always clear how incubators operate, what their main characteristics are and how can they best contribute to job and wealth creation. If technology

  7. Technology business incubators as engines of growth: towards a distinction between technology incubators and non-technology incubators

    NARCIS (Netherlands)

    Ratinho, Tiago; Harms, Rainer; Groen, Arend J.; Langan Fox, Janice

    2010-01-01

    Business incubators are an increasingly popular tool for promoting job and wealth creation. Yet given the heterogeneity of incubation models, it is not always clear how incubators operate, what their main characteristics are and how can they best contribute to job and wealth creation. If technology

  8. Technology Business Incubators in China and India

    DEFF Research Database (Denmark)

    Tang, Mingfeng; Baskaran, Angathevar; Pancholi, Jatin

    2011-01-01

    We present a comparative case study of Technology Business Incubators (TBIs) in two major emerging economies in Asia - China and India. We employ an integrative analytical framework that combines three broad categories of indicators (originally developed by developed by Mian, 1997): Management...

  9. Towards a distinction between technology incubators and non-technology incubators: can they contribute to economic growth?

    NARCIS (Netherlands)

    Ratinho, Tiago; Harms, Rainer; Groen, Arend J.; Fink, M.; Hatak, I.

    2010-01-01

    Business incubators are an increasingly popular tool for promoting job and wealth creation. Yet given the heterogeneity of incubation models, it is not always clear how incubators operate, what their main characteristics are and how can they best contribute to job and wealth creation. If technology

  10. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  11. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  12. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  13. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  14. New York Nano-Bio Molecular Information Technology (NYNBIT) Incubator

    Energy Technology Data Exchange (ETDEWEB)

    Das, Digendra K

    2008-12-19

    This project presents the outcome of an effort made by a consortium of six universities in the State of New York to develop a Center for Advanced technology (CAT) in the emerging field of Nano-Bio-Molecular Information Technology. The effort consists of activities such as organization of the NYNBIT incubator, collaborative research projects, development of courses, an educational program for high schools, and commercial start-up programs.

  15. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  16. The Data Envelopment Analysis Method in Benchmarking of Technological Incubators

    Directory of Open Access Journals (Sweden)

    Bożena Kaczmarska

    2010-01-01

    Full Text Available This paper presents an original concept for the application of Data Envelopment Analysis (DEA in benchmarking processes within innovation and entrepreneurship centers based on the example of technological incubators. Applying the DEA method, it is possible to order analyzed objects, on the basis of explicitly defined relative efficiency, by compiling a rating list and rating classes. Establishing standards and indicating “clearances” allows the studied objects - innovation and entrepreneurship centers - to select a way of developing effectively, as well as preserving their individuality and a unique way of acting with the account of local needs. (original abstract

  17. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  18. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  19. APPLICATION OF THE MODEL CERNE FOR THE ESTABLISHMENT OF CRITERIA INCUBATION SELECTION IN TECHNOLOGY BASED BUSINESSES : A STUDY IN INCUBATORS OF TECHNOLOGICAL BASE OF THE COUNTRY

    Directory of Open Access Journals (Sweden)

    Clobert Jefferson Passoni

    2017-03-01

    Full Text Available Business incubators are a great source of encouragement for innovative projects, enabling the development of new technologies, providing infrastructure, advice and support, which are key elements for the success of new business. The technology-based firm incubators (TBFs, which are 154 in Brazil. Each one of them has its own mechanism for the selection of the incubation companies. Because of the different forms of management of incubators, the business model CERNE - Reference Center for Support for New Projects - was created by Anprotec and Sebrae, in order to standardize procedures and promote the increase of chances for success in the incubations. The objective of this study is to propose selection criteria for the incubation, considering CERNE’s five dimensions and aiming to help on the decision-making in the assessment of candidate companies in a TBF incubator. The research was conducted from the public notices of 20 TBF incubators, where 38 selection criteria were identified and classified. Managers of TBF incubators validated 26 criteria by its importance via online questionnaires. As a result, favorable ratings were obtained to 25 of them. Only one criterion differed from the others, with a unfavorable rating.

  20. Information security foundations, technologies and applications

    CERN Document Server

    Awad, Ali Ismail; Fairhurst, Michael

    2018-01-01

    This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.

  1. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  2. CAXIAS DO SUL TECHNOLOGY INCUBATOR: TECHNOLOGICAL INNOVATION THROUGH THE TRIPLE HELIX

    Directory of Open Access Journals (Sweden)

    Priscila Bresolin Tisott

    2014-09-01

    on investment in the form of registered patents, attracting new students and recognition as a technological, entrepreneurial and innovative university. The perceived benefits for the industrial sector are training and development for businesses and entrepreneurs, while the municipal government perceives the reduced number of businesses failing and the financial returns, in the form of taxes, as benefits. The findings show that the Triple Helix concept developed by Etzkowitz (2009 plays a cooperative and participatory role in the Technology Incubator, even though it could be applied to more segments of society.

  3. Clean Energy Technology Incubator Initiative Launched in Texas

    Science.gov (United States)

    - including the State Energy Conservation Office, the General Land Office, the Texas Natural Resources Conservation Commission, the Texas Energy Coordination Council and the Texas Department of Economic Development from market entry. The alliance is interested in a broad range of company types, from technology-based

  4. [Development of Monitoring System for Infant Incubator Based on IOT Technology].

    Science.gov (United States)

    Wang, Wenfeng; Peng, Dunlu; Gu, Nan

    2017-05-30

    IOT(Internet of things) is a relatively new technology, more and more integrated into our lives. In this paper we use infant incubator for example, introduce the application of IOT technology to reduce the risk of the use of medical devices, and through the dynamic management to improve the management level and efficiency. Put forward a method of medical equipment linked. Combined with the point of IOT technology and sensor technology, we find out the actual needs of the management and use of infant incubator. For the dynamic management of medical equipment, we use sensors to control risk points. The system meets the needs of the hospital and patients in many areas.

  5. Analysis of the Organizational Structure of Enterprises of Technological Basis With Projects Without Incubators

    Directory of Open Access Journals (Sweden)

    Marcela Gimenes Bera Oshita

    2017-03-01

    Full Text Available The contingency theory assumes that the structure of the organization involves environment, people, technologies and administrative techniques for achieving the objectives of the company, which must comply with the contingent factors and the environment in which it is inserted. Being that, by the evolution of technology companies must be innovative from an organic structure. Thus, the incubated companies have innovative feature, this way: how is the organizational structure of enterprises of technological basis with projects in incubators? This research aims to asses and classify the organizational structure of enterprises of technological basis with projects in incubators in the State of Paraná. To achieve this goal it carried out a literature review on the contingency theory. Afterwards it was applied the questionnaire with companies incubated in that sought to identify their organizational structure Trough the applied methodology was found that, in General, incubated companies presented some mechanistic designs features with command-based rules and procedures in that only one person takes the decision, which way be the reflection of a technological breakthrough in which companies migrate to a mechanistic designs structure for organic , as well as in the results of Joan Woodward (1958, in which the occurrence of technological advancement, companies use the mechanistic designs structure, changing later to organic.

  6. Security Problems of Mobile Technologies

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The article provides an overview of security problems which exist in the mobile devices. The main technologies aimed to protect the phones from various types of attacks are considered. The authors justify the necessity of developing new improved tools and methods to ensure the safety of such devices.

  7. DIFFICULTIES ENCOUNTERED IN ISO 9001:2008 IMPLEMENTATION PROJECTS IN INCUBATED TECHNOLOGY-BASED COMPANIES

    Directory of Open Access Journals (Sweden)

    Eduardo Gome Salgado

    2014-09-01

    Full Text Available Quality Management Systems (QMS are designed to continuously improve the performance of organizations aiming to constantly improve their services seeking to overcome their results. Thus, for the services and/or products offered to transmit confidence and credibility, they should be designed within appropriate norms and standards. This research aims to assess the difficulties encountered by the incubated companies participating in the PRIME-FINEP project and developing projects for certification of their QMS in accordance with ISO 9001:2008. An exploratory survey was performed in nine incubated technology-based companies (TBC, through a questionnaire with 21 questions totaling the opinion of 20 respondents. After analyzing the data it is concluded, with statistical meaning, that the TBC's with little incubation time present difficulties in implementing the quality policy (5.3, difficulty not identified in other studies conducted in large companies. However difficulties similar to those of the large companies are present in the incubated TBC, and are the following: documentation requirements (4.2 present in all incubated companies (regardless of incubation time, and design and development (7.3 present in companies with little incubation time. The difficulty in implementing the quality policy (5.3 is reflected in the achievement of the QMS certification project in accordance with ISO 9001:2008.

  8. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    An Dehai; Xu Rongsheng; Liu Baoxu

    2000-01-01

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  9. Adopting Disruptive Technologies in Traditional Universities: Continuing Education as an Incubator for Innovation.

    Science.gov (United States)

    Archer, Walter; Anderson, Terry; Garrison, Randy

    1999-01-01

    Traditional universities are feeling the impact of "disruptive technologies" such as distance education. Seeing how businesses have responded to such disruptions, universities should "incubate" innovations in a semiautonomous unit such as continuing education, which can address new markets with low margins. (SK)

  10. Can incubators work in Africa? Acorn Technologies and the entrepreneur-centric model.

    Science.gov (United States)

    Chakma, Justin; Masum, Hassan; Singer, Peter A

    2010-12-13

    Incubators are organizations that support the growth of new and typically technology-based enterprises, by providing business support services that bring together human and financial capital. Although the traditional role of incubators has been for economic development, they may also be a useful policy lever to tackle global health, by fostering the development and delivery of local health innovation.Given its high disease burden, life sciences incubators hold particular potential for Africa. As the most industrially advanced African nation, South Africa serves as a litmus test for identifying effective incubator policies. The case study method was used to illustrate how one such publicly funded incubator founded in 2002, Acorn Technologies, helped to catalyze local health product innovation. Acorn helped to support twelve biomedical device firms. One of them, Real World Diagnostics, was founded by a trainee from Acorn's innovative internship program (Hellfire). It developed rapid strip diagnostic tests for locally prevalent diseases including schistosomiasis and HIV, and reported $2 million (USD) in revenue in 2009.Acorn achieved this success by operating as a non-profit virtual incubator with little physical infrastructure. Employing a virtual model in combination with stringent selection criteria of capital efficiency for clients proved to be effective in reducing its own fixed costs. Acorn focused on entrepreneurship training and networking, both critical at an early stage in an environment dominated by multinational biomedical device companies.Acorn and its clients learned that employing a cross-subsidy business model allowed one to generate royalty revenue through imports to subsidize R&D for local diseases. However, funding constraints and government expectations for rapid self-sustainability forced Acorn to merge with its sister biotechnology incubator in 2009. A key to Acorn's achievements was identifying entrepreneurs with technologies with health and

  11. Can incubators work in Africa? Acorn Technologies and the entrepreneur-centric model

    Directory of Open Access Journals (Sweden)

    Singer Peter A

    2010-12-01

    Full Text Available Abstract Background Incubators are organizations that support the growth of new and typically technology-based enterprises, by providing business support services that bring together human and financial capital. Although the traditional role of incubators has been for economic development, they may also be a useful policy lever to tackle global health, by fostering the development and delivery of local health innovation. Given its high disease burden, life sciences incubators hold particular potential for Africa. As the most industrially advanced African nation, South Africa serves as a litmus test for identifying effective incubator policies. The case study method was used to illustrate how one such publicly funded incubator founded in 2002, Acorn Technologies, helped to catalyze local health product innovation. Discussion Acorn helped to support twelve biomedical device firms. One of them, Real World Diagnostics, was founded by a trainee from Acorn’s innovative internship program (Hellfire. It developed rapid strip diagnostic tests for locally prevalent diseases including schistosomiasis and HIV, and reported $2 million (USD in revenue in 2009. Acorn achieved this success by operating as a non-profit virtual incubator with little physical infrastructure. Employing a virtual model in combination with stringent selection criteria of capital efficiency for clients proved to be effective in reducing its own fixed costs. Acorn focused on entrepreneurship training and networking, both critical at an early stage in an environment dominated by multinational biomedical device companies. Acorn and its clients learned that employing a cross-subsidy business model allowed one to generate royalty revenue through imports to subsidize R&D for local diseases. However, funding constraints and government expectations for rapid self-sustainability forced Acorn to merge with its sister biotechnology incubator in 2009. Summary A key to Acorn’s achievements was

  12. Can incubators work in Africa? Acorn Technologies and the entrepreneur-centric model

    Science.gov (United States)

    2010-01-01

    Background Incubators are organizations that support the growth of new and typically technology-based enterprises, by providing business support services that bring together human and financial capital. Although the traditional role of incubators has been for economic development, they may also be a useful policy lever to tackle global health, by fostering the development and delivery of local health innovation. Given its high disease burden, life sciences incubators hold particular potential for Africa. As the most industrially advanced African nation, South Africa serves as a litmus test for identifying effective incubator policies. The case study method was used to illustrate how one such publicly funded incubator founded in 2002, Acorn Technologies, helped to catalyze local health product innovation. Discussion Acorn helped to support twelve biomedical device firms. One of them, Real World Diagnostics, was founded by a trainee from Acorn’s innovative internship program (Hellfire). It developed rapid strip diagnostic tests for locally prevalent diseases including schistosomiasis and HIV, and reported $2 million (USD) in revenue in 2009. Acorn achieved this success by operating as a non-profit virtual incubator with little physical infrastructure. Employing a virtual model in combination with stringent selection criteria of capital efficiency for clients proved to be effective in reducing its own fixed costs. Acorn focused on entrepreneurship training and networking, both critical at an early stage in an environment dominated by multinational biomedical device companies. Acorn and its clients learned that employing a cross-subsidy business model allowed one to generate royalty revenue through imports to subsidize R&D for local diseases. However, funding constraints and government expectations for rapid self-sustainability forced Acorn to merge with its sister biotechnology incubator in 2009. Summary A key to Acorn’s achievements was identifying entrepreneurs

  13. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  14. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  15. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  16. Nuclear energy technology transfer: the security barriers

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1975-08-01

    The problems presented by security considerations to the transfer of nuclear energy technology are examined. In the case of fusion, the national security barrier associated with the laser and E-beam approaches is discussed; for fission, the international security requirements, due to the possibility of the theft or diversion of special nuclear materials or sabotage of nuclear facilities, are highlighted. The paper outlines the nuclear fuel cycle and terrorist threat, examples of security barriers, and the current approaches to transferring technology. (auth)

  17. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  18. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  19. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  20. Analysis for grouping of factors of performance of technology-based enterprise in incubators: study of the incubators of the State of Santa Catarina

    Directory of Open Access Journals (Sweden)

    Pedro Paulo Andrade Júnior

    2012-01-01

    Full Text Available The study it has for objective to evaluate the capacity of overcoming of difficulties of Technology-based enterprise in incubators, aiming at to the proposal of action of improvements and performance for groupings, using as reference the incubators the State of Santa Catarina. The used methodology privileges the qualitative approach. The research is characterized for being of the type description-exploratory, carried through under the study form multicase. The interview constitutes the main instrument of collection of data. Intentional samples had been used to select the citizens of this inquiry. For presentation and analysis of the data set and interpretation of the verbal stories, it was used technique of content analysis and the technique of triangulation for quarrel of the results. The results of the research had allowed identifying to the difficulties of resident enterprise in incubators and its relevance in the overcoming of the difficulties on the basis of four groupings: in the financial restrictions, of management, production and commercialization considering elements that allow action of improvement. Moreover, the research contributes practice by proposing of actions for improvements to be adopted by companies and also by incubators in order to improve their factors of performance and evaluation.

  1. Mentoring Entrepreneurial Networks: mapping conceptions of participants in technological-based business incubators in Brazil.

    Directory of Open Access Journals (Sweden)

    Pontes Regis, Helder

    2007-12-01

    Full Text Available The recent entrepreneurship research agenda includes the analysis of cognitive structures of successful entrepreneurs, revealing an important tool for the examination of an entrepreneurial career. Using techniques of cognitive maps, this study explores the concepts of a successful career and the network itself, as a whole, for career development. Fifty-three entrepreneurs were studied, in seven technological incubators in the city of Recife, Pernambuco, Brazil. Specifically, this study aimed to map the shared meanings of the incubated entrepreneurs regarding informal support networks. Such networks support the entrepreneurial career and the present study explores the characteristics and the conceptual model that underlies the networks. The data collection was achieved through interviews through a free evocation technique. The shared meanings indicate the existence of inherent thought categories that support network context in the incubator environment, mainly the mentoring networks. The results endorse the interpretation of an informal mentoring model emerging from the dominant evocations concerning a successful career and of the network itself as promoter of career development.

  2. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  3. Marine data security based on blockchain technology

    Science.gov (United States)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  4. The Creative Economy on the Environmental of the Technological Parks and Incubators

    Directory of Open Access Journals (Sweden)

    Ekaterina Emmanuil Inglesis Barcellos

    2016-06-01

    Full Text Available The creative economy has become a key element in generating ideas, products and services being an evolving concept based on creative assets, which modifies the profile of industry and global market, from the partnership between creativity and economics combined with innovation and technology. In Brazil, Technological Parks and Incubators, in turn, have not devoted themselves with real interest in this emerging sector; they are involved primarily with technologies for areas such as biotechnology, environment, embedded electronics, alternative energy, oil, software and, mainly, IT (ICT. This article identifies how the economy and creative industry have changed the entrepreneurial profile in the national and global environment and how these trends are applicable in relation to the environment of the Parks and Incubators for the inclusion of creativity in the current Brazilian scenario. Shows that the creative production promotes skills that constitute the knowledge of Design, Architecture,Cultural Heritage, Media, Culture and Arts, acting democratically, adding knowledge, diversity and differentiation, overcoming social and regional barriers and making social inclusion. It shows that a market segment that involved about US $ 624 billion in 2011, more than doubling between 2002 and 2011, maintains a growth trajectory has only 2% of the featured activities of the Parks aimed at its development and promotion.

  5. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  6. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  7. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  8. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  9. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  10. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  11. New technology for food systems and security.

    Science.gov (United States)

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  12. Infrared: A Key Technology for Security Systems

    OpenAIRE

    Corsi, Carlo

    2012-01-01

    Infrared science and technology has been, since the first applications, mainly dedicated to security and surveillance especially in military field, besides specialized techniques in thermal imaging for medical diagnostic and building structures and recently in energy savings and aerospace context. Till recently the security applications were mainly based on thermal imaging as surveillance and warning military systems. In all these applications the advent of room temperature, more reliable due...

  13. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  14. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  15. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  16. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  17. The Business Engineering Surgical Technologies (BEST) teaching method: incubating talents for surgical innovation.

    Science.gov (United States)

    de Ruijter, V; Halvax, P; Dallemagne, B; Swanström, L; Marescaux, J; Perretta, S

    2015-01-01

    Technological innovation in surgical science and healthcare is vital and calls for close collaboration between engineering and surgery. To meet this objective, BEST was designed as a free sustainable innovative teaching method for young professionals, combining surgery, engineering, and business in a multidisciplinary, high-quality, low-cost, and learning-by-doing philosophy. This paper reviews the initial outcomes of the program and discusses lessons learned and future directions of this innovative educational method. BEST educational method is delivered in two parts: the first component consisting of live streaming or pre-recorded online lectures, with an interdisciplinary profile focused on surgery, engineering, and business. The second component is an annual 5-day on-site course, organized at IRCAD-IHU, France. The program includes workshops in engineering, entrepreneurship team projects, and in-depth hands-on experience in laparoscopy, robotic surgery, interventional radiology, and flexible endoscopy with special emphasis on the interdisciplinary aspect of the training. A panel of surgeons, engineers, well-established entrepreneurs, and scientists assessed the team projects for potential patent application. From November 2011 till September 2013, 803 individual and institutional users from 79 different countries attended the online course. In total, 134 young professionals from 32 different countries applied to the onsite course. Sixty participants were selected each year for the onsite course. In addition, five participants were selected for a web-based team. Thirteen provisional patents were filed for the most promising projects. BEST proved to be a global talent incubator connecting students to high-quality education despite institutional and economical boundaries. Viable and innovative ideas arose from this revolutionary approach which is likely to spin-off significant technology transfer and lead the way for future interdisciplinary hybrid surgical

  18. Modern Quantum Technologies of Information Security

    OpenAIRE

    Korchenko, Oleksandr; Vasiliu, Yevhen; Gnatyuk, Sergiy

    2010-01-01

    In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is consider...

  19. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m... and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington... for the Under Secretary of Homeland Security for Science and Technology. The Homeland Security Science...

  20. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  1. Denial technology, the neglected security element

    International Nuclear Information System (INIS)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection

  2. Energy technology evaluation report: Energy security

    Science.gov (United States)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  3. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  4. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  5. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ...; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...: Ms. Tiwanda Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray...

  6. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Protection programs in Science & Technology and updates on homeland security sensitive Federally Funded...

  7. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... Technology Advisory Committee will meet January 26-28, 2010, at the Department of Homeland Security, 1120..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  8. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  9. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  10. Advanced technologies: Trends and implications for security

    International Nuclear Information System (INIS)

    Shaw, A.

    1990-01-01

    As the world moves towards the close of the twentieth century, three technological trends will strongly influence security. In order of importance they are: first, the increasing globalization of the ability to develop and use high technology, much of which has both civilian and military applications; secondly, the broad dissemination of militarily-relevant technology world-wide; and thirdly, the continued development by the United States and the USSR (and a few other nations) of advanced technology for military applications. The military balance between the super-Powers and their allies has been strongly rooted in advancing military technology. Great changes in technology have resulted in adjustments -mostly in limited aspects such as the armour/ anti-armour balance - but have not caused it to change wildly. This seems likely to remain the case for the foreseeable future. There are arguments that Western technology has been a prime causative factor behind Soviet willingness to engage in negotiations to reduce forces. They claim that fear of the Strategic Defense Initiative is behind progress in the Strategic Arms Reduction Talks, and that perceived Western mastery of the technology for systems combining quick reaction, deep strike and high kill probabilities led the Soviet Union to reassess its potential for a successful land campaign in Europe. If current arms control negotiations are successful, the momentum is maintained, and other political changes take hold, the military balance could be taken to a point where ft would not be very sensitive to technological change. One should be aware that the arms control negotiations are very complex, primarily because of technological issues, and we should not yet bank on it all working out well. If it fails, the military technical competition will heat up again. Even under a strict arms control regime we can expect the competition to continue as each side seeks to develop counters to what ft sees as the other side

  11. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  12. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  13. Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers

    OpenAIRE

    Lease, David R.

    2005-01-01

    The research conducted under this study offers an understanding of the reasons why information technology (IT) and/or information assurance (IA) managers choose to recommend or not to recommend particular technologies, specifically biometric security, to their organizations. A review of the relevant literature provided the foundation to develop a set of research questions and factors for this research effort. The research questions became the basis of the study’s stated hypotheses for examini...

  14. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  15. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  16. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  17. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  18. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of

  19. Center for Coastline Security Technology, Year-2

    Science.gov (United States)

    2007-05-01

    cinematic film industry . For the port security application there are several research issues being addressed under this program, specifically...being the cinematic film industry . For the port security application there are several research issues being addressed under this program...the primary customers being the film industry . For the port security application there are several research issues being addressed under this program

  20. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ... Security, consistent with Federal policies for the security of unclassified information and information... Certification Program, and provide a Web site link within a contract clause to a library where contractors can... Security should be addressed through government-wide policies, standards, and requirements. NASA response...

  1. Knowledge Incubation and Collaboration for Science, Technology Adoption, Resourcing and Transfer (KIC-START)

    International Nuclear Information System (INIS)

    Ugbor, U.; Cilliers, A.; Kurwitz, R. C.

    2016-01-01

    Full text: In order to address the effectiveness of national networks in Member States, and to implement regional and national strategies, it is important to understand the necessary conditions that ensure successful creation and sharing of knowledge, including, effective policy and programme incentives, promoting collaboration, innovation and networking. Furthermore, Member States with aspirations to develop their nuclear programmes (power and non-power applications in agriculture, industry and health sector), need to develop their own capabilities if they are to fully benefit from the social and economic opportunities from nuclear science and technology. Ultimately nuclear innovation programmes that take into account the role of universities, education and industry would lead to a robust nuclear programme that maximizes social and economic benefit. This paper a presents an initiative for capturing best practices in the areas of university collaboration and innovation, which are driven by learning, research and entrepreneurship. The initiative covers Knowledge (creation), Innovation and Collaboration for Science and Technology Adoption, Resourcing and Transfer (KIC-START). (author

  2. On the Horizon: New Advances in Security Technology

    Science.gov (United States)

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  3. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  4. Measuring efficiency and productivity growth of new technology-based firms in business incubators: the Portuguese case study of Madan Parque.

    Science.gov (United States)

    Grilo, A; Santos, J

    2015-01-01

    Business incubators can play a major role in helping to turn a business idea into a technology-based organization that is economically efficient. However, there is a shortage in the literature regarding the efficiency evaluation and productivity evolution of the new technology-based firms (NTBFs) in the incubation scope. This study develops a model based on the data envelopment analysis (DEA) methodology, which allows the incubated NTBFs to evaluate and improve the efficiency of their management. Moreover, the Malmquist index is used to examine productivity change. The index is decomposed into multiple components to give insights into the root sources of productivity change. The proposed model was applied in a case study with 13 NTBFs incubated. From that study, we conclude that inefficient firms invest excessively in research and development (R&D), and, on average, firms have a productivity growth in the period of study.

  5. Measuring Efficiency and Productivity Growth of New Technology-Based Firms in Business Incubators: The Portuguese Case Study of Madan Parque

    Science.gov (United States)

    Grilo, A.; Santos, J.

    2015-01-01

    Business incubators can play a major role in helping to turn a business idea into a technology-based organization that is economically efficient. However, there is a shortage in the literature regarding the efficiency evaluation and productivity evolution of the new technology-based firms (NTBFs) in the incubation scope. This study develops a model based on the data envelopment analysis (DEA) methodology, which allows the incubated NTBFs to evaluate and improve the efficiency of their management. Moreover, the Malmquist index is used to examine productivity change. The index is decomposed into multiple components to give insights into the root sources of productivity change. The proposed model was applied in a case study with 13 NTBFs incubated. From that study, we conclude that inefficient firms invest excessively in research and development (R&D), and, on average, firms have a productivity growth in the period of study. PMID:25874266

  6. Measuring Efficiency and Productivity Growth of New Technology-Based Firms in Business Incubators: The Portuguese Case Study of Madan Parque

    Directory of Open Access Journals (Sweden)

    A. Grilo

    2015-01-01

    Full Text Available Business incubators can play a major role in helping to turn a business idea into a technology-based organization that is economically efficient. However, there is a shortage in the literature regarding the efficiency evaluation and productivity evolution of the new technology-based firms (NTBFs in the incubation scope. This study develops a model based on the data envelopment analysis (DEA methodology, which allows the incubated NTBFs to evaluate and improve the efficiency of their management. Moreover, the Malmquist index is used to examine productivity change. The index is decomposed into multiple components to give insights into the root sources of productivity change. The proposed model was applied in a case study with 13 NTBFs incubated. From that study, we conclude that inefficient firms invest excessively in research and development (R&D, and, on average, firms have a productivity growth in the period of study.

  7. Nuclear Technologies Secure Food For Future

    International Nuclear Information System (INIS)

    2012-01-01

    use of such techniques to protect plants and animals against disease and pests means many more farmers can produce enough food to feed their own families and to sell on markets. Ultimately, fewer people go hungry. The IAEA collaborates with the United Nations Food and Agriculture Organization (FAO) in providing support through a joint division in Vienna. ''While our profile is modest, the size of our footprint is significant,'' said Qu Liang, Director of the Joint FAO/IAEA Division of Nuclear Techniques. ''We are putting the benefits of tried and tested nuclear technologies into the hands of farmers, particularly small producers in poorer countries, to improve their food security and livelihood.'' ''The assistance is driven by advanced technologies,'' Liang added. ''But what we are delivering has to be appropriate to farmers' needs. That means crops that can flourish in changing and often harsher conditions, pest control without a chemical legacy and protection for livestock.'' The Scientific Forum will be opened by the IAEA Director General and ministers from Indonesia, Kenya and Vietnam. FAO Director General Graziano da Silva will deliver a video address. The Forum will address IAEA activities in the fields of food production, food protection and food safety. Each session features a panel of experts who will present and discuss the benefits of nuclear techniques in food and agriculture. A moderator will guide the discussions. (IAEA)

  8. Promoting Economic Security through Information Technology ...

    African Journals Online (AJOL)

    The problem of economic insecurity is a global threat to national security. In Nigeria today, we have witness a lot of national security issues that risks the continued existence of the country as one indivisible political entity with many calling for disintegration. Hitherto, many terrorist networks have sprang up in many parts of ...

  9. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  10. Safeguards and security deficiencies fulfilled through technology development

    International Nuclear Information System (INIS)

    Smoot, W.

    1996-01-01

    The Office of Safeguards and Security (OSS) sponsors research and development activities based on identified field and headquarters customer requirements. Annually, a formal solicitation of safeguards and security user needs is conducted. Currently, there are over 300 valid safeguards and security deficiencies that have been identified. These user needs serve as the basis for formulating the OSS Technology Development Program (TDP). Due to budget constraints, the TDP can only address approximately 47% of these needs in FY 1996. This paper will discuss, in a general sense, the current deficiencies and how the TDP is responding to each. Specifically, the paper will highlight technologies in the areas of Material Control and Accounting, Physical Security, and Information Security. A brief discussion of unfulfilled user requirements will also be presented as a catalyst for leveraging available or developing technologies from other similar programs or from private industry

  11. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  12. Soils and food security | Nortcliff | Nigerian Journal of Technological ...

    African Journals Online (AJOL)

    A threat impacting on food security strongly in Africa is nutrient mining where insufficient nutrients are returned to the soil after crop production. The impacts of global change on food security and the potential impacts of global markets for food and land are also briefly discussed. Nigerian Journal of Technological Research ...

  13. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  14. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  15. Competitive Technologies for National Security: Review and Recommendations

    National Research Council Canada - National Science Library

    Carafano, James J; Gudgel, Andew; Kochems, Alane

    2008-01-01

    .... Innovation will always be a national security wild card. New technologies may unleash or accelerate social and cultural changes that affect how nations protect themselves on battlefields and behind the scenes...

  16. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  17. Promoting Economic Security through Information Technology Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... The problem of economic insecurity is a global threat to national security. ... of the country as one indivisible political entity with many calling for disintegration. ..... The integration of ICT in agriculture can .... Table 4.2.7 Respondents by IT on Business propriety and trade .... of production, distribution and.

  18. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  19. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  20. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  1. Information and technology: Improving food security in Uganda ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-06-23

    Jun 23, 2014 ... Information and technology: Improving food security in Uganda ... knowledge to make decisions about planting, harvesting, and managing livestock, but ... to be effective for minimizing risks and increasing agricultural productivity. ... In time, this network of information – made possible by digital technology ...

  2. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  3. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  4. Combining overt and covert anti-counterfeiting technologies for securities

    Science.gov (United States)

    Uematsu, Tsuyoshi

    2006-02-01

    The National Printing Bureau of Japan has been developing new anti-counterfeiting technologies as a banknote printer. Some of our technologies have already been effectively introduced into Japan's new banknote series. Anti-counterfeiting technologies can be applied not only to banknotes but also to other security documents depending on desired features. In this presentation, I will introduce three of our newly developed overt and covert security techniques, which are intended for document security and brand protection, as well as banknotes. "Metallic View" is mainly for offset printing. "Copy Check" (micro-structural lines involving luminescence) is for plate making technology. "ImageSwitch" is for a new security solution which has unlimited printing applications. All three techniques create "latent images" (some of which may be better known as "carrier screen images") that are useful in preventing counterfeiting. While each of the techniques is effective by itself, all are more effective when applied together. Combining these techniques could make all security documents harder to copy using IT scanners, and provide cost-effective anti-counterfeiting solutions for all security users.

  5. Security and privacy issues with health care information technology.

    Science.gov (United States)

    Meingast, Marci; Roosta, Tanya; Sastry, Shankar

    2006-01-01

    The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.

  6. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  7. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys, Inc., Bolder Technologies Corp., Boyds Wheels, Inc... securities of Biometrics Security Technology, Inc. because it has not filed any periodic reports since...

  8. Satellite Technology Contribution to Water and Food Security

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  9. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  10. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  11. Biofuels. Environment, technology and food security

    International Nuclear Information System (INIS)

    Escobar, Jose C.; Lora, Electo S.; Venturini, Osvaldo J.; Yanez, Edgar E.; Castillo, Edgar F.; Almazan, Oscar

    2009-01-01

    The imminent decline of the world's oil production, its high market prices and environmental impacts have made the production of biofuels to reach unprecedent volumes over the last 10 years. This is why there have been intense debates among international organizations and political leaders in order to discuss the impacts of the biofuel use intensification. Besides assessing the causes of the rise in the demand and production of biofuels, this paper also shows the state of the art of their world's current production. It is also discussed different vegetable raw materials sources and technological paths to produce biofuels, as well as issues regarding production cost and the relation of their economic feasibility with oil international prices. The environmental impacts of programs that encourage biofuel production, farmland land requirements and the impacts on food production are also discussed, considering the life cycle analysis (LCA) as a tool. It is concluded that the rise in the use of biofuels is inevitable and that international cooperation, regulations and certification mechanisms must be established regarding the use of land, the mitigation of environmental and social impacts caused by biofuel production. It is also mandatory to establish appropriate working conditions and decent remuneration for workers of the biofuels production chain. (author)

  12. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  13. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  14. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  15. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  16. Blockchain Technology: A new secured Electronic Health Record System

    OpenAIRE

    Tamazirt , Lotfi; Alilat , Farid; Agoulmine , Nazim

    2018-01-01

    International audience; Nowadays, health systems are looking for effective ways to manage more patients in a shorter time, and to increase the quality of care through better coordination to provide quick, accurate and non-invasive diagnostics to patients. This paper aims to solve the dependence on trusted third parties by proposing a new management strategy, storage and security in a decentralized network through Blockchain technology. The proposed system also aims to offer a solution to help...

  17. Proceedings of the 1989 Carnahan conference on security technology

    International Nuclear Information System (INIS)

    DeVore, R.W.

    1989-01-01

    This book contains the proceedings of the 1989 Carnahan conference on security technology and crime countermeasures. Topics covered include: study of methods for the enhancement of classified document control and protection; research and development of a portable microfocus x-ray system capable of providing ultra-high resolution images of improvised explosive devices; and BombCAD - a CAD-based technique for assessing bomb vulnerability and designing and evaluating bomb defense measures

  18. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  19. A Survey On Biometric Security Technologies From Cloud Computing Perspective

    Directory of Open Access Journals (Sweden)

    Shivashish Ratnam

    2015-08-01

    Full Text Available Cloud computing is one of the rising technologies that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods such as passwords and IDs are well known and hence biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud providers section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.

  20. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  1. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  2. Security training with interactive laser-video-disk technology

    International Nuclear Information System (INIS)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  3. Southwest Regional Clean Energy Incubation Initiative (SRCEII)

    Energy Technology Data Exchange (ETDEWEB)

    Webber, Michael [Univ. of Texas, Austin, TX (United States)

    2017-10-31

    The Austin Technology Incubator’s (ATI’s) Clean Energy Incubator at the University of Texas at Austin (ATI-CEI) utilized the National Incubator Initiative for Clean Energy (NIICE) funding to establish the Southwest Regional Clean Energy Incubation Initiative, composed of clean energy incubators from The University of Texas at Austin (UT-Austin), The University of Texas at El Paso (UTEP), The University of Texas at San Antonio (UTSA), and Texas A&M University (TAMU).

  4. Micro and Small Enterprises Incubator - Phase III

    International Development Research Centre (IDRC) Digital Library (Canada)

    The goals of the Mozambique Information and Communication Technology Micro and Small Enterprises Incubator (MICTI Incubator) are twofold: to identify sustainable opportunities for technology-based businesses in priority development areas; and to test the assumption that technology-based businesses can mentor the ...

  5. Final Technical Report: The Incubation of Next-Generation Radar Technologies to Lower the Cost of Wind Energy

    Energy Technology Data Exchange (ETDEWEB)

    Schroeder, John [Texas Tech Univ., Lubbock, TX (United States); Hirth, Brian [Texas Tech Univ., Lubbock, TX (United States); Guynes, Jerry [Texas Tech Univ., Lubbock, TX (United States)

    2017-03-15

    The National Wind Institute (NWI) at Texas Tech University (TTU) has had an impressive and well documented 46-year history of wind related research activities (http://www.depts.ttu.edu/nwi/). In 2011 with funding from the United States Department of Energy (DOE), an NWI team applied radar technologies and techniques to document the complex flows occurring across a wind plant. The resulting efforts yielded measurements that exceeded the capabilities of commercial lidar technologies with respect to maximum range, range resolution and scan speed. The NWI team was also the first to apply dual-Doppler synthesis and objective analysis techniques to resolve the full horizontal wind field (i.e. not just the line-of-sight wind speeds) to successfully define turbine inflow and wake flows across large segments of wind plants. While these successes advanced wind energy interests, the existing research radar platforms were designed to serve a diversity of meteorological applications, not specifically wind energy. Because of this broader focus and the design choices made during their development, the existing radars experienced technical limitations that inhibited their commercial viability and wide spread adoption. This DOE project enabled the development of a new radar prototype specifically designed for the purpose of documenting wind farm complex flows. Relative to other “off the shelf” radar technologies, the specialized transmitter and receiver chains were specifically designed to enhance data availability in non-precipitating atmospheres. The new radar prototype was integrated at TTU using components from various suppliers across the world, and installed at the Reese Technology Center in May 2016. Following installation, functionality and performance testing were completed, and subsequent comparative analysis indicated that the new prototype greatly enhances data availability by a factor of 3.5-50 in almost all atmospheric conditions. The new prototype also provided

  6. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging Industry for Impact... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  7. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...

  8. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...

  9. The Department of Energy's safeguards and security technology development program

    International Nuclear Information System (INIS)

    Smith, G.D.; Pocratsky, C.A.

    1995-01-01

    The US DOE has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the US, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE. Some examples of dramatic Departmental mission changes that directly impact their security technology development program are given. A few development efforts are highlighted as examples of efforts currently being sponsored. They are: automated sensor testing devices to help reduce the requirement for personnel to enter vaults containing highly radioactive nuclear materials; a vehicle inspection portal to screen vehicles for hidden passengers, nuclear material, explosives, and other contraband; non-lead and short-range ammunition as an environmentally safe alternative to lead ammunition; a complex-wide visitor access control system to allow all DOE employees to travel to all sites with a commonly recognized credential; automated nuclear material monitoring technologies to provide assurance that material in storage has not been tampered with; laser radar as a potential solution to early warning deficiencies throughout the Department; performance testing standards for many security products to include an automated and consistent standard for assessing the quality of video; low temperature pyrotechnic smoke as a possible adversary delay mechanism; modular vaults to provide temporary protection for nuclear material during D and D activities, and a protection approach for restricted passage areas such as the volume above a tiled ceiling or within a crawl space

  10. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  11. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... FURTHER INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate...

  12. Project for the adaptation of the Instituto Nacional de Investigaciones Nucleares (ININ) to work as companies incubator, and the business plan as support device in the achievement of successful base technological companies

    International Nuclear Information System (INIS)

    Rubio A, C.R.

    1996-01-01

    The purpose of this project is to study an option to reduce technology dependence by taking advantage of the technology based companies generated by the organisms called 'Companies Incubators'. The first point given, is an introduction about incubation applied to national companies and the experiences had about them. There are also suggested some indicators which can be used to develop the incubator tasks. Once it has been defined the topic about incubation in the country, it is provided information about the items determining the company performance within an incubator. In order to do this, it is shown the way the Instituto Nacional de Investigaciones Nucleares can provide not only its facilities but also qualified personnel working for them. Thus it is given a scheme along with a brief organization description and key personnel for the incubator, stating the functions and responsibilities per each one of the persons who are part of the project direction and leading. The bases for the incubator are stated, as well as the requirements to start-up a company being supported by a company incubator. The key points to have a succesful development for the incubator are: the service it can give as well as the guidelines for companies entrance, which are classified into two sorts of customers, external and internal. It is also included a market research about the main product derived from creating a company incubator, as well as the sub-products, the market area, this is directed to the people who will benefit from it, the supply and demand involved with ININ. The main tool used was Business Plan, which defines its importance within the organization and activities guide, it is also included the Business Plan structure

  13. Intelligent Facial Recognition Systems: Technology advancements for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  14. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  15. Nuclear science, technology and innovation in Canada - securing the future

    Energy Technology Data Exchange (ETDEWEB)

    Walker, R.S. [Atomic Energy of Canada Limited, Chalk River, ON (Canada)

    2014-07-01

    As a Tier 1 Nuclear Nation, Canada has a rich and proud history of achievement in nuclear Science, Technology and Innovation (ST&I) -- from commercializing the CANDU power system around the world, advancing fuel technology and nuclear safety, to protecting human health through nuclear medicine and cancer therapy technology. Today, the nuclear industry in Canada is actively working to secure its promising, long-term place in the world and is embracing the change necessary to fulfill the enormous potential for good of nuclear technology. For its part, the Canadian Government is taking a bold new public policy approach to nuclear ST&I, by restructuring its large, multi-faceted AECL Nuclear Laboratories. Through the restructuring, AECL, as Canada's premier nuclear science and technology organization, will be better positioned for success via an incentivized 'Government-owned-Contractor-operated', private-sector management model. The aim of this new approach is to enhance and grow high-value nuclear innovation for the marketplace, strengthen the competitiveness of Canada's nuclear sector, and reduce costs to the Government of Canada with time. This approach will play a key role in ensuring a bright future for the Canadian Nuclear Industry domestically and globally as it launches its 25-year Vision and Action Plan, where one of the priority action areas is support for a strong, forward-looking, nuclear ST&I agenda. As the new model for the Nuclear Laboratories is moved forward by the Government, with the support of AECL and industry, Canada's nuclear expertise and knowledge continue to be expanded and deepened through the work of the Laboratories' ten Centres of Excellence, where AECL's fundamental approach is guided by the reality that ST&I is needed in all aspects of the nuclear cycle, including decommissioning, waste management and environmental protection. (author)

  16. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  17. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  18. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  19. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  20. Privacy and Security within Biobanking: The Role of Information Technology.

    Science.gov (United States)

    Heatherly, Raymond

    2016-03-01

    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source. © 2016 American Society of Law, Medicine & Ethics.

  1. Science and technology and their implications for peace and security

    International Nuclear Information System (INIS)

    1990-01-01

    The issue of scientific and technological developments in relation to international peace and security has recently attracted a great deal of interest in the international community, due partly to their enormous potential for the well-being of humanity and also to their enormous implications for instability in the world, an instability characterized as the 'quantitative arms race'. There is a growing concern that, in parallel with 'quantitative disarmament' between the major Powers and the East and West Europe, a new rivalry might develop and extend to the quantitative improvement of weapons, with world-wide consequences. The General Assembly of United Nations has considered this problem and adopted several resolutions on the matter. There has been a great deal of interest in the continuation of international dialogue on the subject

  2. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  3. INTERNET SECURITYTECHNOLOGY AND SOCIAL AWARENESS OF THE DANGERS

    Directory of Open Access Journals (Sweden)

    Laskowski Piotr Paweł

    2017-06-01

    Full Text Available The article describes selected issues related to user safety on the Internet. This safety consists of a number of factors such as the technology that we use to communicate and to browse the Internet, and habits and behaviors that we have acquired and through which we can identify at least some typical hazards encountered on the Web. Knowledge of software and the ability to use it and to configure it properly as well as checking regularly for security updates reduces the risk of data loss or identity theft. Public awareness of threats continues to grow, but there are also new, previously unknown threats; that is why it is so important to inform of the dangers by all available channels of communication.

  4. Review of the model of technological pragmatism considering privacy and security

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina M.

    2013-01-01

    Full Text Available The model of technological pragmatism assumes awareness that technological development involves both benefits and dangers. Most modern security technologies represent citizens' mass surveillance tools, which can lead to compromising a significant amount of personal data due to the lack of institutional monitoring and control. On the other hand, people are interested in improving crime control and reducing the fear of potential victimization which this framework provides as a rational justification for the apparent loss of privacy, personal rights and freedoms. Citizens' perception on the categories of security and privacy, and their balancing, can provide the necessary guidelines to regulate the application of security technologies in the actual context. The aim of this paper is to analyze the attitudes of students at the University of Belgrade (N = 269 toward the application of security technology and identification of the key dimensions. On the basis of the relevant research the authors have formed assumptions about the following dimensions: security, privacy, trust in institutions and concern about the misuse of security technology. The Prise Questionnaire on Security Technology and Privacy was used for data collection. Factor analysis abstracted eight factors which together account for 58% of variance, with the highest loading of the four factors that are identified as security, privacy, trust and concern. The authors propose a model of technological pragmatism considering security and privacy. The data also showed that students are willing to change their privacy for the purpose of improving security and vice versa.

  5. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon; Lee, Sang Heon

    2012-01-01

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  6. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Sang Heon [Korea National Defense University, Goyang (Korea, Republic of)

    2012-05-15

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  7. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  8. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  9. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  10. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  11. Rights management technologies: A good choice for securing electronic healthrecords?

    NARCIS (Netherlands)

    Petkovic, M.; Katzenbeisser, S.; Kursawe, K.; Pohlmann, N.; Reimer, H.; Schneider, W.

    2007-01-01

    Advances in healthcare IT bring new concerns with respect to privacy and security. Security critical patient data no longer resides on mainframes physically isolated within an organization, where physical security measures can be taken to defend the data and the system. Modern solutions are heading

  12. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  13. Scanning technology with multi-slice helical CT in security inspection domain

    International Nuclear Information System (INIS)

    Wang Jue; Wang Fuquan; Jiang Zenghui

    2008-01-01

    The paper analyzes the technology conditions of security inspection in home and abroad, and expatiates technology of spiral CT and how to define CT value etc, with studying on the key technology of spiral CT scanning way (X-RAY, detector, technology of pulley etc) and mutual relation. By comparing the present products of security inspection, the conclusion was drawn that it is inevitable to develop the tendency of security inspection area with the checking and discerning the substance by using the technology of multi-layer spiral CT. (authors)

  14. A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies

    OpenAIRE

    Reddy, G. Nikhita; Reddy, G. J. Ugander

    2014-01-01

    Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is cyber crimes which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper ma...

  15. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  16. NETWORK RELATIONSHIPS IN SMALL INCUBATED TECHNOLOGY-BASED (ITBS FIRMS: A STUDY OF ITS IMPORTANCE TO ORGANIZATIONAL PERFORMANCE IN THE PERCEPTION OF ENTREPRENEURS

    Directory of Open Access Journals (Sweden)

    Alessandra Vasconcelos Gallon

    2010-01-01

    Full Text Available The objective of this article is to describe the network of relationships and identify the importance of these relationships to the organizational performance of small ITBs incubated in the perception of entrepreneurs. Therefore, the research was exploratory, with qualitative method in the first part and descriptive, using a quantitative method in the continuation. Data were collected through a script with open questions and two structured questionnaires. The manager of the incubator and entrepreneurs from 14 residents were ITBs social subjects respondents. Component analysis of the relationship network of ITBs was to: (i examine the characteristics of the network of relationships of ITBs incubated by a statement of means-ends relationships, related by links of influence, and (ii note that there are line between efforts to meet the goals set by both ITBs incubated, as the incubator, and the importance of achieving these objectives for the improvement of organizational performance of ITBs.

  17. NETWORK RELATIONSHIPS IN SMALL INCUBATED TECHNOLOGY-BASED (ITBS FIRMS: A STUDY OF ITS IMPORTANCE TO ORGANIZATIONAL PERFORMANCE IN THE PERCEPTION OF ENTREPRENEURS

    Directory of Open Access Journals (Sweden)

    Alessandra Vasconcelos Gallon

    2009-12-01

    Full Text Available The objective of this article is to describe the network of relationships and identify the importance of these relationships to the organizational performance of small ITBs incubated in the perception of entrepreneurs. Therefore, the research was exploratory, with qualitative method in the first part and descriptive, using a quantitative method in the continuation. Data were collected through a script with open questions and two structured questionnaires. The manager of the incubator and entrepreneurs from 14 residents were ITBs social subjects respondents. Component analysis of the relationship network of ITBs was to: (i examine the characteristics of the network of relationships of ITBs incubated by a statement of means-ends relationships,related by links of influence, and (ii note that there are line between efforts to meet the goals set by both ITBs incubated, as the incubator, and the importance of achieving these objectives for the improvement of organizational performance of ITBs.

  18. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  19. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  20. Fiber-optic perimeter security system based on WDM technology

    Science.gov (United States)

    Polyakov, Alexandre V.

    2017-10-01

    Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.

  1. A Sustainable Technology Contribuiting to the Food Security

    Directory of Open Access Journals (Sweden)

    Dra. Rosa Catalina Bermúdez-Savòn

    2015-11-01

    Full Text Available A sustainable way for food and energetic security in rural and the city regions, is presented with the application of the solid state fermentation for the biotransformation of lignocellulosic by-products and agro-industrial wastes with white-rot fungi. Inamush as advantages of this technology, is showed the cultivation of mushroom Pleurotus spp.on coffee pulp, cedar chip , coconut and cocoa shells, and the influence of it´s mixture (1:1, trough examination of their growth rates and conversion efficacy to fruiting bodies, which cause contamination of soil and water, because of large volumes and difficult management. The use of residues for these cultive was consolidate such as alternative viable for food production, capable to satisfy the protein and nutritive necessity of population in the non-developing countries, besides low cost production, high protein content and obtention in large quantity in short time. In addition to produce complements for animal feet, such as the spent oyster mushroom substrate postcosecha is detoxified, has proteic content and better digestibility than original substrates,and can be used as animal feed or fertilizer, at the same time, was eradicated the problem of environmental contamination of these residues provoking and further contribution at sustainable development of the communities.

  2. Nuclear material facilities - security systems and technology R and D trends

    International Nuclear Information System (INIS)

    Ellis, D.; Steele, B.

    2002-01-01

    Full text: In the US, physical security research and development (R and D) during the 1970s and 1980s created a body of technology and systems engineering that largely defined the industry for several decades. However, despite today's terrorists threats and risks, the overall funding of new and innovative physical security solutions is relatively very small. Such factors constraining physical security R and D include the expansion of overall security responsibilities, the emphasis on programmatic and business performance, in addition to evolving (mis)perceptions that 'the problem has been solved' or that 'anyone can do security'. Underlying these factors, the lack of robust standards and certifications has limited the development and application of physical security products, systems, and services. The research and development of new security technologies must be evaluated against very demanding constraints - including costs/benefits, emerging threats, and policies. Going forward, the goal will be to create a more comprehensive approach to physical security of nuclear material facilities that matches evolving threats and that will complement the transition to an integrated security/operations management environment. Such a management model evaluates the additional value of increasing security alternatives in addition to determining trade-offs between the programmatic mission and security issues. Correspondingly, more explicit and strategically useful measures must be developed to determine importance that, in turn, will influence security-related R and D efforts. The research and development of security technologies should be based upon identified needs and requirements resulting from a systematic analysis of the threat and other conditions. In particular, security technologies and systems must be evaluated in terms of current and long-term impacts. Such needs are (will be) diverse and will depend upon sustained research investments in a broad range of technologies

  3. Development of a security system for assisted reproductive technology (ART).

    Science.gov (United States)

    Hur, Yong Soo; Ryu, Eun Kyung; Park, Sung Jin; Yoon, Jeong; Yoon, San Hyun; Yang, Gi Deok; Hur, Chang Young; Lee, Won Don; Lim, Jin Ho

    2015-01-01

    In the field of assisted reproductive technology (ART), medical accidents can result in serious legal and social consequences. This study was conducted to develop a security system (called IVF-guardian; IG) that could prevent mismatching or mix-ups in ART. A software program was developed in collaboration with outside computer programmers. A quick response (QR) code was used to identify the patients, gametes and embryos in a format that was printed on a label. There was a possibility that embryo development could be affected by volatile organic components (VOC) in the printing material and adhesive material in the label paper. Further, LED light was used as the light source to recognize the QR code. Using mouse embryos, the effects of the label paper and LED light were examined. The stability of IG was assessed when applied in clinical practice after developing the system. A total of 104 cycles formed the study group, and 82 cycles (from patients who did not want to use IG because of safety concerns and lack of confidence in the security system) to which IG was not applied comprised the control group. Many of the label paper samples were toxic to mouse embryo development. We selected a particular label paper (P touch label) that did not affect mouse embryo development. The LED lights were non-toxic to the development of the mouse embryos under any experimental conditions. There were no differences in the clinical pregnancy rates between the IG-applied group and the control group (40/104 = 38.5 % and 30/82 = 36.6 %, respectively). The application of IG in clinical practice did not affect human embryo development or clinical outcomes. The use of IG reduces the misspelling of patient names. Using IG, there was a disadvantage in that each treatment step became more complicated, but the medical staff improved and became sufficiently confident in ART to offset this disadvantage. Patients who received treatment using the IG system also went through a somewhat

  4. The Impact of the Incubator on the Internationalization of Firms

    OpenAIRE

    Raquel Engelman; Aurora Carneiro zen; Edi Madalena Fracasso

    2015-01-01

    This paper aims to examine how technology incubators contribute to the internationalization of incubated Brazilian companies. To do so, was developed a framework that, in addition to supporting research, can be used to provide a basis for studies of internationalization in small technology-based companies and incubators and to assist their managers. By comparing the factors identified as influencing internationalization and the actions and services provided by the technology incubators, an in...

  5. Advances in cyber security technology, operations, and experiences

    CERN Document Server

    Hsu, D Frank

    2013-01-01

    Advances in Cyber Security provides, in a technical yet easy to understand fashion, a real life story of the evolving cyberspace ecosystem from the perspectives of structure, function, and application. It also provides ways and means to secure and sustain this ecosystem by the collective wisdom of professionals and practitioners from government, academia, and industry across national and international boundaries.

  6. The impact of medical technology on sense of security in the palliative home care setting.

    Science.gov (United States)

    Munck, Berit; Sandgren, Anna

    2017-03-02

    The increase in the use of medical devices in palliative home care requires that patients and next-of-kin feel secure. Therefore, the aim was to describe medical technology's impact on the sense of security for patients, next-of-kin and district nurses. Deductive content analysis was conducted on data from three previous studies, using the theoretical framework 'palliative home care as a secure base'. The use of medical technology was shown to have an impact on the sense of security for all involved. A sense of control was promoted by trust in staff and their competence in managing the technology, which was linked to continuity. Inner peace and being in comfort implied effective symptom relief facilitated by pain pumps and being relieved of responsibility. Health care professionals need to have practical knowledge about medical technology, but at the same time have an awareness of how to create and maintain a sense of security.

  7. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Science.gov (United States)

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  8. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  9. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  10. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  11. New trends in science and technology implications for international peace and security

    International Nuclear Information System (INIS)

    1991-01-01

    In December 1988, the General Assembly requested the Secretary-General to follow future scientific and technological developments, especially those with potential military applications, and to evaluate their impact on international security. In resolution 43/77 A it also requested the Secretary-General to report to it at its forty-fifth session. The broad fields in which scientific and technological developments are taking place were identified as: information technology, biotechnology, materials technology, nuclear technology and space technology. These assessments were discussed by a wider group of experts at a high-level conference on ''New trends in science and technology: implications for international peace and security'', held in April 1990 in the city of Sendai, Japan. The Conference, which was attended by nearly 100 participants from over 20 countries, addressed issues of technological change and global security, new technologies and the search for security in the post-cold-war era, and national policy-making and international diplomacy in an era of rapid technological change. General approaches to technology assessment and technology trends in selected areas were also discussed. The positions taken by Member States on the subject of establishing a mechanism for technology assessment were also taken into account. The highlights of the report are summarized

  12. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  13. Evolution of Biotechnology and Information Technology and Its Impact on Human Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2015-01-01

    Full Text Available Abstract: The development of post-industrial society initiates profound economic, technological and cultural change in the way of life of all mankind. The revolutionary breakthroughs in the field of new technologies such as biotechnology and information technology are reflected in all spheres of human activity, directly affecting the human security. The article analyzes the consequences of widespread usage biotechnology and information technology in the foreign policy practice on the basis of the human security theory. The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. Human security threats associated with the use of biotechnology are placed in the broader context of global trends in scientific and technological development. The recommendations are formulated in the field of foreign policy and international cooperation, which would neutralize new threats to international and personal safety arising at the present stage of development of biotechnology. The authors conclude that in order to ensure ethical regulation of new technologies that address issues of human security, it is necessary to organize multi-stakeholder partnerships at national and international level with the participation of states, representatives of civil society, business and the research community.

  14. Technology safeguards needed as security rule audits loom.

    Science.gov (United States)

    Gersh, Deborah; Hoey, Laura G; McCrystal, Timothy M; Tolley, David C

    2012-05-01

    The Department of Health and Human Services will conduct security rule audits that will involve on-site visits and include: Compliance-focused interviews with key organizational leaders. Scrutiny of physical operations controls, especially regarding storage, maintenance, and use of protected health information. Assessment of organizational policies and procedures to ensure compliance with privacy and security rules. Identification of regulatory compliance areas of concern.

  15. Security Aspects for Business Solution Development on Portal Technology

    OpenAIRE

    Ovidiu R?DU??; Adrian MUNTEANU

    2012-01-01

    In the scope of portal development, in order to talk about security issues, concerns, and solutions, it is necessary to define a few terms: authentication, authorization, Single Sign-On (SSO), confidentiality, integrity, and non-repudiation. Focusing on the scope of what the portal developer and designer need to know, below it will be explained these concepts, considering it is important to define and make a brief analysis of these terms for understanding of achieving the security goals.

  16. Adaptive security systems -- Combining expert systems with adaptive technologies

    International Nuclear Information System (INIS)

    Argo, P.; Loveland, R.; Anderson, K.

    1997-01-01

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting

  17. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  18. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  19. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  20. Integrating education and incubation

    DEFF Research Database (Denmark)

    Hjortsø, Carsten Nico Portefée; Riis, Nina Louise Fynbo

    During the last decade student business incubation activities have become mainstream activities in Western universities. This is also the case in Danish higher education where all universities have established in-house student incubators. The models applied are different and place varied emphasis...... on the integration of extracurricular activities with formal credit awarding activities. In a Danish context, such integration has become increasingly important due to recent political reforms aimed at shortening the time it takes students to graduate in order to reduce national higher education expenditures....... On this backdrop, this paper explores the following questions: • How and to what extent do university student incubators collaborate with formal study programmes? • And which factors influence this integration of curricular and extracurricular activities?...

  1. Humidification of incubators.

    Science.gov (United States)

    Harpin, V A; Rutter, N

    1985-01-01

    The effect of increasing the humidity in incubators was examined in 62 infants of less than 30 weeks' gestation. Thirty three infants nursed in high humidity for two weeks were compared retrospectively with 29 infants from an earlier study who were nursed under plastic bubble blankets or with topical paraffin but without raised humidity. Humidification reduced skin water loss and improved maintenance of body temperature from birth, but did not delay the normal postnatal maturation of the skin. Infants nursed without humidity frequently became hypothermic in spite of a high incubator air temperature. These advantages must be weighed against the finding that overheating was more common and Pseudomonas was more commonly isolated from the infants. It is recommended that incubator humidity is raised for babies under 30 weeks' gestation in the first days of life but meticulous attention should be paid to fluid balance, avoiding overheating, and cleansing of the humidifier reservoir. PMID:3985653

  2. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of... Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY...

  3. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...

  4. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...

  5. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    Science.gov (United States)

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  6. Technology scale and supply chains in a secure, affordable and low carbon energy transition

    International Nuclear Information System (INIS)

    Hoggett, Richard

    2014-01-01

    Highlights: • Energy systems need to decarbonise, provide security and remain affordable. • There is uncertainty over which technologies will best enable this to happen. • A strategy to deal with uncertainty is to assess a technologies ability to show resilience, flexibility and adaptability. • Scale is important and smaller scale technologies are like to display the above characteristics. • Smaller scale technologies are therefore more likely to enable a sustainable, secure, and affordable energy transition. - Abstract: This research explores the relationship between technology scale, energy security and decarbonisation within the UK energy system. There is considerable uncertainty about how best to deliver on these goals for energy policy, but a focus on supply chains and their resilience can provide useful insights into the problems uncertainty causes. Technology scale is central to this, and through an analysis of the supply chains of nuclear power and solar photovoltaics, it is suggested that smaller scale technologies are more likely to support and enable a secure, low carbon energy transition. This is because their supply chains are less complex, show more flexibility and adaptability, and can quickly respond to changes within an energy system, and as such they are more resilient than large scale technologies. These characteristics are likely to become increasingly important in a rapidly changing energy system, and prioritising those technologies that demonstrate resilience, flexibility and adaptability will better enable a transition that is rapid, sustainable, secure and affordable

  7. Assessment of the Technological Changes Impact on the Sustainability of State Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Olexandr Yemelyanov

    2018-04-01

    Full Text Available Currently, the governments of many countries are facing with a lack of funds for financing programs for social protection of population. Among the causes of this problem, we can indicate the high unemployment rate, which, among other things, is due to implementation of labor-saving technologies. The purpose of this work is to study the impact of technological changes on the sustainability of the state social security system in Ukraine. The general approaches to the assessment of the stability of the state social security system are described. The simulation of the effect of economically efficient technological changes on the company’s income and expenses was carried out. Some patterns of such changes are established. The group of productive technological changes types is presented. The model is developed, and an indicator of the impact estimation of efficiently effective technological changes on the stability of the state social security system is proposed. The analysis of the main indicators of the state social security system functioning of Ukraine is carried out. The dynamics of indicators characterizing the labor market of Ukraine is analyzed. The influence of changes in labor productivity on costs and profits by industries of Ukraine is estimated. The evaluation of the impact of economically efficient technological changes in the industries of Ukraine on the stability of its state social security system is carried out. The different state authorities can use the obtained results for developing measures to manage the sustainability of the state social security system.

  8. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  9. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  10. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Brown, G.E. Jr.

    1990-01-01

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world's inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  11. New technologies and the search for security: Prospects for a post-cold-war era

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Jr, G E

    1991-12-31

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world`s inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  12. Evaluation methodologies for security testing biometric systems beyond technological evaluation

    OpenAIRE

    Fernández Saavedra, María Belén

    2013-01-01

    The main objective of this PhD Thesis is the specification of formal evaluation methodologies for testing the security level achieved by biometric systems when these are working under specific contour conditions. This analysis is conducted through the calculation of the basic technical biometric system performance and its possible variations. To that end, the next two relevant contributions have been developed. The first contribution is the definition of two independent biometric performance ...

  13. Japanese Technology and U.S. National Security

    Science.gov (United States)

    1990-12-01

    Japanese penchant for situational ethics allowed a sharp psychological about-face following the war, enabling them to accept the American policies. Power...Reagan/Bush Administrations have exaggerated the nation’s defense needs and that selfish interests are overriding objectivity and common sense in the ...security.195 They view the United States as having benign political motives and having the largest domestic market needed to develop regional

  14. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    OpenAIRE

    Mustafijur Rahman; A.H.M Zadidul Karim; Sultanur Nyeem; Faisal Khan; Golam Matin

    2015-01-01

    "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detecti...

  15. Using automatic identification system technology to improve maritime border security

    OpenAIRE

    Lindstrom, Tedric R.

    2014-01-01

    Approved for public release; distribution is unlimited Our coastal waters are the United States’ most open and vulnerable borders. This vast maritime domain harbors critical threats from terrorism, criminal activities, and natural disasters. Maritime borders pose significant security challenges, as nefarious entities have used small boats to conduct illegal activities for years, and they continue to do so today. Illegal drugs, money, weapons, and migrants flow both directions across our ma...

  16. The Role of Agricultural Technology in Food and Nutritional Security ...

    African Journals Online (AJOL)

    Strengthening of agricultural research and extension. The development and utilization of profitable and environmentally-friendly technology is an essential factor for the transformation of agriculture into a modern sector. The impact of technology can be attained through the revitalization of agricultural research and extension ...

  17. Mobile Technology: The Foundation for an Engaged and Secure Campus Community

    Science.gov (United States)

    Chapel, Edward

    2008-01-01

    Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…

  18. Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016

    CERN Document Server

    Serrhini, Mohammed; Felgueiras, Carlos

    2017-01-01

    This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Onli...

  19. Security of OS-level virtualization technologies: Technical report

    OpenAIRE

    Reshetova, Elena; Karhunen, Janne; Nyman, Thomas; Asokan, N.

    2014-01-01

    The need for flexible, low-overhead virtualization is evident on many fronts ranging from high-density cloud servers to mobile devices. During the past decade OS-level virtualization has emerged as a new, efficient approach for virtualization, with implementations in multiple different Unix-based systems. Despite its popularity, there has been no systematic study of OS-level virtualization from the point of view of security. In this report, we conduct a comparative study of several OS-level v...

  20. Finding the right technology solutions to secure our borders

    CSIR Research Space (South Africa)

    Venter, CP

    2015-10-01

    Full Text Available technologies used • Radar and Electronic warfare systems, optronic systems, unmanned aerial vehicles, databases, software, networks. • Preparation time 8 months • Executed over two weeks Working with real results After the experiment • Overall...

  1. Contribuição das incubadoras tecnológicas na internacionalização das empresas incubadas Contribución de las incubadoras tecnológicas a la internacionalización de las empresas incubadas Contribution of technology incubators to the internationalization of incubated companies

    Directory of Open Access Journals (Sweden)

    Raquel Engelman

    2013-03-01

    empresas de base tecnológica incubadas. Se desarrolló el modelo a partir de la literatura sobre las dos áreas de interés de la investigación. Se analizaron referencias sobre la internacionalización de empresas, por medio de un estudio de los factores que influyen en su internacionalización, especialmente para micro y pequeñas empresas de base tecnológica. Asimismo, se estudiaron aspectos del proceso de incubación de empresas de tecnología, así como las acciones y los servicios prestados por las incubadoras. Se llevó a cabo un estudio descriptivo con 40 incubadoras tecnológicas brasileñas (50% de la población y que cumplieron con los siguientes criterios: estar en funcionamiento desde un periodo superior a dos años y tener al menos una empresa graduada. Los cuestionarios mostraron que el 40% de las incubadoras de la muestra poseen un programa formal dirigido a la internacionalización de las empresas incubadas y el 60% de las incubadoras tienen empresas que iniciaron el proceso de internacionalización. Los resultados indicaron una relación positiva entre incubación e internacionalización. La investigación presenta indicaciones sobre acciones y servicios que son eficaces para la internacionalización de las empresas.This work aims to verify how Brazilian technology incubators contribute to the internationalization of incubated companies from the point of view of their management. To meet this objective we developed a model that, in addition to supporting this study, could provide a basis for studies of internationalization in small technology-based companies and incubators and assist their management. The model was based on the literature on two relevant areas of work: first, a survey was carried out on the factors influencing the internationalization of enterprises, especially micro and small technology-based companies; second, aspects of the process of incubation of technology ventures were examined, as well as the actions and services provided by

  2. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats.

    Science.gov (United States)

    Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang

    2017-08-01

    Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

  3. Security technology discussion for emergency command system of nuclear power plant

    International Nuclear Information System (INIS)

    Liu Zhenjun

    2014-01-01

    Nuclear power plant emergency command system can provide valuable data for emergency personnel, such as the unit data, weather data, environmental radiation data. In the course of emergency response, the emergency command system provides decision support to quickly and effectively control and mitigate the consequences of the nuclear accident, to avoid and reduce the dose received by staff and the public, to protect the environment and the public. There are high performance requirements on the security of the system and the data transmission. Based on the previous project and new demand after the Fukushima incident, the security technology design of emergency system in nuclear power plant was discussed. The results show that the introduction of information security technology can effectively ensure the security of emergency systems, and enhance the capacity of nuclear power plant to deal with nuclear accidents. (author)

  4. Microsoft Technology as an Optimization Tool in Promoting Security and Functionality of the Educational System

    Directory of Open Access Journals (Sweden)

    Jelena Jardas Antonic

    2008-10-01

    Full Text Available Abstract - In the cooperation with the City of Rijeka, the project of analysis of the functional and security situation of information infrastructure has been initiated in 24 schools in the authority of the city. Having completed the multicriteria analysis of the collected data, we have built a model of implementing Microsoft service technologies. The implementation should satisfy the elementary security principles that are required by the security standards today, maximizing functionality of infrastructure and minimizing network administration tasks. Server technology that has been used in this solution is Microsoft Widows 2003 Server R2 and Internet Security and Acceleration Server 2006, as well as the GFI WebMonitor and antivirus.

  5. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  6. MUSES RT2AE V P/DP: On the Road to Privacy-Friendly Security Technologies in the Workplace

    OpenAIRE

    Van Der Sype, Yung Shin Marleen; Guislain, Jonathan; Seigneur, Jean-Marc; Titi, Xavier

    2016-01-01

    Successful protection of company data assets requires strong technological support. As many security incidents still occur from within, security technologies often include elements to monitor the behaviour of employees. As those security systems are considered as privacy-intrusive, they are hard to align with the privacy and data protection rights of the employees of the company. Even though there is currently no legal obligation for developers to embed privacy and data protection in security...

  7. Use of Persuasive Technology to Change End-Users- IT Security Aware Behaviour: A Pilot Study

    OpenAIRE

    Ai Cheo Yeo; Md. Mahbubur Rahim; Yin Ying Ren

    2008-01-01

    Persuasive technology has been applied in marketing, health, environmental conservation, safety and other domains and is found to be quite effective in changing people-s attitude and behaviours. This research extends the application domains of persuasive technology to information security awareness and uses a theory-driven approach to evaluate the effectiveness of a web-based program developed based on the principles of persuasive technology to improve the information sec...

  8. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  9. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    Science.gov (United States)

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  10. Hawai‘i Distributed Energy Resource Technologies for Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2012-09-30

    HNEI has conducted research to address a number of issues important to move Hawai‘i to greater use of intermittent renewable and distributed energy resource (DER) technologies in order to facilitate greater use of Hawai‘i's indigenous renewable energy resources. Efforts have been concentrated on the Islands of Hawai‘i, Maui, and O‘ahu, focusing in three areas of endeavor: 1) Energy Modeling and Scenario Analysis (previously called Energy Road mapping); 2) Research, Development, and Validation of Renewable DER and Microgrid Technologies; and 3) Analysis and Policy. These efforts focused on analysis of the island energy systems and development of specific candidate technologies for future insertion into an integrated energy system, which would lead to a more robust transmission and distribution system in the state of Hawai‘i and eventually elsewhere in the nation.

  11. Applications of ultra-compact accelerator technologies for homeland security

    International Nuclear Information System (INIS)

    Sampayan, S.; Caporaso, G.; Chen, Y.J.; Falabella, S.; Guethlein, G.; Harris, J.R.; Hawkins, S.; Holmes, C.; Krogh, M.; Nelson, S.; Nunnally, W.; Paul, A.C.; Poole, B.; Rhodes, M.; Sanders, D.; Selenes, K.; Shaklee, K.; Sitaraman, S.; Sullivan, J.; Wang, L.; Watson, J.

    2007-01-01

    We report on a technology development to address explosive detector system throughout with increased detection probability. The system we proposed and are studying consists of a pixelized X-ray based pre-screener and a pulsed neutron source quantitative post verifier. Both technologies are derived from our compact accelerator development program for the Department of Energy Radiography Mission that enables gradients >10MV/m. For the pixelized X-ray source panel technology, we have performed initial integration and testing. For the accelerator, we are presently integrating and testing cell modules. For the verifier, we performed MCNP calculations that show good detectability of military and multi-part liquid threat systems. We detail the progress of our overall effort, including research and modeling to date, recent high voltage test results and concept integration

  12. Cyber-Security Issues in Healthcare Information Technology.

    Science.gov (United States)

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  13. Challenges of Information Technology Security in the NASA Environment

    Science.gov (United States)

    Santiago, S. S.

    2000-01-01

    A brief description of the NASA organization and how the CIO responsibilities are integrated into that organization followed by an introduction of the NASA ITS Program goals and objectives. An overview of the four major enterprises' cultures and how those cultures tie back to the Enterprises' missions. A description of the ITS challenges that exist stemming from the competing NASA Enterprises' requirements and how they have formed the basis of the NASA ITS Program. A talk will focus on policies and procedures and the technology being incorporated into the NASA infrastructure and how that technology ties back to the policies and procedures.

  14. Technology adoption and food security: the role of the Nigerian ...

    African Journals Online (AJOL)

    The focus of this paper is on the potential role of the Nigerian Agricultural Insurance Scheme (NAIS) in protecting the farmer from the plethora of risks associated with the transfer and introduction of modern technologies. The scheme can improve farmers' access to credit when the insurance contract is used as collateral for ...

  15. MIT Lincoln Laboratory: Technology in Support of National Security

    Science.gov (United States)

    2011-01-01

    technologies that could be uti - lized in future Landsat satellites to achieve significant economies of mass, size, power consumption, and cost, and...epitomized by the pregnancy test kit. However, immunoassays are typically based on anti bodies removed from their host cells and placed on substrates

  16. Newer Technologies for School Security. ERIC Digest Number 145.

    Science.gov (United States)

    Schneider, Tod

    This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…

  17. Security Concerns in Telecommuting within the Information Technology Industry

    Science.gov (United States)

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  18. Agricultural extension, technology adoption and household food security

    NARCIS (Netherlands)

    Santos Rocha, Jozimo

    2017-01-01

    In this thesis, I use experimental and quasi-experimental data from 25 villages and a total of 1,105 farmers from eastern DRC to investigate the relationship among agricultural training, the adoption of agricultural technologies, crop productivity, and household food insecurity and dietary

  19. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  20. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  1. How Secure Is Education in Information Technology? A Method for Evaluating Security Education in IT

    Science.gov (United States)

    Grover, Mark; Reinicke, Bryan; Cummings, Jeff

    2016-01-01

    As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…

  2. Assistive Technologies and Issues Relating to Privacy, Ethics and Security

    Science.gov (United States)

    Martin, Suzanne; Bengtsson, Johan E.; Dröes, Rose-Marie

    Emerging technologies provide the opportunity to develop innovative sustainable service models, capable of supporting adults with dementia at home. Devices range from simple stand-alone components that can generate a responsive alarm call to complex interoperable systems that even can be remotely controlled. From these complex systems the paradigm of the ubiquitous or ambient smart home has emerged, integrating technology, environmental design and traditional care provision. The service context is often complex, involving a variety of stakeholders and a range of interested agencies. Against this backdrop, as anecdotal evidence and government policies spawn further innovation it is critical that due consideration is given to the potential ethical ramifications at an individual, organisational and societal level. Well-grounded ethical thinking and proactive ethical responses to this innovation are required. Explicit policy and practice should therefore emerge which engenders confidence in existing supported living option schemes for adults with dementia and informs further innovation.

  3. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S.

    2009-11-01

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report

  4. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S

    2009-11-15

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report.

  5. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  6. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  7. Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

    Science.gov (United States)

    Sammicheli, Michele; Scaglione, Marcella

    2018-01-01

    We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

  8. Technologies for security, military police, and professional policing organizations: the Department of Energy perspective

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    There are many emerging technologies that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: scannerless laser radar; next generation security systems; response force video information helmet system; access delay technologies; rapidly deployable intrusion detection systems; cost risk benefit analysis.

  9. About Place and Role of Information and Communication Technologies, Information Security at the Present Stage

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-12-01

    Full Text Available In the present article author considers questions of importance of information and communication technologies in modern information society and about information security. In the course of the research the author analyzes opinions both known Russian, and famous foreign scientists and practicians from various countries of the world (Italy, the USA, Portugal, etc.. Author emphasizes importance of information and communication technologies at the present stage of development of society and state.

  10. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  11. Risk, security and technology: governing football supporters in the twenty-first century

    NARCIS (Netherlands)

    Spaaij, R.

    2013-01-01

    This paper critically examines the security and risk management technologies that are being used to conduct and pre-empt the behaviour of football supporters. It is shown how, in the Netherlands, pre-emptive risk management in the governing of football supporters involves a dispersed and fragmented

  12. 48 CFR 352.239-72 - Security requirements for Federal information technology resources.

    Science.gov (United States)

    2010-10-01

    ..., Security Self-Assessment Guide for Information Technology Systems and FIPS 200, on an annual basis. (C) HHS... basis, the Contractor shall provide to the Contracting Officer verification that the IT-SP remains valid... Contracting Officer verification that the IT-SC&A remains valid. Evidence of a valid system accreditation...

  13. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  14. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Science.gov (United States)

    2012-09-17

    ..., DC 20230 (or via the Internet at [email protected] ). FOR FURTHER INFORMATION CONTACT: Requests for... techniques or other forms of information technology. Comments submitted in response to this notice will be... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment...

  15. Mutations technology in the service of food security

    International Nuclear Information System (INIS)

    Sobeih, S.A.S.

    2013-01-01

    Nuclear techniques of various physical mutagens such as, X-rays, Gamma rays, Beta partials, Neutrons, Lasers, Electron beams, Ion beams irradiation and some chemical mutagens had significantly contributed in developing superior crop varieties of seeds and vegetatively propagated crops. Those released mutant cultivars in different groups had great economic impact on agriculture and food production and added billions of dollars in the economy of many countries. More than 3200 crops varieties of different crops have been officially released by mutation breeding technique. Almost half (48%) of all mutant crop varieties is recorded in cereals. Rice is the crop with the highest number of mutants and accounts for (53%) of the mutant cereals under cultivations followed by barley which makes up (20%) of all cereals mutant varieties globally. More than half (60%) of the mutants crop varieties have been released in Asia. China alone accounts for more than(25%) of all mutant varieties that have been officially released globally. Nuclear technology is an important way to reduce the gap of food between consumption and climate change and on the other hand to increase production. (author)

  16. Combining technologies - radiography and neutron based - for cargo security applications

    International Nuclear Information System (INIS)

    Gozani, T.; Liu, F.; Sivakumar, M.; Brown, D.

    2004-01-01

    Inspection of air and sea cargo has traditionally been done by X-ray systems of various energies relying on operators to analyze images looking for anomalies in the image of cargo that may signify a threat. This has shown only limited success in detecting explosives and other threats, which do not have any distinctive shapes. OSI Systems, through its subsidiaries Rapiscan and Ancore, has combined high-energy x-ray radiography with thermal neutron analysis (TNA) to create the combined system-''TNX''. The system provides automatic material specific detection of bulk threat items, like explosives, while furnishing the operator with a high-resolution image for weapons detection and also to identify anomalies for the TNA to inspect. Similarly the Pulsed Fast Neutron Analysis (PFNA) can be combined with high-energy x-ray to create a ''FNX'' system for both air and sea cargo applications. This enables the operator obtain a three dimensional image of the material composition of the cargo under inspection and remove the clutter from the image leaving only the potentially hazardous material(s) automatically while viewing a high resolution image for manifest verification and weapons. The current status of the technology will be discussed and data be presented

  17. Food Security, Institutional Framework and Technology: Examining the Nexus in Nigeria Using ARDL Approach.

    Science.gov (United States)

    Osabohien, Romanus; Osabuohien, Evans; Urhie, Ese

    2018-04-01

    Growth in agricultural science and technology is deemed essential for in-creasing agricultural output; reduce the vulnerability of rural poverty and in turn, food security. Food security and growth in agricultural output depends on technological usages, which enhances the pro-ductive capacity of the agricultural sector. The indicators of food security utilised in this study in-clude: dietary energy supply, average value of food production, prevalence of food inadequacy, among others. In this paper, we examined the level of technology and how investment in the agriculture and technology can improve technical know-how in Nigeria with a view to achieving food security. We carried out the analysis on how investment in technology and institutional framework can improve the level of food availability (a key component of food security) in Nigeria using econ-ometric technique based on Autoregressive Distribution Lag (ARDL) framework. The results showed, inter alia, that in Nigeria, there is a high level of food insecurity as a result of low attention on food production occasioned by the pervasive influence of oil that become the major export product. It was noted that the availability of arable land was one of the major factors to increase food production to solve the challenge of food insecurity. Thus, the efforts of reducing the rate of food insecurity are essential in this regards. This can also be achieved, among others, by active interactions between government and farmers, to make contribution to important planning issues that relate to food production in the country and above all, social protection policies should be geared or channelled to agricultural sector to protect farmers who are vulnerable to shocks and avert risks associated with agriculture.

  18. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-05-01

    The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.

  19. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    Science.gov (United States)

    2016-02-12

    Stockmann, Xiao Qiang. Changing Media, Changing China , New York: Oxford University Press, (01 2011) Dieter Ernst. Indigenous Innovation and...2211 China , science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...ABSTRACT Final Report: The Evolving Relationship Between Technology and National Security in China : Innovation , Defense Transformation, and China’s

  20. Arms and technology transfers: Security and economic considerations among importing and exporting states

    International Nuclear Information System (INIS)

    Lodgaard, S.; Pfaltzgraff, R.L. Jr.

    1995-01-01

    The issues of technology and armament transfers are increasingly at the forefront of problems of international security and disarmament. Three major reasons could explain this. First, the disarmament process has been very successful in the last few years, especially in the field of nuclear, as well chemical and conventional, weapons. Second the disarmament effort underway concerns primarily the old partners of the East-West confrontation. Last, the general context, characterized by the opening and widening of exchanges, the increasingly open and transparent circulation of techniques and material, and the globalization of economic relations, must be taken into account. This report, prepared by UNIDIR comprises the following subjects: General trends in defense related transfers; Political/military factors associated with the diffusion of advanced technology; economic and technological consideration; and facilitation of economic growth/maximization of regional security and stability

  1. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  2. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Petrovsky, V.

    1990-01-01

    New technologies are setting a fast pace in our world. Through science and technology we are able to make our world better, richer and more liveable to everyone. However, the new technologies have brought new mans of destruction and have confronted the world with a real prospect of self destruction. This is one of the main challenges of our age. Greater mutual confidence, openness and, if necessary, checks on how scientific and technological co-operation is used must bring down the existing barriers un the area of technological exchanges. The first results are already evident, for instance in the nuclear field. In our age, science and technology are becoming an inherent element in the comprehensive search for a new, post-confrontational system of peace, security and co-operation. United nations, together with its family of specialized agencies, is called upon to play a major positive role in finding approaches in this area. Scientific and technological progress, especially on the eve of a new millennium in the history of mankind, must serve only to enhance international peace and security and, enable everyone to live a full and worthy life

  3. Analysis of the role of business incubator in internationalization of basic technology companies Análise do papel da incubadora na internacionalização de empresas de base tecnológica, incubadas e graduadas

    Directory of Open Access Journals (Sweden)

    Gabriela Gonçalves Silveira Fiates

    2013-05-01

    Full Text Available The technological and economic changes that occurred since the second half of the twentieth century expanded markets, reduced the limits imposed by national borders and promoted a real and indisputable globalization of trade, especially for emerging countries. In this context, Brazil is shown as a major player, along with other countries that make up the BRICS - Brazil, Russia, India, China and South Africa, a group with growing political power given the relevance of their markets. Nevertheless, Brazil's share in global trade is small compared to other emerging countries. The level of internationalization is particularly low in relation to products with higher added value, with components of technological innovation. Most of the products exported by Brazil in 2011 (65.8% consists of products of low and medium-low technology, 27.9% is medium-high technology and only 6.2% is high-tech (MDIC, 2012. Thus, this article proposes to analyze the characteristics of the internationalization of small and medium-sized technology-based companies, incubated and graduated in order to identify the role of incubators in the process. We started from three basic premises: that the technology-based companies are essentially innovative companies; business incubators constitute environments for potentiating networks, both between the incubated and graduated ones with external agents And finally, the third premise is that innovation is a competitive advantage that leverages the process of internationalization of companies and has proven crucial to the competitive performance of the company in foreign markets. The research from cases of small technology-based companies shows it is relevant given the need for Brazil to stimulate the insertion of foreign companies selling  technology-intensive products, review passage The research is descriptive in character, in the form of a multicase study of six companies, three incubated and three graduated. The results show that

  4. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  5. Clinicians, security and information technology support services in practice settings--a pilot study.

    Science.gov (United States)

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  6. Business Incubators Support College Performance

    Directory of Open Access Journals (Sweden)

    I Ketut Sutama

    2018-03-01

    Full Text Available Business incubators have a very important role in developing entrepreneurship, since it gives large opportunity to its participants to develop their business skill during incubation. The Indonesian government today provides a major boost to the development of business incubators in universities or other form of higher education institutions. The purpose of this research is to analyze the validation of the establishment of business incubator in colleges. In Ministerial Regulation (Permen Minister of Cooperation and Small Medium Entrepreneurship the Republic of Indonesia No. 24/2015 explained that the head of the university, the Rector or the Director may issue a business incubators license. Thus, internal validation can be done by university or college management through the issuance of Decree (SK Establishment complete with personnel appointed as manager. Furthermore, the college, has to provide a place or room consisting of office space, tenant room at least 3, discussion room 1, and tenant production display room. External validation is carried out by tenants through their success of becoming independent businessmen after being forged or incubated in a business incubator for a maximum of 3 years in one incubation period.

  7. Diffusion of student business incubators

    DEFF Research Database (Denmark)

    Hjortsø, Carsten Nico Portefée; Honig, Benson; Riis, Nina Louise Fynbo

    education. Applying neo-institutional theory, we examine the development of student incubation activities in the field of general state-funded Danish universities. We review institutional pressures from the political sphere that led to the diffusion of student incubation, introducing a three-phase process...

  8. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  9. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  10. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    security S&T, and facilitate commercialisation of research outcomes for national benefit. The policy will be delivered through a coherent and...our economy and higher living and education standards1,2. Questions for discussion: Q2.1 Are there other imperatives or drivers that justify the...organisations can drive the uptake of new technology and knowledge. Second, private sector organisations are essential to the commercialisation of

  11. Information security awareness in small information technology-dependent business organisations

    OpenAIRE

    2015-01-01

    M.A. (Business Management) Small businesses thrive in the developing economy of South Africa and address the important issue of unemployment and poverty that exist in the country. A large number of these business organisations can be found in the province of Gauteng because of the large and diverse economic contribution the province delivers to the economy of South Africa. With the increased use of technology in the small businesses of Gauteng and South Africa, the risks around cyber-secur...

  12. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  13. Factors affecting food security and contribution of modern technologies in food sustainability.

    Science.gov (United States)

    Premanandh, Jagadeesan

    2011-12-01

    The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels. Copyright © 2011 Society of Chemical Industry.

  14. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  15. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    International Nuclear Information System (INIS)

    Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby; Rodriguez, Salvador B.; Rodriguez, Carmelo; Schleicher, Robert

    2016-01-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)'s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  16. The Impact of the Incubator on the Internationalization of Firms

    Directory of Open Access Journals (Sweden)

    Raquel Engelman

    2015-04-01

    Full Text Available This paper aims to examine how technology incubators contribute to the internationalization of incubated Brazilian companies. To do so, was developed a framework that, in addition to supporting research, can be used to provide a basis for studies of internationalization in small technology-based companies and incubators and to assist their managers. By comparing the factors identified as influencing internationalization and the actions and services provided by the technology incubators, an integrated model with four constructs (entrepreneurs; organizational characteristics; network; foreign market was built. The results demonstrate that incubation positively affects the internationalization of companies and indicate the actions and services that contribute towards the internationalization, as also reveals aspects that could be improved.

  17. The Importance of the Brain Neuro-Programming Technologies in National and Regional Security

    Directory of Open Access Journals (Sweden)

    Vasyl H. Fatkhutdinov

    2018-02-01

    Full Text Available The authors’ understanding of neuro-programming is the result of the impact on the human brain of information and communication technology (including educational one, through which in the human brain the programs of manifestation in the ontogenesis of internal creative potentials are written. This article summarizes the history of the formation of key neuro-programming technologies of the human brain as well as proves that the changes in the society’s worldview are caused by the possibilities and quality of neuro-programming technologies that society uses. Having influence over worldview stereotypes and behaviour set by the society, neuro-programming technologies essentially ensure the national security of any state and the peaceful coexistence of states in the regions and on the planet as a whole. Using historical and philosophical methods, methods of conceptualization, systematization, modeling, etc., the authors have come to the conclusion that the modern world lies in a confrontation of security strategies, in which neuro-programming technologies play a key role.

  18. Student Experiential Opportunities in National Security Careers

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  19. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems; (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis

  20. Incubator Display Software Cost Reduction Toolset Software Requirements Specification

    Science.gov (United States)

    Moran, Susanne; Jeffords, Ralph

    2005-01-01

    The Incubator Display Software Requirements Specification was initially developed by Intrinsyx Technologies Corporation (Intrinsyx) under subcontract to Lockheed Martin, Contract Number NAS2-02090, for the National Aeronautics and Space Administration (NASA) Ames Research Center (ARC) Space Station Biological Research Project (SSBRP). The Incubator Display is a User Payload Application (UPA) used to control an Incubator subrack payload for the SSBRP. The Incubator Display functions on-orbit as part of the subrack payload laptop, on the ground as part of the Communication and Data System (CDS) ground control system, and also as part of the crew training environment.

  1. Securing a better future for all: making a difference with nuclear technology

    International Nuclear Information System (INIS)

    Mohamad, Daud; )

    2014-01-01

    The IAEA is an inter-governmental organization and the world's centre of cooperation in the nuclear field. As per its mandate, the IAEA shall seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world. The IAEA executes its mandate on the basis of three pillars: nuclear verification and security, safety and technology transfer. Nuclear technologies and techniques can offer vital assistance in fighting disease, improving food security and safety, and studying and sustainably managing water resources and the environment. The IAEA's Department of Nuclear Sciences and Applications works to address these critical developmental needs by helping Member States to apply nuclear science and technology more effectively where they have a comparative advantage and can have substantial socio-economic impact. The scale of these needs is growing each day as the world's population and life expectancies increase, as global industry and migration multiply the populations of the world's cities and their demands for resources, and as these trends impact human disease, the availability of safe and sufficient supplies of food and water, the health of our terrestrial and marine ecosystems, and the variability of our climate. These are highly complex challenges, and nuclear science and technology, can make impactful contributions in helping Member States to respond to these challenges

  2. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  3. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  4. Advanced Portable Preterm Baby Incubator

    OpenAIRE

    Shaib , M.; Rashid , M.; Hamawy , L.; Arnout , M.; Majzoub , I. ,; Zaylaa , A. ,

    2017-01-01

    International audience; Nearly 20 million premature and Low Birth Weight infants are born each year in developing countries, 4 million die within their first month. These deaths occur due to the unavailability or unreliability of traditional incubators. Moreover, although Telemedicine is helpful in rural areas, the shortage of healthcare providers have made it inaccessible in both basic healthcare. Thereby, traditional preterm baby and low-birth weight incubators and therapeutic techniques la...

  5. Field studies of safety security rescue technologies through training and response activities

    Science.gov (United States)

    Murphy, Robin R.; Stover, Sam

    2006-05-01

    This paper describes the field-oriented philosophy of the Institute for Safety Security Rescue Technology (iSSRT) and summarizes the activities and lessons learned during calendar year 2005 of its two centers: the Center for Robot-Assisted Search and Rescue and the NSF Safety Security Rescue industry/university cooperative research center. In 2005, iSSRT participated in four responses (La Conchita, CA, Mudslides, Hurricane Dennis, Hurricane Katrina, Hurricane Wilma) and conducted three field experiments (NJTF-1, Camp Hurricane, Richmond, MO). The lessons learned covered mobility, operator control units, wireless communications, and general reliability. The work has collectively identified six emerging issues for future work. Based on these studies, a 10-hour, 1 continuing education unit credit course on rescue robotics has been created and is available. Rescue robots and sensors are available for loan upon request.

  6. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  7. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  8. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.; Joslyn, Cliff A.; West, Curtis L.; Schanfein, Mark J.; Sayre, Amanda M.

    2017-07-17

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLT to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.

  9. Using innovation from block chain technology to address privacy and security problems of Internet of Things

    OpenAIRE

    Manocha, Jitendra

    2017-01-01

    Internet of things (IoT) is growing at a phenomenal speed and outpacing all the technological revolutions that occurred in the past. Together with window of opportunity it also poses quite a few challenges. One of the most important and unresolved challenge is vulnerability in security and privacy in IoT. This is mainly due to lack of a global decentralized standard even though characteristically IoT is based on distributed systems. Due to lack of standard IoT has interoperability issue betwe...

  10. A Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System

    Directory of Open Access Journals (Sweden)

    Rafiya Hossain

    2017-09-01

    Full Text Available Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system is being introduced in the developing countries to avoid corruption in the collection of toll, decrease cost and increase operational efficiency. The goal of this research is to find an integrated solution that enhances security along with the advantage of automated toll collection. Inspired by the availability of many security systems, this research presents a system that can block a specific vehicle or a particular type of vehicles at the toll booths based on directives from the law enforcement agencies. The heart of the system is based on RFID (Radio Frequency Identification technology. In this system, by sending a text message the law enforcement agency or the authority that controls the toll booths can prevent the barrier from being liftedeven after deduction of the toll charge if the passing vehicle has a security issue. The designed system should help the effort of reducing transport crimes on highways and bridges of developing countries.

  11. Research Market Gap in Law Enforcement Technology: Lessons from Czech Security Research Funding Programmes

    Directory of Open Access Journals (Sweden)

    Luděk Moravec

    2014-12-01

    Full Text Available While security research funding schemes are nothing new to the EU (Horizon 2020 and FP7, or to several Member States, their priorities and procedures are usually decided administratively or shaped by advisory groups of varying membership. Only recently did the EU shift its focus to the role of end users in security research programmes, seeking their input in order to maximise the utility of funded solutions. Such a hint to limited usefulness of some industrial solutions is not exactly inconspicuous. This paper discusses the gap between the stated needs of law enforcement agencies in terms of R&D funding and the grant project applications in the area of law enforcement. It aims to define and describe the gap, and consequently the market opportunities, between the supply and demand sides represented by industry-driven grant project applications and end-user-formulated calls. The study is based on empirical data from two Czech security research funding programmes that have been running since 2010 and should deliver their results by 2015. It seeks to contribute some preliminary observations about the structure of both end user needs and industry capabilities in such a particular area as law enforcement technology.

  12. Electrical markets, energy security and technology diversification: nuclear as cover against gas and carbon price risks?

    International Nuclear Information System (INIS)

    Roques, F.A.; Newbery, D.M.; Nuttall, W.J.; Neufville, R. de

    2005-01-01

    Recent tension in the oil and gas markets has brought back the concept of energy offer diversification. Electrical production technology diversification in a country helps improve the security of supply and make up for the negative effects of hydrocarbons price variations. The portfolio and real options theories help to quantify the optimum diversification level for a country or a power company. The cover value of a nuclear investment for a power company facing cost uncertainties (price of gas and of carbon dioxide emission permit) and proceeds (price of electricity) is assessed. A strong link between the prices of gas and electricity reduces incentives to private producers to diversify, disputing the capacity of a liberalized electrical market to achieve optimum technology diversity from a domestic point of view. (authors)

  13. Multi-color IR sensors based on QWIP technology for security and surveillance applications

    Science.gov (United States)

    Sundaram, Mani; Reisinger, Axel; Dennis, Richard; Patnaude, Kelly; Burrows, Douglas; Cook, Robert; Bundas, Jason

    2006-05-01

    Room-temperature targets are detected at the furthest distance by imaging them in the long wavelength (LW: 8-12 μm) infrared spectral band where they glow brightest. Focal plane arrays (FPAs) based on quantum well infrared photodetectors (QWIPs) have sensitivity, noise, and cost metrics that have enabled them to become the best commercial solution for certain security and surveillance applications. Recently, QWIP technology has advanced to provide pixelregistered dual-band imaging in both the midwave (MW: 3-5 μm) and longwave infrared spectral bands in a single chip. This elegant technology affords a degree of target discrimination as well as the ability to maximize detection range for hot targets (e.g. missile plumes) by imaging in the midwave and for room-temperature targets (e.g. humans, trucks) by imaging in the longwave with one simple camera. Detection-range calculations are illustrated and FPA performance is presented.

  14. A data-management system using sensor technology and wireless devices for port security

    Science.gov (United States)

    Saldaña, Manuel; Rivera, Javier; Oyola, Jose; Manian, Vidya

    2014-05-01

    Sensor technologies such as infrared sensors and hyperspectral imaging, video camera surveillance are proven to be viable in port security. Drawing from sources such as infrared sensor data, digital camera images and processed hyperspectral images, this article explores the implementation of a real-time data delivery system. In an effort to improve the manner in which anomaly detection data is delivered to interested parties in port security, this system explores how a client-server architecture can provide protected access to data, reports, and device status. Sensor data and hyperspectral image data will be kept in a monitored directory, where the system will link it to existing users in the database. Since this system will render processed hyperspectral images that are dynamically added to the server - which often occupy a large amount of space - the resolution of these images is trimmed down to around 1024×768 pixels. Changes that occur in any image or data modification that originates from any sensor will trigger a message to all users that have a relation with the aforementioned. These messages will be sent to the corresponding users through automatic email generation and through a push notification using Google Cloud Messaging for Android. Moreover, this paper presents the complete architecture for data reception from the sensors, processing, storage and discusses how users of this system such as port security personnel can use benefit from the use of this service to receive secure real-time notifications if their designated sensors have detected anomalies and/or have remote access to results from processed hyperspectral imagery relevant to their assigned posts.

  15. Evaluating the influence of information and communications technology on food security

    Directory of Open Access Journals (Sweden)

    Ntabeni J. Jere

    2017-05-01

    Objectives: The study evaluates the influence of ICTs in improving food security in KwaZulu-Natal Province. A theoretical framework was developed as the lens through which diffusion and adoption of ICTs can be understood. The theorised model was developed using constructs from the diffusion of innovation (DOI theory, technology acceptance model (TAM and Hofstede’s cultural dimensions theory. Method: Survey data from 517 smallholder farmers from the district municipality of iLembe were collected using a questionnaire. A quantitative approach was followed, and the developed theorised model was analysed using structural equation modelling techniques. Results: This study proposes that ICT influence on food security is associated with culture, perceived usefulness and perceived ease of use. The study further finds that perceived ease of use of ICTs has the most significant effect with regard to ICT adoption and diffusion amongst smallholder farmers in iLembe district municipality. There are, however, no associations found with perceived attributes of innovation and the nature of social systems. The study consisted of a largely homogeneous social system; therefore, the researcher could not make any comparisons. Conclusion: The proposed framework for evaluating the influence of ICTs on food security put forward in this study highlights a number of issues. Firstly, there is need for further study to be conducted to understand adoption of ICTs specifically for food security. This would help in creating more accurate adoption strategies. Secondly, the study informs ICT innovation developers on the need to prioritise ease of use of ICT-based interventions when developing innovations that focus on smallholder farmers. The study also contributes to policy guidelines and suggests clear guidelines be developed to address cultural aspects such as gender imbalances.

  16. Convergence of emerging science and technology trends for defense, security, and human performance

    International Nuclear Information System (INIS)

    Vaseashta, Ashok

    2010-01-01

    sciences and technologies and road-mapping, which describes the emergence and direction of performance, features, or impacts of a science and technology to appear in the future. The development of 'early warning' scanning capabilities to develop awareness and understanding of basic scientific research as well as forthcoming technology and their implications underscore a fundamental change in focus from 'entirely technology-oriented' to 'science based futures-oriented technological approach', echoing the shift in chemical and biological defense strategy from a 'needs-based' to 'capabilities-based' model. The expectation is to minimize the impact of and manage technology uncertainty through exploiting futures-oriented analytical methods, modeling and simulation, and scenario development. The ultimate goal of the IASC futures research is not to predict the future or to influence social decisions in a predictable way. Rather, our aim is visionary to expand research organizations' and scientists' awareness of future threats and opportunities for balanced, strategic S and T analyses and recommendation of revolutionary scientific breakthroughs in support of international security. (author)

  17. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    Science.gov (United States)

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  18. Business support within business incubators.

    NARCIS (Netherlands)

    Ratinho, Tiago; Harms, Rainer; Groen, Arend J.

    2009-01-01

    Business incubators (BI) have been established worldwide as tools for company creation and small businesses support. BIs claim to help their tenants by providing them with the optimal conditions for increasing early stage survival. Practitioners and researchers agree that business support is a

  19. LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY

    Directory of Open Access Journals (Sweden)

    Ramona DUMITRAȘCU

    2017-05-01

    Full Text Available Li-Fi is a wireless technology that transmits high-speed data using visible light communication (VLC, it can achieve speeds of 224 gigabits per second in the lab. The potential Li-Fi technology can change a lot in virtual word considering it can provide transmission at 1 GB per second - that's 100 times faster than current average Wi-Fi speeds. By flickering the light from a single LED, Li-Fi technology can transmit far more data than a cellular tower, using Visible Light Communication (VLC technology - a medium that uses visible light between 400 and 800 terahertz (THz. It works basically like an incredibly advanced form of Morse code - flicking an LED on and off at extreme speeds and can be used to write and transmit things in binary code. The benefit of Li-Fi over Wi-Fi, other than potentially much faster speeds, is that because light cannot pass through walls, it makes it a whole lot more secure.

  20. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  1. Science and Technology vs. Defense and Security: Dual Use Consequences, a South American Perspective

    International Nuclear Information System (INIS)

    Espona, M. J.

    2007-01-01

    Nowadays we can say that science and technology are development driven forces in most countries, with some exceptions especially in the Southern Hemisphere. Even though, we have to take into account their link to and impact on defense and security and not only when it comes to WMD but also in the economy and academy areas, both in developed and developing countries. Within this framework, when we analyze the spread of technology and knowledge, it is important to consider: the media where it takes place (e.g. journals, internet, conferences, commercial agreements); which the actors involved are (e.g. scientists, governmental agencies, commercial firms); and the motive why it occurs (e.g. scientific discoveries; commercial exchange; international agreements). Once known all these elements, which vary both intracountry and intercountry, we may have a deep and broad enough framework to consider which policies to take in order to foster scientific and technologic development without collaborating with state and non state WMD programs. Although we already have a legal framework to fight against WMD proliferation and terrorism, the diverse degree of success of such instruments makes it necessary to continue analyzing and debating ways to strengthen them and/or find new ones. Therefore, in this paper we will analyze how the phenomena of science and technology development and spread impacts on defense and security from a South American perspective, taking into account the particular differences among developed and developing countries. Among the primary findings we can mention the existing differences between countries when it comes to the place (military, academic or commercial ones) where the critical science and technology innovative developments take place; the origin of funding (private or governmental); the existence and fulfillment of plans to foster science and technology development; and the scientific community awareness in WMD topics. All these elements have a

  2. Development programs of cutting-edge technologies for measurement and detection of nuclear material for safeguards and security

    International Nuclear Information System (INIS)

    Seya, Michio; Wakabayashi, Shuji; Naoi, Yosuke; Ohkubo, Michiaki; Senzaki, Masao

    2011-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security ('ISCN', hereafter) of Japan Atomic Energy Agency (JAEA) has development programs of cutting-edge technologies for measurement and detection of nuclear materials for nuclear safeguards and security, under the sponsorship of Japanese government (MEXT: Ministry of Education, Culture, Sports, Science and Technology). ISCN started development programs of the following technologies this year. (1) NRF (Nuclear Resonance Fluorescence) NDA technology using laser Compton scattering (LCS) gamma-rays, (2) Alternative to 3 He neutron detection technology using inorganic solid scintillator. ISCN is also going to conduct a demonstration test of a spent fuel Pu-NDA system that is to be developed by LANL (Los Alamos National Laboratory) using very sophisticated neutron measurement technologies, under JAEA/USDOE cooperation agreement. This presentation shows the above programs of ISCN. (author)

  3. The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology

    OpenAIRE

    Barskar, Raju; Deen, Anjana Jayant; Bharti, Jyoti; Ahmed, Gulfishan Firdose

    2010-01-01

    E-Commerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats. Information security, therefore, is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet. Still, its definition is a complex endeavor due to the constant technological and business change and requires a coordinated match of algorithm and technical solutions. Ecommerce is not appro...

  4. National Alliance for Clean Energy Incubators New Mexico Clean Energy Incubator

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, Suzanne S.

    2004-12-15

    The National Alliance for Clean Energy Incubators was established by the National Renewable Energy Laboratory (NREL) to develop an emerging network of business incubators for entrepreneurs specializing in clean energy enterprises. The Alliance provides a broad range of business services to entrepreneurs in specific geographic locales across the U.S. and in diverse clean energy technology areas such as fuel cells, alternative fuels, power generation, and renewables, to name a few. Technology Ventures Corporation (TVC) participates in the Alliance from its corporate offices in Albuquerque, NM, and from its sites in Northern and Southern New Mexico, California, and Nevada. TVC reports on the results of its attempts to accelerate the growth and success of clean energy and energy efficiency companies through its array of business support services. During the period from September 2002 through September 2004, TVC describes contributions to the Alliance including the development of 28 clients and facilitating capital raises exceeding $35M.

  5. Achievement report on commissioned research and development of basic technologies for the next generation industries in fiscal 1981. Research and development of a voluminous cell incubation technology; 1981 nendo jisedai sangyo kiban gijutsu itaku kenkyu kaihatsu seika hokokusho. Saibo tairyo baiyo gijutsu no kenkyu kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1982-03-01

    Achievements were compiled on the research and development in fiscal 1981 on the 'voluminous cell incubation technology', which has been performed according to the 'institution for research and development of basic technologies for the next generation industries'. In the research of a method for producing industrial materials using cells originated from lymph-based trunk cells, researches were performed on selection and breeding of cells, development of serum-free media, and establishment of the optimal culture method with regard to the method for producing industrial materials using stocks producing virus induced interferon. Regarding the method for producing industrial materials using idio-interferon producing mutable stocks, research and development was made on selection and breeding of superior cell stocks and serum-free media. With regard to the method for producing industrial materials using marrow originated cells, such researches were carried out as technological investigations, collection of cells, establishment of the proliferating condition for myeloid leukemia cells, discussions on the assay method for differentiation inducing factors, and search for cells producing useful substances. Other activities include research of the method for producing industrial materials using cells originated from epithelium cells, information exchange on voluminous cell incubation technologies, and investigations on literatures and patents. (NEDO)

  6. Achievement report on commissioned research and development of basic technologies for the next generation industries in fiscal 1981. Research and development of a voluminous cell incubation technology; 1981 nendo jisedai sangyo kiban gijutsu itaku kenkyu kaihatsu seika hokokusho. Saibo tairyo baiyo gijutsu no kenkyu kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1982-03-01

    Achievements were compiled on the research and development in fiscal 1981 on the 'voluminous cell incubation technology', which has been performed according to the 'institution for research and development of basic technologies for the next generation industries'. In the research of a method for producing industrial materials using cells originated from lymph-based trunk cells, researches were performed on selection and breeding of cells, development of serum-free media, and establishment of the optimal culture method with regard to the method for producing industrial materials using stocks producing virus induced interferon. Regarding the method for producing industrial materials using idio-interferon producing mutable stocks, research and development was made on selection and breeding of superior cell stocks and serum-free media. With regard to the method for producing industrial materials using marrow originated cells, such researches were carried out as technological investigations, collection of cells, establishment of the proliferating condition for myeloid leukemia cells, discussions on the assay method for differentiation inducing factors, and search for cells producing useful substances. Other activities include research of the method for producing industrial materials using cells originated from epithelium cells, information exchange on voluminous cell incubation technologies, and investigations on literatures and patents. (NEDO)

  7. Evolutionary dynamics of incubation periods.

    Science.gov (United States)

    Ottino-Loffler, Bertrand; Scott, Jacob G; Strogatz, Steven H

    2017-12-21

    The incubation period for typhoid, polio, measles, leukemia and many other diseases follows a right-skewed, approximately lognormal distribution. Although this pattern was discovered more than sixty years ago, it remains an open question to explain its ubiquity. Here, we propose an explanation based on evolutionary dynamics on graphs. For simple models of a mutant or pathogen invading a network-structured population of healthy cells, we show that skewed distributions of incubation periods emerge for a wide range of assumptions about invader fitness, competition dynamics, and network structure. The skewness stems from stochastic mechanisms associated with two classic problems in probability theory: the coupon collector and the random walk. Unlike previous explanations that rely crucially on heterogeneity, our results hold even for homogeneous populations. Thus, we predict that two equally healthy individuals subjected to equal doses of equally pathogenic agents may, by chance alone, show remarkably different time courses of disease.

  8. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research

    Directory of Open Access Journals (Sweden)

    Dan Craigen

    2013-07-01

    Full Text Available This article addresses the challenges of cybersecurity and ultimately the provision of a stable and resilient information-technology infrastructure for Canada and, more broadly, the world. We describe the context of current cybersecurity challenges by synthesizing key source material whose importance was informed by our own real-world experiences. Furthermore, we present a checklist of guiding principles to a unified response, complete with a set of action-oriented research topics that are linked to known operational limitations. The focus areas are used to drive the formulation of a unified and relevant research and experimental development program, thereby moving us towards a stable and resilient cyberinfrastructure. When cybersecurity is viewed as an inherently interdisciplinary problem of societal concern, we expect that fundamentally new research perspectives will emerge in direct response to domain-specific protection requirements for information-technology infrastructure. Purely technical responses to cybersecurity challenges will be inadequate because human factors are an inherent aspect of the problem. This article will interest managers and entrepreneurs. Senior management teams can assess new technical developments and product releases to fortify their current security solutions, while entrepreneurs can harness new opportunities to commercialize novel technology to solve a high-impact cybersecurity problem..

  9. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... its business. ADDRESSES: The meeting will be held at the Department of Homeland Security (DHS... as new developments in systems engineering, cyber-security, knowledge management and how best to... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  10. Food safety and quality through radiation technology: its implications to national security

    Energy Technology Data Exchange (ETDEWEB)

    Lanuza, Luvimina G.

    2012-08-15

    tests showed that the dose used did not modify the sensory properties in such a way that they were detected by both sets of respondents. The study recommended that food irradiation technology be adopted by the national government as one of the means to achieve national food security. The results of this study provide science-based evidence in collaborating previous studies on the role of food irradiation technology in ensuring food security such as when used for post-harvest treatment of agricultural crops and for quarantine treatment of fruits and vegetables for export. It must, however, be recognized that the general population may still have fear of radiation. As such, a concerted effort using the quad-media and other government instrumentalities be utilized to effect a paradigm shift of the populace and increase public awareness and acceptance of irradiated food. One can rightly say that food irradiation technology is a tool for national development, and enhances national security through food security. (author)

  11. Food safety and quality through radiation technology: its implications to national security

    International Nuclear Information System (INIS)

    Lanuza, Luvimina G.

    2012-08-01

    showed that the dose used did not modify the sensory properties in such a way that they were detected by both sets of respondents. The study recommended that food irradiation technology be adopted by the national government as one of the means to achieve national food security. The results of this study provide science-based evidence in collaborating previous studies on the role of food irradiation technology in ensuring food security such as when used for post-harvest treatment of agricultural crops and for quarantine treatment of fruits and vegetables for export. It must, however, be recognized that the general population may still have fear of radiation. As such, a concerted effort using the quad-media and other government instrumentalities be utilized to effect a paradigm shift of the populace and increase public awareness and acceptance of irradiated food. One can rightly say that food irradiation technology is a tool for national development, and enhances national security through food security. (author)

  12. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives

    Directory of Open Access Journals (Sweden)

    Delphine Christin

    2010-04-01

    Full Text Available Wireless Sensor Networks (WSNs are gradually adopted in the industrial world due to their advantages over wired networks. In addition to saving cabling costs, WSNs widen the realm of environments feasible for monitoring. They thus add sensing and acting capabilities to objects in the physical world and allow for communication among these objects or with services in the future Internet. However, the acceptance of WSNs by the industrial automation community is impeded by open issues, such as security guarantees and provision of Quality of Service (QoS. To examine both of these perspectives, we select and survey relevant WSN technologies dedicated to industrial automation. We determine QoS requirements and carry out a threat analysis, which act as basis of our evaluation of the current state-of-the-art. According to the results of this evaluation, we identify and discuss open research issues.

  13. Web technology for emergency medicine and secure transmission of electronic patient records.

    Science.gov (United States)

    Halamka, J D

    1998-01-01

    The American Heritage dictionary defines the word "web" as "something intricately contrived, especially something that ensnares or entangles." The wealth of medical resources on the World Wide Web is now so extensive, yet disorganized and unmonitored, that such a definition seems fitting. In emergency medicine, for example, a field in which accurate and complete information, including patients' records, is urgently needed, more than 5000 Web pages are available today, whereas fewer than 50 were available in December 1994. Most sites are static Web pages using the Internet to publish textbook material, but new technology is extending the scope of the Internet to include online medical education and secure exchange of clinical information. This article lists some of the best Web sites for use in emergency medicine and then describes a project in which the Web is used for transmission and protection of electronic medical records.

  14. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  15. New flexible origination technology based on electron-beam lithography and its integration into security devices in combination with covert features based on DNA authentication

    Science.gov (United States)

    Drinkwater, John K.; Ryzi, Zbynek; Outwater, Chris S.

    2002-04-01

    Embossed diffractive optically variable devices are becoming increasingly familiar security items on plastic cards, banknotes, security documents and on branded goods and media to protect against counterfeit, protect copyright and to evidence tamper. Equally as this devices become both more widely available there is a pressing requirement for security technology upgrades to keep ahead of technology advances available to potential counterfeiters. This paper describes a new generation electron beam DOVID origination technology particularly suitable for high security applications. Covert marking of security devices is provided using the DNA matrix by creating and verifying unique DNA sequences. This integration of this into practical security features in combination with covert features based on DNA matrix authentication and other more straightforwardly authenticable features to provide multi- technology security solutions will be described.

  16. AlphaCo: A Teaching Case on Information Technology Audit and Security

    Directory of Open Access Journals (Sweden)

    Hüseyin Tanriverdi

    2006-03-01

    Full Text Available Recent regulations in the United States (U.S. such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal control mechanisms that minimize them have become important and created an urgent need for professionals who are equipped with IT audit and security skills and knowledge. However, there is severe shortage of teaching cases that can be used in courses aimed at training such professionals. This teaching case begins to address this gap by fostering classroom discussions around IT audit and security issues. It revolves around a hacking incident that compromised online order processing systems of AlphaCo and led to some fraudulent activity. The hacking incident raises a series of questions about IT security vulnerabilities, internal control deficiencies, integrity of financial statements, and independent auditors’ assessment of fraud in the context of the Sarbanes-Oxley Act. The case places students in the roles of executives, IT managers, and auditors and encourages them to discuss several important questions: how and why did the hacking incident happen; what harm did it cause to the firm; how can the firm prevent such hacking incidents in the future; if they do happen, how can the firm detect hacking incidents and fraud sooner; how do auditors assess the impact of such incidents in the context of a financial statement audit; and whether the management

  17. Network brokers or hit makers? Analyzing the influence of incubation on start-up investments

    NARCIS (Netherlands)

    Van Rijnsoever, Frank J.; Van Weele, Marijn A.; Eveleens, Chris P.

    Incubators are a prominent way to support technology based start-ups. Yet, it remains unclear to what extent these incubators enhance start-up performance, nor is it known through which mechanisms this would occur. In this paper we test two mechanisms to explain the relationship between incubation

  18. Innovation Incubator: Whisker Labs Technical Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, Bethany F. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Frank, Stephen M. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, Lieko [National Renewable Energy Lab. (NREL), Golden, CO (United States); Scheib, Jennifer G. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2017-08-01

    The Wells Fargo Innovation Incubator (IN2) is a program to foster and accelerate startup companies with commercial building energy-efficiency and demand management technologies. The program is funded by the Wells Fargo Foundation and co-administered by the National Renewable Energy Laboratory (NREL). Whisker Labs, an Oakland, California-based company, was one of four awardees in the first IN2 cohort and was invited to participate in the program because of its novel electrical power sensing technology for circuit breakers. The stick-on Whisker meters install directly on the front face of the circuit breakers in an electrical panel using adhesive, eliminating the need to open the panel and install current transducers (CTs) on the circuit wiring.

  19. Effective Remote Control of Several Outdoor Security Lights by SMS and Wifi Technology

    Directory of Open Access Journals (Sweden)

    M. F. Akorede

    2017-08-01

    Full Text Available The aim of this study was to design and develop a control system using Short Message Service (SMS and wireless networking (WiFi technology to remotely control outdoor security lights in large organisations. The device comprises four main units, namely: the mobile phone or a computer system, the Global System for Mobile communication (GSM modem, the switching unit and the WiFi module. One feature that makes the developed system better than other related existing works is its ability to use two means of control. It makes use of WiFi when the operator is within the coverage area of the network of about 100 m to the device, at no cost, otherwise it uses SMS containing certain codes to control the lights. A Subscriber Identity Module (SIM card is placed in the GSM modem and SMS from the transmitter are sent to that mobile number. The module is also constantly checked by the microcontroller unit, processes the information, extracts the message and command from the GSM modem and WiFi module respectively and then acts accordingly. Owing to its simplicity, C programming is used to programme the microcontroller. The developed device when tested with three lighting points operating on 230V power supply, gives an impressive performance in terms of accuracy and promptness with both SMS and WiFi technology.

  20. Saraniyadhamma Community knowledge Incubator area

    Directory of Open Access Journals (Sweden)

    Siripong Arundechachai

    2017-03-01

    Full Text Available The purposes of this research were to 1 study the situation of the community knowledge incubator area at the past to the present time in Banhad,Tambon banhad, Amphoe banhad Changwat KhonKaen, 2 study guidelines Buddhadhamma “Saraniyadhamma” revised by Community knowledge application Banhad, Tambon banhad, Amphoe banhad Changwat KhonKaen, 3 study workflow of Saraniyadhamma that led to the creation of the network community knowledge incubator area together with another community. The target groups used in this research of the purposive sampling family farmers of 10, in Tambon banhad,Amphoe banhad Changwat KhonKaen. the Qualitative research.was used in this Study The results showed that 1 diversing issues in the Community live action of the relationships or occupations experience can be passed down, as well as the risk of loss the relationships between the people and people, people and supernatural. After people and nature lost in the community, but thay Continue to Perform, because community has strengths given the importance of all, to themselves, to others, generous, generosity, mounting traditions, Led to the creation Community Knowledge Incubator 2 adopting Buddhism’s “Saraniyadhamma 6” that applied to community Knowledge Incubator by giving to make immunity community. Strong The six fetures, were Principle 1: Metta-kayakamma, feature on sacrifiction, unity and synergy. Principle 2: Metta-manokamma, feature on mercifulness, collective sacrification. Principle 3: Metta-kayakamma, feature on good things, speak well, good action. Principle 4: Sadharana-bhogi, feature on humane society, mutual respect. Principle 5 Sila-samannata, feature on, follow the rules of society. Principle 5 Metta-manokamma feature on rationality, listening to the opinion of others. It found that there were process-driven learning and following six rules of saraniyadhamma, and immunity system, risk Decoupled. 3 Networks Saraniyadhamma learnt together with other

  1. Cutting the Army’s Umbilical Cord: A Study of Emerging Fuel Technologies and Their Impact on National Security

    Science.gov (United States)

    2011-12-01

    Ireland, and Puerto Rico , the dependence presents a national security concern for the United States. In order to decrease the DOD’s dependence, Congress...fuel technologies evaluated are microgrids , solar and wind power generators, and hybrid-electric tactical wheeled vehicles. The method used in the case...claims, this monograph analyzes three case studies. The three emerging fuel technologies evaluated are microgrids , solar and wind power generators

  2. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Science.gov (United States)

    2012-11-27

    ... agency to publish in the Federal Register a description denoting the type and character of each system of... DHS IT resources; IP address of access; Logs of Internet activity; and Records on the authentication... and Technology (NIST) Security Standards from Authentication to Certification and Accreditation...

  3. Using Information Technologies in Professional Training of Future Security Specialists in the USA, Great Britain, Poland and Israel

    Science.gov (United States)

    Kyslenko, Dmytro

    2017-01-01

    The paper discusses the use of information technologies in professional training of future security specialists in the United States, Great Britain, Poland and Israel. The probable use of computer-based techniques being available within the integrated Web-sites have been systematized. It has been suggested that the presented scheme may be of great…

  4. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    Science.gov (United States)

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-11-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  5. Navigating the Role of Business Incubators: A Review on the Current Literature on Business Incubation in South Africa

    Directory of Open Access Journals (Sweden)

    Thobekani Lose

    2016-10-01

    Full Text Available Business incubators (BIs are a significant tool in promoting the development of entrepreneurial firms, technology-based growth firms and economic growth in South Africa. The study reviewed the current literature on business incubation in South Africa. BIs in South Africa emerged as a popular strategy in the 1990s and most of the current literature was established in the same period. However, the current literature is still limited. The aim of this paper is to provide an overview of existing knowledge on the role and effectiveness of business incubation in supporting the development of new small startup businesses. The quantitative and qualitative literature published by the academic and practitioner communities is reviewed. The searches indicated that incubation has encouraged many studies in South Africa. The studies can be categorised under the following themes: the role and contribution of incubators, success factors for business incubation, obstacles, and the relationship between incubators and entrepreneurship. The areas for further research are suggested. Two major areas that new research can explore focus on the creation of the model and selfsustainability of BIs.

  6. An assessment of the effectiveness of fuel cycle technologies for the national energy security enhancement in the electricity sector

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Jun, Eunju; Chang, Soon Heung; Kim, Won Joon

    2009-01-01

    Energy security, in the 21st century, draws significant attention in most countries worldwide, because the national security and sustainable development depend largely on energy security. The anticipated fossil energy depletion and the instability of their supply drive many countries to consider nuclear energy as their alternative energy source for the enhancement of their national energy security. In this study, indicators measuring the level of energy security in the electric power sector are developed and applied for the assessment of the effectiveness of four electric power system schemes which deploy different nuclear fuel cycle technologies, with consideration for the diversification of the energy markets and the vulnerability to economic disruption. Results show that the contribution of the closed fuel cycle scheme is larger than the once-through fuel cycle scheme in the perspective of energy security. In addition, the completely closed fuel cycle with the spent fuel recycling enhances the national energy security to the maximum extent compared to all other fuel cycle schemes. Since a completely closed fuel cycle is hardly affected by the uranium price changes, this scheme is found to be the most favorable scheme, ensuring the stable profit of utilities and stabilizing the electricity tariff. In addition, the completely closed fuel cycle scheme provides the best enhancement of national energy security with respect to energy supply, under reasonable price conditions. The indicators developed in this study can be utilized as a useful instrument for the measurement of the level of the energy security, especially by the countries importing energy resources for the generation of electric power.

  7. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    Science.gov (United States)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and

  8. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  9. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    International Nuclear Information System (INIS)

    Sinars, Daniel; Scott, Kimberly Carole; Edwards, M. John; Olson, Russell Teall

    2016-01-01

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  10. Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach

    OpenAIRE

    Rull Aixa, David

    2018-01-01

    This project is a space of information and knowledge of the IoT paradigm and Blockchain technology with the analysis of the most relevant research articles and the study of the most important threats of IoT technologies and scenarios. In addition, it offers an overview of the current state of the paradigm from the perspective of security and the opportunities that its combination with Blockchain technology can bring to our society. Aquest projecte és un espai d'informació i coneixement ...

  11. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  12. INNOVATION CLUSTERS: SOCIAL LEARNING AND BUSINESS INCUBATION

    Directory of Open Access Journals (Sweden)

    Dan Deac

    2011-01-01

    Full Text Available A sustainable innovation is more expensive than a regular one but it may lead to long termbenefits and durable competitive advantage, especially if many firms from the networkcollude or act within constrained environments such as business incubators. The opinionformation process, which leads to sustainable innovation, may be viewed as a collectivecognitive process resembling that of branding and re-branding. Technological innovationscan be viewed as sequences of cost reduction events and, in a many-firm setting, sociallearning which leads to sustainability-oriented behaviour depends on (mutual trustrelations. The experimental modelling part of the paper illustrates selected aspects of theconcept just outlined by developing a stylized dynamic model of the firm.

  13. Project for the adaptation of the Instituto Nacional de Investigaciones Nucleares (ININ) to work as companies incubator, and the business plan as support device in the achievement of successful base technological companies; Proyecto para la adecuacion del Instituto Nacional de Investigaciones Nucleares (ININ) para trabajar como incubadora de empresas y el plan de negocios como instrumento de apoyo en el logro de empresas de base tecnologicas exitosas

    Energy Technology Data Exchange (ETDEWEB)

    Rubio A, C R

    1996-09-01

    The purpose of this project is to study an option to reduce technology dependence by taking advantage of the technology based companies generated by the organisms called `Companies Incubators`. The first point given, is an introduction about incubation applied to national companies and the experiences had about them. There are also suggested some indicators which can be used to develop the incubator tasks. Once it has been defined the topic about incubation in the country, it is provided information about the items determining the company performance within an incubator. In order to do this, it is shown the way the Instituto Nacional de Investigaciones Nucleares can provide not only its facilities but also qualified personnel working for them. Thus it is given a scheme along with a brief organization description and key personnel for the incubator, stating the functions and responsibilities per each one of the persons who are part of the project direction and leading. The bases for the incubator are stated, as well as the requirements to start-up a company being supported by a company incubator. The key points to have a succesful development for the incubator are: the service it can give as well as the guidelines for companies entrance, which are classified into two sorts of customers, external and internal. It is also included a market research about the main product derived from creating a company incubator, as well as the sub-products, the market area, this is directed to the people who will benefit from it, the supply and demand involved with ININ. The main tool used was Business Plan, which defines its importance within the organization and activities guide, it is also included the Business Plan structure.

  14. Effect of crude oil and refined petroleum product imports on the national security. Critical technologies

    International Nuclear Information System (INIS)

    1989-01-01

    The report contains the results of an investigation requested under Section 232 of the Trade Expansion Act to study the effect of oil imports on the domestic petroleum industry and on United States energy security. It reviews previous energy security assessments and resulting initiatives, assesses current US energy security, and studies emergency petroleum requirements. The report finds that there have been substantial improvements in US energy security since the last Section 232 Petroleum finding in 1979. However, declining domestic oil production, rising oil imports, and growing dependence on potentially insecure sources of supply raise concerns of vulnerability to a major supply disruption

  15. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    National Research Council Canada - National Science Library

    Kuhn, D

    2002-01-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication...

  16. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    Science.gov (United States)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  17. What determines a successful business incubator?

    DEFF Research Database (Denmark)

    Gerlach, Sophia; Brem, Alexander

    2015-01-01

    Business incubators have become an important pillar in the attraction and the support of innovation and entrepreneurship – in practice, and to a greater extent in theory as well. Based on earlier research, we give an overview of business incubator literature between 2001 and 2013. We review...... these results in a generic business incubation process model, which is elaborated in a pre-, main- and after-incubation phase. Finally, we introduce an incubator guide, which is summarizing the key areas into a questionnaire. Hence, on the one hand, we foster future research on business incubation with our...... conceptual framework based on an extensive literature review. On the other hand, we support managers and policy makers with a practice-oriented and research-based evaluation tool for a status quo analysis as well as a solid basis for a further incubator development....

  18. Cutting-edge technologies for X-ray systems ensuring safety, security, and comfort of diagnosis and treatment

    International Nuclear Information System (INIS)

    Sato, Naotaka; Kuroki, Takahiro

    2015-01-01

    X-ray systems that convert X-rays passing through the human body Into images are widely used in various fields of diagnosis and treatment, due to their simplicity and immediacy. In recent years. Improvements in the image quality and usability of such systems as a result of technological innovations have contributed to more accurate diagnosis and treatment and shorter examination times. Toshiba Medical Systems Corporation has been continuously developing exposure management technologies that can precisely estimate doses of exposure as well as technologies to reduce exposure. We are also making efforts to reduce the burden on patients through the development of technologies to enhance the effectiveness of examinations. By applying these technologies to our various X-ray products, we are actively promoting the provision of medical systems offering safety, security, and comfort to both patients, and operators and other medical staff. (author)

  19. The effects of incubation period and temperature on the Hydrogen ...

    African Journals Online (AJOL)

    The effects of incubation period and temperature on the Hydrogen sulphide (H 2 S) technique for detection of faecal contamination in water. ... African Journal of Environmental Science and Technology. Journal Home ... A total of 171 water samples from 3 sources were analyzed for the presence of faecal contamination by

  20. Emerging information technologies in accounting and related security risks – what is the impact on the Romanian accounting profession

    Directory of Open Access Journals (Sweden)

    Sînziana-Maria Rîndașu

    2017-12-01

    Full Text Available This study investigates whether aspiring and professional accountants understand the benefits and security challenges brought by emerging technologies such as: Big Data, data analytics, cloud computing and mobile technologies. 115 participants took part in a survey during January and February 2017, all having at least one year of practical experience in accounting or audit and 80% of them being affiliated with national or international accounting professional bodies. The research has three key findings: (1 Professional accountants and auditors are having in average a theoretical knowledge of the emerging technologies in the accounting field, but they still need to enhance their skills to exploit them efficiently, (2 Mobile technologies started to be adopted by the Romanian practitioners and (3 The profession has become aware of the security risks brought by emerging technologies in the digital accounting. The accounting profession is on the verge of change and the practitioners do not yet possess sufficient skills regarding the analyzed emerging technologies. As per this, the professional bodies and academic environment should reassess their curricula to enforce the necessary changes for preparing practitioners to successfully face the future challenges and avoid their replacement by other professions more qualified.

  1. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    Science.gov (United States)

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  2. Teaching Information Security with Workflow Technology--A Case Study Approach

    Science.gov (United States)

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  3. Supporting Case-Based Learning in Information Security with Web-Based Technology

    Science.gov (United States)

    He, Wu; Yuan, Xiaohong; Yang, Li

    2013-01-01

    Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…

  4. The secret to health information technology's success within the diabetes patient population: a comprehensive privacy and security framework.

    Science.gov (United States)

    Pandya, Sheel M

    2010-05-01

    Congress made an unprecedented investment in health information technology (IT) when it passed the American Recovery and Reinvestment Act in February 2009. Health IT provides enormous opportunities to improve health care quality, reduce costs, and engage patients in their own care. But the potential payoff for use of health IT for diabetes care is magnified given the prevalence, cost, and complexity of the disease. However, without proper privacy and security protections in place, diabetes patient data are at risk of misuse, and patient trust in the system is undermined. We need a comprehensive privacy and security framework that articulates clear parameters for access, use, and disclosure of diabetes patient data for all entities storing and exchanging electronic data. (c) 2010 Diabetes Technology Society.

  5. The Co-evolution of Business Incubators and National Incubator Networks in Emerging Markets

    Directory of Open Access Journals (Sweden)

    David F. Robinson

    2010-11-01

    Full Text Available The study proposes a three stage model of the development of business incubation practices in emerging markets. The model addresses the diffusion of incubation practices to new markets, the institutionalization of those practices and the co-evolution of incubators and national networks of incubation. The model is based on interviews conducted in Bolivia, Peru, Chile, Argentina, and Brazil. New incubators in emerging markets often face strong cultural norms and institutional impediments to helping entrepreneurs start new businesses. As incubation becomes better established in a country, incubators provide more advanced technical, legal and market-based advice. Networks of incubators form to share specialized services across many incubators, to allocate government funding to incubators, and to lobby for public and private support of innovation.

  6. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    Science.gov (United States)

    Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.

    2002-08-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.

  7. MARKETING CHALLENGES FOR SOUTH AFRICAN PUBLIC SECTOR BUSINESS INCUBATOR

    Directory of Open Access Journals (Sweden)

    Donaldson Walter James

    2017-12-01

    Full Text Available Entrepreneurship and innovation form the cornerstone of economic development in many developing countries. Through this, rather ideal combination employment can be enhanced, communities can be uplifted through education, and growth can be increased through discretionary purchasing power. This cycle has positive spinoffs which can alleviate poverty and decrease famine. Recent local research suggests that more than eighty percent of entrepreneurs, start-ups and Business ‘Incubatees’ don’t make it through their first year of establishment after leaving a Business Incubator programme. This paper tries to identify some of the marketing challenges faced by Business Incubators, and indeed BIMs in the Public Sector environment in South Africa. Identification and highlighting the possible drawbacks for ‘incubatees’ may assist them with success or meeting competitive challenges when they depart from the security of the relevant programmes. This study examines some of the skills, knowledge and attributes required for BIMs in this sector and what is required to meet the business and marketing challenges faced to remain sustainable. The survey was aimed at the largest, focused segment of South African Business Incubators affiliated to the industrial public sector and the hypothesis was to prove that strategic marketing information, acumen and knowledge is a key differentiator towards the growth and sustainability of Business Incubators in that sector. It is notable that these marketing challenges may also compare favourably with several other public sector segments in relevant countries of the southern African region as similar macroeconomic challenges are faced.

  8. Hazardous materials safety and security technology field operational test. Volume II, evaluation final report synthesis

    Science.gov (United States)

    2004-11-11

    The catastrophic events of September 11, 2001 and the ongoing war on terrorism have heightened the level of concern from Federal government officials and the transportation industry regarding the secure transport of hazardous materials (HAZMAT). Secu...

  9. T-Check in Technologies for Interoperability: Web Services and Security--Single Sign-On

    National Research Council Canada - National Science Library

    Wrage, Lutz; Simanta, Soumya; Lewis, Grace A; Jaspan, Saul

    2007-01-01

    .... This technical note presents the results of applying the T-Check approach in an initial investigation of two Web services standards, WS-Security and SAML, to create an SSO solution that works inside...

  10. Report to Congress on innovative safety and security technology solutions for alternative transportation facilities

    Science.gov (United States)

    2017-05-01

    This research collected information on the frequency and impact of safety and security incidents (threats) at selected facilities and identified priority incidents at each facility. A customized all hazards approach was used to determine the ha...

  11. Arrangement on the Recognition of Common Criteria Certificates In the Field of Information Technology Security

    Science.gov (United States)

    2000-05-01

    Security Establishment from Canada and Ministry of Finance from Finland and Service Central de la Sécurité des Systèmes d’Information from France and...Nazionale per la Sicurezza CESIS III Reparto - UCSi from Italy and Ministry of the Interior and Kingdom Relations from The Netherlands and Page 3 of...39 HQ Defence Command Norway/Security Division from Norway and Ministerio de Administraciones Públicas from Spain and Communications-Electronics

  12. The Upgrade to Hybrid Incubators in China

    DEFF Research Database (Denmark)

    Hu, Yimei; Gao, Yuchen

    countries and emerging economics. Based on a single in-depth case-study of Tuspark Incubator, this study explores key factors and specific ways for the upgrade to hybrid incubators in the context of China. By using categorical analysis, three factors, i.e. incubation subdivision, intermediary platform......, and proactive approach, are found to be essential for a formerly government-sponsored TBI’s upgrading. The result of this study also provides new insights and several implications for incubator managers and policy makers in emerging economies. In addition, whether the key factors can be used in upgrade of other...... TBIs in China requires further study....

  13. The business incubator in a network perspective

    DEFF Research Database (Denmark)

    Bøllingtoft, Anne; Ulhøi, John Parm

    2003-01-01

    Recent years have seen the emergence of a new incubator model, the "networked incubator", which is a hybrid form of the archetypal business incubators, based on territorial synergy, relational symbiosis and economices of scale, to the benefit of the participating 'incubatees'. The question...... addressed in this paper is why this new model has emerged and what distinguishes it from the more traditional incubator model. The theoretical basis of the research is social capital theory. Empirically, the paper is based on 6 months' ethnographic data collected in one of the first known networked...

  14. A Study of Business Incubators: Models, Best Practices, and Recommendations for NASA and Florida

    Science.gov (United States)

    1997-01-01

    This study was conducted to provide NASA-Kennedy Space Center with information and recommendations to support establishing one or more technology-based business incubators In Florida. The study involved assembling information about incubators: why they succeed, why they fail, how they are organized, and what services they provide. Consequently, this study focuses on widely-recognized "best practices," needed to establish successful technology- based business incubators. The findings are used to optimize the design and implementation of one or more technology-based business incubators to be established in Florida. Recommendations reflect both the essential characteristics of successful incubators and the optimal business demographics in Florida. Appendix A provides a fuller description of the objectives of the study. Technology-based business incubators are an increasing catalyst of new business development across the USi Incubators focus on providing entrepreneurs and small start-up firms with a wide array of support services necessary to bring forth new products and processes based on technologies developed in the nation's federal and private laboratories and universities. Appendix B provides extensive discussion of findings relative to technology- based business incubators.

  15. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  16. Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies

    Science.gov (United States)

    Reddy, Dinesh Sampangirama

    2017-01-01

    Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…

  17. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education.

    Science.gov (United States)

    Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K

    2013-08-09

    Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality

  18. to the Question of IPv6-protocol Logical Characteristics Properties Using in order to Increase of the Security Level of the Russian Federation National Information Technology Infrastructure

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2014-02-01

    Full Text Available This paper proposes a method of IPv6-protocol logical characteristics using in order to increase the security level of the Russian Federation national information technology infrastructure and the global information society.

  19. Understanding management practices in business incubators

    NARCIS (Netherlands)

    Blok, Vincent; Thijssen, Sander; Pascucci, Stefano

    2017-01-01

    Following the call for process-oriented research on business incubation processes, this paper investigates the process of business incubation (BI) via an understanding of management practices and interactions. Based on a comprehensive literature review and empirical evidence of management practices

  20. Micro-incubator for bacterial biosensing applications

    Science.gov (United States)

    Clasen, Estine; Land, Kevin; Joubert, Trudi-Heleen

    2016-02-01

    The presence of Escherichia coli (E. coli ) is a commonly used indicator micro-organism to determine whether water is safe for human consumption.1 This paper discusses the design of a micro-incubator that can be applied to concentrate bacteria prior to environmental water quality screening tests. High sensitivity and rapid test time is essential and there is a great need for these tests to be implemented on-site without the use of a laboratory infrastructure. In the light of these requirements, a mobile micro-incubator was designed, manufactured and characterised. A polydimethylsiloxane (PDMS) receptacle has been designed to house the 1-5 ml cell culture sample.2 A nano-silver printed electronics micro-heater has been designed to incubate the bacterial sample, with an array of temperature sensors implemented to accurately measure the sample temperature at various locations in the cell culture well. The micro-incubator limits the incubation temperature range to 37+/-3 °C in order to ensure near optimal growth of the bacteria at all times.3 The incubation time is adjustable between 30 minutes and 9 hours with a maximum rise time of 15 minutes to reach the set-point temperature. The surface area of the printed nano silver heating element is 500 mm2. Electrical and COMSOL Multiphysics simulations are included in order to give insight on micro-incubator temperature control. The design and characterization of this micro-incubator allows for further research in biosensing applications.

  1. MONITORING BABY INCUBATOR SENTRAL DENGAN KOMUNIKASI WIRELESS

    Directory of Open Access Journals (Sweden)

    Ary Sulistyo Utomo

    2018-04-01

    180m. Pengujian suhu ruang baby incubator menggunakan termometer sebagai perbandingan dengan nilai suhu yang dibaca pada alat. Dari pengukuran diperoleh tingkat perbedaan 0% pada suhu 30oC dan 2,8% pada suhu 37oC.   Kata kunci: baby incubator, sistem monitoring sentral, microsoft visual studio, arduino.

  2. Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things

    Directory of Open Access Journals (Sweden)

    Jiann-Shiun Yuan

    2017-09-01

    Full Text Available In this review article for Internet of Things (IoT applications, important low-power design techniques for digital and mixed-signal analog–digital converter (ADC circuits are presented. Emerging low voltage logic devices and non-volatile memories (NVMs beyond CMOS are illustrated. In addition, energy-constrained hardware security issues are reviewed. Specifically, light-weight encryption-based correlational power analysis, successive approximation register (SAR ADC security using tunnel field effect transistors (FETs, logic obfuscation using silicon nanowire FETs, and all-spin logic devices are highlighted. Furthermore, a novel ultra-low power design using bio-inspired neuromorphic computing and spiking neural network security are discussed.

  3. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    Science.gov (United States)

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  4. Effect of imports of uranium on the national security. Critical technologies

    International Nuclear Information System (INIS)

    1989-09-01

    The report gives results of an investigation to determine the effects of uranium imports on the national security. Uranium is essential to the operation of the Navy's nuclear-powered fleet, for nuclear weapon capability and for civilian nuclear energy generation. US utilities imported 43.8 percent of their uranium requirements in 1986 and 51.1 percent in 1987. The report finds that the domestic industry's competitiveness has deteriorated in recent years, due to the easily accessible and richer deposits available elsewhere. The report concludes, however, that in a national security emergency, defense requirements could be met through stockpiles of finished nuclear materials set aside for military needs. Furthermore, civilian requirements could be met through US production, reliable imports, inventories, and tails reprocessing. The report, therefore, finds that uranium is not being imported in such quantities or under such circumstances as to represent a threat to the national security

  5. Leveraging multi-channel x-ray detector technology to improve quality metrics for industrial and security applications

    Science.gov (United States)

    Jimenez, Edward S.; Thompson, Kyle R.; Stohn, Adriana; Goodner, Ryan N.

    2017-09-01

    Sandia National Laboratories has recently developed the capability to acquire multi-channel radio- graphs for multiple research and development applications in industry and security. This capability allows for the acquisition of x-ray radiographs or sinogram data to be acquired at up to 300 keV with up to 128 channels per pixel. This work will investigate whether multiple quality metrics for computed tomography can actually benefit from binned projection data compared to traditionally acquired grayscale sinogram data. Features and metrics to be evaluated include the ability to dis- tinguish between two different materials with similar absorption properties, artifact reduction, and signal-to-noise for both raw data and reconstructed volumetric data. The impact of this technology to non-destructive evaluation, national security, and industry is wide-ranging and has to potential to improve upon many inspection methods such as dual-energy methods, material identification, object segmentation, and computer vision on radiographs.

  6. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  7. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  8. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Science.gov (United States)

    2010-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...

  9. U.S. Military Technology Dependence: The Hidden Vulnerability to National Security

    Science.gov (United States)

    2016-06-10

    Wiebe Eco . Vulnerability in Technological Cultures. Maastricht University, 2009. Caforio, Giuseppe. Handbook of the Sociology of the Military...10-06-2016 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER U.S. MILITARY TECHNOLOGY DEPENDENCE: THE HIDDEN Sb. GRANT NUMBER VULNERABILITY TO NATIONAL...14. ABSTRACT Because the U.S. has a technological culture, the U.S. military has become technology dependent. This dependence has made the military

  10. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  11. Technological Proficiency as a Key to Job Security. Trends and Issues Alert No. 6.

    Science.gov (United States)

    Imel, Susan

    Although not all current jobs require basic computer skills, technological advances in society have created new jobs and changed the ways many existing jobs are performed. Clearly, workers who are proficient in technology have a greater advantage in the current workplace and the need for technologically proficient workers will only continue to…

  12. Technology transfer of dynamic IT outsourcing requires security measures in SLAs

    NARCIS (Netherlands)

    F. Dickmann (Frank); M. Brodhun (Maximilian); J. Falkner (Jürgen); T.A. Knoch (Tobias); U. Sax (Ulrich)

    2010-01-01

    textabstractFor the present efforts in dynamic IT outsourcing environments like Grid or Cloud computing security and trust are ongoing issues. SLAs are a proved remedy to build up trust in outsourcing relations. Therefore, it is necessary to determine whether SLAs can improve trust from the

  13. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Science.gov (United States)

    2010-10-01

    ... information, the loss, misuse, or unauthorized access to, or modification of which could adversely affect the... inspection, investigation, and audit to safeguard against threats and hazards to the integrity, availability... Official's written accreditation decision from the COR, maintain the approved level of system security as...

  14. NotaMark industrial laser marking system: a new security marking technology

    Science.gov (United States)

    Moreau, Vincent G.

    2004-06-01

    Up until now, the only variable alphanumeric data which could be added to banknotes was the number, applied by means of impact typographical numbering boxes. As an additional process or an alternative to this mechanical method, a non-contact laser marking process can be used offering high quality and greater levels of flexibility. For this purpose KBA-GIORI propose an exclusive laser marking solution called NotaMark. The laser marking process NotaMark is the ideal solution for applying variable data and personalizing banknotes (or any other security documents) with a very high resolution, for extremely large production volumes. A completely integrated solution has been developed comprised of laser light sources, marking head units, and covers and extraction systems. NotaMark allows the marking of variable data by removing locally and selectively, specific printed materials leaving the substrate itself untouched. A wide range of materials has already been tested extensively. NotaMark is a new security feature which is easy to identify and difficult to counterfeit, and which complies with the standard mechanical and chemical resistance tests in the security printing industry as well as with other major soiling tests. The laser marking process opens up a whole new range of design possibilities and can be used to create a primary security feature such as numbering, or to enhance the value of existing features.

  15. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    Science.gov (United States)

    2016-05-01

    economic value, and allow entrepreneurs and industry to share facilities, equipment, and production capacity? In some cases, efforts similar to the Army...means to build community relations, maintain employee morale , and impact broad STEM education and national security STEM workforce efforts...acquisition and intellectual property create opportunities for U.S. entrepreneurs and companies while furthering the mission of the enterprise. Non

  16. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  17. Probabilistic safety assessment technology for commercial nuclear power plant security evaluation

    International Nuclear Information System (INIS)

    Liming, J.K.; Johnson, D.H.; Dykes, A.A.

    2004-01-01

    Commercial nuclear power plant physical security has received much more intensive treatment and regulatory attention since September 11, 2001. In light of advancements made by the nuclear power industry in the field of probabilistic safety assessment (PSA) for its power plants over that last 30 years, and given the many examples of successful applications of risk-informed regulation at U. S. nuclear power plants during recent years, it may well be advisable to apply a 'risk-informed' approach to security management at nuclear power plants from now into the future. In fact, plant PSAs developed in response to NRC Generic Letter 88-20 and related requirements are used to help define target sets of critical plant safety equipment in our current security exercises for the industry. With reasonable refinements, plant PSAs can be used to identify, analyze, and evaluate reasonable and prudent approaches to address security issues and associated defensive strategies at nuclear power plants. PSA is the ultimate scenario-based approach to risk assessment, and thus provides a most powerful tool in identifying and evaluating potential risk management decisions. This paper provides a summary of observations of factors that are influencing or could influence cost-effective or 'cost-reasonable' security management decision-making in the current political environment, and provides recommendations for the application of PSA tools and techniques to the nuclear power plant operational safety response exercise process. The paper presents a proposed framework for nuclear power plant probabilistic terrorist risk assessment that applies these tools and techniques. (authors)

  18. Leadership and New Technologies. New Security Issues for Management of Internet Connectivity and Remote Control in Automotive Industry

    Directory of Open Access Journals (Sweden)

    Cosmin Cătălin Olteanu

    2015-05-01

    Full Text Available The main purpose of the paper is to illustrate the importance of implementing new security policies for infotainment systems in automotive industry. A car is full of technology and is easier today to control car systems through an internet connection linked to car system infotainment. This is how it is possible to gain control of critical car systems. More than 84% of users doesn’t even know the risk of remote control of the car in the presence of Internet connection.

  19. UNIVERSITIES AND INCUBATORS: KEY FACTORS DRIVING ENTREPRENEURSHIP AND SOCIOECONOMIC DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    Liane Mahlmann Kipper

    2014-12-01

    Full Text Available Economic diversification is an utterly important factor for regions that are directly or indirectly related to any productive mechanisms and seek to strengthen their foundations for the generation of jobs and income. Within this context, to invest in business preparation and maturation, especially in the ones related to the technological area, turns out to be an interesting mean of diversifying a regional economy that is facing the risk of stagnation. This study considers the importance of the role taken on by universities and their incubators in driving entrepreneurship and supporting the creation of new companies and the innovative capacity of a country through knowledge transfer amongst universities and companies, generating benefits and socioeconomic progress in a country. It also conducts a case study on a company of the information technology area, recently incubated and whose major objective consists in becoming part of this economic diversification basis.

  20. Innovation, incubation and entrepreneurship case studies from IIT Kanpur

    CERN Document Server

    Khandekar, Sameer

    2017-01-01

    This book focuses on promoting entrepreneurial ecosystems within universities and educational institutes. It especially emphasizes the thriving systems and practices existing within the Indian Institute of Technology Kanpur (IITK). It discusses cases and successes of the SIDBI Incubation and Innovation Centre in the Institute. This edited volume highlights the vision of IITK and describes a few of the major achievements of the past few years. It especially showcases the requirements and challenges of creating, sustaining, and boosting such entrepreneurial ecosystems and incubation centres. The contents of this book will be useful to researchers, administrators, and corporate collaborators working in the area of monetizing technology coming from educational institutions by converting it to successful products and business ideas. .

  1. My, your and our needs for safety and security: relatives' reflections on using information and communication technology in dementia care.

    Science.gov (United States)

    Olsson, Annakarin; Engström, Maria; Skovdahl, Kirsti; Lampic, Claudia

    2012-03-01

    The present paper reports on a study aimed at describing relatives' reflections on different kinds of information and communication technology (ICT) devices that are used or can be used in the daily care of persons with dementia. Many persons with dementia continue living in their own homes, which requires the support of their relatives. One way to meet the needs of relatives and persons with dementia is to use ICT. An interview study was conducted in Sweden (2007-2008) with a purposive sample of 14 spouses of a person with dementia. Qualitative content analysis was used to identify categories and themes in the data. Relatives' reflections on the use of ICT were described as ICT - a support in daily life, ICT - internal and external conditions and ICT - the decision to use or not use. Based on these categories, a theme was revealed: shifting between different perspectives: my, your and our needs for safety and security. Relatives struggle to create a situation of safety and security in daily life for themselves and the persons with dementia. ICT devices with the right functionality and used at the right time are regarded as useful in solving everyday problems. In the decision to use or not use ICT, the opportunity to create a safe and secure environment overshadows potential ethical problems. Providing early information about ICT to persons with dementia and their relatives could facilitate joint decision-making regarding use of ICT. © 2011 The Authors. Scandinavian Journal of Caring Sciences © 2011 Nordic College of Caring Science.

  2. Role of physical protection and safeguards technology used to Nuclear Material Security

    International Nuclear Information System (INIS)

    Djoko-Irianto, Ign.

    2005-01-01

    The presence of nuclear materials at any nuclear facility must be in secure and must be known as safeguards purpose such as its position, from or type and amount. The clarification of the amount be reported to the national regulatory body and International Atomic Energy Agency (IAEA) as the International regulatory body. The national regulatory body and IAEA will then verify that report. The verification must be done to know there is no difference of the amount, and to give the assurance to the International community that any diversion of safeguarded nuclear material from civil use to a prescribed military purpose would be detected. To carry out verification, several verification techniques such as non-destructive analysis, surveillance, unattended and remote monitoring and environmental sampling are explained to convey the impression how those techniques are implemented. According to the security requirement, the physical protection system including all components of physical protection system have to be effectively designed

  3. Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.

  4. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-01-12

    ... Secretary on policies, management processes, and organizational constructs as needed. Upon request, the... technology capabilities and needs, and the latest thinking in systems engineering), and their depth of...

  5. The use of information technology security assessment criteria to protect specialized computer systems

    International Nuclear Information System (INIS)

    Lykov, V.A.; Shein, A.V.; Piskarev, A.S.; Devaney, D.M.; Melton, R.B.; Hunteman, W.J.; Prommel, J.M.; Rothfuss, J.S.

    1997-01-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry

  6. mCare: using secure mobile technology to support soldier reintegration and rehabilitation.

    Science.gov (United States)

    Poropatich, Ronald K; Pavliscsak, Holly H; Tong, James C; Little, Jeanette R; McVeigh, Francis L

    2014-06-01

    The U.S. Army Medical Department conducted a pilot mobile health project to determine the requirements for coordination of care for "Wounded Warriors" using mobile messaging. The primary objective was to determine if a secure mobile health (mhealth) intervention provided to geographically dispersed patients would improve contact rates and positively impact the military healthcare system. Over 21 months, volunteers enrolled in a Health Insurance Portability and Accountability Act-compliant, secure mobile messaging initiative called mCare. The study included males and females, 18-61 years old, with a minimum of 60 days of outpatient recovery. Volunteers were required to have a compatible phone. The mhealth intervention included appointment reminders, health and wellness tips, announcements, and other relevant information to this population exchanged between care teams and patients. Provider respondents reported that 85% would refer patients to mCare, and 56% noted improvement in appointment attendance (n=90). Patient responses also revealed high acceptability of mCare and refined the frequency and delivery times (n=114). The pilot project resulted in over 84,000 outbound messages and improved contact rates by 176%. The mCare pilot project demonstrated the feasibility and administrative effectiveness of a scalable mhealth application using secure mobile messaging and information exchanges, including personalized patient education.

  7. An Axiology of Information Security for Futuristic Neuroprostheses: Upholding Human Values in the Context of Technological Posthumanization.

    Science.gov (United States)

    Gladden, Matthew E

    2017-01-01

    Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the "CIA Triad" of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel "posthumanized" human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses.

  8. Measuring the performance of business incubators

    OpenAIRE

    VANDERSTRAETEN, Johanna; MATTHYSSENS, Paul; VAN WITTELOOSTUIJN, Arjen

    2012-01-01

    This paper focuses on incubator performance measurement. First, we report the findings of an extensive literature review. Both existing individual measures and more comprehensive measurement systems are discussed. This literature review shows that most incubator researchers and practitioners only use one or a few indicators for performance evaluation, and that existing measurement systems do not recognize the importance of short, medium and long-term results, do not always include an incubato...

  9. Establishment and Development of Business Incubators

    OpenAIRE

    Teliceanu Claudiu Daniel

    2010-01-01

    Business incubators are established in order to help new businesses to consolidate and, consequently, to lead to creation of new jobs as part of a strategic framework - territorial oriented, or on a particular policy priority or a combination of these factors. The business incubator supports its customers to overcome the legislative, administrative barriers and thus to start much easier a business, by facilitating the business establishment process and their access to community support network.

  10. Evaluation of the feasibility of security technologies in teleradiology as biometric fingerprint scanners for data exchange over a satellite WAN

    Science.gov (United States)

    Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter

    2000-05-01

    We evaluated the feasibility of fingerprint-scanners in combination with smart cards for personal identification and transmission of encrypted TCP/IP-data-packages via satellite between the university-hospital of Innsbruck and the rural hospital of Reutte. The aim of our study was the proof of the userfriendliness of the SkymedTM technology for security purpose in teleradiology. We examined the time of the personal identification process, the time for the necessary training and the personal satisfaction. The images were sent from the local PACS in Reutte via a Data-Encryption-and-Transmission- Box via satellite from Reutte to Innsbruck. We used an asymmetric bandwidth of 512 kbit/s from Reutte to Innsbruck and 128 kbit/s in the opposite direction. Window NT 4.0- operating PCs were used for the electronical patient record, the medical inquiry of the referring physician and the final report of the radiologist. The images were reported on an UNIX-PACS viewing station. After identification through fingerprint-scanners in combination with the smart card the radiologist was able to open the electronic patient record (EPR) from Reutte and sign with his digital signature his confirmed final report before it was send back to Reutte. The used security technology enables encrypted communication over a WAN, which fulfill data-protection.

  11. National Security Science and Technology Initiative: Air Cargo Screening, Final Report for CRADA Number NFE-07-01081

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip [ORNL; Bush, John [Battelle Memorial Institute; Bowerman, Biays [Brookhaven National Laboratory; Cespedes, Ernesto [Idaho National Laboratory; White, Timothy [Pacific Northwest National Laboratory

    2004-12-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009.

  12. The Use of Space Technology for Environmental Security, Disaster Rehabilitation and Sustainable Development in Afghanistan and Iraq

    Science.gov (United States)

    Lovett, Kian

    Since the dawn of time, humans have engaged in war. In the last 5,600 years of recorded history 14,600 wars have been waged1. The United Nations has sought to save succeeding generations from the scourge of war and to foster peace. Wars have recently taken place in Afghanistan and Iraq. Both countries are now faced with a range of complex problems. In-depth country assessments reveal significant shortcomings in the areas of water, sanitation, health, security and natural resource management. These are key factors when examining environmental security, sustainable development and trans-boundary problems, all of which are issues relevant to the Middle East and Central Asian states. Space technology can be applied to support the reconstruction and development plans for Afghanistan and Iraq; however, there needs to be an investigation and open discussion of how these resources can best be used. Already, agencies within the United Nations possess considerable expertise in the use of space technologies in the area of disaster management. If this capability is to be used, there will need to be inter-agency coordination, not to mention a further expansion and development of the United Nations role in both Afghanistan and Iraq.

  13. Information Communication and Technology for Water Resource Management and Food Security in Kenya: A Case Study of Kericho and Uasin Gishu Districts

    Science.gov (United States)

    Omboto, P. I.; Macharia, J.; Mbagaya, Grace; Standa, F. N.

    2011-01-01

    Recent reports on Kenya have indicated food insecurity and destruction of water catchments as serious problems facing the country. Despite the tremendous strides in Information and Communication Technology (ICT), the country has not taken advantage of the technology to improve food security by effectively managing her water resources. A survey on…

  14. Robust site security using smart seismic array technology and multi-sensor data fusion

    Science.gov (United States)

    Hellickson, Dean; Richards, Paul; Reynolds, Zane; Keener, Joshua

    2010-04-01

    Traditional site security systems are susceptible to high individual sensor nuisance alarm rates that reduce the overall system effectiveness. Visual assessment of intrusions can be intensive and manually difficult as cameras are slewed by the system to non intrusion areas or as operators respond to nuisance alarms. Very little system intrusion performance data are available other than discrete sensor alarm indications that provide no real value. This paper discusses the system architecture, integration and display of a multi-sensor data fused system for wide area surveillance, local site intrusion detection and intrusion classification. The incorporation of a novel seismic array of smart sensors using FK Beamforming processing that greatly enhances the overall system detection and classification performance of the system is discussed. Recent test data demonstrates the performance of the seismic array within several different installations and its ability to classify and track moving targets at significant standoff distances with exceptional immunity to background clutter and noise. Multi-sensor data fusion is applied across a suite of complimentary sensors eliminating almost all nuisance alarms while integrating within a geographical information system to feed a visual-fusion display of the area being secured. Real-time sensor detection and intrusion classification data is presented within a visual-fusion display providing greatly enhanced situational awareness, system performance information and real-time assessment of intrusions and situations of interest with limited security operator involvement. This approach scales from a small local perimeter to very large geographical area and can be used across multiple sites controlled at a single command and control station.

  15. Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead

    Science.gov (United States)

    2017-03-28

    Ph.D. Co-director, Center for International Security and Cooperation, Stanford University Director Emeritus, Los Alamos National Laboratory...either modest, primitive sea-based civilizations, like the Orang Laut of the Malayan peninsula or the Uros of Lake Titicaca in the Andes mountains, or...areas of MosT concern, noW and ahead F Ig U R e 1 C h in a’ s O rg an iz at io n al S tr u ct u re f o r L if e S ci en ce /B io te ch n o lo g

  16. Workshop Summary for Maintaining Innovation and Security in Biotechnology: Lessons Learned from Nuclear, Chemical, and Informational Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Althouse, Paris [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-11

    In the fast-paced field of biotechnology where innovation has such far-reaching impacts on human health and the environment, dealing with the implications of possible illicit activities, accidents or unintended research consequences with potential detrimental societal impacts tends to remain in the background. While controls may be inevitable for the biotech industry, workshop attendees agreed that the way in which controls are implemented will play a major role in the agility and innovation of the biotechnology industry. There is little desire to slow down the pace of the gains while dealing with the security issues that arise. As was seen from the brief examinations of the Nuclear, Chemical, and Information Technology sectors explored in this workshop, establishing a regulatory regime needs to be a partnership between the public, corporate interests, scientists, and the government. Regulation is often written to combat perceived risk rather than actual risk—the public’s perceptions (occasionally even fictional portrayals) can spur regulatory efforts. This leads to the need for a thorough and continuing assessment of the risks posed by modern biotechnology. Inadequate or minimal risk assessment might expedite development in the short term but has potential negative long-term security and economic consequences. Industry and the technical community also often have a large role in setting regulatory policy, especially when well-crafted incentives are incorporated into the regulations. Such incentives might actually lead to enhanced innovation while poorly designed incentives can actually reduce safety and security. Any regulations should be as agile and flexible as the technology they regulate and when applied to biotechnologies they will need a new framework for thinking and implementing. The new framework should consider biotechnology as a technology and not simply a science since it is an extremely complex and adaptive system. This suggests the need to invest

  17. The design of neonatal incubators: a systems-oriented, human-centered approach.

    Science.gov (United States)

    Ferris, T K; Shepley, M M

    2013-04-01

    This report describes a multidisciplinary design project conducted in an academic setting reflecting a systems-oriented, human-centered philosophy in the design of neonatal incubator technologies. Graduate students in Architectural Design and Human Factors Engineering courses collaborated in a design effort that focused on supporting the needs of three user groups of incubator technologies: infant patients, family members and medical personnel. Design teams followed established human-centered design methods that included interacting with representatives from the user groups, analyzing sets of critical tasks and conducting usability studies with existing technologies. An iterative design and evaluation process produced four conceptual designs of incubators and supporting equipment that better address specific needs of the user groups. This report introduces the human-centered design approach, highlights some of the analysis findings and design solutions, and offers a set of design recommendations for future incubation technologies.

  18. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  19. Application of information technology to transportation logistics and security at Northern Kentucky University.

    Science.gov (United States)

    2013-02-28

    This research grant provided the opportunity to research and deploy beneficial transportation technologies to support transit needs. Working with the Transit Authority of Northern Kentucky (TANK), solutions were developed that can apply to transit ag...

  20. Secure Biometric Multi-Logon System Based on Current Authentication Technologies

    Science.gov (United States)

    Tait, Bobby L.

    The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.

  1. Automotive Security Functions; The Use of New Technologies to Tackle Vehicle-Related Crime

    NARCIS (Netherlands)

    Knapik, Peter

    2016-01-01

    Daily life is increasingly penetrated by new technologies. Advanced driver assistance systems with sophisticated sensors are increasingly available in all classes of vehicles. Moreover, mobile devices, such as smartphones, have become our daily companions. With the help of wireless communication

  2. Current status and prospect of radiation technology for the safety and security of food

    International Nuclear Information System (INIS)

    Byun, Myung Woo

    2009-01-01

    Since 1960, radiation technology (RT), which had been known as the method eliminating the biologically hazardous factors of the products in the food, medical, pharmaceutical and cosmetic industries, was comprehensively investigated. The safety of food irradiation has been throughout evaluated with scientific experiments. Recently, RT has been associated with other high technologies such as biotechnology and nanotechnology, and resulted in the innovative products. Through these fusion technology with RT, the new items with high functionality and value will be shown. But, until now, consumers' acceptance on radiation is still the problem to be solved for further development. To make the consumer correctly understand RT, the benefits and defects of RT should be informed and there should be the legislated policy for the industrialization of RT by government. Therefore, this review will introduce the current status of food irradiation in the world, the safety and national agreements and the recent results from radiation fusion technology, and suggest the further work

  3. Survey into basics, concepts, applications, security and simulation of DHT and applications based on DHT technologies

    OpenAIRE

    Aaltonen, Petri

    2017-01-01

    Distributed architectures have emerged as a significant area of computing affecting the consumer domain more and more. Distributed data transfer has proven to be a suitable and convenient technology for efficiently transferring files across multiple peers interested in obtaining an identical copy of the same data – for example entertainment or a block of application data. Current technology when discussing decentralized distributed systems are based on the Distributed Hash Table structures. F...

  4. Building Future Security: Strategies for Restructuring the Defense Technology and Industrial Base.

    Science.gov (United States)

    1992-06-01

    Affairs Staffs Group General Motors Corporation Detroit, Michigan Director JOHN H. GIBBONS The Technology Assessment Board approves the release...Chairman & CEO Technology, Strategies & Alliances Donald W Putnam Corporate Director of Contracts General Dynamics Corp. Jack Ruina Professor of...parts. This strategy allowed Mazda to bring a new product to market quickly and make a profit despite low volume sales. (Peter F. Drucker, "The Big Three

  5. Information Technology: DoD FY 2004 Implementation of the Federal Information Security Management Act for Information Technology Training and Awareness

    National Research Council Canada - National Science Library

    Davis, Sarah; Mitchell, James; Palmer, Kevin A; Riggins, Liyang; Truex, Kathryn; Williams, Zac

    2004-01-01

    ...). Specifically, we evaluated whether all agency employees, including contractors, received IT security training and awareness and whether employees with significant IT security responsibilities...

  6. THE IMPORTANCE OF THE RELATIONSHIP BETWEEN COMPANY AND INCUBATOR FOR BIOTECHNOLOGY DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    Ana Paula Ferreira Alves

    2014-01-01

    Full Text Available The biotechnology activities development demands an intense academic and scientific basis, a productive sector capable of transforming academic research in scientific products and services, and the creation of an institutional environment to promote the sector’s development. Moreover, many biotechnology companies establish formal partnerships with Universities (by technological incubator to expand innovative capacity coming into the market. The importance of biotechnology for developing countries is perceived by its ability to promote national development based on knowledge and innovation. In Brazil, the government establishes technological incubators to accelerate the company consolidation. In this way, it is important to study the relationship between the actors involved. In this context, this article aims to analyze the relationship between a technological incubator and a biotech company. To do so, the qualitative approach was adopted to reach the objective. Interviews with incubator’s employees of a Brazilian University and biotechnology company’s managers were conducted. The results show that the company-incubator interaction promoted projects approval which were able to support new researches development and to purchase production equipment. Incubated companies have higher chances of survival in the market from the interaction with University, through the technological incubator. The relationship between the incubator and the biotech company is considered a fundamental condition for biotechnology activities development.

  7. An MR-compatible neonatal incubator.

    Science.gov (United States)

    Paley, M N J; Hart, A R; Lait, M; Griffiths, P D

    2012-07-01

    To develop a neonatal MR-compatible incubator for transporting babies between a neonatal intensive care unit and an MRI unit that is within the same hospital but geographically separate. The system was strapped to a standard MR-compatible patient trolley, which provides space for resuscitation outside the incubator. A constant-temperature exothermic heat pad was used to maintain temperature together with a logging fluoro-optic temperature monitor and alarm system. The system has been designed to accommodate standard knee-sized coils from the major MR manufacturers. The original incubator was constructed from carbon fibre, but this required modification to prevent radiofrequency shading artefacts due to the conducting properties of the carbon fibre. A high-tensile polyester material was used, which combined light weight with high impact strength. The system could be moved onto the patient bed with the coils and infant in place by one technologist. Studies in eight neonatal patients produced high quality 1.5 T MR images with low motion artefacts. The incubator should also be compatible with imaging in 3 T MR systems, although further work is required to establish this. Images were acquired using both rapid and high-resolution sequences, including three-dimensional volumes, proton spectra and diffusion weighting. The incubator provides a safe, quiet environment for neonates during transport and imaging, at low cost.

  8. Operations research, engineering, and cyber security trends in applied mathematics and technology

    CERN Document Server

    Rassias, Themistocles

    2017-01-01

    Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists,...

  9. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  10. Current Technologies and its Trends of Machine Vision in the Field of Security and Disaster Prevention

    Science.gov (United States)

    Hashimoto, Manabu; Fujino, Yozo

    Image sensing technologies are expected as useful and effective way to suppress damages by criminals and disasters in highly safe and relieved society. In this paper, we describe current important subjects, required functions, technical trends, and a couple of real examples of developed system. As for the video surveillance, recognition of human trajectory and human behavior using image processing techniques are introduced with real examples about the violence detection for elevators. In the field of facility monitoring technologies as civil engineering, useful machine vision applications such as automatic detection of concrete cracks on walls of a building or recognition of crowded people on bridge for effective guidance in emergency are shown.

  11. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  12. Secure transfer of surveillance data over Internet using Virtual Private Network technology. Field trial between STUK and IAEA

    International Nuclear Information System (INIS)

    Smartt, H.; Martinez, R.; Caskey, S.; Honkamaa, T.; Ilander, T.; Poellaenen, R.; Jeremica, N.; Ford, G.

    2000-01-01

    One of the primary concerns of employing remote monitoring technologies for IAEA safeguards applications is the high cost of data transmission. Transmitting data over the Internet has been shown often to be less expensive than other data transmission methods. However, data security of the Internet is often considered to be at a low level. Virtual Private Networks has emerged as a solution to this problem. A field demonstration was implemented to evaluate the use of Virtual Private Networks (via the Internet) as a means for data transmission. Evaluation points included security, reliability and cost. The existing Finnish Remote Environmental Monitoring System, located at the STUK facility in Helsinki, Finland, served as the field demonstration system. Sandia National Laboratories (SNL) established a Virtual Private Network between STUK (Radiation and Nuclear Safety Authority) Headquarters in Helsinki, Finland, and IAEA Headquarters in Vienna, Austria. Data from the existing STUK Remote Monitoring System was viewed at the IAEA via this network. The Virtual Private Network link was established in a proper manner, which guarantees the data security. Encryption was verified using a network sniffer. No problems were? encountered during the test. In the test system, fixed costs were higher than in the previous system, which utilized telephone lines. On the other hand transmission and operating costs are very low. Therefore, with low data amounts, the test system is not cost-effective, but if the data amount is tens of Megabytes per day the use of Virtual Private Networks and Internet will be economically justifiable. A cost-benefit analysis should be performed for each site due to significant variables. (orig.)

  13. Privacy-invading technologies : safeguarding privacy, liberty & security in the 21st century

    NARCIS (Netherlands)

    Klitou, Demetrius

    2012-01-01

    With a focus on the growing development and deployment of the latest technologies that threaten privacy, the PhD dissertation argues that the US and UK legal frameworks, in their present form, are inadequate to defend privacy and other civil liberties against the intrusive capabilities of body

  14. Tecnologias mas nuevas para la seguridad escolar (Newer Technologies for School Security). ERIC Digest.

    Science.gov (United States)

    Schneider, Tod

    This digest in Spanish describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that…

  15. Security applications for converging technologies : impact on the constitutional state and the legal order

    NARCIS (Netherlands)

    Teeuw, Wouter B.; Teeuw, W.B.; Vedder, Anton H.; Custers, Bart H.M.; Dorbeck-Jung, Barbel R.; Faber, Edward Christianus Cornelis; Iacob, Sorin M.; Koops, Bert-Jaap; Leenes, R.E.; de Poot, Henk J.G.; Rip, Arie; Vudisa, Jacques N.

    2008-01-01

    The impact of converging technologies on legal practice and criminology is being investigated in a forward looking study intended for practitioners and policy makers in the field of legislation, crime prevention, and law enforcement. This report consists of three parts. The first part describes the

  16. Security Applications for Converging Technologies - Impact on the Constitutional State and the Legal order

    NARCIS (Netherlands)

    Teeuw, W.; Vedder, A.H.; Custers, B.H.M.; Dorbeck-Jung, B.R.; Faber, E.; Iacob, S.; Koops, E.J.; Leenes, R.E.; de Poot, H.; Rip, A.; Vudisa, J.N.

    2008-01-01

    In this study we investigate the impact of converging technologies on legal practice and criminology in a forward looking study intended for practitioners and policy makers in the field of legislation, crime prevention, and law enforcement. We look at a 15 years timeframe and discuss the scientific

  17. Secure metropolitan network and the management of branches in the technological infrastructure:Case study GADM Babahoyo City

    Directory of Open Access Journals (Sweden)

    Joffre Vicente León Acurio

    2016-12-01

    Full Text Available This study aims to identify the nonexistent network to the general system of data communication that currently has the GADM (Autonomous Government Decentralized Municipal of Babahoyo located in the province of Los Rios in order to develop a logical design of a metropolitan network that can support new technologies and protocols ensuring the information conveyed between branches of GADM of Babahoyo, besides providing the institution of a compatible platform with the requirements of the e-Government (eGovernment. This research allowed to collect information through instruments such as interviews, meetings and literature review also visits took place at the premises of GADM Babahoyo, reviewing aspects of securities in telecommunications under the ISO / IEC 27002: 2013 citing reference the control objective Management network security. Identification, analysis and design of a proposed network infrastructure is made, allowing communication of the various units that are in distant places. It is concluded that the implementation of a system of networks throughout the municipal entity is considered a solution to the problem and generate many benefits.

  18. [Audit "Toys and incubators in neonatology"].

    Science.gov (United States)

    Raginel, T; Bigoin-Dupont, M; Aguelon, V; Fines-Guyon, M; Guillemin, M G

    2009-08-01

    Owing to an increase in nosocomial septicaemias in the Neonatalogy department, we've judged it necessary to consider the role of items not linked to the nursing procedures, and nevertheless present in the incubators, as well as the hygiene techniques applied to them. In November 2007, we've made a longitudinal prospective study consisting in an observation audit during 3 successive days, observing every single incubator with a newborn baby. In each incubator, we've checked whether there were or not items that weren't required by the nursing activities, along with their characteristics and the hygiene procedures applied to them. We've inquired as well whether the parents and the nursing staff knew and applied the required hygiene procedures. In 13 among the 17 incubators under survey, at least one item not strictly required by the nursing procedures could be found. The number of toys in each incubator varied from seven to one. Among the 33 toys surveyed, 24 (73%) of them showed a score of maximum fluffiness (4 out of 4), and only 10 wore labels giving cleansing advice from the manufacturers. Without any record about the cleaning/disinfecting of the toys brought in hospital, we have observed that the parents were given varied advice about how to clean the toys at home before putting them in the incubators (only four parents had washed the toys in their washing machines at more than 30 degrees C). From the six samples under scrutiny, all the culture results were tested positive. In particular two of the soft toys sampled were found infected by a Pseudomonas oryzihabitans. These particular toys belonged to a baby who had been diagnosed with a septicaemia characterized by hemocultures positive to a P. oryzihabitans of a different strain. Our audit has been an efficient reminder that any item put in an incubator is a potential vector and reservoir of pathogen organisms. After a general feedback towards the department staff, the medical staff then prescribed to

  19. The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes

    Science.gov (United States)

    2018-01-01

    Background The diffusion of health information technologies (HITs) within the health care sector continues to grow. However, there is no theory explaining how success of HITs influences patient care outcomes. With the increase in data breaches, HITs’ success now hinges on the effectiveness of data protection solutions. Still, empirical research has only addressed privacy concerns, with little regard for other factors of information assurance. Objective The objective of this study was to study the effectiveness of HITs using the DeLone and McLean Information Systems Success Model (DMISSM). We examined the role of information assurance constructs (ie, the role of information security beliefs, privacy concerns, and trust in health information) as measures of HIT effectiveness. We also investigated the relationships between information assurance and three aspects of system success: attitude toward health information exchange (HIE), patient access to health records, and perceived patient care quality. Methods Using structural equation modeling, we analyzed the data from a sample of 3677 cancer patients from a public dataset. We used R software (R Project for Statistical Computing) and the Lavaan package to test the hypothesized relationships. Results Our extension of the DMISSM to health care was supported. We found that increased privacy concerns reduce the frequency of patient access to health records use, positive attitudes toward HIE, and perceptions of patient care quality. Also, belief in the effectiveness of information security increases the frequency of patient access to health records and positive attitude toward HIE. Trust in health information had a positive association with attitudes toward HIE and perceived patient care quality. Trust in health information had no direct effect on patient access to health records; however, it had an indirect relationship through privacy concerns. Conclusions Trust in health information and belief in the effectiveness of

  20. The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes.

    Science.gov (United States)

    Kisekka, Victoria; Giboney, Justin Scott

    2018-04-11

    The diffusion of health information technologies (HITs) within the health care sector continues to grow. However, there is no theory explaining how success of HITs influences patient care outcomes. With the increase in data breaches, HITs' success now hinges on the effectiveness of data protection solutions. Still, empirical research has only addressed privacy concerns, with little regard for other factors of information assurance. The objective of this study was to study the effectiveness of HITs using the DeLone and McLean Information Systems Success Model (DMISSM). We examined the role of information assurance constructs (ie, the role of information security beliefs, privacy concerns, and trust in health information) as measures of HIT effectiveness. We also investigated the relationships between information assurance and three aspects of system success: attitude toward health information exchange (HIE), patient access to health records, and perceived patient care quality. Using structural equation modeling, we analyzed the data from a sample of 3677 cancer patients from a public dataset. We used R software (R Project for Statistical Computing) and the Lavaan package to test the hypothesized relationships. Our extension of the DMISSM to health care was supported. We found that increased privacy concerns reduce the frequency of patient access to health records use, positive attitudes toward HIE, and perceptions of patient care quality. Also, belief in the effectiveness of information security increases the frequency of patient access to health records and positive attitude toward HIE. Trust in health information had a positive association with attitudes toward HIE and perceived patient care quality. Trust in health information had no direct effect on patient access to health records; however, it had an indirect relationship through privacy concerns. Trust in health information and belief in the effectiveness of information security safeguards increases

  1. Recent advances in chemical imaging technology for the detection of contaminants for food safety and security

    Science.gov (United States)

    Priore, Ryan J.; Olkhovyk, Oksana; Drauch, Amy; Treado, Patrick; Kim, Moon; Chao, Kaunglin

    2009-05-01

    The need for routine, non-destructive chemical screening of agricultural products is increasing due to the health hazards to animals and humans associated with intentional and unintentional contamination of foods. Melamine, an industrial additive used to increase flame retardation in the resin industry, has recently been used to increase the apparent protein content of animal feed, of infant formula, as well as powdered and liquid milk in the dairy industry. Such contaminants, even at regulated levels, pose serious health risks. Chemical imaging technology provides the ability to evaluate large volumes of agricultural products before reaching the consumer. In this presentation, recent advances in chemical imaging technology that exploit Raman, fluorescence and near-infrared (NIR) are presented for the detection of contaminants in agricultural products.

  2. COmmunications and Networking with QUantum Operationally-Secure Technology for Maritime Deployment (CONQUEST)

    Science.gov (United States)

    2017-03-06

    15 minutes 48 Efficient post -processing for CV QKD Saikat Guha BBN Review Meeting Feb 17, 2017 Communications and Networking with Quantum Operationally...Raytheon BBN Technologies; Dr. Saikat Guha Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: COmmunications and...Equipment Purchased No equipment has been purchased or constructed at this time. Section D. Key Personnel There have been no changes in

  3. Securing Public Safety Vehicles: Reducing Vulnerabilities by Leveraging Smart Technology and Design Strategies

    Science.gov (United States)

    2013-12-01

    there are technologies available today that would reduce the risk of vehicle theft and misuse by fortifying vulnerabilities. They offer several levels...confirm identity by identify “what I am (what I do)” in the electronic context of “who am I?”80 Furthermore, biometrics is a digital representation of...can build a comprehensive and effective biometric identification system, improve overall performance, improve system robustness, and reduce the

  4. Applications of acoustic reasonance spectroscopy as a safeguards-and-security technology in plutonium management

    International Nuclear Information System (INIS)

    Baiardo, J.P.; Wright, P.V.; Heiple, C.R.

    1995-01-01

    Recent negotiations between the United States and the former Soviet Union have resulted in agreements to aggressively reduce our respective nuclear weapon stockpiles. This is a very long-term activity that involves dismantlement, interim storage, and processing of a variety of components and materials. In addition, the end of the Cold War followed by the abrupt shutdown of a significant portion of the weapons complex in the United States has left tons of excess plutonium in various forms in storage for extended periods of time with resulting serious safety concerns. While long-term storage of plutonium in any form requires monitoring to mitigate safety, security, and nonproliferation concerns, the weapon dismantlement phase also requires monitoring for identification and verification without revealing design information. Clearly, the need for sensitive, noninvasive, and rapid monitoring techniques is highly desirable. Acoustic resonance spectroscopy (ARS) may emerge as one such technique; indeed, ARS has already been proven in a number of applications to date including Chemical Weapons Treaty verification and determination of waste drum pressurization and it is being investigated as a method to detect changes in sealed weapon component containers

  5. Micro-incubator for bacterial biosensing applications

    CSIR Research Space (South Africa)

    Clasen, E

    2016-09-01

    Full Text Available The presence of Escherichia coli (E. coli) is a commonly used indicator micro-organism to determine whether water is safe for human consumption. This paper discusses the design of a micro-incubator that can be applied to concentrate bacteria prior...

  6. Selective medium for aerobic incubation of Campylobacter

    Science.gov (United States)

    Studies were conducted on the formulation of a selective medium that could be used to isolate Campylobacter from mixed bacterial cultures using aerobic incubation. A non-selective, basal broth medium was prepared and supplemented with Bolton, Cefex, or Skirrow antibiotic mixtures. The ability of pur...

  7. Incubation temperature and hemoglobin dielectric of chicken embryos incubated under the influence of electric field.

    Science.gov (United States)

    Shafey, T M; Al-Batshan, H A; Shalaby, M I; Ghannam, M M

    2006-01-01

    Eggs from a layer-type breeder flock (Baladi, King Saud University) between 61 and 63 weeks of age were used in 3 trials to study the effects of electric field (EF) during incubation on the internal temperature of incubation, and eggs and hemoglobin (Hb) dielectric of chicken embryos at 18 days of age. Dielectric relative permittivity (epsilon') and conductivity (sigma) of Hb were examined in the range of frequency from 20 to 100 kHz. The values of dielectric increment (Deltaepsilon') and the relaxation times (tau) of Hb molecules were calculated. The internal temperature of eggs was measured in empty (following the removal of egg contents) and fertilized eggs in trials 1 and 2, respectively. The level of the EF was 30 kV/m, 60 Hz. EF incubation of embryos influenced the temperature of incubation and electrical properties of Hb molecules and did not influence the temperature of incubation and internal environment of eggs when empty eggs were incubated. EF incubation of fertilized eggs significantly raised the temperature of incubation, egg air cell, and at the surface of the egg yolk by approximately 0.09, 0.60, and 0.61 degrees F, respectively and Hb epsilon', sigma, Deltaepsilon', and tau as a function of the range of frequency of 20 to 100 kHz when compared with their counterparts of the control group. It was concluded that the exposure of fertilized chicken eggs to EF of 30 kV/m, 60 Hz, during incubation altered dielectric properties of Hb and that probably affected cell to cell communication and created the right environment for enhancing the growing process and heat production of embryos consequently increasing the temperature of the internal environment of the egg, and incubation.

  8. Advanced Materials, Technologies, and Complex Systems Analyses: Emerging Opportunities to Enhance Urban Water Security.

    Science.gov (United States)

    Zodrow, Katherine R; Li, Qilin; Buono, Regina M; Chen, Wei; Daigger, Glen; Dueñas-Osorio, Leonardo; Elimelech, Menachem; Huang, Xia; Jiang, Guibin; Kim, Jae-Hong; Logan, Bruce E; Sedlak, David L; Westerhoff, Paul; Alvarez, Pedro J J

    2017-09-19

    Innovation in urban water systems is required to address the increasing demand for clean water due to population growth and aggravated water stress caused by water pollution, aging infrastructure, and climate change. Advances in materials science, modular water treatment technologies, and complex systems analyses, coupled with the drive to minimize the energy and environmental footprints of cities, provide new opportunities to ensure a resilient and safe water supply. We present a vision for enhancing efficiency and resiliency of urban water systems and discuss approaches and research needs for overcoming associated implementation challenges.

  9. Policy Challenges of Accelerating Technological Change: Security Policy and Strategy Implications of Parallel Scientific Revolutions

    Science.gov (United States)

    2014-09-01

    today, hydraulic fracking technology has created a boom in U.S. oil and gas production that may allow us to achieve that goal of energy independence by...has seen a seismic shift, as vast North American reserves of oil and gas have been unlocked by hydraulic fracking and horizontal drilling. This will...www.disa.mil/About/Our-Work/JIE 94 For a good overview, see http://www.cfr.org/energy-and-environment/ hydraulic -fracturing- fracking /p31559 95 For a

  10. Desalination and Water Security: The Promise and Perils of a Technological Fix to the Water Crisis in Baja California Sur, Mexico

    Directory of Open Access Journals (Sweden)

    Jamie McEvoy

    2014-10-01

    Full Text Available Across the globe, desalination is increasingly being considered as a new water supply source. This article examines how the introduction of desalinated water into the municipal water supply portfolio has affected water security in the coastal tourist city of Cabo San Lucas in Baja California Sur (BCS, Mexico. It also analyses the competing discourses surrounding desalination in the region and discusses alternative water management options for achieving water security. This article challenges the notion that desalination is an appropriate and sufficient technological solution for arid regions. The findings provide evidence of increased yet delimited water security at a neighbourhood scale while identifying new vulnerabilities related to desalination, particularly in the context of the global South. This article concludes that implementing a technological fix on top of a water management system that is plagued with more systemic and structural problems does little to improve long-term water management and is likely to foreclose or forestall other water management options. This multi-scalar analysis contributes to the emerging literature on water security by considering both a narrow and broad framing of water security and identifying a range of factors that influence water security.

  11. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  12. TECHNOLOGY EVALUATION FOR WATERBORNE MERCURY REMOVAL AT THE Y12 NATIONAL SECURITY COMPLEX

    Energy Technology Data Exchange (ETDEWEB)

    He, Feng [ORNL; Liang, Liyuan [ORNL; Miller, Carrie L [ORNL

    2011-01-01

    The Hg-contaminated processing water produced at Y-12 facility is discharged through the storm drain system, merged at Outfall 200, and then discharged to EFPC. Most of the baseflow mercury at Outfall 200 arises from a small number of short sections of storm drain. This report discusses the waterborne mercury treatment technologies to decrease mercury loading to the surface water of EFPC at Y-12 NSC. We reviewed current available waterborne Hg treatment technologies based on the specific conditions of Y-12 and identified two possible options: SnCl2 reduction coupled with air stripping (SnCl2/air stripping) and sorption. The ORNL 2008 and 2009 field studies suggested that SnCl2/air stripping has the capability to remove waterborne mercury with efficiency higher than 90% at Outfall 200. To achieve this goal, dechlorination (i.e., removing residual chlorine from water) using dechlorinating agents such as thiosulfate has to be performed before the reduction. It is unclear whether or not SnCl2/air stripping can reduce the mercury concentration from ~1000 ng/L to 51 ng/L at a full-scale operation. Therefore, a pilot test is a logical step before a full-scale design to answer questions such as Hg removal efficiency, selection of dechlorinating agents, and so on. The major advantages of the SnCl2/air stripping system are: (1) expected low cost at high flow (e.g., the flow at Outfall 200); and (2) production of minimum secondary waste. However, there are many environmental uncertainties associated with this technology by introducing tin to EFPC ecosystem, for example tin methylation causing abiotic Hg methylation, which should be addressed before a full-scale implementation. Mercury adsorption by granular activated carbon (GAC) is a proven technology for treating Hg at Y-12. The ONRL 2010 lab sorption studies suggest that thiol-based resins hold the promise to combine with GAC to form a more cost-effective treatment system. To achieve a treatment goal of 51 ng/L at Outfall

  13. Moving forward in plant food safety and security through NanoBioSensors: Adopt or adapt biomedical technologies?

    Science.gov (United States)

    Sharma, Tarun K; Ramanathan, Rajesh; Rakwal, Randeep; Agrawal, Ganesh K; Bansal, Vipul

    2015-05-01

    Plant-based foods are integral part of our day-to-day diet. Increasing world population has put forth an ever increasing demand for plant-based foods, and food security remains a major concern. Similarly, biological, chemical, and physical threats to our food and increasing regulatory demands to control the presence of foreign species in food products have made food safety a growing issue. Nanotechnology has already established its roots in diverse disciplines. However, the food industry is yet to harness the full potential of the unique capabilities offered by this next-generation technology. While there might be safety concerns in regards to integration of nanoproducts with our food products, an aspect of nanotechnology that can make remarkable contribution to different elements of the food chain is the use of nanobiosensors and diagnostic platforms for monitoring food traceability, quality, safety, and nutritional value. This brings us to an important question that whether existing diagnostic platforms that have already been well developed for biomedical and clinical application are suitable for food industry or whether the demands of the food industry are altogether different that may not allow adoption/adaptation of the existing technology. This review is an effort to raise this important "uncomfortable" yet "timely" question. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Human-centered incubator: beyond a design concept

    OpenAIRE

    Goossens, R H M; Willemsen, H

    2013-01-01

    We read with interest the paper by Ferris and Shepley1 on a human-centered design project with university students on neonatal incubators. It is interesting to see that in the design solutions and concepts as presented by Ferris and Shepley,1 human-centered design played an important role. In 2005, a master thesis project was carried out in the Delft University of Technology, following a similar human-centered design approach.2, 3 In that design project we also addressed the noise level insid...

  15. A Framework of Successful E-Business Incubator for Indonesian Public Universities

    Directory of Open Access Journals (Sweden)

    Lina Gozali

    2015-12-01

    Full Text Available In many developed countries, many business incubators take part to help starts-up company to develop their own business; especially the baby born business cannot compete with the giant industries that have become the old business players. Universities play an important role in motivating young graduates to become technology entrepreneur. Unemployment in Indonesia is still the main issue for the government program to increase welfare in the future. In year 2014 the data from Statistic Center of Indonesia state that Indonesia has 4% unemployment from Indonesia’ work generation. In Indonesia, incubators has been developed since 1992 initiated by the government, Cooperative Department and also universities. This effort continued in 1997 when there was a program called the Development of Entrepreneurship Culture in universities, and of its activity was New Entrepreneur Incubator. The objectives of the research are to investigate the success factor for e-business incubator, and to propose and develop a framework for successful e-business incubator for public universities in Indonesia. Research location is in Indonesia for the public universities that have their e-business incubator. This research will conduct quantitative and qualitative analyses based on data collection from incubator managers and business founders in Indonesia. The result of this research is a framework for successful e-business incubator in Indonesian public universities.

  16. CespIH®, una Organización Socialista de Base Tecnológica incubada en la Educación Superior cubana CespIH®, a Socialist Technology-Based Organization incubated in Cuban Higher Education

    Directory of Open Access Journals (Sweden)

    L. A Hernández

    2009-12-01

    Full Text Available El nuevo modelo universitario cubano debe poseer una capacidad para producir, difundir y aplicar conocimientos, la cual puede ser fomentada mediante la creación y desarrollo de organizaciones socialistas de base tecnológica (OSBT, por lo que es necesaria la sistematización de experiencias en este proceso. En este artículo se ofrece la definición de las OSBT, así como las premisas, principios y características que deben cumplir. Una de estas OSBT es el Programa de Servicios de Encespado CespIH®, creada a partir del año 2000 en la EEPF «Indio Hatuey» con el objetivo de brindar servicios de encespado de alta calidad, un ejemplo exitoso de cómo hacer ciencia, tecnología e innovación en nuestras condiciones. Se describen las características de CespIH®, su proceso de creación y desarrollo mediante un modelo y sus procedimientos asociados, la producción académica y de innovaciones, la formación del capital humano, la articulación nacional e internacional, los obstáculos vencidos y los resultados tangibles e intangibles obtenidos. Se concluye que la creación y el desarrollo de OSBT constituye una vía alternativa para que la nueva universidad cubana pueda desarrollar su capacidad de producir, difundir y aplicar los conocimientos, lo cual contribuye al desarrollo socioeconómico del país.The new Cuban university model must have capacity for producing, disseminating and applying knowledge, which should be enhanced by the creation and development of socialist technology-based organizations (STBO, for which the systematization of experiences in this process is necessary. This work provides a definition of STBOs, as well as the premises, principles and characteristics they must fulfill. One of these STBOs is the Program of Turfing Services CespIH®, created since 2000 at the EEPF «Indio Hatuey», with the objective of offering high quality turfing services, a successful example on how to make science, technology and innovate under

  17. PROMOTING GOAT MARKETS AND TECHNOLOGY DEVELOPMENT IN SEMI-ARID ZIMBABWE FOR FOOD SECURITY AND INCOME GROWTH

    Directory of Open Access Journals (Sweden)

    André van Rooyen

    2009-02-01

    Full Text Available An increasing demand for livestock products including goat meat offers small-scale farmers in semi-arid Zimbabwe opportunities for increased market participation. However, existing goat markets are largely informal, with poorly developed inputs and services. Transaction costs are high, resulting in low prices. In addition, access to market information is limited and negates informed decision-making. Also, farmers are unable to realize the full potential of their herds because of insufficient investment in management practices. Farmers use the cash from goat sales for food, education and human health. Yet, they lose up to 26% of their goat herds to mortality, attributed to dry season feed shortages, animal health and inappropriate housing. While farmers do react to market development, it is not in a consistent enough manner to realize the returns from their investments. More needs to be done to improve production, reduce transaction costs and increase market access to ensure growth within the sector. We hypothesize that improved market access will provide farmers with the incentive to invest in management technologies to enhance offtake and increase the quality of their goats. Innovation Platforms, forums that facilitate communication between farmers, market players, input and service suppliers around local production and marketing systems, were established in two locations in Zimbabwe. The stakeholders meet to identify challenges and opportunities with regards to both production and marketing and collectively identify and evaluate improvements in management technologies and markets. This new approach places technology and market development in a local context based on common interests and strong partnerships between the private and public sectors. It builds local capacity, aligns production with market demands, and improves the overall efficiency of the system, thereby increasing food security and income growth and supporting the development of

  18. An Analysis of Information Technology Managers' and Executives' Security Concerns on Willingness to Adopt Cloud Computing Solutions

    Science.gov (United States)

    Tanque, Marcus M.

    2012-01-01

    The research conducted in this study inquires about Information Technology (IT) managers' and executives' attitudes, beliefs, and knowledge on Cloud Computing (CC) security. The study evaluated how these factors affect IT managers' and executives' willingness to adopt CC solutions in their organizations. Confidentiality,…

  19. Systematic, appropriate, and cost-effective application of security technologies in U.S. public schools to reduce crime, violence, and drugs

    Science.gov (United States)

    Green, Mary W.

    1997-01-01

    As problems of violence and crime become more prevalent in our schools, more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense US social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti- graffiti methods, and duress alarms can all be effective, given they are used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more tot he general 'order maintenance' of the facility than could be achieved by separate measures not integrated or related.

  20. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  1. New Non-Intrusive Inspection Technologies for Nuclear Security and Nonproliferation

    Science.gov (United States)

    Ledoux, Robert J.

    2015-10-01

    Comprehensive monitoring of the supply chain for nuclear materials has historically been hampered by non-intrusive inspection systems that have such large false alarm rates that they are impractical in the flow of commerce. Passport Systems, Inc. (Passport) has developed an active interrogation system which detects fissionable material, high Z material, and other contraband in land, sea and air cargo. Passport's design utilizes several detection modalities including high resolution imaging, passive radiation detection, effective-Z (EZ-3D™) anomaly detection, Prompt Neutrons from Photofission (PNPF), and Nuclear Resonance Fluorescence (NRF) isotopic identification. These technologies combine to: detect fissionable, high-Z, radioactive and contraband materials, differentiate fissionable materials from high-Z shielding materials, and isotopically identify actinides, Special Nuclear Materials (SNM), and other contraband (e.g. explosives, drugs, nerve agents). Passport's system generates a 3-D image of the scanned object which contains information such as effective-Z and density, as well as a 2-D image and isotopic and fissionable information for regions of interest.

  2. Global biosurveillance: enabling science and technology. Workshop background and motivation: international scientific engagement for global security

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Helen H [Los Alamos National Laboratory

    2011-01-18

    Through discussion the conference aims to: (1) Identify core components of a comprehensive global biosurveillance capability; (2) Determine the scientific and technical bases to support such a program; (3) Explore the improvement in biosurveillance to enhance regional and global disease outbreak prediction; (4) Recommend an engagement approach to establishing an effective international community and regional or global network; (5) Propose implementation strategies and the measures of effectiveness; and (6) Identify the challenges that must be overcome in the next 3-5 years in order to establish an initial global biosurveillance capability that will have significant positive impact on BioNP as well as public health and/or agriculture. There is also a look back at the First Biothreat Nonproliferation Conference from December 2007. Whereas the first conference was an opportunity for problem solving to enhance and identify new paradigms for biothreat nonproliferation, this conference is moving towards integrated comprehensive global biosurveillance. Main reasons for global biosurveillance are: (1) Rapid assessment of unusual disease outbreak; (2) Early warning of emerging, re-emerging and engineered biothreat enabling reduced morbidity and mortality; (3) Enhanced crop and livestock management; (4) Increase understanding of host-pathogen interactions and epidemiology; (5) Enhanced international transparency for infectious disease research supporting BWC goals; and (6) Greater sharing of technology and knowledge to improve global health.

  3. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.

    Science.gov (United States)

    Park, Namje; Kang, Namhi

    2015-12-24

    The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.

  4. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle

    Directory of Open Access Journals (Sweden)

    Namje Park

    2015-12-01

    Full Text Available The Internet of Things (IoT, which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.

  5. Program Incubation and Commercialization Best Practices Report

    Energy Technology Data Exchange (ETDEWEB)

    Richardson, Shannon

    2018-04-06

    As a reminder, the primary task of the 4C Program is to increase the commercialization rate of cleantech companies in California. Commercialization, broadly defined, is the innovation continuum of developing and introducing a new product or service into the market. For measurability, the 4C Program defines commercialization as encompassing a startup’s: (a) preparation, (b) incubation, (c) commercial-scale pilot / demonstration, and (d) first customer.

  6. Social capital dimensions among incubated entrepreneurs

    Directory of Open Access Journals (Sweden)

    Sergio Ezequiel Quijano Quijano

    2015-12-01

    Full Text Available This article shows contributions from leading researchers in the fi eld of social capital as support of corporate sustainability and the contribution generated by a descriptive case study based on a representative sample from entrepreneurs from the Fundación Parque de Desarrollo Tecnológico (Parquesoft in Colombia, to contrast the theoretical approaches. The findings show a slight presence of social capital in the performance of incubated entrepreneurs.

  7. The Role Of Business Incubators In The Economic Development Of Saudi Arabia

    OpenAIRE

    Mohamed Imam Salem

    2014-01-01

    Business incubators are perceived to be a mainstay of economic development programs. They create value by combining the entrepreneurial drive of a startup with resources generally available to new ventures. Among the primary objectives of business incubators are creating employment opportunities in the local economy and commercializing technologies. Saudi government has put high-growth, innovative businesses at the heart of its economic agenda. The aim of this paper is to enhance understa...

  8. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  9. The incubation of a social movement? Preterm babies, parent activists, and neonatal productions in the US context.

    Science.gov (United States)

    Landzelius, Kyra

    2006-02-01

    This article explores health-based activism on the part of the US 'parents of preemies' movement, a mutual-help network mobilized around babies born precariously early and acutely dependent upon life-support incubators. The movement articulates two meta-agendas for parental empowerment: (1) the quest to access/exercise greater participatory inclusivity vis-à-vis the preterm baby within the biomedical domain; and, (2) the quest to secure/command greater representational authority over the preterm baby within the public domain. Seen in terms of the erosion of the status quo, it can be argued that the movement's tangible and intangible aims to chip away at these traditions have been softly revolutionary: heralding new working partnerships between medical practitioners and patients' families; radical shifts in the technological consciousness and competences of preemie parents; and cyborg changes in conventional categories of the person. Yet, seen in terms of a normative order of things, it can be argued that the movement has largely and willingly been "co/operated": meaning that it has been "cooperative," but equally "co-opted" and "operated into" the disciplinary trajectory of neonatal medicine as well as the historical march of biopolitics with its governance of the collective body populous. From this critical perspective, the movement qua social movement thus itself might be considered incubated--cocooned, gestated, disciplined--and brought into existence by the very powers and hegemonic (patriarchal) machinery that viable resistance might struggle to govern instead of serve.

  10. Aviation security : TSA is increasing procurement and deployment of the advanced imaging technology, but challenges to this effort and other areas of aviation security remain : testimony before the Subcommittee on Transportation Security and Infrastructur

    Science.gov (United States)

    2010-03-17

    The attempted bombing of Northwest flight 253 highlighted the importance of detecting improvised explosive devices on passengers. This testimony focuses on (1) the Transportation Security Administrations (TSA) efforts to procure and deploy advance...

  11. Parathion alters incubation behavior of laughing gulls

    Science.gov (United States)

    White, D.H.; Mitchell, C.A.; Hill, E.F.

    1983-01-01

    One member of each pair of incubating laughing gulls at 9 nests was trapped, orally dosed with either 6 mg/kg parathion in corn oil or corn oil alone, and marked about the neck with red dye. Each nest was marked with a numbered stake and the treatment was recorded. A pilot study with captive laughing gulls had determined the proper dosage of parathion that would significantly inhibit their brain AChE activity (about 50% of normal) without overt signs of poisoning. After dosing, birds were released and the nests were observed for 2 1/2 days from a blind on the nesting island. The activities of the birds at each marked nest were recorded at 10-minute intervals. Results indicated that on the day of treatment there was no difference (P greater than 0.05, Chi-square test) in the proportion of time spent on the nest between treated and control birds. However, birds dosed with 6 mg/kg parathion spent significantly less time incubating on days 2 and 3 than did birds receiving only corn oil. By noon on the third day, sharing of nest duties between pair members in the treated group had approached normal, indicating recovery from parathion intoxication. These findings suggest that sublethal exposure of nesting birds to an organophosphate (OP) insecticide, such as parathion, may result in decreased nest attentiveness, thereby making the clutch more susceptible to predation or egg failure. Behavioral changes caused by sublethal OP exposure could be especially detrimental in avian species where only one pair member incubates or where both members are exposed in species sharing nest duties.

  12. Physics Incubator at Kansas State University

    Science.gov (United States)

    Flanders, Bret; Chakrabarti, Amitabha

    Funded by a major private endowment, the physics department at Kansas State University has recently started a physics incubator program that provides support to research projects with a high probability of commercial application. Some examples of these projects will be discussed in this talk. In a parallel effort, undergraduate physics majors and graduate students are being encouraged to work with our business school to earn an Entrepreneurship minor and a certification in Entrepreneurship. We will discuss how these efforts are promoting a ``culture change'' in the department. We will also discuss the advantages and the difficulties in running such a program in a Midwest college town.

  13. Weight monitoring system for newborn incubator application

    Science.gov (United States)

    Widianto, Arif; Nurfitri, Intan; Mahatidana, Pradipta; Abuzairi, Tomy; Poespawati, N. R.; Purnamaningsih., Retno W.

    2018-02-01

    We proposed weight monitoring system using load cell sensor for newborn incubator application. The weight sensing system consists of a load cell, conditioning signal circuit, and microcontroller Arduino Uno R3. The performance of the sensor was investigated by using the various weight from 0 up to 3000 g. Experiment results showed that this system has a small error of 4.313% and 12.5 g of threshold and resolution value. Compared to the typical baby scale available in local market, the proposed system has a lower error value and hysteresis.

  14. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  15. THE BUSINESS INCUBATORS AS A LEVER FOR THE DEVELOPMENT AND SUPPORT OF YOUNG ENTREPRENEURS IN THE REPUBLIC OF MOLDOVA

    Directory of Open Access Journals (Sweden)

    Mariana MIRZAC

    2014-03-01

    Full Text Available The business incubators are an instrument of indirect financial support mechanisms in the field of business entrepreneurship of small and medium business, as in the final stage of incubation operators can obtain the status of a successful enterprise and help support new entrepreneurs that are working effectively and which are at the stage of incubation. The university incubators meet the need for action to support businesses resulting primarily from activities of universities having the main goal to turn research results into productive technological activities, with efficient economic results.

  16. Gerald L. Epstein, PhD: director, center for science, technology, and security policy, American Association for the Advancement of Science (AAAS). Interview by Madeline Drexler.

    Science.gov (United States)

    Epstein, Gerald L

    2009-12-01

    Over his entire career, Gerald Epstein has toiled at the nexus of science, technology, and security. From 2003 to 2009, he was Senior Fellow for Science and Security at the Center for Strategic and International Studies Homeland Security Program, where he worked on reducing biological weapons threats, improving national preparedness, and easing potential tensions between the scientific research and national security communities. Epstein came to CSIS from the Institute for Defense Analyses. From 1996 to 2001, he served in the White House Office of Science and Technology Policy. And from 1983 to 1989, and again from 1991 until its demise in 1995, Epstein worked at the Congressional Office of Technology Assessment, where he directed a study on the proliferation of weapons of mass destruction, alongside research on other global security topics. A recognized expert in biological risk reduction, Epstein was actually trained as a physicist, having received SB degrees in physics and electrical engineering from MIT, and a PhD in physics from the University of California at Berkeley. How, then, did he come to study the evolving threat from bioterrorism? "What compelled me about bioterrorism was that it was a stellar example of a topic that would lead to a train wreck between the scientific community and the security community unless they figured out how to work together," he said. "The distance between a laboratory and a very large consequence event is a lot shorter in biology than in any other field. I got into bioterrorism to help make sure that the security community doesn't get so scared of the science that it shuts it down, and that the science community isn't so oblivious of security concerns that it pays no attention to them." Epstein spoke on November 6, 2009, with contributing writer Madeline Drexler, author of Emerging Epidemics: The Menace of New Infections (Penguin, 2009), an updated version of an earlier volume. Drexler holds a visiting appointment at the

  17. BIOREACTOR WITH LID FOR EASY ACCESS TO INCUBATION CAVITY

    DEFF Research Database (Denmark)

    2012-01-01

    There is provided a bioreactor which is provided with a lid (13) that facilitates access to the incubation cavity. Specifically the end wall of the incubation cavity is constituted by the lid (13) so that removal of the cap renders the incubation cavity fully accessible.......There is provided a bioreactor which is provided with a lid (13) that facilitates access to the incubation cavity. Specifically the end wall of the incubation cavity is constituted by the lid (13) so that removal of the cap renders the incubation cavity fully accessible....

  18. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  19. A Qualitative Meta-Analysis of the Diffusion of Mandated and Subsidized Technology: United States Energy Security and Independence

    Science.gov (United States)

    Noah, Philip D., Jr.

    2013-01-01

    The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…

  20. Accuracy of egg flotation throughout incubation to determine embryo age and incubation day in waterbird nests

    Science.gov (United States)

    Ackerman, Joshua T.; Eagles-Smith, Collin A.

    2010-01-01

    Floating bird eggs to estimate their age is a widely used technique, but few studies have examined its accuracy throughout incubation. We assessed egg flotation for estimating hatch date, day of incubation, and the embryo's developmental age in eggs of the American Avocet (Recurvirostra americana), Black-necked Stilt (Himantopus mexicanus), and Forster's Tern (Sterna forsteri). Predicted hatch dates based on egg flotation during our first visit to a nest were highly correlated with actual hatch dates (r = 0.99) and accurate within 2.3 ± 1.7 (SD) days. Age estimates based on flotation were correlated with both day of incubation (r = 0.96) and the embryo's developmental age (r = 0.86) and accurate within 1.3 ± 1.6 days and 1.9 ± 1.6 days, respectively. However, the technique's accuracy varied substantially throughout incubation. Flotation overestimated the embryo's developmental age between 3 and 9 days, underestimated age between 12 and 21 days, and was most accurate between 0 and 3 days and 9 and 12 days. Age estimates based on egg flotation were generally accurate within 3 days until day 15 but later in incubation were biased progressively lower. Egg flotation was inaccurate and overestimated embryo age in abandoned nests (mean error: 7.5 ± 6.0 days). The embryo's developmental age and day of incubation were highly correlated (r = 0.94), differed by 2.1 ± 1.6 days, and resulted in similar assessments of the egg-flotation technique. Floating every egg in the clutch and refloating eggs at subsequent visits to a nest can refine age estimates.

  1. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  2. The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies

    Science.gov (United States)

    Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming

    2017-02-01

    With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.

  3. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  4. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  5. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  6. Technology Evaluation for the Big Spring Water Treatment System at the Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    Bechtel Jacobs Company LLC

    2002-01-01

    The Y-12 National Security Complex (Y-12 Complex) is an active manufacturing and developmental engineering facility that is located on the U.S. Department of Energy (DOE) Oak Ridge Reservation. Building 9201-2 was one of the first process buildings constructed at the Y-12 Complex. Construction involved relocating and straightening of the Upper East Fork Poplar Creek (UEFPC) channel, adding large quantities of fill material to level areas along the creek, and pumping of concrete into sinkholes and solution cavities present within the limestone bedrock. Flow from a large natural spring designated as ''Big Spring'' on the original 1943 Stone and Webster Building 9201-2 Field Sketch FS6003 was captured and directed to UEFPC through a drainpipe designated Outfall 51. The building was used from 1953 to 1955 for pilot plant operations for an industrial process that involved the use of large quantities of elemental mercury. Past operations at the Y-12 Complex led to the release of mercury to the environment. Significant environmental media at the site were contaminated by accidental releases of mercury from the building process facilities piping and sumps associated with Y-12 Complex mercury handling facilities. Releases to the soil surrounding the buildings have resulted in significant levels of mercury in these areas of contamination, which is ultimately transported to UEFPC, its streambed, and off-site. Bechtel Jacobs Company LLC (BJC) is the DOE-Oak Ridge Operations prime contractor responsible for conducting environmental restoration activities at the Y-12 Complex. In order to mitigate the mercury being released to UEFPC, the Big Spring Water Treatment System will be designed and constructed as a Comprehensive Environmental Response, Compensation, and Liability Act action. This facility will treat the combined flow from Big Spring feeding Outfall 51 and the inflow now being processed at the East End Mercury Treatment System (EEMTS). Both discharge to UEFPC adjacent to

  7. Standoff Sensing Technology Based on Laser-Induced Breakdown Spectroscopy: Advanced Targeting, Surveillance and Reconnaissance in Security and Architectural Heritage Applications

    OpenAIRE

    Gaona Fernández, María Inmaculada

    2014-01-01

    Due to the ability to perform simultaneous, multi-element and real-time analysis without pretreatment and doing from a distance, laser induced breakdown spectroscopy (LIBS) in standoff mode is now considered a cutting-edge analytical technology. All these features have allowed its application in various fields such as security, environment, cultural heritage protection and space exploration, among the more outstanding. Nonetheless, the fact of working to long distances involves greater dif...

  8. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  9. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  10. RELIABILITY ASSESSMENTS OF INFANT INCUBATOR AND THE ANALYZER

    OpenAIRE

    Özdemirci, Emre; Özarslan Yatak, Meral; Duran, Fecir; Canal, Mehmet Rahmi

    2014-01-01

    Approximately 80% of newborn in Turkey are put in neonatal incubators because of their problematic cases. Incubators used for treatment may adversely affect baby’s health seriously, if they adjusts or measures the parameters incorrectly. In this study, complications arisen because of inaccurate adjustment and measurement of incubator parameters were investigated. Current infant incubator analyzers were researched and the deficiencies were evaluated considering the standards and clin...

  11. Egg incubator control system with short message service (sms) fault ...

    African Journals Online (AJOL)

    The egg incubator system with temperature sensor can measure the state of the incubator and automatically change to the suitable condition for the egg. The health of the egg is very important for the development of embryo. The status condition in the incubator system will appear on the liquid crystal display (LCD) screen.

  12. Effects of oil transferred from incubating gulls to their eggs

    Science.gov (United States)

    King, K.A.; LeFever, C.A.

    1979-01-01

    No. 2 fuel oil, or water, was applied to the breast feathers of incubating laughing gulls trapped at their nest site on an island colony in Texas. Gulls were released after treatment and allowed to incubate their eggs for 5 days. Oil was transferred from the feathers of incubating adults to their eggs and resulted in 41% embryo mortality compared with 2% in controls.

  13. Research of Mobile Phone Security Technology%手机的安全防范技术研究

    Institute of Scientific and Technical Information of China (English)

    张海燕

    2012-01-01

    With the popularity of smart phones,mobile phone functions will become increasingly rich,mobile phone platform will be more and more open,mobile phone security issues become increasingly prominent.This paper describes the characteristics of the mobile security,discusses in detail the security issues of mobile terminal,and proposes the mobile phone security strategy with reality.%随着智能手机的普及,手机功能将越来越为丰富,手机平台越来越为开放,手机安全问题越来越突出。本文介绍了手机安全的特性,论述了手机终端的安全问题,结合实际,提出了手机安全防范策略。

  14. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  15. Proposals For The Secure Use Of IoT Technology In The Car Industry - Proposals on how to use IoT technology in the car industry but avoid its negative security consequences

    OpenAIRE

    Ramquist, Robin

    2016-01-01

    The Internet Of Things (IoT) is a hotter topic than ever. As devices and our daily life get connected to the IoT, we also put ourselves at risk. IoT security issues get reported on a regular basis, and experts are concerned that we will lose control of the situation. In this thesis, the IoT usage in the car industry is investigated and analyzed, and proposals for security issue mitigations are presented based on existing research. To do this work, existing research is being looked at and inte...

  16. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  17. Audit Teknologiinformasiatas Physical Security Control Dan Logical Security Control Serta Penentuan Kondisi Security Risk Studi Kasus: PT Talc Indonesia

    OpenAIRE

    Inggrid; Arfianti, Rizka I; Utami, Viany

    2009-01-01

    Abstract The fast growth of technology has an impact to the accounting field. This relates to the term of information technology (17) auditing. One of the risI6 of using information technology in business which can be fatal enough i fignored is security risk Security risk can be reduced by security controls which include physical security control and logical security contra Information technology auditing is the process of collecting and evaluating evidence to determine whether or not a co...

  18. Stellar 'Incubators' Seen Cooking up Stars

    Science.gov (United States)

    2005-01-01

    [figure removed for brevity, see original site] Figure 1 [figure removed for brevity, see original site] [figure removed for brevity, see original site] Figure 2Figure 3Figure 4Figure 5 This image composite compares visible-light and infrared views from NASA's Spitzer Space Telescope of the glowing Trifid Nebula, a giant star-forming cloud of gas and dust located 5,400 light-years away in the constellation Sagittarius. Visible-light images of the Trifid taken with NASA's Hubble Space Telescope, Baltimore, Md. (inside left, figure 1) and the National Optical Astronomy Observatory, Tucson, Ariz., (outside left, figure 1) show a murky cloud lined with dark trails of dust. Data of this same region from the Institute for Radioastronomy millimeter telescope in Spain revealed four dense knots, or cores, of dust (outlined by yellow circles), which are 'incubators' for embryonic stars. Astronomers thought these cores were not yet ripe for stars, until Spitzer spotted the warmth of rapidly growing massive embryos tucked inside. These embryos are indicated with arrows in the false-color Spitzer picture (right, figure 1), taken by the telescope's infrared array camera. The same embryos cannot be seen in the visible-light pictures (left, figure 1). Spitzer found clusters of embryos in two of the cores and only single embryos in the other two. This is one of the first times that multiple embryos have been observed in individual cores at this early stage of stellar development.

  19. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  20. Methods of securing and controlling critical infrastructure assets allocated in information and communications technology sector companies in leading

    Directory of Open Access Journals (Sweden)

    Piotr Sieńko

    2015-12-01

    Full Text Available Critical Infrastructure (CI plays a significant role in maintaining public order and national security. The state may use many different methods to protect and control CI allocated to commercial companies. This article describes the three most important ones: legislation, ownership and government institutions and agencies. The data presented in this paper is the result of research done on the most developed countries in the EU (United Kingdom, France, Germany and Italy and their strategic enterprises in the ICT sector, one of the most important sectors in any national security system.

  1. System renewal of objective contents on basis of new information technologies in continuing education in the field of information security

    Directory of Open Access Journals (Sweden)

    Михаил Иванович Бочаров

    2010-06-01

    Full Text Available In the article the questions of the optimization of the contents of education and the processes of its formation and renewal in dynamically developed subject areas are considered. As an example training process of information security according to suggested by the models of the vital cycle of knowledges system of continuing education is investigated.

  2. A Surveillance Society and the Conflict State: Leveraging Ubiquitous Surveillance and Biometrics Technology to Improve Homeland Security

    Science.gov (United States)

    2002-09-01

    of Industrial Organizations AIDS: Acquired Immune Deficiency Syndrome ANSI: American National Standards Institute APHIS: Animal, Plant, and Health...between a specific person and an impostor than any other type of identification technique. They provide the additional, convenient security...preferable to an impostor being able to defeat the system (Ashbourn, p. 56). Retina scanning systems are resistant to fraud since duplicate artificial

  3. Transforming Security Screening With Biometrics

    National Research Council Canada - National Science Library

    Hearnsberger, Brian J

    2003-01-01

    ... and identity theft to dramatically improve physical security. Today, biometric technology could be implemented to transform physical security by enhancing screening procedures currently in use at U.S...

  4. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  5. Business Incubation in Chile: Development, Financing and Financial Services

    Directory of Open Access Journals (Sweden)

    Aruna Chandra

    2012-07-01

    Full Text Available Business incubation in Chile is still in its nascent stages, with approximately 27 incubators supported primarily by a coalition of government and universities. Chilean business incubators tend to capitalize on regional resource strengths and have a strategic focus on high growth, high innovation, high impact businesses as a result of a government mandate to focus on developing business with high potential for economic development and job creation. The government’s efforts to create the framework conditions for entrepreneurship by investing in business incubators, organizing risk capital for early stage ventures to fill capital market gaps and support for angel networks as well as incubator funding are discussed. Policy implications for the continued growth of the incubation industry are provided.

  6. The role of the Department of Homeland Security, Science and Technology Directorate in the development of vaccines and diagnostics for Transboundary Animal Diseases.

    Science.gov (United States)

    Colby, M; Coats, M; Brake, D; Fine, J

    2013-01-01

    The development of countermeasures to support an effective response to Transboundary Animal Diseases (TAD) poses a challenge on a global scale and necessitates the coordinated involvement of scientists from government, industry and academia, as well as regulatory entities. The Agricultural Defense Branch under the Chemical and Biological Defense Division (CBD) of the Department of Homeland Security (DHS), Science and Technology Directorate (S&T) supports this important mission within the United States. This article provides an overview of the Agricultural Defense Branch's vaccine and diagnostic TAD project.

  7. Short Nissl staining for incubated cryostat sections of the brain.

    Science.gov (United States)

    Lindroos, O F

    1991-01-01

    Nissl stain often binds poorly to cryostat sections which have been incubated in solutions of radiolabeled ligands. Such incubation is used in receptor autoradiography of the brain when using the in vitro method. We have developed a rapid (16 min) modification of Nissl staining for sections that bind stain poorly, e.g., incubated sections. The method stains well sections which cannot be stained with other rapid Nissl staining methods.

  8. Detailed Information Security in Cloud Computing

    OpenAIRE

    Pavel Valerievich Ivonin

    2013-01-01

    The object of research in this article is technology of public clouds, structure and security system of clouds. Problems of information security in clouds are considered, elements of security system in public clouds are described.

  9. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  10. Cyber Security : Home User's Perspective

    OpenAIRE

    Ikonen, Mikko

    2014-01-01

    Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...

  11. Study of extremely low frequency electromagnetic fields in infant incubators.

    Science.gov (United States)

    Cermáková, Eleonora

    2003-01-01

    The aim of the work was to present the results of measurements of extremely low frequency electromagnetic fields (ELF EMF), namely the magnetic flux density, inside infant incubators, and to compare these results with the data published by other authors who point out to a possible association between leukemia or other diseases observed in newborns kept in incubators after the birth and the ELF EMF exposure in the incubator. The measured magnetic flux densities were compared with the reference values for this frequency range indicated in the European Union (EU) recommendations. The repeated measurements in incubators were made with a calibrated magnetometer EFA 300 in the frequency range of 5-30 kHz. Effective values of magnetic flux densities of ELF EMF were determined taking account of the reference values. The results of many repeated measurements showing the values of magnetic flux density in modern incubators with plastic supporting frame, were compared with those obtained in old type incubators with iron skeleton. A power frequency of 50 Hz was detected in the incubator and the ELF EMF values were by over two orders lower than the EU reference values. The paper emphasizes the need to take a special care of newborns kept in incubators even if only the sub-reference values are detected. The EU reference values are intended for the adult human population. A baby in an incubator has much smaller dimensions, higher electric conductivity and maybe trigger another mechanism of response to ELF EMF than that indicated in this paper.

  12. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  13. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  14. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  15. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  16. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  17. Advances in chemical sensing technologies for VOCs in breath for security/threat assessment, illicit drug detection, and human trafficking activity.

    Science.gov (United States)

    Giannoukos, S; Agapiou, A; Taylor, S

    2018-01-17

    On-site chemical sensing of compounds associated with security and terrorist attacks is of worldwide interest. Other related bio-monitoring topics include identification of individuals posing a threat from illicit drugs, explosive manufacturing, as well as searching for victims of human trafficking and collapsed buildings. The current status of field analytical technologies is directed towards the detection and identification of vapours and volatile organic compounds (VOCs). Some VOCs are associated with exhaled breath, where research is moving from individual breath testing (volatilome) to cell breath (microbiome) and most recently to crowd breath metabolites (exposome). In this paper, an overview of field-deployable chemical screening technologies (both stand-alone and those with portable characteristics) is given with application to early detection and monitoring of human exposome in security operations. On-site systems employed in exhaled breath analysis, i.e. mass spectrometry (MS), optical spectroscopy and chemical sensors are reviewed. Categories of VOCs of interest include (a) VOCs in human breath associated with exposure to threat compounds, and (b) VOCs characteristic of, and associated with, human body odour (e.g. breath, sweat). The latter are relevant to human trafficking scenarios. New technological approaches in miniaturised detection and screening systems are also presented (e.g. non-scanning digital light processing linear ion trap MS (DLP-LIT-MS), nanoparticles, mid-infrared photo-acoustic spectroscopy and hyphenated technologies). Finally, the outlook for rapid and precise, real-time field detection of threat traces in exhaled breath is revealed and discussed.

  18. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  19. The effects of incubation on academic and non-academic high-tech start-ups: evidence from Italy

    OpenAIRE

    Colombo, Massimo G.; Piva, Evila; Rentocchini, Francesco

    2012-01-01

    This study aims at empirically investigating whether technology incubators help academic high-tech start-ups to establish collaborations with other organizations, thus increasing the competitiveness of these firms. In doing so, we take into account the specificities of academic high-tech start-ups with respect to their non-academic counterparts. We compare the effects of incubation on academic and non-academic high-tech start-ups through econometric estimates using a large sample of Italian f...

  20. The impact of university-based incubation support on the innovation strategy of academic spin-offs

    OpenAIRE

    Soetanto, Danny Prabowo; Jack, Sarah Louise

    2016-01-01

    This paper develops understanding about how incubation support and innovation strategy can determine the performance of academic spin-offs. Using a sample of spin-offs from the United Kingdom, the Netherlands and Norway, we analyse the potential moderating effect of incubation support (networking and entrepreneurial support) on innovation strategy effectiveness. The empirical results demonstrate: (1) a technology and market exploitation strategy has a stronger and more positive effect on the ...

  1. Avian Incubation Patterns Reflect Temporal Changes in Developing Clutches.

    Directory of Open Access Journals (Sweden)

    Caren B Cooper

    Full Text Available Incubation conditions for eggs influence offspring quality and reproductive success. One way in which parents regulate brooding conditions is by balancing the thermal requirements of embryos with time spent away from the nest for self-maintenance. Age related changes in embryo thermal tolerance would thus be expected to shape parental incubation behavior. We use data from unmanipulated Black-capped Chickadee (Poecile atricapillus nests to examine the temporal dynamics of incubation, testing the prediction that increased heat flux from eggs as embryos age influences female incubation behavior and/or physiology to minimize temperature fluctuations. We found that the rate of heat loss from eggs increased with embryo age. Females responded to increased egg cooling rates by altering incubation rhythms (more frequent, shorter on- and off- bouts, but not brood patch temperature. Consequently, as embryos aged, females were able to increase mean egg temperature and decrease variation in temperature. Our findings highlight the need to view full incubation as more than a static rhythm; rather, it is a temporally dynamic and finely adjustable parental behavior. Furthermore, from a methodological perspective, intra- and inter-specific comparisons of incubation rhythms and average egg temperatures should control for the stage of incubation.

  2. Influence of incubation management on pipping position, hatching ...

    African Journals Online (AJOL)

    Influence of incubation management on pipping position, hatching ability and survival of ostrich chicks. Z Brand, SWP Cloete, IA Malecki, CR Brown. Abstract. Despite numerous studies, the effect of artificial incubation on the hatchability and survival of near-term ostrich chicks is still not well understood. Records from 13 975 ...

  3. Meeting embryonic requirements of broilers throughout incubation: a review

    Directory of Open Access Journals (Sweden)

    R Molenaar

    2010-09-01

    Full Text Available During incubation of chicken embryos, environmental conditions, such as temperature, relative humidity, and CO2 concentration, must be controlled to meet embryonic requirements that change during the different phases of embryonic development. In the current review, the effects of embryo temperature, egg weight loss, and CO2 concentration on hatchability, hatchling quality, and subsequent performance are discussed from an embryonic point of view. In addition, new insights related to the incubation process are described. Several studies have shown that a constant eggshell temperature (EST of 37.5 to 38.0°C throughout incubation results in the highest hatchability, hatchling quality, and subsequent performance. Egg weight loss must be between 6.5 and 14.0% of the initial egg weight, to obtain an adequate air cell size before the embryo internally pips. An increased CO2 concentration during the developmental phase of incubation (first 10 days can accelerate embryonic development and hatchability, but the physiological mechanisms of this acceleration are not completely understood. Effects of ar increased CO2 concentration during late incubation also need further investigation. The preincubation warming profile, thermal manipulation, and in ovo feeding are new insights related to the incubation process and show that the optimal situation for the embryo during incubation highly depends on the conditions of the eggs before (storage duration and during incubation (environmental conditions and on the conditions of the chickens after hatching (environmental temperature.

  4. Development Of A Biogas-Powered Poultry Egg Incubator ...

    African Journals Online (AJOL)

    This study advances the utilization of biogas energy for chick production. A wooden frame still-air incubator was developed, which uses biogas as a fuel to supply heat through a burner installed at the base. A no-load test was carried out during which incubator temperatures were calibrated against ambient temperatures ...

  5. Business Incubators: A Review. Digest Number 97-4.

    Science.gov (United States)

    Schuyler, Gwyer

    A business incubator is an organization of services designed to nurture new businesses. Services that can be offered include management assistance, access to financing, business or technical support services, and shared office services. In 1997, 550 incubators served more than 13,000 clients, affiliates, and graduates. More than 80 percent of the…

  6. Are incubators the new wonder tool for entrepreneurship education?

    NARCIS (Netherlands)

    Toon Buddingh

    2014-01-01

    In the nineties of the last century, a lot of (ICT) incubators started in the Netherlands, many private (GorillaPark, Ant Factory, Lost Boys and Newconomy), some public, such as Twinning. Most of them stopped early this century or gone bankrupt. From 2005 university incubators like YesDelft!,

  7. State of the art incubator for controlled atmosphere studies

    DEFF Research Database (Denmark)

    Nielsen, Per Væggemose

    1998-01-01

    in the design of the incubator, due to their importance for the final performance of the incubator. This includes choice of temperature control system, humidification system, gas addition and control, data collection and process control, and the physical design which includes airlocks for taking out samples...

  8. Business Incubators: Creation of a Fit in Armenia

    NARCIS (Netherlands)

    Grigorian, A.; Ratinho, Tiago; Harms, Rainer

    2010-01-01

    In this paper, we evaluate the extent to which business incubation services meet tenant’s needs. Additionally, we pose the question of whether the current business incubators actually cover the needs of a particular industry. Our empirical setting is a developing country in the Caucasian Region

  9. [Centralized management strategy of the infant incubators in NICUs].

    Science.gov (United States)

    Liu, Hong-cheng

    2005-07-01

    There are many problems existing at present in the incubator applications and management. Among them, the prominent problems are their cleaning and disinfection. We hope to find, through the centralized management and clinical engineering, an efficient strategy in order to get more reasonable and better maintenance, cleaning and training for infant incubators in NICUs. Scientific management will provide an excellent service to infant patients.

  10. An assessment of technology-based service encounters & network security on the e-health care systems of medical centers in Taiwan

    Directory of Open Access Journals (Sweden)

    Chang Ching

    2008-04-01

    Full Text Available Abstract Background Enhancing service efficiency and quality has always been one of the most important factors to heighten competitiveness in the health care service industry. Thus, how to utilize information technology to reduce work load for staff and expeditiously improve work efficiency and healthcare service quality is presently the top priority for every healthcare institution. In this fast changing modern society, e-health care systems are currently the best possible way to achieve enhanced service efficiency and quality under the restraint of healthcare cost control. The electronic medical record system and the online appointment system are the core features in employing e-health care systems in the technology-based service encounters. Methods This study implemented the Service Encounters Evaluation Model, the European Customer Satisfaction Index, the Attribute Model and the Overall Affect Model for model inference. A total of 700 copies of questionnaires from two authoritative southern Taiwan medical centers providing the electronic medical record system and the online appointment system service were distributed, among which 590 valid copies were retrieved with a response rate of 84.3%. We then used SPSS 11.0 and the Linear Structural Relationship Model (LISREL 8.54 to analyze and evaluate the data. Results The findings are as follows: (1 Technology-based service encounters have a positive impact on service quality, but not patient satisfaction; (2 After experiencing technology-based service encounters, the cognition of the service quality has a positive effect on patient satisfaction; and (3 Network security contributes a positive moderating effect on service quality and patient satisfaction. Conclusion It revealed that the impact of electronic workflow (online appointment system service on service quality was greater than electronic facilities (electronic medical record systems in technology-based service encounters. Convenience and

  11. An assessment of technology-based service encounters & network security on the e-health care systems of medical centers in Taiwan.

    Science.gov (United States)

    Chang, Hsin Hsin; Chang, Ching Sheng

    2008-04-17

    Enhancing service efficiency and quality has always been one of the most important factors to heighten competitiveness in the health care service industry. Thus, how to utilize information technology to reduce work load for staff and expeditiously improve work efficiency and healthcare service quality is presently the top priority for every healthcare institution. In this fast changing modern society, e-health care systems are currently the best possible way to achieve enhanced service efficiency and quality under the restraint of healthcare cost control. The electronic medical record system and the online appointment system are the core features in employing e-health care systems in the technology-based service encounters. This study implemented the Service Encounters Evaluation Model, the European Customer Satisfaction Index, the Attribute Model and the Overall Affect Model for model inference. A total of 700 copies of questionnaires from two authoritative southern Taiwan medical centers providing the electronic medical record system and the online appointment system service were distributed, among which 590 valid copies were retrieved with a response rate of 84.3%. We then used SPSS 11.0 and the Linear Structural Relationship Model (LISREL 8.54) to analyze and evaluate the data. The findings are as follows: (1) Technology-based service encounters have a positive impact on service quality, but not patient satisfaction; (2) After experiencing technology-based service encounters, the cognition of the service quality has a positive effect on patient satisfaction; and (3) Network security contributes a positive moderating effect on service quality and patient satisfaction. It revealed that the impact of electronic workflow (online appointment system service) on service quality was greater than electronic facilities (electronic medical record systems) in technology-based service encounters. Convenience and credibility are the most important factors of service quality

  12. Improvements in and relating to the incubation of samples

    International Nuclear Information System (INIS)

    Bagshawe, K.D.

    1978-01-01

    Apparatus is described for incubating a plurality of biological samples and particularly as part of an analysis, e.g. radioimmunoassay or enzyme assay, of the samples. The apparatus is comprised of an incubation station with a plurality of containers to which samples together with diluent and reagents are supplied. The containers are arranged in rows in two side-by-side columns and are circulated sequentially. Sample removal means is provided either at a fixed location or at a movable point relative to the incubator. Circulation of the containers and the length of sample incubation time is controlled by a computer. The incubation station may include a plurality of sections with the columns in communication so that rows of samples can be moved from the column of one section to the column of an adjacent section, to provide alternative paths for circulation of the samples. (author)

  13. Effects of Ascorbic Acid Injection in Incubated Eggs Submitted to Heat Stress on Incubation Parameters and Chick Quality

    Directory of Open Access Journals (Sweden)

    S Sgavioli

    2015-06-01

    Full Text Available Dose-dependent positive effects on hatchability and hatchling weight have been attributed to ascorbic acid (AA when eggs were submitted or not to intermittent heat stress during incubation. Fertile breeder (Cobb(r eggs were used to determine if the pre-incubation injection of AA in ovo affects the incubation and hatchling quality of egg incubated under thermoneutral or intermittent heat stress conditions. Eggs were not injected or injected with 0, 2,4, or 6% AA/100µL water and incubated at continuous thermoneutral (37.5ºC or hot (39.0ºC temperature. Eggshell temperature (EST increased in the second half of the incubation period in all experimental groups. The EST of non-injected eggs and of those injected with water was higher when incubated at 39°C than at 37.5°C, but EST was not different among eggs injected with AA. Egg mass loss and eggshell conductance were higher in the eggs incubated at 39°C than at 37.5°C.Hatchability was lower in the eggs injected with AA. Liver and yolk sac weights were higher, whereas heart and liver weights were lower in hatchlings from eggs incubated at 39°C; however, hatchling weight was not affected by incubation temperature. The results showed that AA doses affected egg conductive heat loss and hatchability, and that they did not minimize the effects of high incubation temperature on liver and heart development.

  14. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  15. Incubation Programs from Public Research Organizations as Catalysts for Open Business Ecosystems

    Directory of Open Access Journals (Sweden)

    Sven H. De Cleyn

    2013-04-01

    Full Text Available In many economies, new knowledge and technology creation and transfer towards local entities and new startups have been recognized as catalysts for industry renewal and tools for safeguarding (or even enhancing a region’s employment and prosperity. This article presents a case study of iMinds, a network organization in Flanders, Belgium. The organization fosters interdisciplinary research in information and communication technologies (ICT and strongly engages in transferring these new technologies towards local actors and in creating and supporting new startups. iMinds’ incubation and entrepreneurship programs act as catalysts for open innovation and company startup activities in the Flemish region.

  16. African fermented dairy products - Overview of predominant technologically important microorganisms focusing on African Streptococcus infantarius variants and potential future applications for enhanced food safety and security.

    Science.gov (United States)

    Jans, Christoph; Meile, Leo; Kaindi, Dasel Wambua Mulwa; Kogi-Makau, Wambui; Lamuka, Peter; Renault, Pierre; Kreikemeyer, Bernd; Lacroix, Christophe; Hattendorf, Jan; Zinsstag, Jakob; Schelling, Esther; Fokou, Gilbert; Bonfoh, Bassirou

    2017-06-05

    Milk is a major source of nutrients, but can also be a vehicle for zoonotic foodborne diseases, especially when raw milk is consumed. In Africa, poor processing and storage conditions contribute to contamination, outgrowth and transmission of pathogens, which lead to spoilage, reduced food safety and security. Fermentation helps mitigate the impact of poor handling and storage conditions by enhancing shelf life and food safety. Traditionally-fermented sour milk products are culturally accepted and widely distributed in Africa, and rely on product-specific microbiota responsible for aroma, flavor and texture. Knowledge of microbiota and predominant, technologically important microorganisms is critical in developing products with enhanced quality and safety, as well as sustainable interventions for these products, including Africa-specific starter culture development. This narrative review summarizes current knowledge of technologically-important microorganisms of African fermented dairy products (FDP) and raw milk, taking into consideration novel findings and taxonomy when re-analyzing data of 29 publications covering 25 products from 17 African countries. Technologically-important lactic acid bacteria such as Lactococcus lactis and Streptococcus infantarius subsp. infantarius (Sii), Lactobacillus spp. and yeasts predominated in raw milk and FDP across Africa. Re-analysis of data also suggests a much wider distribution of Sii and thus a potentially longer history of use than previously expected. Therefore, evaluating the role and safety of African Sii lineages is important when developing interventions and starter cultures for FDP in Africa to enhance food safety and food security. In-depth functional genomics, epidemiologic investigations and latest identification approaches coupled with stakeholder involvement will be required to evaluate the possibility of African Sii lineages as novel food-grade Streptococcus lineage. Copyright © 2017 The Authors. Published by

  17. Creativity – The Unconscious Foundations of the Incubation Period

    Directory of Open Access Journals (Sweden)

    Simone M. eRitter

    2014-04-01

    Full Text Available Creativity is one of the most important assets we have to navigate through the fast changing world of the 21st century. Anecdotal accounts of creative individuals suggest that oftentimes, creative discoveries result from a process whereby initial conscious thought is followed by a period during which one refrains from task-related conscious thought. For example, one may spend an embarrassing amount of time thinking about a problem when the solution suddenly pops into consciousness while taking a shower. Not only creative individuals but also traditional theories of creativity have put a lot of emphasis on this incubation stage in creative thinking. The aim of the present article is twofold. First, an overview of the domain of incubation and creativity is provided by reviewing and discussing studies on incubation, mind-wandering, and sleep. Second, the causes of incubation effects are discussed. Previously, little attention has been paid to the causes of incubation effects and most findings do not really speak to whether the effects should be explained by unconscious processes or merely by consequences of a period of distraction. In the latter case, there is no need to assume active unconscious processes. The findings discussed in the current article support the idea that it is not merely the absence of conscious thought that drives incubation effects, but that during an incubation period unconscious processes contribute to creative thinking. Finally, practical implications and directions for future research will be discussed.

  18. Principles and Best Practices in Successful Tourism Business Incubators

    Directory of Open Access Journals (Sweden)

    Andreea F. Şchiopu

    2015-02-01

    Full Text Available The business incubators are entities that provide support to start-up companies, managing the obstacles faced by entrepreneurs and facilitating the hazardous process of business creation. This article aims to identify the existing views on best practices that can contribute to the achieving of business incubators’ objectives. Moreover, the present study investigates how the business incubators can ensure the success of tourism, with evidence grounded in both theory and case studies from around the world. In this paper, the authors have identified several types of incubators that could be used successfully for the benefit of start-ups in the tourism sector, such as network incubators, incubators in ecotourism or nature-based incubators. The authors also propose a new perspective on best practices in business incubation, emphasizing the role of the emotions that entrepreneurs have to cope with. Even though the studies in this area are still scarce, the authors strongly believe that this will be a topic highly discussed in the near future, given the fact that emotion and logical thought are intertwined, interacting in complex ways during problem solving, decision making, and other important forms of cognition that entrepreneurs use when pursuing their ventures.

  19. Aligning business strategy of incubator center and tenants

    Science.gov (United States)

    Prasetyawan, Yudha; Agustiani, Elly; Jumayla, Sari

    2017-06-01

    Incubator center is developed to help a particular group of small business players to achieve the expected business growth. In this center, business players often called as tenants will get assistances in pertaining with space, professional network, marketing, investment or funding, and training to improve their business capability. There are three types of incubator center, namely universities that help their alumni or business people in their surrounded area, company that supports small business as the corporate social responsibility, and independent organizations that have specialties in the business development. Some might success in increasing the capacity of the tenants, while other can have difficulties to increase the simplest business capability, e.g., to define the production cost to measure the profit. This study was intended to propose a model to align the business strategy between incubator center and its tenants. The sales and profit growth are the main priorities for the tenants together with their business capability and sustainability. The proposed alignment model provides measurement tools that link the motivation of tenants for joining the incubation process with the mission of incubator center. The linkage covered the key performance indicators (KPI), steps to achieve the target and evaluation tools to improve the current handicaps. An experiment on 4 (four) diverse business fields of the tenants of an incubator center was performed to test the model. As a result, the increase of KPI of incubator center will simultaneously yield a higher value of the tenants' sales.

  20. An Examination of Individual’s Perceived Security and Privacy of the Internet in Malaysia and the Influence of This on Their Intention to Use E-Commerce: Using An Extension of the Technology Acceptance Model

    OpenAIRE

    Muniruddeen Lallmahamood

    2007-01-01

    This study explores the impact of perceived security and privacy on the intention to use Internet banking. An extended version of the technology acceptance model (TAM) is used to examine the above perception. A survey was distributed, the 187 responses mainly from the urban cities in Malaysia, hav e generally agreed that security and privacy are still the main concerns while using Internet banking. The research model explains over half of the variance of the intenti...