WorldWideScience

Sample records for social security program

  1. DATA Act File B Object Class and Program Activity - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File B. File B includes the agency object class and program activity detail obligation and...

  2. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  3. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  4. Social Security Programs Throughout the World: Africa, 2015

    Data.gov (United States)

    Social Security Administration — This report, which is part of a four-volume series, provides a cross-national comparison of the social security systems in 48 countries in Africa. It summarizes the...

  5. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  6. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  7. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  8. Women and social security: a progressive approach.

    Science.gov (United States)

    Olson, L K

    1994-01-01

    This article explores some major assumptions underlying the Social Security system and alternative approaches to rendering the system more economically viable, meeting the income needs of the elderly and/or providing greater equity under its benefit and taxation provisions. It attempts to show that the current structure of Social Security not only reinforces but also exacerbates the underlying economic inequalities in our nation's political economy under the guise of a social insurance program. In addressing selected benefit and taxation issues, the article focuses on how working and older women are faring in the 1990s under the Social Security system. It argues that although the program theoretically is gender neutral, its impact is not. Women, particularly those who are single, are poorly served. The article concludes that a progressive restructuring of the Social Security system itself is imperative if we are to meet the needs of a large percentage of workers, older people, and the economic and social demands of the 1990s and beyond. It also offers some suggestions for such change.

  9. Social security financing.

    Science.gov (United States)

    1980-05-01

    After nearly 2 years of study, the 1979 Advisory Council on Social Security submitted its findings and recommendations in December. In February the Bulletin published the Executive Summary of the Council's report. Because of the continuing wide public interest in the future of social security financing, the Council's detailed findings and recommendations on that subject are published below. The Council unanimously reports that all current and future beneficiaries can count on receiving the payments to which they are entitled. Among the recommendations it calls for are partial financing with nonpayroll-tax revenues. Suggested changes include hospital insurance (HI) financed through portins of personal and corporate income taxes and a part of the HI insurance payroll tax diverted to cash benefits with the balance of this tax repealed. The Council also recommends that the social security cash benefits program be brought into long-run actuarial balance--with a payroll-tax rate increase in the year 2005. It rejects the idea of a value-added tax as being inflationary. Parenthetical remarks represent additional views of the Council members cited.

  10. 45 CFR 205.52 - Furnishing of social security numbers.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Furnishing of social security numbers. 205.52... GENERAL ADMINISTRATION-PUBLIC ASSISTANCE PROGRAMS § 205.52 Furnishing of social security numbers. The... furnish to the State or local agency a social security account number, hereinafter referred to as the SSN...

  11. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  12. Social Security and the Evolution of Elderly Poverty

    OpenAIRE

    Gary V. Engelhardt; Jonathan Gruber

    2004-01-01

    We use data from the March 1968-2001 Current Population Surveys to document the evolution of elderly poverty over this time period, and to assess the causal role of the Social Security program in reducing poverty rates. We develop an instrumental variable approach that relies on the large increase in benefits for birth cohorts from 1885 through 1916, and the subsequent decline and flattening of real benefits growth due to the Social Securing 'notch', to estimate of Social Security on elderly ...

  13. Speeding decisions. Social security's information exchange program.

    Science.gov (United States)

    Winter, Kitt; Hastings, Bob

    2011-05-01

    The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.

  14. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  15. 13 CFR 102.35 - Use and collection of Social Security Numbers.

    Science.gov (United States)

    2010-01-01

    ... § 102.35 Use and collection of Social Security Numbers. Each Program/Support Office Head or designee... their social security numbers, unless: (1) The collection is authorized either by a statute; or (2) The social security numbers are required under statute or regulation adopted prior to 1975 to verify the...

  16. Execution of a participatory supportive return to work program within the Dutch social security sector: a qualitative evaluation of stakeholders' perceptions.

    Science.gov (United States)

    Lammerts, Lieke; Schaafsma, Frederieke G; van Mechelen, Willem; Anema, Johannes R

    2016-04-14

    A process evaluation of a participatory supportive return to work program, aimed at workers without a (permanent) employment contract who are sick-listed due to a common mental disorder, revealed that this program was executed less successfully than similar programs evaluated in earlier studies. The program consisted of a participatory approach, integrated care and direct placement in competitive employment. Aim of this study was to get a better understanding of the execution of the program by evaluating stakeholders' perceptions. In the absence of an employer, the program was applied by the Dutch Social Security Agency, in collaboration with vocational rehabilitation agencies. Together with the sick-listed workers, these were the main stakeholders. Our research questions involved stakeholders' perceptions of the function(s) of the program, and their perceptions of barriers and facilitators for a successful execution of the program within the Dutch social security sector. Semi-structured interviews were held with five sick-listed workers, eight professionals of the Social Security Agency, and two case managers of vocational rehabilitation agencies. Interview topics were related to experiences with different components of the program. Selection of respondents was based on purposive sampling and continued until data saturation was reached. Content analysis was applied to identify patterns in the data. Two researchers developed a coding system, based on predefined topics and themes emerging from the data. Although perceived functions of some components of the program were as intended, all stakeholders stressed that the program often had not resulted in return to work. Perceived barriers for a successful execution were related to a poor collaboration between the Dutch Social Security Agency, vocational rehabilitation agencies and healthcare providers, the type of experienced (health) problems, time constraints, and limited job opportunities. For future implementation

  17. Social Security Administration Retirement, Survivors, and Disability Insurance (RSDI) Improper Payments

    Data.gov (United States)

    Social Security Administration — This dataset shows improper payment experience for the Social Security Retirement, Survivors, and Disability Insurance program paid to workers, their dependents, and...

  18. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  19. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  20. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  1. U.S. Social Security at 75 years: an international perspective.

    Science.gov (United States)

    Hoskins, Dalmer D

    2010-01-01

    Is the historical development of the Old-Age, Survivors, and Disability Insurance (OASDI) program unique or similar to the development of social security programs in other industrialized countries? The U.S. Social Security program was adopted some 40 to 50 years after those of most Western European nations. The United States thus had the opportunity to choose from a number of models and clearly chose to follow the classic social insurance path of such countries as Austria, France, and Germany, which in 1935 already had considerable experience administering earnings-related, employer/worker-financed old-age pension programs. Although based on the traditional social insurance model, OASDI evolved in certain unique ways, including the rejection over the course of succeeding decades of any reliance on general revenue financing, the importance attached to long-range (75-year) actuarial projections, and the relative generosity of benefits for survivors and dependents.

  2. How to supplement Social Security fairly and effectively.

    Science.gov (United States)

    Ghilarducci, Teresa

    2010-04-01

    Over the past 3 decades, the base upon which Americans obtain income for retirement has become increasingly tied to fluctuations in the financial markets. Because Social Security provides a small percentage of pre-retirement income in retirement, most of the nation's workers need a supplement to Social Security. This study demonstrates the failure of the 401(k) system and advances a bold, but realistic, solution to America's crumbling retirement system: guaranteed retirement accounts (GRAs), a universal government program that supplements Social Security by providing guaranteed rates of return, by locking up balances until retirement, and by mandating annuities at retirement-with survivor's benefits. The GRA plan is compared to other proposals, including President Obama's, which aims to expand the voluntary, commercial, individually directed account-based system.

  3. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  4. Stochastic models of the Social Security trust funds.

    Science.gov (United States)

    Burdick, Clark; Manchester, Joyce

    Each year in March, the Board of Trustees of the Social Security trust funds reports on the current and projected financial condition of the Social Security programs. Those programs, which pay monthly benefits to retired workers and their families, to the survivors of deceased workers, and to disabled workers and their families, are financed through the Old-Age, Survivors, and Disability Insurance (OASDI) Trust Funds. In their 2003 report, the Trustees present, for the first time, results from a stochastic model of the combined OASDI trust funds. Stochastic modeling is an important new tool for Social Security policy analysis and offers the promise of valuable new insights into the financial status of the OASDI trust funds and the effects of policy changes. The results presented in this article demonstrate that several stochastic models deliver broadly consistent results even though they use very different approaches and assumptions. However, they also show that the variation in trust fund outcomes differs as the approach and assumptions are varied. Which approach and assumptions are best suited for Social Security policy analysis remains an open question. Further research is needed before the promise of stochastic modeling is fully realized. For example, neither parameter uncertainty nor variability in ultimate assumption values is recognized explicitly in the analyses. Despite this caveat, stochastic modeling results are already shedding new light on the range and distribution of trust fund outcomes that might occur in the future.

  5. Social Security Funds Clamor for Reform

    Institute of Scientific and Technical Information of China (English)

    郑秉文

    2008-01-01

    This paper analyzed the institutional deficiencies inherent in China’s social security system based on a dissection of various social security fund violations. It holds that the unscientific design in social security system is the root cause for social security fund violations, which is reflected in low level of social security unification, irrational investment system and legislative loopholes etc. Currently, China’s social security funds are facing risks in management and in system; The key of risk control lies in the reforming of the overall framework of social security system through the following aspects: 1) readjust the unified account system structure to raise the level of unification; 2) reform funds investment system to boost ROI; 3) speeding up legislative to regulate the administrative costs and the behaviors of its entities.

  6. Cost of the Cervical Cancer Screening Program at the Mexican Social Security Institute

    Directory of Open Access Journals (Sweden)

    Víctor Granados-García

    2014-09-01

    Full Text Available Objective. To estimate the annual cost of the National Cervical Cancer Screening Program (CCSP of the Mexican Institute of Social Security (IMSS. Materials and methods. This cost analysis examined regional coverage rates reported by IMSS. We estimated the number of cytology, colposcopy, biopsy and pathology evaluations, as well as the diagnostic test and treatment costs for cervical intraepithelial neoplasia grade II and III (CIN 2/3 and cervical cancer. Diagnostic test costs were estimated using a micro-costing technique. Sensitivity analyses were performed. Results. The cost to perform 2.7 million cytology tests was nearly 38 million dollars, which represents 26.1% of the total program cost (145.4 million. False negatives account for nearly 43% of the program costs. Conclusion. The low sensitivity of the cytology test generates high rates of false negatives, which results in high institutional costs from the treatment of undetected cervical cancer cases.

  7. Social security systems in Tanzania: Phase I Overview of social ...

    African Journals Online (AJOL)

    The paper starts by examining the concept of social security in Tanzania, showing that there are three key issues in social security which have not been adequately addressed by existing social security schemes and need immediate attention. The paper then examines the nature and forms of social security in Tanzania in a ...

  8. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  9. Banner prints social security numbers

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2014-02-01

    Full Text Available No abstract available. Article truncated at 150 words. The Monday edition of the Arizona Republic contained a story with potential interest to our readers. On the most recent address labels of Banner Health's magazine, Smart & Healthy, the addressee's Social Security or Medicare identification numbers, which are often identical to their Social Security numbers (1. The magazine was mailed to more than 50,000 recipients in Arizona late last week. The recipients are members of the Medicare Pioneer Accountable Care Organization, a government health-care plan that Banner serves. Banner generated its mailing list from information it received from the U.S. Centers for Medicare & Medicaid Services, which is an agency within the U.S. Department of Health & Human Services (HHS responsible for administration of several federal health-care programs. Although medical information has been protected by the Health Insurance Portability and Accountability Act (HIPAA since 1996, penalties were recently increased. Civil monetary penalties were increased from a maximum of $100 ...

  10. Social Security, Intergenerational Transfers, and Endogenous Growth

    OpenAIRE

    Junsen Zhang; Junxi Zhang

    1998-01-01

    In this paper, the effects of social security in a simple model of endogenous growth with alternative motives of having children are analyzed. It shows how the effects of social security depend on the size of the social security tax, the motive to have children, and the pattern of intergenerational transfers. The pattern of intergenerational transfers itself, however, is shown to change with the social security tax rate. When the social security tax is not too high, social security increases ...

  11. Elements of social security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security is a comparative study of important elements of the social security systems in Denmark (DK), Sweden (S), Finland (FIN), Austria (A), Germany (D), the Netherlands (NL), Great Britain (GB) and Canada (CAN). It should be emphasized that Germany is the former West Germany...... (Alte Länder). This is the 9th and last edition of the publication,covering income levels and rules for social security and personal taxation for 1999. Basis for the projections to 1999 income levels is the 1998 data (in some cases 1999 data)for OECD's Taxing Wages as reported by national experts....

  12. Women and social security

    NARCIS (Netherlands)

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  13. A legislative history of the Social Security Protection Act of 2004.

    Science.gov (United States)

    Hansen, Erik

    2008-01-01

    Passage of the original Social Security Act in 1935, Public Law (P.L.) 74-271, represented one of the watershed achievements of social welfare reform in American history. For the first time, workers were guaranteed a basic floor of protection against the hardships of poverty. In the ensuing decades, more than 100 million beneficiaries have realized the value of this protection through the receipt of monthly Social Security payments. As this guarantee has endured and progressed, the policies and administration of such a vast and complex program have required ongoing modifications-more than 150 such revisions over the past 73 years. To some extent, these amendments can be seen as an ongoing refinement process, with the Social Security Protection Act of 2004 (SSPA) being another incremental step in the development of a social insurance program that best meets the evolving needs of American society. This article discusses the legislative history of the SSPA in detail. It includes summaries of the provisions and a chronology of the modification of these proposals as they passed through the House and Senate, and ultimately to the president's desk.

  14. Securing social media in the enterprise

    CERN Document Server

    Dalziel, Henry

    2015-01-01

    Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media wi

  15. Marital Biography, Social Security Receipt, and Poverty.

    Science.gov (United States)

    Lin, I-Fen; Brown, Susan L; Hammersmith, Anna M

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles.

  16. [Changes in workers' rehabilitation procedures under the Brazilian social security system: modernization or undermining of social protection?].

    Science.gov (United States)

    Takahashi, Mara Alice Batista Conti; Iguti, Aparecida Mari

    2008-11-01

    This article describes the changes in workers' rehabilitation practices under the Brazilian National Social Security Institute (INSS) in the 1990s, in the context of neoliberal economic adjustment measures, based on an analysis of INSS documents from 1992 to 1997. The INSS plan for "modernization" of workers' rehabilitation led to: (1) dismantling of multidisciplinary teams; (2) induction of workers to accept proportional retirement pensions and voluntary layoffs; (3) under-utilization of the remaining INSS professional staff; (4) elimination of treatment programs for workers' rehabilitation; and (5) dismantling of INSS rehabilitation centers and clinics. The changes in the Brazilian social security system undermined the county's social security project and hegemony and reduced social security reform to a mere management and fiscal issue. Current "rehabilitation" falls far short of the institution's original purpose of social protection for workers, while aiming at economic regulation of the system to contain costs of workers' benefits. Workers that suffer work-related accidents are denied occupational rehabilitation, which aggravates their social disadvantage when they return to work.

  17. Accelerate China’s Social Security Legislation

    Institute of Scientific and Technical Information of China (English)

    王延中

    2008-01-01

    Since the financial crisis in Asia in 1997, China’s social security system has undergone continual reform and readjustment, and has proved to be an integral part of government efforts to perfect the socialist market economy as well as in building a socialist harmonious society. Although social security construction has achieved certain results, it has also left a lot of problems. With the rapid growth of China’s economy and revenue, people from all walks of life are putting ever-increasing demands on the social security system; therefore, the construction of a sound social security system suited to China’s current situation still remains an arduous task. In this article, the author have reviewed the 10 years development of China’s social security system, analyzed problems and challenges and proposed its suggestions.

  18. 20 CFR 638.528 - Social Security.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...

  19. Social Security and Fighting Poverty in Tunisia

    Directory of Open Access Journals (Sweden)

    Hasna Khemili

    2018-02-01

    Full Text Available The objective of this study was to examine the role of social security in fighting poverty in Metlaoui, Tunisia, using survey data collected between July 2012 and January 2014, covering 200 poor households. We used questionnaire data, which gave a thorough analysis of the reactions, behavior, and strategies adopted by poor households as a result of various forms of risk. Social security has an effect on a number of different areas, including health, education, housing, and income. Our methodology explored both complete and partial risk-sharing, to investigate the impact of social security schemes on the strategies adopted by households to cope with economic shocks. The estimation results of different models showed that social security could help social security-covered households choose less costly strategies to cope with risks. However, the role of social security remains insufficient, given that covered households had less confidence in its services and they adopted strategies of self-insurance or income smoothing. Overall, the results showed that social security plays an important role in Metlaoui, but it remains insufficient, especially for households that are not covered by social security and are suffering from heavy health expenditures.

  20. 34 CFR 668.36 - Social security number.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Social security number. 668.36 Section 668.36 Education... Islands, and the Republic of Palau, the Secretary attempts to confirm the social security number a student... Security Administration. If the Social Security Administration confirms that number, the Secretary notifies...

  1. Social security, dynamic efficiency and self-control problems

    NARCIS (Netherlands)

    Bucciol, A.

    2008-01-01

    We develop an OLG model with uncertainty on labor income and death age to study the welfare implications of unfunded Social Security programs in an economy where agents are affected by temptation à la Gul and Pesendorfer (2001, Econometrica 69, 1403). Tempted agents give additional value to the

  2. Social Influence for Security

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2014-08-01

    Full Text Available The main aim of this work marks the reveling of scientific premises intended to structure the issue of social influence for security. The approach has as aim the identification of those elements that define and characterize the social influence in order to manage conflict, from the perspective of public communication. The proposed approach establishes some synthetic, clear boundaries through the method of research and analysis of the concept of security, social influence, revealing the specifics of public communication in conflict management.

  3. A cost-benefit analysis of the Mexican Social Security Administration's family planning program.

    Science.gov (United States)

    Nortman, D L; Halvas, J; Rabago, A

    1986-01-01

    A cost-benefit analysis of the family planning program of the Mexican Social Security System (IMSS) was undertaken to test the hypothesis that IMSS's family planning services yield a net savings to IMSS by reducing the load on its maternal and infant care service. The cost data are believed to be of exceptionally high quality because they were empirically ascertained by a retrospective and prospective survey of unit time and personnel costs per specified detailed type of service in 37 IMSS hospitals and 16 clinics in 13 of Mexico's 32 states. Based on the average cost per case, the analysis disclosed that for every peso (constant 1983 currency) that IMSS spent on family planning services to its urban population during 1972-1984 inclusive, the agency saved nine pesos. The article concludes by raising the speculative question as to the proportion of the births averted by the IMSS family planning program that would have been averted in the absence of IMSS's family planning services.

  4. Social security reform: an overview

    OpenAIRE

    Robert K. Triest

    1997-01-01

    Recent decades have seen a trend toward longer life expectancy and reduced birth rates across the globe. This is good news -- the pressures created by rapid population growth are being relaxed, and people are more likely to live to old age -- but it creates problems for programs such as Social Security, which are designed to provide for the consumption needs of the elderly. In the United States, the retirement of the baby boom generation will result in a decrease in the number of workers per ...

  5. 75 FR 56858 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Science.gov (United States)

    2010-09-17

    ... number, 1-800-772-1213, or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2009-0017] RIN 0960-AH00 Improvements to the Supplemental Security Income Program--Heroes Earnings Assistance and Relief Tax Act of 2008...

  6. A profile of social security child beneficiaries and their families: sociodemographic and economic characteristics.

    Science.gov (United States)

    Tamborini, Christopher R; Cupito, Emily; Shoffner, Dave

    2011-01-01

    Using a rich dataset that links the Census Bureau's Survey of Income and Program Participation calendar-year 2004 file with Social Security benefit records, this article provides a portrait of the sociodemographic and economic characteristics of Social Security child beneficiaries. We find that the incidence ofbenefit receipt in the child population differs substantially across individual and family-level characteristics. Average benefit amounts also vary across subgroups and benefit types. The findings provide a better understanding of the importance of Social Security to families with beneficiary children. Social Security is a major source of family income for many child beneficiaries, particularly among those with low income or family heads with lower education and labor earnings.

  7. 76 FR 68243 - Social Security Rulings, SSR 91-1c and SSR 66-18c; Rescission of Social Security Rulings (SSR) 66...

    Science.gov (United States)

    2011-11-03

    ..., Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: SSRs make available... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0068] Social Security Rulings, SSR 91-1c and SSR 66-18c; Rescission of Social Security Rulings (SSR) 66-18c and SSR 91-1c AGENCY: Social Security...

  8. Social security and firm performance

    DEFF Research Database (Denmark)

    Lee, Sangheon; Torm, Nina

    2017-01-01

    This article investigates how social security provision - a key determinant of formality - impacts on small and medium-sized firm performance in Viet Nam. Based on enterprise census data covering all registered firms from 2006 to 2011, the authors find that firms which increase their social...... security coverage by 10 per cent experience a revenue gain of 1.4-2.0 per cent per worker and a profit gain of up to 1.8 per cent, depending on the survival time of the firm. However, given the time lag between 'investment' (in social security contributions) and returns (enhanced firm performance...

  9. Social Security at the Crossroads.

    Science.gov (United States)

    International Labour Review, 1980

    1980-01-01

    Social security schemes need to be streamlined and the underlying policies made more coherent to obtain the fullest possible return on expenditure. Third World countries need to reflect very seriously on the role of social security in the development process and on the management problems involved. (CT)

  10. Proposals to Restructure Social Security

    OpenAIRE

    Peter A. Diamond

    1996-01-01

    This paper discusses five proposed changes in Social Security: indexing the normal retirement age to life expectancy (as Sweden is doing); investing part of the trust funds in private securities; partial privatization (as has been proposed by Senators Kerrey and Simpson, Sweden is doing and Mexico has done); replacing Social Security by individually mandated savings (as was done in Chile in 1981); and mandating employer provided retirement savings (as recently legislated in Australia and is e...

  11. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  12. Comprehensive Social Service Programs for Handicapped Citizens through Title XX.

    Science.gov (United States)

    Roten, Shelby Jean

    Reviewed are present and potential services and social programs for handicapped children in Mississippi through purchase of service contracts under Title XX of the Social Security Act. Sections cover the following topics: background and purpose of Title XX which gives states greater control over social service programs, planning state supported…

  13. Individual social security accounts: issues in assessing administrative feasibility and costs.

    Science.gov (United States)

    Olsen, K A; Salisbury, D L

    1998-11-01

    Whether to add individual accounts (IAs) to the Social Security system is a highly political issue. But almost lost in the debate so far have been any practical considerations about how to administer such accounts. Any discussion of whether to create individual accounts must also address the basic but critical questions of how they would work: Who would run them? What would they cost? Logistically, are they even possible? This EBRI Issue Brief provides an overview of the most salient administrative issues facing the current Social Security reform debate--issues that challenge proponents to carefully think through how their proposals could be implemented so as to achieve their policy goals. The options and difficulties in administering IAs raise concerns that cut across ideology. The object of this report is neither to dissuade the advocates nor support the critics of individual accounts. Rather, it is to bring practical considerations to a political debate that has largely ignored the pragmatic challenges of whether IAs would be too complex for participants to understand or too difficult for record keepers to administer. The major findings in this analysis include: Adding individual accounts to Social Security could be the largest undertaking in the history of the U.S. financial market, and no system to date has the capacity to administer such a system. The number of workers currently covered by Social Security--the largest single entitlement program in the nation--is at least four times higher than the combined number of all tax-favored employment-based retirement accounts in the United States, which are administered by hundreds of entities. Direct comparisons between employment-based retirement savings plans and Social Security reform are tenuous at best. Social Security covers workers and businesses that are disproportionately excluded from employment-based plans. Because of these differences, a system of individual Social Security accounts would be more

  14. Coping with Security in Programming

    OpenAIRE

    Frank Schindler

    2006-01-01

    This article deals with importance of security issues in computer programming.Secure software can only be designed with security as a primary goal. To achieve that wewould have to redesign our computer systems with security in our mind including entirecomputer environment, e.g. hardware, programming languages and, of course, operatingsystems. In software development process the quality of resulting computer code should bethe most important aspect during the whole program development process. ...

  15. 49 CFR 10.29 - Social Security numbers.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Social Security numbers. 10.29 Section 10.29... INDIVIDUALS Maintenance of Records § 10.29 Social Security numbers. (a) No individual is denied any right... which is required by Federal statute; or (2) The disclosure of a Social Security number when such...

  16. 14 CFR 1212.604 - Social security numbers.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Social security numbers. 1212.604 Section... REGULATIONS Instructions for NASA Employees § 1212.604 Social security numbers. (a) It is unlawful for NASA to...' refusal to disclose their social security numbers, except where: (1) The disclosure is required by law; or...

  17. [Social Security Needs Social Medicine: Self-image of Physicians Practicing Social Medicine in Statutory Health Insurances and Social Security Systems].

    Science.gov (United States)

    Nüchtern, E; Bahemann, A; Egdmann, W; van Essen, J; Gostomzyk, J; Hemmrich, K; Manegold, B; Müller, B; Robra, B P; Röder, M; Schmidt, L; Zobel, A; von Mittelstaedt, G

    2015-09-01

    In January, 2014, the division "Social Medicine in Practice and Rehabilitation" of the German Society for Social Medicine and Prevention established a working group on the self-image of the physicians active in the field of social medicine (medical expertise and counseling). The result of this work is the contribution presented here after consensus was achieved by specialists of social medicine from different fields and institutions (social security etc.) and in good cooperation with Prof. Dr. Gostomzyk and Prof. Dr. Robra. Based on the importance of an up to date social medicine for claimants and recipients of benefits on the one hand and the social security system on the other, and also on a description of the subjects, objectives and methods the following aspects are presented: · The perspective of social medicine. · Qualification in social medicine, concerning specialist training and continuing medical education. · The fields of duty of experts in social medicine. · The proceedings in social medicine. The working group identified challenges for the specialists in social medicine by a narrowed perception of social medicine by physicians in hospitals and practice, accompanied by an enlarged importance of expertise in social medicine, by the demand for more "patient orientation" and gain of transparency, and concerning the scientific foundation of social medicine. The working group postulates: · The perspective of social medicine should be spread more widely.. · Confidence in experts of social medicine and their independency should be strengthened.. · The not case-related consulting of the staff and executives should be expanded.. · Social medicine in practice needs support by politics and society, and especially by research and teaching.. · Good cooperation and transfer of experiences of the different branches of social security are essential for the impact of social medicine.. © Georg Thieme Verlag KG Stuttgart · New York.

  18. Social Security in Zimbabwe : Phase I Overview of social security in ...

    African Journals Online (AJOL)

    Most people are covered by non-formal arrangements and the family and community still play a critical role in social protection even though poverty has impacted negatively on their ability to do this effectively. Churches are another source of social security. Semi-formal arrangements include burial societies, savings and ...

  19. Marital Biography, Social Security Receipt, and Poverty

    OpenAIRE

    Lin, I-Fen; Brown, Susan L.; Hammersmith, Anna M.

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social S...

  20. ADMINISTRATIVE EXPENDITURES OF SOCIAL SECURITY FUNDS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Nataliia Ivanchuk

    2017-12-01

    Full Text Available Along with the expenditures for social protection, social security funds finance administrative direction, which should correspond to the amount of functions performed by a particular fund. The purpose of the paper is to determine ways to reduce administrative expenditures of state social security funds in the conditions of reforming Ukrainian economy. For this purpose, the authors investigate distribution of the expenditures between social security funds, analyse dynamics and structure of assignments for fund administration, and suggest possible ways to rationalize maintenance cost for these institutions. Methodology. Administrative expenditures are an integral part of the cost of social security funds and include particular items of expenses in the budget of these institutions. Applying a systematic approach to calculating the administrative costs of social security funds of Ukraine the authors have taken into account the expenditures related to funding management, support for information systems, and organization of work with insured people. Results of the survey showed that in 2007–2016 Pension Fund of Ukraine incurred the largest part of social expenditures (more than 90% compared with other social insurance funds (less than 10%. At the same time, the administrative expenses were divided approximately into two halves between Pension Fund and other social security funds. In 2015, the government launched a reform of social insurance funds that aimed to reduce funds to three institutions but a decrease in the total amount of administrative expenditures has not been achieved yet. In addition, Pension Fund of Ukraine was least burdened with administrative expenses, while other social security funds with a relatively small share of social expenditures were burdened with administrative expenditures much more. Practical implications. Research showed that nowadays the existence of several social security funds in Ukraine is economically

  1. Sample Loss and Survey Bias in Estimates of Social Security Beneficiaries: A Tale of Two Surveys.

    OpenAIRE

    John L. Czajka; James Mabli; Scott Cody

    2008-01-01

    Data from the Census Bureau’s Survey of Income and Program Participation (SIPP) and the Current Population Survey (CPS) provide information on current and potential beneficiaries served by Social Security Administration (SSA) programs. SSA also links administrative records to the records of survey respondents who provide Social Security numbers. These matched data expand the content of the SIPP and CPS files to fields available only through SSA and Internal Revenue Service records—such as l...

  2. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  3. Social Security and Part-Time Employment.

    Science.gov (United States)

    Euzeby, Alain

    1988-01-01

    Discusses rules governing social security and their implications for part-time employees in various countries. Topics include (1) methods of financing social security, (2) benefits, (3) measures concerning the unemployed, (4) a floor for employers' contributions, (5) graduated contribution rates, and (6) financial incentives. (CH)

  4. SOCIAL SECURITY IN MODERN ERA

    African Journals Online (AJOL)

    2018-03-28

    Mar 28, 2018 ... Lecturer, Department of Social Work, Bindura University of Science Education; Email. ... Lecturer, School of Social Work, University of Zimbabwe, Mount ... There are two types of informal social security: traditional or family ...

  5. [Universalization of health or of social security?].

    Science.gov (United States)

    Levy-Algazi, Santiago

    2011-01-01

    This article presents an analysis of the architecture of Mexico's health system based on the main economic problem, failing to achieve a GDP growth rate to increase real wages and give workers in formal employment coverage social security. This analysis describes the relationship between social security of the population and employment status of it (either formal or informal employment) and the impact that this situation poses to our health system. Also, it ends with a reform proposal that will give all workers the same social rights, ie to grant universal social security.

  6. 20 CFR 209.3 - Social security number required.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Social security number required. 209.3... RAILROAD EMPLOYERS' REPORTS AND RESPONSIBILITIES § 209.3 Social security number required. Each employer shall furnish to the Board a social security number for each employee for whom any report is submitted...

  7. 7 CFR 273.6 - Social security numbers.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Social security numbers. 273.6 Section 273.6... normally uses the Receipt of Application for a Social Security Number, Form SSA-5028, as evidence that an... security numbers. (a) Requirements for participation. The State agency shall require that a household...

  8. Online, Batch and CICS Social Security Statement

    Data.gov (United States)

    Social Security Administration — A database that contains client preference information for the SSA initiated Social Security Statement as well as other data including SSN, disposition for paper SS...

  9. The Key Conceptions of Social Security: the International Practice and Ukraine

    Directory of Open Access Journals (Sweden)

    Dluhopolska Tetiana I.

    2017-02-01

    Full Text Available The world-wide globalization processes and the political-military conflicts have exacerbated the problem of social security of the people of various world countries, which is usually seen from the perspective of both the State and the individual citizen. The article is aimed at analyzing the existing conceptions of social security from different perspectives – political, economic efficiency, and narrative. An analysis of political theories of social security (majority rational voting; pressure groups has determined that they are based on the redistribution processes, and winning of the individual economic agents is achieved in the political struggle for various «social prizes». An analysis of theories of efficiency (optimal redistribution; optimal retirement insurance; prodigal father; misguided Keynesian; longevity insurance; government economizes on administration costs; return on human capital investment has determined that they rely on market «fiasco» and can help in understanding which from the social protection programs minimize market failures. An analysis of the descriptive (narrative theories (chain letters; lump of labor; monopoly capitalism; nearly rational policy has determined that they are difficult subject to the mathematical interpretation and partially repeat ideas of the previous concepts.

  10. 26 CFR 301.7701-11 - Social security number.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...

  11. A New Paradigm for Secure Social Lending

    Science.gov (United States)

    Serrelis, Emmanouil; Alexandris, Nikolaos

    Social Lending is one of the latest trends in Social Networking, offering a communication and financial channel between individual borrowers and lenders. The various Social Lending transaction schemes could be subject to multiple security threats, in both financial and technical terms, which could affect the integrity of the service as well as the trust of citizens. This paper provides an overview of the basic characteristics of Social Lending as well as an analysis the potential security issues suggesting some appropriate corrective measures. The ultimate target is to enforce the Social Lending effort with an information security foundation that could become an appreciable alternative to the "traditional" lending system.

  12. The story of the social security number.

    Science.gov (United States)

    Puckett, Carolyn

    2009-01-01

    The use of the Social Security number (SSN) has expanded significantly since its inception in 1936. Created merely to keep track of the earnings history of U.S. workers for Social Security entitlement and benefit computation purposes, it has come to be used as a nearly universal identifier. Assigned at birth, the SSN enables government agencies to identify individuals in their records and businesses to track an individual's financial information. This article explores the history and meaning of the SSN and the Social Security card, as well as the Social Security Administration's (SSA's) SSN master file, generally known as the Numident. The article also traces the historical expansion of SSN use and the steps SSA has taken to enhance SSN integrity.

  13. Social Security and the Equity Premium Puzzle

    OpenAIRE

    Olovsson, Conny

    2004-01-01

    This paper shows that social security may be an important factor in explaining the equity premium puzzle. In the absence of shortselling constraints, the young shortsell bonds to the middle-aged and buy equity. Social security reduces the bond demand of the middle-aged, thereby restricting the possibilities of the young to finance their equity purchases. Their equity demand increases as does the average return to equity. Social security also increases the covariance between future consumption...

  14. Social Security Administration Data for Enumeration Accuracy

    Data.gov (United States)

    Social Security Administration — This dataset provides data at the national level from federal fiscal year 2006 onwards for the accuracy of the assignment of Social Security numbers (SSN) based on...

  15. African Social Security Systems: An Ordinal Evaluation | Dixon ...

    African Journals Online (AJOL)

    The purpose of this paper is to rank the social security systems in 45 African countries using a comparative evaluation methodology that enables an assess ment to be ma(le of a country's statutory social security intention. The conclusion drawn is that the spread of African social security system design standards are ...

  16. Social security income and the utilization of home care: Evidence from the social security notch.

    Science.gov (United States)

    Tsai, Yuping

    2015-09-01

    This paper exploits Social Security law changes to identify the effect of Social Security income on the use of formal and informal home care by the elderly. Results from an instrumental variables estimation strategy show that as retirement income increases, elderly individuals increase their use of formal home care and become less likely to rely on informal home care provided to them by their children. This negative effect on informal home care is most likely driven by male children withdrawing from their caregiving roles. The empirical results also suggest that higher Social Security benefits would encourage the use of formal home care by those who would not have otherwise used any type of home care and would also encourage the use of both types of home care services among elderly individuals. Published by Elsevier B.V.

  17. Banner prints social security numbers

    OpenAIRE

    Robbins RA

    2014-01-01

    No abstract available. Article truncated at 150 words. The Monday edition of the Arizona Republic contained a story with potential interest to our readers. On the most recent address labels of Banner Health's magazine, Smart & Healthy, the addressee's Social Security or Medicare identification numbers, which are often identical to their Social Security numbers (1). The magazine was mailed to more than 50,000 recipients in Arizona late last week. The recipients are members of the Medicare Pion...

  18. 20 CFR 422.103 - Social security numbers.

    Science.gov (United States)

    2010-04-01

    ... personal interview with the dependent is not required. Form SS-5 may be obtained at: (i) Any local social... previously assigned social security number(s), if any, of the applicant. A personal interview may be required... sponsoring agency of a refugee, if no personal mailing address is available). (d) Social security number...

  19. Imperfect Annuity Markets, Unintended Bequests, and the Optimal Age Structure of Social Security Benefits

    OpenAIRE

    Martin Feldstein

    1989-01-01

    The social security program now provides a constant real benefit throughout each retirees lifetime. This paper examines whether total welfare would rise if benefits were lower in early retirement years (when most individuals have some saving with which to finance consumption) and higher in later years (when the uncertainty of survival and the absence of actuarially fair private annuities makes the availability of social security benefits more important.) The analysis shows that there is a pot...

  20. Exploring the youth experience about sense of social security: a qualitative study.

    Science.gov (United States)

    Chinekesh, Ahdieh; Hosseini, Seyed Ali; Mohammadi, Farahnaz; Motlagh, Mohammad Esmael; Eftekhari, Monir Baradaran; Ardalan, Gelayol; Djalalinia, Shirin

    2017-12-01

    Undoubtedly, one of the vital needs of man is security. Determinants and related factors to sense of social security is one of the most important research priorities, especially in adolescents and young people. To identify the factors affecting the social security of the youth. In 2017, using conventional content analysis, and benefiting from semi-structured in-depth interviews, we conducted a qualitative study exploring the opinions of young people about their feelings regarding social security. First, a targeted sampling method was determined to collect the data. Participants were young volunteers aged 18 to 30 who were selected from Tehran, the capital of Iran. Inclusion criteria for participants were willingness to participate in the study and ability to express their experiences. Data was extracted from 21 participants. The participants consisted of 21 young people who met the study inclusion criteria, of whom 12 participants were male. Their mean age was 24.4±0.41 years and their education varied from primary school to master's degree. Under two main categories of the need for economic and financial security and the need for a safe society, we extracted 11 subcategories following 32 codes. According to the findings, most participants agreed on the important role that sense of social security has in their lives and their health. The important role of sense of social security in participant's lives and health was the main important point of our findings, emphasized by most of participants. Based on the results; the assessment of the specific needs of different target groups, the design, development and implementation of health programs led to more effective interventions.

  1. Social Networks and Corporate Information Security

    Directory of Open Access Journals (Sweden)

    Ekaterina Gennadievna Kondratova

    2013-06-01

    Full Text Available It is defined in the article social networks as a tool in the hands of cyber-criminals to compromise the organization’s data. The author focuses on a list of threats to information security caused by social networks usage, which should be considered in the set up of information security management system of the company.

  2. 76 FR 65558 - Rescission of Social Security Ruling 97-2p

    Science.gov (United States)

    2011-10-21

    ...-800-325-0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2007-0092] Rescission of Social Security Ruling 97-2p AGENCY: Social Security Administration. ACTION: Notice of rescission of Social Security Ruling...

  3. Will Pre-Funding Provide Security for Social Security? A Review of the Literature

    OpenAIRE

    Robert L. Brown

    2000-01-01

    President Clinton has proposed creating larger social security funds and investing a portion of them in the private sector. Others have suggested more radical reforms such as moving social security from a defined-benefit scheme to a defined contribution plan based on the Chilean model. These proposals are based on the goal of creating higher investment returns, which would make social security benefits easier to finance in the long run. After an extensive review of the literature, this paper ...

  4. Social representations and information security of children and adolescents: the point of view of teachers (Part 1

    Directory of Open Access Journals (Sweden)

    Bovina I.B.

    2017-04-01

    Full Text Available The focus of attention of the authors is the consideration of information security of children and adolescents as the object of social representations. Discusses the need for the theory of social representations to develop prophylactic and preventive programs in the field of information security of children and adolescents, in particular, says that the effectiveness of prevention and preventive programs is determined by how this information is understood by the target group, through what filters it passes. Briefly outlines the main provisions of the theory of social representations, discusses the functions of social representations, the mechanism of action ideas. Analyzed in a few studies, the focus of which was the presentation on new technologies, particularly mobile phones and the Internet. Presents the results of a series of studies devoted to the study of information security of children and adolescents, including the results of the first part of a research project dedicated to the analysis of how parents and teachers understand information security and what strategies to protect children and adolescents from dangerous information they are ready to use.

  5. The Social Security Program and the Private Sector Alternative: Lessons from History.

    Science.gov (United States)

    Quadagno, Jill

    1987-01-01

    Used historical evidence to analyze how private sector benefits worked in the past in light of the debate surrounding the Social Security benefits and the federal deficit. Among conclusions reached are that the private sector failed to provide adequate protection for older citizens, and that benefits were inequitably distributed on basis of gender…

  6. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ...; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  7. 32 CFR 806b.12 - Requesting the Social Security Number.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Requesting the Social Security Number. 806b.12... Number. When asking an individual for his or her Social Security Number, always give a Privacy Act... Social Security Number; and whether providing the Social Security Number is voluntary or mandatory. Do...

  8. A Life-Cycle Analysis of Social Security with Housing

    OpenAIRE

    Chen, Kaiji

    2009-01-01

    This paper incorporates two features of housing in a life-cycle analysis of social security: housing as a durable good and housing market frictions. We find that with housing as a durable good unfunded social security substantially crowds out housing consumption throughout the life cycle. By contrast, aggregate non-durable consumption is higher when social security is present, although it is postponed until late in life. Moreover, in the presence of housing market frictions, social security l...

  9. Reforming the South African Social Security Adjudication System: Innovative Experiences from South African Non-Social Security Jurisdictions

    Directory of Open Access Journals (Sweden)

    Mathias Ashu Tako Nyenti

    2016-08-01

    Full Text Available There is currently no uniform social security dispute resolution system in South Africa due to the piecemeal fashion in which schemes were established or protection against individual risks regulated. The result is that each statute provides for its own dispute resolution institution(s and processes. There are also various gaps and challenges in the current social security dispute resolution systems, some of these relating to the uncoordinated and fragmented nature of the system; inaccessibility of some social security institutions; inappropriateness of some current appeal institutions; the lack of a systematic approach in establishing appeal institutions; a limited scope of jurisdiction and powers of adjudication institutions; inconsistencies in review and/or appeal provisions in various laws; an unavailability of alternative dispute resolution procedures; and an absence of institutional independence of adjudication institutions or forums. The system is therefore in need of reform. In developing an appropriate system, much can be learned from innovative experiences in comparative South African non-social security jurisdictions on the establishment of effective and efficient dispute resolution frameworks. Dispute resolution systems in the labour relations, business competition regulation and consumer protection jurisdictions have been established to realise the constitutional rights of their users (especially the rights of access to justice, to a fair trial and to just administrative action. They thus provide a benchmark for the development of the South African social security dispute resolution system.

  10. Health and Social Security Needs of Rickshaw Pullers in Ranchi.

    Science.gov (United States)

    Kumar, Anant; Thomas, Joe; Wadhwa, Sonal S; Mishra, Aprajita; Dasgupta, Smita

    2016-07-01

    A significant number of "marginalized" population groups are denied their health rights, healthcare access, benefits of government health programs, and other health-related social security benefits. These population groups, particularly the rickshaw pullers of India, are vulnerable because of their poor social and economic status, migration history, lack of permanent settlements, lack of social capital, and so on. These reasons, coupled with other social-political reasons, lead to no or limited access to health services and poor health conditions. This study intends to explore and understand the context and health seeking behavior of rickshaw pullers in Ranchi, the capital city of Jharkhand state in India, with special reference to wider social determinants of health such as, access, affordability, and delivery of health services. The data was collected from 1,000 rickshaw pullers from 40 "rickshaw garages" in Ranchi. The findings of the study show that rickshaw pullers can't afford to "attach" much importance to their health due to various reasons and suffer from a variety of occupational and other illnesses. The health conditions of the rickshaw pullers are affected by poverty, negligence, illiteracy, lack of awareness and unavailability of affordable, quality health services. These are only a symptom of the larger structural issues affecting health. The study suggests that rickshaw pullers, being a marginalized and excluded population group, require special health and social security programs that include safe, affordable, and accessible services along with a special focus on health education, behavior change, and promotion of appropriate health-seeking behavior.

  11. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  12. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  13. Who's (Still) Above the Social Security Payroll Tax Cap?

    OpenAIRE

    Nicole Woo; Janelle Jones; John Schmitt

    2012-01-01

    The Social Security payroll tax cap is the earnings level above which no further Social Security taxes are collected. The cap is currently at $110,100, though legislation has been introduced in Congress to apply the Social Security payroll tax to earnings above $250,000 (but not between the current cap and this level). This issue brief updates earlier work, finding that 5.8 percent of workers would be affected if the Social Security cap were eliminated entirely and 1.4 percent would be affect...

  14. Saving and Social Security Wealth: A Case of Turkey

    OpenAIRE

    H. Yigit Aydede

    2007-01-01

    This paper is the first attempt in the literature to investigate the effects of public social security on aggregate consumption in a time-series setting for a developing country, Turkey that has one of the most generous social security systems in the OECD region. In order to quantify the social security variable, the paper uses the social security wealth (SSW) series calculated for the first time for Turkey and shows that SSW is the largest part of the household wealth in Turkey and therefore...

  15. 42 CFR 435.910 - Use of social security number.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Use of social security number. 435.910 Section 435... of social security number. (a) The agency must require, as a condition of eligibility, that each... religious objections, refuses to obtain a Social Security Number (SSN). The identification number may be...

  16. Austerity, Discipline and Social Security

    Directory of Open Access Journals (Sweden)

    Asja Hrvatin

    2013-03-01

    Full Text Available One of the manifestations of the global crisis of financial capitalism and the policies arising from it was the imposition of austerity measures, which not only resulted in privatization of the commons and general expropriation of the people, but also managed to introduce new mechanisms of discipline and punishment. Debt, being the fundament of relations in society, forced itself into the system of social security: new legislation, regulating welfare benefits, has now shifted to a method for the criminalization of poverty, deepening class differences and transforming social workers (and the system of social security as a whole into a moralizing, bureaucratic machine for disciplining the population. The new legislation also shows a lack of reflection on the changes that need to be made to the welfare state in order to create social services that meet the needs and desires of individuals. Instead of improvements that provide decent living conditions and a new system of social rights (to deal with the problems resulting from precarious working conditions, people are faced with depersonalization, humiliation and increased hate speech and other fascist practices. The effect of austerity measures on the social security system does not end with the devastation of service users’ lives and their communities, which are slowly becoming exhausted, individualized and devoid of solidarity. It also means a big step backwards for the core ethics and principles of social work. Social workers are increasingly alienated from their clients and the communities they live in. They function more in the service of the government and its policies rather than as advocates of people’s rights.

  17. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  18. Social security in developing countries : some theoretical considerations

    NARCIS (Netherlands)

    Leliveld, A.H.M.

    1991-01-01

    This paper discusses the concept of social security and criticizes the ILO definition of the concept as too limited to analyse non-Western social security systems. It develops an alternative definition which includes, firstly, the protection by society of individuals or social groups against a fall

  19. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the OSTP...

  20. The security analyzer: A security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.

    1986-09-01

    The Security Analyzer is a software tool capable of analyzing the effectiveness of a facility's security system. It is written in the Prolog logic programming computer language, using entity-relationship data modeling techniques. The program performs the following functions: (1) provides descriptive, locational and operational status information about intrusion detectors and assessment devices (i.e., ''sensors'' and ''cameras'') upon request; (2) provides for storage and retrieval of maintenance history information for various components of the security system (including intrusion detectors), and allows for changing that information as desired; (3) provides a ''search'' mode, wherein all paths are found from any specified physical location to another specified location which satisfy user chosen ''intruder detection'' probability and elapsed time criteria (i.e., the program finds the ''weakest paths'' from a security point of view). The first two of these functions can be provided fairly easily with a conventional database program; the third function could be provided using Fortran or some similar language, though with substantial difficulty. In the Security Analyzer program, all these functions are provided in a simple and straight-forward manner. This simplicity is possible because the program is written in the symbolic (as opposed to numeric) processing language Prolog, and because the knowledge base is structured according to entity-relationship modeling principles. Also, the use of Prolog and the entity-relationship modeling technique allows the capabilities of the Security analyzer program, both for knowledge base interrogation and for searching-type operations, to be easily expanded in ways that would be very difficult for a numeric and more algorithmically deterministic language such as Fortran to duplicate. 4 refs

  1. 28 CFR 16.53 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... 1974 § 16.53 Use and collection of social security numbers. Each component shall ensure that employees... privilege as a result of refusing to provide their social security numbers, unless the collection is... provide their social security numbers must be informed of: (1) Whether providing social security numbers...

  2. Reforming the South African social security adjudication system: innovative experiences from South African non-social security jurisdictions

    OpenAIRE

    Nyenti, MAT

    2016-01-01

    There is currently no uniform social security dispute resolution system in South Africa due to the piecemeal fashion in which schemes were established or protection against individual risks regulated. The result is that each statute provides for its own dispute resolution institution(s) and processes. There are also various gaps and challenges in the current social security dispute resolution systems, some of these relating to the uncoordinated and fragmented nature of the system; inaccessibi...

  3. Smoking: Taxing health and social security

    OpenAIRE

    Armour, Brian S.; Pitts, M. Melinda

    2006-01-01

    Cigarette smoking is costly in terms of not only its effects on smokers' health but also the direct and indirect financial costs it imposes on smokers and their families. For instance, premature death caused by smoking may redistribute Social Security income in unexpected ways that affect behavior and reduce the economic well-being of smokers and their dependents. ; This article examines the effects of smoking-attributable mortality on the net marginal Social Security tax rate (NMSSTR)—the di...

  4. Changing principles in European social security

    NARCIS (Netherlands)

    van Oorschot, W.J.H.; Clasen, J.J.

    2002-01-01

    The provision of social security benefits rests on normative principles of social justice. Most strongly manifest in earnings-related social insurance, the principle of reciprocity has been increasingly questioned on grounds of equity, adequacy and fiscal viability, in the wake of socio-economic

  5. 12 CFR 792.68 - Use and collection of Social Security numbers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Use and collection of Social Security numbers... Act § 792.68 Use and collection of Social Security numbers. The head of each NCUA Office shall take... furnish Social Security numbers, and that individuals who are requested to provide Social Security numbers...

  6. Social Protection Schemes in Pakistan: assessment of existing programs

    Directory of Open Access Journals (Sweden)

    Yu ShuHong

    2017-07-01

    Full Text Available Social protection is regarded as a basic human right guaranteed in several International Covenants and Treaties. The Constitution of Pakistan exclusively stipulates the provision of social security for all citizens of the country. The aim of the study is to explore and evaluate the social protection schemes with regards to its coverage, scope and outreach. The country has number of social security schemes that are being carried out by provincial and federal governments for the welfare of workers like old age benefits, disablement, health and medical facilities. However, these schemes have failed to extend their benefits to home based, part-time, temporary or contract and agricultural workers. This paper attempts to highlight the shortcomings of existing social protection programs that are obstructing their benefit distribution and limiting their outreach. It underlines the challenges faced by the implementing agencies. This paper also suggests some improvements in the structural design of social security mechanism with special focus on the scope, coverage, outreach and effective delivery mechanism. Since, the proper allocation of resources and effective implementation of these schemes can ensure the assistance and welfare of the targeted population.

  7. Review of Social Networking Sites' Security and Privacy

    OpenAIRE

    YANG, SHUN

    2015-01-01

    Nowadays social media networking has dramatically increased. Social networking sites like Facebook make users create huge amount of profiles and share personal information within networking of different users. Social networking exposes personal information far beyond the group of friends. And that information or data on social media networking could be potential threat to people's information security and privacy. In this review, we are going to view the privacy risks and security problem...

  8. 38 CFR 3.216 - Mandatory disclosure of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... social security numbers. 3.216 Section 3.216 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Requirements § 3.216 Mandatory disclosure of social security numbers. Any person who applies for or receives..., furnish the Department of Veterans Affairs upon request with his or her social security number and the...

  9. Social Security's Surpluses: An Update.

    Science.gov (United States)

    Dattalo, Patrick

    1992-01-01

    Notes that deliberation over how to manage social security's large trust fund balances is expected to continue. Urges social workers to participate in this debate because surpluses have implications for increasing quality of life of low- and moderate-income families. Continues earlier discussion (Dattalo, 1990) by assessing two recent proposals…

  10. 77 FR 67724 - Rescission of Social Security Acquiescence Ruling 05-1(9)

    Science.gov (United States)

    2012-11-13

    ...-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0058] Rescission of Social Security Acquiescence Ruling 05-1(9) AGENCY: Social Security Administration. [[Page 67725

  11. Mining social networks and security informatics

    CERN Document Server

    Özyer, Tansel; Rokne, Jon; Khoury, Suheil

    2013-01-01

    Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for soci

  12. Vietnam: expanding the social security system.

    Science.gov (United States)

    Pruzin, D

    1996-01-01

    Viet Nam's shift toward a market-oriented economy has been associated with annual gross domestic product growth of more than 8% over the past 5 years. At the same time, the emergence of private-sector enterprises and subsequent closure of many state-run enterprises have had profound implications for Viet Nam's social protection systems. At present, only 5.6 million of the country's 33 million workers are covered under the state-run social insurance system. In 1995, the government moved to include private enterprises with 10 or more employees in its state benefits system. The International Labor Organization (ILO) has been working with the Vietnamese Government to design and implement a social security system that would extend coverage progressively to excluded sectors and provide support to workers who have become unemployed as a result of the economic transition process. At its Eighth National Congress, the Vietnamese Communist Party approved a 5-year social and economic plan calling for such an expansion of the social insurance system as well as for a guaranteed standard of living for pensioners. To facilitate anticipated changes, activities that were previously divided between the Ministry of Labor, Invalids, and Social Affairs and the Vietnam General Confederation of Labor have been assigned to the newly formed Vietnam Social Insurance (VSI) Organization. Under consideration is a plan to combine some VSI activities with those of the Vietnam Health Insurance Organization. The ILO will assist with training, computerization, and social security fund investing. Noncompliance is a major obstacle to planned expansion of the social security system; about 90% of private firms are still not paying into the system.

  13. 20 CFR 422.120 - Earnings reported without a social security number or with an incorrect employee name or social...

    Science.gov (United States)

    2010-04-01

    ... number or with an incorrect employee name or social security number. 422.120 Section 422.120 Employees... reported without a social security number or with an incorrect employee name or social security number. (a... social security number or with a different employee name or social security number than shown in SSA's...

  14. 10 CFR 1008.22 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Use and collection of social security numbers. 1008.22... security numbers. (a) The System Manager of each system of records which utilizes social security numbers... individuals may not be required to furnish social security numbers without statutory authorization, and that...

  15. Social security administration in India- study of provident funds and pension scheme

    OpenAIRE

    Rao, Madhava P

    2005-01-01

    Social Security is becoming a distinct part of social policy of India and the time has come to give a serious thought to ever increasing Social Security needs of the population. There are diversified views on extension of Social Security coverage. Some say it should be limited to only working population and to their families and while others say that the entire population should be covered under Social Security programmes. Social Security schemes further have been branched out as protective...

  16. Theory, Demonstration and Methods: Research on Social Security of Migrant Workers by Domestic Scholar

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker social security, policy defects and equity construction in social security system of migrant workers. Secondly, real studies on social security of migrant workers, including researches on sequence of demand and influencing factors of social security of migrant workers as well as intrinsic motivation forming the perspective on social security. Lastly, road exploration of establishing social security system, including researches on the multi-level development of rural worker social security system, comparison of "Double-low method", "Guangdong Method" and "Shanghai Method" of the social security of migrant workers in Zhejiang Province and establishing multi-level social security system according to the hierarchy after the internal differentiation.

  17. 6 CFR 5.33 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Use and collection of social security numbers. 5... OF RECORDS AND INFORMATION Privacy Act § 5.33 Use and collection of social security numbers. Each... to 1975; and (b) That individuals requested to provide their social security numbers must be informed...

  18. Elements of Social Security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security contains an overview of important benefit schemes in Denmark, Sweden, Finland, Austria, Germany, the Netherlands, Great Britain and Canada. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact on disposable...

  19. Elements of Social Security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security contains an overview of important benefit schemes in Denmark, Sweden, Finland, Germany, the Netherlands, Great Britain and Canada. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact on disposable income...

  20. Elements of Social Security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security contains an overview of important benefit schemes in Denmark, Sweden, Finland, Germany, Great Britain, the Netherlands and Canada. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact on disposable income...

  1. Experience of Social Media, Training and Development on Work Proficiency: A Qualitative Study with Security Personnel

    Science.gov (United States)

    Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea

    2016-01-01

    How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…

  2. Social Security: a financial appraisal for the median voter.

    Science.gov (United States)

    Galasso, V

    Several explanations have been proposed for why voters continue to support unfunded social security systems. Browning (1975) suggests that the extremely large unfunded pension systems of most democracies depend on the existence of a voting majority composed of middle-aged and older people who fail to fully internalize the cost of financing the system. In fact, when voting, economically rational workers consider only their current and future contributions to the system and their expected pension benefits--not their past contributions, which they regard as sunk costs. If, for a majority of voters, the expected continuation return from social security exceeds the return from alternative assets, an unfunded social security system is politically sustainable. This article explores the validity of Browning's proposition by quantifying the returns that U.S. voters in presidential elections from 1964 to 1996 have obtained, or expect to obtain, from Social Security. Did "investments" in Social Security outperform alternative forms of investment, such as mutual funds or pension funds, for a majority of the voters? What can be expected for the future? The U.S. Social Security system redistributes income within age cohorts on the basis of sex, income, and marital status. To account for some of these features, the median voter is represented by a family unit whose members--a husband who accounts for 70 percent of household earnings and a wife who accounts for 30 percent--make joint economic and voting decisions. Thus, retirement and survival benefits paid out to the spouse of an insured worker can be included in the calculation of Social Security returns. Interval estimates of voters' family incomes from the U.S. Census Bureau were used to obtain the median voter's household earnings. The median voter's age is derived from the ages of those who voted in presidential elections, not from the ages of the entire electorate. The median voter's contributions to Social Security are the

  3. Problematising internal security: Crime, community and social exclusion

    Directory of Open Access Journals (Sweden)

    Kari Bruun

    2016-12-01

    Full Text Available This article examines the problematisation of crime, crime prevention and security in contemporary security policy programmes using three Finnish internal security programmes and theory-based content analysis. The study is based on the theory (the perspective of an analytics of government. The findings highlight the central meaning of social exclusion and community as security practices wherein social exclusion is seen as a threat to security and a risk for crime. Indeed, community-based crime prevention plays a central role in the programmes along with the worry about serious crimes and the high level of homicides. A fluid governing policy without crime and accidents is the implicit goal of these programmes.

  4. Social Security and Medicare Benefits

    Data.gov (United States)

    Social Security Administration — Cash benefits and rehabilitation benefits paid in each year from the Old-Age and Survivors Insurance, and Disability Insurance Trust Funds, and benefits paid from...

  5. Secure Execution of Distributed Session Programs

    Directory of Open Access Journals (Sweden)

    Nuno Alves

    2011-10-01

    Full Text Available The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP protocol. The key technical point is the delicate treatment of secure session delegation to counter a previous vulnerability. We find that the modular design of the SJ Runtime, based on the notion of an Abstract Transport for session communication, supports rapid extension to utilise additional transports whilst separating this concern from the application-level session programming task. In the second part of this abstract, we formally prove the target security properties by modelling the extended SJ delegation protocols in the pi-calculus.

  6. Predicting Social Security numbers from public data

    OpenAIRE

    Acquisti, Alessandro; Gross, Ralph

    2009-01-01

    Information about an individual's place and date of birth can be exploited to predict his or her Social Security number (SSN). Using only publicly available information, we observed a correlation between individuals' SSNs and their birth data and found that for younger cohorts the correlation allows statistical inference of private SSNs. The inferences are made possible by the public availability of the Social Security Administration's Death Master File and the widespread accessibility of per...

  7. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  8. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  9. Tax Compliance and Social Security Contributions – The Case Of Slovenia

    Directory of Open Access Journals (Sweden)

    Tomaz LESNIK

    2014-06-01

    Full Text Available In this paper, we will examine the causes behind the higher level of compliance with social security contributions in comparison with other tax categories in the case of Slovenia. The results of econometric models suggest that the activities of the Tax Administration of the Republic of Slovenia, which were more stringently performed in the area of social security contributions in the most recent period, are an important – but not the only factor – behind the higher level of compliance in connection with social security contributions. At the same time, the decrease in tax compliance with other taxes (income tax, corporate income tax, and VAT did not essentially influence the higher level of compliance with social security contributions. The more consistent treatment of unpaid social security contributions as a criminal offence and the higher public awareness about the importance of paying social security contributions in the latest period are recognized as important factors which simultaneously constitute the main difference between social security contributions and other taxes. The higher level of public awareness about the benefits that result from public services financed with taxes is recognized as a possible way to more optimally collect taxes in Slovenia.

  10. 2 CFR 376.147 - Does an exclusion from participation in Federal health care programs under Title XI of the Social...

    Science.gov (United States)

    2010-01-01

    ... Federal health care programs under Title XI of the Social Security Act affect a person's eligibility to..., Medicaid, and other Federal health care programs under Title XI of the Social Security Act, 42 U.S.C. 1320a... Federal Agency Regulations for Grants and Agreements DEPARTMENT OF HEALTH AND HUMAN SERVICES...

  11. Research on Issues concerning Social Security for Migrant Workers in Harmonious Society

    OpenAIRE

    Zhang, Hua

    2013-01-01

    This article analyzes the status quo of social security for migrant workers in China, and points out that there are deep system and concept reasons for the lack of labor rights and interests security, social security, equality and the right to development, political participation channels for the current migrant workers. This article then expounds the adverse effects of lack of social security for migrant workers on building a harmonious society: the lack of social security for migrant worker...

  12. 28 CFR 700.25 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... numbers. (a) Each system manager of a system of records that utilizes Social Security numbers as a method... furnish Social Security numbers without statutory or regulatory authorization and that individuals who are requested to provide Social Security numbers voluntarily must be advised that furnishing the number is not...

  13. 24 CFR 200.6 - Employer identification and social security numbers.

    Science.gov (United States)

    2010-04-01

    ... identification and social security numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of social security numbers and employer identification numbers by applicants and... security numbers. 200.6 Section 200.6 Housing and Urban Development Regulations Relating to Housing and...

  14. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  15. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  16. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  17. Research Advances of Social Security Problems in China —Visualization Research based on Bibliometrics

    Institute of Scientific and Technical Information of China (English)

    赵琳

    2016-01-01

    This article summarized the research progress and characteristics of Chinese social security issues from 2000 papers, which record in CNKI. We find that, the topic in the field of social security is board and dispersion. Due to the huge system and complex problem of social security, there is no central theme. Through cluster analysis, multi dimensional scaling analysis and social network analysis, we got the high frequency keywords atlas. Then, we summarized the research topic to six parts. They are rural social security, urban and rural social security co-ordination, vulnerable group social security, social security fund management, the social insurance system, and social security system and government responsibility. It summed up the theme of the module, meanwhile, combined the practice analysis.

  18. Towards Shibboleth-based security in the e-infrastructure for social sciences

    OpenAIRE

    Jie, Wei; Daw, Michael; Procter, Rob; Voss, Alex

    2007-01-01

    The e-Infrastructure for e-Social Sciences project leverages Grid computing technology to provide an integrated platform which enables social science researchers to securely access a variety of e-Science resources. Security underpins the e-Infrastructure and a security framework with authentication and authorization functionality is a core component of the e-Infrastructure for social sciences. To build the security framework, we adopt Shibboleth as the basic authentication and authorization i...

  19. 76 FR 10262 - Information Security Program

    Science.gov (United States)

    2011-02-24

    ... FEDERAL MARITIME COMMISSION 46 CFR Part 503 [Docket No. 11-01] RIN 3072-AC40 Information Security... (FMC or Commission) amends its regulations relating to its Information Security Program to reflect the changes implemented by Executive Order 13526--Classified National Security Information--that took effect...

  20. The Relationship between Media Consumption and Feeling of Social Security

    OpenAIRE

    Bijan khajeNoori; Mehdi Kaveh

    2013-01-01

    IntroductionThe concept of social security and a Feeling of security and the citizens, as a key element in achieving the projected, is important Sociologists and criminologist shave always paid special attention has been sought. Study of the factors influencing the feeling of security, can increase the feeling of security is work. Also enhance citizens' feeling of security and welfare of the citizens and to accept responsibility and commitment will do. The widespread use of social media in re...

  1. 31 CFR 1.32 - Use and disclosure of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... OF RECORDS Privacy Act § 1.32 Use and disclosure of social security numbers. (a) In general. An... such individual's refusal to disclose his social security number. (b) Exceptions. The provisions of... Federal statute, or (2) The disclosure of a social security number to any Federal, State, or local agency...

  2. 38 CFR 1.575 - Social security numbers in veterans' benefits matters.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Social security numbers... Affairs Records § 1.575 Social security numbers in veterans' benefits matters. (a) Except as provided in... because of refusal to disclose to the Department of Veterans Affairs a social security number. (b) VA...

  3. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.

    Science.gov (United States)

    Wu, Jun; Su, Zhou; Wang, Shen; Li, Jianhua

    2017-07-30

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on "friend" relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  4. 28 CFR 802.23 - Use and disclosure of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... provided by law because of such individual's refusal to disclose his or her social security number. (b... which is required by Federal statute, or (2) The disclosure of a social security number to any Federal... identity of an individual. (c) Requests for disclosure of social security number. If the Agency requests an...

  5. Family conflict, emotional security, and child development: translating research findings into a prevention program for community families.

    Science.gov (United States)

    Cummings, E Mark; Schatz, Julie N

    2012-03-01

    The social problem posed by family conflict to the physical and psychological health and well-being of children, parents, and underlying family relationships is a cause for concern. Inter-parental and parent-child conflict are linked with children's behavioral, emotional, social, academic, and health problems, with children's risk particularly elevated in distressed marriages. Supported by the promise of brief psycho-educational programs (e.g., Halford et al. in Journal of Family Psychology 22:497-505, 2008; Sanders in Journal of Family Psychology 22:506-517, 2008), the present paper presents the development and evaluation of a prevention program for community families with children, concerned with family-wide conflict and relationships, and building on Emotional Security Theory (Davies and Cummings in Psychological Bulletin 116:387-411, 1994). This program uniquely focuses on translating research and theory in this area into brief, engaging programs for community families to improve conflict and emotional security for the sake of the children. Evaluation is based on multi-domain and multi-method assessments of family-wide and child outcomes in the context of a randomized control design. A series of studies are briefly described in the programmatic development of a prevention program for conflict and emotional security for community families, culminating in a program for family-wide conflict and emotional security for families with adolescents. With regard to this ongoing program, evidence is presented at the post-test for improvements in family-wide functioning, consideration of the relative benefits for different groups within the community, and preliminary support for the theoretical bases for program outcomes.

  6. 8 CFR 103.35 - Use and collection of Social Security numbers.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS POWERS AND DUTIES; AVAILABILITY OF RECORDS § 103.35 Use and collection of Social Security numbers. The use and collection of Social Security numbers shall be in accordance with 28 CFR 16.56. [40 FR... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Use and collection of Social Security...

  7. 29 CFR 71.12 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Use and collection of social security numbers. 71.12 Section... UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall provide the...

  8. 7 CFR 772.7 - Leasing minor program loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan security. (a) Eligibility. The Agency may consent to the borrower leasing all or a portion of security...

  9. Social Security Number Replacement Card Applications filed via the Internet

    Data.gov (United States)

    Social Security Administration — The Social Security Administration (SSA) provides a variety of ways to conduct business with the agency. SSA offers members of the public the opportunity to request...

  10. Social Security And Mental Illness: Reducing Disability With Supported Employment

    Science.gov (United States)

    Drake, Robert E.; Skinner, Jonathan S.; Bond, Gary R.; Goldman, Howard H.

    2010-01-01

    Social Security Administration disability programs are expensive, growing, and headed toward bankruptcy. People with psychiatric disabilities now constitute the largest and most rapidly expanding subgroup of program beneficiaries. Evidence-based supported employment is a well-defined, rigorously tested service model that helps people with psychiatric disabilities obtain and succeed in competitive employment. Providing evidence-based supported employment and mental health services to this population could reduce the growing rates of disability and enable those already disabled to contribute positively to the workforce and to their own welfare, at little or no cost (and, depending on assumptions, a possible savings) to the government. PMID:19414885

  11. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    Directory of Open Access Journals (Sweden)

    Jun Wu

    2017-07-01

    Full Text Available Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  12. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    Science.gov (United States)

    Wu, Jun; Su, Zhou; Li, Jianhua

    2017-01-01

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems. PMID:28758943

  13. Financial forecasts accuracy in Brazil's social security system.

    Directory of Open Access Journals (Sweden)

    Carlos Patrick Alves da Silva

    Full Text Available Long-term social security statistical forecasts produced and disseminated by the Brazilian government aim to provide accurate results that would serve as background information for optimal policy decisions. These forecasts are being used as support for the government's proposed pension reform that plans to radically change the Brazilian Constitution insofar as Social Security is concerned. However, the reliability of official results is uncertain since no systematic evaluation of these forecasts has ever been published by the Brazilian government or anyone else. This paper aims to present a study of the accuracy and methodology of the instruments used by the Brazilian government to carry out long-term actuarial forecasts. We base our research on an empirical and probabilistic analysis of the official models. Our empirical analysis shows that the long-term Social Security forecasts are systematically biased in the short term and have significant errors that render them meaningless in the long run. Moreover, the low level of transparency in the methods impaired the replication of results published by the Brazilian Government and the use of outdated data compromises forecast results. In the theoretical analysis, based on a mathematical modeling approach, we discuss the complexity and limitations of the macroeconomic forecast through the computation of confidence intervals. We demonstrate the problems related to error measurement inherent to any forecasting process. We then extend this exercise to the computation of confidence intervals for Social Security forecasts. This mathematical exercise raises questions about the degree of reliability of the Social Security forecasts.

  14. Financial forecasts accuracy in Brazil's social security system.

    Science.gov (United States)

    Silva, Carlos Patrick Alves da; Puty, Claudio Alberto Castelo Branco; Silva, Marcelino Silva da; Carvalho, Solon Venâncio de; Francês, Carlos Renato Lisboa

    2017-01-01

    Long-term social security statistical forecasts produced and disseminated by the Brazilian government aim to provide accurate results that would serve as background information for optimal policy decisions. These forecasts are being used as support for the government's proposed pension reform that plans to radically change the Brazilian Constitution insofar as Social Security is concerned. However, the reliability of official results is uncertain since no systematic evaluation of these forecasts has ever been published by the Brazilian government or anyone else. This paper aims to present a study of the accuracy and methodology of the instruments used by the Brazilian government to carry out long-term actuarial forecasts. We base our research on an empirical and probabilistic analysis of the official models. Our empirical analysis shows that the long-term Social Security forecasts are systematically biased in the short term and have significant errors that render them meaningless in the long run. Moreover, the low level of transparency in the methods impaired the replication of results published by the Brazilian Government and the use of outdated data compromises forecast results. In the theoretical analysis, based on a mathematical modeling approach, we discuss the complexity and limitations of the macroeconomic forecast through the computation of confidence intervals. We demonstrate the problems related to error measurement inherent to any forecasting process. We then extend this exercise to the computation of confidence intervals for Social Security forecasts. This mathematical exercise raises questions about the degree of reliability of the Social Security forecasts.

  15. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  16. Principle Of Non-Regression And Social Security: Security And Trust Protection, Reservation Of The Possible And Non-Regression In The Fundamental Social Rights

    Directory of Open Access Journals (Sweden)

    Rodrigo Garcia Schwarz

    2016-12-01

    Full Text Available This paper aims to explain and analyze, from the perspective of the material and effective dimensions of fundamental social rights, questions that concern the relevance of security and trust for the social pact and, as a consequence, to the non-regression in the fundamental social rights in general and in the social security in particular. It reveals that, while the retrogression is not absolute, retrogression must be fully justified. The research is descriptive and explanatory, documentary-bibliographical.

  17. A Model of Social Security?

    DEFF Research Database (Denmark)

    Rom-Jensen, Byron Zachary

    2017-01-01

    of Scandinavian achievements were variable in their ideological outlook and sometimes deliberately challenged the existence and goals of New Deal policies. Moreover, this essay explores the usage of Scandinavia in New Deal social legislation by examining the policymaking rhetoric of the Social Security Act...... and its 1939 amendments. The surprising plasticity of the Scandinavian image amongst policymakers ultimately reveals the fluid nature of both New Deal-era politics and the Scandinavian images it appropriated....

  18. Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Yilei Wang

    2015-01-01

    Full Text Available With the rapid development of mobile devices and wireless technologies, mobile social networks become increasingly available. People can implement many applications on the basis of mobile social networks. Secure computation, like exchanging information and file sharing, is one of such applications. Fairness in secure computation, which means that either all parties implement the application or none of them does, is deemed as an impossible task in traditional secure computation without mobile social networks. Here we regard the applications in mobile social networks as specific functions and stress on the achievement of fairness on these functions within mobile social networks in the presence of two rational parties. Rational parties value their utilities when they participate in secure computation protocol in mobile social networks. Therefore, we introduce reputation derived from mobile social networks into the utility definition such that rational parties have incentives to implement the applications for a higher utility. To the best of our knowledge, the protocol is the first fair secure computation in mobile social networks. Furthermore, it finishes within constant rounds and allows both parties to know the terminal round.

  19. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    Secure program partitioning has been introduced as a language-based technique to allow the distribution of data and computation across mutualy untrusted hosts, while at the same time guaranteeing the protection of confidential data. Programs that have been annotated with security types......, but the partitioning compiler becomes a part of the network and can recompile applications, thus alowing hosts to enter or leave the framework. We contend that this setting is superior to static partitioning, since it allows redistribution of data and computations. This is especialy beneficial if the new host alows...... data and computations to better fulfil the trust requirements of the users. Erasure Policies ensure that the original host of the redistributed data or computation does not store the data any longer....

  20. THE EVOLUTION AND FUTURE OF SOCIAL SECURITY IN AFRICA: AN ACTUARIAL PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Fatima Badat

    2015-09-01

    Full Text Available Social Security in most African countries has evolved significantly in terms of perspectives, motives, governance as well as innovation of benefits and administration. African countries are slowly, one by one, beginning to reassess the role of social security in correcting several social ills. Empowerment programs and grants are increasingly being provided via social security to women and the youth. From the roots of social security, even very low income countries, some of which have recently experienced several years of civil war and extreme economic hardships, have begun to improve benefit structures and amounts, which include national medical benefits. The attention being provided to social security and how it fits into a nation’s plans to lift itself out of poverty is increasingly involving the actuarial profession from international organisations such as ILO and ISSA as well as consulting actuaries and academics. Assessing and ensuring sustainability of social security benefits requires actuarial valuations to take long-term consequences involving demographic changes into account in the face of providing the benefits in the short term; asset liability modelling to ensure adequate resources are held; ensuring that results are appropriately reported and communicated to key stakeholders; as well as developing long-term strategic plans and dynamic systems surrounding all of these issues. In this paper, the role of actuaries is brought to the centre of the increasingly changing face and evolving culture of social security in taking Africa closer to poverty alleviation. La Seguridad Social en la mayoría de los países africanos ha evolucionado significativamente en cuanto a perspectivas, motivos, gobernanza, así como en innovación en las prestaciones y la adminsitración. Los países africanos están comenzando a reevaluar el papel de la Seguridad Social en la eliminación de determinados problemas sociales. Los programas de acción y los

  1. The effects of a social media policy on pharmacy students' facebook security settings.

    Science.gov (United States)

    Williams, Jennifer; Feild, Carinda; James, Kristina

    2011-11-10

    To examine how students entering a doctor of pharmacy (PharmD) program used Facebook privacy settings before and after the college's social media policy was presented to them. The Facebook profiles of all entering first-year pharmacy students across 4 campuses of a college of pharmacy were evaluated. Ten dichotomous variables of interest were viewed and recorded for each student's Facebook account at 3 time points: before the start of the semester, after presentation of the college's social media policy, and at the end of the semester. Data on whether a profile could be found and what portions of the profile were viewable also were collected. After introduction of the policy, a significant number of students increased their security settings (made information not visible to the public) related to Facebook walls, information pages, and links. Making pharmacy students aware of a college's social media policy had a positive impact on their behaviors regarding online security and privacy.

  2. The Effects of a Social Media Policy on Pharmacy Students’ Facebook Security Settings

    Science.gov (United States)

    Feild, Carinda; James, Kristina

    2011-01-01

    Objective. To examine how students entering a doctor of pharmacy (PharmD) program used Facebook privacy settings before and after the college's social media policy was presented to them. Methods. The Facebook profiles of all entering first-year pharmacy students across 4 campuses of a college of pharmacy were evaluated. Ten dichotomous variables of interest were viewed and recorded for each student's Facebook account at 3 time points: before the start of the semester, after presentation of the college's social media policy, and at the end of the semester. Data on whether a profile could be found and what portions of the profile were viewable also were collected. Results. After introduction of the policy, a significant number of students increased their security settings (made information not visible to the public) related to Facebook walls, information pages, and links. Conclusions. Making pharmacy students aware of a college's social media policy had a positive impact on their behaviors regarding online security and privacy. PMID:22171105

  3. Institutional Root Cause of the Irregularity of Social Security Funds in China

    Institute of Scientific and Technical Information of China (English)

    Bingwen Zheng

    2007-01-01

    This paper analyzes institutional defects in the Chinese social security system, based on irregularities in social security funds revealed in the Audit Report by the China National Audit Office. The author divides the irregularities into five categories according to the nature of fund use. The results show that the institutional root cause of the irregularities lies in the unreasonable design and operation of the social security system, which currently faces management and institutional risks. This paper argues that simple rhetoric about strengthening regulation and supervision cannot help to reduce illegal practices, or to realize risk control. The only solution is to reform the social security system. Specifically, the Chinese Government should regulate the administrative cost of the social security system,and the behavior of its agencies, through legislation, reform the investment regime to increase rate of return of pension assets, and adjust and reshape the existing social security system, so as to elevate its pooling level.

  4. 12 CFR 1204.9 - Does FHFA collect and use Social Security numbers?

    Science.gov (United States)

    2010-01-01

    ... OPERATIONS PRIVACY ACT IMPLEMENTATION § 1204.9 Does FHFA collect and use Social Security numbers? FHFA collects Social Security numbers only when it is necessary and authorized. At least annually, the Privacy... of refusing to provide their Social Security numbers, unless the collection is authorized either by a...

  5. ExpertiSZe, a tool for determining the effects of social security legislation

    NARCIS (Netherlands)

    Svensson, Jorgen S.; Kordelaar, P.J.M.; Kordelaar, P.J.M.; Wassink, J.G.J.; van 't Eind, G.J.; Grütters, C.A.F.M.

    1992-01-01

    Social security legislation plays an important role in the Dutch society. In view of this, the effects of social security legislation have to be analysed carefully before new legislation can be made. Due to the growing complexity of legislation on the social security domain, this analysis has become

  6. The Office of Safeguards and Security Nonproliferation Support Program

    International Nuclear Information System (INIS)

    Desmond, W.J.

    1996-01-01

    The Nonproliferation Support Program was established in the Department of Energy, Office of Safeguards and Security on october 1, 1995. its mission includes providing assistance to Departmental efforts for improved international material protection, control and accounting programs by coordinating and leveraging domestic safeguards and security policy, practice and experience into the international arena. A major objective of the program is to balance US national security requirements with global support of the nonproliferation objectives. This paper describes the organization of the Office of Safeguards and Security and the Nonproliferation Support Program role and responsibility, and presents some of the current areas of program emphasis and activity

  7. On China’s Social Security System and Traditional Chinese Culture

    Institute of Scientific and Technical Information of China (English)

    谢浙

    2017-01-01

    This paper explores the interrelation between China’s social security system and traditional Chinese culture, pointing out the meaning of the study, and that China’s social security system is a carrier and representation of traditional Chinese culture and

  8. A Guanxi Shibboleth based security infrastructure for e-social science

    OpenAIRE

    Jie, Wei; Young, Alistair; Arshad, Junaid; Finch, June; Procter, Rob; Turner, Andy

    2008-01-01

    An e-Social Science infrastructure generally has security requirements to protect their restricted resources or services. As a widely accepted authentication and authorization technology, Shibboleth supports the sharing of resources on interinstitutional federation. Guanxi is an open source implementation of the Shibboleth protocol and architecture. In this paper, we propose a security infrastructure for e-social science based on the Guanxi Shibboleth. This security infrastructure presents tw...

  9. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  10. Theory, Demonstration and Methods Research on Social Security of Migrant Workers by Domestic Scholar

    OpenAIRE

    Yang, Zhen; Wang, Weifang

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker soci...

  11. Social Security Contributions and Return Migration Among Older Male Mexican Immigrants.

    Science.gov (United States)

    Aguila, Emma; Vega, Alma

    2017-06-01

    For decades, scholars have studied the effects of immigration on the U.S. social security system. To date, this research has been primarily limited to migrants within the United States and does not consider those who return to their countries of origin. We estimate the proportion of male Mexican return migrants who contributed to the U.S. social security system and analyze their socioeconomic characteristics and migration histories. We also estimate the proportion that receive or expect to receive U.S. social security benefits. Using probit regression on the 2012 Mexican Health and Aging Study (MHAS), we describe the predictors of having contributed to the U.S. social security system among Mexican males in Mexico aged 50 years and older who at some point lived in the United States. We find that 32% of male return migrants reported having contributed to the U.S. social security system, but only 5% of those who contributed, received or expected to receive benefits. Those who reported having contributed spent more years in the United States and were more likely to be U.S. citizens or legal permanent residents than those who did not contribute. Immigrants often pay Old-Age, Survivors, and Disability Insurance taxes using legitimate or illegitimate social security numbers and return to their home countries without collecting U.S. social security benefits. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  12. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  13. 36 CFR 1202.22 - Will NARA need my Social Security Number?

    Science.gov (United States)

    2010-07-01

    ... Will NARA need my Social Security Number? (a) Before a NARA employee or NARA contractor asks you to provide your social security number (SSN), he or she will ensure that the disclosure is required by... Security Number? 1202.22 Section 1202.22 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS...

  14. Social Security Number Verification Service (SSNVS)

    Data.gov (United States)

    Social Security Administration — SSNVS is a service offered by SSA's Business Services Online (BSO). It is used by employers and certain third-party submitters to verify the accuracy of the names...

  15. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  16. Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

    Science.gov (United States)

    Sammicheli, Michele; Scaglione, Marcella

    2018-01-01

    We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

  17. 20 CFR 422.104 - Who can be assigned a social security number.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Who can be assigned a social security number... General Procedures § 422.104 Who can be assigned a social security number. (a) Persons eligible for SSN assignment. We can assign you a social security number if you meet the evidence requirements in § 422.107 and...

  18. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  19. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  20. Medicare and Social Security: fraud and abuse; civil money penalties for misuse of certain terms, symbols and emblems--HHS. Final rule.

    Science.gov (United States)

    1991-08-28

    This final rule implements section 428(a) of Public Law 100-360 which authorizes the imposition of civil money penalties for the use--in advertising, solicitations or other communications--of certain words, letters, symbols or emblems associated with the Department of Health and Human Services' Social Security and Medicare programs in a manner that the user knows, or should know, would convey a false impression that (1) the communicated item was approved, endorsed or authorized by the Department or its programs, or (2) the responsible person or organization has some connection with, or authorization from, the Department or these programs. This rulemaking is designed to assist in protecting citizens from misrepresentations concerning the services offered and programs administered by the Social Security Administration and the Health Care Financing Administration.

  1. Behavioral analysis of use personal service e-balance Indonesian social security

    Science.gov (United States)

    Wang, Gunawan; Fitriani, Novi; Nurul Fajar, Ahmad

    2017-09-01

    Indonesian Social Security is the one of the government agencies that is trusted to organize social security. With help of Information technology that growing these day, Indonesian Social Security is also developing E-Balance application, where previously all activities for checking balance is done by giving their slip details through the nearest branch to be distributed to each company. So far there is no research that reviewing e-Balance. Hence, the authors is interested to do research related factors that influence the behavior of the use of E-Balance Indonesian Social Security in the Jakarta area and model that can describe those factors Authors distributing questioners to 193 respondents and perform data processing. The result of this study is to know the factors that influence the behavior of use Personal Service E-Balance Indonesian Social Security and model that can describe those factors. The result shows that UTAUT 2 model is not match with this research and need to be enhanced. After enhancement, there are 3 factors that being significant. Such as Behavioral Intention, Effort Expectancy and Social Influence while the others are not supported and need to be customize.

  2. Evaluating pay-as-you-go social security systems

    OpenAIRE

    Bachmann, Andreas; Wüthrich, Kaspar

    2013-01-01

    This paper proposes a new method for welfare analysis of unfunded social security systems. Based on an overlapping generations model with endogenous labor supply, we derive a formula for the evaluation of existing pay-as-you-go social security systems that depends on impulse response functions and projected growth rates only. We propose an implementation strategy based on reduced form estimates of a VAR model that is valid under weak assumptions about the deep structure of the model. Our meth...

  3. Social security in developing countries : operation and dynamics of social security mechanisms in rural Swaziland

    NARCIS (Netherlands)

    Leliveld, A.H.M.

    1994-01-01

    This study, which is based on field research carried out in Swaziland from October 1989 to December 1990, starts with an introductory chapter followed by three theoretical chapters on social security in developing countries. The content of these chapters is illustrated with an extensive case study

  4. Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study

    Science.gov (United States)

    Zhao, Jensen; Zhao, Sherry Y.

    2015-01-01

    While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…

  5. Financial forecasts accuracy in Brazil’s social security system

    Science.gov (United States)

    2017-01-01

    Long-term social security statistical forecasts produced and disseminated by the Brazilian government aim to provide accurate results that would serve as background information for optimal policy decisions. These forecasts are being used as support for the government’s proposed pension reform that plans to radically change the Brazilian Constitution insofar as Social Security is concerned. However, the reliability of official results is uncertain since no systematic evaluation of these forecasts has ever been published by the Brazilian government or anyone else. This paper aims to present a study of the accuracy and methodology of the instruments used by the Brazilian government to carry out long-term actuarial forecasts. We base our research on an empirical and probabilistic analysis of the official models. Our empirical analysis shows that the long-term Social Security forecasts are systematically biased in the short term and have significant errors that render them meaningless in the long run. Moreover, the low level of transparency in the methods impaired the replication of results published by the Brazilian Government and the use of outdated data compromises forecast results. In the theoretical analysis, based on a mathematical modeling approach, we discuss the complexity and limitations of the macroeconomic forecast through the computation of confidence intervals. We demonstrate the problems related to error measurement inherent to any forecasting process. We then extend this exercise to the computation of confidence intervals for Social Security forecasts. This mathematical exercise raises questions about the degree of reliability of the Social Security forecasts. PMID:28859172

  6. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  7. Social security of a business entity: place and role of accounting

    OpenAIRE

    Жиглей, Ірина Вікторівна

    2017-01-01

    Concepts and levels of security on the whole as well as social security' of a business entity in particular have been considered. Factors of social insecurity have been enumerated. Disadvantages of social activity of business entities in Ukraine have been compared with the reflection of this activity in the accounting system.

  8. Effect of social capital on food security among rural farming ...

    African Journals Online (AJOL)

    The study analyzed the effect of social capital on food security of rural farming households in Abia State, Nigeria with specific focus on measuring social capital dimensions among the rural farming households; determining the food security status of the households; analyzing the influence of socioeconomic characteristics of ...

  9. [Evolution of worker's health in the social security medical examination in Brazil].

    Science.gov (United States)

    Pinto Júnior, Afrânio Gomes; Braga, Ana Maria Cheble Bahia; Roselli-Cruz, Amadeu

    2012-10-01

    In order to analyze the practice of the social security medical examination starting from the introduction of the worker's health paradigms, data was gathered on the granting of social security disability benefits to assess worker illness based on notification of work-related accidents in the cement industries of Rio de Janeiro. From 2007 to 2009 there was only one notification, which involved a worker handling toxic waste instead of the energy matrix. However, the analysis revealed sources and mechanisms of illness overlooked in the social security medical examination, which is still focused on the one-cause-only logic of occupational medicine. To achieve the worker's health paradigms, changes are required to alter the way of conducting the social security medical examination, by re-establishing partnerships, training human resources, adopting epidemiological indicators, as well as setting and assessing social security goals that transcend the mere granting of disability benefits.

  10. “Food Security” versus Cash Transfers: Comparative Analysis of Social Security Approaches in India and Brazil

    Directory of Open Access Journals (Sweden)

    Carter Vance

    2018-05-01

    Full Text Available Amongst Global South nations grappling with the problems of both food security and poverty relief, two of the largest are Brazil and India. Though the nations of course differ in a host of socioeconomic, cultural and geopolitical respects, they do face similar problems of sharp income inequality, displacement of rural populations into cities and increasing battles over land and agricultural ownership. At the same time, both countries have had, until recently, a long period of sustained economic growth, as well as centre-left governments (the Workers’ Party in the case of Brazil, the Indian National Congress in the case of India, attempting to spread the benefits of that growth to a wider social strata. The differential approaches that the social security systems in each nation took in attempting to address the problem of food security are, therefore, instructive in understanding how these questions should be approached on a policy level. Though of course constrained in each case by differing economic and political contexts, as well as path dependencies within each country’s existing social protection regime, there are lessons in their successes and failures. Moreover, an approach which would recognize the best aspects of each policy program could be instrumental in designing a food security policy which reconciles institutional and individual problem levels. This paper will examine the political logics which informed both approaches, with an eye to seeing how these were played out in their concrete effects as implemented.

  11. 41 CFR 105-64.105 - When may Social Security Numbers (SSNs) be collected?

    Science.gov (United States)

    2010-07-01

    ...-64.105 When may Social Security Numbers (SSNs) be collected? (a) Statutory or regulatory authority must exist for collecting Social Security Numbers for record systems that use the SSNs as a method of... collect Social Security Numbers. (b) In compliance with OMB M-07-16 (Safeguarding Against and Responding...

  12. Social security status and mortality in Belgian and Spanish male workers

    Directory of Open Access Journals (Sweden)

    Xavier Duran

    2016-07-01

    Conclusion: MRR differences between Belgium and Spain for unemployed workers could be partly explained because of differences between the two social security systems. Future studies should further explore mortality differences between countries with different social security systems.

  13. How strong is the Social Security safety net? Using the Elder Index to assess gaps in economic security.

    Science.gov (United States)

    Mutchler, Jan E; Li, Yang; Xu, Ping

    2018-04-16

    Older Americans rely heavily on Social Security benefits (SSBs) to support independent lifestyles, and many have few or no additional sources of income. We establish the extent to which SSBs adequately support economic security, benchmarked by the Elder Economic Security Standard Index. We document variability across U.S. counties in the adequacy levels of SSBs among older adults. We find that the average SSBs fall short of what is required for economic security in every county in the United States, but the level of shortfall varies considerably by location. Policy implications relating to strengthening Social Security and other forms of retirement income are discussed.

  14. Using the social security system to deliver housing policy

    OpenAIRE

    Cheung, Louise, Gee Wing

    2016-01-01

    This thesis examines the interaction between housing policy and the social security benefits that support housing costs. Analysis concerns the extent and type of State intervention in housing, thus explaining the dynamic between State and individual responsibility in housing policy. This thesis involves an exploration of the different treatment of the owner-occupied and the rented housing sectors, with reference to the social security benefits which fund ongoing housing costs. This thesis see...

  15. Security and trust in online social networks

    CERN Document Server

    Carminati, Barbara; Viviani, Marco; Viviani, Marco; Carminati, Barbara

    2013-01-01

    The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to thei

  16. Legal aspects of Polish Tax and Social Security in Agriculture

    Directory of Open Access Journals (Sweden)

    Agnieszka Parlińska

    2008-12-01

    Full Text Available In the paper are describing legal aspects of treatment of farming sector in the tax and social security system in Poland. Tax System in Polish Agriculture is an integral part of Polish Tax System. Most taxes paid by farmers are property taxes, which supplied the budget of main local authority in Poland (municipality. In some cases farmers pay also personal income tax and value added tax like those, who run specific agricultural production as well individual farmers who operate through a limited liability company are subject to corporate income tax. The social security fund for farmers (known as KRUS was speared in 1990 from the social security system (ZUS. Farmers receive similar benefits with regard to health care, education, and social welfare although the contributions into the farmers system are lower then under the ZUS system.

  17. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  18. 24 CFR 5.216 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... Social Security and Employer Identification Numbers. 5.216 Section 5.216 Housing and Urban Development...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security Numbers and...

  19. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  20. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  1. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  2. The Mexican Social Security counterreform: pensions for profit.

    Science.gov (United States)

    Laurell, A C

    1999-01-01

    The social security counterreform, initiated in 1997, forms part of the neoliberal reorganization of Mexican society. The reform implies a profound change in the guiding principles of social security, as the public model based on integrality, solidarity, and redistribution is replaced by a model based on private administration of funds and services, individualization of entitlement, and reduction of rights. Its economic purpose is to move social services and benefits into the direct sphere of private capital accumulation. Although these changes will involve the whole social security system--old-age and disability pensions, health care, child care, and workers' compensation--they are most immediately evident in the pension scheme. The pay-as-you-go scheme is being replaced by privately managed individual retirement accounts which especially favor the big financial groups. These groups are gaining control over huge amounts of capital, are authorized to charge a high commission, and run no financial risks. The privatization of the system requires decisive state intervention with a legal change and a sizable state subsidy (1 to 1.5 percent of GNP) over five decades. The supposed positive impact on economic growth and employment is uncertain. A review of the new law and of the estimates of future annuities reveals shrinking pension coverage and inadequate incomes from pensions.

  3. Social Security reform: evaluating current proposals. Latest results of the EBRI-SSASIM2 policy simulation model.

    Science.gov (United States)

    Copeland, C; VanDerhei, J; Salisbury, D L

    1999-06-01

    The present Social Security program has been shown to be financially unsustainable in the future without modification to the current program. The purpose of this Issue Brief, EBRI's fourth in a series on Social Security reform, is threefold: to illustrate new features of the EBRI-SSASIM2 policy simulation model not available in earlier EBRI publications, to expand quantitative analysis to specific proposals, and to evaluate the uncertainty involved in proposals that rely on equity investment. This analysis compares the Gregg/Breaux-Kolbe/Stenholm (GB-KS) and Moynihan/Kerrey proposals with three generic or "traditional" reforms: increasing taxes, reducing benefits, and/or increasing the retirement age. Both proposals would create individual accounts by "carving out" funds from current Social Security payroll taxes. This analysis also examines other proposed changes that would "add on" to existing Social Security funds through the use of general revenue transfers and/or investment in the equities market. President Clinton has proposed a general revenue transfer and the collective investment of some of the OASDI trust fund assets in equities. Reps. Archer and Shaw have proposed a general revenue tax credit to establish individual accounts that would be invested partially in the equities markets. When comparing Social Security reform proposals that would specifically alter benefit levels, the Moynihan/Kerrey bill compares quite favorably with the other proposals in both benefit levels and payback ratios, when individuals elect to use the individual account option. In contrast, the GB-KS bills do not compare quite as favorably for their benefit levels, but do compare favorably in terms of payback ratios. An important comparison in these bills is the administrative costs of managing the individual accounts, since benefits can be lowered by up to 23 percent when going from the assumed low to high administrative costs. Moreover, allowing individuals to decide whether to

  4. Commission on Social Security

    CERN Multimedia

    Staff Association

    2010-01-01

    A commission studying past, present, and future social stakes ! For many years we have been hearing about the problems of funding of health insurance benefits in our different Member States. At CERN we are not totally immune from this problem.  To start with, let us recall that we have a mutual-benefit scheme which covers everyone for the consequences of the uncertainties in life (illness and accidents). The rules of our scheme are established by CERN in the framework of a sub-group of the Standing Concertation Committee, the CERN Health Insurance Scheme Board (CHISB), which is also in charge of managing the scheme.  The work of the “ProtSoc” (Protection SocialeSocial Security) commission, as we like to call it at the Staff Association, is to help your representatives on the CHISB, by preparing together with them the subjects and positions to be put forward and defended. This commission, which groups together the staff delegates who wish to invest their ...

  5. Econometric modeling of the balance of social security Brazil

    OpenAIRE

    Isaac Figueiredo de Sousa

    2009-01-01

    This work aims to build models using econometrics techniques to explain the components of the balance of Social Security System, or in other words, the net value of tax revenues and the benefit values of the General Regime of Social Security. These models were subjected to statistic validations indicated in the theoretical reference of econometrics, to apply the method of ordinary least square from the classic model of linear regression. From an increasing longevity and the gradual decr...

  6. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  7. Department of Energy security program needs effective information systems

    International Nuclear Information System (INIS)

    1991-10-01

    Although security is an important, nearly billion-dollar-a-year function in the Department of Energy (DOE), key information systems that hold important data about security weaknesses and incidents have limited analytical capabilities and contain unreliable information. The resultant difficulty in identifying patterns and trends reduces managers' ability to ensure the effectiveness of the security program. Resources are also wasted because DOE has deployed incompatible systems that are unable to electronically share or transfer data, often forcing employees to manually re-enter data that are already stored in computers elsewhere. Finally, continuing data problems with other important security information systems, such as those used to track security clearances and classified documents, indicate that information system deficiencies are extensive. A major reason for these problems is that DOE has not done a comprehensive, strategic assessment of its information and information technology needs of the security program. DOE's efforts are fragmented because it has not assigned to any organization the leadership responsibility to determine security information needs and to plan and manage security information resources Department-wide. This paper reports that a number of changes are needed to correct these problems and take advantage of information technology to help strengthen the security program

  8. 24 CFR 242.68 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... Social Security and Employer Identification Numbers. 242.68 Section 242.68 Housing and Urban Development... Requirements § 242.68 Disclosure and verification of Social Security and Employer Identification Numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of Social Security Numbers...

  9. Applying the National Industrial Security Program (NISP) in the laboratory environment

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1995-01-01

    With continuing changes in the world safeguards and security environment the effectiveness of many laboratory operations depends on correctly assessing the risk to its programs and developing protection technologies, research and concepts of operations being employed by the scientific community. This paper explores the opportunities afforded by the National Industrial Security Program (NISP) to uniformly and simply protect Laboratory security assets, sensitive and classified information and matter, during all aspects of a laboratory program. The developments in information systems, program security, physical security and access controls suggest an industrial security approach. This paper's overall objective is to indicate that the Laboratory environment is particularly well suited to take advantage being pursued by NISP and the performance objectives of the new DOE orders

  10. Interrelations between Energy Security Economics and Social Cohesion: Analysis of a Lithuanian Case

    Directory of Open Access Journals (Sweden)

    Dainius Genys

    2015-12-01

    Full Text Available Growing attention to sustainable development in academic discourse fosters discussions on how energy security affects society. In most cases the discussions consider the political and economic consequences, which affect or may affect the society. The aim of the article is to assess the impact of energy security economics on social cohesion in Lithuania. To achieve this aim the interrelations between energy security, energy economics and social cohesion are discussed. The theoretical framework of social cohesion (introduced by J. Jenson and P. Bernard is presented and applied in empirical analysis. The operationalization of empirical variables is based on economic, political and socio-cultural - activity areas, which are analyzed to verify the dichotomies between public attitudes and the actual behavior of society. These dichotomies help to distinguish six analytical dimensions, on the basis of which we created 17 empirical indicators, which analysis allows for describing the impact of Lithuanian energy security economics on social cohesion in quantitative data. The statistical analyses showed that the impact of attitudinal dimensions of energy security economics on social cohesion in Lithuania has an almost neutral effect: 3.05 (1-very negative; 3-neutral, 5-very positive. Whereas, the impact of behavioural dimensions of energy security economics on social cohesion has a negative effect: 2.47. The aggregated average of the overall impact of energy security economics on social cohesion in Lithuania has a negative effect: 2.76.

  11. Social Security Reform

    National Research Council Canada - National Science Library

    Nuschler, Dawn

    2005-01-01

    .... In recent years, reform ideas have ranged from relatively minor changes to the current pay-as-you-go social insurance system to a redesigned program based on personal savings and investments modeled after IRAs and 401(k...

  12. The Impact of Emotional Social Support on Elders' Food Security

    Directory of Open Access Journals (Sweden)

    Jennifer Woltil

    2012-10-01

    Full Text Available Food insecurity persists as a social problem in the U.S., putting its victims at risk of poor nutritional and overall health. Being food insecure is defined as the limited or uncertain availability of nutritionally safe foods or the inability to access such foods in socially acceptable ways. Food insecurity research tends to focus on younger populations, particularly households with children. Food insecurity among the elderly is, therefore, poorly understood, both in prevalence and in prevention and intervention methods. Addressing this gap, the present study examined the relationships between emotional social support and food security using data from the 2007-08 National Health and Nutrition Examination Survey in an effort to further the understanding of food insecurity among elders. Specifically, the effects of an emotional social support presence, number of support sources and types of support sources on food security were observed using OLS linear regression. Results indicated that emotional social support alleviated the risk of food insecurity, even when household income, marital/partnership status and health status were controlled for. However, the source of the support mattered: elders who reported a spouse as the primary source of support were more likely to report being food secure, while those who reported an “other” primary source of support were more likely to report being food insecure. Number of support sources were not significantly related to food security.

  13. Hardware-Assisted System for Program Execution Security of SOC

    Directory of Open Access Journals (Sweden)

    Wang Xiang

    2016-01-01

    Full Text Available With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus. In addition, with the rapid growth in the number of embedded systems and wide application, followed embedded hardware attacks are also increasing. This paper presents a new hardware assisted security mechanism to protect the program’s code and data, monitoring its normal execution. The mechanism mainly monitors three types of information: the start/end address of the program of basic blocks; the lightweight hash value in basic blocks and address of the next basic block. These parameters are extracted through additional tools running on PC. The information will be stored in the security module. During normal program execution, the security module is designed to compare the real-time state of program with the information in the security module. If abnormal, it will trigger the appropriate security response, suspend the program and jump to the specified location. The module has been tested and validated on the SOPC with OR1200 processor. The experimental analysis shows that the proposed mechanism can defence a wide range of common software and physical attacks with low performance penalties and minimal overheads.

  14. 12 CFR 404.21 - Submission of social security and passport numbers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Submission of social security and passport numbers. 404.21 Section 404.21 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Access to Records Under the Privacy Act of 1974 § 404.21 Submission of social security and...

  15. Social Security and the Retirement and Savings Behavior of Low Income Households1

    Science.gov (United States)

    van der Klaauw, Wilbert; Wolpin, Kenneth I.

    2011-01-01

    In this paper, we develop and estimate a model of retirement and savings incorporating limited borrowing, stochastic wage offers, health status and survival, social security benefits, Medicare and employer provided health insurance coverage, and intentional bequests. The model is estimated on sample of relatively poor households from the first three waves of the Health and Retirement Study (HRS), for whom we would expect social security income to be of particular importance. The estimated model is used to simulate the responses to changes in social security rules, including changes in benefit levels, in the payroll tax, in the social security earnings tax and in early and normal retirement ages. Welfare and budget consequences are estimated. PMID:21566719

  16. Symmetry in Social Construction during ERP Implementation: A Systems Security Perspective

    Directory of Open Access Journals (Sweden)

    Kennedy Njenga

    2014-03-01

    Full Text Available The principle of symmetry in enterprise resource planning (ERP systems implementation holds that the researcher should deploy impartial explanation in cases of success as in cases of failure. This article examines the symmetry intrinsic in social construction within the various stages of the ERP development life cycle, from initiation to implementation. Discourse on symmetry focuses on whether social constructs are able to influence ERP implementation positively (success or negatively (failure and whether this exposes ERP systems to information security risk. The theoretical lens of social construction of technology (SCOT theory, a theory premised on social interaction between agents and technology artefacts, is applied for this purpose. The research was quantitative with a survey having been conducted on information technology (IT and information security (IS practitioners. Results of the study highlight the significant role social construction plays because of the direct linkage it has with the implementation of information security controls in ERP systems.  The research delineated five social constructs, namely positional influence, reward influence, coercive influence, expert influence and referent influence. For purposes of this research and on the sampling criteria applied, the construct ‘expert influence’, a typology of social construction, is shown to be more domineering than other typologies of social construction and is seen as providing symmetrical balance between governing ERP security (success and risk (failure. Implications of these results for theory and practice are discussed in the main article.

  17. A flexible framework for secure and efficient program obfuscation.

    Energy Technology Data Exchange (ETDEWEB)

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  18. Implementation of Learning Organization Components in Ardabil Social Security Hospital

    OpenAIRE

    Azadeh Zirak

    2015-01-01

    This study aimed to investigate the implementation of learning organization characteristics based on Marquardt systematic model in Ardabil Social Security Hospital. The statistical population of this research was 234 male and female employees of Ardabil Social Security Hospital. For data collection, Marquardt questionnaire was used in the present study which its validity and reliability had been confirmed. Statistical analysis of hypotheses based on independent samples t-test showed that lear...

  19. Rural social security for Zimbabwe: Challenges and opportunities for ...

    African Journals Online (AJOL)

    For them, the remaining sources of livelihood now reside in non-formal social security arrangements anchored upon a staggering cultural base being eroded by the fast encroaching tide of neoliberal individualistic ways of life. Regrettably, government has got no institutional framework to promote non-formal security ...

  20. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  1. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  2. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  3. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  4. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  5. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  6. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  7. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  8. 78 FR 59706 - Secure Supply Chain Pilot Program; Correction

    Science.gov (United States)

    2013-09-27

    ...] Secure Supply Chain Pilot Program; Correction AGENCY: Food and Drug Administration, HHS. ACTION: Notice... Federal Register of August 20, 2013 (78 FR 51192). The document announced the start of the Secure Supply Chain Pilot Program (SSCPP). The document was published with an incorrect email address for the SSCPP...

  9. Social Security Numbers in Medicaid Records: Reporting and Validity, 2009

    OpenAIRE

    John L. Czajka; Shinu Verghese

    2013-01-01

    This report presents findings from a validation study of Social Security numbers (SSNs) in Medicaid Statistical Information System (MSIS) records for the fourth quarter of federal fiscal year 2009. The study produced results for the nation and the states on how often SSNs were reported in MSIS records and how often the reported SSNs passed a validation test at the U.S. Census Bureau, based on data obtained from the Social Security Administration.

  10. Social networking mining, visualization, and security

    CERN Document Server

    Dehuri, Satchidananda; Wang, Gi-Nam

    2014-01-01

    With the proliferation of social media and on-line communities in networked world a large gamut of data has been collected and stored in databases. The rate at which such data is stored is growing at a phenomenal rate and pushing the classical methods of data analysis to their limits. This book presents an integrated framework of recent empirical and theoretical research on social network analysis based on a wide range of techniques from various disciplines like data mining, social sciences, mathematics, statistics, physics, network science, machine learning with visualization techniques, and security. The book illustrates the potential of multi-disciplinary techniques in various real life problems and intends to motivate researchers in social network analysis to design more effective tools by integrating swarm intelligence and data mining.  

  11. Cohort profile: the Spanish WORKing life Social Security (WORKss) cohort study.

    Science.gov (United States)

    López Gómez, María Andrée; Durán, Xavier; Zaballa, Elena; Sanchez-Niubo, Albert; Delclos, George L; Benavides, Fernando G

    2016-03-07

    The global economy is changing the labour market and social protection systems in Europe. The effect of both changes on health needs to be monitored in view of an ageing population and the resulting increase in prevalence of chronic health conditions. The Spanish WORKing life Social Security (WORKss) cohort study provides unique longitudinal data to study the impact of labour trajectories and employment conditions on health, in terms of sickness absence, permanent disability and death. The WORKss cohort originated from the Continuous Working Life Sample (CWLS) generated by the General Directorate for the Organization of the Social Security in Spain. The CWLS contains a 4% representative sample of all individuals in contact with the Social Security system. The WORKss cohort exclusively includes individuals with a labour trajectory from 1981 or later. In 2004, the cohort was initiated with 1,022 ,79 Social Security members: 840,770 (82.2%) contributors and 182,009 (17.8%) beneficiaries aged 16 and older. The WORKss cohort includes demographic characteristics, chronological data about employment history, retirement, permanent disability and death. These data make possible the measurement of incidence of permanent disability, the number of potential years of working life lost, and the number of contracts and inactive periods with the Social Security system. The WORKss cohort was linked to temporary sickness absence registries to study medical diagnoses that lead to permanent disability and consequently to an earlier exit from the labour market in unhealthy conditions. Thanks to its administrative source, the WORKss cohort study will continue follow-up in the coming years, keeping the representativeness of the Spanish population affiliated to the Social Security system. The linkage between the WORKss cohort and temporary sickness absence registries is envisioned to continue. Future plans include the linkage of the cohort with mortality registries. Published by the BMJ

  12. Social Security for Composers and Free Lances.

    Science.gov (United States)

    Rossel-Majdan, Karl

    1982-01-01

    Internationally, cultural policies are tending toward increased socioeconomic and legal support for creative artists. Austrian cultural policies which encourage art and cultural professional organizations, increased copyright protection, and greater social security for free-lance artists are discussed. (AM)

  13. Use of computer programs to evaluate effectiveness of security systems

    International Nuclear Information System (INIS)

    Harris, L. Jr.; Goldman, L.A.; Mc Daniel, T.L.

    1987-01-01

    Thirty or more computer programs for security vulnerability analysis were developed from 1975 through 1980. Most of these programs are intended for evaluating security system effectiveness against outsider threats, but at least six programs are primarily oriented to insider threats. Some strengths and weaknesses of these programs are described. Six of these programs, four for outsider threats and two for insider threats, have been revised and adapted for use with IBM personal computers. The vulnerability analysis process is discussed with emphasis on data collection. The difference between design data and operational data is described. For performance-type operational data, such as detection probabilities and barrier delay times, the difference between unstressed and stressed performance data is discussed. Stressed performance data correspond to situations where an adversary attempts to weaken a security system by mitigating certain security measures. Suggestions are made on the combined use of manual analysis and computer analysis

  14. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  15. Review on Cyber Security Programs for NPP Application

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Eung Se [KEPRI, Daejeon (Korea, Republic of)

    2010-10-15

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS; CFR; RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  16. Review on Cyber Security Programs for NPP Application

    International Nuclear Information System (INIS)

    Oh, Eung Se

    2010-01-01

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS] [CFR] [RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  17. Inner Security in Media from the perspective of social science and media studies

    Directory of Open Access Journals (Sweden)

    Oliver Bidlo

    2012-07-01

    Full Text Available Security and entertainment are moving closer together. The term Securitainment expresses in this context, the mediation of security through entertainment formats. This will open a new space for Internal Security, which includes its own actors and patterns of interpretation. This space is portrayed in the media and follows the logic of media for attention but is also part of the process of social control. The mass media are therefore an instance of the design of internal security, social control and an interpretation producer. Mass media become actors of the internal security. They provide a symbolic representation of security.

  18. 77 FR 54646 - Social Security Acquiescence Ruling (AR) 12-1(8); Correction; Petersen v. Astrue, 633 F.3d 633...

    Science.gov (United States)

    2012-09-05

    ... II of the Social Security Act AGENCY: Social Security Administration. ACTION: Notice of Social Security Acquiescence Ruling; Correction. SUMMARY: The Social Security Administration published a document... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR...

  19. DATA Act File C Award Financial - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File C. File C includes the agency award information from the financial accounting system at...

  20. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  1. Security Measures in Automated Assessment System for Programming Courses

    Directory of Open Access Journals (Sweden)

    Jana Šťastná

    2015-12-01

    Full Text Available A desirable characteristic of programming code assessment is to provide the learner the most appropriate information regarding the code functionality as well as a chance to improve. This can be hardly achieved in case the number of learners is high (500 or more. In this paper we address the problem of risky code testing and availability of an assessment platform Arena, dealing with potential security risks when providing an automated assessment for a large set of source code. Looking at students’ programs as if they were potentially malicious inspired us to investigate separated execution environments, used by security experts for secure software analysis. The results also show that availability issues of our assessment platform can be conveniently resolved with task queues. A special attention is paid to Docker, a virtual container ensuring no risky code can affect the assessment system security. The assessment platform Arena enables to regularly, effectively and securely assess students' source code in various programming courses. In addition to that it is a motivating factor and helps students to engage in the educational process.

  2. Social Security Contribution to Productivity and Wages in Labour Organization Perspective

    Science.gov (United States)

    Supriadi, Y. N.

    2017-03-01

    This research is investigating the discrepancy fulfilment of the right to social security and decent wages to increase labour productivity in the perspective of labour organizations, in which the company provides social security, and wages have not been able to meet the needs of workers, on the other hand, the workers are always required to increase productivity. Therefore, this study aims to identify the social security and wages that affect labour productivity. So this research will provide input to the company to undertake effective measures and efficient for the company’s sustainability. This research was conducted using a survey method approach and quantitative data analysis techniques that are causal comparative sample of 223 respondents from 504 study population includes all labour organization’s District and municipal in Banten Province. The results showed the significant influence of social security and wages to increase labour productivity. Therefore, companies are required to act strategically in maintaining prohibitionists labour through re-design of the work environment, increase workers’ participation, intervention, and satisfy the needs of workers whose impact will be realized understanding between workers and companies in maintaining the company’s business.

  3. Effects of a community health promotion program on social factors in a vulnerable older adult population residing in social housing.

    Science.gov (United States)

    Agarwal, Gina; Brydges, Madison

    2018-04-16

    Supporting older adults' health and wellbeing in the community is an important policy goal that can be supported by health promotion. Despite widespread acceptance of the biopsychosocial model of health and its relation to health, many health promotion programs fail to realize this model in program design. Further, there is limited evidence to support program design targeting social determinants of health such as social isolation or connectedness. To fill this gap, we aimed to understand older adult's experiences participating in cardiovascular health promotion program in a subsidized residential building to capture unintended 'spin-off' psychosocial effects. This study took a constructivist, ethnographic approach utilizing participant observation and semi-structured interviews with participants of the program to understand participant's lived experiences of a health promotion program. In total, we conducted eighty hours of field work and fifteen semi-structured interviews with participants of the program. Thematic analysis was used to analyze the data. Four themes emerged. First, the health promotion program filled a perceived gap caused by a constrained and impersonal health care system. Secondly, the program connected older adults with resources and provided regular and secure access to health information and support. Third, for some residents, the program facilitated social relationships between older adults, leaving participants feeling more socially connected to other residents. Lastly, a paradox of loneliness emerged where older adults talked openly about feelings of loneliness, however not in relation to themselves, but rather regarding their peers. Psychosocial aspects of health, such as loneliness, social connectedness, and social support may be of equal value as the physical health benefits to the older adults who participate in health promotion programs. Incorporating these elements into programming is a complex goal, and the complexity of targeting

  4. Poverty, Security and Social Assistance: Challenges of Brazilian Social Policy

    Directory of Open Access Journals (Sweden)

    Ana Paula Ornellas Mauriel

    2010-01-01

    Full Text Available This article presents partial results of a study about anti-poverty programs in Brazil. The main contribution of the text is that it relates certain characteristics of the anti poverty programs to theoretical categories that have influenced the debate about social policy in the contemporary context. Special attention is given to the relation of these programs with national social assistance policy. The article begins from the hypothesis that the logic that had inspired the construction of social policies was reconsidered, based on a transformation in the theoretical understanding of the social issue and of ways to confront it. This change appears in the texts in the priority given to poverty as a category of analysis, which is understood as an absence of capacities. This theoretically and methodologically configures an individualistic perspective on social issues, the principal theoretical source for which is the thinking of Amartya Sen.

  5. SOCIAL CAPITAL AS THE BASIS FOR THE FORMATION OF SOCIO-ECONOMIC SECURITY IN RURAL AREAS

    Directory of Open Access Journals (Sweden)

    Andrii Sukhostavets

    2017-09-01

    Full Text Available Social capital is the basis for the definition of the future concept of rural areas management. Therefore, one of the most important tasks is to determine the various factors of existence, development, and formation of social capital. One of these factors is the security of rural areas and the definition of how social capital affects it. The analysis of the available scientific works in various areas reveals the lack of consensus in the definition of the category “socio-economic security of rural areas”. This is due to the fact that the definition of social and economic security of rural areas is identified with such concepts as the ability to provide resistance to various internal and external environmental influences. The purpose of the study is to determine the nature of social capital, as well as to study its impact on the socio-economic security of the state. The methodology of the research is based on the monographic method, the method of dialectic cognition, the scenario methods used to find the optimal scenario implementation option; SWOT-analysis is used to assess the positive or negative impact of social capital on the socio-economic security of rural areas. Understanding the essence of socio-economic security has led to the conclusion that it consists of economic, social, environmental and other types of security. The term “social security” in the understanding of researchers usually has two interpretations: traditional (absence of threats to the society and alternative (absence of threats from the society. It is proved that the social security of the region should be focused on ensuring primarily human rights and freedoms, namely, personal, political, social, economic, cultural, environmental, and family ones. Social and economic security should also provide social standards and guarantees, as well as norms. The economic basis of the security of rural areas is manifested in the development of market relations, infrastructure

  6. A Game-Theoretical Approach to Multimedia Social Networks Security

    Science.gov (United States)

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226

  7. Comparison of the Efficiency of Budget Financing and the Social Security of a Region

    Directory of Open Access Journals (Sweden)

    Aleksandr Anatolyevich Kuklin

    2016-09-01

    Full Text Available In the article, the theoretical and economic aspects of the category “security” are considered, the distinction between philosophical and socio-economic approaches to the understanding of social security is drawn. From the point of view of the system approach, the place of social security for national security protection is determined. The theoretical content of the category “social security” is shown; in the authors’ treatment, the specifying concepts such as “social risks”, “danger”, “threat” are given. For the purpose of risks identification (deviations and the revealing of the factors of inefficient financing, the methodological tools for the assessment of the social security of a region are proposed. These tools are based on the integrated assessment of the regional socio-economic indexes and the indexes assessing the budgetary financing of the territory. The methodical approach offered by the authors is based on the detection of dependencies between the social and financial security of a region. As estimates, the indicators reflecting the level of social security in the territory of residence are chosen: income, expenses of the consolidated budget of a region, growth rate of gross regional product, rate of natural population growth, level of unemployment, population share with the income below living level. This approach is approved on the example of Perm Krai and Sverdlovsk region; the regularities, the favourable and adverse periods for social security of the region are revealed. The received estimates are ranged depending on a temporary log of growth (fall, elasticity and sensitivity to the budget financing. The results of the assessment have shown that, from the point of view of social security protection, Perm Krai has entered a stage of deep recession, which started in 2012. Similar tendencies are observed in the Sverdlovsk region. Nevertheless, considering both a visible variety and the dominating influence of

  8. Financial Hardship Before and After Social Security's Early Eligibility Age

    OpenAIRE

    Richard W. Johnson; Gordon B.T. Mermin

    2009-01-01

    Although poverty rates for Americans ages 65 and older have plunged over the past half century, many people continue to fall into poverty in their late fifties and early sixties. This study examines financial hardship rates in the years before qualifying for Social Security retirement benefits at age 62 and investigates how the availability of Social Security improves economic well-being at later ages. The analysis follows a sample of adults from the 1937-39 birth cohort for 14 years, trackin...

  9. Populous, Precarious – Protected? The Paradox of Social Security for South Asian Agricultural Workers

    NARCIS (Netherlands)

    K.A. Siegmann (Karin Astrid)

    2012-01-01

    textabstractAbstract Social security is firmly rising on the international agenda. Discourses that depart from the assumption that societies can only afford a certain level of social expenditure give way to a recognition that social security is an important investment in development. New

  10. Social Protection and Economic Security of North African Migrant Workers in France

    Directory of Open Access Journals (Sweden)

    CLAUDIA PARASCHIVESCU

    2013-05-01

    Full Text Available This essay describes and analyses the situation of Maghrebis in France, as far as social security is concerned. The paradoxical situation experienced by these immigrants is related to their eligibility for social security and their discrimination on the labour market. As such, Maghrebis form the precarious layer of French society.

  11. Evaluation of a Secure Laptop-Based Testing Program in an Undergraduate Nursing Program: Students' Perspective.

    Science.gov (United States)

    Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan

    2016-01-01

    Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.

  12. The Approaches to Narrowing Urban-Rural Income Gap——From the Perspective of Rural Social Security

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    From the situations about the incomes and life quality of the urban and rural residents,the thesis briefly introduces the status quo of the urban-rural income gap and explores the impact of the income gap on social economy:firstly,it hampers economic development;secondly,it is detrimental to the social development.Then the thesis analyzes the role of a sound social security in narrowing urban-rural income gap:at first,it broadens the institutional environment of improving the agricultural efficiency;secondly,it eliminates the uncertainties influencing the farmers’ income;thirdly,it improves the farmers’ capacity to increase income;at last,it enhances the farmers’ consciousness of wealth.Next the thesis inquires into the problems existing in the system of rural social security:the first problem is more obviously fragmented system;the second is inadequate security projects and narrower coverage;the third is an obvious lack of equality in urban and rural security;the fourth is even less sound management system;the last is the lagging of legislation.Afterwards the thesis proposes the countermeasures and suggestions to improve the system of rural social security and narrow urban-rural income gap:firstly,to integrate the social security system in rural areas;secondly,to perfect security projects and enhance the security system;thirdly,to integrate the administrative management of social security;at last,to enforce the legal system.

  13. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Science.gov (United States)

    2010-04-01

    ... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  14. Identifying the Enemy: Social Categorization and National Security Policy

    Science.gov (United States)

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  15. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases......, small modification of the security requirement might lead to substantial changes in a number of modules within a large mobile distributed system. Indeed, security is a crosscutting concern which can spread to many business modules within a system, and is difficult to be integrated in a modular way....... This dissertation explores the principles of adding challenging security policies to existing systems with great flexibility and modularity. The policies concerned cover both classical access control and explicit information flow policies. We built our solution by combining aspect-oriented programming techniques...

  16. New government to make social security cutbacks

    NARCIS (Netherlands)

    Grünell, M.

    2003-01-01

    In May 2003, a new coalition government of the Christian Democrats and two liberal parties, VVD and D66, took office in the Netherlands. The parties' coalition agreement provides for major cutbacks in public spending, largely targeted on social security expenditure. The trade unions are fiercely

  17. SOCIAL SECURITY OF TURKISH ATHLETES

    Directory of Open Access Journals (Sweden)

    Barış ÖZTUNA

    2015-07-01

    Full Text Available Law No. 5510 realized within the social security reform aims providing a structure which presents equal scope and quality of social security service other all citizens. According to Labor Law No 4857, unionization of sportsmen in Turkish legal environment is possible, sport clubs and sportsmen are continuing to live without so many rights and obligations but they didn’t. Aim of this study; to prove sportsmen of location of the labour law and to mark off. The purpose of the study is explained according to Law No. 4857 and Law No. 5510 Turkish athletes. Profesional athletes deemed to be insurance holders for the purposes of implementing short and long term insurance branches of No 5510 Law. But amateur athletes don't seem to be insurance holders for the purposes of implementing short and long term insurance branches of No 5510 Law. According to the law 5774 regarding to be called as an g overnment athlete, within the adults category of the sports that are accepted as olympic, paralympic and deaflympic; pension is paid to the amateur athletes who became first, second or third at Olymic games, World or European Champions as an individual or team sports and to the national team coaches and assistant coaches of the athletes’ who became Olympic or World Champion as a team.

  18. How portable is social security for migrant workers? : A review of the literature

    NARCIS (Netherlands)

    N. Taha (Nurulsyahirah); M. Messkoub (Mahmood); K.A. Siegmann (Karin Astrid)

    2013-01-01

    textabstractThis paper reviews the literature on the portability of social security entitlements for migrant workers, who moved along North-North, South- North, and South-South migration flows. Portability of social security entitlements is the ability of migrant workers to preserve, maintain, and

  19. Reforming the South African Social Security Adjudication System ...

    African Journals Online (AJOL)

    Reforming the South African Social Security Adjudication System: innovative experiences ... Dispute resolution systems in the labour relations, business competition ... the rights of access to justice, to a fair trial and to just administrative action).

  20. LANL Safeguards and Security Assurance Program. Revision 6

    International Nuclear Information System (INIS)

    1995-01-01

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms

  1. Audit program for physical security systems at nuclear power plants

    International Nuclear Information System (INIS)

    Minichino, C.

    1982-01-01

    Licensees of nuclear power plants conduct audits of their physical security systems to meet the requirements of 10 CFR 73, Physical Protection of Plants and Materials. Section 73.55, Requirements for physical Protection of Licensed Activities in Nuclear Power Reactors Against Radiological Sabotage, requires that the security programs be reviewed at least every 12 months, that the audit be conducted by individuals independent of both security management and security supervision, and that the audit program review all aspects of the physical security system: hardware, personnel, and operational and maintenance procedures. This report contains information for the Nuclear Regulatory Commission (NRC) and for the licensees of nuclear power reactors who carry out these comprehensive audits. Guidance on the overall management of the audit function includes organizational structure and issues concerning the auditors who perform the review: qualifications, independence, due professional care, and standards. Guidance in the audit program includes purpose and scope of the audit, planning, techniques, post-audit procedures, reporting, and follow-up

  2. Supporting secure programming in web applications through interactive static analysis.

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  3. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  4. Ensuring Secure Non-interference of Programs by Game Semantics

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    Non-interference is a security property which states that improper information leakages due to direct and indirect flows have not occurred through executing programs. In this paper we investigate a game semantics based formulation of non-interference that allows to perform a security analysis...... of closed and open procedural programs. We show that such formulation is amenable to automated verification techniques. The practicality of this method is illustrated by several examples, which also emphasize its advantage compared to known operational methods for reasoning about open programs....

  5. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  6. Unmasking the social engineer the human element of security

    CERN Document Server

    Hadnagy, Christopher

    2014-01-01

    Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the c

  7. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  8. Macroeconomic Implications of Changes in Social Security Rules

    Directory of Open Access Journals (Sweden)

    Bilal Bagis

    2017-02-01

    Full Text Available The Turkish social insurance system has been feverishly debated for years, particularly through its burden on the economy. The most recent reform is an attempt to neutralize the deterioration within the social security system and its effects on the economy. After the recent reform, ‘the way that retirement benefits are calculated’ is changed unfavorably for workers and the minimum age for retirement is increased. In particular, for an agent with 25 years of social security tax payments, the replacement rate is down from 65 percent to 50 percent. On the other hand, retirement age is up from 60 to 65. The aim of this paper is to investigate the macroeconomic effects of these changes using an OLG model. The author’s findings indicate that labor supply, output and capital stock increase when changes above are applied to the benchmark economy calibrated to the Turkish economy data in 2005. A critical change with the current reform is that the marginal benefit of working has become uniform over ages. In a simulation exercise, the marginal retirement benefit in the benchmark economy is changed to be uniform over ages while keeping the size of social security system unchanged. As a result, the benefit of retiring at a later period increases. However, uniform distribution of the marginal benefits itself decreases both the capital stock and output of the economy. Increasing the retirement age, on the other hand, has positive effects on the economy since agents obtain retirement benefits for fewer years and at an older age. Age increase has substantial positive effects on the labor supply, the capital stock, and the output.

  9. Supplemental security income and social security disability insurance coverage among long-term childhood cancer survivors.

    Science.gov (United States)

    Kirchhoff, Anne C; Parsons, Helen M; Kuhlthau, Karen A; Leisenring, Wendy; Donelan, Karen; Warner, Echo L; Armstrong, Gregory T; Robison, Leslie L; Oeffinger, Kevin C; Park, Elyse R

    2015-06-01

    Supplemental security income (SSI) and social security disability insurance (DI) are federal programs that provide disability benefits. We report on SSI/DI enrollment in a random sample of adult, long-term survivors of childhood cancer (n = 698) vs a comparison group without cancer (n = 210) from the Childhood Cancer Survivor Study who completed a health insurance survey. A total of 13.5% and 10.0% of survivors had ever been enrolled on SSI or DI, respectively, compared with 2.6% and 5.4% of the comparison group. Cranial radiation doses of 25 Gy or more were associated with a higher risk of current SSI (relative risk [RR] = 3.93, 95% confidence interval [CI] = 2.05 to 7.56) and DI (RR = 3.65, 95% CI = 1.65 to 8.06) enrollment. Survivors with severe/life-threatening conditions were more often enrolled on SSI (RR = 3.77, 95% CI = 2.04 to 6.96) and DI (RR = 2.73, 95% CI = 1.45 to 5.14) compared with those with mild/moderate or no health conditions. Further research is needed on disability-related financial challenges after childhood cancer. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  10. User Interface Program for secure electronic tags

    International Nuclear Information System (INIS)

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US

  11. Personal circumstances and social characteristics as determinants of landholder participation in biodiversity conservation programs.

    Science.gov (United States)

    Moon, Katie; Marshall, Nadine; Cocklin, Chris

    2012-12-30

    Adequate conservation of biodiversity on private land remains elusive due, in part, to a failure to understand the personal circumstances and social characteristics of private landholders. Our aim was to identify those personal and social dimensions of landholders that might contribute to improved conservation policy and program design and, thereby, participation in private land conservation. We tested whether personal circumstances of landholders (e.g., lifestyle and wellbeing, information and knowledge, financial security) and social characteristics (e.g., attitudes, norms, and trust) would be important predictors of landholders' capacity and willingness to participate in biodiversity conservation programs. Forty-five participants and twenty-nine non-participants of biodiversity conservation programs in north Queensland, Australia, were surveyed to: 1) examine differences between their personal circumstances and social characteristics that may influence participation; and 2) explore whether personal circumstances and social characteristics were influenced by participation. The results revealed that, compared to participants, non-participants in conservation programs had significantly different personal circumstances and social characteristics for four of eight measured variables. Compared to participants, non-participants demonstrated a reduced capacity and willingness to participate in conservation programs. Participation did not appear to have a strong influence on participants' personal circumstances or social characteristics, and when social norms supported conservation, programs did not demonstrate additionality. Conservation policies that maintain or improve landholders' personal circumstances and that promote pro-environmental norms may result in increased participation and thereby conservation outcomes. Copyright © 2012 Elsevier Ltd. All rights reserved.

  12. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  13. Distinguishing Between Private Law and Social-Security Law in ...

    African Journals Online (AJOL)

    This article attempts to highlight the potential danger in applying private-law principles to social-security law in deciding whether or not social grants should be deducted from awards for damages. Typically, this issue comes to the fore where a damage-causing event, such as death, sets into motion a system that provides for ...

  14. 24 CFR 5.218 - Penalties for failing to disclose and verify Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... and verify Social Security and Employer Identification Numbers. 5.218 Section 5.218 Housing and Urban... REQUIREMENTS; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security...

  15. Social connectedness is associated with food security among peri-urban Peruvian Amazonian communities.

    Science.gov (United States)

    Lee, Gwenyth O; Surkan, Pamela J; Zelner, Jon; Paredes Olórtegui, Maribel; Peñataro Yori, Pablo; Ambikapathi, Ramya; Caulfield, Laura E; Gilman, Robert H; Kosek, Margaret N

    2018-04-01

    Food insecurity is a major global public health issue. Social capital has been identified as central to maintaining food security across a wide range of low- and middle-income country contexts, but few studies have examined this relationship through sociocentric network analysis. We investigated relationships between household- and community-level social connectedness, household food security, and household income; and tested the hypothesis that social connectedness modified the relationship between income and food security. A cross-sectional census with an embedded questionnaire to capture social relationships was conducted among eleven peri-urban communities. Community connectedness was related to study outcomes of food security and per-capita income through regression models. Of 1520 households identified, 1383 were interviewed (91.0%) and 1272 (83.9%) provided complete data. Households in the youngest communities had the most total contacts, and the highest proportion of contacts outside of the community. Household income was also associated with more outside-community contacts (0.05 more contacts per standard deviation increase in income, psecure households reported more contacts nearby (0.24 increase in household food insecurity access scale (HFIAS) for each additional contact, psecurity (-0.92 decrease in HFIAS for each one-unit increase in community mean degree, p=0.008). There was no evidence that social connectedness modified the relationship between income and food security such that lower-income households benefited more from community membership than higher-income households. Although households reported networks that spanned rural villages and urban centers, contacts within the community, with whom food was regularly shared, were most important to maintaining food security. Interventions that build within-community connectedness in peri-urban settings may increase food security.

  16. Construction Strategies of Social Security System for Wan-jiang Urban Belt’s Migrant Workers

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Theoretical debate and practice exploration on social security of migrant workers were introduced.The political direction and security layer on social security for migrant workers in Wan-jiang urban belt were analyzed:the first layer is to implement wage payment guarantee and employment injury insurance;the second layer is to emphasize serious disease insurance and endowment insurance;the third layer is unemployed insurance and social assistance.The primary strategy of building a social security system for migrant workers in Wan-jiang urban belt was put up:wage payment guarantee system that is united in certain regions should be promoted;employment injury insurance system that is undertaken by enterprises should be built;a social health care system for serious diseases should be set up;multi-layers endowment insurance system for migrant workers should be created;vocational training and training in how to start a business should be built as well as the unemployment insurance system;social assistant system based on the basic cost of living allowances should be set up.

  17. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  18. Supporting secure programming in web applications through interactive static analysis

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2013-01-01

    Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  19. Supporting secure programming in web applications through interactive static analysis

    Directory of Open Access Journals (Sweden)

    Jun Zhu

    2014-07-01

    Full Text Available Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  20. "Business Continuity and Information Security Maintenance" Masters’ Training Program

    OpenAIRE

    Miloslavskaya , Natalia; Senatorov , Mikhail; Tolstoy , Alexandr; Zapechnikov , Sergei

    2013-01-01

    Part 1: WISE 8; International audience; The experience of preparing for the "Business Continuity and Information Security Maintenance" (BC&ISM) Masters’ program implementation and realization at the "Information Security of Banking Systems" Department of the National Research Nuclear University MEPhI (NRNU MEPhI, Moscow, Russia) is presented. Justification of the educational direction choice for BC&ISM professionals is given. The model of IS Master being trained on this program is described. ...

  1. 75 FR 64389 - Proposed Recommendation to the Social Security Administration for Occupational Information System...

    Science.gov (United States)

    2010-10-19

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0066] Proposed Recommendation to the Social Security Administration for Occupational Information System (OIS) Development Planning; Request for Comment...) to provide independent advice and recommendations on plans and activities to create an occupational...

  2. Psychological factors of the readiness of teachers to ensure social security in the educational environment.

    Directory of Open Access Journals (Sweden)

    Shmeleva E.A.

    2015-03-01

    Full Text Available The negative sociocultural transformations that are taking place in modern society and the resulting psychological transformation of personality and mode of life strongly require searching for ways of providing social safety to the next generation, with teachers being the implementers of this process. Teachers’ professionalism is determined by their willingness to solve personal and socially relevant problems, including the willingness to provide social security for other people, to thwart social risks, and to build constructive interpersonal relationships. The aim of our research was to reveal and to analyze the psychological factors affecting the readiness of teachers to ensure social security in educational environments. The environmental factors of social risk have been theoretically characterized. It has been shown that the essential factor in ensuring students’ social security is providing a safe social environment in educational institutions; such an environment provides the learners and the teachers with sociopsychological security and psychosocial well-being. The empirical part of our study was devoted to identifying negative social phenomena in the schools in the Ivanovo region (with the help of a questionnaire administered to 700 students and to identifying the personally and professionally important qualities of the teachers and the subjective psychological factors of their readiness to ensure social security in the educational environment (through interviewing 300 teachers; the administration of the questionnaires and the interviewing were followed by an assessment of their significance (with the help of a questionnaire administered to 140 teachers. Using factor analysis we identified the relevant indicators and grouped them into six factors of the readiness of teachers to ensure a safe educational environment. Relevant personal and professional qualities of teachers were revealed; these are the subjective factors of the

  3. 20 CFR 404.1402 - When are railroad industry services by a non-vested worker covered under Social Security?

    Science.gov (United States)

    2010-04-01

    ...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...

  4. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  5. Elements of Social Security in 6 European Countries

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security in 6 European Countries contains an overview of important benefit schemes in Denmark, Sweden, Finland, Germany, Great Britain and the Nether-lands. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact...

  6. Hygiene and Industrial Security Program: General aspects

    International Nuclear Information System (INIS)

    1988-01-01

    This Venezuelan standard establishes the aspects that must be included in the elaboration and monitoring of an Hygiene and Industrial Security Program (Prevention of Accidents and Occupational Diseases Program). It is applicable to any type of exploitation company, or any kind of task (in nature or importance) where people work, no matter the number workers [es

  7. Breach of Personal Security through Applicative use of Online Social Networks

    Directory of Open Access Journals (Sweden)

    Bojan Nikolovski

    2013-11-01

    Full Text Available Throughout this article there is an attempt to indicate the threats of potential to breach of personal security through applicative use of internet as well as applicative use of online social networks. In addition to many other ways of privacy protection applicative users of social network’s sites must take into considerations the risk of distributing private data. Through a series of actions and settings users can customize the security settings with the ultimate goal of reducing the risk of attack on their privacy.

  8. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  9. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  10. Return to work after renal transplantation: a study of the Brazilian Public Social Security System.

    Science.gov (United States)

    Messias, Alexandre Augusto; Reichelt, Angela J; Dos Santos, Edson F; Albuquerque, Galton C; Kramer, José S P; Hirakata, Vania N; Garcia, Valter D

    2014-12-15

    Return to work is an objective parameter used worldwide to evaluate the success of organ transplantation and is especially feasible after renal transplantation. This study sought to describe the frequency of return to work after renal transplantation and related characteristics. Retrospective cohort of 511 isolated kidney transplant recipients was recruited from a Brazilian referral center from January 2005 to December 2009; all were matched to the public social security database to determine inclusion and benefit awards, as well as the rate of resumption of contributions to the public social security system, a surrogate marker of work rehabilitation. Characteristics associated with work return were analyzed. No social security records were found for 28 subjects. The remaining 483 subjects had a mean age of 45±13 years; 62% were male; 401 (83%) received some public social security benefit; 298 were paying dues and could, therefore, receive temporary or permanent disability benefits. Of these, 78 subjects made social security payments after transplantation, resulting in a work return rate of 26% (95% confidence interval, 21-32). Younger age, living donor graft, and chronic glomerulonephritis were significantly associated with return to work. In Brazil, most renal transplant recipients are on social security benefits, but only a small proportion return to work after surgery. Clinical characteristics may help define work resumption trends.

  11. Lifetime distributional effects of Social Security retirement benefits.

    Science.gov (United States)

    Smith, Karen; Toder, Eric; Iams, Howard

    This article presents three measures of the distribution of actual and projected net benefits (benefits minus payroll taxes) from Social Security's Old-Age and Survivors Insurance (OASI) for people born between 1931 and 1960. The results are based on simulations with the Social Security Administration's Model of Income in the Near Term (MINT), which projects retirement income through 2020. The base sample for MINT is the U.S. Census Bureau's Survey of Income and Program Participation panels for 1990 to 1993, matched with Social Security administrative records. The study population is grouped into 5-year birth cohorts and then ranked by economic status in three ways. First, the population is divided into five groups on the basis of individual lifetime covered earnings, and their lifetime present values of OASI benefits received and payroll taxes paid are calculated. By this measure, OASI provides much higher benefits to the lowest quintile of earners than to other groups, but it becomes less redistributive toward lower earners in more recent birth cohorts. Second, people are ranked by shared lifetime covered earnings, and the values of shared benefits received and payroll taxes paid are computed. Individuals are assumed to split covered earnings, benefits, and payroll taxes with their spouses in the years they are married. By the shared covered earnings measure, OASI is still much more favorable to persons in the lower income quintiles, although to a lesser degree than when people are ranked by individual covered earnings. OASI becomes more progressive among recent cohorts, even as net lifetime benefits decline for the entire population. Finally, individuals are ranked on the basis of their shared permanent income from age 62, when they become eligible for early retirement benefits, until death. Their annual Social Security benefits are compared with the benefits they would have received if they had saved their payroll taxes in individual accounts and used the

  12. 42 CFR 401.130 - Materials available at social security district offices and branch offices.

    Science.gov (United States)

    2010-10-01

    ... (HIM-10). (13) Home Health Agency Manual (HIM-11). (14) Outpatient Physical Therapy Provider Manual... social security district offices and branch offices: (1) Claims Manual of the Social Security Administration. (2) Department Staff Manual on Organization, Department of Health and Human Services, Part F, CMS...

  13. Child poverty vs Medicare and Social Security.

    Science.gov (United States)

    Waldman, H B

    1997-01-01

    The series of government safety net programs provides economic security primarily to older populations. In this period of competition for limited federal resources, the need to create a public awareness of the continuing and growing poverty of children is emphasized.

  14. Does Social Security Affect Retirement and Labor Supply? Using the Chilean Experience as an Experiment

    OpenAIRE

    Rodrigo Cerda

    2002-01-01

    The paper explores the effects of the social security system over retirement and labor supply decision of individuals aged 55 to 65 in Chile. We use the 1998 CASEN survey elaborated by the Chilean government. Due to regulations established by the current social security law, two social security systems coexist on 1998: the .Pay-as-you-go. and the individual account system. This property of the dataset, allows us to disentangle the effects of those two systems over retirement and labor supply....

  15. 78 FR 70244 - Electronic Interim Assistance Reimbursement Program

    Science.gov (United States)

    2013-11-25

    ..., Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: Background To be... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2011-0104] RIN 0960-AH45 Electronic Interim Assistance Reimbursement Program AGENCY: Social Security Administration. ACTION: Notice of...

  16. I and C security program for nuclear facilities: implementation guide - TAFICS/IG/2

    International Nuclear Information System (INIS)

    2016-04-01

    This is the second in a series of documents being developed by TAFICS for protecting computer-based I and C systems of Indian nuclear facilities from cyber attacks. The document provides guidance to nuclear facility management to establish, implement and maintain a robust I and C security program - consisting of security plan and a set of security controls. In order to provide a firm basis for the security program, the document also identifies the fundamental security principles and foundational security requirements related to computer-based I and C systems of nuclear facilities. It is recommended that all applicable Indian nuclear facilities should implement the security program - with required adaptation - so as to provide the necessary assurance that the I and C systems are adequately protected against cyber attacks. (author)

  17. National Pending of Social Security Hearing Requests by Format

    Data.gov (United States)

    Social Security Administration — Report refers to the National total of cases pending at the hearing level and the number and percentages of those cases that were in either electronic format (EF) or...

  18. A real social position of ethnic minorities in the area of medical care and social security

    Directory of Open Access Journals (Sweden)

    Nagradić Slobodan

    2016-01-01

    Full Text Available This work contains research of the position of ethnic minorities in two important existential areas such are medical care and social security. The author puts under a critical analyze not only semantics of the ideas and phrases of medical care and, especially, social security themselves, believing that their inaccurate meaning and usage hide more than they expose facts and relations according to which it is possible to detect and describe a real position of ethnic minorities in the post-dayton society of Bosnia and Herzegovina, but also the experience of implementation of rules from those areas, which should enable them to use the rights defined. Of course, his attention is specially focused on members of Roma ethnic minority, for which he claims to be the most sensible, and that their members, unlike members of all the other ethnic minorities in BiH, are most, or more precisely, only discriminated a-pro-pos the protection of their rights in the areas of medical care and social security, which is not only a responsibility of institutions that provide services in the mentioned areas of life. By using a method of analysis of contents of legal (constitutions, laws, conventions, charters, resolutions, sublegal acts and political (reports, evaluations, analyses, strategies, action plans etc. documents, and by analyzing real life features, processes, relations and events in contemporary BiH society, the author came to sociologically relevant insights of real social and legally-political positions of ethnic minorities in BiH, a state and courses in the areas of medical care and social security and clearly formulated a conclusion that members of ethnic minority determined collectivities, apart from Roma, are in no way ancillary positioned compared to members of constitutional people of post-dayton BiH.

  19. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  20. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    Science.gov (United States)

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  1. 77 FR 51842 - Social Security Acquiescence Ruling (AR) 12-X(8); Petersen v. Astrue, 633 F.3d 633 (8th Cir. 2011...

    Science.gov (United States)

    2012-08-27

    ..., 1-800-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR... Social Security Act AGENCY: Social Security Administration. ACTION: Notice of Social Security...

  2. Social Security and Saving: A Time-Series Econometrics Pedagogical Example (With "R" Code)

    Science.gov (United States)

    Wassell, Charles S., Jr.

    2018-01-01

    In 1974, and then again in 1996, Martin Feldstein published studies of the impact of the Social Security system on private saving in the U.S. economy. He found that Social Security depressed personal saving by a substantial amount--up to 50 percent. The author uses the Feldstein data and empirical models in this article to illustrate the steps in…

  3. Effects of macroeconomic trends on social security spending due to sickness and disability.

    Science.gov (United States)

    Khan, Jahangir; Gerdtham, Ulf-G; Jansson, Bjarne

    2004-11-01

    We analyzed the relationship between macroeconomic conditions, measured as unemployment rate and social security spending, from 4 social security schemes and total spending due to sickness and disability. We obtained aggregated panel data from 13 Organization for Economic Cooperation and Development member countries for 1980-1996. We used regression analysis and fixed effect models to examine spending on sickness benefits, disability pensions, occupational-injury benefits, survivor's pensions, and total spending. A decline in unemployment increased sickness benefits spending and reduced disability pension spending. These effects reversed direction after 4 years of unemployment. Inclusion of mortality rate as an additional variable in the analysis did not affect the findings. Macroeconomic conditions influence some reimbursements from social security schemes but not total spending.

  4. 38 CFR 3.201 - Exchange of evidence; Social Security and Department of Veterans Affairs.

    Science.gov (United States)

    2010-07-01

    ... Compensation Evidence Requirements § 3.201 Exchange of evidence; Social Security and Department of Veterans... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Exchange of evidence; Social Security and Department of Veterans Affairs. 3.201 Section 3.201 Pensions, Bonuses, and Veterans...

  5. Nuclear regulation. NRC's security clearance program can be strengthened

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Kruslicky, Mary Ann; Bagnulo, John E.

    1988-12-01

    Because of the national security implications of its programs, the Nuclear Regulatory Commission (NRC) investigates the background of its employees and consultants as well as others to ensure that they are reliable and trustworthy. If the investigation indicates that an employee will not endanger national security, NRC grants a security clearance that allows access to classified information, material, and facilities. NRC also requires periodic checks for some clearance holders to ensure their continued clearance eligibility. The Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, asked GAO to review NRC's personnel security clearance program and assess the procedures that NRC uses to ensure that those who operate nuclear power plants do not pose a threat to the public. The Atomic Energy Act of 1954 requires NRC to conduct background investigations of its employees and consultants as well as others who have access to classified information, material, or facilities. To do this, NRC established a personnel security clearance program. Under NRC policies, a security clearance is granted after the Office of Personnel Management (OPM) or the Federal Bureau of Investigation checks the background of those applying for an NRC clearance. NRC also periodically reassesses the integrity of those holding the highest level clearance. NRC employees, consultants, contractors, and licensees as well as other federal employees hold approximately 10,600 NRC clearances. NRC does not grant clearances to commercial nuclear utility employees unless they require access to classified information or special nuclear material. However, the utilities have voluntarily established screening programs to ensure that their employees do not pose a threat to nuclear plants. NRC faces a dilemma when it hires new employees. Although its policy calls for new hires to be cleared before they start work, the security clearance process takes so long

  6. Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

    Directory of Open Access Journals (Sweden)

    Qinlong Huang

    2017-01-01

    Full Text Available Mobile healthcare social networks (MHSN integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.

  7. Social security status and mortality in Belgian and Spanish male workers.

    Science.gov (United States)

    Duran, Xavier; Vanroelen, Christophe; Deboosere, Patrick; Benavides, Fernando G

    2016-01-01

    To assess differences in mortality rates between social security statuses in two independent samples of Belgian and Spanish male workers. Study of two retrospective cohorts (Belgium, n=23,607; Spain, n=44,385) of 50-60 year old male employees with 4 years of follow-up. Mortality rate ratios (MRR) were estimated using Poisson regression models. Mortality for subjects with permanent disability was higher than for the employed, for both Belgium [MRR=4.56 (95% CI: 2.88-7.21)] and Spain [MRR=7.15 (95% CI: 5.37-9.51)]. For the unemployed/early retirees, mortality was higher in Spain [MRR=1.64 (95% CI: 1.24-2.17)] than in Belgium [MRR=0.88 (95% CI: 0.46-1.71)]. MRR differences between Belgium and Spain for unemployed workers could be partly explained because of differences between the two social security systems. Future studies should further explore mortality differences between countries with different social security systems. Copyright © 2016 SESPAS. Published by Elsevier Espana. All rights reserved.

  8. 22 CFR 308.7 - Use of social security account number in records systems. [Reserved

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Use of social security account number in records systems. [Reserved] 308.7 Section 308.7 Foreign Relations PEACE CORPS IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 308.7 Use of social security account number in records systems. [Reserved] ...

  9. 48 CFR 1552.224-70 - Social security numbers of consultants and certain sole proprietors and Privacy Act statement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Social security numbers of... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.224-70 Social security numbers of consultants and... provision in all solicitations. Social Security Numbers of Consultants and Certain Sole Proprietors and...

  10. 20 CFR 220.37 - When a child's disability determination is governed by the regulations of the Social Security...

    Science.gov (United States)

    2010-04-01

    ...) Inclusion as a disabled child in the employee's annuity rate under the social security overall minimum. (2... governed by the regulations of the Social Security Administration. 220.37 Section 220.37 Employees... Disability Determinations Governed by the Regulations of the Social Security Administration § 220.37 When a...

  11. Family medicine and practice in the Mexican Social Security Institute

    Directory of Open Access Journals (Sweden)

    Donovan Casas Patiño

    2014-06-01

    Full Text Available The central ideas of this research paper are related to the practice of family medicine as a specialty. It focuses in its origins, problems, unique characteristics, limitations, scope, management, and processes within the context of primary care of the Mexican Social Security System. This approach was based on a qualitative, hermeneutical study closely related to the Structural Functionalism Theory. Within this framework, medical practice is seen as an equation: Meaning = action + function/structure. This offers an approach to the understanding of reality through surveys and observations in five categories: identity, activity, purpose, values/norms, and power/relationship. The practice of family medicine is defined as a medical act in the Mexican Social Security Institute. This act is limited to a brief encounter and a prescription, which makes it a short, fleeting, medicalized interaction. The result is a negative social imaginary of the physician, the patient and the whole of society. Thus, individuals and society host a negative social imaginary bestowed on doctors and users of the health system.

  12. Stochastic Actuarial Modelling of a Defined-Benefit Social Security Pension Scheme: An Analytical Approach

    OpenAIRE

    Iyer, Subramaniam

    2017-01-01

    Among the systems in place in different countries for the protection of the population against the long-term contingencies of old-age (or retirement), disability and death (or survivorship), defined-benefit social security pension schemes, i.e. social insurance pension schemes, by far predominate, despite the recent trend towards defined-contribution arrangements in social security reforms. Actuarial valuations of these schemes, unlike other branches of insurance, continue to be carried out a...

  13. Case Study: Creation of a Degree Program in Computer Security. White Paper.

    Science.gov (United States)

    Belon, Barbara; Wright, Marie

    This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…

  14. Report: EPA’s National Security Information Program Could Be Improved

    Science.gov (United States)

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  15. Social Protection for Enhanced Food Security in Sub-Saharan Africa

    OpenAIRE

    Stephen Devereux

    2012-01-01

    This paper identifies several positive synergies between social protection programmes and food security outcomes. One function of social protection is to manage and reduce vulnerability, and several instruments are reviewed – weather-indexed insurance, public works programmes, emergency food aid and buffer stock management – which all contribute to stabilising income and access to food across good and bad years, or between the harvest and the hungry season. Other social protection instruments...

  16. Dreams that do not come true: Re-addressing social security to expand old-age social protection : The case of informal workers in El Salvador

    NARCIS (Netherlands)

    N.E.A. Joya (Nancy)

    2007-01-01

    textabstractThis paper focuses on old-age income security, with the objective to explore obstacles and opportunities to expand social protection for informal workers in El Salvador. It first introduces the main concepts and debates on social security, social protection, coverage and informality, to

  17. Social Security and Pensions in Lebanon: A Non-Contributory ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    UPGRADING LEBANON’ S ECONOMIC ANALYTICAL CAPACITY PROJECT 105541

    analysis of the need for pension reform and a public financial perspective on pension reform, and a proposal for ... Elderly people, who are seventy and above today, will not benefit from ..... component of existing Lebanese social security cost.

  18. SOSYAL GÜVENLİK SİSTEMİ AÇISINDAN GÜVENCELİ ESNEKLİK (FLEXICURITY IN TERMS OF SOCIAL SECURITY SYSTEM

    Directory of Open Access Journals (Sweden)

    Duygu Demirsat KÖLEOĞLU

    2012-01-01

    Full Text Available Flexicurity is a fact that synchronically interests and impresses employee and employer. Flexicurity fact becomes concrete with some genuine provisions. This provision is appropriate law framework, active labour market policies, lifelong learning and social security system. In this study, it is aimed to analyze flexicurity fact in the context of social security systems. In this reasons, income security and combination security are explicated through social security systems.

  19. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  20. 78 FR 9987 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-02-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...

  1. 78 FR 22361 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-04-15

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...

  2. 33 CFR 101.125 - Approved Alternative Security Programs.

    Science.gov (United States)

    2010-07-01

    ... 106 of this subchapter, as applicable: (a) American Gaming Association Alternative Security Program..., and Towboats and Barges, dated September 24, 2003. (c) Passenger Vessel Association Industry Standards...

  3. The 2012 Recommendation concerning national floors of social protection (No. 202) : The human rights approach to social security in ILO wrapping paper

    NARCIS (Netherlands)

    Vonk, Gijsbert

    2013-01-01

    The International Labour Organisation (ILO) has a long tradition of developing minimum social security standards. However, the value of these instruments is increasingly criticised. A central point in this criticism is that the standards are not based upon the notion of a right to social security

  4. Analysis and monitoring of energy security and prediction of indicator values using conventional non-linear mathematical programming

    Directory of Open Access Journals (Sweden)

    Elena Vital'evna Bykova

    2011-09-01

    Full Text Available This paper describes the concept of energy security and a system of indicators for its monitoring. The indicator system includes more than 40 parameters that reflect the structure and state of fuel and energy complex sectors (fuel, electricity and heat & power, as well as takes into account economic, environmental and social aspects. A brief description of the structure of the computer system to monitor and analyze energy security is given. The complex contains informational, analytical and calculation modules, provides applications for forecasting and modeling energy scenarios, modeling threats and determining levels of energy security. Its application to predict the values of the indicators and methods developed for it are described. This paper presents a method developed by conventional nonlinear mathematical programming needed to address several problems of energy and, in particular, the prediction problem of the security. An example of its use and implementation of this method in the application, "Prognosis", is also given.

  5. Approaches for building community participation: A qualitative case study of Canadian food security programs.

    Science.gov (United States)

    Hyett, Nerida; Kenny, Amanda; Dickson-Swift, Virginia

    2017-10-01

    There is increasing opportunity and support for occupational therapists to expand their scope of practice in community settings. However, evidence is needed to increase occupational therapists' knowledge, confidence, and capacity with building community participation and adopting community-centered practice roles. The purpose of this study is to improve occupational therapists' understanding of an approach to building community participation, through case study of a network of Canadian food security programs. Qualitative case study was utilized. Data were semistructured interviews, field observations, documents, and online social media. Thematic analysis was used to identify and describe four themes that relate to processes used to build community participation. The four themes were use of multiple methods, good leaders are fundamental, growing participation via social media, and leveraging outcomes. Occupational therapists can utilize an approach for building community participation that incorporates resource mobilization. Challenges of sustainability and social exclusion must be addressed.

  6. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  7. Policy Needs for Social Security in the Process of Citizenization of the Peri-urban Farmers:A Case Study of Hefei City

    Institute of Scientific and Technical Information of China (English)

    TAN Jiang-lin; CHEN Rui; NI Wen-cong

    2012-01-01

    We conduct a survey of transformational towns and villages in High-tech Development District, Yaohai District and Shushan District, Hefei City. Using data, we analyze the "sideline effect" and inherent contradiction of transformational cities, research the policy needs for social security and its trend in the citizenization process of the peri-urban farmers. On this basis, we construct the social security policy system that can adapt to the accelerated process of urbanization. Finally, we put forth the following recommendations for the social security policy in the citizenization process of the peri-urban farmers: distinguishing different groups’ policy needs for social security; attaching importance to people’s dynamic policy needs for social security in urbanization; focusing on the adaptability of social security policy transformation in urbanization; attaching importance to the social psychosocial environment of social security policy transformation in urbanization; achieving the trinity of non-farm conversion, urbanization and citizenization in the process of urbanization; strengthening the government’s dominant position in the building of social security policy system.

  8. Social Security privatization: balancing efficiency and fairness

    OpenAIRE

    C. Alan Garner

    1997-01-01

    This article examines these fundamental issues of economic efficiency and fairness that should be weighed when considering Social Security privatization. The first section summarizes the challenges to the current system and outlines various options for reform. The second section explains how privatization could improve economic efficiency, and briefly considers the difficult issue of the transition costs in moving from the current system to full privatization. The third section discusses impo...

  9. Building effective cybersecurity programs a security manager's handbook

    CERN Document Server

    Schreider, Tari

    2017-01-01

    You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

  10. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  11. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  12. Building Economic Security Today: making the health-wealth connection in Contra Costa county's maternal and child health programs.

    Science.gov (United States)

    Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri

    2014-02-01

    In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.

  13. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  14. Evaluation Report on The Department's Unclassified Cyber Security Program - 2009

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter

  15. Retirement Income Security and Well-Being in Canada

    OpenAIRE

    Michael Baker; Jonathan Gruber; Kevin S. Milligan

    2009-01-01

    A large international literature has documented the labor market distortions associated with social security benefits for near-retirees. In this paper, we investigate the 'other side' of social security programs, seeking to document improvements in wellbeing arising from the provision of public pensions. To the extent households adjust their savings and employment behavior to account for enhanced retirement benefits, the positive impact of the benefits may be crowded out. We proceed by using ...

  16. A Domain-Specific Programming Language for Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Nielsen, Janus Dam; Schwartzbach, Michael Ignatieff

    2007-01-01

    We present a domain-specific programming language for Secure Multiparty Computation (SMC). Information is a resource of vital importance and considerable economic value to individuals, public administration, and private companies. This means that the confidentiality of information is crucial...... on secret values and results are only revealed according to specific protocols. We identify the key linguistic concepts of SMC and bridge the gap between high-level security requirements and low-level cryptographic operations constituting an SMC platform, thus improving the efficiency and security of SMC...

  17. The Influence of Globalization on the Change and Convergence of Social Security Transfer: An Empirical Analysis for OECD Counties

    Directory of Open Access Journals (Sweden)

    Jinyoung Hwang

    2007-12-01

    Full Text Available Using a cross-section of OECD countries, this paper examines the relationship between globalization and the change and convergence of social security transfer. Globalization has arguably had a profound impact on the use of social protection in states, since it is normally accompanied with increases in income inequality, polarization, and unemployment. In addition, globalization may lead to socio- economic policy harmonization across countries. The empirical results show that there exists a significant and positive relationship between social security transfer in GDP and the globalization index based on political, economic, and social integrations. Also, we found the convergence phenomenon of social security transfer in OECD countries, applying the traditional methodology of convergence and convergence. Therefore, there is evidence in OECD countries that globalization indirectly affects the convergence of social security transfer in addition to direct relation to social security transfer in GDP.

  18. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  19. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    Keywords: static security, gene expression programming, probabilistic neural network ... Hence digital computers are usually installed in operations control centers to gather ...... power system protection, and applications of AI in power systems.

  20. Harmonization of social security law of Serbia with the law of European Union

    Directory of Open Access Journals (Sweden)

    Golubović Velizar

    2011-01-01

    Full Text Available In this work, the author shortly exposes Communitarian social security law and remained tasks of the harmonization of Serbian legislation in this field. Recently some amendments of legislation were made in order to strengthen principles of gender equality and prevent discrimination, to regulate employment of persons with disability, as well as to install supervision in Institutions for occupational retirement. Regarding the compulsory social insurance in Serbia it may be concluded that there exists a high degree of compliance with the EU legislation, with an exception of privileged mode of entitlement for old age and disability pensions for women and partial disability caused by work injury where it is necessary to conclude agreements on social security with 10 EU states members. On the other side, occupational retirement provision is partially incompatible with Communitarian social security law, i.e. with Directive 2003/41/EC in the field of technical provision, as well as with Directive 113/2004/EU regarding the obligation of equation of the life expectancy for both sexes.

  1. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  2. 78 FR 37244 - Submission for Review: We Need Important Information About Your Eligibility for Social Security...

    Science.gov (United States)

    2013-06-20

    ... Important Information About Your Eligibility for Social Security Disability Benefits, RI 98-7. As required... Personnel Management. Title: We Need Important Information About Your Eligibility for Social Security... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need Important Information About Your...

  3. Security and privacy preserving in social networks

    CERN Document Server

    Chbeir, Richard

    2013-01-01

    This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches as well as outlining future directions in this field. A wide range of interdisciplinary contributions from various research groups ensures for a balanced and complete perspective.

  4. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  5. Food Acquisition through Private and Public Social Networks and Its Relationship with Household Food Security among Various Socioeconomic Statuses in South Korea.

    Science.gov (United States)

    Park, Sohyun; Kim, Kirang

    2018-01-25

    This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants' mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses.

  6. Food Acquisition through Private and Public Social Networks and Its Relationship with Household Food Security among Various Socioeconomic Statuses in South Korea

    Science.gov (United States)

    Park, Sohyun; Kim, Kirang

    2018-01-01

    This study was conducted to understand food acquisition practices from social networks and its relationship with household food security. In-depth interviews and a survey on food security were conducted with twenty-nine mothers and one father in metropolitan areas of South Korea. Many families acquired food from their extended families, mainly participants’ mothers. Between low-income and non-low-income households, there was a pattern of more active sharing of food through private networks among non-low-income households. Most of the low-income households received food support from public social networks, such as government and charity institutions. Despite the assistance, most of them perceived food insecurity. We hypothesized that the lack of private social support may exacerbate the food security status of low-income households, despite formal food assistance from government and social welfare institutions. Interviews revealed that certain food items were perceived as lacking, such as animal-based protein sources and fresh produce, which are relatively expensive in this setting. Future programs should consider what would alleviate food insecurity among low-income households and determine the right instruments and mode of resolving the unmet needs. Future research could evaluate the quantitative relationship between private resources and food insecurity in households with various income statuses. PMID:29370127

  7. Implementation of Learning Organization Components in Ardabil Social Security Hospital

    Directory of Open Access Journals (Sweden)

    Azadeh Zirak

    2015-06-01

    Full Text Available This study aimed to investigate the implementation of learning organization characteristics based on Marquardt systematic model in Ardabil Social Security Hospital. The statistical population of this research was 234 male and female employees of Ardabil Social Security Hospital. For data collection, Marquardt questionnaire was used in the present study which its validity and reliability had been confirmed. Statistical analysis of hypotheses based on independent samples t-test showed that learning organization characteristics were used more than average level in some subsystems of Marquardt model and there was a significant difference between current position and excellent position based on learning organization characteristic application. According to the research findings, more attention should be paid to the subsystems of learning organization establishment and balanced development of these subsystems.

  8. Social Security privatization in Latin America.

    Science.gov (United States)

    Kritzer, B E

    2000-01-01

    The new, partially privatized social security system adopted by Chile in 1981 has attracted attention in many parts of the world. Since then, a number of Latin American countries have implemented the Chilean model, with some variations: either with a single- or multi-tier system, or with a period of transition to take care of those in the labor force at the time of the change. The single-tier version consists of a privatized program with individual accounts in pension fund management companies. Multi-tier systems have a privatized component and retain some form of public program. This article describes each of the new programs in Latin America, their background, and similarities and differences among them. Much more information is available for Chile than for the other countries (in part because Chile has the oldest system), enough to be able to evaluate what, in most cases, is the most accurate information. That is often not the case for the other countries, especially when dealing with subjects such as transition costs and net rates of return (rates of return minus administrative fees). No country has copied the Chilean system exactly. Bolivia, El Salvador, and Mexico have closed their public systems and set up mandatory individual accounts. Argentina has a mixed public/private system with three tiers. In Colombia and Peru, workers have a choice between the public and private programs. Uruguay created a two-tier mixed system. Costa Rica has a voluntary program for individual accounts as a supplement to the pay-as-you-go program and has just passed a law setting up mandatory accounts containing employer contributions for severance pay. All of the countries continue to face unresolved issues, including: High rates of noncompliance--the percentage of enrollees who do not actively and regularly contribute to their accounts--which could lead to low benefits and greater costs to the governments that offer a guaranteed minimum benefit; Proportionately lower benefits for

  9. 20 CFR 404.469 - Nonpayment of benefits where individual has not furnished or applied for a Social Security number.

    Science.gov (United States)

    2010-04-01

    ... not furnished or applied for a Social Security number. 404.469 Section 404.469 Employees' Benefits... or applied for a Social Security number. No monthly benefits will be paid to an entitled individual... or her Social Security number, or, if the individual has not been assigned a number, he or she makes...

  10. Changes in quality of care and costs induced by implementation of a diabetes program in a social security entity of Argentina

    Directory of Open Access Journals (Sweden)

    González L

    2013-07-01

    Full Text Available Lorena González,1 Jorge F Elgart,1 Héctor Calvo,2 Juan J Gagliardino11Center of Experimental and Applied Endocrinology, National University of La Plata, La Plata, Argentina; 2School of Economics and Management of Healthcare Organizations, National University of La Plata, La Plata, ArgentinaPurpose: To measure the impact of a diabetes and cardiovascular risk factors program implemented in a social security institution upon short- and long-term clinical/metabolic outcomes and costs of care.Methods: Observational longitudinal cohort analysis of clinical/metabolic data and resource use of 300 adult male and female program participants with diabetes before (baseline and 1 and 3 years after implementation of the program. Data were obtained from clinical records (Qualidiab and the administration's database.Results: The implementation of the program in "real world" conditions resulted in an immediate and sustainable improvement of the quality of care provided to people with diabetes incorporated therein. We also recorded a more appropriate oral therapy prescription for hyperglycemia and cardiovascular risk factors (CVRFs, as well as a decrease of events related to chronic complications. This improvement was associated with an increased use of diagnostic and therapeutic resources, particularly those related to pharmacy prescriptions, not specifically used for the control of hyperglycemia and other CVRFs.Conclusion: The implementation of a diabetes program in real-world conditions results in a significant short- and long-term improvement of the quality of care provided to people with diabetes and other CVRFs, but simultaneously increased the use of resources and the cost of diagnostic and therapeutic practices. Since controlled studies have shown improvement in quality of care without increasing costs, our results suggest the need to include management-control strategies in these programs for appropriate medical and administrative feedback to ensure the

  11. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  12. Social climate along the pathway of care in women's secure mental health service: variation with level of security, patient motivation, therapeutic alliance and level of disturbance.

    Science.gov (United States)

    Long, C G; Anagnostakis, K; Fox, E; Silaule, P; Somers, J; West, R; Webster, A

    2011-07-01

    Social climate has been measured in a variety of therapeutic settings, but there is little information about it in secure mental health services, or how it may vary along a gender specific care pathway. To assess social climate in women's secure wards and its variation by level of security and ward type, therapeutic alliance, patient motivation, treatment engagement and disturbed behaviour. Three-quarters (80, 76%) of staff and nearly all (65, 92%) of patients in the two medium-security wards and two low-security wards that comprised the unit completed the Essen Climate Evaluation Schema (EssenCES) and the California Psychotherapy Alliance Scale (CALPAS); patients also completed the Patient Motivation Inventory (PMI). Pre-assessment levels of disturbed behaviour and treatment engagement were recorded. Social climate varied according to ward type and level of security. EssenCES ratings indicative of positive social climate were associated with lower levels of security; such ratings were also associated with lower behavioural disturbance and with higher levels of motivation, treatment engagement and therapeutic alliance. This serial cross-sectional survey indicated that use of the EssenCES alone might be a good practical measure of treatment progress/responsivity. A longitudinal study would be an important next step in establishing the extent to which it would be useful in this regard. Copyright © 2010 John Wiley & Sons, Ltd.

  13. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  14. The Migration Security in Russian Society amid Ethnic and Social Conflicts Aggravation

    Directory of Open Access Journals (Sweden)

    N А Tkacheva

    2011-03-01

    Full Text Available National security protection emerges as an indispensable factor for the development of personality, society, and state amid the increasing complexity of international migration processes. The article touches upon the peculiarities of ethnic and social relations between migrants and members of the host country providing insight into the novel category of "migration security".

  15. Security of attachment and quality of mother-toddler social interaction in a high-risk sample.

    Science.gov (United States)

    Haltigan, John D; Lambert, Brittany L; Seifer, Ronald; Ekas, Naomi V; Bauer, Charles R; Messinger, Daniel S

    2012-02-01

    The quality of children's social interactions and their attachment security with a primary caregiver are two widely studied indices of socioemotional functioning in early childhood. Although both Bowlby and Ainsworth suggested that the parent-child interactions underlying the development of attachment security could be distinguished from other aspects of parent-child interaction (e.g., play), relatively little empirical research has examined this proposition. The aim of the current study was to explore this issue by examining concurrent relations between toddler's attachment security in the Strange Situation Procedure and quality of mother-child social interaction in a high-risk sample of toddlers characterized by prenatal cocaine exposure and low levels of maternal education. Analyses of variance suggested limited relations between attachment security and quality of social interaction. Further research examining the interrelations among various components of the parent-child relationship is needed. Copyright © 2011 Elsevier Inc. All rights reserved.

  16. Should the poor have no medicines to cure? A study on the association between social class and social security among the rural migrant workers in urban China.

    Science.gov (United States)

    Guan, Ming

    2017-11-07

    The rampant urbanization and medical marketization in China have resulted in increased vulnerabilities to health and socioeconomic disparities among the rural migrant workers in urban China. In the Chinese context, the socioeconomic characteristics of rural migrant workers have attracted considerable research attention in the recent past years. However, to date, no previous studies have explored the association between the socioeconomic factors and social security among the rural migrant workers in urban China. This study aims to explore the association between socioeconomic inequity and social security inequity and the subsequent associations with medical inequity and reimbursement rejection. Data from a regionally representative sample of 2009 Survey of Migrant Workers in Pearl River Delta in China were used for analyses. Multiple logistic regressions were used to analyze the impacts of socioeconomic factors on the eight dimensions of social security (sick pay, paid leave, maternity pay, medical insurance, pension insurance, occupational injury insurance, unemployment insurance, and maternity insurance) and the impacts of social security on medical reimbursement rejection. The zero-inflated negative binomial regression model (ZINB regression) was adopted to explore the relationship between socioeconomic factors and hospital visits among the rural migrant workers with social security. The study population consisted of 848 rural migrant workers with high income who were young and middle-aged, low-educated, and covered by social security. Reimbursement rejection and abusive supervision for the rural migrant workers were observed. Logistic regression analysis showed that there were significant associations between socioeconomic factors and social security. ZINB regression showed that there were significant associations between socioeconomic factors and hospital visits among the rural migrant workers. Also, several dimensions of social security had significant

  17. 75 FR 7546 - Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification...

    Science.gov (United States)

    2010-02-22

    ... DEPARTMENT OF COMMERCE Census Bureau 15 CFR Part 30 [Docket Number: 090422707-91445-02] RIN 0607-AA48 Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification... Trade Regulations (FTR) to eliminate the requirement to report a Social Security Number (SSN) as an...

  18. Human Development Index and Efficiency level of Social Security Hospitals

    Directory of Open Access Journals (Sweden)

    H. Sepehrdost

    2012-04-01

    Full Text Available Introduction & Objective: Hospitals as one of the main institutions providing health care services play an important role in the health system and allocate a high percentage of health sector's budget to them. This study aimed to answer whether social security hospitals efficiency levels are the same for all provinces in Iran? And whether any relationship exists between the human development indexes (HDI of the provinces and technical efficiency levels of the hospitals?Materials & Methods: Data envelopment analysis model has been used to measure technical efficiency of 65 social security hospitals, including small hospitals (working with lower than one hundred active beds and large hospitals (working with over one hundred active beds during the years 2007 to 2009. Further, the relationship between human development index and technical efficiency of hospitals in the provinces has been analyzed.Results: Results show that the average technical efficiency of small and large hospitals working in low and medium HDI provinces (0.912 and 0.937 are more than the average technical efficiency of hospitals in higher HDI provinces (0.870 and 0.887.Conclusion: It is recommended that social security organization concentrated distribute its hospital services in provinces with lower HDI and higher density of population living under the coverage of organization’s insurance. This will eventually puts its positive effects on per capita income of people, as well as more equitable distribution of income. (Sci J Hamadan Univ Med Sci 2012;19(1:32-38

  19. Establishing cyber security programs for I and C systems at nuclear facilities

    International Nuclear Information System (INIS)

    Waedt, Karl

    2012-01-01

    In recent years, across the international nuclear community, cyber security issues have quickly gained significant attention from safety authorities and plant designers alike. This increased attention was accelerated by news of the Stuxnet virus, which impaired control systems at Iranian nuclear facilities in 2010, but is also fueled by regular news about cyber security breaches of data systems at large business corporations. This paper discusses key aspects of establishing a cyber security program for Instrumentation and Control (I and C) systems at a nuclear facility, and identifies inherent aspects of nuclear power plant (NPP) design, that differentiate the needs of such a cyber security program from those of typical corporate data systems. (orig.)

  20. Establishing cyber security programs for I and C systems at nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Waedt, Karl [AREVA NP GmbH (Germany)

    2012-11-01

    In recent years, across the international nuclear community, cyber security issues have quickly gained significant attention from safety authorities and plant designers alike. This increased attention was accelerated by news of the Stuxnet virus, which impaired control systems at Iranian nuclear facilities in 2010, but is also fueled by regular news about cyber security breaches of data systems at large business corporations. This paper discusses key aspects of establishing a cyber security program for Instrumentation and Control (I and C) systems at a nuclear facility, and identifies inherent aspects of nuclear power plant (NPP) design, that differentiate the needs of such a cyber security program from those of typical corporate data systems. (orig.)

  1. Resources available for applying metrics in security and safety programming.

    Science.gov (United States)

    Luizzo, Anthony

    2016-01-01

    Incorporating metrics into security surveys has been championed as a better way of substantiating program-related effectiveness and expenditures. Although security surveys have been aroundfor well over 40 years, rarely, if ever, have metric-related strategies been part of the equation, the author says. In this article, he cites several published articles and research findings available to security professionals and their surveyors that may give them the expertise and confidence they need to make use of this valuable tool.

  2. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  3. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  4. Social security reform in two stages

    Directory of Open Access Journals (Sweden)

    Carlos Ranulfo Melo

    2006-01-01

    Full Text Available This article analyzes Brazilian social security reform during the Fernando Henrique and Lula Administrations. After comparing the contexts in which the different Constitutional Amendment proposals (PECs were submitted and the behavior by Members of Congress during the two periods, we argue that a contextual change (namely a switch in places between government and opposition affected the distribution of preferences and resources between the players and impacted the government in the various arenas in which the game was being played, and that as a result the reformist agenda has made more progress under the current Workers' Party administration.

  5. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  6. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  7. Domestic Labor and the Lack of Social Security Protection in Brazil: Questions for Analysis

    Directory of Open Access Journals (Sweden)

    Rita de Lourdes de Lima

    2010-01-01

    Full Text Available This article analyzes domestic labor in Brazil, considering gender, the sexual division of labor and social security, which are influenced by the social transformations of the late 20th century. To do so, a dialog was established with various theoreticians including: Boschetti, Hirata, Kergoat, Nogueira and Saffioti.A historical review of the sexual division of labor in capitalist society is conducted, utilizing the concept of gender and examining inequality between men and women in the work force. Then, looking at social security in Brazil, the  implications of counter reforms to the system for female labor and particularly for domestic work are analyzed, identifying the real lack of social protection suffered by the entire working class.

  8. Helping the Hacker? Library Information, Security, and Social Engineering

    Directory of Open Access Journals (Sweden)

    Samuel T. C. Thompson

    2006-12-01

    Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.

  9. 77 FR 1642 - Food Distribution Program on Indian Reservations: Income Deductions and Resource Eligibility

    Science.gov (United States)

    2012-01-11

    ..., Grant programs, Social programs, Indians, Reporting and recordkeeping requirements, Surplus agricultural... retroactive Social Security payments. The amendment would remove the language that provides these payments are... beneficiary is disabled; (e) Medicare premiums related to coverage under Title XVIII of the Social Security...

  10. THE PROGRAM SUPPORT SOCIAL AND PSYCHOLOGICAL SAFETY OF CHILDREN WITH INTELLECTUAL DISABILITIES

    Directory of Open Access Journals (Sweden)

    Pavel Aleksandrovich Kislyakov

    2018-04-01

    Full Text Available The article presents a description of the author’s program to support the social and psychological safety of children with intellectual disabilities enrolled in boarding school of VIII kind. The object of the study were children with intellectual disabilities. The subject of research – features of formation to children with intellectual disabilities the social and psychological safety. The methodological base are the special psychology (L.S. Vygotsky, S.L. Rubinstein, A. Speck. The results. Complex psychological and pedagogical support of social and psychological safety of children with intellectual disabilities reflects the content of psychological and pedagogical tasks (target function and technologies of their solution (instrumental function aimed at reducing internal and external risk factors. The target functions are: social and psychological adaptation, personal and developmental, the function of social support and psychological and pedagogical assistance, preventive and correctional function. Psycho-pedagogical objectives are the formation of skills of safe behavior and confront the dangers through the development of appropriate social skills, mental, physical and cognitive abilities, establishing a real and more comfortable with social contact (including municipal and educational environment, thereby ensuring individual protection and psychosocial well-being, support emotional balance, development of harmonious personality, to facilitate adaptation to the social environment, correction of risk factors of dysontogenesis. The program includes informative, technological and diagnostic modules. The basis for the construction of educational information in the field of security us based on the principle of integratively – interdisciplinary cooperation of academic subjects; a mix of mandatory core classes and extra-curricular and remedial work. Technological support included the following teaching methods: interactive (psychotechnical

  11. The Potential Effects of Obesity on Social Security Claiming Behavior and Retirement Benefits.

    Science.gov (United States)

    Knoll, Melissa A Z; Shoffner, Dave; O'Leary, Samantha

    2018-04-16

    Obesity prevalence among Americans has increased for nearly three decades. We explore the relationship between the rise in obesity and Social Security retirement benefit claiming, a decision impacting nearly all aging Americans. Specifically, we investigate whether obesity can affect individuals' decision to claim benefits early, a choice that has important implications for financial security in retirement, particularly for those with lower socioeconomic status (SES). We use a microsimulation model called MINT6 (Modeling Income in the Near Term, version 6) to demonstrate the potential effects of obesity on subjective life expectancy and claiming behavior. We impute obesity status using data from the National Health and Nutrition Examination Survey (NHANES), which describes the distribution of obesity prevalence within the United States by gender, poverty status, and race/ethnicity. We find that the rise in obesity and the consequent incidence of obesity-related diseases may lead some individuals to make claiming decisions that lead to lower monthly and lifetime Social Security retirement benefits. Further, we find that the potential economic impact of this decision is larger for those with lower SES. We present a behavioral perspective by addressing the potential effects that obesity can have on individuals' retirement decisions and their resulting Social Security retirement benefits.

  12. Extension of social security coverage for the informal economy in Indonesia : surveys in the urban and rural informal economy

    OpenAIRE

    Angelini, John; Hirose, Kenichi

    2004-01-01

    This paper focuses on the extension of social security coverage to workers in the informal economy. In particular, the paper presents the results of surveys assessing social security needs of workers in the informal economy in both urban and rural areas. The outcome of these surveys provides primary information for the development of effective policy on social security coverage extension to these groups of workers.

  13. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  14. Effectiveness of the Civil Aviation Security Program.

    Science.gov (United States)

    1978-03-31

    Passenger Screening Results 12. Scope of Civil Aviation Security Program 13. Basic Policies 14. Explosives Detection Dog Teams 15. Explosives Detection... policies guiding the program recognize airline responsibilities for the safety of passengers, baggage and cargo in their care as well as for the...U *i * (U U Los -7 .cn cf) 1-4 ~~LL _m e- Hf LMU 0- u,-C -oL -ccJLL LII -~ LLIOL 0 _ CL. LLJ cr-L LCnIJ C ~ ~ CnCD C. ) &j 2ic- nc r JL AJ -L JC C.- L

  15. Social Security Administration - Quarterly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits from fiscal...

  16. 76 FR 11402 - Recovery of Delinquent Debts-Treasury Offset Program Enhancements

    Science.gov (United States)

    2011-03-02

    ...-1213 or TTY 1-800-325- 0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404, 408, 416, and 422 [Docket No. SSA-2010-0010] RIN 0960-AH19 Recovery of Delinquent Debts--Treasury Offset Program Enhancements AGENCY: Social Security...

  17. Prevalence of temporary social security benefits due to respiratory disease in Brazil.

    Science.gov (United States)

    Ildefonso, Simone de Andrade Goulart; Barbosa-Branco, Anadergh; Albuquerque-Oliveira, Paulo Rogério

    2009-01-01

    To determine the prevalence of temporary social security benefits due to respiratory disease granted to employees, as well as the number of lost workdays and costs resulting from those in Brazil between 2003 and 2004. Cross-sectional study using data obtained from the Unified System of Benefits of the Brazilian Institute of Social Security (INSS, Instituto Nacional de Seguro Social) and the Brazilian Social Registry Database. Data regarding gender, age, diagnosis and type of economic activity, as well as type, duration and cost of benefits, were compiled. Respiratory diseases accounted for 1.3% of the total number of temporary social security benefits granted by INSS, with a prevalence rate of 9.92 (per 10,000 employment contracts). Females and individuals older than 50 years of age were the most affected. Non-work-related benefits were more common than were work-related benefits. The most prevalent diseases were pneumonia, asthma and COPD, followed by laryngeal and vocal cord diseases. The most prevalent types of economic activity were auxiliary transportation equipment manufacturing, tobacco product manufacturing and computer-related activities. The mean duration of benefits was 209.68 days, with a mean cost of R$ 4,495.30 per occurrence. Respiratory diseases caused by exogenous agents demanded longer sick leave (mean, 296.72 days) and greater cost (mean, R$ 7,105.74). The most prevalent diseases were airway diseases and pneumonia. Workers from auxiliary transportation equipment manufacturing, tobacco product manufacturing and computer-related activities were the most affected. Diseases caused by exogenous agents demanded longer sick leaves and resulted in greater costs.

  18. Market Valuation of Accrued Social Security Benefits

    OpenAIRE

    John Geanakoplos; Stephen P. Zeldes

    2009-01-01

    One measure of the health of the Social Security system is the difference between the market value of the trust fund and the present value of benefits accrued to date. How should present values be computed for this calculation in light of future uncertainties? We think it is important to use market value. Since claims on accrued benefits are not currently traded in financial markets, we cannot directly observe a market value. In this paper, we use a model to estimate what the market price for...

  19. Physicians' Self-Conceptions of Their Expertise in Statutory Health Insurance and Social Security Systems.

    Science.gov (United States)

    Seger, Wolfgang; Nüchtern, Elisabeth

    2015-07-01

    Medical experts who practice social medicine have a strong ethical approach for their professional positions. Their reports must reflect an objective, independent, high-quality assessment of interactions between health status and the disability of individuals. However, they must simultaneously consider the societal involvement of these individuals when determining the framework of the Statutory Health Insurance and Social Security Systems. Their task is to recommend sociomedical benefits that are tailored to suit personal needs and that respect the individual life situations of the persons involved, thus complementing the efforts of healthcare professionals in clinical settings. The editorial describes the self-conception of this medical specialty on behalf of the German Society of Social Medicine and Prevention (DGSMP). Policy makers in social insurances and social security systems generally must respect independent sociomedical recommendations as a crucial point for further realistic development activities.

  20. Social security as Markov equilibrium in OLG models: A note

    DEFF Research Database (Denmark)

    Gonzalez Eiras, Martin

    2011-01-01

    I refine and extend the Markov perfect equilibrium of the social security policy game in Forni (2005) for the special case of logarithmic utility. Under the restriction that the policy function be continuous, instead of differentiable, the equilibrium is globally well defined and its dynamics...

  1. Oral health status in older adults with social security in Mexico City: Latent class analysis.

    Science.gov (United States)

    Sánchez-García, Sergio; Heredia-Ponce, Erika; Cruz-Hervert, Pablo; Juárez-Cedillo, Teresa; Cárdenas-Bahena, Angel; García-Peña, Carmen

    2014-02-01

    To explore the oral health status through a latent class analysis in elderly social security beneficiaries from Southwest Mexico City. Cross-sectional study of beneficiaries of the State Employee Social Security and Social Services Institute (ISSSTE, in Spanish) and the Mexican Institute of Social Security (IMSS, in Spanish) aged 60 years or older. Oral health conditions such as edentulism, coronal and root caries (DMFT and DFT ≥ 75 percentile), clinical attachment loss (≥ 4 mm), and healthy teeth (≤ 25 percentile) were determined. A latent class analysis (LCA) was performed to classify the oral health status of dentate patients. In total, 336 patients were included (47.9% from the ISSSTE and 52.1% from the IMSS), with an average age of 74.4 (SD = 7.1) years. The 75th percentile of the DMFT = 23 and of the DFT = 2. Of the patients, 77.9% had periodontal disease. The 25th percentile of healthy teeth = 4. A three class model is adequate, with a high classification quality (Entropy = 0.915). The patients were classified as "Edentulous" (15.2%), "Class 1 = Unfavorable" (13.7%), "Class 2 = Somewhat favorable" (10.4%), and "Class 3 = Favorable" (60.7%). Using "Class 3 = Favorable" as a reference, there was an association (OR = 3.4; 95% CI = 1.8-6.4) between being edentulous and being 75 years of age and over, compared with the 60- to 74-year age group. The oral health in elderly social security beneficiaries is not optimal. The probability of becoming edentulous increases with age. A three-class model appropriately classifies the oral health dimensions in the elderly population. Key words:Elderly, Latent class analysis (LCA), oral health, social security, Mexico.

  2. Earnings Sharing in the U.S. Social Security System: A Microsimulation Analysis of Future Female Retirees

    Science.gov (United States)

    Iams, Howard M.; Reznik, Gayle L.; Tamborini, Christopher R.

    2010-01-01

    Purpose: As part of an ongoing effort to analyze the distributional implications of potential policy reforms to the U.S. Social Security system, we consider the widely discussed reform of earnings sharing. Such an approach has been viewed as a way to "update" Social Security's family benefits based on marital status and as a means to…

  3. Twitter, Facebook, and Ten Red Balloons: Social Network Problem Solving and Homeland Security

    OpenAIRE

    Ford, Christopher M.

    2011-01-01

    This article appeared in Homeland Security Affairs (February 2011), v.7 no.1 This essay, the winner of the Center for Homeland Defense and Security (CHDS) Essay Contest in 2010, looks at how homeland security could benefit from crowd-sourced applications accessed through social networking tools such as Twitter and Facebook. Christopher M. Ford looks at the apparent efficacy of two such endeavors: the Defense Advanced Research Projects Agency'۪s (DARPA) competition to find ten 8-foot balloo...

  4. Social Media Platforms as a Tool for Sharing Emotions. A Perspective upon the National Security Agencies

    Directory of Open Access Journals (Sweden)

    Ramona-Diana LEON

    2016-05-01

    Full Text Available Emotions importance increases even more in the context of the national security agencies. Since their mission is to protect and defend the citizens against attacks and also to provide leadership and justice services to other agencies and partners, the aim of the information they post on social media should be twofold: on the one hand, it should reflect the attitudes, values and beliefs, supported by the institution, and on the other hand, it should have an impact on citizens feeling of security. But, do they manage to meet these demands? Are they focusing on impressing the audience or they concentrate on sharing specific emotions? Is it a marketing strategy or a knowledge strategy? Starting from these, the purpose of this research is to set a nexus between emotions and the use of social media by the national security organizations. In other words, we aim (i to determine the main types of emotions, (ii to establish whether these are shared within the social media platforms, (iii to identify the purpose for which the national security organizations use social media, (iv to determine whether social media could serve as Ba for the national security organizations. In order to achieve these objectives, we employ an ethic approach and develop a longitudinal study based on quantitative and qualitative content analysis. The results prove that social media platforms may serve as Ba since they appear as a shared space which fosters individual and collective knowledge creation and sharing. The national security agencies  use social media platforms for combining the classical four types of Ba: originating Ba (it shares its emotions, feelings and thoughts through its posts, interacting Ba (through the generated reactions and comments, it ensures the development of shared models and the conversion of tacit knowledge into explicit knowledge, cyber Ba (by fostering the virtual interaction among its followers and exercising Ba (by facilitating the creation of

  5. How Family Status and Social Security Claiming Options Shape Optimal Life Cycle Portfolios.

    Science.gov (United States)

    Hubener, Andreas; Maurer, Raimond; Mitchell, Olivia S

    2016-04-01

    We show how optimal household decisions regarding work, retirement, saving, portfolio allocations, and life insurance are shaped by the complex financial options embedded in U.S. Social Security rules and uncertain family transitions. Our life cycle model predicts sharp consumption drops on retirement, an age-62 peak in claiming rates, and earlier claiming by wives versus husbands and single women. Moreover, life insurance is mainly purchased on men's lives. Our model, which takes Social Security rules seriously, generates wealth and retirement outcomes that are more consistent with the data, in contrast to earlier and less realistic models.

  6. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  7. CONSIDERATIONS ON THE PAY SYSTEM AND SOCIAL SECURITY IN SPAIN

    OpenAIRE

    Mihaela – Andreea Nastasie

    2012-01-01

    In the current context of economic crisis which manifests the world can see a very important role of the pay systems and social security in economic and social life. Staff wages means establishing a salary entitlements owed to employees and their payment, as established at the end of collective or individual employment contracts. In Spain there are various collective agreements according to geographical areas and activities. A fair and balanced wage was and will remain a core area of human re...

  8. Tenure security, social relations and contract choice: Endogenous matching in the Chinese land rental market

    Science.gov (United States)

    Ma, Xianlei; Zhou, Yuepeng; Shi, Xiaoping

    2017-04-01

    In China, land rental transactions have increased considerably since the 1990s, but there exists a high degree of segmentation and informal features. The rental transactions between partners with close social relations and the use of informal contracts remain a common phenomenon in many regions, which strongly reduce the potential of the land rental market to enhance productivity and equity. The current literature postulates that the insecurity of land property rights may restrict land transactions between members of same social relations. Studies conducted in China show that the land rentals between partners with closer social relations prefer informal contracts because these contracts are self-enforced based on trust and reputation. However, little literature has jointly examined the effect of land tenure security and social relations on joint decisions of partner and contract choice in the Chinese land rental market. Based on household data collected in Jiangxi and Liaoning provinces in 2015, this paper aims to examine the relationship between land tenure security perceptions, social relation and land rental contract choices in China. We differentiate between formal and informal contracts of land rental activities because they have different enforcement mechanisms and thus different risk-sharing strategy. With regards to social relations, we differ among relatives, villagers living in the same village and strangers according to social distance. In order to reduce estimation bias without accounting for endogenous matching between landlords and tenants, we investigate the joint partner and contract choices in the land rental market using a nested logit framework. The paper contributes to the literature on the effect of tenure security and social relations on land rental contracts by (i) taking into account endogenous matching between landlords and tenants, and estimating the joint decisions of partner and contract choice, and (ii) examining the effect of perceived

  9. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  10. Social Security for China’s Migrant Workers – Providing for Old Age

    Directory of Open Access Journals (Sweden)

    Andrew Watson

    2009-01-01

    Full Text Available The concept of “migrant workers” derives from the household registration system of China’s planned economy period. The continued existence of that system conflicts with the development of an integrated labour market. The current social security system, based on household registration and a large number of local pools, discriminates against migrant workers because of their mobility and the lack of mechanisms to transfer benefits between pools. As a result, migrants have made major contributions to China’s economic development but do not get the same benefits as urban residents. Faced with this challenge, China’s government has begun to introduce policy reforms to improve social security for migrants. This article explores this development through a focus on old-age insurance. It analyses the special needs of migrants, the obstacles facing policy development and the proposed solutions. It argues that social justice and social equity require the development of a system that treats all citizens equally, and that the logic of an integrated labour market will ultimately require a unified national system of old-age insurance.

  11. Importance of security and socialization in europeans life

    Directory of Open Access Journals (Sweden)

    Diana Elena Şerb

    2017-01-01

    Full Text Available The purpose of this research is to examine the importance of safety and socialization in the lives of individuals. The influence of agents of socialization (school, family, friends are manifested as differences in preferences, feelings and thoughts of people. The article is structured in two parts. The first part presents the knowledge in the field, but in the context of Maslow's hierarchy of needs. In the second part is carried out an research among Europeans about some aspect of their lives: how they spend their free time, the feeling of attachment to the community, a sense of security and availability to communicate personal matters to their group of friends. The research method was investigating the secondary sources (database obtained from the survey from a site specializing in the analysis of living conditions of Europeans - European Social Survey. After the reception and processing of results in Excel and SPSS we obtained a general conclusion that people need to socialize, to be part of a group and feel safe.

  12. A Case Study on Cyber-security Program for the Programmable Logic Controller of Modern NPPs

    International Nuclear Information System (INIS)

    Song, S. H.; Lee, M. S.; Kim, T. H.; Park, C. H.; Park, S. P.; Kim, H. S.

    2014-01-01

    As instrumentation and control (I and C) systems for modern Nuclear Power Plants (NPPs) have been digitalized to cope with their growing complexity, the cyber-security has become an important issue. To protect the I and C systems adequately from cyber threats, such as Stuxnet that attacked Iran's nuclear facilities, regulations of many countries require a cyber-security program covering all the life cycle phases of the system development, from the concept to the retirement. This paper presents a case study of cyber-security program that has been performed during the development of the programmable logic controller (PLC) for modern NPPs of Korea. In the case study, a cyber-security plan, including technical, management, and operational controls, was established through a security risk assessment. Cyber-security activities, such as development of security functions and periodic inspections, were conducted according to the plan: the security functions were applied to the PLC as the technical controls, and periodic inspections and audits were held to check the security of the development environment, as the management and operational controls. A final penetration test was conducted to inspect all the security problems that had been issued during the development. The case study has shown that the systematic cyber-security program detected and removed the vulnerabilities of the target system, which could not be found otherwise, enhancing the cyber-security of the system

  13. A Case Study on Cyber-security Program for the Programmable Logic Controller of Modern NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Song, S. H. [Korea University, Seoul (Korea, Republic of); Lee, M. S.; Kim, T. H. [Formal Work Inc., Seoul (Korea, Republic of); Park, C. H. [LINE Corp., Tokyo (Japan); Park, S. P. [Ahnlab Inc., Seoul (Korea, Republic of); Kim, H. S. [Sejong University, Seoul (Korea, Republic of)

    2014-08-15

    As instrumentation and control (I and C) systems for modern Nuclear Power Plants (NPPs) have been digitalized to cope with their growing complexity, the cyber-security has become an important issue. To protect the I and C systems adequately from cyber threats, such as Stuxnet that attacked Iran's nuclear facilities, regulations of many countries require a cyber-security program covering all the life cycle phases of the system development, from the concept to the retirement. This paper presents a case study of cyber-security program that has been performed during the development of the programmable logic controller (PLC) for modern NPPs of Korea. In the case study, a cyber-security plan, including technical, management, and operational controls, was established through a security risk assessment. Cyber-security activities, such as development of security functions and periodic inspections, were conducted according to the plan: the security functions were applied to the PLC as the technical controls, and periodic inspections and audits were held to check the security of the development environment, as the management and operational controls. A final penetration test was conducted to inspect all the security problems that had been issued during the development. The case study has shown that the systematic cyber-security program detected and removed the vulnerabilities of the target system, which could not be found otherwise, enhancing the cyber-security of the system.

  14. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    treatment and disposal. DOD/COCOM Water Security Program Strategy 22 18. Toxic Minerals In regions where there are naturally occurring unsafe...surface hydrologic observations using remote sensing to provide data on precipitation, radiation, temperature, soil moisture, groundwater, snowcover...habitat alteration and aquaculture . 13. Centers for Disease Control (CDC) Works with partners throughout the nation and the world to monitor health

  15. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official... Senior FEMA official responsible for the information security program. The Director of the Security Division, has been designated as the senior official to direct and administer the FEMA information security...

  16. Security of social network credentials for accessing course portal: Users' experience

    Science.gov (United States)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  17. Research award: Agriculture and Food Security 2019 | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The AFS program works with organizations to intensify and diversify small‐scale ... and social) without adversely impacting societies and the environment. ... loss, rural economic development, improved food and nutrition security, and the ...

  18. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  19. The impact of population ageing on the social security expenditure and economic growth in Japan.

    Science.gov (United States)

    Maruo, N

    1987-05-01

    The author considers the impact of demographic aging in Japan on the social security system and on economic growth. It is argued that "First of all, as the cost of social security (including social services) increases remarkably at the earlier stage of ageing, the disposable (after tax) income and private consumption of the present labour force generation tend to increase at a lower growth rate than that of the GNP....Secondly if pension systems are based on terminal funding schemes, the ageing of the population increases savings (net increase of the amount of the pension funds) at the earlier stage of the ageing of the population. Thirdly, there is a time lag between the increase of social security benefits and the decrease in the personal savings ratio. The high ratio of savings and the shortage of aggregate demand as well as the high pressure for export in...recent Japan can partly be attributed to the above factors." Possible future economic scenarios as demographic ageing in Japan proceeds are described, and policies to avert anticipated problems are outlined. (SUMMARY IN JPN) excerpt

  20. 48 CFR 252.222-7004 - Compliance with Spanish social security laws and regulations.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Compliance with Spanish... PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.222-7004 Compliance with Spanish social... Spanish Social Security Laws and Regulations (JUN 1997) (a) The Contractor shall comply with all Spanish...

  1. 76 FR 18383 - Extension of Sunset Date for Attorney Advisor Program

    Science.gov (United States)

    2011-04-04

    ... Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: Electronic Version The... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2009-0048] RIN 0960-AH05 Extension of Sunset Date for Attorney Advisor Program AGENCY: Social Security Administration. ACTION: Final...

  2. A security approach based on honeypots: Protecting Online Social network from malicious profiles

    Directory of Open Access Journals (Sweden)

    Fatna Elmendili, Nisrine Maqran

    2017-04-01

    Full Text Available In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for cyber criminality and attacks. It is mostly based on how users are using these sites like Twitter and others. Attackers can easily access and gather personal and sensitive user’s information. Users are less aware and least concerned about the security setting. And they easily become victim of identity breach. To detect malicious users or fake profiles different techniques have been proposed like our approach which is based on the use of social honeypots to discover malicious profiles in it. Inspired by security researchers who used honeypots to observe and analyze malicious activity in the networks, this method uses social honeypots to trap malicious users. The two key elements of the approach are: (1 The deployment of social honeypots for harvesting information of malicious profiles. (2 Analysis of the characteristics of these malicious profiles and those of deployed honeypots for creating classifiers that allow to filter the existing profiles and monitor the new profiles.

  3. Trends and Correlates of Consenting to Provide Social Security Numbers: Longitudinal Findings from the General Social Survey (1993-2010)

    Science.gov (United States)

    Kim, Jibum; Shin, Hee-Choon; Rosen, Zohn; Kang, Jeong-han; Dykema, Jennifer; Muennig, Peter

    2015-01-01

    Privacy and confidentiality are often of great concern to respondents answering sensitive questions posed by interviewers. Using the 1993-2010 General Social Survey, we examined trends in the provision of social security numbers (SSNs) and correlates of those responses. Results indicate that the rate of SSN provision has declined over the past…

  4. The effectiveness of online gaming as part of a security awareness program

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2014-07-01

    Full Text Available the human element whose actions can be considered as erratic and unpredictable thus posing a threat to the security of the organization. Security awareness programs aim to equip users of cyberspace with the necessary knowledge to identify and mitigate...

  5. Research Award: Agriculture and Food Security

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    2013-08-07

    Aug 7, 2013 ... research awards providing a unique opportunity to enhance research skills and gain a fresh perspecve on crucial development issues. These one‐year, paid, ... programming through a research acvity focusing on agriculture and food security, specifically on the gender and social (equity) dimensions of ...

  6. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  7. Generating Random Samples of a Given Size Using Social Security Numbers.

    Science.gov (United States)

    Erickson, Richard C.; Brauchle, Paul E.

    1984-01-01

    The purposes of this article are (1) to present a method by which social security numbers may be used to draw cluster samples of a predetermined size and (2) to describe procedures used to validate this method of drawing random samples. (JOW)

  8. Changes in Spending and Labor Supply in Response to a Social Security Benefit Cut: Evidence from Stated Choice Data.

    Science.gov (United States)

    Delavande, Adeline; Rohwedder, Susann

    2017-12-01

    We investigate how individuals in the U.S. expect to adjust their labor force participation and savings if Social Security benefits were cut by 30 percent. Respondents were asked directly what they would do under this scenario. Using the resulting stated choice data we find that respondents would on average reduce spending by 18.2 percent before retirement and 20.4 percent after retirement. About 34.1% of respondents state they would definitely work longer and they would postpone claiming Social Security by 1.1 years. We investigate how working longer and claiming Social Security later would compensate partially for the loss in benefits among the individuals who are currently working, under the assumption that individuals retire and claim at the same time. Individuals would increase their Social Security benefits from the post-reform level due to additional earnings entering the benefit calculation and a smaller early claiming penalty (or higher delayed claiming credit). As a result, the Social Security benefit people would receive would drop on average by 21 rather than 30 percent. Still, the net financial loss, even after accounting for additional earnings, is sizeable for individuals in the lowest wealth tertile.

  9. Factor structure of the Essen Climate Evaluation Schema measure of social climate in a UK medium-security setting.

    Science.gov (United States)

    Milsom, Sophia A; Freestone, Mark; Duller, Rachel; Bouman, Marisa; Taylor, Celia

    2014-04-01

    Social climate has an influence on a number of treatment-related factors, including service users' behaviour, staff morale and treatment outcomes. Reliable assessment of social climate is, therefore, beneficial within forensic mental health settings. The Essen Climate Evaluation Schema (EssenCES) has been validated in forensic mental health services in the UK and Germany. Preliminary normative data have been produced for UK high-security national health services and German medium-security and high-security services. We aim to validate the use of the EssenCES scale (English version) and provide preliminary normative data in UK medium-security hospital settings. The EssenCES scale was completed in a medium-security mental health service as part of a service-wide audit. A total of 89 patients and 112 staff completed the EssenCES. The three-factor structure of the EssenCES and its internal construct validity were maintained within the sample. Scores from this medium-security hospital sample were significantly higher than those from earlier high-security hospital data, with three exceptions--'patient cohesion' according to the patients and 'therapeutic hold' according to staff and patients. Our data support the use of the EssenCES scale as a valid measure for assessing social climate within medium-security hospital settings. Significant differences between the means of high-security and medium-security service samples imply that degree of security is a relevant factor affecting the ward climate and that in monitoring quality of secure services, it is likely to be important to apply different scores to reflect standards. Copyright © 2013 John Wiley & Sons, Ltd.

  10. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  11. The availability and affordability of long-term care for disabled older people in China: The issues related to inequalities in social security benefits.

    Science.gov (United States)

    Lei, Peng; Feng, Zhixin; Wu, Zhuochun

    2016-01-01

    China is experiencing increasing pressure from issues relating to an ageing population. The rationality of different eligibility criteria of the benefits within the social security system has been widely challenged; however, to date, no previous study has explored its association with the availability and affordability of long-term care (LTC). This study evaluates the availability and affordability of Long-Term Care (LTC) services for disabled older people (aged 65 and above) in China, with special attention to the differences among groups in receipt of specific social security benefits. The data of availability and affordability of LTC services for disabled older people is from a nationally representative sample Chinese Longitudinal Healthy Longevity Survey (CLHLS). Three different social security benefits were identified and their effects on the long-term care services for disabled older people were explored. The overall proportions of disabled older people who have only limited or no available or affordable LTC services were remarkably high, especially for those who have moderate or no social security benefits. Compared to those who are entitled to generous social security benefits, older people who have no social security benefits are 18.45 times more likely to be unable to afford health care expenses. The findings imply that policy makers in China could focus on the LTC needs for the social security and socioeconomically disadvantaged (who have limited or no social security benefits and in low household income) disabled older people which could reduce the gap between them and those who are entitled to generous social security benefits. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  12. Cohort profile: the Spanish WORKing life Social Security (WORKss) cohort study

    OpenAIRE

    López Gómez, María Andreé, 1985-; Duran Jordà, Xavier, 1974-; Zaballa, Elena; Sánchez Niubò, Albert; Delclòs i Clanchet, Jordi, 1956-; Benavides, Fernando G. (Fernando García)

    2016-01-01

    PURPOSE: The global economy is changing the labour market and social protection systems in Europe. The effect of both changes on health needs to be monitored in view of an ageing population and the resulting increase in prevalence of chronic health conditions. The Spanish WORKing life Social Security (WORKss) cohort study provides unique longitudinal data to study the impact of labour trajectories and employment conditions on health, in terms of sickness absence, permanent disability and deat...

  13. Social Status, Traditional Food Taboos and Food Security: A Study ...

    African Journals Online (AJOL)

    A study was conducted to examine adherence to traditional food taboos by women in Imo State, and relate that to social status and food security. Data was collected from 72 women across the three agricultural zones of the State. It was found that age, income and education are some factors affecting adherence to these ...

  14. Social Security Disability Insurance: Essential Protection when Work Incapacity Strikes

    Science.gov (United States)

    Reno, Virginia P.; Ekman, Lisa D.

    2012-01-01

    Social Security Disability Insurance (SSDI) is an essential lifeline for millions of Americans. Without it, many families would be in deep financial distress. SSDI is insurance that workers pay for through premiums deducted from their pay. In return, workers gain the right to monthly benefits if a disabling condition ends their capacity to earn a…

  15. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  16. 78 FR 45452 - Mailing of Tickets Under the Ticket To Work Program

    Science.gov (United States)

    2013-07-29

    ... Security Online, at www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: Congress established the Ticket... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 411 [Docket No. SSA-2011-0034] RIN 0960-AH34 Mailing of Tickets Under the Ticket To Work Program AGENCY: Social Security Administration. ACTION: Final rule...

  17. Trends in social security benefits for oral and oropharyngeal cancer from 2006 to 2013 in Brazil.

    Science.gov (United States)

    Bomfim, Rafael Aiello; Cascaes, Andreia Morales

    2018-01-01

    to analyze the trends in the concession of social security sick pay for oral and oropharyngeal cancer, from 2006 to 2013, in Brazil. time series study using data of workers insured by the Brazilian National Institute of Social Security (INSS); Prais-Winsten generalized linear regressions were used to calculate the annual percentage change (APC). social security benefits for oral and oropharyngeal cancer presented significant increase (APC=9.0%; 95%CI 1.4; 17.4); benefits for other parts of the mouth, nasopharynx, oropharynx, floor of mouth and palate have also shown significant increase; the areas of trade (5.5%) and manufacturing (5.2%) were the most prevalent activities; there was a high proportion of fields in blank in the information systems (average of 72.9%). trends in occupational benefits for oral and oropharyngeal cancer showed significant increase.

  18. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  19. A study on the barriers of the implementation of social security act in ...

    African Journals Online (AJOL)

    In this study, an analytical review was done on the historical process and contexts of welfare system and social security in order to analyze and evaluate the main features of this act especially in the area of medical services. It was also attempted to study the executive barriers of the appropriate implementation of social ...

  20. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    Science.gov (United States)

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  1. Strong tobacco control program requirements and secure funding are not enough: lessons from Florida.

    Science.gov (United States)

    Kennedy, Allison; Sullivan, Sarah; Hendlin, Yogi; Barnes, Richard; Glantz, Stanton

    2012-05-01

    Florida's Tobacco Pilot Program (TPP; 1998-2003), with its edgy Truth media campaign, achieved unprecedented youth smoking reductions and became a model for tobacco control programming. In 2006, 3 years after the TPP was defunded, public health groups restored funding for tobacco control programming by convincing Florida voters to amend their constitution. Despite the new program's strong legal structure, Governor Charlie Crist's Department of Health implemented a low-impact program. Although they secured the program's strong structure and funding, Florida's nongovernmental public health organizations did not mobilize to demand a high-impact program. Implementation of Florida's Amendment 4 demonstrates that a strong programmatic structure and secure funding are insufficient to ensure a successful public health program, without external pressure from nongovernmental groups.

  2. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  3. The Impact of a Home-Delivered Meal Program on Nutritional Risk, Dietary Intake, Food Security, Loneliness, and Social Well-Being.

    Science.gov (United States)

    Wright, Lauri; Vance, Lauren; Sudduth, Christina; Epps, James B

    2015-01-01

    Maintaining independence and continuing to live at home is one solution to manage the rising health care costs of aging populations in the United States; furthermore, seniors are at risk of malnutrition and food insecurity. Home-delivered meal programs are a tool to address food, nutrition, and well-being concerns of this population. Few studies have identified outcomes from these programs; this pilot study reviews the nutritional status, dietary intake, well-being, loneliness, and food security levels of seniors participating in a Meals on Wheels delivery service. Clients, new to the meal program, participated in pre- and postphone interviews, and 51 seniors completed the study. The survey was composed of five scales or questionnaires, and statistical analyses were conducted using SPSS. Improvements across all five measures were statistically significant after participating two months in the home-delivered meal program. Implications for further research, practice, and the Older Americans Act are discussed.

  4. Age structure of the population in Belgium and social security.

    Science.gov (United States)

    Dooghe, G

    1991-01-01

    The effects of demographic aging and of various socioeconomic factors on the social security system in Belgium are explored. "Special attention is given to the impact of the ageing of the population on the pension problem. Based on a simple formula a series of percentages of taxation have been calculated as a function of shifts in the proportion of retired vs. active population and in the proportion of the average income vs. the average amount of pension. One of the conclusions is that the progressive ageing of the population will become the most significant factor in the growth of social expenditures." excerpt

  5. The use of social media in dental hygiene programs: a survey of program directors.

    Science.gov (United States)

    Henry, Rachel K; Pieren, Jennifer A

    2014-08-01

    The use of social media and social networking sites has become increasingly common by the current generation of students. Colleges and universities are using social media and social networking sites to advertise, engage and recruit prospective students. The purpose of this study was to evaluate how social media is being used in dental hygiene program admissions and policy. Researchers developed a survey instrument investigating the use of social media. The survey included questions about demographic information, personal use of social media, program use of social media, social media use in admissions and social media policies. An email was sent to 321 dental hygiene program directors asking them to complete the survey. All participants were provided 4 weeks to complete the survey, and 2 reminder emails were sent. A total of 155 responses were received (48.3% response rate). While 84% of respondents indicated their program had a web page, only 20% had an official Facebook page for the program and 2% had a Twitter page. Thirty-five percent had a program policy specifically addressing the use of social media and 31% indicated that their university or institution had a policy. Only 4% of programs evaluate a potential student's Internet presence, mostly by searching on Facebook. Statistically significant differences (p≤0.05) were noted between those respondents with more personal social media accounts and those with fewer accounts, as those with more accounts were more likely to evaluate a potential student's Internet presence. Open ended responses included concern about social media issues, but some uncertainty on how to handle social media in the program. The concern for social media and professionalism was evident and more research and discussion in this area is warranted. Social media is currently being used in a variety of ways in dental hygiene programs, but not in the area of admissions. There is some uncertainty about the role social media should play in a

  6. Analysis of Department of Defense social media policy and its impact on operational security

    OpenAIRE

    Leonhardi, Eric V.; Murphy, Mark; Kim, Hannah

    2015-01-01

    Approved for public release; distribution is unlimited The emergence and rapid adoption of social media by society has forced the Department of Defense (DOD) to adapt, and ultimately develop and incorporate, social media policy into its cybersecurity strategy. While social media has influenced DOD strategy, it has also had a direct impact on the organization’s operational security (OPSEC). DOD personnel using social media represent a potential OPSEC risk through the various ways and means ...

  7. Safeguard and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support U.S. nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  8. Safeguards and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support US nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  9. Operator's and insurer's relationship with social security organizations in the course of individual damage compensation procedures

    International Nuclear Information System (INIS)

    Deprimoz, Jacques.

    1995-01-01

    The Paris and Vienna Conventions internationally agreeded that health care and hospitalization guarantee and disability pension or death due to victim's outside the nuclear installations, as well as the organization funds contributions should be fixed by the internal rights of each Signatory Part. The present study, applicable to nine countries (Germany, Belgium, Brazil, France, Italy, Low Countries, United Kingdom, Sweden and Switzerland) sets up that the social security levels are more or less high and that the charges contributions could be important in countries under subrogation, even reduced or null in countries under imputation. In cases of transfrontier accidents, the contributions extension relies on harmonized rights with the social security organizations of victim's countries. Each indenominity victim's dossier could take a long time. The study concludes that the regulatory services of the social security organizations and their responsible operators or substitutes insurers should coordinate their interventions by using the information system

  10. An Examination of Organizational Information Protection in the Era of Social Media: A Study of Social Network Security and Privacy Protection

    Science.gov (United States)

    Maar, Michael C.

    2013-01-01

    This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive…

  11. Exclusión y seguridad social en el plan de desarrollo Exclusion and social security in the Development Plan

    Directory of Open Access Journals (Sweden)

    Rodríguez Salazar Oscar

    1999-06-01

    Full Text Available Este articulo analiza la forma en que el Plan de Desarrollo "Cambio para contruir la Paz" trata el sistema de seguridad social y su interpretacion sobre las causas de la exclusion social. El plan carece de una vision de conjunto del sistema por cuanto no aborda los aspectos reisgos profesionles y pensiones; articula el concepto de solidaridad a las relaciones interpersonales y, asi, subestima el papel del Estado en el logro de esa meta. Por otra parte, las politicas laborales esbozadas en el Plan conducen en forma inexorable a una mayor exclusion social. En cuanto al sistema de seguridad social en salud, dado que la cobertura se ha extendido mediante el regimen subsidiado, la ausencia de una politica que promueva el control social puede acentuar la clientelizacion que Estado manifiesta querer combatir.This article analyzes the way that the Development Plan "Changeto Build Peace" treats the social security system and its interpretation of the causes of social exclusion. The Plan lacks a vision of the system as a whole as it does not address the aspects of professional risks and pensions; it articula tes the concept of solidarity to interpersonal relations and thus underestimates the role of the State in achieving that goal. Moreover, the labor policies outlined in the Plan lead inexorably to greater social exclusion. As far as the social security system for health, given that coverage has been extended by meansof the subsidized regime, the absence of a policy that promotes social control may accentuate the clientelization of the State which the Plan claims to want to combato.

  12. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  13. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Leiby, Paul Newsome [ORNL

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described

  14. Social Media - DoD’s Greatest Information Sharing Tool or Weakest Security Link?

    Science.gov (United States)

    2010-04-15

    or position of the Department of the Army, Department of Defense, or the U.S. Government. SOCIAL MEDIA – DOD’S GREATEST INFORMATION SHARING TOOL...appropriateness and effectiveness of these policies in securing the information network. 15. SUBJECT TERMS Social media , information...TYPE Civilian Research Paper 3. DATES COVERED (From - To) August 2009-April 2010 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Social Media

  15. 78 FR 8217 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-02-05

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias... the third column, the fourth line under the ``Summary'' heading, change ``SSR-13-Xp'' to ``SSR-13-1p...

  16. EU coordination of national social security in multiple cross border situations

    NARCIS (Netherlands)

    Cremers, J.

    2011-01-01

    The coordination of the national social security is one of the crucial fields of cooperation between EU Member States. The coordination is based on the principle of application of one legislation at a time in cases of employment being executed in one or more than one Member State. Persons moving

  17. The School Breakfast Program strengthens household food security among low-income households with elementary school children.

    Science.gov (United States)

    Bartfeld, Judith S; Ahn, Hong-Min

    2011-03-01

    The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.

  18. Social Information Processing, Security of Attachment, and Emotion Regulation in Children with Learning Disabilities

    Science.gov (United States)

    Bauminger, Nirit; Kimhi-Kind, Ilanit

    2008-01-01

    This study examined the contribution of attachment security and emotion regulation (ER) to the explanation of social information processing (SIP) in middle childhood boys with learning disabilities (LD) and without LD matched on age and grade level. Children analyzed four social vignettes using Dodge's SIP model and completed the Kerns security…

  19. Food Security and Weight Status in Children: Interactions With Food Assistance Programs.

    Science.gov (United States)

    Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey

    2017-02-01

    It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  20. Guatemala social marketing program.

    Science.gov (United States)

    1987-01-01

    The Guatemala Social Marketing Program reported 1986 increases after social marketing promotion in the sales of Panther and Scudo condoms, Perla oral contraceptives, and Lirio vaginal foaming tablets. Sale of Panther condoms was highest in February; all the other products peaked in June and July. Sales fell in December due to Christmas holidays. Sale patterns are illustrated graphically for all 4 products.

  1. The Evolution of an Innovative Community-Engaged Health Navigator Program to Address Social Determinants of Health.

    Science.gov (United States)

    Page-Reeves, Janet; Moffett, Maurice L; Steimel, Leah; Smith, Daryl T

    Health navigators and other types of community health workers (CHWs) have become recognized as essential components of quality care, and key for addressing health disparities owing to the complex health care services landscape presents almost insurmountable challenges for vulnerable individuals. Bernalillo County, New Mexico, has high rates of uninsurance, poverty, and food insecurity. The design of the Pathways to a Healthy Bernalillo County Program (BP) has evolved innovations that are unique in terms of program stability and security, expansive reach, and community capacity across six domains: sustainable public mechanism for program funding, involvement of community organizations in designing the program, expanded focus to address the broader social determinants of health with targeted outreach, an integrated, community-based implementation structure, an outcomes-based payment structure, and using an adaptive program design that actively incorporates navigators in the process. In 2008, the Pathways to a Healthy Bernalillo County Program (BP), located in the Albuquerque metropolitan area in central New Mexico, was established to provide navigation and support for the most vulnerable county residents. BP is funded through a 1% carve out of county mill levy funds. The pathways model is an outcome-based approach for health and social services coordination that uses culturally competent CHW as "navigators" trained to connect at-risk individuals to needed health and social services. One of the important innovations of the pathways approach is a shift in focus from merely providing discrete services to confirming healthy outcomes for the individual patient.

  2. Social Security System in India: An International Comparative Analysis

    OpenAIRE

    Jha, Rupak Kumar; Bhattacharyya, Surajit

    2010-01-01

    This paper examines selected components of social security system in India and compares them with their OECD counterparts. Historically, the Indian policy makers have viewed the pension system as a welfare measure and therefore, it lacks in financial professionalism, diversification, and in the belief that pension funds can also be treated as an asset. The Indian system is biased towards the organized formal sector as workers in this sector are benefitted with the provisions under various lab...

  3. Flexicurity as a measuring leakage protection of workers: between "social pollution" and "total security".

    Directory of Open Access Journals (Sweden)

    Calogero Massimo Cammalleri

    2012-01-01

    Full Text Available Was not the labour problem the same everywhere? The paper at­tempts to answer this question by proposing a re-interpretation of flexicurity through the comparison with the economic concepts of externalities and distortion of competition. After a methodological and epistemological premise, based on a multidisciplinary literature, the paper - crit­ically addresses the origins of flexicurity and argues that it lacks an archetypical definition, especially in the formulation of the EU Commission. Hence, the paper considers flexicurity as any balance between flexibility and security and, therefore, pro­poses ordering any set of contracts, providing the same balance and with the same regulatory framework, in “communities”. It is assumed, therefore, that communities can differ either in terms of a “protective” trade­-off, where the differential is not a surrogate measure of security, or in terms of an economic trade-off, where it is met by the provision of social insurance or security. One of these sets is called community 0 and it corresponds to undeclared work, not only illegal, but also completely devoid of security and fully flexible. After identifying from ILO, EU and constitutional sources the foundation of the “incompressibility” of rights which guarantee decent work, the paper likens decent work to a public good of general interest, in the same way as laws generally recognize the natural environment. On the basis of this comparative axiom, the paper proposes considering the dispersion of security produced by undeclared work as “un-decent” work and, therefore, as a form of “pollution”. The paper proposes, conversely, to define as a “total secure” environment one where there is no loss of se­curity and, therefore, a non-polluted environment. Because an environment can be little or very polluted, the paper proposes considering as social pollution any form, even legal, of security leakage - such as that induced by the

  4. Incomes and Outcomes: Social Security Disability Benefits in First-Episode Psychosis.

    Science.gov (United States)

    Rosenheck, Robert A; Estroff, Sue E; Sint, Kyaw; Lin, Haiqun; Mueser, Kim T; Robinson, Delbert G; Schooler, Nina R; Marcy, Patricia; Kane, John M

    2017-09-01

    Social Security Administration (SSA) disability benefits are an important source of income for people with psychoses and confer eligibility for health insurance. The authors examined the impact of coordinated specialty care on receipt of such benefits in first-episode psychosis, along with the correlates and consequences of receiving them. The Recovery After an Initial Schizophrenia Episode-Early Treatment Program (RAISE-ETP) study, a 34-site cluster-randomized trial, compared NAVIGATE, a coordinated specialty care program, to usual community care over 2 years. Receipt of SSA benefits and clinical outcomes were assessed at program entry and every 6 months for 2 years. Piecewise regression analysis was used to identify relative change in outcome trajectories after receipt of disability benefits. Among 399 RAISE-ETP participants, 36 (9%) were receiving SSA disability benefits at baseline; of the remainder, 124 (34.1%) obtained benefits during the 2-year study period. The NAVIGATE intervention improved quality of life, symptoms, and employment but did not significantly reduce the likelihood of receiving SSA disability benefits. Obtaining benefits was predicted by more severe psychotic symptoms and greater dysfunction and was followed by increased total income but fewer days of employment, reduced motivation (e.g., sense of purpose, greater anhedonia), and fewer days of intoxication. A 2-year coordinated specialty care intervention did not reduce receipt of SSA disability benefits. There were some advantages for those who obtained SSA disability benefits over the 2-year treatment period, but there were also some unintended adverse consequences. Providing income supports without impeding recovery remains an important policy challenge.

  5. An Undergraduate Information Security Program: More than a Curriculum

    Science.gov (United States)

    Woodward, Belle; Imboden, Thomas; Martin, Nancy L.

    2013-01-01

    This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…

  6. Risk perception and environmental health concerns in conditions of social security threat

    International Nuclear Information System (INIS)

    Kolarova, D.

    1998-01-01

    Full text of publication follows: this study explores the connection between the perception of different societal risk, health concerns and behavioral attitudes of people in condition of social security threat. Two small and two big industrial towns were chosen in order to observe the social and psychological price of the structural changes in the industry such as unemployment and its reflection on the households and the individuals' social attitudes. Key stakeholders were interviewed and questionnaire survey was carried out. The results showed high level of risk sensitivity and health concerns when people felt threatened by lack of social and economic security. The pollution was found to be important problem when it caused direct and obvious risk to human health and the environment. In the same time reverse environmental behavior like insensitiveness and neglectful attitude was observed in cases when the health consequences of the pollution were perceived to be unclear and with delayed effect. In situation of a great socio-economic threat noninvolvement helped the individuals to adapt. The research proved the influence of several risk characteristics on risk perception. It was found a connection between the risk perception and risk controllability, voluntariness of exposure and cost/benefits distribution. In the study areas respondents' judgments on these characteristics reflected directly their social status and material state. The study presented here is in progress - it i's supported by research grant from Open Society Foundation. (author)

  7. Effects of employer-sponsored health insurance costs on Social Security taxable wages.

    Science.gov (United States)

    Burtless, Gary; Milusheva, Sveta

    2013-01-01

    The increasing cost of employer contributions for employee health insurance reduces the share of compensation subject to the Social Security payroll tax. Rising insurance contributions can also have a more subtle effect on the Social Security tax base because they influence the distribution of money wages above and below the taxable maximum amount. This article uses the Medical Expenditure Panel Survey to analyze trends in employer health insurance contributions and the distribution of those costs up and down the wage distribution. Our analysis shows that employer health insurance contributions increased faster than overall compensation during 1996-2008, but such contributions grew only slightly faster among workers earning less than the taxable maximum than they did among those earning more. Because employer health insurance contributions represent a much higher percentage of compensation below the taxable maximum, health insurance cost trends exerted a disproportionate downward pressure on money wages below the taxable maximum.

  8. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  9. An integrated approach to validation of safeguards and security program performance

    International Nuclear Information System (INIS)

    Altman, W.D.; Hunt, J.S.; Hockert, J.W.

    1988-01-01

    Department of Energy (DOE) requirements for safeguards and security programs are becoming increasingly performance oriented. Master Safeguards and Security Agreemtns specify performance levels for systems protecting DOE security interests. In order to measure and validate security system performance, Lawrence Livermore National Laboratory (LLNL) has developed cost effective validation tools and a comprehensive validation approach that synthesizes information gained from different activities such as force on force exercises, limited scope performance tests, equipment testing, vulnerability analyses, and computer modeling; into an overall assessment of the performance of the protection system. The analytic approach employs logic diagrams adapted from the fault and event trees used in probabilistic risk assessment. The synthesis of the results from the various validation activities is accomplished using a method developed by LLNL, based upon Bayes' theorem

  10. Tobacco training in clinical social work graduate programs.

    Science.gov (United States)

    Kleinfelder, JoAnn; Price, James H; Dake, Joseph A; Jordan, Timothy R; Price, Joy A

    2013-08-01

    The leading cause of preventable death, in the most vulnerable segments of society, whom social workers often counsel, is cigarette smoking. The purpose of this study was to assess tobacco smoking cessation training in clinical social work programs. A valid 21-item questionnaire was sent to the entire population of 189 clinical graduate social work programs identified by the Council on Social Work Education. A three-wave mailing process was used to maximize the return rate. Directors from 112 clinical social work programs returned completed questionnaires (61 percent). The majority (91 percent) of directors reported having never thought about offering formal smoking cessation training, and only nine of the programs (8 percent) currently provided formal smoking cessation education. The three leading barriers to offering smoking cessation education were as follows: not a priority (60 percent), not enough time (55 percent), and not required by the accrediting body (41 percent). These findings indicate that clinical social work students are not receiving standardized smoking cessation education to assist in improving the well-being of their clients. The national accrediting body for graduate clinical social work programs should consider implementing guidelines for smoking cessation training in the curriculums.

  11. The social security scheme in Thailand: what lessons can be drawn?

    Science.gov (United States)

    Tangcharoensathien, V; Supachutikul, A; Lertiendumrong, J

    1999-04-01

    The Social Security Scheme was launched in 1990, covering formal sector private employees for non-work related sickness, maternity and invalidity including cash benefits and funeral grants. The scheme is financed by tripartite contributions from government, employers and employees, each of 1.5% of payroll (total of 4.5%). The scheme decided to pay health care providers, whether public or private, on a flat rate capitation basis to cover both ambulatory and inpatient care. Registration of the insured with a contractor hospital was a necessary consequence of the chosen capitation payment system. The aim of this paper is to review the operation of the scheme, and to explore the implications of capitation payment and registration for utilisation levels and provider behaviour. A key weakness of the scheme's design is suggested to be the initial decision to give employers not employees the responsibility for choosing the registered hospitals. This was done for administrative reasons, but it contributed to low levels of use of the contractor hospitals. In addition, low levels of use were also probably the result of the potential for cream skimming, cost shifting from inpatient to ambulatory care and under-provision of patient care, though since monitoring mechanisms by the Social Security Office were weak, these effects are difficult to detect conclusively. Mechanisms to improve utilisation levels were gradually introduced, such as employee choice of registered hospitals and the formation of sub-contractor networks to improve access to care. A beneficial effect of the capitation payment system was that the Social Security Fund generated substantial reserves and expenditures on sickness benefits were well stabilised. The paper ends by recommending that future policy amendments should be guided by research and empirical findings and that tougher monitoring and enforcement of quality of care standards are required.

  12. Expanding Social Security in Indonesia: the Processes and Challenges

    OpenAIRE

    Asep Suryahadi; Vita Febriany; Athia Yumna

    2014-01-01

    This paper reviews the development of social security provision in Indonesia, which has evolved from very little in its early years to the privilege of formal sector workers during the New Order period to universal coverage, at least in principle, in the current period. These changes were in line with and driven by the developments of the Indonesian economy in general, which has gone through various episodes marked by both booms and crises. There are two important milestones in the developmen...

  13. Patient protection in radiotherapy (Radio neurosurgery National Service of the Social Security Mexican Institute)

    International Nuclear Information System (INIS)

    Espiritu R, R.

    2008-12-01

    The perspective of patient protection at the Radio neurosurgery National Service of the Social Security Mexican Institute is divided into three parts: the testing program for equipment acceptance, an assurance quality program based on periodic tests, an also other assurance quality based on tests during the application. Among the technical aspects that influence in the equipment acceptance tests, it is the collimation type, the characteristics of the lineal accelerator, the platform for planning and the network type. In the case of the collimation system and the accelerator characteristics, we consider the manufacturer's specifications and requirements of Mexican Official Standard NOM-033-NUCL-1999, T echnical Specifications for the Teletherapy Units Operation, Linear Accelerators . Planning for the platform takes into account the manufacturer's specifications. In the case of computed tomography as well as review the calibration according to manufacturer's specifications should be considered the standard NOM-229-SSA1-2002. In the case of the linear accelerator must be the radiological characterization of radiation beam as part of this, the absolute dose determination. As for the periodic tests is verified the dose constancy, as well as the flattening and symmetry of X-rays beam. There are also tests battery with daily, monthly and yearly frequencies, which make up the assurance quality program. (Author)

  14. From Parent-Child Mutuality to Security to Socialization Outcomes: Developmental Cascade toward Positive Adaptation in Preadolescence

    Science.gov (United States)

    Kim, Sanghag; Boldt, Lea J.; Kochanska, Grazyna

    2016-01-01

    A developmental cascade from positive early parent-child relationship to child security with the parent to adaptive socialization outcomes, proposed in attachment theory and often implicitly accepted but rarely formally tested, was examined in 100 mothers, fathers, and children followed from toddler age to preadolescence. Parent-child Mutually Responsive Orientation (MRO) was observed in lengthy interactions at 38, 52, 67, and 80 months; children reported their security with parents at age 8. Socialization outcomes (parent- and child-reported cooperation with parental monitoring and teacher-reported school competence) were assessed at age 10. Mediation was tested with PROCESS (Hayes, 2013). The parent-child history of MRO significantly predicted both mother-child and father-child security. For mother-child dyads, security mediated links between history of MRO and cooperation with maternal monitoring and school competence, controlling for developmental continuity of the studied constructs. For father-child dyads, the mediation effect was not evident. PMID:26258443

  15. 26 CFR 1.31-2 - Credit for “special refunds” of employee social security tax.

    Science.gov (United States)

    2010-04-01

    ... security tax. 1.31-2 Section 1.31-2 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY INCOME TAX INCOME TAXES Credits Against Tax § 1.31-2 Credit for “special refunds” of employee social security tax. (a) In general. (1) In the case of an employee receiving wages from more than one employer...

  16. The Importance of the Brain Neuro-Programming Technologies in National and Regional Security

    Directory of Open Access Journals (Sweden)

    Vasyl H. Fatkhutdinov

    2018-02-01

    Full Text Available The authors’ understanding of neuro-programming is the result of the impact on the human brain of information and communication technology (including educational one, through which in the human brain the programs of manifestation in the ontogenesis of internal creative potentials are written. This article summarizes the history of the formation of key neuro-programming technologies of the human brain as well as proves that the changes in the society’s worldview are caused by the possibilities and quality of neuro-programming technologies that society uses. Having influence over worldview stereotypes and behaviour set by the society, neuro-programming technologies essentially ensure the national security of any state and the peaceful coexistence of states in the regions and on the planet as a whole. Using historical and philosophical methods, methods of conceptualization, systematization, modeling, etc., the authors have come to the conclusion that the modern world lies in a confrontation of security strategies, in which neuro-programming technologies play a key role.

  17. An improved smartcard for the South African Social Security Agency (SASSA): A proof of life based solution

    CSIR Research Space (South Africa)

    Mthethwa, Sthembile

    2016-12-01

    Full Text Available Conference on Information Science and Security, Pattaya, Thailand, 19 - 22 December 2016 An improved smartcard for the South African Social Security Agency (SASSA): A proof of life based solution Mthethwa, S. Barbour, G. Thinyane, M...

  18. Infant nutrition in Saskatoon: barriers to infant food security.

    Science.gov (United States)

    Partyka, Brendine; Whiting, Susan; Grunerud, Deanna; Archibald, Karen; Quennell, Kara

    2010-01-01

    We explored infant nutrition in Saskatoon by assessing current accessibility to all forms of infant nourishment, investigating challenges in terms of access to infant nutrition, and determining the use and effectiveness of infant nutrition programs and services. We also examined recommendations to improve infant food security in Saskatoon. Semi-structured community focus groups and stakeholder interviews were conducted between June 2006 and August 2006. Thematic analysis was used to identify themes related to infant feeding practices and barriers, as well as recommendations to improve infant food security in Saskatoon. Our study showed that infant food security is a concern among lower-income families in Saskatoon. Barriers that limited breastfeeding sustainability or nourishing infants through other means included knowledge of feeding practices, lack of breastfeeding support, access and affordability of infant formula, transportation, and poverty. Infant nutrition and food security should be improved by expanding education and programming opportunities, increasing breastfeeding support, and identifying acceptable ways to provide emergency formula. If infant food security is to be addressed successfully, discussion and change must occur in social policy and family food security contexts.

  19. 78 FR 1275 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-01-08

    ... Social Security Administration (Computer Matching Agreement 1071). SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection Act of... of its new computer matching program with the Social Security Administration (SSA). DATES: OPM will...

  20. Social Security and divorce or death benefits storyboard (S(2)D(2)BS): an interactive participant learning exercise.

    Science.gov (United States)

    Brown, Pamela Pitman

    2014-01-01

    Using the concept of an interactive or living storyboard, the author discusses the use of seven case narratives constructed for the sole purpose of teaching introductory gerontology or geriatric students about the distribution of Social Security benefits after spousal death. Additional information is included pertaining to Social Security benefits payable to divorced persons after the death of the former spouse, including the status of married same-sex couples. Narratives include representations of a male breadwinner model couple, a two-earner couple who have similar/dissimilar earnings prior to retirement, a divorced couple with a remarriage after a death, a gay couple with and without children, and a female primary breadwinner couple. Updated information from the Social Security Administration, as well as information on game preparation, scripts, and debriefing questions are included.

  1. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  2. The Societal Security Standardization Promotes Social Management Sdentification——Interview with Wang Zhongmin, President of CNIS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    China Standardization:In February 2011,President Hu Jintao gave an important speech on the opening ceremony of the seminar of social management and its innovation for provincial and ministerial level leaders,stressing that the scientific level of social management must be raised and building a social management system with Chinese socialism charactetistics.Would you please talk about the role of the societal security standardization in improving the scientific social manageraent?

  3. Career Obsolescence and Social Security: Emerging Education Policy Issues in Law.

    Science.gov (United States)

    Sandow, Stuart A.

    This document is the second in a series of studies designed to examine the legal aspects of various potential educational problems in our society. This particular study deals with the case of a highly trained aerospace technician who sues the social security trust for loan benefits, arguing that he is economically disabled and has been retired by…

  4. National Security in the Nuclear Age. A Conference for State Social Studies Coordinators on Pre-Collegiate National Security Education (Washington, DC, June 26-July 1, 1983).

    Science.gov (United States)

    Trout, B. Thomas; And Others

    This conference report addresses education on national security and international relations in secondary school courses in the social studies. Main conclusions of the conference are: (1) Topics on national security should be added to the secondary school curriculum. (2) Current institutional and instructional settings are open to inclusion of…

  5. The security analyzer, a security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.; Carlson, R.L.

    1987-01-01

    A technique has been developed to characterize a nuclear facility and measure the strengths and weaknesses of the physical protection system. It utilizes the artificial intelligence capabilities available in the prolog programming language to probe a facility's defenses and find potential attack paths that meet designated search criteria. As sensors or barriers become inactive due to maintenance, failure, or inclement weather conditions, the protection system can rapidly be reanalyzed to discover weaknesses that would need to be strengthened by alternative means. Conversely, proposed upgrades and enhancements can be easily entered into the database and their effect measured against a variety of potential adversary attacks. Thus the security analyzer is a tool that aids the protection planner as well as the protection operations staff

  6. Yearly Data for Spoken Language Preferences of Social Security Disability Insurance Claimants (2011-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits for federal fiscal years...

  7. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  8. Unionism, the Decision-Making Process and Social Security Reform in Brazil

    Directory of Open Access Journals (Sweden)

    Sidney Jard da Silva

    2016-08-01

    Full Text Available Despite the vast literature on social security reform there are relatively few studies that analyze the participation of representatives coming from the union movement in the decision-making process. This article aims to fill part of that gap in Brazilian academic production on unionism and public policy. In situations in which unionist representatives support the ruling party, does the union bloc tend to defend the specific interests of their base of social representation or to follow the guidance of the party coalition of which they are part? The study addresses this research problemby analyzing the participation of the union bloc in the decision-making process of a social security reform, Proposal of Amendment to the Constitution, Article 40 (PEC 40, during the first term of Luiz Inácio Lula da Silva's government. The main findings of the study confirm the thesis of party predominance. In an institutional political scenario in which party discipline prevails, unionist representatives and senators tend to follow the guidance of the party coalition even under contrary pressures from their electoral base. The research sheds light on the relations involved between the Executive and Legislative branches, in the process of changing public policy, in which a government considered to be allied imposes losses for specific sectors of the union base, notably the active and inactive public servants of the federal government, states and municipalities.

  9. Social Security Reform and Population Ageing in a Two-Sector Growth Model

    NARCIS (Netherlands)

    van Groezen, B.J.A.M.; Meijdam, A.C.; Verbon, H.A.A.

    2002-01-01

    This paper analyses the effects of reducing unfunded social security and population ageing on economic growth and welfare, both for a small open economy and for a closed economy.The economy consists of a service sector and a commodity sector.Productivity growth only occurs in the latter sector and

  10. Social security reform in a dynastic life-cycle model with endogenous fertility

    Czech Academy of Sciences Publication Activity Database

    Boháček, Radim; Belush, Volha

    -, č. 381 (2009), s. 1-51 ISSN 1211-3298 R&D Projects: GA AV ČR IAA700850702 Institutional research plan: CEZ:AV0Z70850503 Keywords : fertility * social security * fiscal policy * public expenditures * taxation Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp381.pdf

  11. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, D.

    2005-01-01

    Full text: In support of United States Government (USG) and International Atomic Energy Agency (IAEA) nuclear security programs, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been developed and implemented as the basis for a performance-based methodology for the design and evaluation of physical protection systems against a design basis threat (DBT) for theft and sabotage of nuclear and/or radiological materials. Integrated systems must include technology, people, and the man-machine interface. A critical aspect of the human element is training on the systems-approach for all the stakeholders in nuclear security. Current training courses and workshops have been very beneficial but are still rather limited in scope. SNL has developed two primary international classes - the international training course on the physical protection of nuclear facilities and materials, and the design basis threat methodology workshop. SNL is also completing the development of three new courses that will be offered and presented in the near term. They are vital area identification methodology focused on nuclear power plants to aid in their protection against radiological sabotage, insider threat analysis methodology and protection schemes, and security foundations for competent authority and facility operator stakeholders who are not security professionals. In the long term, we envision a comprehensive nuclear security curriculum that spans policy and technology, regulators and operators, introductory and expert levels, classroom and laboratory/field, and local and offsite training options. This training curriculum will be developed in concert with a nuclear security series of guidance documents that is expected to be forthcoming from the IAEA. It is important to note that while appropriate implementation of systems based on such training and documentation can improve the risk reduction, such a

  12. Radiological Threat Reduction (RTR) program: implementing physical security to protect large radioactive sources worldwide

    International Nuclear Information System (INIS)

    Lowe, Daniel L.

    2004-01-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security

  13. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  14. AspectKE*:Security Aspects with Program Analysis for Distributed Systems

    DEFF Research Database (Denmark)

    2010-01-01

    AspectKE* is the first distributed AOP language based on a tuple space system. It is designed to enforce security policies to applications containing untrusted processes. One of the key features is the high-level predicates that extract results of static program analysis. These predicates provide...

  15. A blueprint for social security reform: a report by the National Council of Welfare

    National Research Council Canada - National Science Library

    1994-01-01

    This report is a first response to the discussion paper entitled, 'Improving Social Security in Canada' which was tabled in Parliament on October 5, 1994 by the Minister of Human Resources Development...

  16. Social security reform and population ageing in a two-sector growth model

    NARCIS (Netherlands)

    Groezen, Bas van; Meijdam, L.; Verbon, H.

    2002-01-01

    This paper analyses the e¤ects of reducing unfunded social security and population ageing on economic growth and welfare, both for a small open economy and for a closed economy. The economy consists of a service sector and a commodity sector. Productivity growth only occurs in the latter sector

  17. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  18. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  19. 78 FR 35945 - Request for Comments on Security Training Programs for Surface Mode Employees

    Science.gov (United States)

    2013-06-14

    ... million for training projects. Similarly, under the Intercity Bus Security Grant Program (IBSGP), which... related to the security elements in Table 1, per employee? (Please indicate whether this includes travel... on the size and scope of the exercise, including the phases of an exercise, travel expenses for...

  20. [A critical evaluation of food programs in Argentina].

    Science.gov (United States)

    Abeyá Gilardon, Enrique O

    2016-01-01

    Argentina has an over 60-year history of food programs which have received few to no evaluations, even considering the highly important epidemiological and social changes that have occurred in the target population. In this article, nationwide State-run food programs with the objective of contributing to the food security of the families in greatest need are reviewed, the nutritional situation of the target population is reassessed, and arguments for analyzing current programs using a typology based in the components of food security are proposed. A general review of the conceptions, content and reach of food programs should be carried out, in order for these programs to cease to act as mere social assistance and instead be transformed in bearers of the right to better food and nutrition.

  1. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  2. Evaluation of factors influencing patient satisfaction in social security hospitals in Mazandaran province, North of Iran.

    Science.gov (United States)

    Jafari Kelarijani, Seyed Ebrahim; Jamshidi, Reza; Heidarian, Ali Reza; Khorshidi, Mohamad

    2014-01-01

    Patient satisfaction is affected by hospital services and may have an effect on the cultural, social and personal conditions of the people living in the region. This research aimed to evaluate the patient satisfaction in social security hospitals in Mazandaran province. From Spring 2012 to Summer 2013, all patients admitted to social security hospitals in Mazandaran province were entered in the study. Data regarding to inhabitation, sex, income and patients' educational level and satisfaction with the hospital services were collected. Seven hundred seventy-six patients with mean age of 47.35±7.41 years were analyzed. Patient's inhabitant, educational attainment and income level had a significant relationship with patient satisfaction level (ppatients' gender. The results show that the patient's inhabitant, educational and income level are related to attain patients' satisfaction.

  3. Cyber Security as Social Experiment

    NARCIS (Netherlands)

    Pieters, Wolter; Hadziosmanovic, D.; Dechesne, Francien

    2014-01-01

    Lessons from previous experiences are often overlooked when deploying security-sensitive technology in the real world. At the same time, security assessments often suffer from a lack of real-world data. This appears similar to general problems in technology assessment, where knowledge about

  4. The Security of Organizations and Individuals in Online Social Networks

    OpenAIRE

    Elyashar, Aviad

    2016-01-01

    The serious privacy and security problems related to online social networks (OSNs) are what fueled two complementary studies as part of this thesis. In the first study, we developed a general algorithm for the mining of data of targeted organizations by using Facebook (currently the most popular OSN) and socialbots. By friending employees in a targeted organization, our active socialbots were able to find new employees and informal organizational links that we could not find by crawling with ...

  5. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    Science.gov (United States)

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  6. [Demographic aging and social security. The insufficiency of old age pensions].

    Science.gov (United States)

    Ham Chande, R

    1993-01-01

    The demographic transition is leading to demographic aging in Mexico, as lower fertility and greater life expectancy combine to produce absolute and percentage increases in the elderly population. Concern is growing about satisfying the material needs of the elderly population. Only a few developed countries are able to furnish adequate pensions to their retired workers through social security systems. In Mexico, class inequity is a greater determinant of the level of pension coverage than is generational solidarity. Mexico's 1990 census showed that the population of 81,250,000 was comprised of 24,517,000 economically active and 56,733,000 inactive persons. Of the 24,517,000 economically active, 7,282,000 mostly lower level employees and laborers were affiliated only with the Mexican Institute of Social Security (IMSS). 2,308,000 were covered by the IMSS and one of the complementary pension systems sponsored by the largest and most organized private companies. 2,629,000 were entitled to pensions through public sector employment and 584,000 through quasipublic employment. The remaining 11,571,000 had no rights to a pension. In other words, 47% of the labor force was not covered by any retirement pension system. 375,000 of the 5,007,000 persons over age 60 in the economically inactive population had some sort of pension from the IMSS. In 1990, 92% received the minimum pension, equivalent to 70% of the minimum salary. 229,000 had an IMSS pension and a complementary private pension. 196,000 pensioners in the public sector received an average pension of 1.5 times the minimum salary. 66,000 retired workers in quasipublic enterprises received pensions with automatic adjustments for inflation that frequently equaled 20 times the minimum salary. The total number of recipients of pensions of all types was 888,000,leaving 4,119,000 persons over 60 with no pension. Because of the deficiencies of the social security system, families must continue to be the institution that aids

  7. Quarterly Data for Spoken Language Preferences of Social Security Retirement and Survivor Claimants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for Retirement and Survivor benefits from fiscal...

  8. Quarterly Data for Spoken Language Preferences of Social Security Retirement and Survivor Claimants (2014-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for Retirement and Survivor benefits for fiscal...

  9. Environmental security as related to scale mismatches of disturbance patterns in a panarchy of social-ecological landscapes

    Science.gov (United States)

    Giovanni Zurlini; Irene Petrosillo; Nicola Zaccarelli; Kurt Riitters

    2008-01-01

    Environmental security, as the opposite of environmental fragility (vulnerability), is multilayered, multi-scale and complex, existing in both the objective realm of biophysics and society, and the subjective realm of individual human perception. For ecological risk assessments (ERAs), the relevant objects of environmental security are social-ecological landscapes (...

  10. Symptom validity issues in the psychological consultative examination for social security disability.

    Science.gov (United States)

    Chafetz, Michael D

    2010-08-01

    This article is about Social Security Administration (SSA) policy with regard to the Psychological Consultative Examination (PCE) for Social Security Disability, particularly with respect to validation of the responses and findings. First, the nature of the consultation and the importance of understanding the boundaries and ethics of the psychologist's role are described. Issues particular to working with low-functioning claimants usually form a large part of these examinations. The psychologist must understand various forms of non-credible behavior during the PCE, and how malingering might be considered among other non-credible presentations. Issues pertaining to symptom validity testing in low-functioning claimants are further explored. SSA policy with respect to symptom validity testing is carefully examined, with an attempt to answer specific concerns and show how psychological science can be of assistance, particularly with evidence-based practice. Additionally, the nature and importance of techniques to avoid the mislabeling of claimants as malingerers are examined. SSA requires the use of accepted diagnostic techniques with which to establish impairment, and this article describes the implementation of that requirement, particularly with respect to validating the findings.

  11. Extracting classification rules from an informatic security incidents repository by genetic programming

    Directory of Open Access Journals (Sweden)

    Carlos Javier Carvajal Montealegre

    2015-04-01

    Full Text Available This paper describes the data mining process to obtain classification rules over an information security incident data collection, explaining in detail the use of genetic programming as a mean to model the incidents behavior and representing such rules as decision trees. The described mining process includes several tasks, such as the GP (Genetic Programming approach evaluation, the individual's representation and the algorithm parameters tuning to upgrade the performance. The paper concludes with the result analysis and the description of the rules obtained, suggesting measures to avoid the occurrence of new informatics attacks. This paper is a part of the thesis work degree: Information Security Incident Analytics by Data Mining for Behavioral Modeling and Pattern Recognition (Carvajal, 2012.

  12. Social security reform in Central and Eastern Europe: variations on a Latin American theme.

    Science.gov (United States)

    Kritzer, B E

    After Chile reformed its social security system in 1981, several other Latin American countries and certain Central and Eastern European (CEE) countries implemented the Chilean model, with some variations: either a single- or multitier system, or with a period of transition to take care of those in the labor force at the time of the change. The single-tier version consists of individual accounts in pension fund management companies. Multi-tier systems retain some form of public program and add mandatory individual accounts. Most of the CEE countries did not want to incur the high transition costs associated with the Chilean model. The switch to a market economy had already strained their economies. Also, the countries' desire to adopt the European Union's Euro as their currency--a move that required a specific debt ceiling--limited the amount of additional debt they could incur. This article describes the CEE reforms and makes some comparisons with the Latin American experience. Most of the CEE countries have chosen a mixed system and have restructured the pay-as-you-go (PAYGO) tier, while the Latin American countries have both single- and multi-tier systems. Some CEE countries have set up notional defined contribution (NDC) schemes for the PAYGO tier in which each insured person has a hypothetical account made up of all contributions during his or her working life. Survivors and disability programs in CEE have remained in the public tier, but in most of the Latin American programs the insured must purchase a separate insurance policy. Issues common to both regions include: Administrative costs are high and competition is keen, which has led to consolidation and mergers among the companies and a large market share controlled by a few companies. Benefits are proportionately lower for women than for men. A large, informal sector is not covered by social security. This sector is apparently much larger in Latin America than in the CEE countries. Issues that are unique

  13. Does Maternal Employment Influence Poor Children's Social Development?

    Science.gov (United States)

    Fuller, Bruce; Caspary, Gretchen; Kagan, Sharon Lynn; Gauthier, Christiane; Hnang, Danny Shih-Cheng; Carroll, Judith; McCarthy, Jan

    2002-01-01

    This study examined the relation between young children's social development and maternal employment among women who entered welfare-to-work programs. Structural equation models provided evidence that indicators of economic security, such as food security and job quality indicators, but not recent employment per se, operated through parenting…

  14. The welfare state, pensions, privatization: the case of Social Security in the United States.

    Science.gov (United States)

    Du Boff, R B

    1997-01-01

    In all high-income nations, the welfare state is under challenge, with particular concern voiced about the burden of retirement pensions on the public fisc and on younger workers. The strongest drive against social insurance is taking place in the United States, which has less of it than other nations and appears to be in the best position to meet future entitlement claims. In this article, the author examines the liabilities that the U.S. Social Security system is likely to incur over the next 35 years and finds that there is little danger that the system will fall into insolvency. Privatizing Social Security is not necessary to assure the integrity of future pension benefits. Furthermore, the cost-benefit ratio of privatization appears to be unfavorable, as borne out by the mandatory private pension plan in effect in Chile. Some wealthy nations will face greater demographic strains than the United States, but all need to retain the welfare state as a foundation for future changes in the world of work.

  15. Social support and marginalization as determinants of prenatal care in women with social security in Mexico.

    Science.gov (United States)

    Maldonado-Cisneros, Maritza; Medina-Gómez, Oswaldo Sinoe

    2018-01-01

    Prenatal care ensures favorable results for maternal-fetal health and, to that end, it must be provided early, periodically, comprehensively and with high coverage. To find out the social determinants of prenatal care in women affiliated to the Mexican Institute of Social Security during 2014. Cross-sectional study where the association of social conditions, social support and family functioning with inadequate prenatal care was analyzed. A descriptive analysis was performed; hypothesis tests were used with chi-square (95% level of confidence). The prevalence ratio and Mann-Whitney's U-test were estimated to compare medians and logistic regression. Of the interviewed women, 58.1% had inadequate prenatal care, mainly associated with unplanned pregnancy, poor social support, low level of education and higher marginalization. Not having leaves of absence granted by employers was the main barrier in those women who did not attend health services. There is a need for strategies to be designed and implemented to enable understanding the interaction between different biological and social dimensions of the health-disease process and reduce health inequities that affect pregnant women, in order to achieve good prenatal care and to implement alternative models guaranteeing its efficiency. Copyright: © 2018 SecretarÍa de Salud.

  16. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  17. Understanding social media program usage in public transit agencies

    Directory of Open Access Journals (Sweden)

    Jenny H. Liu

    2016-10-01

    Full Text Available Social media has been gaining prominence in public transit agencies in their communication strategies and daily management. This study aims to better understand recent trends in social media usage in public transit agencies, to examine which agencies use what kind of social media programs for what purposes, and how they measure their programs. A survey was conducted of the top transit agencies in the nation, and results are examined through descriptive statistical analysis, correlation analysis and regression modeling. We found that while most agencies still lack clearly-defined goals and performance metrics to guide their social media development, many are increasing their social media capacity with more structural components. Public transit service usage and the level of transit service provision are the most significant determinants of agencies’ social media programming and resource investments. In contrast, the measurement of social media usage and outcomes is more significantly related to city attributes and demographic characteristics. We anticipate an increase in the usage of social media to convey transit related stories and livability benefits, such as environmental sensitivity or safety improvements, as these programs expand. Public transit agencies’ commitment to measuring social media outcomes underscores the future research need to develop best practices for measuring the impacts and performance of social media communications and investments.

  18. An investigation into users' information security awareness on social networks in south western Nigeria

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2016-11-01

    Full Text Available Background: Social networks (SNs offer new and exciting opportunities for interaction among people, cutting across different stratum of the society and providing a ubiquitous mechanism that supports a wide variety of activities. They are at the same time being exploited by criminals to fraudulently obtain information from unsuspecting users. Unfortunately, the seamless communication and semblance of safety assumed by most users make them oblivious to the potential online dangers. Objective: Using quantitative methods on selected social sites, this study empirically examined the information security awareness of SN users in south western Nigeria. Method: A self-designed research instrument was administered for data collection while descriptive and inferential statistics were employed using chi-square, cross-tabulation and t-test for data analysis and result interpretation. Result: Findings from the analysed data suggest that the risk perception vary among male and female SN users and that the general perception of risks regarding SN usage is also very low. Conclusion: Adequate security awareness coupled with detailed legal measures are required to keep SNs secured. However, an individual is duly responsible for the habit of ignoring potential risks posed by the networks.

  19. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

    Science.gov (United States)

    2016-04-21

    Sensitive Compartmented Information ( SCI ) References: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive (DoDD...collateral, special access program, SCI , and controlled unclassified information (CUI) within an overarching DoD Information Security Program...use, and dissemination of SCI within the DoD pursuant to References (a), (c), and (e) and Executive Order 12333 (Reference (h)). 2

  20. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution