WorldWideScience

Sample records for social services security

  1. Social Security Number Verification Service (SSNVS)

    Data.gov (United States)

    Social Security Administration — SSNVS is a service offered by SSA's Business Services Online (BSO). It is used by employers and certain third-party submitters to verify the accuracy of the names...

  2. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  3. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  4. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.

    Science.gov (United States)

    Wu, Jun; Su, Zhou; Wang, Shen; Li, Jianhua

    2017-07-30

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on "friend" relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  5. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    Directory of Open Access Journals (Sweden)

    Jun Wu

    2017-07-01

    Full Text Available Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  6. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    Science.gov (United States)

    Wu, Jun; Su, Zhou; Li, Jianhua

    2017-01-01

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems. PMID:28758943

  7. 20 CFR 404.1402 - When are railroad industry services by a non-vested worker covered under Social Security?

    Science.gov (United States)

    2010-04-01

    ...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...

  8. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  9. Behavioral analysis of use personal service e-balance Indonesian social security

    Science.gov (United States)

    Wang, Gunawan; Fitriani, Novi; Nurul Fajar, Ahmad

    2017-09-01

    Indonesian Social Security is the one of the government agencies that is trusted to organize social security. With help of Information technology that growing these day, Indonesian Social Security is also developing E-Balance application, where previously all activities for checking balance is done by giving their slip details through the nearest branch to be distributed to each company. So far there is no research that reviewing e-Balance. Hence, the authors is interested to do research related factors that influence the behavior of the use of E-Balance Indonesian Social Security in the Jakarta area and model that can describe those factors Authors distributing questioners to 193 respondents and perform data processing. The result of this study is to know the factors that influence the behavior of use Personal Service E-Balance Indonesian Social Security and model that can describe those factors. The result shows that UTAUT 2 model is not match with this research and need to be enhanced. After enhancement, there are 3 factors that being significant. Such as Behavioral Intention, Effort Expectancy and Social Influence while the others are not supported and need to be customize.

  10. 20 CFR 410.686b - Fee for services performed for an individual before the Social Security Administration.

    Science.gov (United States)

    2010-04-01

    ... Representation of Parties § 410.686b Fee for services performed for an individual before the Social Security... person or in writing; (ii) There was a death or serious illness in the individual's family; (iii...

  11. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  12. Oral health service utilization by elderly beneficiaries of the Mexican Institute of Social Security in México city

    Directory of Open Access Journals (Sweden)

    Solórzano-Santos Fortino

    2007-12-01

    Full Text Available Abstract Background The aging population poses a challenge to Mexican health services. The aim of this study is to describe recent oral health services utilization and its association with socio-demographic characteristics and co-morbidity in Mexican Social Security beneficiaries 60 years and older. Methods A sample of 700 individuals aged 60+ years was randomly chosen from the databases of the Mexican Institute of Social Security (IMSS. These participants resided in the southwest of Mexico City and made up the final sample of a cohort study for identifying risk factors for root caries in elderly patients. Sociodemographic variables, presence of cognitive decline, depression, morbidity, medication consumption, and utilization of as well as reasons for seeking oral health services within the past 12 months were collected through a questionnaire. Clinical oral assessments were carried out to determine coronal and root caries experience. Results The sample consisted of 698 individuals aged 71.6 years on average, of whom 68.3% were women. 374 participants (53.6% had made use of oral health services within the past 12 months. 81% of those who used oral health services sought private medical care, 12.8% sought social security services, and 6.2% public health services. 99.7% had experienced coronal caries and 44.0% root caries. Female sex (OR = 2.0, 6 years' schooling or less (OR = 1.4, and caries experience in more than 22 teeth (OR = 0.6 are factors associated with the utilization of these services. Conclusion About half the elderly beneficiaries of social security have made use of oral health services within the past 12 months, and many of them have to use private services. Being a woman, having little schooling, and low caries experience are factors associated with the use of these services.

  13. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  14. Social climate along the pathway of care in women's secure mental health service: variation with level of security, patient motivation, therapeutic alliance and level of disturbance.

    Science.gov (United States)

    Long, C G; Anagnostakis, K; Fox, E; Silaule, P; Somers, J; West, R; Webster, A

    2011-07-01

    Social climate has been measured in a variety of therapeutic settings, but there is little information about it in secure mental health services, or how it may vary along a gender specific care pathway. To assess social climate in women's secure wards and its variation by level of security and ward type, therapeutic alliance, patient motivation, treatment engagement and disturbed behaviour. Three-quarters (80, 76%) of staff and nearly all (65, 92%) of patients in the two medium-security wards and two low-security wards that comprised the unit completed the Essen Climate Evaluation Schema (EssenCES) and the California Psychotherapy Alliance Scale (CALPAS); patients also completed the Patient Motivation Inventory (PMI). Pre-assessment levels of disturbed behaviour and treatment engagement were recorded. Social climate varied according to ward type and level of security. EssenCES ratings indicative of positive social climate were associated with lower levels of security; such ratings were also associated with lower behavioural disturbance and with higher levels of motivation, treatment engagement and therapeutic alliance. This serial cross-sectional survey indicated that use of the EssenCES alone might be a good practical measure of treatment progress/responsivity. A longitudinal study would be an important next step in establishing the extent to which it would be useful in this regard. Copyright © 2010 John Wiley & Sons, Ltd.

  15. User-Centric Secure Cross-Site Interaction Framework for Online Social Networking Services

    Science.gov (United States)

    Ko, Moo Nam

    2011-01-01

    Social networking service is one of major technological phenomena on Web 2.0. Hundreds of millions of users are posting message, photos, and videos on their profiles and interacting with other users, but the sharing and interaction are limited within the same social networking site. Although users can share some content on a social networking site…

  16. Patient protection in radiotherapy (Radio neurosurgery National Service of the Social Security Mexican Institute)

    International Nuclear Information System (INIS)

    Espiritu R, R.

    2008-12-01

    The perspective of patient protection at the Radio neurosurgery National Service of the Social Security Mexican Institute is divided into three parts: the testing program for equipment acceptance, an assurance quality program based on periodic tests, an also other assurance quality based on tests during the application. Among the technical aspects that influence in the equipment acceptance tests, it is the collimation type, the characteristics of the lineal accelerator, the platform for planning and the network type. In the case of the collimation system and the accelerator characteristics, we consider the manufacturer's specifications and requirements of Mexican Official Standard NOM-033-NUCL-1999, T echnical Specifications for the Teletherapy Units Operation, Linear Accelerators . Planning for the platform takes into account the manufacturer's specifications. In the case of computed tomography as well as review the calibration according to manufacturer's specifications should be considered the standard NOM-229-SSA1-2002. In the case of the linear accelerator must be the radiological characterization of radiation beam as part of this, the absolute dose determination. As for the periodic tests is verified the dose constancy, as well as the flattening and symmetry of X-rays beam. There are also tests battery with daily, monthly and yearly frequencies, which make up the assurance quality program. (Author)

  17. 78 FR 56266 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2013-09-12

    ... developed CBSV as a user- friendly, internet-based application with safeguards that protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to users in a secure manner, CBSV provides us with cost and workload management benefits. New Information...

  18. 76 FR 60112 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2011-09-28

    ... protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to the business community in a secure manner, CBSV provides us with cost and workload management benefits. New Information: To use CBSV, interested parties must pay a one- time non-refundable...

  19. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  20. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  1. eHealth in Belgium, a new "secure" federal network: role of patients, health professions and social security services.

    Science.gov (United States)

    France, Francis Roger

    2011-02-01

    eHealth platform is the official federal network in Belgium (created by law on 21 August 2008) devoted to a secure exchange of health data in many types of applications, such as health care purposes, simplification of administrative procedures and contribution to health policy. It implies a controlled access to decentralized databases and uses encrypted personal data. The national identification number has been chosen in order to authenticate the requester, the patient, and the receiver of information exchange. Authorizations have to be respected in order to obtain personal health data. Several questions are raised about its security: the lack of mandatory request for systematic journaling on accesses to the electronic patient record as well as the absence of explicit procedures for sanctions in case of unauthorized access, the new role of social security administration in managing security where a eHealth manager can be both judge and party (in the function of trusted third party for health data encryption and of a required lawyer for texts proposed by physicians to the Commission for the protection of private life). Another critic concerns the number of physicians in minority and the absence of patients' delegates in the eHealth Board. At a time when the patient is becoming a partner in the care team, should not he be the gate-keeper for the access to his own health record? How could networks help him to get the appropriate knowledge to contribute to care and to write his testament of life? Recent laws (on private life, patient rights and euthanasia) have contributed to a behavioural change in citizens and physician attitudes. Recommendations are made in order to improve the acceptability of eHealth platform. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  2. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  3. Women and social security

    NARCIS (Netherlands)

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  4. Elements of social security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security is a comparative study of important elements of the social security systems in Denmark (DK), Sweden (S), Finland (FIN), Austria (A), Germany (D), the Netherlands (NL), Great Britain (GB) and Canada (CAN). It should be emphasized that Germany is the former West Germany...... (Alte Länder). This is the 9th and last edition of the publication,covering income levels and rules for social security and personal taxation for 1999. Basis for the projections to 1999 income levels is the 1998 data (in some cases 1999 data)for OECD's Taxing Wages as reported by national experts....

  5. [Direct service costs of diabetes mellitus hospitalisations in the Mexican Institute of Social Security].

    Science.gov (United States)

    Salas-Zapata, Leonardo; Palacio-Mejía, Lina Sofía; Aracena-Genao, Belkis; Hernández-Ávila, Juan Eugenio; Nieto-López, Emmanuel Salvador

    To estimate the direct costs related to hospitalizations for diabetes mellitus and its complications in the Mexican Institute of Social Security METHODS: The hospital care costs of patients with diabetes mellitus using diagnosis-related groups in the IMSS (Mexican Institute of Social Security) and the hospital discharges from the corresponding E10-E14 codes for diabetes mellitus were estimated between 2008-2013. Costs were grouped according to demographic characteristics and main condition, and were estimated in US dollars in 2013. 411,302 diabetes mellitus discharges were recorded, representing a cost of $1,563 million. 52.44% of hospital discharges were men and 77.26% were for type 2 diabetes mellitus. The biggest cost was attributed to peripheral circulatory complications (34.84%) and people from 45-64 years of age (47.1%). Discharges decreased by 3.84% and total costs by 1.75% in the period analysed. The complications that caused the biggest cost variations were ketoacidosis (50.7%), ophthalmic (22.6%) and circulatory (18.81%). Hospital care for diabetes mellitus represents an important financial challenge for the IMSS. The increase in the frequency of hospitalisations in the productive age group, which affects society as a whole, is an even bigger challenge, and suggests the need to strengthen monitoring of diabetics in order to prevent complications that require hospital care. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  6. Social Influence for Security

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2014-08-01

    Full Text Available The main aim of this work marks the reveling of scientific premises intended to structure the issue of social influence for security. The approach has as aim the identification of those elements that define and characterize the social influence in order to manage conflict, from the perspective of public communication. The proposed approach establishes some synthetic, clear boundaries through the method of research and analysis of the concept of security, social influence, revealing the specifics of public communication in conflict management.

  7. Security Techniques for Prevention of Rank Manipulation in Social Tagging Services including Robotic Domains

    Directory of Open Access Journals (Sweden)

    Okkyung Choi

    2014-01-01

    Full Text Available With smartphone distribution becoming common and robotic applications on the rise, social tagging services for various applications including robotic domains have advanced significantly. Though social tagging plays an important role when users are finding the exact information through web search, reliability and semantic relation between web contents and tags are not considered. Spams are making ill use of this aspect and put irrelevant tags deliberately on contents and induce users to advertise contents when they click items of search results. Therefore, this study proposes a detection method for tag-ranking manipulation to solve the problem of the existing methods which cannot guarantee the reliability of tagging. Similarity is measured for ranking the grade of registered tag on the contents, and weighted values of each tag are measured by means of synonym relevance, frequency, and semantic distances between tags. Lastly, experimental evaluation results are provided and its efficiency and accuracy are verified through them.

  8. Security techniques for prevention of rank manipulation in social tagging services including robotic domains.

    Science.gov (United States)

    Choi, Okkyung; Jung, Hanyoung; Moon, Seungbin

    2014-01-01

    With smartphone distribution becoming common and robotic applications on the rise, social tagging services for various applications including robotic domains have advanced significantly. Though social tagging plays an important role when users are finding the exact information through web search, reliability and semantic relation between web contents and tags are not considered. Spams are making ill use of this aspect and put irrelevant tags deliberately on contents and induce users to advertise contents when they click items of search results. Therefore, this study proposes a detection method for tag-ranking manipulation to solve the problem of the existing methods which cannot guarantee the reliability of tagging. Similarity is measured for ranking the grade of registered tag on the contents, and weighted values of each tag are measured by means of synonym relevance, frequency, and semantic distances between tags. Lastly, experimental evaluation results are provided and its efficiency and accuracy are verified through them.

  9. Legal and regulatory aspects of optimization comprehensive support service and combat activity of the Security service of Ukraine and the National guard of Ukraine emergency social situation

    Directory of Open Access Journals (Sweden)

    В. В. Мацюк

    2015-05-01

    Full Text Available Problem setting. The status of comprehensive support of military units in the world’s leading powers is considered to be one of the key factors which defines the success of the social emergency settling operations. The experience of service and military application of the National Guard of Ukraine in the anti-terrorist operation zone on the South-East of Ukraine shows that emergency response tasks are generally carried out in cooperation with other Ukrainian security sector authorities, mostly with the Security Service of Ukraine. However, the forces joint managing authority chiefs usually do not cover the matter of such activities’ comprehensive support, which forces the commanders of the military units to rely on themselves in this question. Recent research and publications analysis. The analysis of research of status and development prospects of the comprehensive support of the Armed Forces of Ukraine, other security authorities, armies of the world’s leading powers, peculiarities of creation and functioning of such systems, application of their means and powers, scientific thought on the problems of service and military application of the National Guard units has shown the problematic tasks of the joint unit comprehensive support system optimization. Therefore, the question of regulatory and legal support of this process is of current importance. Paper objective. The objective of this paper is to define regulatory and legal aspects of comprehensive support optimization of the Security Service of Ukraine and the National Guard of Ukraine service and combat activities during social emergencies. Paper main body. According to the current legislation, comprehensive support comprises of the following types of support: operative (also called military, moral and psychological, materiel (logistical. All other types of support are parts of these three basic ones. Their examination is necessary due to the fact, that there is confusion in the

  10. Secure Sessions for Web Services

    NARCIS (Netherlands)

    Reiter, M.; Bhargavan, K.; Corin, R.J.; Fournet, C.; Gordon, A.D.

    2007-01-01

    We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is

  11. Elements of Social Security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security contains an overview of important benefit schemes in Denmark, Sweden, Finland, Austria, Germany, the Netherlands, Great Britain and Canada. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact on disposable...

  12. Elements of Social Security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security contains an overview of important benefit schemes in Denmark, Sweden, Finland, Germany, the Netherlands, Great Britain and Canada. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact on disposable income...

  13. Elements of Social Security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security contains an overview of important benefit schemes in Denmark, Sweden, Finland, Germany, Great Britain, the Netherlands and Canada. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact on disposable income...

  14. Austerity, Discipline and Social Security

    Directory of Open Access Journals (Sweden)

    Asja Hrvatin

    2013-03-01

    Full Text Available One of the manifestations of the global crisis of financial capitalism and the policies arising from it was the imposition of austerity measures, which not only resulted in privatization of the commons and general expropriation of the people, but also managed to introduce new mechanisms of discipline and punishment. Debt, being the fundament of relations in society, forced itself into the system of social security: new legislation, regulating welfare benefits, has now shifted to a method for the criminalization of poverty, deepening class differences and transforming social workers (and the system of social security as a whole into a moralizing, bureaucratic machine for disciplining the population. The new legislation also shows a lack of reflection on the changes that need to be made to the welfare state in order to create social services that meet the needs and desires of individuals. Instead of improvements that provide decent living conditions and a new system of social rights (to deal with the problems resulting from precarious working conditions, people are faced with depersonalization, humiliation and increased hate speech and other fascist practices. The effect of austerity measures on the social security system does not end with the devastation of service users’ lives and their communities, which are slowly becoming exhausted, individualized and devoid of solidarity. It also means a big step backwards for the core ethics and principles of social work. Social workers are increasingly alienated from their clients and the communities they live in. They function more in the service of the government and its policies rather than as advocates of people’s rights.

  15. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  16. A New Paradigm for Secure Social Lending

    Science.gov (United States)

    Serrelis, Emmanouil; Alexandris, Nikolaos

    Social Lending is one of the latest trends in Social Networking, offering a communication and financial channel between individual borrowers and lenders. The various Social Lending transaction schemes could be subject to multiple security threats, in both financial and technical terms, which could affect the integrity of the service as well as the trust of citizens. This paper provides an overview of the basic characteristics of Social Lending as well as an analysis the potential security issues suggesting some appropriate corrective measures. The ultimate target is to enforce the Social Lending effort with an information security foundation that could become an appreciable alternative to the "traditional" lending system.

  17. Social security financing.

    Science.gov (United States)

    1980-05-01

    After nearly 2 years of study, the 1979 Advisory Council on Social Security submitted its findings and recommendations in December. In February the Bulletin published the Executive Summary of the Council's report. Because of the continuing wide public interest in the future of social security financing, the Council's detailed findings and recommendations on that subject are published below. The Council unanimously reports that all current and future beneficiaries can count on receiving the payments to which they are entitled. Among the recommendations it calls for are partial financing with nonpayroll-tax revenues. Suggested changes include hospital insurance (HI) financed through portins of personal and corporate income taxes and a part of the HI insurance payroll tax diverted to cash benefits with the balance of this tax repealed. The Council also recommends that the social security cash benefits program be brought into long-run actuarial balance--with a payroll-tax rate increase in the year 2005. It rejects the idea of a value-added tax as being inflationary. Parenthetical remarks represent additional views of the Council members cited.

  18. Security for service oriented architectures

    CERN Document Server

    Williams, Walter

    2014-01-01

    Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, includ

  19. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  20. SOCIAL SECURITY IN MODERN ERA

    African Journals Online (AJOL)

    2018-03-28

    Mar 28, 2018 ... Lecturer, Department of Social Work, Bindura University of Science Education; Email. ... Lecturer, School of Social Work, University of Zimbabwe, Mount ... There are two types of informal social security: traditional or family ...

  1. Social Security and Fighting Poverty in Tunisia

    Directory of Open Access Journals (Sweden)

    Hasna Khemili

    2018-02-01

    Full Text Available The objective of this study was to examine the role of social security in fighting poverty in Metlaoui, Tunisia, using survey data collected between July 2012 and January 2014, covering 200 poor households. We used questionnaire data, which gave a thorough analysis of the reactions, behavior, and strategies adopted by poor households as a result of various forms of risk. Social security has an effect on a number of different areas, including health, education, housing, and income. Our methodology explored both complete and partial risk-sharing, to investigate the impact of social security schemes on the strategies adopted by households to cope with economic shocks. The estimation results of different models showed that social security could help social security-covered households choose less costly strategies to cope with risks. However, the role of social security remains insufficient, given that covered households had less confidence in its services and they adopted strategies of self-insurance or income smoothing. Overall, the results showed that social security plays an important role in Metlaoui, but it remains insufficient, especially for households that are not covered by social security and are suffering from heavy health expenditures.

  2. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  3. Commission on Social Security

    CERN Multimedia

    Staff Association

    2010-01-01

    A commission studying past, present, and future social stakes ! For many years we have been hearing about the problems of funding of health insurance benefits in our different Member States. At CERN we are not totally immune from this problem.  To start with, let us recall that we have a mutual-benefit scheme which covers everyone for the consequences of the uncertainties in life (illness and accidents). The rules of our scheme are established by CERN in the framework of a sub-group of the Standing Concertation Committee, the CERN Health Insurance Scheme Board (CHISB), which is also in charge of managing the scheme.  The work of the “ProtSoc” (Protection SocialeSocial Security) commission, as we like to call it at the Staff Association, is to help your representatives on the CHISB, by preparing together with them the subjects and positions to be put forward and defended. This commission, which groups together the staff delegates who wish to invest their ...

  4. Banner prints social security numbers

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2014-02-01

    Full Text Available No abstract available. Article truncated at 150 words. The Monday edition of the Arizona Republic contained a story with potential interest to our readers. On the most recent address labels of Banner Health's magazine, Smart & Healthy, the addressee's Social Security or Medicare identification numbers, which are often identical to their Social Security numbers (1. The magazine was mailed to more than 50,000 recipients in Arizona late last week. The recipients are members of the Medicare Pioneer Accountable Care Organization, a government health-care plan that Banner serves. Banner generated its mailing list from information it received from the U.S. Centers for Medicare & Medicaid Services, which is an agency within the U.S. Department of Health & Human Services (HHS responsible for administration of several federal health-care programs. Although medical information has been protected by the Health Insurance Portability and Accountability Act (HIPAA since 1996, penalties were recently increased. Civil monetary penalties were increased from a maximum of $100 ...

  5. Social Security at the Crossroads.

    Science.gov (United States)

    International Labour Review, 1980

    1980-01-01

    Social security schemes need to be streamlined and the underlying policies made more coherent to obtain the fullest possible return on expenditure. Third World countries need to reflect very seriously on the role of social security in the development process and on the management problems involved. (CT)

  6. Proposals to Restructure Social Security

    OpenAIRE

    Peter A. Diamond

    1996-01-01

    This paper discusses five proposed changes in Social Security: indexing the normal retirement age to life expectancy (as Sweden is doing); investing part of the trust funds in private securities; partial privatization (as has been proposed by Senators Kerrey and Simpson, Sweden is doing and Mexico has done); replacing Social Security by individually mandated savings (as was done in Chile in 1981); and mandating employer provided retirement savings (as recently legislated in Australia and is e...

  7. SOCIAL SECURITY OF TURKISH ATHLETES

    Directory of Open Access Journals (Sweden)

    Barış ÖZTUNA

    2015-07-01

    Full Text Available Law No. 5510 realized within the social security reform aims providing a structure which presents equal scope and quality of social security service other all citizens. According to Labor Law No 4857, unionization of sportsmen in Turkish legal environment is possible, sport clubs and sportsmen are continuing to live without so many rights and obligations but they didn’t. Aim of this study; to prove sportsmen of location of the labour law and to mark off. The purpose of the study is explained according to Law No. 4857 and Law No. 5510 Turkish athletes. Profesional athletes deemed to be insurance holders for the purposes of implementing short and long term insurance branches of No 5510 Law. But amateur athletes don't seem to be insurance holders for the purposes of implementing short and long term insurance branches of No 5510 Law. According to the law 5774 regarding to be called as an g overnment athlete, within the adults category of the sports that are accepted as olympic, paralympic and deaflympic; pension is paid to the amateur athletes who became first, second or third at Olymic games, World or European Champions as an individual or team sports and to the national team coaches and assistant coaches of the athletes’ who became Olympic or World Champion as a team.

  8. Social security and firm performance

    DEFF Research Database (Denmark)

    Lee, Sangheon; Torm, Nina

    2017-01-01

    This article investigates how social security provision - a key determinant of formality - impacts on small and medium-sized firm performance in Viet Nam. Based on enterprise census data covering all registered firms from 2006 to 2011, the authors find that firms which increase their social...... security coverage by 10 per cent experience a revenue gain of 1.4-2.0 per cent per worker and a profit gain of up to 1.8 per cent, depending on the survival time of the firm. However, given the time lag between 'investment' (in social security contributions) and returns (enhanced firm performance...

  9. Social Security, Intergenerational Transfers, and Endogenous Growth

    OpenAIRE

    Junsen Zhang; Junxi Zhang

    1998-01-01

    In this paper, the effects of social security in a simple model of endogenous growth with alternative motives of having children are analyzed. It shows how the effects of social security depend on the size of the social security tax, the motive to have children, and the pattern of intergenerational transfers. The pattern of intergenerational transfers itself, however, is shown to change with the social security tax rate. When the social security tax is not too high, social security increases ...

  10. Social Security and Medicare Benefits

    Data.gov (United States)

    Social Security Administration — Cash benefits and rehabilitation benefits paid in each year from the Old-Age and Survivors Insurance, and Disability Insurance Trust Funds, and benefits paid from...

  11. Banner prints social security numbers

    OpenAIRE

    Robbins RA

    2014-01-01

    No abstract available. Article truncated at 150 words. The Monday edition of the Arizona Republic contained a story with potential interest to our readers. On the most recent address labels of Banner Health's magazine, Smart & Healthy, the addressee's Social Security or Medicare identification numbers, which are often identical to their Social Security numbers (1). The magazine was mailed to more than 50,000 recipients in Arizona late last week. The recipients are members of the Medicare Pion...

  12. WPSS: Watching people security services

    NARCIS (Netherlands)

    Bouma, H.; Baan, J.; Borsboom, S.; Zon, K. van; Luo, X.; Loke, B.; Stoeller, B.; Kuilenburg, H. van; Dijk, J.

    2013-01-01

    To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most

  13. Social Security's Surpluses: An Update.

    Science.gov (United States)

    Dattalo, Patrick

    1992-01-01

    Notes that deliberation over how to manage social security's large trust fund balances is expected to continue. Urges social workers to participate in this debate because surpluses have implications for increasing quality of life of low- and moderate-income families. Continues earlier discussion (Dattalo, 1990) by assessing two recent proposals…

  14. Ecosystem services for energy security

    Energy Technology Data Exchange (ETDEWEB)

    Athanas, Andrea; McCormick, Nadine

    2010-09-15

    The world is at an energy crossroads. The changes underway will have implications for ecosystems and livelihoods. Energy security is the reliable supply of affordable energy, of which there are two dimensions; reliability and resilience. Changes in ecosystem services linked to degradation and climate change have the potential to impact both on the reliabiity of energy systems and on their resiliance. Investing in ecosystems can help safeguard energy systems, and mitigate unforeseen risks to energy security. The energy and conservation community should come together to build reliable and resilliant energy systems in ways which recognise and value supporting ecosystems.

  15. Social Security Reform

    National Research Council Canada - National Science Library

    Nuschler, Dawn

    2005-01-01

    .... In recent years, reform ideas have ranged from relatively minor changes to the current pay-as-you-go social insurance system to a redesigned program based on personal savings and investments modeled after IRAs and 401(k...

  16. Social Security for All?

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    While China has made advances in creating a social welfare system, there are still large imbalances between urban and rural areas. Now the government is striving to bring more people into the system Asmile appears on Feng Qunlin’s faceatthe mention of 20

  17. RESTful Java web services security

    CERN Document Server

    Enríquez, René

    2014-01-01

    A sequential and easy-to-follow guide which allows you to understand the concepts related to securing web apps/services quickly and efficiently, since each topic is explained and described with the help of an example and in a step-by-step manner, helping you to easily implement the examples in your own projects. This book is intended for web application developers who use RESTful web services to power their websites. Prior knowledge of RESTful is not mandatory, but would be advisable.

  18. Innovative Secure Mobile Banking Services

    Directory of Open Access Journals (Sweden)

    Mousa T AL-Akhras

    2011-01-01

    Full Text Available Due to the widespread use of computer technologies in almost all aspects of life, organisations that are connected to the Internet started extending their services to their customers to include new applications and services that satisfy their customers’ desires to make better businesses. One of these emerging applications is mobile banking. The term mobile banking (or m-banking describes the banking services that the user can perform via a mobile device ubiquitously at anytime and from anywhere. In order for users to access their accounts, they need a mobile device and network connectivity. Therefore, sitting in front of a computer is not a requirement anymore; accessing accounts can occur while users are waiting their turn at the dentist clinic or relaxing at the beach! This paper explores the opportunities of using mobile technology in the electronic banking (e-banking sector to enhance existing banking services by moving toward m-banking using mobile devices and wireless media that can provide opportunities for ubiquitous access to the banking services as mobile technologies can be used at anytime and from anywhere. The technical problems encountered while using the mobile devices presents some technical difficulties and challenges for the m-banking. In this paper we introduce a mobile system that demonstrates the flexibility gained out of this technology and covers the major aspects of such kind of applications. The proposed system covers two parts: the customer services (user interface and the security aspects. In the user interface part, banking facility is provided to the user through the mobile device to implement banking transactions. The model provides customers with the services: billing payments, transferring of funds, viewing of customer’s accounts and transactions, allowing the user to change his/her password and request a cheque book. The application takes into consideration security aspects, it satisfies the following

  19. A Model of Social Security?

    DEFF Research Database (Denmark)

    Rom-Jensen, Byron Zachary

    2017-01-01

    of Scandinavian achievements were variable in their ideological outlook and sometimes deliberately challenged the existence and goals of New Deal policies. Moreover, this essay explores the usage of Scandinavia in New Deal social legislation by examining the policymaking rhetoric of the Social Security Act...... and its 1939 amendments. The surprising plasticity of the Scandinavian image amongst policymakers ultimately reveals the fluid nature of both New Deal-era politics and the Scandinavian images it appropriated....

  20. Social security systems in Tanzania: Phase I Overview of social ...

    African Journals Online (AJOL)

    The paper starts by examining the concept of social security in Tanzania, showing that there are three key issues in social security which have not been adequately addressed by existing social security schemes and need immediate attention. The paper then examines the nature and forms of social security in Tanzania in a ...

  1. WPSS: watching people security services

    Science.gov (United States)

    Bouma, Henri; Baan, Jan; Borsboom, Sander; van Zon, Kasper; Luo, Xinghan; Loke, Ben; Stoeller, Bram; van Kuilenburg, Hans; Dijk, Judith

    2013-10-01

    To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most relevant and deviant patterns. We present a software platform that contributes to the retrieval and observation of humans and to the analysis of their behavior. The platform consists of mono- and stereo-camera tracking, re-identification, behavioral feature computation, track analysis, behavior interpretation and visualization. This system is demonstrated in a busy shopping mall with multiple cameras and different lighting conditions.

  2. Online, Batch and CICS Social Security Statement

    Data.gov (United States)

    Social Security Administration — A database that contains client preference information for the SSA initiated Social Security Statement as well as other data including SSN, disposition for paper SS...

  3. Social Security Administration Data for Enumeration Accuracy

    Data.gov (United States)

    Social Security Administration — This dataset provides data at the national level from federal fiscal year 2006 onwards for the accuracy of the assignment of Social Security numbers (SSN) based on...

  4. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  5. Health services analysis as a tool for evidence-based policy decisions: the case of the Ministry of Health and Social Security in Mexico.

    Science.gov (United States)

    Kroeger, Axel; Hernandez, Juan Manuel

    2003-12-01

    To describe the strengths and weaknesses of two Mexican health care providers for poor populations [Ministry of Health (MoH) and Social Security (SS)] in order to facilitate policy decisions about the future of the two systems. In four Mexican states we conducted (i) a household interview survey in 10 724 households; (ii) a user satisfaction survey in 1319 households; (iii) a satisfaction survey of 236 health workers; (iv) in-depth interviews with 190 health workers; (v) 188 focus-group discussions with different population groups; (vi) a document analysis. Both systems serve populations with similar characteristics of poverty. The availability of resources was better in the MoH system; SS care was better concerning process indicators (family planning, antenatal care; in-service delivery of drugs, staff productivity, user satisfaction and staff motivation), efficiency and effectiveness (reduction of morbidity and mortality). Possible explanatory factors for the better performance of the SS system were strong supervision, regular communication, joint data analysis and annual population surveys. Better service organization makes a difference regarding efficiency and effectiveness. Policy-makers, deciding on which kind of health services are best for the poor, should take into account health services' analyses.

  6. Social security income and the utilization of home care: Evidence from the social security notch.

    Science.gov (United States)

    Tsai, Yuping

    2015-09-01

    This paper exploits Social Security law changes to identify the effect of Social Security income on the use of formal and informal home care by the elderly. Results from an instrumental variables estimation strategy show that as retirement income increases, elderly individuals increase their use of formal home care and become less likely to rely on informal home care provided to them by their children. This negative effect on informal home care is most likely driven by male children withdrawing from their caregiving roles. The empirical results also suggest that higher Social Security benefits would encourage the use of formal home care by those who would not have otherwise used any type of home care and would also encourage the use of both types of home care services among elderly individuals. Published by Elsevier B.V.

  7. Marital Biography, Social Security Receipt, and Poverty.

    Science.gov (United States)

    Lin, I-Fen; Brown, Susan L; Hammersmith, Anna M

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles.

  8. Social Security Funds Clamor for Reform

    Institute of Scientific and Technical Information of China (English)

    郑秉文

    2008-01-01

    This paper analyzed the institutional deficiencies inherent in China’s social security system based on a dissection of various social security fund violations. It holds that the unscientific design in social security system is the root cause for social security fund violations, which is reflected in low level of social security unification, irrational investment system and legislative loopholes etc. Currently, China’s social security funds are facing risks in management and in system; The key of risk control lies in the reforming of the overall framework of social security system through the following aspects: 1) readjust the unified account system structure to raise the level of unification; 2) reform funds investment system to boost ROI; 3) speeding up legislative to regulate the administrative costs and the behaviors of its entities.

  9. Social security reform: an overview

    OpenAIRE

    Robert K. Triest

    1997-01-01

    Recent decades have seen a trend toward longer life expectancy and reduced birth rates across the globe. This is good news -- the pressures created by rapid population growth are being relaxed, and people are more likely to live to old age -- but it creates problems for programs such as Social Security, which are designed to provide for the consumption needs of the elderly. In the United States, the retirement of the baby boom generation will result in a decrease in the number of workers per ...

  10. Marital Biography, Social Security Receipt, and Poverty

    OpenAIRE

    Lin, I-Fen; Brown, Susan L.; Hammersmith, Anna M.

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social S...

  11. Planning Security Services for IT Systems

    OpenAIRE

    Henderson, Marie; Page, Howard Philip

    2014-01-01

    Often the hardest job is to get business representatives to look at security as something that makes managing their risks and achieving their objectives easier, with security compliance as just part of that journey. This paper addresses that by making planning for security services a 'business tool'.

  12. Metric-Aware Secure Service Orchestration

    Directory of Open Access Journals (Sweden)

    Gabriele Costa

    2012-12-01

    Full Text Available Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definition of requirements. Thus, the problem is to analyse the values of metrics for a complex business process. In this paper we extend our previous work on analysis of secure orchestration with quantifiable properties. We show how to define, verify and enforce quantitative security requirements in one framework with other security properties. The proposed approach should help to select the most suitable service architecture and guarantee fulfilment of the declared security requirements.

  13. 20 CFR 638.528 - Social Security.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...

  14. Social Security and the Equity Premium Puzzle

    OpenAIRE

    Olovsson, Conny

    2004-01-01

    This paper shows that social security may be an important factor in explaining the equity premium puzzle. In the absence of shortselling constraints, the young shortsell bonds to the middle-aged and buy equity. Social security reduces the bond demand of the middle-aged, thereby restricting the possibilities of the young to finance their equity purchases. Their equity demand increases as does the average return to equity. Social security also increases the covariance between future consumption...

  15. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  16. Securing social media in the enterprise

    CERN Document Server

    Dalziel, Henry

    2015-01-01

    Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media wi

  17. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  18. Analysis of the occupational therapist’s activities as a professional adviser in the professional rehabilitation service of the National Institute of Social Security (INSS

    Directory of Open Access Journals (Sweden)

    Etiene Cerutti Louzada

    2017-12-01

    Full Text Available Introduction: The INSS Professional Rehabilitation Service (PR underwent several changes, especially those that occurred with the creation of the SUS and the withdrawal of any kind of health care from the institute. In 2008, with the revitalization of the service, several occupational therapists joined the institution, but remained a model of action without focusing on health care and without valuing the professional specificity. This form of intervention has been causing discussions about the work of these professionals, implied by the lack of literature that bases their interventions and strengthens the maintenance of their professional identity within this new scenario. Objective: To investigate the relationship between Occupational Therapy and the role played by occupational therapists in the INSS PR service. Method: Qualitative research of the exploratory type, being observed the performance of an occupational therapist of the Executive Management Recife/PE, Responsible for Professional Orientation. Results: It was verified that in the INSS, the occupational therapist employs many specificities of its profession, which are related to: objective (emancipation of the individual and insertion on work activity, object (human doing, occupational performance, instrument (analysis of the labor activity and workstation. In addition, it was noticed that the social security context exerts some limitations in the occupational therapeutic action, within the scope of the institutional norms of management and of conducting the professional doing in the RP. Conclusion: Relationships between Occupational Therapy and function of Responsible for Professional Orientation of INSS were established, indicating ways for a practice based on the theoretical bases of the profession. It is recommended to conduct researches in the area that analyze the performance of this professional and the impact of their interventions in the replacement of INSS policyholders in

  19. Patient protection in radiotherapy (Radio neurosurgery National Service of the Social Security Mexican Institute); Proteccion del paciente en radioterapia (Servicio Nacional de Radioneurocirugia del IMSS)

    Energy Technology Data Exchange (ETDEWEB)

    Espiritu R, R. [Centro Medico Nacional de Occidente, IMSS, Servicio Nacional de Radioneurocirugia, Belisario Dominguez 735, Sector Libertad, 44340 Guadalajara, Jalisco (Mexico)

    2008-12-15

    The perspective of patient protection at the Radio neurosurgery National Service of the Social Security Mexican Institute is divided into three parts: the testing program for equipment acceptance, an assurance quality program based on periodic tests, an also other assurance quality based on tests during the application. Among the technical aspects that influence in the equipment acceptance tests, it is the collimation type, the characteristics of the lineal accelerator, the platform for planning and the network type. In the case of the collimation system and the accelerator characteristics, we consider the manufacturer's specifications and requirements of Mexican Official Standard NOM-033-NUCL-1999, {sup T}echnical Specifications for the Teletherapy Units Operation, Linear Accelerators{sup .} Planning for the platform takes into account the manufacturer's specifications. In the case of computed tomography as well as review the calibration according to manufacturer's specifications should be considered the standard NOM-229-SSA1-2002. In the case of the linear accelerator must be the radiological characterization of radiation beam as part of this, the absolute dose determination. As for the periodic tests is verified the dose constancy, as well as the flattening and symmetry of X-rays beam. There are also tests battery with daily, monthly and yearly frequencies, which make up the assurance quality program. (Author)

  20. Social Networks and Corporate Information Security

    Directory of Open Access Journals (Sweden)

    Ekaterina Gennadievna Kondratova

    2013-06-01

    Full Text Available It is defined in the article social networks as a tool in the hands of cyber-criminals to compromise the organization’s data. The author focuses on a list of threats to information security caused by social networks usage, which should be considered in the set up of information security management system of the company.

  1. Social Security and Part-Time Employment.

    Science.gov (United States)

    Euzeby, Alain

    1988-01-01

    Discusses rules governing social security and their implications for part-time employees in various countries. Topics include (1) methods of financing social security, (2) benefits, (3) measures concerning the unemployed, (4) a floor for employers' contributions, (5) graduated contribution rates, and (6) financial incentives. (CH)

  2. Water Security and Services in the Caribbean

    Directory of Open Access Journals (Sweden)

    Adrian Cashman

    2014-05-01

    Full Text Available The efficient management of water resources and services continues to be a concern in many of the small island states of the Caribbean. There are growing concerns over the ability of governments in the region to ensure the good management and provision of water without jeopardizing economic growth and the maintenance of social well-being. This paper provides an overview of the major factors influencing the water security facing the Caribbean Region and how the emerging concerns are being addressed. The key challenges and vulnerabilities may be summarized as lack of data and barriers to making available what information there is. Forward planning has been largely neglected and is symptomatic of a lack of appreciation of the need for having national water policies. In this respect Jamaica’s development of a national master water plan serves as a good example of what is needed. Water service providers have to be efficient, well managed and allowed to do their job. This means that they have to be on a sound financial footing. The challenge is to find the balance between appropriate political and regulatory oversight and the autonomy of water managers and service providers.

  3. Secure Service Discovery in Home Networks

    NARCIS (Netherlands)

    Scholten, Johan; van Dijk, H.W.; De Cock, Danny; Preneel, Bart; Kung, Antonio; d'Hooge, Michel

    2006-01-01

    This paper presents an architecture for secure service discovery for use in home networks. We give an overview and rationale of a cluster-based home network architecture that bridges different, often vendor specific, network technologies. We show how it integrates security, communication, and

  4. Accelerate China’s Social Security Legislation

    Institute of Scientific and Technical Information of China (English)

    王延中

    2008-01-01

    Since the financial crisis in Asia in 1997, China’s social security system has undergone continual reform and readjustment, and has proved to be an integral part of government efforts to perfect the socialist market economy as well as in building a socialist harmonious society. Although social security construction has achieved certain results, it has also left a lot of problems. With the rapid growth of China’s economy and revenue, people from all walks of life are putting ever-increasing demands on the social security system; therefore, the construction of a sound social security system suited to China’s current situation still remains an arduous task. In this article, the author have reviewed the 10 years development of China’s social security system, analyzed problems and challenges and proposed its suggestions.

  5. Secure Data Service Outsourcing with Untrusted Cloud

    OpenAIRE

    Xiong, Huijun

    2013-01-01

    Outsourcing data services to the cloud is a nature fit for cloud usage. However, increasing security and privacy concerns from both enterprises and individuals on their outsourced data inhibit this trend. In this dissertation, we introduce service-centric solutions to address two types of security threats existing in the current cloud environments: semi-honest cloud providers and malicious cloud customers. Our solution aims not only to provide confidentiality and access controllability of out...

  6. [Universalization of health or of social security?].

    Science.gov (United States)

    Levy-Algazi, Santiago

    2011-01-01

    This article presents an analysis of the architecture of Mexico's health system based on the main economic problem, failing to achieve a GDP growth rate to increase real wages and give workers in formal employment coverage social security. This analysis describes the relationship between social security of the population and employment status of it (either formal or informal employment) and the impact that this situation poses to our health system. Also, it ends with a reform proposal that will give all workers the same social rights, ie to grant universal social security.

  7. Comprehensive Social Service Programs for Handicapped Citizens through Title XX.

    Science.gov (United States)

    Roten, Shelby Jean

    Reviewed are present and potential services and social programs for handicapped children in Mississippi through purchase of service contracts under Title XX of the Social Security Act. Sections cover the following topics: background and purpose of Title XX which gives states greater control over social service programs, planning state supported…

  8. Social insurance for health service.

    Science.gov (United States)

    Roemer, M I

    1997-06-01

    Implementation of social insurance for financing health services has yielded different patterns depending on a country's economic level and its government's political ideology. By the late 19th century, thousands of small sickness funds operated in Europe, and in 1883 Germany's Chancellor Bismarck led the enactment of a law mandating enrollment by low-income workers. Other countries followed, with France completing Western European coverage in 1928. The Russian Revolution in 1917 led to a National Health Service covering everyone from general revenues by 1937. New Zealand legislated universal population coverage in 1939. After World War II, Scandinavian countries extended coverage to everyone and Britain introduced its National Health Service covering everyone with comprehensive care and financed by general revenues in 1948. Outside of Europe Japan adopted health insurance in 1922, covering everyone in 1946. Chile was the first developing country to enact statutory health insurance in 1924 for industrial workers, with extension to all low-income people with its "Servicio Nacional de Salud" in 1952. India covered 3.5 percent of its large population with the Employees' State Insurance Corporation in 1948, and China after its 1949 revolution developed four types of health insurance for designated groups of workers and dependents. Sub-Saharan African countries took limited health insurance actions in the late 1960s and 1970s. By 1980, some 85 countries had enacted social security programs to finance or deliver health services or both.

  9. Survivability Using Controlled Security Services

    Science.gov (United States)

    2005-06-01

    signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281–308, 1988. [29] ISO TC86 Committee. ISO 8583 : Financial...fsIKXZO ISO bbDU?M&D*P$JSIKD F$LKD[*J>RKX$J\\OINTP$`p]Wf�OP_f�INX$TL’Q�FZOeLNINTJMnTP_[*D*b[^J QhG��J:RObb?OuINX$TL’Q�FZOeLNIf�U?X$D

  10. Social Service has moved

    CERN Multimedia

    2007-01-01

    The offices of the Social Service are now on the 1st floor of Building 33 (Reception), exactly one floor above the old location. We remind you that the team, consisting of two social workers, a psychologist (external consultant, 1 day/week) and an administrative assistant, is at the disposal of all members of the personnel, whatever their status, as well as to their family members. Advice and support in the following areas are offered : · information on integration in the local area; · assistance in dealing with the relevant authorities/services; · consultations with a view to resolving problems of a personal, family or professional nature, such as problems of dependency (alcohol, drugs) relationship or behavioral problems (stress, depression, eating disorders), etc.; · support in facing new situations (maternity, divorce, bereavement, job change, separation from family/familiar surroundings); · assistance with decision making relating to family, personal or profes...

  11. Context aware adaptive security service model

    Science.gov (United States)

    Tunia, Marcin A.

    2015-09-01

    Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.

  12. Cyber Security as Social Experiment

    NARCIS (Netherlands)

    Pieters, Wolter; Hadziosmanovic, D.; Dechesne, Francien

    2014-01-01

    Lessons from previous experiences are often overlooked when deploying security-sensitive technology in the real world. At the same time, security assessments often suffer from a lack of real-world data. This appears similar to general problems in technology assessment, where knowledge about

  13. Changing principles in European social security

    NARCIS (Netherlands)

    van Oorschot, W.J.H.; Clasen, J.J.

    2002-01-01

    The provision of social security benefits rests on normative principles of social justice. Most strongly manifest in earnings-related social insurance, the principle of reciprocity has been increasingly questioned on grounds of equity, adequacy and fiscal viability, in the wake of socio-economic

  14. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Science.gov (United States)

    2010-04-01

    ... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  15. The story of the social security number.

    Science.gov (United States)

    Puckett, Carolyn

    2009-01-01

    The use of the Social Security number (SSN) has expanded significantly since its inception in 1936. Created merely to keep track of the earnings history of U.S. workers for Social Security entitlement and benefit computation purposes, it has come to be used as a nearly universal identifier. Assigned at birth, the SSN enables government agencies to identify individuals in their records and businesses to track an individual's financial information. This article explores the history and meaning of the SSN and the Social Security card, as well as the Social Security Administration's (SSA's) SSN master file, generally known as the Numident. The article also traces the historical expansion of SSN use and the steps SSA has taken to enhance SSN integrity.

  16. Social Security for Composers and Free Lances.

    Science.gov (United States)

    Rossel-Majdan, Karl

    1982-01-01

    Internationally, cultural policies are tending toward increased socioeconomic and legal support for creative artists. Austrian cultural policies which encourage art and cultural professional organizations, increased copyright protection, and greater social security for free-lance artists are discussed. (AM)

  17. Service Learning and Political Socialization.

    Science.gov (United States)

    Owen, Diana

    2000-01-01

    Discusses the link between political socialization scholarship and service learning. States that information gleaned from socialization research on adolescents' political identities and beliefs can inform service learning, asserting that the relationship between political socialization and service learning needs to be encouraged. (CMK)

  18. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  19. Smoking: Taxing health and social security

    OpenAIRE

    Armour, Brian S.; Pitts, M. Melinda

    2006-01-01

    Cigarette smoking is costly in terms of not only its effects on smokers' health but also the direct and indirect financial costs it imposes on smokers and their families. For instance, premature death caused by smoking may redistribute Social Security income in unexpected ways that affect behavior and reduce the economic well-being of smokers and their dependents. ; This article examines the effects of smoking-attributable mortality on the net marginal Social Security tax rate (NMSSTR)—the di...

  20. Predicting Social Security numbers from public data

    OpenAIRE

    Acquisti, Alessandro; Gross, Ralph

    2009-01-01

    Information about an individual's place and date of birth can be exploited to predict his or her Social Security number (SSN). Using only publicly available information, we observed a correlation between individuals' SSNs and their birth data and found that for younger cohorts the correlation allows statistical inference of private SSNs. The inferences are made possible by the public availability of the Social Security Administration's Death Master File and the widespread accessibility of per...

  1. Meeting Report: Institute for Social Security and Services for State Workers (ISSSTE on Acute Lymphoblastic Leukaemia, Mexico City, Mexico, 3rd to 4th October 2016

    Directory of Open Access Journals (Sweden)

    Alvarado Ibarra Martha

    2017-06-01

    Full Text Available From October 3 to 4, 2016, the fourth meeting of haematologists who belonged to the institute for social security and services for state workers (ISSSTE was held, the meeting was held in Mexico City, Mexico. Attending this working meeting, medical fellows of the specialty of Haematology and Paediatric Haematology, as well as attached doctors of both specialties that work in different hospitals in Mexico City and the rest of the country, the purpose of the attendees to this consensus was discuss, update, and homogenize the protocols of diagnostic and therapeutic approach in patients with acute lymphoblastic leukaemia of all ages. All participants appreciated the opportunity to participate in one of the most important cooperation projects of the ISSSTE and to be able to offer updated treatment protocols to this population or, failing that, to send them a Medical Center that can provide hospital care as soon as possible. Physicians took advantage of this meeting for the scientific exchange, the discussion on projects in course and were planned the development of other consensuses being the closest the one of lymphomas. As in the previous consensuses that were published in a National magazine. The coordinator of this project raised to the attendees the possibility of a publication in magazines of greater prestige international since in countries like Mexico the cooperative work is not frequent and the group of haematologists belonging to ISSSTE are working towards this goal. This consensus was considered as a very well-organized platform to support the research of young fellows in the specialty to stimulate the team work in protocols of the different haematological pathologies and to inform the world the results achieved in a population of patients attended by the ISSSTE. In agreement with the main objective of this consensus on acute lymphoblastic leukaemia once finished and discussed throughout the haematological group, the coordinator for the

  2. Secure Electronic Cards in Public Services

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2008-01-01

    Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe.

  3. Private support and social security.

    Science.gov (United States)

    Van Dijk, F

    1998-01-01

    "The issue is addressed whether assistance to persons in need can be left to the ¿family' and the ¿community'. In that case people depend on their social networks. The support a person receives through a given network of social ties is examined. However, ties are diverse and subject to change. By means of a model of the dynamics of social ties, the conditions for adequate private support are analyzed. The sustainability of private support over time is examined by incorporating the impact on social ties of lending and receiving support. It is shown that support is only an effective alternative in a limited number of situations." excerpt

  4. Roles of Social Movement Organizations for Securing Workers' Safety in Korea: A Case Study of Abolition of the 30-Minute Delivery Guarantee Program in Pizza Delivery Service.

    Science.gov (United States)

    Park, Ji-Eun; Kim, Myoung-Hee

    2016-07-01

    Many restaurants in Korea maintain quick-delivery service programs to satisfy customers. This service allows delivery workers limited time to deliver, which frequently put them in danger. Most of the workers are young, work part-time, and are rarely organized into trade unions. In this article, through a case study of the social movement to abolish the 30-minute delivery guarantee program of pizza companies in Korea, we argue that social movements involving social movement organizations (SMOs) and individual citizens could serve as a means to rectify this problem. We show how the SMOs developed and expanded the movement using a framing perspective and how the general public became involved through social media. Data was collected via online searching. Interview scripts from key players of SMOs and unofficial documents they provided were also reviewed. Three SMOs primarily led the movement, successfully forming a frame that emphasized social responsibility. SMOs also utilized social media to link their standing frame with unmobilized citizens and to expand the movement. We identified contributing factors and limitations of the movement and drew lessons that could be applied to other sectors where workers are in vulnerable positions. © The Author(s) 2016.

  5. 32 CFR 806b.12 - Requesting the Social Security Number.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Requesting the Social Security Number. 806b.12... Number. When asking an individual for his or her Social Security Number, always give a Privacy Act... Social Security Number; and whether providing the Social Security Number is voluntary or mandatory. Do...

  6. Cyber security for greater service reliability

    Energy Technology Data Exchange (ETDEWEB)

    Vickery, P. [N-Dimension Solutions Inc., Richmond Hill, ON (Canada)

    2008-05-15

    Service reliability in the electricity transmission and distribution (T and D) industry is being challenged by increased equipment failures, harsher climatic conditions, and computer hackers who aim to disrupt services by gaining access to transmission and distribution resources. This article discussed methods of ensuring the cyber-security of T and D operators. Weak points in the T and D industry include remote terminal units; intelligent electronic devices; distributed control systems; programmable logic controllers; and various intelligent field devices. An increasing number of interconnection points exist between an operator's service control system and external systems. The North American Electric Reliability Council (NERC) standards specify that cyber security strategies should ensure that all cyber assets are protected, and that access points must be monitored to detect intrusion attempts. The introduction of new advanced metering initiatives must also be considered. Comprehensive monitoring systems should be available to support compliance with cyber security standards. It was concluded that senior management should commit to a periodic cyber security re-assessment program in order to keep up-to-date.

  7. Women and social security: a progressive approach.

    Science.gov (United States)

    Olson, L K

    1994-01-01

    This article explores some major assumptions underlying the Social Security system and alternative approaches to rendering the system more economically viable, meeting the income needs of the elderly and/or providing greater equity under its benefit and taxation provisions. It attempts to show that the current structure of Social Security not only reinforces but also exacerbates the underlying economic inequalities in our nation's political economy under the guise of a social insurance program. In addressing selected benefit and taxation issues, the article focuses on how working and older women are faring in the 1990s under the Social Security system. It argues that although the program theoretically is gender neutral, its impact is not. Women, particularly those who are single, are poorly served. The article concludes that a progressive restructuring of the Social Security system itself is imperative if we are to meet the needs of a large percentage of workers, older people, and the economic and social demands of the 1990s and beyond. It also offers some suggestions for such change.

  8. Health and Social Security Needs of Rickshaw Pullers in Ranchi.

    Science.gov (United States)

    Kumar, Anant; Thomas, Joe; Wadhwa, Sonal S; Mishra, Aprajita; Dasgupta, Smita

    2016-07-01

    A significant number of "marginalized" population groups are denied their health rights, healthcare access, benefits of government health programs, and other health-related social security benefits. These population groups, particularly the rickshaw pullers of India, are vulnerable because of their poor social and economic status, migration history, lack of permanent settlements, lack of social capital, and so on. These reasons, coupled with other social-political reasons, lead to no or limited access to health services and poor health conditions. This study intends to explore and understand the context and health seeking behavior of rickshaw pullers in Ranchi, the capital city of Jharkhand state in India, with special reference to wider social determinants of health such as, access, affordability, and delivery of health services. The data was collected from 1,000 rickshaw pullers from 40 "rickshaw garages" in Ranchi. The findings of the study show that rickshaw pullers can't afford to "attach" much importance to their health due to various reasons and suffer from a variety of occupational and other illnesses. The health conditions of the rickshaw pullers are affected by poverty, negligence, illiteracy, lack of awareness and unavailability of affordable, quality health services. These are only a symptom of the larger structural issues affecting health. The study suggests that rickshaw pullers, being a marginalized and excluded population group, require special health and social security programs that include safe, affordable, and accessible services along with a special focus on health education, behavior change, and promotion of appropriate health-seeking behavior.

  9. Mining social networks and security informatics

    CERN Document Server

    Özyer, Tansel; Rokne, Jon; Khoury, Suheil

    2013-01-01

    Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for soci

  10. Security and trust in online social networks

    CERN Document Server

    Carminati, Barbara; Viviani, Marco; Viviani, Marco; Carminati, Barbara

    2013-01-01

    The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to thei

  11. 34 CFR 668.36 - Social security number.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Social security number. 668.36 Section 668.36 Education... Islands, and the Republic of Palau, the Secretary attempts to confirm the social security number a student... Security Administration. If the Social Security Administration confirms that number, the Secretary notifies...

  12. New government to make social security cutbacks

    NARCIS (Netherlands)

    Grünell, M.

    2003-01-01

    In May 2003, a new coalition government of the Christian Democrats and two liberal parties, VVD and D66, took office in the Netherlands. The parties' coalition agreement provides for major cutbacks in public spending, largely targeted on social security expenditure. The trade unions are fiercely

  13. Speeding decisions. Social security's information exchange program.

    Science.gov (United States)

    Winter, Kitt; Hastings, Bob

    2011-05-01

    The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.

  14. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  15. [Mutual aid societies for industrial accidents and occupational diseases in the social security service within the framework of the Prevention of Occupational Risk Act].

    Science.gov (United States)

    Albalá-Ortiz, M

    The passing of the Prevention of Industrial Risks Act, in force from 9 February 1996 has altered previous ideas on the subject, which is currently considered to be of utmost importance for national and community legislation. In this article we describe the preventive functions of the Mutual Aid Societies for Industrial Accidents and professional diseases of the National Health Service. We have analysed the current legislation so as to clarify the activities of the Mutual Aid Societies in the field of the prevention of industrial accidents, and have defined the actions which may be taken in this field according to the present laws. Two different types of preventive activities are considered: (1) Those which depend on contributions, included in the professional risks cover, and which are obliged to prepare an annual plan of the measures taken to prevent industrial accidents and professional illness, following the guidelines established by the Ministry of Labor and Social Services and according to certain priorities. (2) The functions corresponding to the services for third-party prevention exclusively for their associated companies when the Mutual Aid Society is approved as a service for third party cover. This requires a voluntary or professional contract and the financial cost is borne by the company which requests it. The objective of the current legislation is, amongst other things, to introduce the new preventive approach established by the Prevention of Industrial Risks Act in the workplace and through the Mutual Aid Societies as well as to foment a new culture of prevention.

  16. Vietnam: expanding the social security system.

    Science.gov (United States)

    Pruzin, D

    1996-01-01

    Viet Nam's shift toward a market-oriented economy has been associated with annual gross domestic product growth of more than 8% over the past 5 years. At the same time, the emergence of private-sector enterprises and subsequent closure of many state-run enterprises have had profound implications for Viet Nam's social protection systems. At present, only 5.6 million of the country's 33 million workers are covered under the state-run social insurance system. In 1995, the government moved to include private enterprises with 10 or more employees in its state benefits system. The International Labor Organization (ILO) has been working with the Vietnamese Government to design and implement a social security system that would extend coverage progressively to excluded sectors and provide support to workers who have become unemployed as a result of the economic transition process. At its Eighth National Congress, the Vietnamese Communist Party approved a 5-year social and economic plan calling for such an expansion of the social insurance system as well as for a guaranteed standard of living for pensioners. To facilitate anticipated changes, activities that were previously divided between the Ministry of Labor, Invalids, and Social Affairs and the Vietnam General Confederation of Labor have been assigned to the newly formed Vietnam Social Insurance (VSI) Organization. Under consideration is a plan to combine some VSI activities with those of the Vietnam Health Insurance Organization. The ILO will assist with training, computerization, and social security fund investing. Noncompliance is a major obstacle to planned expansion of the social security system; about 90% of private firms are still not paying into the system.

  17. 42 CFR 401.130 - Materials available at social security district offices and branch offices.

    Science.gov (United States)

    2010-10-01

    ... (HIM-10). (13) Home Health Agency Manual (HIM-11). (14) Outpatient Physical Therapy Provider Manual... social security district offices and branch offices: (1) Claims Manual of the Social Security Administration. (2) Department Staff Manual on Organization, Department of Health and Human Services, Part F, CMS...

  18. Impacto de la reforma del sistema de seguridad social sobre la equidad en los servicios de salud en Colombia The impact of social security reform on health services equity in Colombia

    Directory of Open Access Journals (Sweden)

    Juan Eduardo Céspedes-Londoño

    2002-08-01

    Full Text Available Para evaluar el impacto sobre la equidad en el acceso y en la utilización de servicios de salud del nuevo Sistema General de Seguridad Social en Salud Colombiano (SGSSS, se compararon dos cortes transversales de la población, antes (1993 y después (1997 de promulgada la Ley 100, de 1993, que lo creó, con respecto a dos indicadores de equidad: las curvas (CC e índices de concentración (IC correspondientes a la distribución del aseguramiento y a la utilización de servicios. Entre 1993 y 1997, el IC en el aseguramiento se redujo a la mitad, del 0,34 al 0,17; simultáneamente, la cobertura del SGSSS se incrementó del 23% al 57%, sobretodo entre los segmentos más pobres de la población, donde pasó del 3,1% al 43,7%, como resultado de los subsidios otorgados por los gobiernos locales. Los IC en la utilización de servicios variaron muy poco. Adicionalmente, se detectó una mayor prevalencia de enfermedad y utilización de servicios entre los asegurados, debido a selección sesgada de riesgos y riesgo moral. Estos resultados sugieren un impacto positivo del SGSSS sobre las inequidades en el acceso al aseguramiento; sin embargo, no se evidenció un impacto claro sobre la equidad en la utilización final de servicios.To evaluate the impact on access to, and use of, health services in Colombia's new national health insurance system, the authors compared two cross sections of the population: before (1993 and after (1997, with the approval of Act 100, creating the General System for Social Security in Health (SGSSS. Two equity indicators were assessed: concentration curves (CC and concentration indices (CI, summarizing the distribution of access to health care and utilization of health care services provided by the SGSSS according to income deciles. Between 1993 and 1997, the CI for access to insurance halved from 0.34 to 0.17; simultaneously, coverage increased from 23% to 57%, especially among the poorest segments of the population, where it

  19. The Mexican Social Security counterreform: pensions for profit.

    Science.gov (United States)

    Laurell, A C

    1999-01-01

    The social security counterreform, initiated in 1997, forms part of the neoliberal reorganization of Mexican society. The reform implies a profound change in the guiding principles of social security, as the public model based on integrality, solidarity, and redistribution is replaced by a model based on private administration of funds and services, individualization of entitlement, and reduction of rights. Its economic purpose is to move social services and benefits into the direct sphere of private capital accumulation. Although these changes will involve the whole social security system--old-age and disability pensions, health care, child care, and workers' compensation--they are most immediately evident in the pension scheme. The pay-as-you-go scheme is being replaced by privately managed individual retirement accounts which especially favor the big financial groups. These groups are gaining control over huge amounts of capital, are authorized to charge a high commission, and run no financial risks. The privatization of the system requires decisive state intervention with a legal change and a sizable state subsidy (1 to 1.5 percent of GNP) over five decades. The supposed positive impact on economic growth and employment is uncertain. A review of the new law and of the estimates of future annuities reveals shrinking pension coverage and inadequate incomes from pensions.

  20. Social Security Programs Throughout the World: Africa, 2015

    Data.gov (United States)

    Social Security Administration — This report, which is part of a four-volume series, provides a cross-national comparison of the social security systems in 48 countries in Africa. It summarizes the...

  1. Social Security Number Replacement Card Applications filed via the Internet

    Data.gov (United States)

    Social Security Administration — The Social Security Administration (SSA) provides a variety of ways to conduct business with the agency. SSA offers members of the public the opportunity to request...

  2. A Life-Cycle Analysis of Social Security with Housing

    OpenAIRE

    Chen, Kaiji

    2009-01-01

    This paper incorporates two features of housing in a life-cycle analysis of social security: housing as a durable good and housing market frictions. We find that with housing as a durable good unfunded social security substantially crowds out housing consumption throughout the life cycle. By contrast, aggregate non-durable consumption is higher when social security is present, although it is postponed until late in life. Moreover, in the presence of housing market frictions, social security l...

  3. A Guanxi Shibboleth based security infrastructure for e-social science

    OpenAIRE

    Jie, Wei; Young, Alistair; Arshad, Junaid; Finch, June; Procter, Rob; Turner, Andy

    2008-01-01

    An e-Social Science infrastructure generally has security requirements to protect their restricted resources or services. As a widely accepted authentication and authorization technology, Shibboleth supports the sharing of resources on interinstitutional federation. Guanxi is an open source implementation of the Shibboleth protocol and architecture. In this paper, we propose a security infrastructure for e-social science based on the Guanxi Shibboleth. This security infrastructure presents tw...

  4. Social Security privatization: balancing efficiency and fairness

    OpenAIRE

    C. Alan Garner

    1997-01-01

    This article examines these fundamental issues of economic efficiency and fairness that should be weighed when considering Social Security privatization. The first section summarizes the challenges to the current system and outlines various options for reform. The second section explains how privatization could improve economic efficiency, and briefly considers the difficult issue of the transition costs in moving from the current system to full privatization. The third section discusses impo...

  5. Security and privacy preserving in social networks

    CERN Document Server

    Chbeir, Richard

    2013-01-01

    This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches as well as outlining future directions in this field. A wide range of interdisciplinary contributions from various research groups ensures for a balanced and complete perspective.

  6. Social networking mining, visualization, and security

    CERN Document Server

    Dehuri, Satchidananda; Wang, Gi-Nam

    2014-01-01

    With the proliferation of social media and on-line communities in networked world a large gamut of data has been collected and stored in databases. The rate at which such data is stored is growing at a phenomenal rate and pushing the classical methods of data analysis to their limits. This book presents an integrated framework of recent empirical and theoretical research on social network analysis based on a wide range of techniques from various disciplines like data mining, social sciences, mathematics, statistics, physics, network science, machine learning with visualization techniques, and security. The book illustrates the potential of multi-disciplinary techniques in various real life problems and intends to motivate researchers in social network analysis to design more effective tools by integrating swarm intelligence and data mining.  

  7. 26 CFR 301.7701-11 - Social security number.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...

  8. 42 CFR 435.910 - Use of social security number.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Use of social security number. 435.910 Section 435... of social security number. (a) The agency must require, as a condition of eligibility, that each... religious objections, refuses to obtain a Social Security Number (SSN). The identification number may be...

  9. 49 CFR 10.29 - Social Security numbers.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Social Security numbers. 10.29 Section 10.29... INDIVIDUALS Maintenance of Records § 10.29 Social Security numbers. (a) No individual is denied any right... which is required by Federal statute; or (2) The disclosure of a Social Security number when such...

  10. 20 CFR 209.3 - Social security number required.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Social security number required. 209.3... RAILROAD EMPLOYERS' REPORTS AND RESPONSIBILITIES § 209.3 Social security number required. Each employer shall furnish to the Board a social security number for each employee for whom any report is submitted...

  11. 45 CFR 205.52 - Furnishing of social security numbers.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Furnishing of social security numbers. 205.52... GENERAL ADMINISTRATION-PUBLIC ASSISTANCE PROGRAMS § 205.52 Furnishing of social security numbers. The... furnish to the State or local agency a social security account number, hereinafter referred to as the SSN...

  12. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  13. 14 CFR 1212.604 - Social security numbers.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Social security numbers. 1212.604 Section... REGULATIONS Instructions for NASA Employees § 1212.604 Social security numbers. (a) It is unlawful for NASA to...' refusal to disclose their social security numbers, except where: (1) The disclosure is required by law; or...

  14. African Social Security Systems: An Ordinal Evaluation | Dixon ...

    African Journals Online (AJOL)

    The purpose of this paper is to rank the social security systems in 45 African countries using a comparative evaluation methodology that enables an assess ment to be ma(le of a country's statutory social security intention. The conclusion drawn is that the spread of African social security system design standards are ...

  15. On sampling social networking services

    OpenAIRE

    Wang, Baiyang

    2012-01-01

    This article aims at summarizing the existing methods for sampling social networking services and proposing a faster confidence interval for related sampling methods. It also includes comparisons of common network sampling techniques.

  16. Social Security And Mental Illness: Reducing Disability With Supported Employment

    Science.gov (United States)

    Drake, Robert E.; Skinner, Jonathan S.; Bond, Gary R.; Goldman, Howard H.

    2010-01-01

    Social Security Administration disability programs are expensive, growing, and headed toward bankruptcy. People with psychiatric disabilities now constitute the largest and most rapidly expanding subgroup of program beneficiaries. Evidence-based supported employment is a well-defined, rigorously tested service model that helps people with psychiatric disabilities obtain and succeed in competitive employment. Providing evidence-based supported employment and mental health services to this population could reduce the growing rates of disability and enable those already disabled to contribute positively to the workforce and to their own welfare, at little or no cost (and, depending on assumptions, a possible savings) to the government. PMID:19414885

  17. Social Security in Zimbabwe : Phase I Overview of social security in ...

    African Journals Online (AJOL)

    Most people are covered by non-formal arrangements and the family and community still play a critical role in social protection even though poverty has impacted negatively on their ability to do this effectively. Churches are another source of social security. Semi-formal arrangements include burial societies, savings and ...

  18. 49 CFR 1510.11 - Handling of security service fees.

    Science.gov (United States)

    2010-10-01

    ... air carrier holds neither legal nor equitable interest in the security service fees except for the... 49 Transportation 9 2010-10-01 2010-10-01 false Handling of security service fees. 1510.11 Section 1510.11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  19. How to securely replicate services (preliminary version)

    Science.gov (United States)

    Reiter, Michael; Birman, Kenneth

    1992-01-01

    A method is presented for constructing replicated services that retain their availability and integrity despite several servers and clients being corrupted by an intruder, in addition to others failing benignly. More precisely, a service is replicated by 'n' servers in such a way that a correct client will accept a correct server's response if, for some prespecified parameter, k, at least k servers are correct and fewer than k servers are correct. The issue of maintaining causality among client requests is also addressed. A security breach resulting from an intruder's ability to effect a violation of causality in the sequence of requests processed by the service is illustrated. An approach to counter this problem is proposed that requires that fewer than k servers are corrupt and, to ensure liveness, that k is less than or = n - 2t, where t is the assumed maximum total number of both corruptions and benign failures suffered by servers in any system run. An important and novel feature of these schemes is that the client need not be able to identify or authenticate even a single server. Instead, the client is required only to possess at most two public keys for the service.

  20. Human Development Index and Efficiency level of Social Security Hospitals

    Directory of Open Access Journals (Sweden)

    H. Sepehrdost

    2012-04-01

    Full Text Available Introduction & Objective: Hospitals as one of the main institutions providing health care services play an important role in the health system and allocate a high percentage of health sector's budget to them. This study aimed to answer whether social security hospitals efficiency levels are the same for all provinces in Iran? And whether any relationship exists between the human development indexes (HDI of the provinces and technical efficiency levels of the hospitals?Materials & Methods: Data envelopment analysis model has been used to measure technical efficiency of 65 social security hospitals, including small hospitals (working with lower than one hundred active beds and large hospitals (working with over one hundred active beds during the years 2007 to 2009. Further, the relationship between human development index and technical efficiency of hospitals in the provinces has been analyzed.Results: Results show that the average technical efficiency of small and large hospitals working in low and medium HDI provinces (0.912 and 0.937 are more than the average technical efficiency of hospitals in higher HDI provinces (0.870 and 0.887.Conclusion: It is recommended that social security organization concentrated distribute its hospital services in provinces with lower HDI and higher density of population living under the coverage of organization’s insurance. This will eventually puts its positive effects on per capita income of people, as well as more equitable distribution of income. (Sci J Hamadan Univ Med Sci 2012;19(1:32-38

  1. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NARCIS (Netherlands)

    Wolthuis, R.; Broenink, E.G.; Fransen, F.; Schultz, S.; Vries, A. de

    2010-01-01

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more

  2. The Relationship between Media Consumption and Feeling of Social Security

    OpenAIRE

    Bijan khajeNoori; Mehdi Kaveh

    2013-01-01

    IntroductionThe concept of social security and a Feeling of security and the citizens, as a key element in achieving the projected, is important Sociologists and criminologist shave always paid special attention has been sought. Study of the factors influencing the feeling of security, can increase the feeling of security is work. Also enhance citizens' feeling of security and welfare of the citizens and to accept responsibility and commitment will do. The widespread use of social media in re...

  3. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  4. Security infrastructure for on-demand provisioned Cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Wlodarczyk, T.W.; Rong, C.; Ziegler, W.

    2011-01-01

    Providing consistent security services in on-demand provisioned Cloud infrastructure services is of primary importance due to multi-tenant and potentially multi-provider nature of Clouds Infrastructure as a Service (IaaS) environment. Cloud security infrastructure should address two aspects of the

  5. Design and Implementation of Wiki Services in a Multilevel Secure Environment

    National Research Council Canada - National Science Library

    Ong, Kar L

    2007-01-01

    The Monterey Security Architecture (MYSEA) provides a distributed multilevel secure networking environment where authenticated users can securely access data and services at different security classification levels...

  6. Security in Service Level Agreements for Cloud Computing

    OpenAIRE

    Bernsmed, Karin; JAATUN, Martin Gilje; Undheim, Astrid

    2011-01-01

    The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in an on-demand manner. Insufficient security has been identified as a major obstacle to adopting Cloud services. To deal with the risks associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents a framework for security in Service Level Agreements for Cloud computing. The purpose is twofold; to help potential Cloud cu...

  7. Measuring relational security in forensic mental health services.

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  8. Measuring relational security in forensic mental health services

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  9. Market Valuation of Accrued Social Security Benefits

    OpenAIRE

    John Geanakoplos; Stephen P. Zeldes

    2009-01-01

    One measure of the health of the Social Security system is the difference between the market value of the trust fund and the present value of benefits accrued to date. How should present values be computed for this calculation in light of future uncertainties? We think it is important to use market value. Since claims on accrued benefits are not currently traded in financial markets, we cannot directly observe a market value. In this paper, we use a model to estimate what the market price for...

  10. Social security reform in two stages

    Directory of Open Access Journals (Sweden)

    Carlos Ranulfo Melo

    2006-01-01

    Full Text Available This article analyzes Brazilian social security reform during the Fernando Henrique and Lula Administrations. After comparing the contexts in which the different Constitutional Amendment proposals (PECs were submitted and the behavior by Members of Congress during the two periods, we argue that a contextual change (namely a switch in places between government and opposition affected the distribution of preferences and resources between the players and impacted the government in the various arenas in which the game was being played, and that as a result the reformist agenda has made more progress under the current Workers' Party administration.

  11. 7 CFR 273.6 - Social security numbers.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Social security numbers. 273.6 Section 273.6... normally uses the Receipt of Application for a Social Security Number, Form SSA-5028, as evidence that an... security numbers. (a) Requirements for participation. The State agency shall require that a household...

  12. 76 FR 68243 - Social Security Rulings, SSR 91-1c and SSR 66-18c; Rescission of Social Security Rulings (SSR) 66...

    Science.gov (United States)

    2011-11-03

    ..., Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: SSRs make available... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0068] Social Security Rulings, SSR 91-1c and SSR 66-18c; Rescission of Social Security Rulings (SSR) 66-18c and SSR 91-1c AGENCY: Social Security...

  13. Outsourcing as a Mean of Service for Security Provision

    Directory of Open Access Journals (Sweden)

    D.I. Persanov

    2012-03-01

    Full Text Available The article highlights the implementation of outsourcing as a mean of service for security provision. Analysis is performed to describe the current issues affecting the management decision in favor of outsourcing. Investigation covers the processes of physical, information and economical security. The main recommendations to use outsourcing for security provision are described in the conclusion.

  14. Social security in developing countries : operation and dynamics of social security mechanisms in rural Swaziland

    NARCIS (Netherlands)

    Leliveld, A.H.M.

    1994-01-01

    This study, which is based on field research carried out in Swaziland from October 1989 to December 1990, starts with an introductory chapter followed by three theoretical chapters on social security in developing countries. The content of these chapters is illustrated with an extensive case study

  15. Social security in developing countries : some theoretical considerations

    NARCIS (Netherlands)

    Leliveld, A.H.M.

    1991-01-01

    This paper discusses the concept of social security and criticizes the ILO definition of the concept as too limited to analyse non-Western social security systems. It develops an alternative definition which includes, firstly, the protection by society of individuals or social groups against a fall

  16. 20 CFR 422.103 - Social security numbers.

    Science.gov (United States)

    2010-04-01

    ... personal interview with the dependent is not required. Form SS-5 may be obtained at: (i) Any local social... previously assigned social security number(s), if any, of the applicant. A personal interview may be required... sponsoring agency of a refugee, if no personal mailing address is available). (d) Social security number...

  17. Web-Services Development in Secure Way for Highload Systems

    Directory of Open Access Journals (Sweden)

    V. M. Nichiporchouk

    2011-12-01

    Full Text Available This paper describes approach to design of web-services in secure, high load and fault tolerant implementation for mass message processing. The multicomponent architecture of web-service with possibility for high security zone is provided as well as scalability evaluation of the architecture.

  18. Social Security and the Evolution of Elderly Poverty

    OpenAIRE

    Gary V. Engelhardt; Jonathan Gruber

    2004-01-01

    We use data from the March 1968-2001 Current Population Surveys to document the evolution of elderly poverty over this time period, and to assess the causal role of the Social Security program in reducing poverty rates. We develop an instrumental variable approach that relies on the large increase in benefits for birth cohorts from 1885 through 1916, and the subsequent decline and flattening of real benefits growth due to the Social Securing 'notch', to estimate of Social Security on elderly ...

  19. Will Pre-Funding Provide Security for Social Security? A Review of the Literature

    OpenAIRE

    Robert L. Brown

    2000-01-01

    President Clinton has proposed creating larger social security funds and investing a portion of them in the private sector. Others have suggested more radical reforms such as moving social security from a defined-benefit scheme to a defined contribution plan based on the Chilean model. These proposals are based on the goal of creating higher investment returns, which would make social security benefits easier to finance in the long run. After an extensive review of the literature, this paper ...

  20. Who's (Still) Above the Social Security Payroll Tax Cap?

    OpenAIRE

    Nicole Woo; Janelle Jones; John Schmitt

    2012-01-01

    The Social Security payroll tax cap is the earnings level above which no further Social Security taxes are collected. The cap is currently at $110,100, though legislation has been introduced in Congress to apply the Social Security payroll tax to earnings above $250,000 (but not between the current cap and this level). This issue brief updates earlier work, finding that 5.8 percent of workers would be affected if the Social Security cap were eliminated entirely and 1.4 percent would be affect...

  1. Saving and Social Security Wealth: A Case of Turkey

    OpenAIRE

    H. Yigit Aydede

    2007-01-01

    This paper is the first attempt in the literature to investigate the effects of public social security on aggregate consumption in a time-series setting for a developing country, Turkey that has one of the most generous social security systems in the OECD region. In order to quantify the social security variable, the paper uses the social security wealth (SSW) series calculated for the first time for Turkey and shows that SSW is the largest part of the household wealth in Turkey and therefore...

  2. DATA Act File C Award Financial - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File C. File C includes the agency award information from the financial accounting system at...

  3. Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

    OpenAIRE

    Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje

    2015-01-01

    - This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, and taking into account security issues identified in recent research on Cloud security. The document is intended to be used by potential cloud customers that need to assess the security of a c...

  4. Sample Loss and Survey Bias in Estimates of Social Security Beneficiaries: A Tale of Two Surveys.

    OpenAIRE

    John L. Czajka; James Mabli; Scott Cody

    2008-01-01

    Data from the Census Bureau’s Survey of Income and Program Participation (SIPP) and the Current Population Survey (CPS) provide information on current and potential beneficiaries served by Social Security Administration (SSA) programs. SSA also links administrative records to the records of survey respondents who provide Social Security numbers. These matched data expand the content of the SIPP and CPS files to fields available only through SSA and Internal Revenue Service records—such as l...

  5. A study on the barriers of the implementation of social security act in ...

    African Journals Online (AJOL)

    In this study, an analytical review was done on the historical process and contexts of welfare system and social security in order to analyze and evaluate the main features of this act especially in the area of medical services. It was also attempted to study the executive barriers of the appropriate implementation of social ...

  6. 20 CFR 422.120 - Earnings reported without a social security number or with an incorrect employee name or social...

    Science.gov (United States)

    2010-04-01

    ... number or with an incorrect employee name or social security number. 422.120 Section 422.120 Employees... reported without a social security number or with an incorrect employee name or social security number. (a... social security number or with a different employee name or social security number than shown in SSA's...

  7. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  8. Review of Social Networking Sites' Security and Privacy

    OpenAIRE

    YANG, SHUN

    2015-01-01

    Nowadays social media networking has dramatically increased. Social networking sites like Facebook make users create huge amount of profiles and share personal information within networking of different users. Social networking exposes personal information far beyond the group of friends. And that information or data on social media networking could be potential threat to people's information security and privacy. In this review, we are going to view the privacy risks and security problem...

  9. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment.

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung

    2015-10-01

    Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.

  10. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun

    2015-01-01

    Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical

  11. Effect of social capital on food security among rural farming ...

    African Journals Online (AJOL)

    The study analyzed the effect of social capital on food security of rural farming households in Abia State, Nigeria with specific focus on measuring social capital dimensions among the rural farming households; determining the food security status of the households; analyzing the influence of socioeconomic characteristics of ...

  12. Tax Compliance and Social Security Contributions – The Case Of Slovenia

    Directory of Open Access Journals (Sweden)

    Tomaz LESNIK

    2014-06-01

    Full Text Available In this paper, we will examine the causes behind the higher level of compliance with social security contributions in comparison with other tax categories in the case of Slovenia. The results of econometric models suggest that the activities of the Tax Administration of the Republic of Slovenia, which were more stringently performed in the area of social security contributions in the most recent period, are an important – but not the only factor – behind the higher level of compliance in connection with social security contributions. At the same time, the decrease in tax compliance with other taxes (income tax, corporate income tax, and VAT did not essentially influence the higher level of compliance with social security contributions. The more consistent treatment of unpaid social security contributions as a criminal offence and the higher public awareness about the importance of paying social security contributions in the latest period are recognized as important factors which simultaneously constitute the main difference between social security contributions and other taxes. The higher level of public awareness about the benefits that result from public services financed with taxes is recognized as a possible way to more optimally collect taxes in Slovenia.

  13. Supplemental Security Income (SSI) / Internal Revenue Service (IRS) 1099

    Data.gov (United States)

    Social Security Administration — A finder file from SSA's Title XVI database is provided to the IRS. The IRS discloses 1099 information to SSA for use in verifying eligibility, amount, and benefits...

  14. 78 FR 5122 - NASA Security and Protective Services Enforcement

    Science.gov (United States)

    2013-01-24

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 14 CFR Parts 1203a, 1203b, and 1204 [Docket No NASA-2012-0007] RIN 2700-AD89 NASA Security and Protective Services Enforcement AGENCY: National Aeronautics... nonsubstantive changes to NASA regulations to clarify the procedures for establishing controlled/ secure areas...

  15. Quality of Security Service Costing Demonstration for the MSHN Project

    National Research Council Canada - National Science Library

    Spyropoulou, Evdoxia

    2000-01-01

    .... Each service has two costs: an initialization cost and a run-time cost. The demonstration illustrates the costs incurred as network modes and security levels are changed. High level and detailed specifications are provided.

  16. Security infrastructure for dynamically provisioned cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lopez, D.R.; Morales, A.; García-Espín, J.A.; Pearson, S.; Yee, G.

    2013-01-01

    This chapter discusses conceptual issues, basic requirements and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructure. This chapter describes general use cases for provisioning cloud infrastructure services

  17. 76 FR 65558 - Rescission of Social Security Ruling 97-2p

    Science.gov (United States)

    2011-10-21

    ...-800-325-0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2007-0092] Rescission of Social Security Ruling 97-2p AGENCY: Social Security Administration. ACTION: Notice of rescission of Social Security Ruling...

  18. Resource optimization and security for cloud services

    CERN Document Server

    Xiong , Kaiqi

    2014-01-01

    This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is

  19. ADMINISTRATIVE EXPENDITURES OF SOCIAL SECURITY FUNDS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Nataliia Ivanchuk

    2017-12-01

    Full Text Available Along with the expenditures for social protection, social security funds finance administrative direction, which should correspond to the amount of functions performed by a particular fund. The purpose of the paper is to determine ways to reduce administrative expenditures of state social security funds in the conditions of reforming Ukrainian economy. For this purpose, the authors investigate distribution of the expenditures between social security funds, analyse dynamics and structure of assignments for fund administration, and suggest possible ways to rationalize maintenance cost for these institutions. Methodology. Administrative expenditures are an integral part of the cost of social security funds and include particular items of expenses in the budget of these institutions. Applying a systematic approach to calculating the administrative costs of social security funds of Ukraine the authors have taken into account the expenditures related to funding management, support for information systems, and organization of work with insured people. Results of the survey showed that in 2007–2016 Pension Fund of Ukraine incurred the largest part of social expenditures (more than 90% compared with other social insurance funds (less than 10%. At the same time, the administrative expenses were divided approximately into two halves between Pension Fund and other social security funds. In 2015, the government launched a reform of social insurance funds that aimed to reduce funds to three institutions but a decrease in the total amount of administrative expenditures has not been achieved yet. In addition, Pension Fund of Ukraine was least burdened with administrative expenses, while other social security funds with a relatively small share of social expenditures were burdened with administrative expenditures much more. Practical implications. Research showed that nowadays the existence of several social security funds in Ukraine is economically

  20. A real social position of ethnic minorities in the area of medical care and social security

    Directory of Open Access Journals (Sweden)

    Nagradić Slobodan

    2016-01-01

    Full Text Available This work contains research of the position of ethnic minorities in two important existential areas such are medical care and social security. The author puts under a critical analyze not only semantics of the ideas and phrases of medical care and, especially, social security themselves, believing that their inaccurate meaning and usage hide more than they expose facts and relations according to which it is possible to detect and describe a real position of ethnic minorities in the post-dayton society of Bosnia and Herzegovina, but also the experience of implementation of rules from those areas, which should enable them to use the rights defined. Of course, his attention is specially focused on members of Roma ethnic minority, for which he claims to be the most sensible, and that their members, unlike members of all the other ethnic minorities in BiH, are most, or more precisely, only discriminated a-pro-pos the protection of their rights in the areas of medical care and social security, which is not only a responsibility of institutions that provide services in the mentioned areas of life. By using a method of analysis of contents of legal (constitutions, laws, conventions, charters, resolutions, sublegal acts and political (reports, evaluations, analyses, strategies, action plans etc. documents, and by analyzing real life features, processes, relations and events in contemporary BiH society, the author came to sociologically relevant insights of real social and legally-political positions of ethnic minorities in BiH, a state and courses in the areas of medical care and social security and clearly formulated a conclusion that members of ethnic minority determined collectivities, apart from Roma, are in no way ancillary positioned compared to members of constitutional people of post-dayton BiH.

  1. 77 FR 54646 - Social Security Acquiescence Ruling (AR) 12-1(8); Correction; Petersen v. Astrue, 633 F.3d 633...

    Science.gov (United States)

    2012-09-05

    ... II of the Social Security Act AGENCY: Social Security Administration. ACTION: Notice of Social Security Acquiescence Ruling; Correction. SUMMARY: The Social Security Administration published a document... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR...

  2. A new data collaboration service based on cloud computing security

    Science.gov (United States)

    Ying, Ren; Li, Hua-Wei; Wang, Li na

    2017-09-01

    With the rapid development of cloud computing, the storage and usage of data have undergone revolutionary changes. Data owners can store data in the cloud. While bringing convenience, it also brings many new challenges to cloud data security. A key issue is how to support a secure data collaboration service that supports access and updates to cloud data. This paper proposes a secure, efficient and extensible data collaboration service, which prevents data leaks in cloud storage, supports one to many encryption mechanisms, and also enables cloud data writing and fine-grained access control.

  3. Strategic Management for IT Services on Outsourcing Security Company

    Directory of Open Access Journals (Sweden)

    Lydia Wijaya

    2018-04-01

    Full Text Available Information Technology (IT is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their business processes. In this research, we will design Strategic Management for IT Services for outsourcing security company. We use an outsourcing security company as a case study of IT Strategy Management for IT Services development. The purpose of this study is to create an IT services strategy for security outsourcing companies. The framework used is the ITIL (Information Technology Infrastructure Library framework service strategy in strategy management for IT services process. There are several steps taken in the making of the strategy: (a Strategic assessment stage to analyzed internal and external factors of the company. (b Strategy generation by creating the strategic plan. (c Strategy execution to determine the tactical plan. And (d strategy measurement and evaluation. This study produced the proposed IT service system that suits the needs of the company in the form of strategic, tactical plans and strategy measurement. This result can be used as the foundations of IT service development in outsourcing security company. In the process of this study, we work closely with stakeholders; every work product has been verified and validated by stakeholders.

  4. Sense of security felt by the armed police with different service length and influential factors

    Directory of Open Access Journals (Sweden)

    Jing CHEN

    2011-02-01

    Full Text Available Objective To investigate the status of sense of security felt by the armed police and the influential factors thereof.Methods The sense of security,stress level,comprehension of social supports and the coping styles were measured and evaluated by use of Security Questionnaire(SQ,Psychological Stress Self-Evaluation Test(PSET,Perceived Social Support Scale(PSSS and Coping Style Scale(CSS in 725 armed police,and the differences were compared between the servicemen with different service length(1,2 and 3 years.The correlation between security sense(expressed as personal safety and determination of control and comprehension of social supports,coping styles and T score on stress level were analyzed.A stepwise regression analysis was done to screen the factors influencing the security sense of servicemen with the overall score of security sense as the dependent variable and the comprehension of social supports(expressed as inside-and outside-family support,coping styles(expressed as illusion,resignation,rationalization,self-condemned determinant,resort and problem-solving capacity and T score on stress level as the independent variables.Results Compared with the armed police with 1 year of military service,those with 2 or 3 years of military service got lower scores in personal safety,determination of control,inside-and outside-family support,and resort and problem-solving capacity(P 0.05.The two factors of comprehension of social supports(inside-and outside-family support,and the two factors of coping styles(resort and problem-solving capacity were positively correlated with the sense of security(personal safety and determination of control(P < 0.001;while the four factors of coping styles(illusion,resignation,rationalization and self-condemned determinant and the T score on stress level were negatively correlated with the sense of security(P < 0.001.It was proved by multivariate linear regression analysis that outside-family support

  5. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  6. SecSLA: A Proactive and Secure Service Level Agreement Framework for Cloud Services

    OpenAIRE

    Fahad F. Alruwaili; T. Aaron Gulliver

    2014-01-01

    Cloud customers migrate to cloud services to reduce the operational costs of information technology (IT) and increase organization efficiency. However, ensuring cloud security is very challenging. As a consequence, cloud service providers find it difficult to persuade customers to acquire their services due to security concerns. In terms of outsourcing applications, software, and/or infrastructure services to the cloud, customers are concerned about the availability, integrity, privacy...

  7. Service oriented architecture governance tools within information security

    OpenAIRE

    2012-01-01

    M.Tech. Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for applications. Organisations adopt Service Oriented Architecture with the aim of automating and integrating business processes. However, it has information security vulnerabilities that should be considered. For example, applications exchange information across the Internet, where it ...

  8. Security measures effect over performance in service provider network

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Abstract—network security is defined as a set of policies and actions taken by a ... These threats are linked with the following factors that are ... typically smaller than those in the service provider space. ... Service providers cannot manage to provide ... e the DB performance effect ... r the business needs [10].

  9. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  10. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  11. Security threats and their mitigation in infrastructure as a service

    Directory of Open Access Journals (Sweden)

    Bineet Kumar Joshi

    2016-09-01

    Full Text Available Cloud computing is a hot technology in the market. It permits user to use all IT resources as computing services on the basis of pay per use manner and access the applications remotely. Infrastructure as a service (IaaS is the basic requirement for all delivery models. Infrastructure as a service delivers all possible it resources (Network Components, Operating System, etc. as a service to users. From both users and providers point of view: integrity, privacy and other security issues in IaaS are the important concern. In this paper we studied in detail about the different types of security related issues in IaaS layer and methods to resolve them to maximize the performance and to maintain the highest level of security in IaaS.

  12. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  13. Legitimizing Security in the Ivory Tower: Canadian University Corporate Security Services' Public Quest for Legitimacy.

    Science.gov (United States)

    Wilkinson, Blair

    2016-05-01

    This article examines how university corporate security (UCS) services engage in legitimation work in their attempts to make their university communities (i.e., faculty, staff, students) and political masters (i.e., university administrators, boards of governors, senators) believe that they are honest, trustworthy, and caring and have authority that should be deferred to. This is accomplished through the analysis of interview and observational data collected as part of a research project exploring UCS services at five Canadian universities and an examination of how UCS services at 14 Canadian universities communicate using the social media service Twitter. These UCS services were found to primarily use Twitter for the purposes of soliciting or requesting information and for networking. In communicating through Twitter, UCS services engage in public legitimation work in which they make claims about and attempt to demonstrate their expertise, authority, and accountability. This article argues that both UCS services' particular legitimacy problem (i.e., their possession of both private and public attributes) and the interactive nature of public legitimation work create tensions that may serve to disrupt UCS services' ability to attain legitimacy. Cet article examine la manière dont les services de sécurité d'entreprise à l'université (SEU) s'engagent à légitimer leurs tentatives de persuader leurs communautés universitaires (c'est-à-dire le corps professoral, le personnel et les étudiants) ainsi que la haute administration (c'est-à-dire les administrateurs de l'université, le conseil des gouverneurs et les sénateurs) qu'ils sont honnêtes, attentifs, dignes de confiance, et qu'ils possèdent un niveau d'autorité auquel quiconque devrait se référer. Ceci sera accompli en analysant un corpus d'entrevues et d'observations dans le cadre d'un projet de recherche examinant les services de type SEU dans cinq universités canadiennes, ainsi qu'une étude sur

  14. Social Security Administration Retirement, Survivors, and Disability Insurance (RSDI) Improper Payments

    Data.gov (United States)

    Social Security Administration — This dataset shows improper payment experience for the Social Security Retirement, Survivors, and Disability Insurance program paid to workers, their dependents, and...

  15. Rural social security for Zimbabwe: Challenges and opportunities for ...

    African Journals Online (AJOL)

    For them, the remaining sources of livelihood now reside in non-formal social security arrangements anchored upon a staggering cultural base being eroded by the fast encroaching tide of neoliberal individualistic ways of life. Regrettably, government has got no institutional framework to promote non-formal security ...

  16. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  17. Social Security and Pensions in Lebanon: A Non-Contributory ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    UPGRADING LEBANON’ S ECONOMIC ANALYTICAL CAPACITY PROJECT 105541

    analysis of the need for pension reform and a public financial perspective on pension reform, and a proposal for ... Elderly people, who are seventy and above today, will not benefit from ..... component of existing Lebanese social security cost.

  18. National Pending of Social Security Hearing Requests by Format

    Data.gov (United States)

    Social Security Administration — Report refers to the National total of cases pending at the hearing level and the number and percentages of those cases that were in either electronic format (EF) or...

  19. Reforming the South African Social Security Adjudication System ...

    African Journals Online (AJOL)

    Reforming the South African Social Security Adjudication System: innovative experiences ... Dispute resolution systems in the labour relations, business competition ... the rights of access to justice, to a fair trial and to just administrative action).

  20. A Game-Theoretical Approach to Multimedia Social Networks Security

    Science.gov (United States)

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226

  1. Privacy-preserving security solution for cloud services

    OpenAIRE

    L. Malina; J. Hajny; P. Dzurenda; V. Zeman

    2015-01-01

    We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their...

  2. Child poverty vs Medicare and Social Security.

    Science.gov (United States)

    Waldman, H B

    1997-01-01

    The series of government safety net programs provides economic security primarily to older populations. In this period of competition for limited federal resources, the need to create a public awareness of the continuing and growing poverty of children is emphasized.

  3. Social Security privatization in Latin America.

    Science.gov (United States)

    Kritzer, B E

    2000-01-01

    The new, partially privatized social security system adopted by Chile in 1981 has attracted attention in many parts of the world. Since then, a number of Latin American countries have implemented the Chilean model, with some variations: either with a single- or multi-tier system, or with a period of transition to take care of those in the labor force at the time of the change. The single-tier version consists of a privatized program with individual accounts in pension fund management companies. Multi-tier systems have a privatized component and retain some form of public program. This article describes each of the new programs in Latin America, their background, and similarities and differences among them. Much more information is available for Chile than for the other countries (in part because Chile has the oldest system), enough to be able to evaluate what, in most cases, is the most accurate information. That is often not the case for the other countries, especially when dealing with subjects such as transition costs and net rates of return (rates of return minus administrative fees). No country has copied the Chilean system exactly. Bolivia, El Salvador, and Mexico have closed their public systems and set up mandatory individual accounts. Argentina has a mixed public/private system with three tiers. In Colombia and Peru, workers have a choice between the public and private programs. Uruguay created a two-tier mixed system. Costa Rica has a voluntary program for individual accounts as a supplement to the pay-as-you-go program and has just passed a law setting up mandatory accounts containing employer contributions for severance pay. All of the countries continue to face unresolved issues, including: High rates of noncompliance--the percentage of enrollees who do not actively and regularly contribute to their accounts--which could lead to low benefits and greater costs to the governments that offer a guaranteed minimum benefit; Proportionately lower benefits for

  4. Evaluating pay-as-you-go social security systems

    OpenAIRE

    Bachmann, Andreas; Wüthrich, Kaspar

    2013-01-01

    This paper proposes a new method for welfare analysis of unfunded social security systems. Based on an overlapping generations model with endogenous labor supply, we derive a formula for the evaluation of existing pay-as-you-go social security systems that depends on impulse response functions and projected growth rates only. We propose an implementation strategy based on reduced form estimates of a VAR model that is valid under weak assumptions about the deep structure of the model. Our meth...

  5. Social Security Numbers in Medicaid Records: Reporting and Validity, 2009

    OpenAIRE

    John L. Czajka; Shinu Verghese

    2013-01-01

    This report presents findings from a validation study of Social Security numbers (SSNs) in Medicaid Statistical Information System (MSIS) records for the fourth quarter of federal fiscal year 2009. The study produced results for the nation and the states on how often SSNs were reported in MSIS records and how often the reported SSNs passed a validation test at the U.S. Census Bureau, based on data obtained from the Social Security Administration.

  6. Using the social security system to deliver housing policy

    OpenAIRE

    Cheung, Louise, Gee Wing

    2016-01-01

    This thesis examines the interaction between housing policy and the social security benefits that support housing costs. Analysis concerns the extent and type of State intervention in housing, thus explaining the dynamic between State and individual responsibility in housing policy. This thesis involves an exploration of the different treatment of the owner-occupied and the rented housing sectors, with reference to the social security benefits which fund ongoing housing costs. This thesis see...

  7. Implementation of Learning Organization Components in Ardabil Social Security Hospital

    OpenAIRE

    Azadeh Zirak

    2015-01-01

    This study aimed to investigate the implementation of learning organization characteristics based on Marquardt systematic model in Ardabil Social Security Hospital. The statistical population of this research was 234 male and female employees of Ardabil Social Security Hospital. For data collection, Marquardt questionnaire was used in the present study which its validity and reliability had been confirmed. Statistical analysis of hypotheses based on independent samples t-test showed that lear...

  8. Financial Hardship Before and After Social Security's Early Eligibility Age

    OpenAIRE

    Richard W. Johnson; Gordon B.T. Mermin

    2009-01-01

    Although poverty rates for Americans ages 65 and older have plunged over the past half century, many people continue to fall into poverty in their late fifties and early sixties. This study examines financial hardship rates in the years before qualifying for Social Security retirement benefits at age 62 and investigates how the availability of Social Security improves economic well-being at later ages. The analysis follows a sample of adults from the 1937-39 birth cohort for 14 years, trackin...

  9. Econometric modeling of the balance of social security Brazil

    OpenAIRE

    Isaac Figueiredo de Sousa

    2009-01-01

    This work aims to build models using econometrics techniques to explain the components of the balance of Social Security System, or in other words, the net value of tax revenues and the benefit values of the General Regime of Social Security. These models were subjected to statistic validations indicated in the theoretical reference of econometrics, to apply the method of ordinary least square from the classic model of linear regression. From an increasing longevity and the gradual decr...

  10. Factor structure of the Essen Climate Evaluation Schema measure of social climate in a UK medium-security setting.

    Science.gov (United States)

    Milsom, Sophia A; Freestone, Mark; Duller, Rachel; Bouman, Marisa; Taylor, Celia

    2014-04-01

    Social climate has an influence on a number of treatment-related factors, including service users' behaviour, staff morale and treatment outcomes. Reliable assessment of social climate is, therefore, beneficial within forensic mental health settings. The Essen Climate Evaluation Schema (EssenCES) has been validated in forensic mental health services in the UK and Germany. Preliminary normative data have been produced for UK high-security national health services and German medium-security and high-security services. We aim to validate the use of the EssenCES scale (English version) and provide preliminary normative data in UK medium-security hospital settings. The EssenCES scale was completed in a medium-security mental health service as part of a service-wide audit. A total of 89 patients and 112 staff completed the EssenCES. The three-factor structure of the EssenCES and its internal construct validity were maintained within the sample. Scores from this medium-security hospital sample were significantly higher than those from earlier high-security hospital data, with three exceptions--'patient cohesion' according to the patients and 'therapeutic hold' according to staff and patients. Our data support the use of the EssenCES scale as a valid measure for assessing social climate within medium-security hospital settings. Significant differences between the means of high-security and medium-security service samples imply that degree of security is a relevant factor affecting the ward climate and that in monitoring quality of secure services, it is likely to be important to apply different scores to reflect standards. Copyright © 2013 John Wiley & Sons, Ltd.

  11. South African Egov: Secure E-Services

    CSIR Research Space (South Africa)

    Dlamini, IZ

    2010-10-01

    Full Text Available Electronic government and e-services development in South Africa is moving at a snail-pace but has potential to improve. Nothing much has been done regarding the implementation of e-government applications. There are bits and pieces for different...

  12. 39 CFR 761.8 - Servicing book-entry Postal Service securities; payment of interest, payment at maturity or upon...

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Servicing book-entry Postal Service securities... POSTAL SERVICE POSTAL SERVICE DEBT OBLIGATIONS; DISBURSEMENT POSTAL MONEY ORDERS BOOK-ENTRY PROCEDURES § 761.8 Servicing book-entry Postal Service securities; payment of interest, payment at maturity or upon...

  13. Consumer Social Responsibility: Example of Cycling Service

    Directory of Open Access Journals (Sweden)

    Jesevičiūtė-Ufartienė Laima

    2017-12-01

    Full Text Available The article presents research on consumer social responsibility based on the example of cycling service. The author analyses the tourism sector determining a relation between socially responsible behaviour of an organization and consumer behaviour.

  14. Social Security Reform and Population Ageing in a Two-Sector Growth Model

    NARCIS (Netherlands)

    van Groezen, B.J.A.M.; Meijdam, A.C.; Verbon, H.A.A.

    2002-01-01

    This paper analyses the effects of reducing unfunded social security and population ageing on economic growth and welfare, both for a small open economy and for a closed economy.The economy consists of a service sector and a commodity sector.Productivity growth only occurs in the latter sector and

  15. Social security reform and population ageing in a two-sector growth model

    NARCIS (Netherlands)

    Groezen, Bas van; Meijdam, L.; Verbon, H.

    2002-01-01

    This paper analyses the e¤ects of reducing unfunded social security and population ageing on economic growth and welfare, both for a small open economy and for a closed economy. The economy consists of a service sector and a commodity sector. Productivity growth only occurs in the latter sector

  16. Understanding Title V of the Social Security Act: A Guide to the Provisions of the Federal Maternal and Child Health Block Grant.

    Science.gov (United States)

    Health Resources and Services Administration (DHHS/PHS), Washington, DC. Maternal and Child Health Bureau.

    The Maternal and Child Health (MCH) Services Block Grant (Title V of the Social Security Act) has operated as a federal-state partnership since the Social Security Act was passed in 1935. Through Title V, the federal government pledged its support of state efforts to extend health and welfare services for mothers and children. Title V has been…

  17. SERVICE AND SECURITY MONITORING IN CLOUD

    Directory of Open Access Journals (Sweden)

    Cristian IVANUŞ

    2015-05-01

    Full Text Available In the cloud computing context, Quality of Software (QoS is defined as the extent to which user requirements are met by the providers of cloud resources. Users can define their requirements using low level metrics such as processing power of the Central Processing Unit (CPU or the amount of memory for a virtual machine, but they are interested in defining their requirements using more abstract concepts at a higher level, such as response time and service availability. Increasing complexity, size and number of areas in which cloud penetrated makes it difficult for anticipating how the system will behave. Because of this, different research groups have started to work on QoS level fields for defining the conditions that must be accomplished by a service in order to be delivered. Likewise, it was invested effort in developing of means for managing and assessing efficiently the status of these conditions.

  18. Problematising internal security: Crime, community and social exclusion

    Directory of Open Access Journals (Sweden)

    Kari Bruun

    2016-12-01

    Full Text Available This article examines the problematisation of crime, crime prevention and security in contemporary security policy programmes using three Finnish internal security programmes and theory-based content analysis. The study is based on the theory (the perspective of an analytics of government. The findings highlight the central meaning of social exclusion and community as security practices wherein social exclusion is seen as a threat to security and a risk for crime. Indeed, community-based crime prevention plays a central role in the programmes along with the worry about serious crimes and the high level of homicides. A fluid governing policy without crime and accidents is the implicit goal of these programmes.

  19. Reforming the South African social security adjudication system: innovative experiences from South African non-social security jurisdictions

    OpenAIRE

    Nyenti, MAT

    2016-01-01

    There is currently no uniform social security dispute resolution system in South Africa due to the piecemeal fashion in which schemes were established or protection against individual risks regulated. The result is that each statute provides for its own dispute resolution institution(s) and processes. There are also various gaps and challenges in the current social security dispute resolution systems, some of these relating to the uncoordinated and fragmented nature of the system; inaccessibi...

  20. [Social Security Needs Social Medicine: Self-image of Physicians Practicing Social Medicine in Statutory Health Insurances and Social Security Systems].

    Science.gov (United States)

    Nüchtern, E; Bahemann, A; Egdmann, W; van Essen, J; Gostomzyk, J; Hemmrich, K; Manegold, B; Müller, B; Robra, B P; Röder, M; Schmidt, L; Zobel, A; von Mittelstaedt, G

    2015-09-01

    In January, 2014, the division "Social Medicine in Practice and Rehabilitation" of the German Society for Social Medicine and Prevention established a working group on the self-image of the physicians active in the field of social medicine (medical expertise and counseling). The result of this work is the contribution presented here after consensus was achieved by specialists of social medicine from different fields and institutions (social security etc.) and in good cooperation with Prof. Dr. Gostomzyk and Prof. Dr. Robra. Based on the importance of an up to date social medicine for claimants and recipients of benefits on the one hand and the social security system on the other, and also on a description of the subjects, objectives and methods the following aspects are presented: · The perspective of social medicine. · Qualification in social medicine, concerning specialist training and continuing medical education. · The fields of duty of experts in social medicine. · The proceedings in social medicine. The working group identified challenges for the specialists in social medicine by a narrowed perception of social medicine by physicians in hospitals and practice, accompanied by an enlarged importance of expertise in social medicine, by the demand for more "patient orientation" and gain of transparency, and concerning the scientific foundation of social medicine. The working group postulates: · The perspective of social medicine should be spread more widely.. · Confidence in experts of social medicine and their independency should be strengthened.. · The not case-related consulting of the staff and executives should be expanded.. · Social medicine in practice needs support by politics and society, and especially by research and teaching.. · Good cooperation and transfer of experiences of the different branches of social security are essential for the impact of social medicine.. © Georg Thieme Verlag KG Stuttgart · New York.

  1. Instant SQL Server Analysis Services 2012 Cube Security

    CERN Document Server

    Jayanty, Satya SK

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Instant Microsoft SQL Server Analysis Services 2012 Cube Security is a practical, hands-on guide that provides a number of clear, step-by-step exercises for getting started with cube security.This book is aimed at Database Administrators, Data Architects, and Systems Administrators who are managing the SQL Server data platform. It is also beneficial for analysis services developers who already have some experience with the technology, but who want to go into more detail on advanced

  2. Social support and marginalization as determinants of prenatal care in women with social security in Mexico.

    Science.gov (United States)

    Maldonado-Cisneros, Maritza; Medina-Gómez, Oswaldo Sinoe

    2018-01-01

    Prenatal care ensures favorable results for maternal-fetal health and, to that end, it must be provided early, periodically, comprehensively and with high coverage. To find out the social determinants of prenatal care in women affiliated to the Mexican Institute of Social Security during 2014. Cross-sectional study where the association of social conditions, social support and family functioning with inadequate prenatal care was analyzed. A descriptive analysis was performed; hypothesis tests were used with chi-square (95% level of confidence). The prevalence ratio and Mann-Whitney's U-test were estimated to compare medians and logistic regression. Of the interviewed women, 58.1% had inadequate prenatal care, mainly associated with unplanned pregnancy, poor social support, low level of education and higher marginalization. Not having leaves of absence granted by employers was the main barrier in those women who did not attend health services. There is a need for strategies to be designed and implemented to enable understanding the interaction between different biological and social dimensions of the health-disease process and reduce health inequities that affect pregnant women, in order to achieve good prenatal care and to implement alternative models guaranteeing its efficiency. Copyright: © 2018 SecretarÍa de Salud.

  3. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  4. Social security administration in India- study of provident funds and pension scheme

    OpenAIRE

    Rao, Madhava P

    2005-01-01

    Social Security is becoming a distinct part of social policy of India and the time has come to give a serious thought to ever increasing Social Security needs of the population. There are diversified views on extension of Social Security coverage. Some say it should be limited to only working population and to their families and while others say that the entire population should be covered under Social Security programmes. Social Security schemes further have been branched out as protective...

  5. Distinguishing Between Private Law and Social-Security Law in ...

    African Journals Online (AJOL)

    This article attempts to highlight the potential danger in applying private-law principles to social-security law in deciding whether or not social grants should be deducted from awards for damages. Typically, this issue comes to the fore where a damage-causing event, such as death, sets into motion a system that provides for ...

  6. Identifying the Enemy: Social Categorization and National Security Policy

    Science.gov (United States)

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  7. 26 CFR 1.31-2 - Credit for “special refunds” of employee social security tax.

    Science.gov (United States)

    2010-04-01

    ... security tax. 1.31-2 Section 1.31-2 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY INCOME TAX INCOME TAXES Credits Against Tax § 1.31-2 Credit for “special refunds” of employee social security tax. (a) In general. (1) In the case of an employee receiving wages from more than one employer...

  8. Legal aspects of Polish Tax and Social Security in Agriculture

    Directory of Open Access Journals (Sweden)

    Agnieszka Parlińska

    2008-12-01

    Full Text Available In the paper are describing legal aspects of treatment of farming sector in the tax and social security system in Poland. Tax System in Polish Agriculture is an integral part of Polish Tax System. Most taxes paid by farmers are property taxes, which supplied the budget of main local authority in Poland (municipality. In some cases farmers pay also personal income tax and value added tax like those, who run specific agricultural production as well individual farmers who operate through a limited liability company are subject to corporate income tax. The social security fund for farmers (known as KRUS was speared in 1990 from the social security system (ZUS. Farmers receive similar benefits with regard to health care, education, and social welfare although the contributions into the farmers system are lower then under the ZUS system.

  9. ITIL Based Service Level Management if SLAs Cover Security

    Directory of Open Access Journals (Sweden)

    Tomas Feglar

    2005-08-01

    Full Text Available Current level of information technology creates new perspectives for more IT service oriented market. Quality of these services requires slightly different approach then was applied for products including software. No IT services are delivered and supported in risk free environment. Risks would be considered consistently with IT services quality gaps from Service Level Management (SLM perspective. SLM is one of ITIL modules that are widely used within the IT service industry. We identified some weaknesses in how SLM is developed in ITIL environment if service level agreement (SLA has cover Security. We argue that in such cases Architecture modeling and risk assessment approach let us effectively control analytical effort that relates to risks identification and understanding. Risk driven countermeasures designed in a next step (Risk treatment have significant impact to the SLM especially from responsibility perspective. To demonstrate SLM's importance in real practice we analyze SLA synthesize process in CCI (Cyber Critical Infrastructure environment.

  10. Security issues and service provision in Laz Otti Memorial Library ...

    African Journals Online (AJOL)

    Lagos Journal of Library and Information Science ... Data was analysed with the aid of Statistical Package for Social Sciences (SPSS. ... To curb this menace, library management must educate users on use of library resources ... Keywords: Library security, Theft, Mutilation, Vandalism, Library resources; Laz Otti Memorial ...

  11. 12 CFR 792.68 - Use and collection of Social Security numbers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Use and collection of Social Security numbers... Act § 792.68 Use and collection of Social Security numbers. The head of each NCUA Office shall take... furnish Social Security numbers, and that individuals who are requested to provide Social Security numbers...

  12. 28 CFR 16.53 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... 1974 § 16.53 Use and collection of social security numbers. Each component shall ensure that employees... privilege as a result of refusing to provide their social security numbers, unless the collection is... provide their social security numbers must be informed of: (1) Whether providing social security numbers...

  13. 77 FR 67724 - Rescission of Social Security Acquiescence Ruling 05-1(9)

    Science.gov (United States)

    2012-11-13

    ...-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0058] Rescission of Social Security Acquiescence Ruling 05-1(9) AGENCY: Social Security Administration. [[Page 67725

  14. Social Security: a financial appraisal for the median voter.

    Science.gov (United States)

    Galasso, V

    Several explanations have been proposed for why voters continue to support unfunded social security systems. Browning (1975) suggests that the extremely large unfunded pension systems of most democracies depend on the existence of a voting majority composed of middle-aged and older people who fail to fully internalize the cost of financing the system. In fact, when voting, economically rational workers consider only their current and future contributions to the system and their expected pension benefits--not their past contributions, which they regard as sunk costs. If, for a majority of voters, the expected continuation return from social security exceeds the return from alternative assets, an unfunded social security system is politically sustainable. This article explores the validity of Browning's proposition by quantifying the returns that U.S. voters in presidential elections from 1964 to 1996 have obtained, or expect to obtain, from Social Security. Did "investments" in Social Security outperform alternative forms of investment, such as mutual funds or pension funds, for a majority of the voters? What can be expected for the future? The U.S. Social Security system redistributes income within age cohorts on the basis of sex, income, and marital status. To account for some of these features, the median voter is represented by a family unit whose members--a husband who accounts for 70 percent of household earnings and a wife who accounts for 30 percent--make joint economic and voting decisions. Thus, retirement and survival benefits paid out to the spouse of an insured worker can be included in the calculation of Social Security returns. Interval estimates of voters' family incomes from the U.S. Census Bureau were used to obtain the median voter's household earnings. The median voter's age is derived from the ages of those who voted in presidential elections, not from the ages of the entire electorate. The median voter's contributions to Social Security are the

  15. Financial forecasts accuracy in Brazil's social security system.

    Directory of Open Access Journals (Sweden)

    Carlos Patrick Alves da Silva

    Full Text Available Long-term social security statistical forecasts produced and disseminated by the Brazilian government aim to provide accurate results that would serve as background information for optimal policy decisions. These forecasts are being used as support for the government's proposed pension reform that plans to radically change the Brazilian Constitution insofar as Social Security is concerned. However, the reliability of official results is uncertain since no systematic evaluation of these forecasts has ever been published by the Brazilian government or anyone else. This paper aims to present a study of the accuracy and methodology of the instruments used by the Brazilian government to carry out long-term actuarial forecasts. We base our research on an empirical and probabilistic analysis of the official models. Our empirical analysis shows that the long-term Social Security forecasts are systematically biased in the short term and have significant errors that render them meaningless in the long run. Moreover, the low level of transparency in the methods impaired the replication of results published by the Brazilian Government and the use of outdated data compromises forecast results. In the theoretical analysis, based on a mathematical modeling approach, we discuss the complexity and limitations of the macroeconomic forecast through the computation of confidence intervals. We demonstrate the problems related to error measurement inherent to any forecasting process. We then extend this exercise to the computation of confidence intervals for Social Security forecasts. This mathematical exercise raises questions about the degree of reliability of the Social Security forecasts.

  16. Financial forecasts accuracy in Brazil's social security system.

    Science.gov (United States)

    Silva, Carlos Patrick Alves da; Puty, Claudio Alberto Castelo Branco; Silva, Marcelino Silva da; Carvalho, Solon Venâncio de; Francês, Carlos Renato Lisboa

    2017-01-01

    Long-term social security statistical forecasts produced and disseminated by the Brazilian government aim to provide accurate results that would serve as background information for optimal policy decisions. These forecasts are being used as support for the government's proposed pension reform that plans to radically change the Brazilian Constitution insofar as Social Security is concerned. However, the reliability of official results is uncertain since no systematic evaluation of these forecasts has ever been published by the Brazilian government or anyone else. This paper aims to present a study of the accuracy and methodology of the instruments used by the Brazilian government to carry out long-term actuarial forecasts. We base our research on an empirical and probabilistic analysis of the official models. Our empirical analysis shows that the long-term Social Security forecasts are systematically biased in the short term and have significant errors that render them meaningless in the long run. Moreover, the low level of transparency in the methods impaired the replication of results published by the Brazilian Government and the use of outdated data compromises forecast results. In the theoretical analysis, based on a mathematical modeling approach, we discuss the complexity and limitations of the macroeconomic forecast through the computation of confidence intervals. We demonstrate the problems related to error measurement inherent to any forecasting process. We then extend this exercise to the computation of confidence intervals for Social Security forecasts. This mathematical exercise raises questions about the degree of reliability of the Social Security forecasts.

  17. Financial forecasts accuracy in Brazil’s social security system

    Science.gov (United States)

    2017-01-01

    Long-term social security statistical forecasts produced and disseminated by the Brazilian government aim to provide accurate results that would serve as background information for optimal policy decisions. These forecasts are being used as support for the government’s proposed pension reform that plans to radically change the Brazilian Constitution insofar as Social Security is concerned. However, the reliability of official results is uncertain since no systematic evaluation of these forecasts has ever been published by the Brazilian government or anyone else. This paper aims to present a study of the accuracy and methodology of the instruments used by the Brazilian government to carry out long-term actuarial forecasts. We base our research on an empirical and probabilistic analysis of the official models. Our empirical analysis shows that the long-term Social Security forecasts are systematically biased in the short term and have significant errors that render them meaningless in the long run. Moreover, the low level of transparency in the methods impaired the replication of results published by the Brazilian Government and the use of outdated data compromises forecast results. In the theoretical analysis, based on a mathematical modeling approach, we discuss the complexity and limitations of the macroeconomic forecast through the computation of confidence intervals. We demonstrate the problems related to error measurement inherent to any forecasting process. We then extend this exercise to the computation of confidence intervals for Social Security forecasts. This mathematical exercise raises questions about the degree of reliability of the Social Security forecasts. PMID:28859172

  18. Operator's and insurer's relationship with social security organizations in the course of individual damage compensation procedures

    International Nuclear Information System (INIS)

    Deprimoz, Jacques.

    1995-01-01

    The Paris and Vienna Conventions internationally agreeded that health care and hospitalization guarantee and disability pension or death due to victim's outside the nuclear installations, as well as the organization funds contributions should be fixed by the internal rights of each Signatory Part. The present study, applicable to nine countries (Germany, Belgium, Brazil, France, Italy, Low Countries, United Kingdom, Sweden and Switzerland) sets up that the social security levels are more or less high and that the charges contributions could be important in countries under subrogation, even reduced or null in countries under imputation. In cases of transfrontier accidents, the contributions extension relies on harmonized rights with the social security organizations of victim's countries. Each indenominity victim's dossier could take a long time. The study concludes that the regulatory services of the social security organizations and their responsible operators or substitutes insurers should coordinate their interventions by using the information system

  19. Unmasking the social engineer the human element of security

    CERN Document Server

    Hadnagy, Christopher

    2014-01-01

    Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the c

  20. Uncovering ecosystem service bundles through social preferences.

    Directory of Open Access Journals (Sweden)

    Berta Martín-López

    Full Text Available Ecosystem service assessments have increasingly been used to support environmental management policies, mainly based on biophysical and economic indicators. However, few studies have coped with the social-cultural dimension of ecosystem services, despite being considered a research priority. We examined how ecosystem service bundles and trade-offs emerge from diverging social preferences toward ecosystem services delivered by various types of ecosystems in Spain. We conducted 3,379 direct face-to-face questionnaires in eight different case study sites from 2007 to 2011. Overall, 90.5% of the sampled population recognized the ecosystem's capacity to deliver services. Formal studies, environmental behavior, and gender variables influenced the probability of people recognizing the ecosystem's capacity to provide services. The ecosystem services most frequently perceived by people were regulating services; of those, air purification held the greatest importance. However, statistical analysis showed that socio-cultural factors and the conservation management strategy of ecosystems (i.e., National Park, Natural Park, or a non-protected area have an effect on social preferences toward ecosystem services. Ecosystem service trade-offs and bundles were identified by analyzing social preferences through multivariate analysis (redundancy analysis and hierarchical cluster analysis. We found a clear trade-off among provisioning services (and recreational hunting versus regulating services and almost all cultural services. We identified three ecosystem service bundles associated with the conservation management strategy and the rural-urban gradient. We conclude that socio-cultural preferences toward ecosystem services can serve as a tool to identify relevant services for people, the factors underlying these social preferences, and emerging ecosystem service bundles and trade-offs.

  1. Uncovering Ecosystem Service Bundles through Social Preferences

    Science.gov (United States)

    Martín-López, Berta; Iniesta-Arandia, Irene; García-Llorente, Marina; Palomo, Ignacio; Casado-Arzuaga, Izaskun; Amo, David García Del; Gómez-Baggethun, Erik; Oteros-Rozas, Elisa; Palacios-Agundez, Igone; Willaarts, Bárbara; González, José A.; Santos-Martín, Fernando; Onaindia, Miren; López-Santiago, Cesar; Montes, Carlos

    2012-01-01

    Ecosystem service assessments have increasingly been used to support environmental management policies, mainly based on biophysical and economic indicators. However, few studies have coped with the social-cultural dimension of ecosystem services, despite being considered a research priority. We examined how ecosystem service bundles and trade-offs emerge from diverging social preferences toward ecosystem services delivered by various types of ecosystems in Spain. We conducted 3,379 direct face-to-face questionnaires in eight different case study sites from 2007 to 2011. Overall, 90.5% of the sampled population recognized the ecosystem’s capacity to deliver services. Formal studies, environmental behavior, and gender variables influenced the probability of people recognizing the ecosystem’s capacity to provide services. The ecosystem services most frequently perceived by people were regulating services; of those, air purification held the greatest importance. However, statistical analysis showed that socio-cultural factors and the conservation management strategy of ecosystems (i.e., National Park, Natural Park, or a non-protected area) have an effect on social preferences toward ecosystem services. Ecosystem service trade-offs and bundles were identified by analyzing social preferences through multivariate analysis (redundancy analysis and hierarchical cluster analysis). We found a clear trade-off among provisioning services (and recreational hunting) versus regulating services and almost all cultural services. We identified three ecosystem service bundles associated with the conservation management strategy and the rural-urban gradient. We conclude that socio-cultural preferences toward ecosystem services can serve as a tool to identify relevant services for people, the factors underlying these social preferences, and emerging ecosystem service bundles and trade-offs. PMID:22720006

  2. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  3. Evaluation of factors influencing patient satisfaction in social security hospitals in Mazandaran province, North of Iran.

    Science.gov (United States)

    Jafari Kelarijani, Seyed Ebrahim; Jamshidi, Reza; Heidarian, Ali Reza; Khorshidi, Mohamad

    2014-01-01

    Patient satisfaction is affected by hospital services and may have an effect on the cultural, social and personal conditions of the people living in the region. This research aimed to evaluate the patient satisfaction in social security hospitals in Mazandaran province. From Spring 2012 to Summer 2013, all patients admitted to social security hospitals in Mazandaran province were entered in the study. Data regarding to inhabitation, sex, income and patients' educational level and satisfaction with the hospital services were collected. Seven hundred seventy-six patients with mean age of 47.35±7.41 years were analyzed. Patient's inhabitant, educational attainment and income level had a significant relationship with patient satisfaction level (ppatients' gender. The results show that the patient's inhabitant, educational and income level are related to attain patients' satisfaction.

  4. How to supplement Social Security fairly and effectively.

    Science.gov (United States)

    Ghilarducci, Teresa

    2010-04-01

    Over the past 3 decades, the base upon which Americans obtain income for retirement has become increasingly tied to fluctuations in the financial markets. Because Social Security provides a small percentage of pre-retirement income in retirement, most of the nation's workers need a supplement to Social Security. This study demonstrates the failure of the 401(k) system and advances a bold, but realistic, solution to America's crumbling retirement system: guaranteed retirement accounts (GRAs), a universal government program that supplements Social Security by providing guaranteed rates of return, by locking up balances until retirement, and by mandating annuities at retirement-with survivor's benefits. The GRA plan is compared to other proposals, including President Obama's, which aims to expand the voluntary, commercial, individually directed account-based system.

  5. Demographic aspects of social security in region

    Directory of Open Access Journals (Sweden)

    Alla Gennad'evna Leont'eva

    2012-06-01

    Full Text Available This paper presents a situational analysis of the level of life safety in the field of demographic regions of the Ural Federal District. The analysis is based on data from the Federal Statistics and covers the period 2000-2010. We have developed a system of indicators for evaluating safety in the demographic sphere. We set the main threats to the social and economic stability in the regions. The system of thresholds includes three blocks: the reproduction of the population, marriage and family relationships and health. We have presented a quantitative description of the main threats. Identified priority areas of social protection, providing increased stability of the regional socio-economic development, reducing the likelihood of social conflicts and improve the demographic situation.

  6. Reforming the South African Social Security Adjudication System: Innovative Experiences from South African Non-Social Security Jurisdictions

    Directory of Open Access Journals (Sweden)

    Mathias Ashu Tako Nyenti

    2016-08-01

    Full Text Available There is currently no uniform social security dispute resolution system in South Africa due to the piecemeal fashion in which schemes were established or protection against individual risks regulated. The result is that each statute provides for its own dispute resolution institution(s and processes. There are also various gaps and challenges in the current social security dispute resolution systems, some of these relating to the uncoordinated and fragmented nature of the system; inaccessibility of some social security institutions; inappropriateness of some current appeal institutions; the lack of a systematic approach in establishing appeal institutions; a limited scope of jurisdiction and powers of adjudication institutions; inconsistencies in review and/or appeal provisions in various laws; an unavailability of alternative dispute resolution procedures; and an absence of institutional independence of adjudication institutions or forums. The system is therefore in need of reform. In developing an appropriate system, much can be learned from innovative experiences in comparative South African non-social security jurisdictions on the establishment of effective and efficient dispute resolution frameworks. Dispute resolution systems in the labour relations, business competition regulation and consumer protection jurisdictions have been established to realise the constitutional rights of their users (especially the rights of access to justice, to a fair trial and to just administrative action. They thus provide a benchmark for the development of the South African social security dispute resolution system.

  7. SECURE SERVICE DISCOVERY BASED ON PROBE PACKET MECHANISM FOR MANETS

    Directory of Open Access Journals (Sweden)

    S. Pariselvam

    2015-03-01

    Full Text Available In MANETs, Service discovery process is always considered to be crucial since they do not possess a centralized infrastructure for communication. Moreover, different services available through the network necessitate varying categories. Hence, a need arises for devising a secure probe based service discovery mechanism to reduce the complexity in providing the services to the network users. In this paper, we propose a Secure Service Discovery Based on Probe Packet Mechanism (SSDPPM for identifying the DoS attack in MANETs, which depicts a new approach for estimating the level of trust present in each and every routing path of a mobile ad hoc network by using probe packets. Probing based service discovery mechanisms mainly identifies a mobile node’s genuineness using a test packet called probe that travels the entire network for the sake of computing the degree of trust maintained between the mobile nodes and it’s attributed impact towards the network performance. The performance of SSDPPM is investigated through a wide range of network related parameters like packet delivery, throughput, Control overhead and total overhead using the version ns-2.26 network simulator. This mechanism SSDPPM, improves the performance of the network in an average by 23% and 19% in terms of packet delivery ratio and throughput than the existing service discovery mechanisms available in the literature.

  8. Secure external access to CERN's services to replace VPN

    CERN Multimedia

    2005-01-01

    CERN has recently experienced several computer security incidents caused by people opening VPN connections and (unknown to them) allowing malicious software to enter CERN. VPN should be used to connect to CERN only in extreme and exceptional circumstances and it is formally discouraged as a general solution. If incidents continue, the availability of the service will need to be reviewed. Recommended methods of connecting to CERN from the Internet for common functionalities such as e-mail, access to CERN web or file servers and interactive sessions on CERN systems are described at http://cern.ch/security/vpn

  9. Securing Social Media : A Network Structure Approach

    NARCIS (Netherlands)

    Chiluka, N.J.

    2013-01-01

    Due to its democratized nature, online social media (OSM) attracts millions of users to publish and share their content with friends as well as a wider audience at little cost. Such a vast user base and a wealth of content, however, presents its own challenges. First, the amount of user-generated

  10. Economic independence, labour law and social security

    NARCIS (Netherlands)

    Holtmaat, H.M.T.; Kravaritou, Y.

    2015-01-01

    This work is based on papers presented at a conference entitled "The Sex of Labour Law in Europe/Le Sexe du droit du travail en Europe", which was held at the European University Institute in Florence. The contributors argue that law in general, and especially social and labour law, is not asexual,

  11. Social networking services: technologies and applications

    OpenAIRE

    Puzyrnyy, Oleksandr

    2011-01-01

    Puzyrnyy, Oleksandr. 2011. Social networking services: technologies and applications. Bachelor's Thesis. Kemi-Tornio University of Applied Sciences. Business and Culture. Pages 52. The aim of this thesis is to describe the concept of social networking, its technological base, business opportunities and future perspectives. The study discovers how social networks are made and which different purposes they might have. In addition, social networking is viewed as a part of business strategy o...

  12. Community care and social services.

    OpenAIRE

    Renwick, D.

    1996-01-01

    The aim of community care is to enable people with various types of disability to live in their own homes, rather than in institutions. This involves the provision of support and services at home by various agencies. After a critical report in 1986 identified problems with coordination and flexibility of community care services, the white paper Caring for People (1989) stated the government's aim to provide a "needs led," responsive range of services, promoting maximum independence of those w...

  13. New challenges for public services social dialogue

    DEFF Research Database (Denmark)

    Hansen, Nana Wesley; Mailand, Mikkel

    2015-01-01

    This is the national report on Denmark to the country comparative project New Challenges for Public Services: Integrating Service User and Workforce In-volvement to Support Responsive Public Services in Tough Times. The project examines service user involvement and how it is related to tradi-tion......-tional forms of social dialogue in five European countries. Furthermore, the project examines how employers and trade unions are responding to recent de-velopments in the countries....

  14. The Impact of Emotional Social Support on Elders' Food Security

    Directory of Open Access Journals (Sweden)

    Jennifer Woltil

    2012-10-01

    Full Text Available Food insecurity persists as a social problem in the U.S., putting its victims at risk of poor nutritional and overall health. Being food insecure is defined as the limited or uncertain availability of nutritionally safe foods or the inability to access such foods in socially acceptable ways. Food insecurity research tends to focus on younger populations, particularly households with children. Food insecurity among the elderly is, therefore, poorly understood, both in prevalence and in prevention and intervention methods. Addressing this gap, the present study examined the relationships between emotional social support and food security using data from the 2007-08 National Health and Nutrition Examination Survey in an effort to further the understanding of food insecurity among elders. Specifically, the effects of an emotional social support presence, number of support sources and types of support sources on food security were observed using OLS linear regression. Results indicated that emotional social support alleviated the risk of food insecurity, even when household income, marital/partnership status and health status were controlled for. However, the source of the support mattered: elders who reported a spouse as the primary source of support were more likely to report being food secure, while those who reported an “other” primary source of support were more likely to report being food insecure. Number of support sources were not significantly related to food security.

  15. Social Media Platforms as a Tool for Sharing Emotions. A Perspective upon the National Security Agencies

    Directory of Open Access Journals (Sweden)

    Ramona-Diana LEON

    2016-05-01

    Full Text Available Emotions importance increases even more in the context of the national security agencies. Since their mission is to protect and defend the citizens against attacks and also to provide leadership and justice services to other agencies and partners, the aim of the information they post on social media should be twofold: on the one hand, it should reflect the attitudes, values and beliefs, supported by the institution, and on the other hand, it should have an impact on citizens feeling of security. But, do they manage to meet these demands? Are they focusing on impressing the audience or they concentrate on sharing specific emotions? Is it a marketing strategy or a knowledge strategy? Starting from these, the purpose of this research is to set a nexus between emotions and the use of social media by the national security organizations. In other words, we aim (i to determine the main types of emotions, (ii to establish whether these are shared within the social media platforms, (iii to identify the purpose for which the national security organizations use social media, (iv to determine whether social media could serve as Ba for the national security organizations. In order to achieve these objectives, we employ an ethic approach and develop a longitudinal study based on quantitative and qualitative content analysis. The results prove that social media platforms may serve as Ba since they appear as a shared space which fosters individual and collective knowledge creation and sharing. The national security agencies  use social media platforms for combining the classical four types of Ba: originating Ba (it shares its emotions, feelings and thoughts through its posts, interacting Ba (through the generated reactions and comments, it ensures the development of shared models and the conversion of tacit knowledge into explicit knowledge, cyber Ba (by fostering the virtual interaction among its followers and exercising Ba (by facilitating the creation of

  16. Social Innovation within Prison Service

    DEFF Research Database (Denmark)

    Aakjær, Marie Kirstejn; Brandt, Eva

    2012-01-01

    of trust and confidence in the prison, and 2) to learn how to engage inmates better in their everyday life inside prison, e.g. through engaging them in collective matters. The process of co-inquiry and co-creation provided a new social infrastructure, which allowed inmates and prison officers to access new...... roles and social positions....

  17. Theory, Demonstration and Methods Research on Social Security of Migrant Workers by Domestic Scholar

    OpenAIRE

    Yang, Zhen; Wang, Weifang

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker soci...

  18. 10 CFR 1008.22 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Use and collection of social security numbers. 1008.22... security numbers. (a) The System Manager of each system of records which utilizes social security numbers... individuals may not be required to furnish social security numbers without statutory authorization, and that...

  19. 6 CFR 5.33 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Use and collection of social security numbers. 5... OF RECORDS AND INFORMATION Privacy Act § 5.33 Use and collection of social security numbers. Each... to 1975; and (b) That individuals requested to provide their social security numbers must be informed...

  20. CONSIDERATIONS ON THE PAY SYSTEM AND SOCIAL SECURITY IN SPAIN

    OpenAIRE

    Mihaela – Andreea Nastasie

    2012-01-01

    In the current context of economic crisis which manifests the world can see a very important role of the pay systems and social security in economic and social life. Staff wages means establishing a salary entitlements owed to employees and their payment, as established at the end of collective or individual employment contracts. In Spain there are various collective agreements according to geographical areas and activities. A fair and balanced wage was and will remain a core area of human re...

  1. A security architecture for the ALICE grid services

    CERN Document Server

    Schreiner, Steffen; Buchmann, Johannes; Betev, Latchezar; Grigoras, Alina

    2012-01-01

    Globally distributed research cyberinfrastructures, like the ALICE Grid Services, need to provide traceability and accountability of operations and internal interactions. This document presents a new security architecture for the ALICE Grid Services, allowing to establish non-repudiation with respect to creatorship and ownership of Grid files and jobs. It is based on mutually authenticated and encrypted communication using X.509 Public Key Infrastructure and the Transport Layer Security (TLS) protocol. Introducing certified Grid file entries and signed Grid jobs by implementing a model of Mediated Definite Delegation it allows to establish long-term accountability concerning Grid jobs and files. Initial submissions as well as any alteration of Grid jobs are becoming verifiable and can be traced back to the originator. The architecture has been implemented as a prototype along with the development of a new central Grid middleware, called jAliEn.

  2. Research on Issues concerning Social Security for Migrant Workers in Harmonious Society

    OpenAIRE

    Zhang, Hua

    2013-01-01

    This article analyzes the status quo of social security for migrant workers in China, and points out that there are deep system and concept reasons for the lack of labor rights and interests security, social security, equality and the right to development, political participation channels for the current migrant workers. This article then expounds the adverse effects of lack of social security for migrant workers on building a harmonious society: the lack of social security for migrant worker...

  3. BigBurgh Social Service Listings

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — Information on social services in the City of Pittsburgh and Allegheny County for individuals experiencing homeless and for those in dire need, including crisis...

  4. Security and privacy in billing services in cloud computing

    OpenAIRE

    Μακρή, Ελένη - Λασκαρίνα

    2013-01-01

    The purpose of this master thesis is to define cloud computing and to introduce its basic principles. Firstly, the history of cloud computing will be briefly discussed, starting from the past and ending up to the current and future situation. Furthermore, the most important characteristics of cloud computing, such as security, privacy and cost, will be analyzed. Moreover the three service and three deployment models of cloud computing will be defined and analyzed with examples. Finally, the a...

  5. Elements of Social Security in 6 European Countries

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security in 6 European Countries contains an overview of important benefit schemes in Denmark, Sweden, Finland, Germany, Great Britain and the Nether-lands. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact...

  6. Social security, dynamic efficiency and self-control problems

    NARCIS (Netherlands)

    Bucciol, A.

    2008-01-01

    We develop an OLG model with uncertainty on labor income and death age to study the welfare implications of unfunded Social Security programs in an economy where agents are affected by temptation à la Gul and Pesendorfer (2001, Econometrica 69, 1403). Tempted agents give additional value to the

  7. Social Status, Traditional Food Taboos and Food Security: A Study ...

    African Journals Online (AJOL)

    A study was conducted to examine adherence to traditional food taboos by women in Imo State, and relate that to social status and food security. Data was collected from 72 women across the three agricultural zones of the State. It was found that age, income and education are some factors affecting adherence to these ...

  8. Social security as Markov equilibrium in OLG models: A note

    DEFF Research Database (Denmark)

    Gonzalez Eiras, Martin

    2011-01-01

    I refine and extend the Markov perfect equilibrium of the social security policy game in Forni (2005) for the special case of logarithmic utility. Under the restriction that the policy function be continuous, instead of differentiable, the equilibrium is globally well defined and its dynamics...

  9. Social Security Disability Insurance: Essential Protection when Work Incapacity Strikes

    Science.gov (United States)

    Reno, Virginia P.; Ekman, Lisa D.

    2012-01-01

    Social Security Disability Insurance (SSDI) is an essential lifeline for millions of Americans. Without it, many families would be in deep financial distress. SSDI is insurance that workers pay for through premiums deducted from their pay. In return, workers gain the right to monthly benefits if a disabling condition ends their capacity to earn a…

  10. Stochastic models of the Social Security trust funds.

    Science.gov (United States)

    Burdick, Clark; Manchester, Joyce

    Each year in March, the Board of Trustees of the Social Security trust funds reports on the current and projected financial condition of the Social Security programs. Those programs, which pay monthly benefits to retired workers and their families, to the survivors of deceased workers, and to disabled workers and their families, are financed through the Old-Age, Survivors, and Disability Insurance (OASDI) Trust Funds. In their 2003 report, the Trustees present, for the first time, results from a stochastic model of the combined OASDI trust funds. Stochastic modeling is an important new tool for Social Security policy analysis and offers the promise of valuable new insights into the financial status of the OASDI trust funds and the effects of policy changes. The results presented in this article demonstrate that several stochastic models deliver broadly consistent results even though they use very different approaches and assumptions. However, they also show that the variation in trust fund outcomes differs as the approach and assumptions are varied. Which approach and assumptions are best suited for Social Security policy analysis remains an open question. Further research is needed before the promise of stochastic modeling is fully realized. For example, neither parameter uncertainty nor variability in ultimate assumption values is recognized explicitly in the analyses. Despite this caveat, stochastic modeling results are already shedding new light on the range and distribution of trust fund outcomes that might occur in the future.

  11. Optimal Service Distribution in WSN Service System Subject to Data Security Constraints

    Science.gov (United States)

    Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong

    2014-01-01

    Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346

  12. Poverty, Security and Social Assistance: Challenges of Brazilian Social Policy

    Directory of Open Access Journals (Sweden)

    Ana Paula Ornellas Mauriel

    2010-01-01

    Full Text Available This article presents partial results of a study about anti-poverty programs in Brazil. The main contribution of the text is that it relates certain characteristics of the anti poverty programs to theoretical categories that have influenced the debate about social policy in the contemporary context. Special attention is given to the relation of these programs with national social assistance policy. The article begins from the hypothesis that the logic that had inspired the construction of social policies was reconsidered, based on a transformation in the theoretical understanding of the social issue and of ways to confront it. This change appears in the texts in the priority given to poverty as a category of analysis, which is understood as an absence of capacities. This theoretically and methodologically configures an individualistic perspective on social issues, the principal theoretical source for which is the thinking of Amartya Sen.

  13. Design of a Secure System Considering Quality of Service

    Directory of Open Access Journals (Sweden)

    Seondong Heo

    2014-11-01

    Full Text Available Improvements in networking technologies have provided users with useful information services. Such information services may bring convenience and efficiency, but might be accompanied by vulnerabilities to a variety of attacks. Therefore, a variety of research to enhance the security of the systems and get the services at the same time has been carried out. Especially, research on intrusion-tolerant systems (ITSs has been conducted in order to survive against every intrusion, rather than to detect and prevent them. In this paper, an ITS based on effective resource conversion (ERC is presented to achieve the goal of intrusion-tolerance. Instead of using the fixed number of virtual machines (VMs to process requests and recover as in conventional approaches, the ITS based on ERC can transform the assigned resources depending on the system status. This scheme is proved to maintain a certain level of quality of service (QoS and quality of security service (QoSS in threatening environments. The performance of ERC is compared with previous studies on ITS by CSIM 20, and it is verified that the proposed scheme is more effective in retaining a specific level of QoS and QoSS.

  14. Theory, Demonstration and Methods: Research on Social Security of Migrant Workers by Domestic Scholar

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker social security, policy defects and equity construction in social security system of migrant workers. Secondly, real studies on social security of migrant workers, including researches on sequence of demand and influencing factors of social security of migrant workers as well as intrinsic motivation forming the perspective on social security. Lastly, road exploration of establishing social security system, including researches on the multi-level development of rural worker social security system, comparison of "Double-low method", "Guangdong Method" and "Shanghai Method" of the social security of migrant workers in Zhejiang Province and establishing multi-level social security system according to the hierarchy after the internal differentiation.

  15. Research Advances of Social Security Problems in China —Visualization Research based on Bibliometrics

    Institute of Scientific and Technical Information of China (English)

    赵琳

    2016-01-01

    This article summarized the research progress and characteristics of Chinese social security issues from 2000 papers, which record in CNKI. We find that, the topic in the field of social security is board and dispersion. Due to the huge system and complex problem of social security, there is no central theme. Through cluster analysis, multi dimensional scaling analysis and social network analysis, we got the high frequency keywords atlas. Then, we summarized the research topic to six parts. They are rural social security, urban and rural social security co-ordination, vulnerable group social security, social security fund management, the social insurance system, and social security system and government responsibility. It summed up the theme of the module, meanwhile, combined the practice analysis.

  16. Social Media Utilization for the Service Innovation

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Falch, Morten

    2018-01-01

    on service innovation in the ICT service encounter, where the ICT relation is based on social media. Two Danish cases are presented (a bank and a mobile service provider) focusing on their use of Facebook in their ideation and innovation processes. Interviews and monitoring of Facebook activities are used...... for these differences. The paper concludes that service innovation via social media only takes place if there is the right mix of organisational interest and readiness as well as understanding for how the innovation process should be handled....... and service creation. This paper looks into how innovation takes place for enterprises using Facebook as their channel for starting service innovation in the meeting between the enterprise and the customer as part of their strategy to getting closer to the customers. The paper takes a theoretical look...

  17. INFORMATION SECURITY AND SECURE SEARCH OVER ENCRYPTED DATA IN CLOUD STORAGE SERVICES

    OpenAIRE

    Mr. A Mustagees Shaikh *; Prof. Nitin B. Raut

    2016-01-01

    Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring great economical savings for data owners and users, but due to wide concerns of data owners that their private data may be exposed or handled by cloud providers. Hence end-to-end encryption techniques and fuzzy fingerprint technique have been used as solutions for secure cloud data st...

  18. Social Media Platforms as a Tool for Sharing Emotions. A Perspective upon the National Security Agencies

    OpenAIRE

    Ramona-Diana LEON; Liana Maria MARCU

    2016-01-01

    Emotions importance increases even more in the context of the national security agencies. Since their mission is to protect and defend the citizens against attacks and also to provide leadership and justice services to other agencies and partners, the aim of the information they post on social media should be twofold: on the one hand, it should reflect the attitudes, values and beliefs, supported by the institution, and on the other hand, it should have an impact on citizens feeling of securi...

  19. Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

    Directory of Open Access Journals (Sweden)

    Qinlong Huang

    2017-01-01

    Full Text Available Mobile healthcare social networks (MHSN integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.

  20. Dutch National Security Reform Under Review : Sufficient Checks and Balances in the Intelligence and Security Services Act 2017?

    NARCIS (Netherlands)

    Quirine Eijkman; Nico van Eijk; Robert van Schaik

    2018-01-01

    In May 2018, the new Dutch Intelligence and Security Services Act 2017 (Wet op de Inlichtingen- en veiligheidsdiensten, Wiv) will enter into force. It replaces the previous 2002 Act and incorporates many reforms to the information gathering powers of the two intelligence and security services as

  1. Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology

    OpenAIRE

    Adam Ali.Zare Hudaib

    2014-01-01

    Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.

  2. A Risk Analysis of Social Networking Services for a Small Enterprise: A Case Study of Conclave

    OpenAIRE

    Soebhektie, Sabrina

    2016-01-01

    In the millenials era, social networking services have been a fundamental elements in peo-ple’s lives, as social networking sites are able to connect people, help them get updates from around the globe, and also makes their lives easier by providing other functions. As a new startup company in Indonesia, Conclave has been using social media as core tools for their business activities. Nevertheless, despite the advantages of using social networking sites, the-se also may have security breache...

  3. Oral health status in older adults with social security in Mexico City: Latent class analysis.

    Science.gov (United States)

    Sánchez-García, Sergio; Heredia-Ponce, Erika; Cruz-Hervert, Pablo; Juárez-Cedillo, Teresa; Cárdenas-Bahena, Angel; García-Peña, Carmen

    2014-02-01

    To explore the oral health status through a latent class analysis in elderly social security beneficiaries from Southwest Mexico City. Cross-sectional study of beneficiaries of the State Employee Social Security and Social Services Institute (ISSSTE, in Spanish) and the Mexican Institute of Social Security (IMSS, in Spanish) aged 60 years or older. Oral health conditions such as edentulism, coronal and root caries (DMFT and DFT ≥ 75 percentile), clinical attachment loss (≥ 4 mm), and healthy teeth (≤ 25 percentile) were determined. A latent class analysis (LCA) was performed to classify the oral health status of dentate patients. In total, 336 patients were included (47.9% from the ISSSTE and 52.1% from the IMSS), with an average age of 74.4 (SD = 7.1) years. The 75th percentile of the DMFT = 23 and of the DFT = 2. Of the patients, 77.9% had periodontal disease. The 25th percentile of healthy teeth = 4. A three class model is adequate, with a high classification quality (Entropy = 0.915). The patients were classified as "Edentulous" (15.2%), "Class 1 = Unfavorable" (13.7%), "Class 2 = Somewhat favorable" (10.4%), and "Class 3 = Favorable" (60.7%). Using "Class 3 = Favorable" as a reference, there was an association (OR = 3.4; 95% CI = 1.8-6.4) between being edentulous and being 75 years of age and over, compared with the 60- to 74-year age group. The oral health in elderly social security beneficiaries is not optimal. The probability of becoming edentulous increases with age. A three-class model appropriately classifies the oral health dimensions in the elderly population. Key words:Elderly, Latent class analysis (LCA), oral health, social security, Mexico.

  4. Security Issues for Intelligence Information System based on Service-Oriented Architecture

    OpenAIRE

    Ackoski, Jugoslav; Trajkovik, Vladimir; Davcev, Danco

    2011-01-01

    Security is important requirement for service-oriented architecture (SOA), because SOA considers widespread services on different location and diverse operational platforms. Main challenge for SOA Security still drifts around “clouds” and that is insufficient frameworks for security models based on consistent and convenient methods. Contemporary security architectures and security protocols are in the phase of developing. SOA based systems are characterized with differences ...

  5. Social security status and mortality in Belgian and Spanish male workers

    Directory of Open Access Journals (Sweden)

    Xavier Duran

    2016-07-01

    Conclusion: MRR differences between Belgium and Spain for unemployed workers could be partly explained because of differences between the two social security systems. Future studies should further explore mortality differences between countries with different social security systems.

  6. 75 FR 64389 - Proposed Recommendation to the Social Security Administration for Occupational Information System...

    Science.gov (United States)

    2010-10-19

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0066] Proposed Recommendation to the Social Security Administration for Occupational Information System (OIS) Development Planning; Request for Comment...) to provide independent advice and recommendations on plans and activities to create an occupational...

  7. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  8. Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

    Science.gov (United States)

    Sammicheli, Michele; Scaglione, Marcella

    2018-01-01

    We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

  9. How strong is the Social Security safety net? Using the Elder Index to assess gaps in economic security.

    Science.gov (United States)

    Mutchler, Jan E; Li, Yang; Xu, Ping

    2018-04-16

    Older Americans rely heavily on Social Security benefits (SSBs) to support independent lifestyles, and many have few or no additional sources of income. We establish the extent to which SSBs adequately support economic security, benchmarked by the Elder Economic Security Standard Index. We document variability across U.S. counties in the adequacy levels of SSBs among older adults. We find that the average SSBs fall short of what is required for economic security in every county in the United States, but the level of shortfall varies considerably by location. Policy implications relating to strengthening Social Security and other forms of retirement income are discussed.

  10. Implementation of Learning Organization Components in Ardabil Social Security Hospital

    Directory of Open Access Journals (Sweden)

    Azadeh Zirak

    2015-06-01

    Full Text Available This study aimed to investigate the implementation of learning organization characteristics based on Marquardt systematic model in Ardabil Social Security Hospital. The statistical population of this research was 234 male and female employees of Ardabil Social Security Hospital. For data collection, Marquardt questionnaire was used in the present study which its validity and reliability had been confirmed. Statistical analysis of hypotheses based on independent samples t-test showed that learning organization characteristics were used more than average level in some subsystems of Marquardt model and there was a significant difference between current position and excellent position based on learning organization characteristic application. According to the research findings, more attention should be paid to the subsystems of learning organization establishment and balanced development of these subsystems.

  11. ENTREPRENEURSHIP ECONOMIC SAFETY AND DEVELOPMENT OF SECURITY SERVICES

    Directory of Open Access Journals (Sweden)

    G. V. Goudkov

    2011-01-01

    Full Text Available Successful functioning of the industry that provides for safety of organizations and physical entities exercises strategic impacts on development of society and economics of any state including Russia. Economic safety of Russia is directly linked with economic and information safety of itsbusiness structures. Extension of the scope and use of services offered by experienced state and private security enterprises including licensed individuals is one of most important directions of business safety perfection. Further improvement of Russian legislation on non-governmentalsecurity structures and coordination of their activities with those of state law enforcement bodies is obligatory condition of attaining higherpublic and economic safety levels.

  12. Expanding Social Security in Indonesia: the Processes and Challenges

    OpenAIRE

    Asep Suryahadi; Vita Febriany; Athia Yumna

    2014-01-01

    This paper reviews the development of social security provision in Indonesia, which has evolved from very little in its early years to the privilege of formal sector workers during the New Order period to universal coverage, at least in principle, in the current period. These changes were in line with and driven by the developments of the Indonesian economy in general, which has gone through various episodes marked by both booms and crises. There are two important milestones in the developmen...

  13. Social Security System in India: An International Comparative Analysis

    OpenAIRE

    Jha, Rupak Kumar; Bhattacharyya, Surajit

    2010-01-01

    This paper examines selected components of social security system in India and compares them with their OECD counterparts. Historically, the Indian policy makers have viewed the pension system as a welfare measure and therefore, it lacks in financial professionalism, diversification, and in the belief that pension funds can also be treated as an asset. The Indian system is biased towards the organized formal sector as workers in this sector are benefitted with the provisions under various lab...

  14. The Security of Organizations and Individuals in Online Social Networks

    OpenAIRE

    Elyashar, Aviad

    2016-01-01

    The serious privacy and security problems related to online social networks (OSNs) are what fueled two complementary studies as part of this thesis. In the first study, we developed a general algorithm for the mining of data of targeted organizations by using Facebook (currently the most popular OSN) and socialbots. By friending employees in a targeted organization, our active socialbots were able to find new employees and informal organizational links that we could not find by crawling with ...

  15. 78 FR 70313 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-11-25

    ... performing or working on a contract, service, grant, cooperative agreement, or other assignment for DOS, when...; Date of Birth; Gender; A-Number; Social Security number; Immigration Status; Date of Arrival in the U.S... disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with...

  16. Age structure of the population in Belgium and social security.

    Science.gov (United States)

    Dooghe, G

    1991-01-01

    The effects of demographic aging and of various socioeconomic factors on the social security system in Belgium are explored. "Special attention is given to the impact of the ageing of the population on the pension problem. Based on a simple formula a series of percentages of taxation have been calculated as a function of shifts in the proportion of retired vs. active population and in the proportion of the average income vs. the average amount of pension. One of the conclusions is that the progressive ageing of the population will become the most significant factor in the growth of social expenditures." excerpt

  17. Helping the Hacker? Library Information, Security, and Social Engineering

    Directory of Open Access Journals (Sweden)

    Samuel T. C. Thompson

    2006-12-01

    Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.

  18. ExpertiSZe, a tool for determining the effects of social security legislation

    NARCIS (Netherlands)

    Svensson, Jorgen S.; Kordelaar, P.J.M.; Kordelaar, P.J.M.; Wassink, J.G.J.; van 't Eind, G.J.; Grütters, C.A.F.M.

    1992-01-01

    Social security legislation plays an important role in the Dutch society. In view of this, the effects of social security legislation have to be analysed carefully before new legislation can be made. Due to the growing complexity of legislation on the social security domain, this analysis has become

  19. 31 CFR 1.32 - Use and disclosure of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... OF RECORDS Privacy Act § 1.32 Use and disclosure of social security numbers. (a) In general. An... such individual's refusal to disclose his social security number. (b) Exceptions. The provisions of... Federal statute, or (2) The disclosure of a social security number to any Federal, State, or local agency...

  20. 8 CFR 103.35 - Use and collection of Social Security numbers.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS POWERS AND DUTIES; AVAILABILITY OF RECORDS § 103.35 Use and collection of Social Security numbers. The use and collection of Social Security numbers shall be in accordance with 28 CFR 16.56. [40 FR... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Use and collection of Social Security...

  1. 29 CFR 71.12 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Use and collection of social security numbers. 71.12 Section... UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall provide the...

  2. 41 CFR 105-64.105 - When may Social Security Numbers (SSNs) be collected?

    Science.gov (United States)

    2010-07-01

    ...-64.105 When may Social Security Numbers (SSNs) be collected? (a) Statutory or regulatory authority must exist for collecting Social Security Numbers for record systems that use the SSNs as a method of... collect Social Security Numbers. (b) In compliance with OMB M-07-16 (Safeguarding Against and Responding...

  3. 28 CFR 700.25 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... numbers. (a) Each system manager of a system of records that utilizes Social Security numbers as a method... furnish Social Security numbers without statutory or regulatory authorization and that individuals who are requested to provide Social Security numbers voluntarily must be advised that furnishing the number is not...

  4. 24 CFR 5.216 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... Social Security and Employer Identification Numbers. 5.216 Section 5.216 Housing and Urban Development...; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security Numbers and...

  5. 20 CFR 422.104 - Who can be assigned a social security number.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Who can be assigned a social security number... General Procedures § 422.104 Who can be assigned a social security number. (a) Persons eligible for SSN assignment. We can assign you a social security number if you meet the evidence requirements in § 422.107 and...

  6. 38 CFR 1.575 - Social security numbers in veterans' benefits matters.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Social security numbers... Affairs Records § 1.575 Social security numbers in veterans' benefits matters. (a) Except as provided in... because of refusal to disclose to the Department of Veterans Affairs a social security number. (b) VA...

  7. 24 CFR 242.68 - Disclosure and verification of Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... Social Security and Employer Identification Numbers. 242.68 Section 242.68 Housing and Urban Development... Requirements § 242.68 Disclosure and verification of Social Security and Employer Identification Numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of Social Security Numbers...

  8. 12 CFR 1204.9 - Does FHFA collect and use Social Security numbers?

    Science.gov (United States)

    2010-01-01

    ... OPERATIONS PRIVACY ACT IMPLEMENTATION § 1204.9 Does FHFA collect and use Social Security numbers? FHFA collects Social Security numbers only when it is necessary and authorized. At least annually, the Privacy... of refusing to provide their Social Security numbers, unless the collection is authorized either by a...

  9. 28 CFR 802.23 - Use and disclosure of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... provided by law because of such individual's refusal to disclose his or her social security number. (b... which is required by Federal statute, or (2) The disclosure of a social security number to any Federal... identity of an individual. (c) Requests for disclosure of social security number. If the Agency requests an...

  10. 38 CFR 3.216 - Mandatory disclosure of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... social security numbers. 3.216 Section 3.216 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Requirements § 3.216 Mandatory disclosure of social security numbers. Any person who applies for or receives..., furnish the Department of Veterans Affairs upon request with his or her social security number and the...

  11. 13 CFR 102.35 - Use and collection of Social Security Numbers.

    Science.gov (United States)

    2010-01-01

    ... § 102.35 Use and collection of Social Security Numbers. Each Program/Support Office Head or designee... their social security numbers, unless: (1) The collection is authorized either by a statute; or (2) The social security numbers are required under statute or regulation adopted prior to 1975 to verify the...

  12. Using Social Media for Service Innovations

    DEFF Research Database (Denmark)

    Scupola, Ada; Nicolajsen, Hanne Westh

    2013-01-01

    This article investigates how social software such as blogs can be used to collect ideas generated by the users in the service innovation process. After a theoretical discussion of user involvement and more specifically user involvement using social software and interactive web-tools, the article...... reports the results from a field experiment at a university library. In the experiment, a blog was established to collect ideas for service innovations from the library users. The experiment shows that blogs may generate a modest, but very useful amount of ideas. The experiment furthermore reveals...

  13. Promoting Innovation in the Social Services

    DEFF Research Database (Denmark)

    Dahl, Hanne Marlene; Fahnøe, Kristian

    European welfare systems are under increasing pressure to transform and adapt to the present and future challenges of our globalized world. This is especially true of the comprehensive field of health, welfare and informal education services –that we will all use at one point or another during ou......, (4) The governance of social service innovation, (5) The influence of national, regional and local contexts, (6) New technologies, (7) Measuring outcomes, quality and challenges....

  14. Job satisfaction and social rewards in the social services

    Directory of Open Access Journals (Sweden)

    Jorunn Theresia Jessen

    2015-03-01

    Full Text Available This article investigates the sources of job satisfaction among practitioners and managers employed in the Norwegian public social services and the professionals ´ perception of social rewards in particular. Being valued, receiving praise and positive feedback are considered to be important aspects of job satisfaction. Nevertheless the expertise and competence of social workers is not always acknowledged. A central question raised is whether the workers ´ job satisfaction is influenced by their opportunities for support and recognition, compared to other (intrinsic and organisational rewarding aspects available to social service workers. The empirical data come from a 2004 quantitative survey among social workers in local welfare agencies. Despite conflicting demands and lack of resources in the front line services, findings indicate that managers and practitioners perceive their work as overall equally satisfying. Still, the managers find their job more interesting and challenging due to their position, reporting higher feelings of accomplishment and control over work. Receiving public approval and co-worker support are positively associated with job satisfaction within both work positions, while superior support and client recognition were found to be significantly rewarding aspects to the practitioners only. The final discussion addresses the challenges for an organizational climate that sustain the worth and contribution of social professionals.

  15. Secure Service Oriented Architectures (SOA) Supporting NEC [Architecture orientée service (SOA) gérant la NEC

    NARCIS (Netherlands)

    Meiler, P.P.; Schmeing, M.

    2009-01-01

    Combined scenario ; Data management ; Data processing ; Demonstrator ; Information systems ; Integrated systems ; Interoperability ; Joint scenario ; Network Enabled Capability (NEC) ; Operational effectiveness ; Operations research ; Scenarios ; Secure communication ; Service Oriented Architecture

  16. Online information services in the social sciences

    CERN Document Server

    Jacobs, Neil

    2004-01-01

    Information professionals are increasingly responsible not only for running traditional information and library services but also for providing an online presence for their organisation. This book shows how best practice in delivering online information services should be based on actual user needs and behaviour. A series of case studies provide real life examples of how social science information is being used in the community. The book then draws on these case studies to outline the main issues facing service providers: such as usability, metadata and management. The book concludes with a lo

  17. Private support and social securityPrivate support and social security

    OpenAIRE

    Frans van Dijk

    1998-01-01

    The issue is addressed whether assistance to persons in need can be left to the `family' and the `community'. In that case people depend on their social networks. The support a person receives through a given network of social ties is examined. However, ties are diverse and subject to change. By means of a model of the dynamics of social ties, the conditions for adequate private support are analyzed. The sustainability of private support over time is examined by incorporating the impact on so...

  18. Family medicine and practice in the Mexican Social Security Institute

    Directory of Open Access Journals (Sweden)

    Donovan Casas Patiño

    2014-06-01

    Full Text Available The central ideas of this research paper are related to the practice of family medicine as a specialty. It focuses in its origins, problems, unique characteristics, limitations, scope, management, and processes within the context of primary care of the Mexican Social Security System. This approach was based on a qualitative, hermeneutical study closely related to the Structural Functionalism Theory. Within this framework, medical practice is seen as an equation: Meaning = action + function/structure. This offers an approach to the understanding of reality through surveys and observations in five categories: identity, activity, purpose, values/norms, and power/relationship. The practice of family medicine is defined as a medical act in the Mexican Social Security Institute. This act is limited to a brief encounter and a prescription, which makes it a short, fleeting, medicalized interaction. The result is a negative social imaginary of the physician, the patient and the whole of society. Thus, individuals and society host a negative social imaginary bestowed on doctors and users of the health system.

  19. Awareness and use of social bookmarking services by final year ...

    African Journals Online (AJOL)

    Social computing is one of the renascent features of the web that has made it highly interactive. One of such social tools in the web is the social bookmarking services. It has been reported that social bookmarking services may be the least known social media network by students. Given that social media has been predicted ...

  20. Social Networking Services in E-Learning

    Science.gov (United States)

    Weber, Peter; Rothe, Hannes

    2016-01-01

    This paper is a report on the findings of a study conducted on the use of the social networking service NING in a cross-location e-learning setting named "Net Economy." We describe how we implemented NING as a fundamental part of the setting through a special phase concept and team building approach. With the help of user statistics, we…

  1. Macroeconomic Implications of Changes in Social Security Rules

    Directory of Open Access Journals (Sweden)

    Bilal Bagis

    2017-02-01

    Full Text Available The Turkish social insurance system has been feverishly debated for years, particularly through its burden on the economy. The most recent reform is an attempt to neutralize the deterioration within the social security system and its effects on the economy. After the recent reform, ‘the way that retirement benefits are calculated’ is changed unfavorably for workers and the minimum age for retirement is increased. In particular, for an agent with 25 years of social security tax payments, the replacement rate is down from 65 percent to 50 percent. On the other hand, retirement age is up from 60 to 65. The aim of this paper is to investigate the macroeconomic effects of these changes using an OLG model. The author’s findings indicate that labor supply, output and capital stock increase when changes above are applied to the benchmark economy calibrated to the Turkish economy data in 2005. A critical change with the current reform is that the marginal benefit of working has become uniform over ages. In a simulation exercise, the marginal retirement benefit in the benchmark economy is changed to be uniform over ages while keeping the size of social security system unchanged. As a result, the benefit of retiring at a later period increases. However, uniform distribution of the marginal benefits itself decreases both the capital stock and output of the economy. Increasing the retirement age, on the other hand, has positive effects on the economy since agents obtain retirement benefits for fewer years and at an older age. Age increase has substantial positive effects on the labor supply, the capital stock, and the output.

  2. The impact of population ageing on the social security expenditure and economic growth in Japan.

    Science.gov (United States)

    Maruo, N

    1987-05-01

    The author considers the impact of demographic aging in Japan on the social security system and on economic growth. It is argued that "First of all, as the cost of social security (including social services) increases remarkably at the earlier stage of ageing, the disposable (after tax) income and private consumption of the present labour force generation tend to increase at a lower growth rate than that of the GNP....Secondly if pension systems are based on terminal funding schemes, the ageing of the population increases savings (net increase of the amount of the pension funds) at the earlier stage of the ageing of the population. Thirdly, there is a time lag between the increase of social security benefits and the decrease in the personal savings ratio. The high ratio of savings and the shortage of aggregate demand as well as the high pressure for export in...recent Japan can partly be attributed to the above factors." Possible future economic scenarios as demographic ageing in Japan proceeds are described, and policies to avert anticipated problems are outlined. (SUMMARY IN JPN) excerpt

  3. Towards Shibboleth-based security in the e-infrastructure for social sciences

    OpenAIRE

    Jie, Wei; Daw, Michael; Procter, Rob; Voss, Alex

    2007-01-01

    The e-Infrastructure for e-Social Sciences project leverages Grid computing technology to provide an integrated platform which enables social science researchers to securely access a variety of e-Science resources. Security underpins the e-Infrastructure and a security framework with authentication and authorization functionality is a core component of the e-Infrastructure for social sciences. To build the security framework, we adopt Shibboleth as the basic authentication and authorization i...

  4. Barriers to Employment Among Social Security Disability Insurance Beneficiaries in the Mental Health Treatment Study.

    Science.gov (United States)

    Milfort, Roline; Bond, Gary R; McGurk, Susan R; Drake, Robert E

    2015-12-01

    This study examined barriers to employment among Social Security Disability Insurance (SSDI) beneficiaries who received comprehensive vocational and mental health services but were not successful in returning to work. This study examined barriers to employment among 430 SSDI beneficiaries with mental disorders who received evidence-based vocational and mental health services for two years but worked less than one month or not at all. Comprehensive care teams, which included employment specialists, made consensus judgments for each participant, identifying the top three barriers to employment from a checklist of 14 common barriers. Teams most frequently identified three barriers to employment: poorly controlled symptoms of mental illness (55%), nonengagement in supported employment (44%), and poorly controlled general medical problems (33%). Other factors were identified much less frequently. Some SSDI beneficiaries, despite having access to comprehensive services, continued to experience psychiatric impairments, difficulty engaging in vocational services, and general medical problems that limited their success in employment.

  5. Principle Of Non-Regression And Social Security: Security And Trust Protection, Reservation Of The Possible And Non-Regression In The Fundamental Social Rights

    Directory of Open Access Journals (Sweden)

    Rodrigo Garcia Schwarz

    2016-12-01

    Full Text Available This paper aims to explain and analyze, from the perspective of the material and effective dimensions of fundamental social rights, questions that concern the relevance of security and trust for the social pact and, as a consequence, to the non-regression in the fundamental social rights in general and in the social security in particular. It reveals that, while the retrogression is not absolute, retrogression must be fully justified. The research is descriptive and explanatory, documentary-bibliographical.

  6. Cohort profile: the Spanish WORKing life Social Security (WORKss) cohort study.

    Science.gov (United States)

    López Gómez, María Andrée; Durán, Xavier; Zaballa, Elena; Sanchez-Niubo, Albert; Delclos, George L; Benavides, Fernando G

    2016-03-07

    The global economy is changing the labour market and social protection systems in Europe. The effect of both changes on health needs to be monitored in view of an ageing population and the resulting increase in prevalence of chronic health conditions. The Spanish WORKing life Social Security (WORKss) cohort study provides unique longitudinal data to study the impact of labour trajectories and employment conditions on health, in terms of sickness absence, permanent disability and death. The WORKss cohort originated from the Continuous Working Life Sample (CWLS) generated by the General Directorate for the Organization of the Social Security in Spain. The CWLS contains a 4% representative sample of all individuals in contact with the Social Security system. The WORKss cohort exclusively includes individuals with a labour trajectory from 1981 or later. In 2004, the cohort was initiated with 1,022 ,79 Social Security members: 840,770 (82.2%) contributors and 182,009 (17.8%) beneficiaries aged 16 and older. The WORKss cohort includes demographic characteristics, chronological data about employment history, retirement, permanent disability and death. These data make possible the measurement of incidence of permanent disability, the number of potential years of working life lost, and the number of contracts and inactive periods with the Social Security system. The WORKss cohort was linked to temporary sickness absence registries to study medical diagnoses that lead to permanent disability and consequently to an earlier exit from the labour market in unhealthy conditions. Thanks to its administrative source, the WORKss cohort study will continue follow-up in the coming years, keeping the representativeness of the Spanish population affiliated to the Social Security system. The linkage between the WORKss cohort and temporary sickness absence registries is envisioned to continue. Future plans include the linkage of the cohort with mortality registries. Published by the BMJ

  7. SOCIAL SERVICES FOR THE PEOPLE AND COLLEGE STUDENTS IN SOUTH KOREA

    Directory of Open Access Journals (Sweden)

    Ko Young Cheol

    2016-01-01

    Full Text Available The main aim of the present study is the consideration of social services for population and students in South Korea. This article, on the basis of the research literature and the policy of South Korea government, contains information about the universality of social services for the National Basic Livelihood Security System and the Department of Population Health, as well as providing care for children and infants, student’s scholarship policy and the future of the problems in this area. The study identified the following challenges for the future: improvement of the quality of service and the expansion of services; improvement of the systems for mobilizing resources for the provision of social services; the role of the government and the private sector in the quality and efficiency of the social services; improvement of the working conditions and creating new workplaces.

  8. A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers

    Directory of Open Access Journals (Sweden)

    Jamal Talbi

    2017-03-01

    Full Text Available Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud service providers. The cloud users (CUs increase and require secure, reliable and trustworthy cloud service providers (CSPs from the market. So, it’s a challenge for a new customer to choose the highly secure provider. This paper presents a cloud service brokering system in order to analyze and rank the secured cloud service provider among the available providers list. This model uses an autonomous and flexible agent in multi-agent system (MASs that have an intelligent behavior and suitable tools for helping the brokering system to assess the security risks for the group of cloud providers which make decision of the more secured provider and justify the business needs of users in terms of security and reliability.

  9. Application of social media to library service delivery: Perception of ...

    African Journals Online (AJOL)

    The study revealed that few of the social media identified are rarely relevant to library service delivery. Reference services, current awareness services, and library news postings were the types of library services that social media are applied. Results also indicated that there were benefits derived from using social media in ...

  10. [Disintegration of the prison system, public security and social exclusion].

    Science.gov (United States)

    Freixo, Marcelo

    2016-06-01

    The defense of human rights, namely one of the most important duties of the legislature, is a considerable challenge in the day-to-day business of parliament. The opinions and practices of elected representatives reflect the security concerns and fears of society that engender a vast process of social exclusion. In this context, the defense of the right to health of persons deprived of liberty seems an especially difficult task, as shown in the interview of State Congressman Marcelo Freixo, the Coordinator of the Human Rights Commission of the Legislative Assembly in Rio de Janeiro and creator of the State Mechanism for Preventing and Combating Torture.

  11. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  12. 36 CFR 1202.22 - Will NARA need my Social Security Number?

    Science.gov (United States)

    2010-07-01

    ... Will NARA need my Social Security Number? (a) Before a NARA employee or NARA contractor asks you to provide your social security number (SSN), he or she will ensure that the disclosure is required by... Security Number? 1202.22 Section 1202.22 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS...

  13. 24 CFR 200.6 - Employer identification and social security numbers.

    Science.gov (United States)

    2010-04-01

    ... identification and social security numbers. The requirements set forth in 24 CFR part 5, regarding the disclosure and verification of social security numbers and employer identification numbers by applicants and... security numbers. 200.6 Section 200.6 Housing and Urban Development Regulations Relating to Housing and...

  14. Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study

    Science.gov (United States)

    Zhao, Jensen; Zhao, Sherry Y.

    2015-01-01

    While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…

  15. The availability and affordability of long-term care for disabled older people in China: The issues related to inequalities in social security benefits.

    Science.gov (United States)

    Lei, Peng; Feng, Zhixin; Wu, Zhuochun

    2016-01-01

    China is experiencing increasing pressure from issues relating to an ageing population. The rationality of different eligibility criteria of the benefits within the social security system has been widely challenged; however, to date, no previous study has explored its association with the availability and affordability of long-term care (LTC). This study evaluates the availability and affordability of Long-Term Care (LTC) services for disabled older people (aged 65 and above) in China, with special attention to the differences among groups in receipt of specific social security benefits. The data of availability and affordability of LTC services for disabled older people is from a nationally representative sample Chinese Longitudinal Healthy Longevity Survey (CLHLS). Three different social security benefits were identified and their effects on the long-term care services for disabled older people were explored. The overall proportions of disabled older people who have only limited or no available or affordable LTC services were remarkably high, especially for those who have moderate or no social security benefits. Compared to those who are entitled to generous social security benefits, older people who have no social security benefits are 18.45 times more likely to be unable to afford health care expenses. The findings imply that policy makers in China could focus on the LTC needs for the social security and socioeconomically disadvantaged (who have limited or no social security benefits and in low household income) disabled older people which could reduce the gap between them and those who are entitled to generous social security benefits. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  16. 77 FR 51842 - Social Security Acquiescence Ruling (AR) 12-X(8); Petersen v. Astrue, 633 F.3d 633 (8th Cir. 2011...

    Science.gov (United States)

    2012-08-27

    ..., 1-800-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR... Social Security Act AGENCY: Social Security Administration. ACTION: Notice of Social Security...

  17. Social Security Administration - Quarterly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits from fiscal...

  18. Importance of security and socialization in europeans life

    Directory of Open Access Journals (Sweden)

    Diana Elena Şerb

    2017-01-01

    Full Text Available The purpose of this research is to examine the importance of safety and socialization in the lives of individuals. The influence of agents of socialization (school, family, friends are manifested as differences in preferences, feelings and thoughts of people. The article is structured in two parts. The first part presents the knowledge in the field, but in the context of Maslow's hierarchy of needs. In the second part is carried out an research among Europeans about some aspect of their lives: how they spend their free time, the feeling of attachment to the community, a sense of security and availability to communicate personal matters to their group of friends. The research method was investigating the secondary sources (database obtained from the survey from a site specializing in the analysis of living conditions of Europeans - European Social Survey. After the reception and processing of results in Excel and SPSS we obtained a general conclusion that people need to socialize, to be part of a group and feel safe.

  19. Information Behavior on Social Live Streaming Services

    Directory of Open Access Journals (Sweden)

    Scheibe, Katrin

    2016-06-01

    Full Text Available In the last few years, a new type of synchronous social networking services (SNSs has emerged—social live streaming services (SLSSs. Studying SLSSs is a new and exciting research field in information science. What information behaviors do users of live streaming platforms exhibit? In our empirical study we analyzed information production behavior (i.e., broadcasting as well as information reception behavior (watching streams and commenting on them. We conducted two quantitative investigations, namely an online survey with YouNow users (N = 123 and observations of live streams on YouNow (N = 434. YouNow is a service with video streams mostly made by adolescents for adolescents. YouNow users like to watch streams, to chat while watching, and to reward performers by using emoticons. While broadcasting, there is no anonymity (as in nearly all other WWW services. Synchronous SNSs remind us of the film The Truman Show, as anyone has the chance to consciously broadcast his or her own life real-time.

  20. Institutional trust in the national social security and municipal healthcare systems for the elderly in Japan.

    Science.gov (United States)

    Murayama, Hiroshi; Taguchi, Atsuko; Ryu, Shuhei; Nagata, Satoko; Murashima, Sachiyo

    2012-09-01

    Japanese social security systems and institutions for the elderly, as well as the general attitude toward elderly care services among the Japanese population, have been undergoing a dramatic change. By examining the association between institutional trust, which is a representative element of social capital, and anxiety regarding receiving elderly care, we can uncover clues toward building a more robust social security system for the elderly. This study examines the relationship between institutional trust, in the national social security and municipal healthcare systems for the elderly, and anxiety with respect to receiving elderly care among the general Japanese population. A cross-sectional survey was conducted using a self-administered questionnaire that was returned by mail in January and February 2005. The target population was 4735 community residents aged 20-75 years, who lived in the city of Koka, Shiga, Japan. A total of 2264 questionnaires were included in the analysis. A binominal logistic regression analysis showed that responses of 'trust' [odds ratio (OR): 2.09, 95% confidence interval (95% CI): 1.01-4.30] and 'strongly trust' (OR: 3.80, 95% CI: 1.55-9.31) for the national system were associated with not having anxiety regarding elderly care, compared with the reference category of feeling strongly distrust. However, trust in the municipal system showed no association with this anxiety. These results indicate the importance of developing strategies to increase a common trust in the national care services for the elderly to reduce the anxiety people feel regarding whether they will be able to receive elderly care when required.

  1. Integrating Ecosystem Services and Eco-Security to Assess Sustainable Development in Liuqiu Island

    Directory of Open Access Journals (Sweden)

    Han-Shen Chen

    2017-06-01

    Full Text Available Developing sustainable island tourism must be thoroughly evaluated in consideration of ecological, economic, and social factors on account of the fragility of island ecosystems. This study evaluated the ecological footprint (EF and ecological capacity of Liuqiu Island from 2010 to 2015 using the EF model, establishing an indicator to estimate the value of ecosystem service and eco-security. The empirical results include: (1 the overall value of ecosystem service on Liuqiu Island increased from US$3.75 million in 2010 to US$5.11 million in 2015; (2 the total per capita EF considerably increased from 0.5640 gha/person in 2010 to 4.0845 gha/person in 2015; and (3 the ecological footprint index increased from 0.30 in 2010 to 2.28 in 2015. These findings indicate that island tourism recreational zones gradually increased the pressure on its ecosystem, reduced the eco-security level, and severely damaged the environment, thereby threatening the function and structure of the entire ecosystem. The innovations and contributions of this study is integrating ecological footprint and ecosystem services valuation provide insights into sustainability of an island. The theoretical and practical implications identified in this study should contribute to reducing the gap between research and practice.

  2. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  3. Populous, Precarious – Protected? The Paradox of Social Security for South Asian Agricultural Workers

    NARCIS (Netherlands)

    K.A. Siegmann (Karin Astrid)

    2012-01-01

    textabstractAbstract Social security is firmly rising on the international agenda. Discourses that depart from the assumption that societies can only afford a certain level of social expenditure give way to a recognition that social security is an important investment in development. New

  4. Social security of a business entity: place and role of accounting

    OpenAIRE

    Жиглей, Ірина Вікторівна

    2017-01-01

    Concepts and levels of security on the whole as well as social security' of a business entity in particular have been considered. Factors of social insecurity have been enumerated. Disadvantages of social activity of business entities in Ukraine have been compared with the reflection of this activity in the accounting system.

  5. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  6. Institutional Root Cause of the Irregularity of Social Security Funds in China

    Institute of Scientific and Technical Information of China (English)

    Bingwen Zheng

    2007-01-01

    This paper analyzes institutional defects in the Chinese social security system, based on irregularities in social security funds revealed in the Audit Report by the China National Audit Office. The author divides the irregularities into five categories according to the nature of fund use. The results show that the institutional root cause of the irregularities lies in the unreasonable design and operation of the social security system, which currently faces management and institutional risks. This paper argues that simple rhetoric about strengthening regulation and supervision cannot help to reduce illegal practices, or to realize risk control. The only solution is to reform the social security system. Specifically, the Chinese Government should regulate the administrative cost of the social security system,and the behavior of its agencies, through legislation, reform the investment regime to increase rate of return of pension assets, and adjust and reshape the existing social security system, so as to elevate its pooling level.

  7. Inner Security in Media from the perspective of social science and media studies

    Directory of Open Access Journals (Sweden)

    Oliver Bidlo

    2012-07-01

    Full Text Available Security and entertainment are moving closer together. The term Securitainment expresses in this context, the mediation of security through entertainment formats. This will open a new space for Internal Security, which includes its own actors and patterns of interpretation. This space is portrayed in the media and follows the logic of media for attention but is also part of the process of social control. The mass media are therefore an instance of the design of internal security, social control and an interpretation producer. Mass media become actors of the internal security. They provide a symbolic representation of security.

  8. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    National Research Council Canada - National Science Library

    Gilkey, Craig M

    2008-01-01

    .... Such web services operating across multiple security domains would provide additional advantages, including improved intelligence aggregation, and real-time collaboration between users in different security domains...

  9. 43 CFR 17.250 - Health, welfare, and social services.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Health, welfare, and social services. 17... § 17.250 Health, welfare, and social services. This subpart applies to health, welfare, and other...) General. In providing health, welfare, or other social services or benefits, a recipient may not, on the...

  10. Does Social Security Affect Retirement and Labor Supply? Using the Chilean Experience as an Experiment

    OpenAIRE

    Rodrigo Cerda

    2002-01-01

    The paper explores the effects of the social security system over retirement and labor supply decision of individuals aged 55 to 65 in Chile. We use the 1998 CASEN survey elaborated by the Chilean government. Due to regulations established by the current social security law, two social security systems coexist on 1998: the .Pay-as-you-go. and the individual account system. This property of the dataset, allows us to disentangle the effects of those two systems over retirement and labor supply....

  11. Innovation in small and mediumsized firms in the security service industry

    DEFF Research Database (Denmark)

    Langergaard, Luise Li; Møller, Jørn Kjølseth; Hansen, Anne Vorre

    2014-01-01

    This article is a study of innovation in the security sector based on an analysis of three Danish security companies. It uncovers the logics and dynamics of innovation in the security business, which is part of the operational service sector. Operational service companies are forced to choose...... activities. In order to overcome this general ‘service squeeze’ and break with a mature market, security companies use different strategies for innovation. These strategies depend on the ability of the individual security companies to activate the innovative resources among employees in order to move...... the business activities further up in the market hierarchy of security services by offering more complex and knowledge-intensive solutions to the customers, thereby reducing price competition and increasing the profits of the business activity in the same way as known from other industries...

  12. Employment of security personnel of a security service company does not need approval by the works council

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-secion 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. (Federal Labour Court, decision dated November 28, 1989 - 1 ABR 90/88). (orig./HP) [de

  13. 42 CFR 410.73 - Clinical social worker services.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Clinical social worker services. 410.73 Section 410... Clinical social worker services. (a) Definition: clinical social worker. For purposes of this part, a clinical social worker is defined as an individual who— (1) Possesses a master's or doctor's degree in...

  14. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  15. Securing cloud services a pragmatic approach to security architecture in the cloud

    CERN Document Server

    Newcombe, Lee

    2012-01-01

    This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.

  16. DATA Act File B Object Class and Program Activity - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File B. File B includes the agency object class and program activity detail obligation and...

  17. Quarterly Data for Spoken Language Preferences of Social Security Retirement and Survivor Claimants (2014-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for Retirement and Survivor benefits for fiscal...

  18. Quarterly Data for Spoken Language Preferences of Social Security Retirement and Survivor Claimants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for Retirement and Survivor benefits from fiscal...

  19. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  20. Service Oriented Architecture in Network Security - a novel Organisation in Security Systems

    OpenAIRE

    Hilker, Michael; Schommer, Christoph

    2008-01-01

    Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is disting...

  1. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2006-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  2. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2007-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  3. Specifying Information Security Needs for the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then

  4. Informal Workers in Thailand: Occupational Health and Social Security Disparities.

    Science.gov (United States)

    Kongtip, Pornpimol; Nankongnab, Noppanun; Chaikittiporn, Chalermchai; Laohaudomchok, Wisanti; Woskie, Susan; Slatin, Craig

    2015-08-01

    Informal workers in Thailand lack employee status as defined under the Labor Protection Act (LPA). Typically, they do not work at an employer's premise; they work at home and may be self-employed or temporary workers. They account for 62.6 percent of the Thai workforce and have a workplace accident rate ten times higher than formal workers. Most Thai Labor laws apply only to formal workers, but some protect informal workers in the domestic, home work, and agricultural sectors. Laws that protect informal workers lack practical enforcement mechanisms and are generally ineffective because informal workers lack employment contracts and awareness of their legal rights. Thai social security laws fail to provide informal workers with treatment of work-related accidents, diseases, and injuries; unemployment and retirement insurance; and workers' compensation. The article summarizes the differences in protections available for formal and informal sector workers and measures needed to decrease these disparities in coverage. © The Author(s) 2015.

  5. The Distributional Impact of Social Security Policy Options.

    Science.gov (United States)

    Couch, Kenneth A; Reznik, Gayle L; Tamborini, Christopher R; Iams, Howard M

    2017-01-01

    Using microsimulation, we estimate the effects of three policy proposals that would alter Social Security's eligibility rules or benefit structure to reflect changes in women's labor force activity, marital patterns, and differential mortality among the aged. First, we estimate a set of options related to the duration of marriage required to receive divorced spouse and survivor benefits. Second, we estimate the effects of an earnings sharing proposal with survivor benefits, in which benefits are based entirely on earned benefits with spouses sharing their earnings during years of marriage. Third, we estimate the effects of adjusting benefits to reflect the increasing differential life expectancy by lifetime earnings. The results advance our understanding of the distributional effects of these alternative policy options on projected benefits and retirement income, including poverty and supplemental poverty status, of divorced and widowed women aged 60 or older in 2030.

  6. Informal Workers in Thailand: Occupational Health and Social Security Disparities

    Science.gov (United States)

    Kongtip, Pornpimol; Nankongnab, Noppanun; Chaikittiporn, Chalermchai; Laohaudomchok, Wisanti; Woskie, Susan; Slatin, Craig

    2018-01-01

    Informal workers in Thailand lack employee status as defined under the Labor Protection Act (LPA). Typically, they do not work at an employer’s premise; they work at home and may be self-employed or temporary workers. They account for 62.6 percent of the Thai workforce and have a workplace accident rate ten times higher than formal workers. Most Thai Labor laws apply only to formal workers, but some protect informal workers in the domestic, home work, and agricultural sectors. Laws that protect informal workers lack practical enforcement mechanisms and are generally ineffective because informal workers lack employment contracts and awareness of their legal rights. Thai social security laws fail to provide informal workers with treatment of work-related accidents, diseases, and injuries; unemployment and retirement insurance; and workers’ compensation. The article summarizes the differences in protections available for formal and informal sector workers and measures needed to decrease these disparities in coverage. PMID:25995374

  7. Decentralisation and Social Services in England

    Directory of Open Access Journals (Sweden)

    2005-11-01

    Full Text Available Although Great Britain is not normally credited with the achievement of having been the first nation state to implement measures characteristic of a welfare state (this honour goes to Germany and Bismarck's strategy of promoting social insurance in the 1880s it nevertheless pioneered many models of welfare services in view of the early onset of industrialisation in that country and the subsequent social problems it created. Organisations like the Mutual Insurance and Friendly Societies, the Charity Organisation Society or the Settlement Movement characterised an early approach to welfare that is based on initiatives at the civil society level and express a sense of self-help or of self-organisation in such a way that it did not involve the state directly. The state, traditionally, dealt with matters of discipline and public order, and for this reason institutions like prisons and workhouses represented the other end of the scale of 'welfare' provisions.

  8. Concepts of social epidemiology in health services research

    OpenAIRE

    von dem Knesebeck, Olaf

    2015-01-01

    Background Social epidemiologists aim to identify social characteristics that affect the pattern of disease and health distribution in a society and to understand its mechanisms. Some important concepts of social epidemiology are: social inequalities, social relationships, social capital, and work stress. Discussion Concepts used in social epidemiology can make a useful contribution to health services research because the underlying social factors do not only influence health but are also rel...

  9. Supplemental security income and social security disability insurance coverage among long-term childhood cancer survivors.

    Science.gov (United States)

    Kirchhoff, Anne C; Parsons, Helen M; Kuhlthau, Karen A; Leisenring, Wendy; Donelan, Karen; Warner, Echo L; Armstrong, Gregory T; Robison, Leslie L; Oeffinger, Kevin C; Park, Elyse R

    2015-06-01

    Supplemental security income (SSI) and social security disability insurance (DI) are federal programs that provide disability benefits. We report on SSI/DI enrollment in a random sample of adult, long-term survivors of childhood cancer (n = 698) vs a comparison group without cancer (n = 210) from the Childhood Cancer Survivor Study who completed a health insurance survey. A total of 13.5% and 10.0% of survivors had ever been enrolled on SSI or DI, respectively, compared with 2.6% and 5.4% of the comparison group. Cranial radiation doses of 25 Gy or more were associated with a higher risk of current SSI (relative risk [RR] = 3.93, 95% confidence interval [CI] = 2.05 to 7.56) and DI (RR = 3.65, 95% CI = 1.65 to 8.06) enrollment. Survivors with severe/life-threatening conditions were more often enrolled on SSI (RR = 3.77, 95% CI = 2.04 to 6.96) and DI (RR = 2.73, 95% CI = 1.45 to 5.14) compared with those with mild/moderate or no health conditions. Further research is needed on disability-related financial challenges after childhood cancer. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  10. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  11. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    National military strategy involves evaluating all elements of power, analyzing their capabilities and limitations, and incorporating these tools into a course of military action to secure political goals...

  12. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    .... The privatization and outsourcing of activities that were once solely the province of sovereign governments provide challenges and opportunities to planners and analysts involved in national security strategy...

  13. The Role of Support Services in Promoting Social Inclusion for the Disadvantaged Urban-dwelling Elderly.

    Science.gov (United States)

    Nguyen, Vicky P K H; Sarkari, Feroz; Macneil, Kate; Cowan, Laura; Rankin, Joyce

    2013-01-01

    Disadvantaged older adults living in non-family situations in Toronto are more likely than older adults living in family situations to have less economic security, less social support, and less choice in housing. Older adults who live in poverty and are precariously housed are more likely to be chronically ill, to live with multiple illnesses, to have poor nutrition, high stress and loneliness, all of which are strongly associated with the determinant of health social exclusion. The aim of this study is to: 1) evaluate the level of social disadvantage and exclusion experienced by low-income older adults 65 years of age and older living alone or in non-family situations; 2) assess the level of dependency on government and community services (support services) to maintain a reasonable standard of living (minimize effects of social exclusion); and 3) identify consequences of social exclusion not addressed by current available services. Fifteen male older adult members of the Good Neighbours' Club in downtown Toronto were interviewed. Semi-structured questionnaires assessed barriers to, utility of, and perceived impact of support services available to disadvantaged older adults living in the central core of southeast Toronto. Support services for income, housing, food security, social support, and health care do mitigate the effects of social exclusion in the study participants. Data gathered from interviews identified factors that counter the efforts by support services to increase social inclusion in this population. Support services reduce social isolation experienced by these older adults. Evidence of the detrimental impact of low financial literacy suggests a need to design and implement training programs to build the older adults' capacity to manage their own finances effectively, and resist falling victim to financial fraud.

  14. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  15. FlySec: a risk-based airport security management system based on security as a service concept

    Science.gov (United States)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  16. Lifetime distributional effects of Social Security retirement benefits.

    Science.gov (United States)

    Smith, Karen; Toder, Eric; Iams, Howard

    This article presents three measures of the distribution of actual and projected net benefits (benefits minus payroll taxes) from Social Security's Old-Age and Survivors Insurance (OASI) for people born between 1931 and 1960. The results are based on simulations with the Social Security Administration's Model of Income in the Near Term (MINT), which projects retirement income through 2020. The base sample for MINT is the U.S. Census Bureau's Survey of Income and Program Participation panels for 1990 to 1993, matched with Social Security administrative records. The study population is grouped into 5-year birth cohorts and then ranked by economic status in three ways. First, the population is divided into five groups on the basis of individual lifetime covered earnings, and their lifetime present values of OASI benefits received and payroll taxes paid are calculated. By this measure, OASI provides much higher benefits to the lowest quintile of earners than to other groups, but it becomes less redistributive toward lower earners in more recent birth cohorts. Second, people are ranked by shared lifetime covered earnings, and the values of shared benefits received and payroll taxes paid are computed. Individuals are assumed to split covered earnings, benefits, and payroll taxes with their spouses in the years they are married. By the shared covered earnings measure, OASI is still much more favorable to persons in the lower income quintiles, although to a lesser degree than when people are ranked by individual covered earnings. OASI becomes more progressive among recent cohorts, even as net lifetime benefits decline for the entire population. Finally, individuals are ranked on the basis of their shared permanent income from age 62, when they become eligible for early retirement benefits, until death. Their annual Social Security benefits are compared with the benefits they would have received if they had saved their payroll taxes in individual accounts and used the

  17. 78 FR 37244 - Submission for Review: We Need Important Information About Your Eligibility for Social Security...

    Science.gov (United States)

    2013-06-20

    ... Important Information About Your Eligibility for Social Security Disability Benefits, RI 98-7. As required... Personnel Management. Title: We Need Important Information About Your Eligibility for Social Security... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need Important Information About Your...

  18. 22 CFR 308.7 - Use of social security account number in records systems. [Reserved

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Use of social security account number in records systems. [Reserved] 308.7 Section 308.7 Foreign Relations PEACE CORPS IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 308.7 Use of social security account number in records systems. [Reserved] ...

  19. How portable is social security for migrant workers? : A review of the literature

    NARCIS (Netherlands)

    N. Taha (Nurulsyahirah); M. Messkoub (Mahmood); K.A. Siegmann (Karin Astrid)

    2013-01-01

    textabstractThis paper reviews the literature on the portability of social security entitlements for migrant workers, who moved along North-North, South- North, and South-South migration flows. Portability of social security entitlements is the ability of migrant workers to preserve, maintain, and

  20. 38 CFR 3.201 - Exchange of evidence; Social Security and Department of Veterans Affairs.

    Science.gov (United States)

    2010-07-01

    ... Compensation Evidence Requirements § 3.201 Exchange of evidence; Social Security and Department of Veterans... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Exchange of evidence; Social Security and Department of Veterans Affairs. 3.201 Section 3.201 Pensions, Bonuses, and Veterans...

  1. 75 FR 7546 - Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification...

    Science.gov (United States)

    2010-02-22

    ... DEPARTMENT OF COMMERCE Census Bureau 15 CFR Part 30 [Docket Number: 090422707-91445-02] RIN 0607-AA48 Foreign Trade Regulations (FTR): Eliminate the Social Security Number (SSN) as an Identification... Trade Regulations (FTR) to eliminate the requirement to report a Social Security Number (SSN) as an...

  2. Social Protection and Economic Security of North African Migrant Workers in France

    Directory of Open Access Journals (Sweden)

    CLAUDIA PARASCHIVESCU

    2013-05-01

    Full Text Available This essay describes and analyses the situation of Maghrebis in France, as far as social security is concerned. The paradoxical situation experienced by these immigrants is related to their eligibility for social security and their discrimination on the labour market. As such, Maghrebis form the precarious layer of French society.

  3. 12 CFR 404.21 - Submission of social security and passport numbers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Submission of social security and passport numbers. 404.21 Section 404.21 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Access to Records Under the Privacy Act of 1974 § 404.21 Submission of social security and...

  4. On China’s Social Security System and Traditional Chinese Culture

    Institute of Scientific and Technical Information of China (English)

    谢浙

    2017-01-01

    This paper explores the interrelation between China’s social security system and traditional Chinese culture, pointing out the meaning of the study, and that China’s social security system is a carrier and representation of traditional Chinese culture and

  5. Social Security and Saving: A Time-Series Econometrics Pedagogical Example (With "R" Code)

    Science.gov (United States)

    Wassell, Charles S., Jr.

    2018-01-01

    In 1974, and then again in 1996, Martin Feldstein published studies of the impact of the Social Security system on private saving in the U.S. economy. He found that Social Security depressed personal saving by a substantial amount--up to 50 percent. The author uses the Feldstein data and empirical models in this article to illustrate the steps in…

  6. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  7. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  8. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  9. Flexible Web services integration: a novel personalised social approach

    Science.gov (United States)

    Metrouh, Abdelmalek; Mokhati, Farid

    2018-05-01

    Dynamic composition or integration remains one of the key objectives of Web services technology. This paper aims to propose an innovative approach of dynamic Web services composition based on functional and non-functional attributes and individual preferences. In this approach, social networks of Web services are used to maintain interactions between Web services in order to select and compose Web services that are more tightly related to user's preferences. We use the concept of Web services community in a social network of Web services to reduce considerably their search space. These communities are created by the direct involvement of Web services providers.

  10. [Evolution of worker's health in the social security medical examination in Brazil].

    Science.gov (United States)

    Pinto Júnior, Afrânio Gomes; Braga, Ana Maria Cheble Bahia; Roselli-Cruz, Amadeu

    2012-10-01

    In order to analyze the practice of the social security medical examination starting from the introduction of the worker's health paradigms, data was gathered on the granting of social security disability benefits to assess worker illness based on notification of work-related accidents in the cement industries of Rio de Janeiro. From 2007 to 2009 there was only one notification, which involved a worker handling toxic waste instead of the energy matrix. However, the analysis revealed sources and mechanisms of illness overlooked in the social security medical examination, which is still focused on the one-cause-only logic of occupational medicine. To achieve the worker's health paradigms, changes are required to alter the way of conducting the social security medical examination, by re-establishing partnerships, training human resources, adopting epidemiological indicators, as well as setting and assessing social security goals that transcend the mere granting of disability benefits.

  11. Perceptions of Human Services Students about Social Change Education

    Science.gov (United States)

    Herzberg, Judith T.

    2010-01-01

    Human services educators and scholars maintain that they are teaching social change theory and skills that will allow students to engage in large-scale social change. A review of the literature, from a critical theory perspective, offered little evidence that social change is being taught in human services programs. In this collective case study,…

  12. 38 CFR 18.452 - Health and other social services.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Health and other social...-EFFECTUATION OF TITLE VI OF THE CIVIL RIGHTS ACT OF 1964 Nondiscrimination on the Basis of Handicap Health and Social Services § 18.452 Health and other social services. (a) General. In providing health, or other...

  13. Promoting Social Change through Service-Learning in the Curriculum

    Science.gov (United States)

    Bowen, Glenn A.

    2014-01-01

    Service-learning is a high-impact pedagogical strategy embraced by higher education institutions. Direct service based on a charity paradigm tends to be the norm, while little attention is paid to social change-oriented service. This article offers suggestions for incorporating social justice education into courses designed to promote social…

  14. Marketing Social Service Programs Using Political Campaign Technology.

    Science.gov (United States)

    Bynum, Peter

    1991-01-01

    Discusses how human services agencies can use strategies and information technologies similar to those used in political campaigns to identify needs and attitudes for social services campaigns. Marketing for social services programs is described, and the use of computers for a political campaign and for a teenage pregnancy program is compared.…

  15. Virtual customer service agents: using social presence and personalization to shape online service encounters

    NARCIS (Netherlands)

    Verhagen, T.; van Nes, J; Feldberg, F; van Dolen, W.

    2014-01-01

    By performing tasks traditionally fulfilled by service personnel and having a humanlike appearance, virtual customer service agents bring classical service elements to the web, which may positively influence customer satisfaction through eliciting social responses and feelings of personalization.

  16. Virtual Customer Service Agents: Using Social Presence and Personalization to Shape Online Service Encounters

    NARCIS (Netherlands)

    Verhagen, T.; van Nes, J.; Feldberg, J.F.M.; van Dolen, W.M.

    2014-01-01

    By performing tasks traditionally fulfilled by service personnel and having a humanlike appearance, virtual customer service agents bring classical service elements to the web, which may positively influence customer satisfaction through eliciting social responses and feelings of personalization.

  17. A cost-benefit analysis of the Mexican Social Security Administration's family planning program.

    Science.gov (United States)

    Nortman, D L; Halvas, J; Rabago, A

    1986-01-01

    A cost-benefit analysis of the family planning program of the Mexican Social Security System (IMSS) was undertaken to test the hypothesis that IMSS's family planning services yield a net savings to IMSS by reducing the load on its maternal and infant care service. The cost data are believed to be of exceptionally high quality because they were empirically ascertained by a retrospective and prospective survey of unit time and personnel costs per specified detailed type of service in 37 IMSS hospitals and 16 clinics in 13 of Mexico's 32 states. Based on the average cost per case, the analysis disclosed that for every peso (constant 1983 currency) that IMSS spent on family planning services to its urban population during 1972-1984 inclusive, the agency saved nine pesos. The article concludes by raising the speculative question as to the proportion of the births averted by the IMSS family planning program that would have been averted in the absence of IMSS's family planning services.

  18. Work-related illness, work-related accidents, and lack of social security in Colombia.

    Science.gov (United States)

    Buitrago Echeverri, María Teresa; Abadía-Barrero, César Ernesto; Granja Palacios, Consuelo

    2017-08-01

    The impacts of neoliberal or market-based social security reforms in health have been extensively studied. How such reforms transformed employment-related insurance and entitlements, however, has received significantly less attention. This study aims to understand how the employment insurance system operates in Colombia and to assess how the experience of workers seeking social security entitlements relates to the system's structure. We conducted an ethnographic study of the Colombian Occupational Risk System between May 2014 and March 2016, with two main components: 1) analysis of the system itself through in-depth interviews with 32 people working in leadership positions and a systematic review of the system's most important legislation, and 2) a study of people who experienced problems receiving entitlements and were challenging the assessment of their work-related illness or accident. We conducted in-depth interviews with 22 people, followed up with half of them, and reviewed their case files. We found that difficulties accessing health care services, payments for medical leave, job reassignments, severance packages, and filing for pension benefits were common to all cases and resulted from overwhelming bureaucratic and administrative demands. Regional and national evaluation bodies dictate whether a given illness or accident is work-related, and establish a percentage of Loss of Wage Earning Capacity (LWEC). People's disabled bodies rarely reached the threshold of 50% LWEC to qualify for disability pensions. The lengthy process that workers were forced to endure to obtain work-related entitlements always involved the judiciary. The three competing for-profit financial sectors (health insurance, pension funds, and Occupational Risk Administrators) actively challenged workers' demands in order to increase their profits. We conclude that these for-profit sectors work contrary to the principles that sustain social security. Indeed, they push sick and disabled

  19. THE IMPACT OF ECONOMIC CRISIS ON PUBLIC SERVICES OF SOCIAL VALUE IN ROMANIA

    Directory of Open Access Journals (Sweden)

    Milin Anda Ioana

    2013-07-01

    equal opportunities, financial security during illness not as simple care of the sick. The paper includes analysis related to: the structure of social protection in our country, the scope of these services, the relationship between social protection and poverty, the way and the degree to which social protection deepens or contribute to poverty reduction. The economic crisis triggered in Europe in 2008that also affects Romania, negatively influenced the evolution of social funds in key areas of public interest, education, health and social care. This results from: decreasing share of social spending in the state budget, decreasing share of these expenses in the total family budget due to lower purchasing power and thus the obligation of individual to reduce or waive some costs of this kind, central and local government bodies inability to meet certain service requirements such at the level of the population and especially low-income population groups. Located in the crisis situation the state must seek solutions to keep social services at an appropriate level because the quantity and quality of these services have an impact upon quality of life and standard of living of many individuals. The results of the analysis indicates us a reduced benefit for this type of service, in our country, with negative effects over the entire society. The conclusions aim to support the fact that social policy from our country is insufficient in relation to the real needs of the population, being strongly influenced by domestic economic situation and the size of the global economic crisis.

  20. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  1. Evaluating the Sustainability of the Spanish Social Security System

    Directory of Open Access Journals (Sweden)

    Francisco J. Blanco-Encomienda

    2017-12-01

    Full Text Available Social security has remarkable relevance in the general context of Spanish economy. This system is viable if the volume of active population increases at a higher rate than the number of pensioners does and if, in addition, active population is employed by the productive system. The reports of the National Institute of Statistics about Spanish demography demonstrate how these conditions are not met as of today, because our society has one of the highest aging rates and also a remarkable increase in the dependency rate. Through various techniques of time series analysis, this paper reveals the current economic trends in Spain to demonstrate the need for structural reforms of the system so as to make it more sustainable in the long term. To achieve this, it is necessary to change the financing model to a mixed one where the capitalization method plays a significant role, and also to implement urgent measures in order to reduce the barriers to business and employment development.

  2. A security modeling approach for web-service-based business processes

    DEFF Research Database (Denmark)

    Jensen, Meiko; Feja, Sven

    2009-01-01

    a transformation that automatically derives WS-SecurityPolicy-conformant security policies from the process model, which in conjunction with the generated WS-BPEL processes and WSDL documents provides the ability to deploy and run the complete security-enhanced process based on Web Service technology.......The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality...... of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide...

  3. Stochastic Actuarial Modelling of a Defined-Benefit Social Security Pension Scheme: An Analytical Approach

    OpenAIRE

    Iyer, Subramaniam

    2017-01-01

    Among the systems in place in different countries for the protection of the population against the long-term contingencies of old-age (or retirement), disability and death (or survivorship), defined-benefit social security pension schemes, i.e. social insurance pension schemes, by far predominate, despite the recent trend towards defined-contribution arrangements in social security reforms. Actuarial valuations of these schemes, unlike other branches of insurance, continue to be carried out a...

  4. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    Public key infrastructure (PKI) technology is at a primitive stage characterized by deployment of PKIs that are engineered to support the provision of security services within individual enterprises, and are not able to support...

  5. T-Check in Technologies for Interoperability: Web Services and Security--Single Sign-On

    National Research Council Canada - National Science Library

    Wrage, Lutz; Simanta, Soumya; Lewis, Grace A; Jaspan, Saul

    2007-01-01

    .... This technical note presents the results of applying the T-Check approach in an initial investigation of two Web services standards, WS-Security and SAML, to create an SSO solution that works inside...

  6. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    .... This thesis defines interoperability as the capacity to support trust through retention of security services across PKI domains at a defined level of assurance and examines the elements of PKI...

  7. Internet of people, things and services - the convergence of security, trust and privacy

    CSIR Research Space (South Africa)

    Eloff, JHP

    2009-12-01

    Full Text Available The Future Internet will consist of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a security...

  8. Single Mothers' Experiences with Pregnancy and Child Rearing in Korea: Discrepancy between Social Services/Policies and Single Mothers' Needs.

    Science.gov (United States)

    Kim, Jung-Eun; Lee, Jin Yong; Lee, Sang Hyung

    2018-05-10

    This study aims to explore single mothers’ experiences with social services/policies for their independent living and to identify gaps between these experiences and the needs of single mothers. A focus group discussion was performed to collect data. Seven single mothers discussed their experiences in significant periods of their lives: pregnancy, childbirth, and parenting. Findings from the qualitative thematic analysis show discrepancies between the direction of social services/policies and single mothers’ needs, in terms of difficulties in healthcare, childcare, housing, employment, and income security. To the single mothers in this study, the social safety net is not inclusive, compared to that which is available to two-parent families or adoptive families. It is necessary to intervene in current blind spots of services/policies for single mothers, and to provide a social safety net to strengthen single mothers’ self-reliance and their children’s social security in the long term.

  9. Towards Formal Validation of Trust and Security of the Internet of Services

    DEFF Research Database (Denmark)

    Carbone, Roberto; Minea, Marius; Mödersheim, Sebastian Alexander

    2011-01-01

    Service designers and developers, while striving to meet the requirements posed by application scenarios, have a hard time to assess the trust and security impact of an option, a minor change, a combination of functionalities, etc., due to the subtle and unforeseeable situations and behaviors...... techniques to efficiently tackle industrial-size problems. The formal verification of trust and security of the Internet of Services will significantly boost its development and public acceptance....

  10. Interrelations between Energy Security Economics and Social Cohesion: Analysis of a Lithuanian Case

    Directory of Open Access Journals (Sweden)

    Dainius Genys

    2015-12-01

    Full Text Available Growing attention to sustainable development in academic discourse fosters discussions on how energy security affects society. In most cases the discussions consider the political and economic consequences, which affect or may affect the society. The aim of the article is to assess the impact of energy security economics on social cohesion in Lithuania. To achieve this aim the interrelations between energy security, energy economics and social cohesion are discussed. The theoretical framework of social cohesion (introduced by J. Jenson and P. Bernard is presented and applied in empirical analysis. The operationalization of empirical variables is based on economic, political and socio-cultural - activity areas, which are analyzed to verify the dichotomies between public attitudes and the actual behavior of society. These dichotomies help to distinguish six analytical dimensions, on the basis of which we created 17 empirical indicators, which analysis allows for describing the impact of Lithuanian energy security economics on social cohesion in quantitative data. The statistical analyses showed that the impact of attitudinal dimensions of energy security economics on social cohesion in Lithuania has an almost neutral effect: 3.05 (1-very negative; 3-neutral, 5-very positive. Whereas, the impact of behavioural dimensions of energy security economics on social cohesion has a negative effect: 2.47. The aggregated average of the overall impact of energy security economics on social cohesion in Lithuania has a negative effect: 2.76.

  11. Contemporary women's secure psychiatric services in the United Kingdom: A qualitative analysis of staff views.

    Science.gov (United States)

    Walker, T; Edge, D; Shaw, J; Wilson, H; McNair, L; Mitchell, H; Gutridge, K; Senior, J; Sutton, M; Meacock, R; Abel, K

    2017-11-01

    WHAT IS KNOWN ON THE SUBJECT?: Three pilot UK-only Women's Enhanced Medium Secure Services (WEMSS) was opened in 2007 to support women's movement from high secure care and provide a bespoke, women-only service. Evidence suggests that women's secure services are particularly challenging environments to work in and staffing issues (e.g., high turnover) can cause difficulties in establishing a therapeutic environment. Research in this area has focused on the experiences of service users. Studies which have examined staff views have focused on their feelings towards women in their care and the emotional burden of working in women's secure services. No papers have made a direct comparison between staff working in different services. WHAT DOES THIS STUDY ADD TO EXISTING KNOWLEDGE?: This is the first study to explore the views and experiences of staff in the three UK WEMSS pilot services and contrast them with staff from women's medium secure services. Drawing upon data from eighteen semi-structured interviews (nine WEMSS, nine non-WEMSS), key themes cover staff perceptions of factors important for women's recovery and their views on operational aspects of services. This study extends our understanding of the experiences of staff working with women in secure care and bears relevance for staff working internationally, as well as in UK services. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: The study reveals the importance of induction and training for bank and agency staff working in women's secure services. Further, regular clinical supervision should be mandatory for all staff so they are adequately supported. Introduction Women's Enhanced Medium Secure Services (WEMSS) is bespoke, gender-sensitive services which opened in the UK in 2007 at three pilot sites. This study is the first of its kind to explore the experiences of WEMSS staff, directly comparing them to staff in a standard medium secure service for women. The literature to date has focused on the experiences of

  12. Enhancing Experiment Central Service Reliability: from delivery to security and virtualization

    CERN Document Server

    Donno, Flavia; Buzykaev, Alexey; Saiz Santos, Maria Dolores

    2011-01-01

    The four LHC experiments rely on experiment specific services running on machines mainly located at CERN. Some of these services have been rated by the experiments as very critical: any loss or degradation of performance has a major impact on the experiment's production and analysis activities. It is therefore important to provide a reliable and robust operational environment. In this work we describe the strategy based on service deployment, security and virtualization adopted to enhance the reliability of ATLAS and CMS central services.

  13. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    Science.gov (United States)

    2008-09-01

    Fire and Emergency Management Services, Suffolk County Sheriff’s Department, the U.S. Attorney’s Office, the Bureau of Alcohol, Tobacco and Firearms...mass transit services. These include express and regular bus service, a downtown Skyway monorail , a trolley service and the Stadium Shuttle for various...safety related incidents rather than security, including transportation disruptions due to derailments, accidents, fires , hazardous materials spills

  14. Load control services in the management of power system security costs

    International Nuclear Information System (INIS)

    Jayantilal, A.; Strbac, G.

    1999-01-01

    The new climate of deregulation in the electricity industry is creating a need for a more transparent cost structure and within this framework the cost of system security has been a subject of considerable interest. Traditionally power system security has been supplied by out-of-merit generation, in the short term, and transmission reinforcement, in the long term. This paper presents a method of analysing the role of load-demand in the management of power system security costs by utilising load control services (LCS). It also proposes a competitive market to enable bidding from various participants within the electricity industry to supply system security. (author)

  15. Income distribution patterns from a complete social security database

    Science.gov (United States)

    Derzsy, N.; Néda, Z.; Santos, M. A.

    2012-11-01

    We analyze the income distribution of employees for 9 consecutive years (2001-2009) using a complete social security database for an economically important district of Romania. The database contains detailed information on more than half million taxpayers, including their monthly salaries from all employers where they worked. Besides studying the characteristic distribution functions in the high and low/medium income limits, the database allows us a detailed dynamical study by following the time-evolution of the taxpayers income. To our knowledge, this is the first extensive study of this kind (a previous Japanese taxpayers survey was limited to two years). In the high income limit we prove once again the validity of Pareto’s law, obtaining a perfect scaling on four orders of magnitude in the rank for all the studied years. The obtained Pareto exponents are quite stable with values around α≈2.5, in spite of the fact that during this period the economy developed rapidly and also a financial-economic crisis hit Romania in 2007-2008. For the low and medium income category we confirmed the exponential-type income distribution. Following the income of employees in time, we have found that the top limit of the income distribution is a highly dynamical region with strong fluctuations in the rank. In this region, the observed dynamics is consistent with a multiplicative random growth hypothesis. Contrarily with previous results obtained for the Japanese employees, we find that the logarithmic growth-rate is not independent of the income.

  16. 24 CFR 5.218 - Penalties for failing to disclose and verify Social Security and Employer Identification Numbers.

    Science.gov (United States)

    2010-04-01

    ... and verify Social Security and Employer Identification Numbers. 5.218 Section 5.218 Housing and Urban... REQUIREMENTS; WAIVERS Disclosure and Verification of Social Security Numbers and Employer Identification Numbers; Procedures for Obtaining Income Information Disclosure and Verification of Social Security...

  17. 20 CFR 404.469 - Nonpayment of benefits where individual has not furnished or applied for a Social Security number.

    Science.gov (United States)

    2010-04-01

    ... not furnished or applied for a Social Security number. 404.469 Section 404.469 Employees' Benefits... or applied for a Social Security number. No monthly benefits will be paid to an entitled individual... or her Social Security number, or, if the individual has not been assigned a number, he or she makes...

  18. 48 CFR 1552.224-70 - Social security numbers of consultants and certain sole proprietors and Privacy Act statement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Social security numbers of... CONTRACT CLAUSES Texts of Provisions and Clauses 1552.224-70 Social security numbers of consultants and... provision in all solicitations. Social Security Numbers of Consultants and Certain Sole Proprietors and...

  19. 20 CFR 220.37 - When a child's disability determination is governed by the regulations of the Social Security...

    Science.gov (United States)

    2010-04-01

    ...) Inclusion as a disabled child in the employee's annuity rate under the social security overall minimum. (2... governed by the regulations of the Social Security Administration. 220.37 Section 220.37 Employees... Disability Determinations Governed by the Regulations of the Social Security Administration § 220.37 When a...

  20. 78 FR 9987 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-02-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...

  1. 78 FR 22361 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-04-15

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...

  2. Food and nutrition security as gendered social practice

    NARCIS (Netherlands)

    Niehof, A.

    2016-01-01

    In many parts of the world, the food security of households and the nutrition security of individual household members, in particular that of children, are still at risk, in spite of the progress made in combatting hunger at the global level. The prevailing opinion among scientists and development

  3. The social service as part of social protection: sociology management aspect

    Directory of Open Access Journals (Sweden)

    I. V. Meschan

    2015-06-01

    The main directions of improving the management of social maintenances on the basis of sociology and management approach, improve the regulatory framework; Approval social standards; introduce a mechanism of social order as a form of cross­sector partnership for social development of the social services.

  4. Recent Themes in Social Networking Service Research.

    Directory of Open Access Journals (Sweden)

    John S Liu

    Full Text Available The body of literature addressing the phenomenon related to social networking services (SNSs has grown rather fast recently. Through a systematic and quantitative approach, this study identifies the recent SNS research themes, which are the issues discussed by a coherent and growing subset of this literature. A set of academic articles retrieved from the Web of Science database is used as the basis for uncovering the recent themes. We begin the analysis by constructing a citation network which is further separated into groups after applying a widely used clustering method. The resulting clusters all consist of articles coherent in citation relationships. This study suggests eight fast growing recent themes. They span widely encompassing politics, romantic relationships, public relations, journalism, and health. Among them, four focus their issues largely on Twitter, three on Facebook, and one generally on both. While discussions on traditional issues in SNSs such as personality, motivations, self-disclosure, narcissism, etc. continue to lead the pack, the proliferation of the highlighted recent themes in the near future is very likely to happen.

  5. Recent Themes in Social Networking Service Research.

    Science.gov (United States)

    Liu, John S; Ho, Mei Hsiu-Ching; Lu, Louis Y Y

    2017-01-01

    The body of literature addressing the phenomenon related to social networking services (SNSs) has grown rather fast recently. Through a systematic and quantitative approach, this study identifies the recent SNS research themes, which are the issues discussed by a coherent and growing subset of this literature. A set of academic articles retrieved from the Web of Science database is used as the basis for uncovering the recent themes. We begin the analysis by constructing a citation network which is further separated into groups after applying a widely used clustering method. The resulting clusters all consist of articles coherent in citation relationships. This study suggests eight fast growing recent themes. They span widely encompassing politics, romantic relationships, public relations, journalism, and health. Among them, four focus their issues largely on Twitter, three on Facebook, and one generally on both. While discussions on traditional issues in SNSs such as personality, motivations, self-disclosure, narcissism, etc. continue to lead the pack, the proliferation of the highlighted recent themes in the near future is very likely to happen.

  6. CONSTRUCTING SERVICE DISCOURSES IN LITHUANIAN FAMILY SOCIAL WORK

    OpenAIRE

    Roberta Motiečienė; Merja Laitinen

    2016-01-01

    In this paper, family social work is constructed through the analysis of social service discourses from the social workers’ perspective. Recent research shows how social workers are dealing with complex and fluid issues, as well as the societal uncertainty in their work with families (e.g., Spratt, 2009; Menéndez et al., 2015). Based on earlier studies, it is vital to analyse family social work in different contextual settings. Societal, political and organisational contexts affect the pre...

  7. Security framework for virtualised infrastructure services provisioned on-demand

    NARCIS (Netherlands)

    Ngo, C.; Membrey, P.; Demchenko, Y.; de Laat, C.

    2011-01-01

    Cloud computing is developing as a new wave of ICT technologies, offering a common approach to on-demand provisioning computation, storage and network resources which are generally referred to as infrastructure services. Most of currently available commercial Cloud services are built and organized

  8. Toward a Social Approach to Learning in Community Service Learning

    Science.gov (United States)

    Cooks, Leda; Scharrer, Erica; Paredes, Mari Castaneda

    2004-01-01

    The authors describe a social approach to learning in community service learning that extends the contributions of three theoretical bodies of scholarship on learning: social constructionism, critical pedagogy, and community service learning. Building on the assumptions about learning described in each of these areas, engagement, identity, and…

  9. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  10. Twitter, Facebook, and Ten Red Balloons: Social Network Problem Solving and Homeland Security

    OpenAIRE

    Ford, Christopher M.

    2011-01-01

    This article appeared in Homeland Security Affairs (February 2011), v.7 no.1 This essay, the winner of the Center for Homeland Defense and Security (CHDS) Essay Contest in 2010, looks at how homeland security could benefit from crowd-sourced applications accessed through social networking tools such as Twitter and Facebook. Christopher M. Ford looks at the apparent efficacy of two such endeavors: the Defense Advanced Research Projects Agency'۪s (DARPA) competition to find ten 8-foot balloo...

  11. An end-to-end security auditing approach for service oriented architectures

    NARCIS (Netherlands)

    Azarmi, M.; Bhargava, B.; Angin, P.; Ranchal, R.; Ahmed, N.; Sinclair, A.; Linderman, M.; Ben Othmane, L.

    2012-01-01

    Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-server architectures due to the involvement

  12. The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures

    DEFF Research Database (Denmark)

    Armando, Alessandro; Arsac, Wihem; Avanesov, Tigran

    2012-01-01

    The AVANTSSAR Platform is an integrated toolset for the formal specification and automated validation of trust and security of service-oriented architectures and other applications in the Internet of Services. The platform supports application-level specification languages (such as BPMN and our...

  13. Service task partition and distribution in star topology computer grid subject to data security constraints

    Energy Technology Data Exchange (ETDEWEB)

    Xiang Yanping [Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China (China); Levitin, Gregory, E-mail: levitin@iec.co.il [Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China (China); Israel electric corporation, P. O. Box 10, Haifa 31000 (Israel)

    2011-11-15

    The paper considers grid computing systems in which the resource management systems (RMS) can divide service tasks into execution blocks (EBs) and send these blocks to different resources. In order to provide a desired level of service reliability the RMS can assign the same blocks to several independent resources for parallel execution. The data security is a crucial issue in distributed computing that affects the execution policy. By the optimal service task partition into the EBs and their distribution among resources, one can achieve the greatest possible service reliability and/or expected performance subject to data security constraints. The paper suggests an algorithm for solving this optimization problem. The algorithm is based on the universal generating function technique and on the evolutionary optimization approach. Illustrative examples are presented. - Highlights: > Grid service with star topology is considered. > An algorithm for evaluating service reliability and data security is presented. > A tradeoff between the service reliability and data security is analyzed. > A procedure for optimal service task partition and distribution is suggested.

  14. Service task partition and distribution in star topology computer grid subject to data security constraints

    International Nuclear Information System (INIS)

    Xiang Yanping; Levitin, Gregory

    2011-01-01

    The paper considers grid computing systems in which the resource management systems (RMS) can divide service tasks into execution blocks (EBs) and send these blocks to different resources. In order to provide a desired level of service reliability the RMS can assign the same blocks to several independent resources for parallel execution. The data security is a crucial issue in distributed computing that affects the execution policy. By the optimal service task partition into the EBs and their distribution among resources, one can achieve the greatest possible service reliability and/or expected performance subject to data security constraints. The paper suggests an algorithm for solving this optimization problem. The algorithm is based on the universal generating function technique and on the evolutionary optimization approach. Illustrative examples are presented. - Highlights: → Grid service with star topology is considered. → An algorithm for evaluating service reliability and data security is presented. → A tradeoff between the service reliability and data security is analyzed. → A procedure for optimal service task partition and distribution is suggested.

  15. SIS Security White Paper: Managing privacy and security for the Service Information System

    OpenAIRE

    Kerr, Gillian; Johnson, Alberta; Gaudon, Sara

    2018-01-01

    The Service Information System (SIS) is a monitoring and evaluation platform built on open source software and donated Microsoft services that is offered on a subscription basis to nonprofits providing any kind of service. It is developed and managed by LogicalOutcomes, a Canadian nonprofit, and launched in March 2018. The first implementation was created in partnership with the Ontario Coalition of Agencies Serving Immigrants, funded by the Ontario Ministry of Citizenship and Immigration. ...

  16. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  17. The Migration Security in Russian Society amid Ethnic and Social Conflicts Aggravation

    Directory of Open Access Journals (Sweden)

    N А Tkacheva

    2011-03-01

    Full Text Available National security protection emerges as an indispensable factor for the development of personality, society, and state amid the increasing complexity of international migration processes. The article touches upon the peculiarities of ethnic and social relations between migrants and members of the host country providing insight into the novel category of "migration security".

  18. Yearly Data for Spoken Language Preferences of Social Security Disability Insurance Claimants (2011-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits for federal fiscal years...

  19. A blueprint for social security reform: a report by the National Council of Welfare

    National Research Council Canada - National Science Library

    1994-01-01

    This report is a first response to the discussion paper entitled, 'Improving Social Security in Canada' which was tabled in Parliament on October 5, 1994 by the Minister of Human Resources Development...

  20. A profile of social security child beneficiaries and their families: sociodemographic and economic characteristics.

    Science.gov (United States)

    Tamborini, Christopher R; Cupito, Emily; Shoffner, Dave

    2011-01-01

    Using a rich dataset that links the Census Bureau's Survey of Income and Program Participation calendar-year 2004 file with Social Security benefit records, this article provides a portrait of the sociodemographic and economic characteristics of Social Security child beneficiaries. We find that the incidence ofbenefit receipt in the child population differs substantially across individual and family-level characteristics. Average benefit amounts also vary across subgroups and benefit types. The findings provide a better understanding of the importance of Social Security to families with beneficiary children. Social Security is a major source of family income for many child beneficiaries, particularly among those with low income or family heads with lower education and labor earnings.

  1. Social Security and the Retirement and Savings Behavior of Low Income Households1

    Science.gov (United States)

    van der Klaauw, Wilbert; Wolpin, Kenneth I.

    2011-01-01

    In this paper, we develop and estimate a model of retirement and savings incorporating limited borrowing, stochastic wage offers, health status and survival, social security benefits, Medicare and employer provided health insurance coverage, and intentional bequests. The model is estimated on sample of relatively poor households from the first three waves of the Health and Retirement Study (HRS), for whom we would expect social security income to be of particular importance. The estimated model is used to simulate the responses to changes in social security rules, including changes in benefit levels, in the payroll tax, in the social security earnings tax and in early and normal retirement ages. Welfare and budget consequences are estimated. PMID:21566719

  2. The Investigation of the Social Entrepreneurship Characteristics of Social Studies Pre-Service Teachers

    Science.gov (United States)

    Yazici, Kubilay; Uslu, Salih; Arik, Soner

    2016-01-01

    The purpose of this study is to investigate the social entrepreneurship characteristics of social studies pre-service teachers in terms of various variables (gender, defining oneself as a social entrepreneur and grade). The data of the research were obtained on a volunteer basis from 253 pre-service teachers studying at the departments of social…

  3. [Unit cost variation in a social security company in Querétaro, México].

    Science.gov (United States)

    Villarreal-Ríos, Enrique; Campos-Esparza, Maribel; Garza-Elizondo, María E; Martínez-González, Lidia; Núñez-Rocha, Georgina M; Romero-Islas, Nestor R

    2006-01-01

    Comparing unit cost variation between departments and reasons for consultation in outpatient health services provided by a social security company from Querétaro, Mexico. A study of costs (in US dollars) was carried out in outpatient health service units during 2004. Fixed unit costs were estimated per department and adjusted for one year's productivity. Material, physical and consumer resources were included. Weighting was assigned to resources invested in each department. Unit cost was estimated by using the micro cost technique; medicaments, materials used during treatment and reagents were considered to be consumer items. Unit cost resulted from adding fixed unit cost to the variable unit cost corresponding to the reason for consulting. Units costs were then compared between the medical units. Unit cost per month for diabetic treatment varied from 34.8 US dollars, 32,2 US dollars to US 34 US dollars, pap smear screening test costs were 7,2 US dollars, 8,7 US dollars and 7,3 US dollars and dental treatment 27 US dollars, 33 US dollars, 6 and 28,7 US dollars. Unit cost variation was more important in the emergency room and the dental service.

  4. Legislating Civil Service Reform: The Homeland Security Act of 2002

    National Research Council Canada - National Science Library

    Brook, Douglas A; King, Cynthia L; Anderson, David; Bahr, Joshua

    2006-01-01

    .... It includes a review of the recent history of civil service reform, a chronology of the major events leading up to passage of the legislation, and a detailed examination of the rhetorical framing...

  5. The Soft Side of Cyber Security - Social Media

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    2016-01-01

    The importance of cyber-security is growing. With the continued digitization of our everyday life we become increasingly vulnerable to cyber-attacks – also personally. Therefore, it is an issue to be taken extremely seriously.......The importance of cyber-security is growing. With the continued digitization of our everyday life we become increasingly vulnerable to cyber-attacks – also personally. Therefore, it is an issue to be taken extremely seriously....

  6. VCC-SSF: Service-Oriented Security Framework for Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Won Min Kang

    2015-02-01

    Full Text Available Recently, as vehicle computing technology has advanced, the paradigm of the vehicle has changed from a simple means of transportation to a smart vehicle for safety and convenience. In addition, the previous functions of the Intelligent Transportation System (ITS such as traffic accident prevention and providing traffic volume information have been combined with cloud computing. ITS services provide user-oriented broad services in the Vehicular Cloud Computing (VCC environment through efficient traffic management, traffic accident prevention, and convenience services. However, existing vehicle services focus on providing services using sensing information inside the vehicle and the system to provide the service through an interface with the external infrastructure is insufficient. In addition, because wireless networks are used in VCC environments, there is a risk of important information leakage from sensors inside the vehicle, such as driver personal identification and payment information at the time of goods purchase. We propose the VCC Service-oriented Security Framework (VCC-SSF to address the limitations and security threats of VCC-based services. The proposed framework considers security for convenient and efficient services of VCC and includes new user-oriented payment management and active accident management services. Furthermore, it provides authentication, encryption, access control, confidentiality, integrity, and privacy protection for user personal information and information inside the vehicle.

  7. Trends and Correlates of Consenting to Provide Social Security Numbers: Longitudinal Findings from the General Social Survey (1993-2010)

    Science.gov (United States)

    Kim, Jibum; Shin, Hee-Choon; Rosen, Zohn; Kang, Jeong-han; Dykema, Jennifer; Muennig, Peter

    2015-01-01

    Privacy and confidentiality are often of great concern to respondents answering sensitive questions posed by interviewers. Using the 1993-2010 General Social Survey, we examined trends in the provision of social security numbers (SSNs) and correlates of those responses. Results indicate that the rate of SSN provision has declined over the past…

  8. Imperfect Annuity Markets, Unintended Bequests, and the Optimal Age Structure of Social Security Benefits

    OpenAIRE

    Martin Feldstein

    1989-01-01

    The social security program now provides a constant real benefit throughout each retirees lifetime. This paper examines whether total welfare would rise if benefits were lower in early retirement years (when most individuals have some saving with which to finance consumption) and higher in later years (when the uncertainty of survival and the absence of actuarially fair private annuities makes the availability of social security benefits more important.) The analysis shows that there is a pot...

  9. MAIN FACTORS DRIVING SOCIAL PUBLIC SERVICES IN INTERNATIONAL CONTEXT

    Directory of Open Access Journals (Sweden)

    Mihaela, GHENTA

    2014-03-01

    Full Text Available Literature and the latest reports point out that not only in Europe, but all over the world there is a growing demand for social services. As social needs have diversified, the number of potential users of social services has increased and this has generated increased complexity of social services. This paper highlights some of the results of a study conducted by the author in the doctoral studies program. One of the aims of this study was to identify the main factors that cause the current configuration of social services at global level. The research analysed the demographic changes and the impact of the crisis in social services for Europe, the United States of America (USA and Japan based on statistical data provided by the national statistics institutes for the regions considered. The results highlight the necessity of continuous development and reconfiguration of social services in order to meet the social and economic demands and to ensure a better organisation of these type of services.

  10. CONSTRUCTING SERVICE DISCOURSES IN LITHUANIAN FAMILY SOCIAL WORK

    Directory of Open Access Journals (Sweden)

    Roberta Motiečienė

    2016-09-01

    Full Text Available In this paper, family social work is constructed through the analysis of social service discourses from the social workers’ perspective. Recent research shows how social workers are dealing with complex and fluid issues, as well as the societal uncertainty in their work with families (e.g., Spratt, 2009; Menéndez et al., 2015. Based on earlier studies, it is vital to analyse family social work in different contextual settings. Societal, political and organisational contexts affect the preconditions of social work, but social work also needs to operate within structures (e.g., Pohjola et al., 2014. This paper provides insights into the Lithuanian family social work. The focus is on what kinds of features construct Socialinis darbas su šeima Roberta Motiečienė, Merja Laitinen 12 family social work by analysing social workers’ discourses. This analysis continues the research of Eidukevičiūtė (2013, who analysed family social work practices in transitional Lithuanian society. This researcher aimed to deepen the knowledge about child protection services in Lithuania, the father’s role in child care and the mother’s performance in it. According to Eidukevičiūtė (2013, social workers are still struggling in the field of family social work. This study continues the research tradition in the field of family social work, paying attention to the different contextual settings where family social work is conducted. The Lithuanian government has stated that family policy is a key component of its mandate where (Social Report, 2014. The Council of Social Work plays a very important role in providing guidance on how to implement the government’s policy in the field of family social work. The European Commission Council (2015 provides recommendations for the implementation of the 2015 National Reform Programme, which should concentrate on the people (30% of the total population who are at risk of poverty. The council recommends working on

  11. Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Yilei Wang

    2015-01-01

    Full Text Available With the rapid development of mobile devices and wireless technologies, mobile social networks become increasingly available. People can implement many applications on the basis of mobile social networks. Secure computation, like exchanging information and file sharing, is one of such applications. Fairness in secure computation, which means that either all parties implement the application or none of them does, is deemed as an impossible task in traditional secure computation without mobile social networks. Here we regard the applications in mobile social networks as specific functions and stress on the achievement of fairness on these functions within mobile social networks in the presence of two rational parties. Rational parties value their utilities when they participate in secure computation protocol in mobile social networks. Therefore, we introduce reputation derived from mobile social networks into the utility definition such that rational parties have incentives to implement the applications for a higher utility. To the best of our knowledge, the protocol is the first fair secure computation in mobile social networks. Furthermore, it finishes within constant rounds and allows both parties to know the terminal round.

  12. Return to work after renal transplantation: a study of the Brazilian Public Social Security System.

    Science.gov (United States)

    Messias, Alexandre Augusto; Reichelt, Angela J; Dos Santos, Edson F; Albuquerque, Galton C; Kramer, José S P; Hirakata, Vania N; Garcia, Valter D

    2014-12-15

    Return to work is an objective parameter used worldwide to evaluate the success of organ transplantation and is especially feasible after renal transplantation. This study sought to describe the frequency of return to work after renal transplantation and related characteristics. Retrospective cohort of 511 isolated kidney transplant recipients was recruited from a Brazilian referral center from January 2005 to December 2009; all were matched to the public social security database to determine inclusion and benefit awards, as well as the rate of resumption of contributions to the public social security system, a surrogate marker of work rehabilitation. Characteristics associated with work return were analyzed. No social security records were found for 28 subjects. The remaining 483 subjects had a mean age of 45±13 years; 62% were male; 401 (83%) received some public social security benefit; 298 were paying dues and could, therefore, receive temporary or permanent disability benefits. Of these, 78 subjects made social security payments after transplantation, resulting in a work return rate of 26% (95% confidence interval, 21-32). Younger age, living donor graft, and chronic glomerulonephritis were significantly associated with return to work. In Brazil, most renal transplant recipients are on social security benefits, but only a small proportion return to work after surgery. Clinical characteristics may help define work resumption trends.

  13. Analysis of Department of Defense social media policy and its impact on operational security

    OpenAIRE

    Leonhardi, Eric V.; Murphy, Mark; Kim, Hannah

    2015-01-01

    Approved for public release; distribution is unlimited The emergence and rapid adoption of social media by society has forced the Department of Defense (DOD) to adapt, and ultimately develop and incorporate, social media policy into its cybersecurity strategy. While social media has influenced DOD strategy, it has also had a direct impact on the organization’s operational security (OPSEC). DOD personnel using social media represent a potential OPSEC risk through the various ways and means ...

  14. ENVIRONMENTAL SECURITY IN THE REGION IN THE SERVICE OF SUSTAINABLE DEVELOPMENT OF LOCAL SPATIAL

    Directory of Open Access Journals (Sweden)

    Ljiljana Stošić Mihajlović

    2016-04-01

    Full Text Available A fundamental prerequisite for the existence, growth and development of each social community is environmental safety. In modern conditions of environmental degradation as a global process, it is bound to increase social stratification, ethnic and even religious conflict, conflict and intolerance that threatens the safety of society. It is a notorious fact that the world of Simply is no longer in a position to deal with new shocks. The financial crisis has reduced global economic resilience, while geopolitical tensions and increased social concerns point to the fact that the state and society less able than ever to cope with global challenges, among which is the primary problem of environmental security. In modern countries, political, security and other interests of the citizens' day-to-day modeling, transform, get the content, in accordance with the general civilization changes. In this connection, sustainable local spatial development is crucial conditioned ecological without security region and aims to achieve a balance between current consumption of natural resources and the ability of the system to maintain the level at which future generations will be able to use them. The work represents a contribution to the achievement of environmental security as a new, modern forms of security, and originated from the need to once again draw attention to the evident environmental degradation as an integral part of human security. Ecological security of the region protects the basic components of the environment and determinants of the local spatial development. In fact, safety in the field of protection and preservation of the environment is one of the most important factors Security Council shall contemporary world. In doing so, it is important to emphasize, however, that environmental security has no borders and is a global problem, a task and an obligation.

  15. Local Social Services in Nordic countries in Times of Disaster

    DEFF Research Database (Denmark)

    Eydal, Guðný Björk; Ómarsdóttir, Ingibjörg Lilja; Dahlberg, Rasmus

    of such disasters is on the rise according to forecasts. In order to enhance resilience and preparedness of those most vulnerable in disasters, the involvement of local social services in the emergency management system is of vital importance. The literature shows how social services can enhance social and human......The project focused on the emergency management systems in the five Nordic countries. It investigated whether local social services have a formal role in the contingency planning of the systems. The project was part of The Nordic Welfare Watch research project during the Icelandic Presidency...... Program in the Nordic Council of Ministers 2014-2016. The council financed the project. The main findings show that Finland, Norway and Sweden specifically address the role of social services in times of disaster in their legal frameworks on emergency management. Finland and Norway also address the role...

  16. [Health and social services used by the rural elderly].

    Science.gov (United States)

    Rubio, Encarnación; Comín, Magdalena; Montón, Gema; Martínez, Tomás; Magallón, Rosa

    2014-01-01

    To describe the use of health and social services, and to analyze the influence of functional capacity for Instrumental Activities of Daily Living (IADL) and other factors in their use. Cross-sectional study in a non-institutionalized population older than 64 years old in a basic rural health area of Zaragoza. use of different health and social services. Main independent variable: functional capacity for IADL according to the Lawton-Brody. Confounding variables: sociodemographic, physical exercise, comorbidity, self-perceived health, walking aids, social resources and economic resources (OARS-MAFQ). The relationship between the use of services and functional capacity for IADL was assessed using crude OR (ORC) and adjusted (adjusted OR) with CI95% by means of multivariate logistic regression models. The use of social and health services increased with age and worse functional capacity for IADL. The increased use of health services was related with bad stage of health, limited social and economic resources, physical inactivity and female. The increased use of home help services was related with limited social resources, low education level and male. Regular physical activity and using walking aids were associated with greater participation in recreational activities. The probability of using social and health services increased in older people with impaired functional capacity for IADL. The specific use of them changed according to differences in health, demographic and contextual features. Copyright © 2013 SEGG. Published by Elsevier Espana. All rights reserved.

  17. FROM THE «SOCIAL BUSINESS FACTORY» – TO THE «SOCIAL SERVICE FACTORY»

    Directory of Open Access Journals (Sweden)

    N. V. Vysotskaya

    2010-01-01

    Full Text Available Issues related to creation of organizations carrying out activities in the field of social business and social partnership are discussed as well as concepts of creation of two innovative projects «Social business factory» and «Social service factory».

  18. Enforcement of Security and Privacy in a Service-Oriented Smart Grid

    DEFF Research Database (Denmark)

    Mikkelsen, Søren Aagaard

    inhabitants. With the vision, it is therefore necessity to enforce privacy and security of the data in all phases of its life cycle. The life cycle starts from acquiring the data to it is stored. Therefore, this dissertation follows a system-level and application-level approach to manage data with respect...... to privacy and security. This includes first a design of a service-oriented architecture that allows for the deployment of home-oriented and grid-oriented IASs on a Home Energy Management System (HEMS) and in the cloud, respectively. Privacy and security of electricity data are addressed by letting...... the residential consumer control data dissemination in a two-stage process: first from the HEMS to the cloud and from the cloud to the IASs. Then the dissertation focuses on the critical phases in securing the residential home as well as securing the cloud. It presents a system-level threat model of the HEMS...

  19. Modelling a web service approach to secure data access ...

    African Journals Online (AJOL)

    ... and timely means to transmit official information in every working environment. ... The 3-tier architecture adopted in this work would have the front-end to allow officers log in ... At the middle-end, users are authenticated for specific services.

  20. Designing and implementing the logical security framework for e-commerce based on service oriented architecture

    OpenAIRE

    Luhach, Ashish Kr.; Dwivedi, Sanjay K; Jha, C K

    2014-01-01

    Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logical security because of their poor designing and to face the highly equipped and trained intruders. This editorial proposed a security framework for small and medium sized E-commerce, based on service oriented architecture and gives an analysis of the emin...

  1. Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

    OpenAIRE

    Preeti Barrow; Runni Kumari; Prof. Manjula R

    2016-01-01

    Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with almost no investment in new framework, training new staff, or authorizing new software. Though today everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security assurance to its customers and therefore, businesses are h...

  2. SOCIAL CAPITAL AS THE BASIS FOR THE FORMATION OF SOCIO-ECONOMIC SECURITY IN RURAL AREAS

    Directory of Open Access Journals (Sweden)

    Andrii Sukhostavets

    2017-09-01

    Full Text Available Social capital is the basis for the definition of the future concept of rural areas management. Therefore, one of the most important tasks is to determine the various factors of existence, development, and formation of social capital. One of these factors is the security of rural areas and the definition of how social capital affects it. The analysis of the available scientific works in various areas reveals the lack of consensus in the definition of the category “socio-economic security of rural areas”. This is due to the fact that the definition of social and economic security of rural areas is identified with such concepts as the ability to provide resistance to various internal and external environmental influences. The purpose of the study is to determine the nature of social capital, as well as to study its impact on the socio-economic security of the state. The methodology of the research is based on the monographic method, the method of dialectic cognition, the scenario methods used to find the optimal scenario implementation option; SWOT-analysis is used to assess the positive or negative impact of social capital on the socio-economic security of rural areas. Understanding the essence of socio-economic security has led to the conclusion that it consists of economic, social, environmental and other types of security. The term “social security” in the understanding of researchers usually has two interpretations: traditional (absence of threats to the society and alternative (absence of threats from the society. It is proved that the social security of the region should be focused on ensuring primarily human rights and freedoms, namely, personal, political, social, economic, cultural, environmental, and family ones. Social and economic security should also provide social standards and guarantees, as well as norms. The economic basis of the security of rural areas is manifested in the development of market relations, infrastructure

  3. Designing for Social Infrastructures in Complex Service Systems: A Human-Centered and Social Systems Perspective on Service Design

    Directory of Open Access Journals (Sweden)

    Mieke van der Bijl-Brouwer

    Full Text Available Service design is one of the keys to improving how we target today’s complex societal problems. The predominant view of service systems is mechanistic and linear. A service infrastructure—which includes solutions like service blueprints, scripts, and protocols—is, in some ways, designed to control the behavior of service professionals at the service interface. This view undermines the intrinsic motivation, expertise, and creativity of service professionals. This article presents a different perspective on service design. Using theories of social systems and complex responsive processes, I define service organizations as ongoing iterated patterns of relationships between people, and identify them as complex social service systems. I go on to show how the human-centeredness of design practices contributes to designing for such service systems. In particular, I show how a deep understanding of the needs and aspirations of service professionals through phenomenological themes contributes to designing for social infrastructures that support continuous improvement and adaptation of the practices executed by service professionals at the service interface.

  4. Service Demand Discovery Mechanism for Mobile Social Networks.

    Science.gov (United States)

    Wu, Dapeng; Yan, Junjie; Wang, Honggang; Wang, Ruyan

    2016-11-23

    In the last few years, the service demand for wireless data over mobile networks has continually been soaring at a rapid pace. Thereinto, in Mobile Social Networks (MSNs), users can discover adjacent users for establishing temporary local connection and thus sharing already downloaded contents with each other to offload the service demand. Due to the partitioned topology, intermittent connection and social feature in such a network, the service demand discovery is challenging. In particular, the service demand discovery is exploited to identify the best relay user through the service registration, service selection and service activation. In order to maximize the utilization of limited network resources, a hybrid service demand discovery architecture, such as a Virtual Dictionary User (VDU) is proposed in this paper. Based on the historical data of movement, users can discover their relationships with others. Subsequently, according to the users activity, VDU is selected to facilitate the service registration procedure. Further, the service information outside of a home community can be obtained through the Global Active User (GAU) to support the service selection. To provide the Quality of Service (QoS), the Service Providing User (SPU) is chosen among multiple candidates. Numerical results show that, when compared with other classical service algorithms, the proposed scheme can improve the successful service demand discovery ratio by 25% under reduced overheads.

  5. Estimating demand pressures arising from need for social services for older people

    OpenAIRE

    Roy Carr-Hill; Gillian Dalley

    1999-01-01

    The twelve years preceding the introduction of the community care reforms in 1993/4 saw an increased demand for health and social services generated by the increase in numbers of older people (particularly the over 85s) and reflected in the rapid growth of residential and nursing home places over a twelve year period (from 224,000 in 1983 to 427,000 in 1994). While the move into the residential and nursing home sector was partly driven by the perverse incentives offered by social security in ...

  6. Practical Aspects of Outsourcing as a Mean of Security Service Provision

    Directory of Open Access Journals (Sweden)

    D.B. Frolov

    2012-06-01

    Full Text Available The article highlights the implementation of outsourcing as a mean of service for security provision. Analysis is performed to describe the current issues affecting the management decision in favor of outsourcing. Investigation covers the processes of physical, information and economical security. The main recommendations to use outsourcing for security provision are described in the conclusion. With the development of mobile technology protecting of user data becomes more and more important. The article is dedicated to the vulnerability of devices running on the iOS platform, potentially allowing an attacker to obtain information about the movements of their owners, and suggests ways to protect against these attacks.

  7. Securing services in the cloud: an investigation of the threats and the mitigations

    Science.gov (United States)

    Farroha, Bassam S.; Farroha, Deborah L.

    2012-05-01

    The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc) and the corporate knowledge databases. The new paradigm depends on the service provider to ensure that the customer's information is continuously monitored and is kept available, secure, access controlled and isolated from potential adversaries.

  8. When social security fails to provide emotional security: single parent households and the contractual welfare state

    NARCIS (Netherlands)

    Tonkens, E.; Verplanke, L.

    2013-01-01

    The provision of services in the contractual welfare state is conditional. If one wants to receive a service, one has to comply with the demands of the provider. If one fails to do so, the organisation threatens to terminate its services, and indeed often does so. There are, however, people who

  9. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security/United States Secret Service--003 Non-Criminal Investigation... Security/United States Secret Service--003 Non-Criminal Investigation Information System.'' As a result of... Secret Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223. For privacy issues please...

  10. Social innovation in the prison service

    DEFF Research Database (Denmark)

    Aakjær, Marie Kirstejn; Brandt, Eva

    of trust and confidence in the prison, and 2) to learn how to engage inmates better in their everyday life inside prison, e.g. through engaging them in collective matters. The process of co-inquiry and co-creation provided a new social infrastructure, which allowed inmates and prison officers to access new...... roles and social positions....

  11. Automatic health record review to help prioritize gravely ill Social Security disability applicants.

    Science.gov (United States)

    Abbott, Kenneth; Ho, Yen-Yi; Erickson, Jennifer

    2017-07-01

    Every year, thousands of patients die waiting for disability benefits from the Social Security Administration. Some qualify for expedited service under the Compassionate Allowance (CAL) initiative, but CAL software focuses exclusively on information from a single form field. This paper describes the development of a supplemental process for identifying some overlooked but gravely ill applicants, through automatic annotation of health records accompanying new claims. We explore improved prioritization instead of fully autonomous claims approval. We developed a sample of claims containing medical records at the moment of arrival in a single office. A series of tools annotated both patient records and public Web page descriptions of CAL medical conditions. We trained random forests to identify CAL patients and validated each model with 10-fold cross validation. Our main model, a general CAL classifier, had an area under the receiver operating characteristic curve of 0.915. Combining this classifier with existing software improved sensitivity from 0.960 to 0.994, detecting every deceased patient, but reducing positive predictive value to 0.216. True positive CAL identification is a priority, given CAL patient mortality. Mere prioritization of the false positives would not create a meaningful burden in terms of manual review. Death certificate data suggest the presence of truly ill patients among putative false positives. To a limited extent, it is possible to identify gravely ill Social Security disability applicants by analyzing annotations of unstructured electronic health records, and the level of identification is sufficient to be useful in prioritizing case reviews. Published by Oxford University Press on behalf of the American Medical Informatics Association 2017. This work is written by US Government employees and is in the public domain in the US.

  12. Measuring the burden of preventable diabetic hospitalisations in the Mexican Institute of Social Security (IMSS).

    Science.gov (United States)

    Lugo-Palacios, David G; Cairns, John; Masetto, Cynthia

    2016-08-02

    The prevalence of diabetes among adults in Mexico has increased markedly from 6.7 % in 1994 to 14.7 % in 2015. Although the main diabetic complications can be prevented or delayed with timely and effective primary care, a high percentage of diabetic patients have developed them imposing an important preventable burden on Mexican society and on the health system. This paper estimates the financial and health burden caused by potentially preventable hospitalisations due to diabetic complications in hospitals operated by the largest social security institution in Latin America, the Mexican Institute of Social Security (IMSS), in the period 2007-2014. Hospitalisations in IMSS hospitals whose main cause was a diabetic complication were identified. The financial burden was estimated using IMSS diagnostic-related groups. To estimate the health burden, DALYs were computed under the assumption that patients would not have experienced complications if they had received timely and effective primary care. A total of 322,977 hospitalisations due to five diabetic complications were identified during the period studied, of which hospitalisations due to kidney failure and diabetic foot represent 78 %. The financial burden increased by 8.4 % in real terms between 2007 and 2014. However, when measured as cost per IMSS affiliate, it decreased by 11.3 %. The health burden had an overall decrease of 13.6 % and the associated DALYs in 2014 reached 103,688. Resources used for the hospital treatment of diabetic complications are then not available for other health care interventions. In order to prevent these hospitalisations more resources might need to be invested in primary care; the first step could be to consider the financial burden of these hospitalisations as a potential target for switching resources from hospital care to primary care services. However, more evidence of the effectiveness of different primary care interventions is needed to know how much of the burden could

  13. False security or greater social inclusion? Exploring perceptions of CCTV use in public and private spaces accessed by the homeless.

    Science.gov (United States)

    Huey, Laura

    2010-03-01

    It has been well documented that owing to the vulnerability inherent in their situation and status, the homeless experience high rates of harassment and criminal victimization. And yet, the question of whether CCTV surveillance of public and private spaces - so frequently viewed by the middle classes as a positive source of potential security - might also be viewed by the homeless in similar ways. Within the present paper, I address this issue by considering the possibility that CCTV might be seen by some homeless men and women as offering: a) a measure of enhanced security for those living in the streets and in shelters, and; b) to the extent that security is conceived of as a social good, the receipt of which marks one as a citizen of the state, a means by which they can be reconstituted as something more than 'lesser citizens'. To test these ideas, I rely on data from interviews conducted with homeless service users, service providers for the homeless, and police personnel in three cities. What is revealed is a mixed set of beliefs as to the relative security and meaning of CCTV.

  14. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  15. End-to-End Service Oriented Architectures (SOA) Security Project

    Science.gov (United States)

    2012-02-01

    Java 6.0 (javax.ws) platform and deployed on boston.cs.purdue.edu. TB stores all data regarding sessions and services in a MySQL database, setup on...pointcut designators. JBoss AOP [JBO2] and AspectJ [ASP1] are powerful frameworks that implement AOP for Java programs. Its pointcut designators... hibernate cglib enhanced proxies <attribute name="Ignore">*$$EnhancerByCGLIB$$*</attribute> --> <attribute name="Optimized">true</attribute

  16. Illiteracy, Financial Services and Social Exclusion.

    Science.gov (United States)

    Hajaj, Khaldoun

    Despite calls by consumer advocates for Australia's governments and financial services institutions to provide consumers with resources to help them understand how the financial services sector operates, financial education remains something that most Australians gain by default. Research conducted in the United Kingdom and United States, has…

  17. Exploring a security protocol for secure service migration in commercial cloud environments

    OpenAIRE

    Karthick, Gayathri; Mapp, Glenford E.; Kammueller, Florian; Aiash, Mahdi

    2017-01-01

    Mobile users are making more demands of networks. They want to run applications such as network steaming of audio and video as well as immersive gaming that demand high Qualities-of-Service. One way to address this problem is by using mobile services that move around as users move around. This ensures that low latencies are maintained between the client and the server resulting in a better Quality-of-Experience. In addition, the advent of virtual machine technology for example, VMware, and co...

  18. 42 CFR 405.2452 - Services and supplies incident to clinical psychologist and clinical social worker services.

    Science.gov (United States)

    2010-10-01

    ... psychologist and clinical social worker services. 405.2452 Section 405.2452 Public Health CENTERS FOR MEDICARE... clinical social worker services. (a) Services and supplies incident to a clinical psychologist's or clinical social worker's services are reimbursable under this subpart if the service or supply is— (1) Of a...

  19. A Socially Inclusive Pathway to Food Security: The Agroecological Alternative

    NARCIS (Netherlands)

    B. McKay (Ben)

    2013-01-01

    markdownabstract__Introduction__ With roughly 1 billion people unable to meet their minimum daily caloric intake, the issue of food security is imperative to overcoming rural poverty. The way in which we produce food plays an extremely important role in solving the hunger epidemic and reaching

  20. Caregiver Sensitivity, Contingent Social Responsiveness, and Secure Infant Attachment

    Science.gov (United States)

    Dunst, Carl J.; Kassow, Danielle Z.

    2008-01-01

    Findings from two research syntheses of the relationship between caregiver sensitivity and secure infant attachment and one research synthesis of factors associated with increased caregiver use of a sensitive interactional style are presented. The main focus of analysis was the extent to which different measures of caregiver contingent social…

  1. Social Status and the Demand for Security and Privacy

    DEFF Research Database (Denmark)

    Grossklags, Jens; Barradale, Nigel J.

    2014-01-01

    . The method of investigation used is experimental, with 146 subjects interacting in high- or low-status assignments and the subsequent change in the demand for security and privacy being related to status assignment with a significant t-statistic up to 2.9, depending on the specification. We find that a high...

  2. Flexibility and security : National social models in transitional labour markets

    NARCIS (Netherlands)

    Muffels, R.J.A.; Crouch, Colin; Wilthagen, A.C.J.M.

    2014-01-01

    Aggregate and individual data are used to test the association between employment performance and different ways of reconciling flexibility and security in European labour markets. Particular use is made of statistics on individuals’ labour market transitions as revealed by national labour force

  3. Symmetry in Social Construction during ERP Implementation: A Systems Security Perspective

    Directory of Open Access Journals (Sweden)

    Kennedy Njenga

    2014-03-01

    Full Text Available The principle of symmetry in enterprise resource planning (ERP systems implementation holds that the researcher should deploy impartial explanation in cases of success as in cases of failure. This article examines the symmetry intrinsic in social construction within the various stages of the ERP development life cycle, from initiation to implementation. Discourse on symmetry focuses on whether social constructs are able to influence ERP implementation positively (success or negatively (failure and whether this exposes ERP systems to information security risk. The theoretical lens of social construction of technology (SCOT theory, a theory premised on social interaction between agents and technology artefacts, is applied for this purpose. The research was quantitative with a survey having been conducted on information technology (IT and information security (IS practitioners. Results of the study highlight the significant role social construction plays because of the direct linkage it has with the implementation of information security controls in ERP systems.  The research delineated five social constructs, namely positional influence, reward influence, coercive influence, expert influence and referent influence. For purposes of this research and on the sampling criteria applied, the construct ‘expert influence’, a typology of social construction, is shown to be more domineering than other typologies of social construction and is seen as providing symmetrical balance between governing ERP security (success and risk (failure. Implications of these results for theory and practice are discussed in the main article.

  4. 48 CFR 252.222-7004 - Compliance with Spanish social security laws and regulations.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Compliance with Spanish... PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.222-7004 Compliance with Spanish social... Spanish Social Security Laws and Regulations (JUN 1997) (a) The Contractor shall comply with all Spanish...

  5. Social Information Processing, Security of Attachment, and Emotion Regulation in Children with Learning Disabilities

    Science.gov (United States)

    Bauminger, Nirit; Kimhi-Kind, Ilanit

    2008-01-01

    This study examined the contribution of attachment security and emotion regulation (ER) to the explanation of social information processing (SIP) in middle childhood boys with learning disabilities (LD) and without LD matched on age and grade level. Children analyzed four social vignettes using Dodge's SIP model and completed the Kerns security…

  6. The Role of Social Networking Services in eParticipation

    DEFF Research Database (Denmark)

    Sæbø, Øystein; Rose, Jeremy; Nyvang, Tom

    2009-01-01

    , content-generation and the development of loosely-coupled communities. They provide the forum for much discussion and interaction. In this respect social networking could contribute to solve some of the problems of engaging their users that eParticipation services often struggle with. This paper...... and social networking because democratic systems favour the interests of larger groups of citizens --- the more voices behind a political proposition, the greater its chances of success. In this context of challenges the study of social networking on the internet and social network theory offers valuable...... insights into the practices and theories of citizen engagement. Social network theory focuses on the chains of relationships that social actors communicate and act within. Some social networking services on the internet attract large numbers of users, and apparently sustain a great deal of interaction...

  7. Security risks:threats & rewards in social media

    OpenAIRE

    Punjabi, V. (Vikesh)

    2015-01-01

    Abstract In the last decade, without any doubt, social media i.e. social network platforms that are mainly created in order to interact with each other such as Facebook, Twitter, LinkedIn, Google +, Tumblr, Instagram, Flickr, Myspace, Blogs, YouTube, or any user generated content websites gained huge access in public daily life including individuals and organizations. These social network platforms, especially Facebook, Twi...

  8. [Changes in workers' rehabilitation procedures under the Brazilian social security system: modernization or undermining of social protection?].

    Science.gov (United States)

    Takahashi, Mara Alice Batista Conti; Iguti, Aparecida Mari

    2008-11-01

    This article describes the changes in workers' rehabilitation practices under the Brazilian National Social Security Institute (INSS) in the 1990s, in the context of neoliberal economic adjustment measures, based on an analysis of INSS documents from 1992 to 1997. The INSS plan for "modernization" of workers' rehabilitation led to: (1) dismantling of multidisciplinary teams; (2) induction of workers to accept proportional retirement pensions and voluntary layoffs; (3) under-utilization of the remaining INSS professional staff; (4) elimination of treatment programs for workers' rehabilitation; and (5) dismantling of INSS rehabilitation centers and clinics. The changes in the Brazilian social security system undermined the county's social security project and hegemony and reduced social security reform to a mere management and fiscal issue. Current "rehabilitation" falls far short of the institution's original purpose of social protection for workers, while aiming at economic regulation of the system to contain costs of workers' benefits. Workers that suffer work-related accidents are denied occupational rehabilitation, which aggravates their social disadvantage when they return to work.

  9. WiMAX security and quality of service an end-to-end perspective

    CERN Document Server

    Tang, Seok-Yee; Sharif, Hamid

    2010-01-01

    WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements.

  10. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  11. Secure positioning technique based on encrypted visible light map for smart indoor service

    Science.gov (United States)

    Lee, Yong Up; Jung, Gillyoung

    2018-03-01

    Indoor visible light (VL) positioning systems for smart indoor services are negatively affected by both cochannel interference from adjacent light sources and VL reception position irregularity in the three-dimensional (3-D) VL channel. A secure positioning methodology based on a two-dimensional (2-D) encrypted VL map is proposed, implemented in prototypes of the specific positioning system, and analyzed based on performance tests. The proposed positioning technique enhances the positioning performance by more than 21.7% compared to the conventional method in real VL positioning tests. Further, the pseudonoise code is found to be the optimal encryption key for secure VL positioning for this smart indoor service.

  12. Social Security Contributions and Return Migration Among Older Male Mexican Immigrants.

    Science.gov (United States)

    Aguila, Emma; Vega, Alma

    2017-06-01

    For decades, scholars have studied the effects of immigration on the U.S. social security system. To date, this research has been primarily limited to migrants within the United States and does not consider those who return to their countries of origin. We estimate the proportion of male Mexican return migrants who contributed to the U.S. social security system and analyze their socioeconomic characteristics and migration histories. We also estimate the proportion that receive or expect to receive U.S. social security benefits. Using probit regression on the 2012 Mexican Health and Aging Study (MHAS), we describe the predictors of having contributed to the U.S. social security system among Mexican males in Mexico aged 50 years and older who at some point lived in the United States. We find that 32% of male return migrants reported having contributed to the U.S. social security system, but only 5% of those who contributed, received or expected to receive benefits. Those who reported having contributed spent more years in the United States and were more likely to be U.S. citizens or legal permanent residents than those who did not contribute. Immigrants often pay Old-Age, Survivors, and Disability Insurance taxes using legitimate or illegitimate social security numbers and return to their home countries without collecting U.S. social security benefits. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  13. Vulnerability and Agency: Beyond an Irreconcilable Dichotomy for Social Service Providers Working with Young Refugees in the UK

    Science.gov (United States)

    O'Higgins, Aoife

    2012-01-01

    Many young refugees face significant difficulties in securing support from social services providers. This study invited 21 young refugees aged 16 to 21 to take part in focus groups and follow-up interviews about their experiences of accessing this support. The findings reveal that young refugees may deliberately conform to expectations about…

  14. Psychological factors of the readiness of teachers to ensure social security in the educational environment.

    Directory of Open Access Journals (Sweden)

    Shmeleva E.A.

    2015-03-01

    Full Text Available The negative sociocultural transformations that are taking place in modern society and the resulting psychological transformation of personality and mode of life strongly require searching for ways of providing social safety to the next generation, with teachers being the implementers of this process. Teachers’ professionalism is determined by their willingness to solve personal and socially relevant problems, including the willingness to provide social security for other people, to thwart social risks, and to build constructive interpersonal relationships. The aim of our research was to reveal and to analyze the psychological factors affecting the readiness of teachers to ensure social security in educational environments. The environmental factors of social risk have been theoretically characterized. It has been shown that the essential factor in ensuring students’ social security is providing a safe social environment in educational institutions; such an environment provides the learners and the teachers with sociopsychological security and psychosocial well-being. The empirical part of our study was devoted to identifying negative social phenomena in the schools in the Ivanovo region (with the help of a questionnaire administered to 700 students and to identifying the personally and professionally important qualities of the teachers and the subjective psychological factors of their readiness to ensure social security in the educational environment (through interviewing 300 teachers; the administration of the questionnaires and the interviewing were followed by an assessment of their significance (with the help of a questionnaire administered to 140 teachers. Using factor analysis we identified the relevant indicators and grouped them into six factors of the readiness of teachers to ensure a safe educational environment. Relevant personal and professional qualities of teachers were revealed; these are the subjective factors of the

  15. From Reef to Table: Social and Ecological Factors Affecting Coral Reef Fisheries, Artisanal Seafood Supply Chains, and Seafood Security.

    Directory of Open Access Journals (Sweden)

    John N Kittinger

    Full Text Available Ocean and coastal ecosystems provide critical fisheries, coastal protection, and cultural benefits to communities worldwide, but these services are diminishing due to local and global threats. In response, place-based strategies involve communities and resource users in management have proliferated. Here, we present a transferable community-based approach to assess the social and ecological factors affecting resource sustainability and food security in a small-scale, coral reef fishery. Our results show that this small-scale fishery provides large-scale benefits to communities, including 7,353 ± 1547 kg yr(-1 (mean ± SE of seafood per year, equating to >30,000 meals with an economic value of $78,432. The vast majority of the catch is used for subsistence, contributing to community food security: 58% is kept, 33.5% is given away, and 8.5% is sold. Our spatial analysis assesses the geographic distribution of community beneficiaries from the fishery (the "food shed" for the fishery, and we document that 20% of seafood procured from the fishery is used for sociocultural events that are important for social cohesion. This approach provides a method for assessing social, economic, and cultural values provided by small-scale food systems, as well as important contributions to food security, with significant implications for conservation and management. This interdisciplinary effort aims to demonstrate a transferable participatory research approach useful for resource-dependent communities as they cope with socioeconomic, cultural, and environmental change.

  16. O&M of services infrastructure by social franchising partnerships

    CSIR Research Space (South Africa)

    Wall, K

    2012-09-01

    Full Text Available South African research finds that social franchising partnerships could address many challenges in the operation and maintenance of water services infrastructure. Franchising trains those on-site, and also provides backup off-site skills...

  17. social security and national insurance trust of ghana annual reports

    African Journals Online (AJOL)

    Global Journal

    company's activities and financial performance. The Social ... Hence, this paper attempts to evaluate the readability of annual reports of SSNIT and establish the ... One of the tenets of effective communication is ... Scheme and to cater for the First Tier of the contributory ..... Corporate. Social Responsibility and Environmental.

  18. Children’s Sense of Security in Social Spaces

    Directory of Open Access Journals (Sweden)

    Sara Imanian

    2014-12-01

    Full Text Available This article is a study of the sense of security of middle-class children in Iran. Through taking a grounded theory approach, it explores the concept of insecurity in homes and cities and children’s reactions to feeling insecure. To do so, Draw and Write, Picture-Aided Questionnaire, and interview were applied to 100 children between 7 and 14 years of age. The findings revealed an ever-present feeling of anxiety and helplessness which was rooted in the human security conditions and in children’s status in society. The children showed two different reactions of active and passive when facing this feeling. As a consequence of active strategy, children grow a sense of fear management, become optimistic, and feel satisfied. Those who passively react to feeling insecure grow a desire for power and become depressed and unable to trust others.

  19. An improved smartcard for the South African Social Security Agency (SASSA): A proof of life based solution

    CSIR Research Space (South Africa)

    Mthethwa, Sthembile

    2016-12-01

    Full Text Available Conference on Information Science and Security, Pattaya, Thailand, 19 - 22 December 2016 An improved smartcard for the South African Social Security Agency (SASSA): A proof of life based solution Mthethwa, S. Barbour, G. Thinyane, M...

  20. A Socially Inclusive Pathway to Food Security: The Agroecological Alternative

    OpenAIRE

    Ben McKay

    2012-01-01

    markdownabstract__Introduction__ With roughly 1 billion people unable to meet their minimum daily caloric intake, the issue of food security is imperative to overcoming rural poverty. The way in which we produce food plays an extremely important role in solving the hunger epidemic and reaching the first Millennium Development Goal (MDG) of eradicating extreme hunger and poverty. The dominant model of agricultural development practised by many countries today is based on chemical-intensive agr...