WorldWideScience

Sample records for state security

  1. Weak states and security

    OpenAIRE

    Rakipi, Albert

    2006-01-01

    Cataloged from PDF version of article. Although the weak 1 failing states have often been deseribed as the single most important problem for the international order s ince the en d of Cold W ar (F .Fukuyaına 2004:92) several dimensions of this phenomenon still remain unexplored. While this phenomenon has been present in the international politics even earlier, only the post Cold W ar period accentuated its relationship with security issues. Following the Cold W ar' s "peacef...

  2. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  3. Quantum Secure Direct Communication Using W State

    International Nuclear Information System (INIS)

    Dong Li; Xiu Xiaoming; Gao Yajun; Chi Feng

    2008-01-01

    A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure

  4. The association between state attachment security and state Mindfulness.

    Directory of Open Access Journals (Sweden)

    Christopher A Pepping

    Full Text Available Recent research suggests that attachment and mindfulness are related, though the nature of this association is unclear. Here we present two studies examining whether there is a causal relationship between state attachment and state mindfulness. Study 1 investigated the effects of experimentally increasing state mindfulness on state attachment security. State mindfulness was successfully enhanced, but this led to no change in state attachment security. Study 2 investigated the effects of experimentally enhancing state attachment security on state mindfulness. State attachment security was successfully enhanced, but this did not lead to any change in state mindfulness. These findings suggest that there is not a direct, immediate causal relationship between state attachment and state mindfulness as a result of brief experimental manipulations. Future research should examine these associations in longer term interventions.

  5. State of security in Elasticsearch

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Security is an often understated problem in high growth emerging branches of IT like big data and IoT. Elasticsearch is a great example because support for security not only came late, but it's a quite convoluted, non-open, and very expensive solution. Learn how Simone Scarduzio lead his Open Source project ReadonlyREST to become the solution of choice for many. From hackathon hustlers to Fortune500 corporates. ReadonlyREST is simple yet powerful because it leverages the concept of access control list (yes, like firewalls). We'll go through some creative use cases and business concepts made possible by the creative use of ReadonlyREST and its configuration model. About the speaker Simone Scarduzio has a 8 years background in software engineering, spanning from mobile messaging clusters to Cloud-first startups. He wrote the first book about Vert.x, a JVM micro services framework. Recently, he helped Thomson Reuters re-architect legacy back ends into secure, polyglot, resilient distributed systems. Today, ...

  6. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  7. Secure quantum key distribution using squeezed states

    International Nuclear Information System (INIS)

    Gottesman, Daniel; Preskill, John

    2001-01-01

    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e r =1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel

  8. Directed Security Policies: A Stateful Network Implementation

    Directory of Open Access Journals (Sweden)

    Cornelius Diekmann

    2014-05-01

    Full Text Available Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.

  9. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  10. Pakistan: Can the United States Secure an Insecure State?

    Science.gov (United States)

    2010-01-01

    do not have female staff; the male-to-female staff ratio in the health field is 7 to 1.130 More nurses and female staff are needed, especially to...exercise was rescheduled for 2009. 9 Interview with Ninth Air Force personnel, September 12, 2008. 200 Pakistan: Can the United States Secure an Insecure

  11. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Chinese Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  12. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Arabic Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  13. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  14. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  15. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (French Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  16. Horizons of security, state and extended family

    DEFF Research Database (Denmark)

    Zoppi, Marco

    ” and nationalism in their social security arrangements. In this manner, this study intends to account for historical patterns of integration from the specific point of view of welfare and security. In order to pursue this aim, I have conducted qualitative interviews with Somalis living in Scandinavia about themes...

  17. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2016-01-06

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper s CSI and not of its channel s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  18. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2017-03-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper\\'s CSI and not of its channel\\'s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  19. Economic security of modern Russia: the current state and prospects

    Directory of Open Access Journals (Sweden)

    Karanina Elena

    2018-01-01

    Full Text Available In the conditions of instability of the world economy and the introduction of sanctions against Russia by a number of countries, the problem of ensuring national economic security has become particularly relevant. This topic also has a high scientific, practical and social significance, as it allows to identify possible gaps in the economic security of modern Russia and timely develop mechanisms to eliminate them to protect the national interests of the state. The purpose of this article is to determine the state and prospects of improving the economic security of modern Russia. This can be achieved by solving the following tasks: review of existing methods to evaluate the economic security of country, conduct a SWOT analysis of economic security of modern Russia, the development of suggestions for its improvement. This research analyzes various aspects of the economic security of modern Russia. As a result, the author developed an integrated method to ensuring the economic security of the country, as well as a matrix of economic security within this method. The way of increase of economic security of modern Russia is offered. Thus, to overcome the threats for the economic security of modern Russia, it is necessary to implement the recommendations developed by the authors, including the establishment of their own production and the construction of an innovatively oriented model of the economy. This will ensure the economic security of modern Russia and its stable development in the future.

  20. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  1. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  2. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  3. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo

    2011-01-01

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  4. Parliamentary control of security information agency in terms of security culture: State and problems

    Directory of Open Access Journals (Sweden)

    Radivojević Nenad

    2013-01-01

    Full Text Available Even though security services have the same function as before, today they have different tasks and significantly more work than before. Modern security problems of the late 20th and early 21st century require states to reorganize their security services, adapting them to the new changes. The reorganization involves, among other things, giving wider powers of the security services, in order to effectively counter the growing and sophisticated security threats, which may also lead to violations of human rights and freedoms. It is therefore necessary to define the right competence, organization, authority and control of these services. In democratic countries, there are several institutions with different levels of control of security services. Parliament is certainly one of the most important institutions in that control, both in the world and in our country. Powers, finance, the use of special measures and the nature and scope of work of the Security Information Agency are certainly object of the control of the National Assembly. What seems to be the problem is achieving a balance between the need for control of security services and security services to have effective methods for combating modern security problems. This paper presents the legal framework related to the National Assembly control of the Security Intelligence Agency, as well as the practical problems associated with this type of control. We analyzed the role of security culture as one of the factors of that control. In this regard, it provides guidance for the practical work of the members of parliament who control the Security Intelligence Agency, noting in particular the importance of and the need for continuous improvement of security culture representatives.

  5. Neuroscience, ethics, and national security: the state of the art.

    Directory of Open Access Journals (Sweden)

    Michael N Tennison

    Full Text Available National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  6. Neuroscience, ethics, and national security: the state of the art.

    Science.gov (United States)

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  7. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    National Research Council Canada - National Science Library

    Rosell, Richard G

    2007-01-01

    The State of New Jersey does not have a written homeland security strategy. This thesis argues that New Jersey should have such a strategy, particularly since it risks losing federal homeland security funding if it does...

  8. Deterministic Secure Direct Communication Using Mixed state

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show an improved ping-pong protocol which is based on the protocol showed by Kim Bostrom and Timo Felbinger [Phys. Rev. Lett. 89, 187902 (2002); quant-ph/0209040]. We show that our protocol is asymptotically secure key distribution and quasisecure direct communication using a single photon resource. And this protocol can be can be carried out with great efficiency and speed using today's technology.

  9. Affairs of State: The Interagency and National Security

    National Research Council Canada - National Science Library

    Marcella, Gabriel

    2008-01-01

    The war colleges of the United States are a unique national asset. They are centers of academic excellence for preparing military and civilian officers for higher positions in the national security system...

  10. National Security Imperatives and the Neorealist State: Iran and Realpolitik

    National Research Council Canada - National Science Library

    Grogan, Michael

    2000-01-01

    .... Iran's imperative has been-and still is-focused on the pragmatic national security interests of the nation-state model vice the ideological potential for spreading its brand of Islamic revolution abroad...

  11. State of the Art: Embedding Security in Vehicles

    Directory of Open Access Journals (Sweden)

    Weimerskirch André

    2007-01-01

    Full Text Available For new automotive applications and services, information technology (IT has gained central importance. IT-related costs in car manufacturing are already high and they will increase dramatically in the future. Yet whereas safety and reliability have become a relatively well-established field, the protection of vehicular IT systems against systematic manipulation or intrusion has only recently started to emerge. Nevertheless, IT security is already the base of some vehicular applications such as immobilizers or digital tachographs. To securely enable future automotive applications and business models, IT security will be one of the central technologies for the next generation of vehicles. After a state-of-the-art overview of IT security in vehicles, we give a short introduction into cryptographic terminology and functionality. This contribution will then identify the need for automotive IT security while presenting typical attacks, resulting security objectives, and characteristic constraints within the automotive area. We will introduce core security technologies and relevant security mechanisms followed by a detailed description of critical vehicular applications, business models, and components relying on IT security. We conclude our contribution with a detailed statement about challenges and opportunities for the automotive IT community for embedding IT security in vehicles.

  12. State of the Art: Embedding Security in Vehicles

    Directory of Open Access Journals (Sweden)

    André Weimerskirch

    2007-06-01

    Full Text Available For new automotive applications and services, information technology (IT has gained central importance. IT-related costs in car manufacturing are already high and they will increase dramatically in the future. Yet whereas safety and reliability have become a relatively well-established field, the protection of vehicular IT systems against systematic manipulation or intrusion has only recently started to emerge. Nevertheless, IT security is already the base of some vehicular applications such as immobilizers or digital tachographs. To securely enable future automotive applications and business models, IT security will be one of the central technologies for the next generation of vehicles. After a state-of-the-art overview of IT security in vehicles, we give a short introduction into cryptographic terminology and functionality. This contribution will then identify the need for automotive IT security while presenting typical attacks, resulting security objectives, and characteristic constraints within the automotive area. We will introduce core security technologies and relevant security mechanisms followed by a detailed description of critical vehicular applications, business models, and components relying on IT security. We conclude our contribution with a detailed statement about challenges and opportunities for the automotive IT community for embedding IT security in vehicles.

  13. Economic foundation and importance of non-state security sector within the national security system

    Directory of Open Access Journals (Sweden)

    Anđelković Slobodan

    2016-01-01

    Full Text Available The main purpose of this paper was to present the causes (for, role (played by and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state itself that were favoring such a development. In the course of our research we established how, as the state narrowed its activities down to more vital and more dangerous fields of work, this opened up space for independent contractors to enter those fields which carried less systemic risk. Such change was made possible in the post-Cold War context, when many of the former service members were hired by private companies. The economic motive had a role to play as well, given the need for additional security going beyond what state offered to its citizens, as many doubted the ability (efficiency of state to provide it in the first place; and private sector's willingness to provide it for a price. In Serbia, position of non-state security sector is still very much limited by the traditional notion of security as well as the division of competences, both left-overs from socialist times. This goes against positive tendencies within the sector itself (improvement of types and specialization of the security as service; strengthening of legal regulation; flexibility of services being offered. By conducting its basic service and improving the security of its clients, representatives of non-state security sector are - indirectly - improving the security of society as a whole, ensuring economic stability, which presents one of key national interests.

  14. IAEA Completes Nuclear Security Review Mission in United States

    International Nuclear Information System (INIS)

    2013-01-01

    Full text: A team of nuclear security experts led by the International Atomic Energy Agency (IAEA) today completed a mission to review nuclear security practices of civil nuclear facilities licensed by the United States Nuclear Regulatory Commission (NRC). Conducted at the U.S. Government's request, the two-week International Physical Protection Advisory Service (IPPAS) mission reviewed the United States' nuclear security-related legislative and regulatory framework. As part of this work, the IPPAS team, led by John O'Dacre of Canada and comprising nine experts from eight IAEA Member States, met with NRC officials and reviewed the physical protection systems at the Center for Neutron Research (NCNR) at the National Institute of Standards and Technology. The IPPAS team concluded that nuclear security within the U.S. civil nuclear sector is robust and sustainable and has been significantly enhanced in recent years. The team identified a number of good practices in the nation's nuclear security regime and at the NCNR. The IPPAS team also made a recommendation and some suggestions for the continuing improvement of nuclear security overall. The mission in the United States was the 60th IPPAS mission organized by the IAEA. 'Independent international peer reviews such as IAEA IPPAS missions are increasingly being recognized for their value as a key component for exchanges of views and advice on nuclear security measures', said Khammar Mrabit, Director of the IAEA Office of Nuclear Security. 'The good practices identified during this mission will contribute to the continuous improvements of nuclear security in other Member States'. The IPPAS team provided a draft report to the NRC and will submit a final report soon. Because it contains security-related information about a specific nuclear site, IPPAS reports are not made public. 'The IPPAS programme gives us a chance to learn from the experience and perspective of our international partners', said NRC Chairman Allison M

  15. Quantum Secure Direct Communication with Five-Qubit Entangled State

    International Nuclear Information System (INIS)

    Lin Song; Liu Xiao-Fen; Gao Fei

    2011-01-01

    Recently, a genuine five-qubit entangled state has been achieved by Brown et al.[J. Phys. A 38 (2005) 1119]. Later it was indicated that this state can be used for quantum teleportation and quantum state sharing. Here we build a quantum secure direct communication protocol with this state, and prove that it is secure in ideal conditions. In the protocol, the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the receiver. The receiver then performs projective determinate measurement to decode the secret message directly. Furthermore, this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity. (general)

  16. Monitoring the Implementation of State Regulation of National Economic Security

    Directory of Open Access Journals (Sweden)

    Hubarieva Iryna O.

    2018-03-01

    Full Text Available The aim of the article is to improve the methodological tools for monitoring the implementation of state regulation of national economic security. The approaches to defining the essence of the concept of “national economic security” are generalized. Assessment of the level of national economic security is a key element in monitoring the implementation of state regulation in this area. Recommendations for improving the methodology for assessing national economic security, the calculation algorithm of which includes four interrelated components (economic, political, social, spiritual one, suggests using analysis methods (correlation and cluster analysis, and taxonomy, which allows to determine the level and disproportion of development, can serve as a basis for monitoring the implementation of state regulation of national economic security. Such an approach to assessing national economic security makes it possible to determine the place (rank that a country occupies in a totality of countries, the dynamics of changing ranks over a certain period of time, to identify problem components, and monitor the effectiveness of state regulation of the national economic security. It the course of the research it was determined that the economic sphere is the main problem component of ensuring the security of Ukraine’s economy. The analysis made it possible to identify the most problematic partial indicators in the economic sphere of Ukraine: economic globalization, uneven economic development, level of infrastructure, level of financial market development, level of economic instability, macroeconomic stability. These indicators have a stable negative dynamics and a downward trend, which requires an immediate intervention of state bodies to ensure the national economic security.

  17. Examination of State-Level Nuclear Security Evaluation Methods

    International Nuclear Information System (INIS)

    Kim, Chan Kim; Yim, Man-Sung

    2015-01-01

    An effective global system for nuclear materials security needs to cover all materials, employing international standards and best practices, to reduce risks by reducing weapons-usable nuclear material stocks and the number of locations where they are found. Such a system must also encourage states to accept peer reviews by outside experts in order to demonstrate that effective security is in place. It is thus critically important to perform state-level evaluation of nuclear security based on an integrative framework of risk assessment. Such evaluation provides a basis of measuring the level and progress of international effort to secure and control all nuclear materials. sensitivity test by differentiating weight factors of each of the indicators and categories will be performed in the future as well

  18. Controlled and secure direct communication using GHZ state and teleportation

    International Nuclear Information System (INIS)

    Gao, T.

    2004-01-01

    A theoretical scheme for controlled and secure direct communication is proposed. The communication is based on GHZ state and controlled quantum teleportation. After insuring the security of the quantum channel (a set of qubits in the GHZ state), alice encodes the secret message directly on a sequence of particle states in the GHZ state and transmits them to Bob, supervised by Charlie using controlled quantum teleportation. Bob can read out the encoded messages directly by the measurement on his qubits. In this scheme, the controlled quantum teleportation transmits alice's message without revealing any information to a potential eavesdropper. Because there is not a transmission of the qubit carrying the secret messages between Alice and Bob in the public channel, it is completely secure for controlled and direct secret communication if a perfect quantum channel is used. The feature of this scheme is that the communication between two sides depends on the agreement of a third side. (orig.)

  19. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  20. Political thuggery and security in Benue State: Counselling ...

    African Journals Online (AJOL)

    The paper has outlined the major causes and effects of political thuggery on the security and safety of Benue State. Since Government has seemingly become incapacitated in her bid to address the political situation in the state, this paper has recommended several counselling interventions which include political education ...

  1. Leveraging State And Local Law Enforcement Maritime Homeland Security Practices

    Science.gov (United States)

    2016-03-01

    recreation, national defense, and tourism . To understand the maritime homeland security efforts put into place after 9/11 better, a study of the practices...fire service venturing beyond its fire suppression or emergency medical services role and asserted the value of having firefighters better integrated...national defense, and tourism , so too must be the approach to maritime homeland security. This research examined only the role of state and local law

  2. United States Energy Policy: Security Not Independence

    Science.gov (United States)

    2013-03-01

    on leased land, ensuring fracking is done responsibly, and getting more natural gas and hybrid systems into U.S. mass transit. Internationally, the...fewer environ disturbances -Can store underground -Environ impacts of fracking unknown -uses large amount of water -potential for saline...from shale continues to rise as the United States determines how to drill safely. However, the impact of fracking on the environment is still

  3. Preliminary field evaluation of solid state cameras for security applications

    International Nuclear Information System (INIS)

    1987-01-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. In general, all-solid-state cameras need to be improved in four areas before they can be used as wholesale replacements for tube cameras in exterior security applications: resolution, sensitivity, contrast, and smear. However, with careful design some of the higher performance cameras can be used for perimeter security systems, and all of the cameras have applications where they are uniquely qualified. Many of the cameras are well suited for interior assessment and surveillance uses, and several of the cameras are well designed as robotics and machine vision devices

  4. Social Security Number Protection Laws: State-by-State Summary Table

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…

  5. Preliminary field evaluation of solid state cameras for security applications

    International Nuclear Information System (INIS)

    Murray, D.W.

    1987-01-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. The results of these tests as well as a description of the test equipment, test sites, and procedures are presented in this report

  6. State Control over Private Military and Security Companies in Armed ...

    African Journals Online (AJOL)

    NWUuser

    State Control over Private Military and Security Companies in Armed Conflict by H Tonkin ... (US) in the Iraqi theatre by 2007 exceeded the number of US troops, and in 2010 .... due diligence to promote PMSC compliance therewith. ... relying on existing accountability frameworks of international law, new domestic and.

  7. Deterministic secure communications using two-mode squeezed states

    International Nuclear Information System (INIS)

    Marino, Alberto M.; Stroud, C. R. Jr.

    2006-01-01

    We propose a scheme for quantum cryptography that uses the squeezing phase of a two-mode squeezed state to transmit information securely between two parties. The basic principle behind this scheme is the fact that each mode of the squeezed field by itself does not contain any information regarding the squeezing phase. The squeezing phase can only be obtained through a joint measurement of the two modes. This, combined with the fact that it is possible to perform remote squeezing measurements, makes it possible to implement a secure quantum communication scheme in which a deterministic signal can be transmitted directly between two parties while the encryption is done automatically by the quantum correlations present in the two-mode squeezed state

  8. Chaotic Secure Communication Systems with an Adaptive State Observer

    Directory of Open Access Journals (Sweden)

    Wei-Der Chang

    2015-01-01

    Full Text Available This paper develops a new digital communication scheme based on using a unified chaotic system and an adaptive state observer. The proposed communication system basically consists of five important elements: signal modulation, chaotic encryption, adaptive state observer, chaotic decryption, and signal demodulation. A sequence of digital signals will be delivered from the transmitter to the receiver through a public channel. It is rather reasonable that if the number of signals delivered on the public channel is fewer, then the security of such communication system is more guaranteed. Therefore, in order to achieve this purpose, a state observer will be designed and its function is to estimate full system states only by using the system output signals. In this way, the signals delivered on the public channel can be reduced mostly. According to these estimated state signals, the original digital sequences are then retrieved completely. Finally, experiment results are provided to verify the applicability of the proposed communication system.

  9. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Science.gov (United States)

    2010-07-01

    ... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities of the United States. The existing distinctive papers shall be used for the printing of interest...

  10. Steady state security assessment in deregulated power systems

    Science.gov (United States)

    Manjure, Durgesh Padmakar

    Power system operations are undergoing changes, brought about primarily due to deregulation and subsequent restructuring of the power industry. The primary intention of the introduction of deregulation in power systems was to bring about competition and improved customer focus. The underlying motive was increased economic benefit. Present day power system analysis is much different than what it was earlier, essentially due to the transformation of the power industry from being cost-based to one that is price-based and due to open access of transmission networks to the various market participants. Power is now treated as a commodity and is traded in an open market. The resultant interdependence of the technical criteria and the economic considerations has only accentuated the need for accurate analysis in power systems. The main impetus in security analysis studies is on efficient assessment of the post-contingency status of the system, accuracy being of secondary consideration. In most cases, given the time frame involved, it is not feasible to run a complete AC load flow for determining the post-contingency state of the system. Quite often, it is not warranted as well, as an indication of the state of the system is desired rather than the exact quantification of the various state variables. With the inception of deregulation, transmission networks are subjected to a host of multilateral transactions, which would influence physical system quantities like real power flows, security margins and voltage levels. For efficient asset utilization and maximization of the revenue, more often than not, transmission networks are operated under stressed conditions, close to security limits. Therefore, a quantitative assessment of the extent to which each transaction adversely affects the transmission network is required. This needs to be done accurately as the feasibility of the power transactions and subsequent decisions (execution, curtailment, pricing) would depend upon the

  11. Improved security detection strategy in quantum secure direct communication protocol based on four-particle Green-Horne-Zeilinger state

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Nie, Jin-Rui; Li, Rui-Fan [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Jing, Bo [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Beijing Institute of Applied Meteorology, Beijing (China). Dept. of Computer Science

    2012-06-15

    To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others. (orig.)

  12. Information Security Management: The Study of Lithuanian State Institutions

    OpenAIRE

    Jastiuginas, Saulius

    2012-01-01

    Growing information security cases and scope illustrate that the relevance of information security issues becomes critical and present information security means are not sufficient enough to manage information security. Narrow comprehension of information security merely as technological problem is broadened by the research results of economic, managerial, psychological, legal and other related aspects’ influence to information security. Information is named as the object of information s...

  13. Securing quantum key distribution systems using fewer states

    Science.gov (United States)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  14. Supplemental Security Income (SSI) Recipients in each State by Sex and Age, December 2010

    Data.gov (United States)

    Social Security Administration — The Supplemental Security Income (SSI) Recipients in each State by Sex and Age (December 2010) is produced using the data found in Table 10 from the SSI Report of...

  15. Energy access and security strategies in Small Island Developing States

    International Nuclear Information System (INIS)

    Wolf, Franziska; Surroop, Dinesh; Singh, Anirudh; Leal, Walter

    2016-01-01

    Small Islands Developing States (SIDS) are isolated and surrounded by ocean. The generation and use of energy resources are two very important aspects for the development of SIDS. Unfortunately, most of SIDS do not use their potential in respect of energy resources, and they as a result have to depend on the import of fossil fuels in order to meet their energy needs. This increases the overall vulnerability of SIDS as they have to depend on the rising or fluctuating fossil fuels prices. Some SIDS, especially in the geographically dispersed Pacific region, do not have proper access to energy whereas other SIDS struggle more with energy security issue. At the same time, SIDS are most vulnerable to the impacts and effects of climate change, as they are among the ones to be most severely affected in case of natural calamities and sea-level rise. Drawing on experiences from Fiji and Mauritius, this paper explains core elements related to energy access and security in SIDS, contextualizes and discusses barriers and list some of the strategies that may be used to ensure access to and a continuous supply of energy in SIDS. A situational analysis of two SIDS outlines their current energy situation and compares their energy policies to globally accepted criteria for SIDS policies as well as with each other. It is claimed that the diverging energy performances of Fiji and Mauritius cannot be explained by policies differences. The reasons for the varying energy performances may therefore lie in the administrative and institutional mechanisms used by the two countries in implementing their energy policies. Finally, to enable SIDS to reduce their overall vulnerability and become truly sustainable islands, it is recommended to undertake careful assessments of the particular local contexts under which island energy regimes operate. - Highlights: • Core elements related to energy access/security in SIDS, barriers and strategies. • Situational analysis of two SIDS: Fiji and

  16. STATE REGULATION OF CARGO SECURING FOR ROAD TRANSPORT

    Directory of Open Access Journals (Sweden)

    Nikolay Anatolievich Atrokhov

    2015-09-01

    Full Text Available This article examines the legal documents governing the securing of cargo in road transport, provides an overview of international experience in the safety of road transport of goods by means of securing.

  17. Cloud CRM: State-of-the-Art and Security Challenges

    OpenAIRE

    Amin Shaqrah

    2016-01-01

    Security undoubtedly play the main role of cloud CRM deployment, since the agile firms utilized cloud services in the providers infrastructures to perform acute CRM operations. In this paper researcher emphasis on the cloud CRM themes, security threads the most concern. Some aspects of security discussed concern on deployment the cloud CRM like: Access customers’ database and control; secure data transfer over the cloud; trust among the enterprise and cloud service provider; confidentiality, ...

  18. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    ... with state and local stakeholders. Federal state and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes...

  19. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  20. Software Security Assurance: A State-of-Art Report (SAR)

    Science.gov (United States)

    2007-07-31

    analysis of security management processes: includes organizational assessment, asset valuation , threat identification, vulnerability assessment...Available from: http://www.cigital.com/papers/download/bsi2-misuse.pdf 200 Meledath Damodaran , “Secure Software Development Using Use Cases and Misuse

  1. Engaging Non-State Security Providers: Whither the Rule of Law?

    Directory of Open Access Journals (Sweden)

    Timothy Donais

    2017-07-01

    Full Text Available The primacy of the rule of law has long been seen as one of the essential principles of security sector reform (SSR programming, and part of the larger gospel of SSR is that the accountability of security providers is best guaranteed by embedding security governance within a rule of law framework. Acknowledging the reality of non-state security provision, however, presents a challenge to thinking about SSR as merely the extension of the rule of law into the security realm, in large part because whatever legitimacy non-state security providers possess tends to be grounded in 'extralegal' foundations. This paper – more conceptual than empirical in its approach – considers the implications of hybrid forms of security governance for thinking about the relationship between SSR and rule of law promotion, and argues that the rule of law still provides a useful source of strategic direction for SSR programming.

  2. Risks and threats of tax state security and methods of their neutralization

    Directory of Open Access Journals (Sweden)

    Y.V. Lebedzevych

    2016-12-01

    Full Text Available The article substantiates the relevance of the study to ensure security of the state tax. Scientists studied different approaches to defining the essence of the concept of "security tax" on the key features that would satisfy the interests of all subjects of tax relations and the necessity of legal consolidation of this concept. Analyzed the economic, social and legal nature of the existence of the security tax, identified key indicators of fiscal security of Ukraine. To determine the effectiveness of the tax administration in the interests of the tax security highlights the main threats, tax security risks caused by external and internal factors, and propose measures for their elimination and prevent the possibility of their occurrence. The stages of tax risk management with effective building security tax, designed structurally-logic of the tax risk management security.

  3. 'The Maggot Within': The state security apparatus in Ngũgĩ's Wizard ...

    African Journals Online (AJOL)

    'The Maggot Within': The state security apparatus in Ngũgĩ's Wizard of the Crow. ... the state security apparatus in Wizard of the Crow promote shady business deals and as well systematize corruption. ... AJOL African Journals Online. HOW TO ...

  4. 12 CFR 9.14 - Deposit of securities with state authorities.

    Science.gov (United States)

    2010-01-01

    ... than assets (e.g., a requirement to deposit a fixed amount or an amount equal to a percentage of... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Deposit of securities with state authorities. 9... ACTIVITIES OF NATIONAL BANKS Regulations § 9.14 Deposit of securities with state authorities. (a) In general...

  5. The Current State of the International Security System

    OpenAIRE

    Ивашов, Леонид Григорьевич

    2013-01-01

    The author examines the modern geopolitical world and assesses the threats to Russia’s security. These threats are demonstrated to be hitched to the goals of the US National Strategy and, in particular, to the US plans on deployment of anti-ballistic missile system. The author argues that in this situation the mainstay of Russia’s foreign policy should become “security through cooperation.”Key words: international security, anti-ballistic missile, preemptive war, geopolitical centers, UN Secu...

  6. The welfare state, pensions, privatization: the case of Social Security in the United States.

    Science.gov (United States)

    Du Boff, R B

    1997-01-01

    In all high-income nations, the welfare state is under challenge, with particular concern voiced about the burden of retirement pensions on the public fisc and on younger workers. The strongest drive against social insurance is taking place in the United States, which has less of it than other nations and appears to be in the best position to meet future entitlement claims. In this article, the author examines the liabilities that the U.S. Social Security system is likely to incur over the next 35 years and finds that there is little danger that the system will fall into insolvency. Privatizing Social Security is not necessary to assure the integrity of future pension benefits. Furthermore, the cost-benefit ratio of privatization appears to be unfavorable, as borne out by the mandatory private pension plan in effect in Chile. Some wealthy nations will face greater demographic strains than the United States, but all need to retain the welfare state as a foundation for future changes in the world of work.

  7. Secure Broadcasting with Imperfect Channel State Information at the Transmitter

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Khisti, Ashish; Alouini, Mohamed-Slim

    2015-01-01

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper’s CSI and not of its channel’s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1−) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  8. Secure Broadcasting with Imperfect Channel State Information at the Transmitter

    KAUST Repository

    Hyadi, Amal

    2015-11-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper’s CSI and not of its channel’s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1−) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  9. Post-Apartheid South Africa and United States National Security

    National Research Council Canada - National Science Library

    Cochran, Edwin

    1998-01-01

    .... It is based on the realist premise that the U.S. has limited national interests in Sub-Saharan Africa which would be best served by a regional security strategy explicitly predicated on engagement with South Africa...

  10. Securing the United States' power infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Happenny, Sean F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  11. Security improvement by using a modified coherent state for quantum cryptography

    International Nuclear Information System (INIS)

    Lu, Y.J.; Zhu, Luobei; Ou, Z.Y.

    2005-01-01

    Weak coherent states as a photon source for quantum cryptography have a limit in secure data rate and transmission distance because of the presence of multiphoton events and loss in transmission line. Two-photon events in a coherent state can be taken out by a two-photon interference scheme. We investigate the security issue of utilizing this modified coherent state in quantum cryptography. A 4-dB improvement in the secure data rate or a nearly twofold increase in transmission distance over the coherent state are found. With a recently proposed and improved encoding strategy, further improvement is possible

  12. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2011-05-15

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  13. Visa Security Policy: Roles of the Departments of State and Homeland Security

    Science.gov (United States)

    2011-06-30

    Cong., 2nd sess., April 20, 1950. 13 8 U.S.C. 1104 . 14 8 U.S.C. 1201. AILA InfoNet Doc. No. 11071267. (Posted 07/12/11) Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS automated

  14. Assessment of Political Vulnerabilities on Security of Energy Supply in the Baltic States

    Directory of Open Access Journals (Sweden)

    Česnakas Giedrius

    2016-06-01

    Full Text Available The article argues that despite the evident link between political environment and security of energy supply, political elements are not sufficiently represented in contemporary scientific literature, namely in indexes that are designed for the assessment of security of energy supply. In an attempt to fill this gap, the article presents an innovative methodology for quantitative assessment of the political vulnerabilities on security of energy supply and applies it to the analysis of the Baltic States.

  15. Fragile States, Infectious Disease and Health Security: The Case for Timor-Leste

    Directory of Open Access Journals (Sweden)

    John M. Quinn

    2014-01-01

    Full Text Available Timor-Leste is a very young and developing nation state. Endemic infectious disease and weakened health security coupled with its growing and inclusive public institutions keep Timor-Leste fragile and in transition on the spectrum of state stability. The objective here is to systematically review Timor-Leste's state and public health successes, showing how a fragile state can consistently improve its status on the continuum of stability and improve health security for the population. The case study follows a state case study approach, together with a disease burden review and a basic description of the health portrait in relation to Timor-Leste's fragile state status. Disease burden and health security are directly proportional to state stability and indirectly proportional to state failure. Timor-Leste is a clear example of how public health can feed into increased state stability. Our discussion attempts to describe how the weak and fragile island nation of Timor-Leste can continue on its current path of transition to state stability by increasing health security for its citizens. We surmise that this can be realized when public policy focuses on primary healthcare access, inclusive state institutions, basic hygiene and preventative vaccination programs. Based on our review, the core findings indicate that by increasing health security, a positive feedback loop of state stability follows. The use of Timor-Leste as a case study better describes the connection between public health and health security; and state stability, development and inclusive state institutions that promote health security.

  16. A Hybrid Analysis for Security Protocols with State

    Science.gov (United States)

    2014-07-16

    http://www.mitre.org/publications/ technical-papers/completeness-of-cpsa. [19] Simon Meier, Cas Cremers , and David Basin. Efficient construction of...7] Cas Cremers and Sjouke Mauw. Operational semantics and verification of security protocols. Springer, 2012. [8] Anupam Datta, Ante Derek, John C

  17. Analyzing State Security Risks in South China Sea Conflict

    Directory of Open Access Journals (Sweden)

    Дмитрий Владимирович Пивоваров

    2009-09-01

    Full Text Available The article is devoted to the regional security issues in South East Asia. The author analyses the international relations that go closely to the foreign policy and foreign policy strategy problems. The author proposes risk analysis as a new and promising method in political science to generate foreign policy plans and analyze international conflicts and problems.

  18. State surveillance as a threat to personal security of individuals

    Directory of Open Access Journals (Sweden)

    Sławomir Czapnik

    2015-12-01

    Full Text Available Changes in modern society are crucial to individuals. Article starts with analysis of control in nowadays societies. Then author tries to understand useful categories, as "Panopticon", "ban-opticon" and "synopticon". Last part is focused on stete surveillance, i.e. surveillance by American National Security Agency.

  19. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-05-03

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  20. 75 FR 9238 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Science.gov (United States)

    2010-03-01

    ... 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011 Immigration and Enforcement Operational Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice... the Department of Homeland Security U.S. Immigration and Customs Enforcement is updating an existing...

  1. How to Fund Homeland Security without Federal Dollars: State and Local Funding of Homeland Security Initiatives in Light of Decreased Support by the Federal Government

    National Research Council Canada - National Science Library

    Emler, Jay S

    2008-01-01

    .... This thesis, therefore, examined alternatives states and local units of government might use to fund homeland security initiatives, ranging from conventional alternatives such as, asset forfeiture...

  2. State-Building and Democracy: Prosperity Representation and Security in Kosovo

    OpenAIRE

    Silander, Daniel; Janzekovitz, John

    2012-01-01

    The traditional assumption of the state sovereignty norm has been that an international society of states will structure the international order to safeguard the interests of the state. The end of the Cold War era transformed international relations and led to a discussion on how states interacted with their populations. From the early 1990s, research on international relations, war and peace, and security studies identified the growing problem of failing states. Such states ar...

  3. 76 FR 28795 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary...

    Science.gov (United States)

    2011-05-18

    ... 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary Database System of... Security/United States Coast Guard-024 Auxiliary Database (AUXDATA) System of Records.'' This system of...: United States Coast Guard Auxiliary Database (AUXDATA). Security classification: Unclassified. System...

  4. Measuring energy security. Can the United States achieve oil independence?

    International Nuclear Information System (INIS)

    Greene, David L.

    2010-01-01

    Stochastic simulation of the direct economic costs of oil dependence in an uncertain future is proposed as a useful metric of oil dependence. The market failure from which these costs arise is imperfect competition in the world oil market, chiefly as a consequence of the use of market power by the Organization of the Petroleum Exporting Countries (OPEC) cartel. Oil dependence costs can be substantial. It is estimated that oil dependence costs to the US economy in 2008 will exceed $500 billion. Other costs, such as military expenditures or foreign policy constraints are deemed to be largely derivative of the actual or potential economic costs of oil dependence. The use of quantifiable economic costs as a security metric leads to a measurable definition of oil independence, or oil security, which can be used to test the ability of specific policies to achieve oil independence in an uncertain future. (author)

  5. Assessment of the Technological Changes Impact on the Sustainability of State Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Olexandr Yemelyanov

    2018-04-01

    Full Text Available Currently, the governments of many countries are facing with a lack of funds for financing programs for social protection of population. Among the causes of this problem, we can indicate the high unemployment rate, which, among other things, is due to implementation of labor-saving technologies. The purpose of this work is to study the impact of technological changes on the sustainability of the state social security system in Ukraine. The general approaches to the assessment of the stability of the state social security system are described. The simulation of the effect of economically efficient technological changes on the company’s income and expenses was carried out. Some patterns of such changes are established. The group of productive technological changes types is presented. The model is developed, and an indicator of the impact estimation of efficiently effective technological changes on the stability of the state social security system is proposed. The analysis of the main indicators of the state social security system functioning of Ukraine is carried out. The dynamics of indicators characterizing the labor market of Ukraine is analyzed. The influence of changes in labor productivity on costs and profits by industries of Ukraine is estimated. The evaluation of the impact of economically efficient technological changes in the industries of Ukraine on the stability of its state social security system is carried out. The different state authorities can use the obtained results for developing measures to manage the sustainability of the state social security system.

  6. United States and Israeli Homeland Security: A Comparative Analysis of Emergency Preparedness Efforts

    National Research Council Canada - National Science Library

    Pockett, Consuella B

    2005-01-01

    This paper will provide a comparative analysis of the United States (U.S.) Department of Homeland Security's Emergency Preparedness and Response directorate and the Israel Defense Forces Home Front Command...

  7. An Assessment of the United States National Security Strategy for Combating Terrorism

    National Research Council Canada - National Science Library

    Chambliss, John

    2004-01-01

    .... While terrorism may be simply viewed as a crime against humanity the United States must pursue a comprehensive policy and strategy to deal with such acts anywhere and anytime because they threaten its national security...

  8. State and Urban Area Homeland Security Plans and Exercises: Issues for the 110th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2007-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans and the conduct of exercises to test the plans...

  9. State and Urban Area Homeland Security Plans and Exercises: Issues for the 109th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2006-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans, and the conduct of exercises to test the plans...

  10. Weak and Failing States: Evolving Security Threats and U.S. Policy

    National Research Council Canada - National Science Library

    Wyler, Liana S

    2008-01-01

    .... national security goal since the end of the Cold War. Numerous U.S. government documents point to several threats emanating from states that are variously described as weak, fragile, vulnerable, failing, precarious, failed, in crisis, or collapsed...

  11. Quantum secure direct communication scheme using a W state and teleportation

    International Nuclear Information System (INIS)

    Cao Haijing; Song Heshan

    2006-01-01

    A theoretical scheme for quantum secure direct communication (QSDC) is proposed, where a three-qubit symmetric W state functions as a quantum channel. Two legitimate communicators can transmit their secret information by using quantum teleportation and local measurements

  12. Book Review: Anja Jetschke: Human Rights and State Security: Indonesia and the Philippines

    Directory of Open Access Journals (Sweden)

    Salvador Santino F. Regilme, Jr.

    2013-01-01

    Full Text Available Book Review of the Monograph: Jetschke, Anja (2010, Human Rights and State Security: Indonesia and the Philippines ; Philadelphia: University of Pennsylvania Press, ISBN: 978-0-8122-4301-7, 368 pages

  13. A Protocol for Bidirectional Quantum Secure Communication Based on Genuine Four-Particle Entangled States

    International Nuclear Information System (INIS)

    Gao Gan; Wang Liping

    2010-01-01

    By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the 'two-step' transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. (general)

  14. Security bound of continuous-variable quantum key distribution with noisy coherent states and channel

    International Nuclear Information System (INIS)

    Shen Yong; Yang Jian; Guo Hong

    2009-01-01

    Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analysed. Assuming that the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare-and-measurement scheme (P and M) and entanglement-based scheme (E-B) are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and, further, a lower bound to the secure key rate is derived.

  15. An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication

    International Nuclear Information System (INIS)

    Wen-Jie, Liu; Han-Wu, Chen; Zhi-Qiang, Li; Zhi-Hao, Liu; Wen-Bo, Hu; Ting-Huai, Ma

    2009-01-01

    A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer. (general)

  16. Security bound of continuous-variable quantum key distribution with noisy coherent states and channel

    Energy Technology Data Exchange (ETDEWEB)

    Shen Yong; Yang Jian; Guo Hong, E-mail: hongguo@pku.edu.c [CREAM Group, State Key Laboratory of Advanced Optical Communication Systems and Networks (Peking University) and Institute of Quantum Electronics, School of Electronics Engineering and Computer Science, Peking University, Beijing 100871 (China)

    2009-12-14

    Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analysed. Assuming that the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare-and-measurement scheme (P and M) and entanglement-based scheme (E-B) are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and, further, a lower bound to the secure key rate is derived.

  17. Industrial Espionage in Denmark: Collaborative Security in a Corporatist State

    DEFF Research Database (Denmark)

    Afsah, Ebrahim

    the manner Danish state and society deal with regulatory questions, including the penal protection against industrial espionage. Unlike many other nations, Danes view their state as a friend and, consequently, accept and cooperate with a kind of intrusive state action that elsewhere would be viewed...

  18. The management of the state reserving system in the aspect of the regional economic security supporting

    Directory of Open Access Journals (Sweden)

    Aleksandr Yefimovich Zemskov

    2011-06-01

    Full Text Available This paper reviews the role of the state material reserve system to ensure economic security of the region. A classification of reserves ensuring economic security of the region was elaborated. A scheme of systematic and structural representation of the state material reserve in order to improve the economic security of the region was suggested. Optimization of operational control of the territorial offices, factories, and settlements of custody within the framework of the state material reserve is one of the most effective instruments to enhance the functioning of the whole system. To solve the problem of technological processes optimization of products acquisition and storage in manufacturings, plants and points of consignment storage of the state material reserve, a static economic-mathematical model was developed. The results can be used to develop appropriate computer systems for support of effective management decisions in the system of state of material reserve.

  19. Maternal Mental State Language and Preschool Children's Attachment Security: Relation to Children's Mental State Language and Expressions of Emotional Understanding

    Science.gov (United States)

    Mcquaid, Nancy; Bigelow, Ann E.; McLaughlin, Jessica; MacLean, Kim

    2008-01-01

    Mothers' mental state language in conversation with their preschool children, and children's preschool attachment security were examined for their effects on children's mental state language and expressions of emotional understanding in their conversation. Children discussed an emotionally salient event with their mothers and then relayed the…

  20. Increasing the resilience and security of the United States' power infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Happenny, Sean F. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-08-01

    The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-world conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.

  1. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  2. Examination of the Current Approaches to State-Level Nuclear Security Evaluation

    International Nuclear Information System (INIS)

    Kim, Chan; Yim, Mansung; Kim, So Young

    2014-01-01

    An effective global nuclear materials security system will cover all materials, employ international standards and best practices, and reduce risks by reducing weapons-usable nuclear material stocks and the number of locations where they are found. Such a system must also encourage states to accept peer reviews by outside experts in order to demonstrate that effective security is in place. It is thus critically important to create an integrative framework of state-level evaluation of nuclear security as a basis for measuring the level and progress of international effort to secure and control all nuclear materials. There have been studies to represent state-level nuclear security with a quantitative metric. A prime example is the Nuclear Materials Security Index (NMSI) by the Nuclear Threat Initiative (NTI). Another comprehensive study is the State Level Risk Metric by Texas A and M University (TAMU). This paper examines the current methods with respect to their strengths and weaknesses and identifies the directions for future research to improve upon the existing approaches

  3. Building a new storyline for Florida's domestic security to provide future resiliency for the state

    OpenAIRE

    Pape, Dominick D.

    2008-01-01

    CHDS State/Local Quickly after the 9/11 event, the state of Florida drafted one of the Nation's first comprehensive counterterrorism strategies to aid in the protection of the state's visitors and citizens. This strategy was drafted early in the new paradigm of Homeland Security. The strategy had several modifications over the years but has not had a comprehensive review since its inception. Many things have changed in the arena of Homeland Security since that first step after the 9/11 ...

  4. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    Science.gov (United States)

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  5. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Ying; Shi, Ronghua [School of Information Science and Engineering, Central South University, Changsha 410083 (China); Zeng, Guihua [Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030 (China)], E-mail: sdguoying@gmail.com, E-mail: rhshi@mail.edu.com, E-mail: ghzeng@sjtu.edu.cn

    2010-04-15

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  6. ErasuCrypto: A Light-weight Secure Data Deletion Scheme for Solid State Drives

    Directory of Open Access Journals (Sweden)

    Liu Chen

    2017-01-01

    Full Text Available Securely deleting invalid data from secondary storage is critical to protect users’ data privacy against unauthorized accesses. However, secure deletion is very costly for solid state drives (SSDs, which unlike hard disks do not support in-place update. When applied to SSDs, both erasure-based and cryptography-based secure deletion methods inevitably incur large amount of valid data migrations and/or block erasures, which not only introduce extra latency and energy consumption, but also harm SSD lifetime.

  7. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    International Nuclear Information System (INIS)

    Guo, Ying; Shi, Ronghua; Zeng, Guihua

    2010-01-01

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  8. When social security fails to provide emotional security: single parent households and the contractual welfare state

    NARCIS (Netherlands)

    Tonkens, E.; Verplanke, L.

    2013-01-01

    The provision of services in the contractual welfare state is conditional. If one wants to receive a service, one has to comply with the demands of the provider. If one fails to do so, the organisation threatens to terminate its services, and indeed often does so. There are, however, people who

  9. Cryptanalysis of Quantum Secure Direct Communication and Authentication Scheme via Bell States

    International Nuclear Information System (INIS)

    Gao Fei; Qin Su-Juan; Guo Fen-Zhuo; Wen Qiao-Yan

    2011-01-01

    The security of the quantum secure direct communication (QSDC) and authentication protocol based on Bell states is analyzed. It is shown that an eavesdropper can invalidate the authentication function, and implement a successful man-in-the-middle attack, where he/she can obtain or even modify the transmitted secret without introducing any error. The particular attack strategy is demonstrated and an improved protocol is presented. (general)

  10. ANALYSIS OF FOOD SECURITY AMONG SMALLHOLDER FARMING HOUSEHOLDS IN ARID AREAS OF BORNO STATE, NIGERIA

    OpenAIRE

    Mohammed, , D; Bukar , U; Umar , J; Abdulsalam , B; Dahiru , B

    2016-01-01

    International audience; The study assessed food security situation among smallholder farming househ Borno State, Nigeria. Multi-stage sampling procedure was used in selecting 200 household respondents. Data were collected with the use of interview scheduled and structured questionnaires. Result revealed that 91% of the respondents were male, 59% were full time farmers and 33% of the households had farming experience of 11 household respondents were food secure. Logit result indicates that the...

  11. Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico

    Directory of Open Access Journals (Sweden)

    Richard J. Kilroy, Jr.

    2010-01-01

    Full Text Available The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11 is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border". The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very happy about the perimeter defined by Washington since 9/11. These nations have sought to define the trilateral relationship beyond just discussions of terrorism to include natural disasters and international organized crime as a component of a broader trilateral agenda. Eight years later these three nations continue to look for some convergence of security interests, although there remains a degree of tension and hesitancy towards achieving a "common security agenda" in the Western Hemisphere.This article examines the concept of "perimeter defense" within the context of the new security challenges that the United States, Mexico, and Canada face today. Questions to be addressed in the article include: Do all these nations share the same "threat" perception? Where exactly is the "perimeter?" What security arrangements have been tried in the past? What are the prospects for the future for increased security cooperation? The main focus of this article is at the sub-regional level in North America and whether a new "trilateral" strategic security relationship between the United States, Canada, and Mexico can emerge in North America.

  12. State Defense Forces and Their Role in American Homeland Security

    Science.gov (United States)

    2015-03-01

    payoff asset, yet many states do not maintain them. Judging by more than 50 years of actuarial data, states such as Arizona, Florida, Hawaii, Illinois...good enough” solution; see Horst W. J. Rittel, “Dilemmas in a General Theory of Planning.” Policy Sciences 4 (1973): 155–69. 155 “Bush to Address...disasters-solving-the-72-hour-problem#_ftn2. 68 Rittel, Horst W. J. “Dilemmas in a General Theory of Planning.” Policy Sciences 4 (1973): 155–69

  13. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    Science.gov (United States)

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-11-06

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.

  14. Boko Haram : Islamism, politics, security and the state in Nigeria

    NARCIS (Netherlands)

    Pérouse, de Montclos M.-A.

    2014-01-01

    This book is the first attempt to understand Boko Haram in a comprehensive and consistent way. It examines the early history of the sect and its transformation into a radical armed group. It analyses the causes of the uprising against the Nigerian state and evaluates the consequences of the on-going

  15. The Security Concerns of the Baltic States as NATO Allies

    Science.gov (United States)

    2013-08-01

    people with excellent professional qualifications, as well as high fluency in English. Since they are EU states, there is nothing to inhibit...port of these conflicts with the main goal of cementing and supporting the transatlantic alliance. U.S. support is shown in other aspects of Baltic

  16. National Security Strategy of the United States of America

    Science.gov (United States)

    2017-12-18

    build new partnerships based on the principle of reciprocity. Economic tools—including sanctions, anti-mon- ey- laundering and anti-corruption...parency, and help ensure that money reaches its intended destination. INCENTIVIZE REFORMS: The United States will use diplomacy and assistance to

  17. The Muslim Problematic: Muslims, State Schools and Security

    Science.gov (United States)

    Miah, Shamim

    2016-01-01

    Muslims are folk-devils that mark the ubiquitous moral panic. For some, the idea of the "Muslim problematic" signifies a long and worrying trend of creeping "Islamification" of state schools. For others, the discourse of the "Muslim problematic" reflects the ongoing racial patholigisation of Britain's minoritised…

  18. Deploying Difference: Security Threat Narratives and State Displacement from Protected Areas

    Directory of Open Access Journals (Sweden)

    Elizabeth Lunstrum

    2018-01-01

    Full Text Available State actors are increasingly treating protected areas as sites of security threats and policing resident communities as though they are the cause of this insecurity. This is translating into community eviction from protected areas that is authorised by security concerns and logics and hence not merely conservation concerns. We ground this claim by drawing upon empirical work from two borderland conservation areas: Mozambique's Limpopo National Park (LNP and Guatemala's Maya Biosphere Reserve (MBR. In both cases, we show how these security-provoked evictions are authorised by the mobilisation of interlocking axes of difference that articulate notions of territorial trespass with that of a racialised enemy. Rather than a new problem or phenomena, we show how these axes are rooted in prior histories of state actors rendering racialised subjects dangerous, Cold War histories in both cases and a longer colonial history with the LNP. We also show how standing behind these evictions is the nation-state and its practices of protected area territorialisation. From here, we illustrate how the rationale behind displacement from protected areas matters, as evictions become more difficult to contest once they are authorised by security considerations. The cases, however, differ in one key respect. While displacement from the LNP is an instance of conservation-induced displacement (CID, although one re-worked by security considerations, eviction from the MBR is motivated more centrally by security concerns yet takes advantage of protected area legislation. The study hence offers insight into a growing literature on conservation-security encounters and into different articulations of conservation, security, and displacement.

  19. Affairs of State: The Interagency and National Security

    Science.gov (United States)

    2008-12-01

    fluency in meshing all the levers and instruments of power. The authors of this compendium join in a common effort to shed light on how the...applications, but found to be in use for ballistic missiles. Representatives from the State Department might want to encourage the sale to cement ...from Murphy’s service in World War II were that “ground truth” took many forms, including language fluency and political, diplomatic, and economic

  20. Statement at NRC International Regulators Conference on Nuclear Security, 4 December 2012, Washington, United States

    International Nuclear Information System (INIS)

    Amano, Y.

    2012-01-01

    I would like to begin by thanking NRC Chairman Allison Macfarlane for hosting this first regulatory Conference on nuclear security involving regulators, law enforcement agencies and the IAEA. The United States has been a very important partner in the IAEA's nuclear security activities right from the start. It is by far the largest donor to our Nuclear Security Fund. It has actively supported our programmes and has been generous in providing funding, equipment and training to other Member States. When President Obama hosted the first Nuclear Security Summit in April 2010, he said it was important that that event should be part of a ''serious and sustained effort'' to improve nuclear security throughout the world. Since then, a growing number of governments have given high-level attention to this vitally important issue. This is very encouraging. Today, I am especially pleased to see regulators coming together to focus on this subject. I am confident that your meeting will make a valuable contribution to strengthening global nuclear security. I would like to share with you some important recent milestones in the IAEA's nuclear security work. As you know, primary responsibility for ensuring nuclear security lies with national governments. However, governments have recognized that international cooperation is vital. Terrorists and other criminals do not respect international borders and no country can respond effectively on its own to the threat which they pose. In September, our Member States - there are now 158 - reaffirmed the central role of the IAEA in e nsuring coordination of international activities in the field of nuclear security, while avoiding duplication and overlap . Our central role reflects the Agency's extensive membership, our mandate, our unique expertise and our long experience of providing technical assistance and specialist, practical guidance to countries. To put it simply, our work focuses on helping to minimize the risk of nuclear and other

  1. Legalising land rights. Local Practices, State Responses and Tenure Security in Africa, Asia and Latin America

    OpenAIRE

    Ubink, Janine M.; Hoekema, André J.; Assies, Willem J.

    2009-01-01

    Millions of people live and work on land that they do not legally own in accordance with enforceable state law. The absence of state recognition for local property rights affects people's tenure security and impedes development. Efforts to legalise extra-legal land tenure have traditionally emphasised individual titling and registration. Disappointment with such approaches have led to a search for 'a third way' in land tenure regulation that will reconcile state perspectives with local land r...

  2. The Effect of Secure Attachment State and Infant Facial Expressions on Childless Adults' Parental Motivation.

    Science.gov (United States)

    Ding, Fangyuan; Zhang, Dajun; Cheng, Gang

    2016-01-01

    This study examined the association between infant facial expressions and parental motivation as well as the interaction between attachment state and expressions. Two-hundred eighteen childless adults (M age = 19.22, 118 males, 100 females) were recruited. Participants completed the Chinese version of the State Adult Attachment Measure and the E-prime test, which comprised three components (a) liking, the specific hedonic experience in reaction to laughing, neutral, and crying infant faces; (b) representational responding, actively seeking infant faces with specific expressions; and (c) evoked responding, actively retaining images of three different infant facial expressions. While the first component refers to the "liking" of infants, the second and third components entail the "wanting" of an infant. Random intercepts multilevel models with emotion nested within participants revealed a significant interaction between secure attachment state and emotion on both liking and representational response. A hierarchical regression analysis was conducted to examine the unique contributions of secure attachment state. Findings demonstrated that, after controlling for sex, anxious, and avoidant, secure attachment state positively predicted parental motivations (liking and wanting) in the neutral and crying conditions, but not the laughing condition. These findings demonstrate the significant role of secure attachment state in parental motivation, specifically when infants display uncertain and negative emotions.

  3. The effect of secure attachment state and infant facial expressions on childless adults’ parental motivation

    Directory of Open Access Journals (Sweden)

    Fangyuan Ding

    2016-08-01

    Full Text Available This study examined the association between infant facial expressions and parental motivation as well as the interaction between attachment state and expressions. Two-hundred eighteen childless adults (Mage=19.22, 118 males, 100 females were recruited. Participants completed the Chinese version of the State Adult Attachment Measure and the E-prime test, which comprised three components a liking, the specific hedonic experience in reaction to laughing, neutral, and crying infant faces; b representational responding, actively seeking infant faces with specific expressions; and c evoked responding, actively retaining images of three different infant facial expressions. While the first component refers to the liking of infants, the second and third components entail the wanting of an infant. Random intercepts multilevel models with emotion nested within participants revealed a significant interaction between secure attachment state and emotion on both liking and representational response. A hierarchical regression analysis was conducted to examine the unique contributions of secure attachment state. Findings demonstrated that, after controlling for sex, anxious, and avoidant, secure attachment state positively predicted parental motivations (liking and wanting in the neutral and crying conditions, but not the laughing condition. These findings demonstrate the significant role of secure attachment state in parental motivation, specifically when infants display uncertain and negative emotions.

  4. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    Science.gov (United States)

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  5. ATC calculation with steady-state security constraints using Benders decomposition

    International Nuclear Information System (INIS)

    Shaaban, M.; Yan, Z.; Ni, Y.; Wu, F.; Li, W.; Liu, H.

    2003-01-01

    Available transfer capability (ATC) is an important indicator of the usable amount of transmission capacity accessible by assorted parties for commercial trading, ATC calculation is nontrivial when steady-state security constraints are included. In hie paper, Benders decomposition method is proposed to partition the AC problem with steady-state security constraints into a base case master problem and a series of subproblems relevant to various contingencies to include their impacts on ATC. The mathematical model is formulated and the two solution schemes are presented. Computer testing on the 4-bus system and IEEE 30-bus system shows the effectiveness of the proposed method and the solution schemes. (Author)

  6. An IPSO-SVM algorithm for security state prediction of mine production logistics system

    Science.gov (United States)

    Zhang, Yanliang; Lei, Junhui; Ma, Qiuli; Chen, Xin; Bi, Runfang

    2017-06-01

    A theoretical basis for the regulation of corporate security warning and resources was provided in order to reveal the laws behind the security state in mine production logistics. Considering complex mine production logistics system and the variable is difficult to acquire, a superior security status predicting model of mine production logistics system based on the improved particle swarm optimization and support vector machine (IPSO-SVM) is proposed in this paper. Firstly, through the linear adjustments of inertia weight and learning weights, the convergence speed and search accuracy are enhanced with the aim to deal with situations associated with the changeable complexity and the data acquisition difficulty. The improved particle swarm optimization (IPSO) is then introduced to resolve the problem of parameter settings in traditional support vector machines (SVM). At the same time, security status index system is built to determine the classification standards of safety status. The feasibility and effectiveness of this method is finally verified using the experimental results.

  7. Act of 4 August 1955 concerning State Security in the Nuclear Field

    International Nuclear Information System (INIS)

    1955-01-01

    This Act governing State security in the nuclear field lays down that the King may determine the security measures to be complied with concerning nuclear research, materials, methods of production used by establishments and legal or physical persons having in their possession information, documents or material obtained either directly from the Government or with its consent. The Act was supplemented by Royal Order of 14 March 1956 which amplified its provisions by laying down specific requirements regarding the classification of information and material, the security measures to be applied thereto, and to establishments involved in related research work. It also provides for the security clearance to be applied to persons who shall be authorised to obtain such information and classified material. A Royal Order of 18 October 1974 amends this Order in respect of the authorities responsible for its implementation. (NEA) [fr

  8. Security of a single-state semi-quantum key distribution protocol

    Science.gov (United States)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  9. The United States and Myanmar: From Antagonists to Security Partners?

    Directory of Open Access Journals (Sweden)

    Jürgen Haacke

    2015-01-01

    Full Text Available This article provides an overview both of the considerable makeover that relations between the United States and Myanmar have undergone since Naypyidaw ushered in a programme of wide-ranging reforms, and of the main policy areas in relation to which Washington remains keen to induce further change. The article also aims to explain why, notwithstanding the significant improvement in bilateral relations and the Obama administration’s interest in also pursuing military engagement, progress in this field has remained rather limited. Focusing on the politics of US policymaking on Burma, the article argues that while the Obama administration was able to take the initiative on recalibrating US Burma policy, congressional resistance in particular, amid wider concerns shared by non-governmental organisations, has so far constrained the administration vis-à-vis US–Myanmar military-to-military relations.

  10. The Iranian petroleum crisis and United States national security.

    Science.gov (United States)

    Stern, Roger

    2007-01-02

    The U.S. case against Iran is based on Iran's deceptions regarding nuclear weapons development. This case is buttressed by assertions that a state so petroleum-rich cannot need nuclear power to preserve exports, as Iran claims. The U.S. infers, therefore, that Iran's entire nuclear technology program must pertain to weapons development. However, some industry analysts project an Irani oil export decline [e.g., Clark JR (2005) Oil Gas J 103(18):34-39]. If such a decline is occurring, Iran's claim to need nuclear power could be genuine. Because Iran's government relies on monopoly proceeds from oil exports for most revenue, it could become politically vulnerable if exports decline. Here, we survey the political economy of Irani petroleum for evidence of this decline. We define Iran's export decline rate (edr) as its summed rates of depletion and domestic demand growth, which we find equals 10-12%. We estimate marginal cost per barrel for additions to Irani production capacity, from which we derive the "standstill" investment required to offset edr. We then compare the standstill investment to actual investment, which has been inadequate to offset edr. Even if a relatively optimistic schedule of future capacity addition is met, the ratio of 2011 to 2006 exports will be only 0.40-0.52. A more probable scenario is that, absent some change in Irani policy, this ratio will be 0.33-0.46 with exports declining to zero by 2014-2015. Energy subsidies, hostility to foreign investment, and inefficiencies of its state-planned economy underlie Iran's problem, which has no relation to "peak oil."

  11. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    Full Text Available Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  12. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    Science.gov (United States)

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  13. Security, Violent Events, and Anticipated Surge Capabilities of Emergency Departments in Washington State

    Science.gov (United States)

    Weyand, Jonathan S.; Junck, Emily; Kang, Christopher S.; Heiner, Jason D.

    2017-01-01

    Introduction Over the past 15 years, violent threats and acts against hospital patients, staff, and providers have increased and escalated. The leading area for violence is the emergency department (ED) given its 24/7 operations, role in patient care, admissions gateway, and center for influxes during acute surge events. This investigation had three objectives: to assess the current security of Washington State EDs; to estimate the prevalence of and response to threats and violence in Washington State EDs; and to appraise the Washington State ED security capability to respond to acute influxes of patients, bystanders, and media during acute surge events. Methods A voluntary, blinded, 28-question Web-based survey developed by emergency physicians was electronically delivered to all 87 Washington State ED directors in January 2013. We evaluated responses by descriptive statistical analyses. Results Analyses occurred after 90% (78/87) of ED directors responded. Annual censuses of the EDs ranged from violent threats or acts occurring in their ED. Of these, 93% were directed towards nursing staff, 90% towards physicians, 74% towards security personnel, and 51% towards administrative personnel. Nearly half (48%) noted incidents directed towards another patient, and 50% towards a patient’s family or friend. These events were variably reported to the hospital administration. After an acute surge event, 35% believed the initial additional security response would not be adequate, with 26% reporting no additional security would be available within 15 minutes. Conclusion Our study reveals the variability of ED security staffing and a heterogeneity of capabilities throughout Washington State. These deficiencies and vulnerabilities highlight the need for other EDs and regional emergency preparedness planners to conduct their own readiness assessments. PMID:28435498

  14. 75 FR 51619 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-08-23

    ... regulations to exempt portions of a Department of Homeland Security/United States Citizenship and Immigration system of records entitled the ``United States Citizenship and Immigration Services--009 Compliance... of 1974: Implementation of Exemptions; Department of Homeland Security/United States Citizenship and...

  15. An assessment of the cyber security legislation and its impact on the United States electrical sector

    Science.gov (United States)

    Born, Joshua

    The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.

  16. Desovereignization of national state, economy and security in terms of globalization

    Directory of Open Access Journals (Sweden)

    Rakić Mile M.

    2014-01-01

    Full Text Available In current modern age of worldwide processes of globalization and globalism a process of desovereigntization of national state and economy has become a general process. Therefore national state has been faced with numerous challenges and it has been in a permanent state of crisis. Within the process of globalization most often rich enclaves of national states make attempts to integrate themselves into neoliberal capitalist system, while poor and backward enclaves become abandoned and so national states become disintegrated. First of all it is necessary to search for causes of ethno-religious conflicts and a national separatism in the field of economy. Within the globalization environment it happened that old entities, national state, national economy and national security gained totally new meanings. By using a method of comparative analysis of document contents and consitutional and political practice alike it is possible to reach conclusion that a great number of modern national states, including the Republic of Serbia among them, have found themselves in the state of permanent crisis, and the state crisis implies, before anything else, the crisis of state sovereignty. The state gets destroyed both from inside and outside in different ways. By using a quality method it is confirmed that within a state there comes an overstepping of constitutional regulations which encompass, before else, the issues of national economy and national security, and it is achieved in particular by seizure of economic sovereignty.

  17. Semi-quantum Secure Direct Communication Scheme Based on Bell States

    Science.gov (United States)

    Xie, Chen; Li, Lvzhou; Situ, Haozhen; He, Jianhao

    2018-06-01

    Recently, the idea of semi-quantumness has been often used in designing quantum cryptographic schemes, which allows some of the participants of a quantum cryptographic scheme to remain classical. One of the reasons why this idea is popular is that it allows a quantum information processing task to be accomplished by using quantum resources as few as possible. In this paper, we extend the idea to quantum secure direct communication(QSDC) by proposing a semi-quantum secure direct communication scheme. In the scheme, the message sender, Alice, encodes each bit into a Bell state |φ+> = 1/{√2}(|00> +|11> ) or |{Ψ }+> = 1/{√ 2}(|01> +|10> ), and the message receiver, Bob, who is classical in the sense that he can either let the qubit he received reflect undisturbed, or measure the qubit in the computational basis |0>, |1> and then resend it in the state he found. Moreover, the security analysis of our scheme is also given.

  18. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    Science.gov (United States)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-03-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  19. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    Science.gov (United States)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-06-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  20. Organizational Commitment and Job Satisfaction of Security Operatives in Selected Tertiary Institutions In Kwara State

    Directory of Open Access Journals (Sweden)

    Alade Y. Saliu

    2015-11-01

    Full Text Available The prevalence of civil disorder and cultism in higher institutions of learning in Nigeria and the apparent inability of security operatives to stem the tide has continued to be a source of concern to both the Government and Individuals in recent times. This study examines the effect of organisational commitment on job satisfaction among security operatives working in Nigeria universities. In this study a sample of three hundred (300 security operatives were selected from both public and private universities in Kwara State. Data were collected through self-administered questionnaire and analysed through Descriptive, Comparative, Regression analysis and Spearman Rank Correlation. The findings revealed that these security operatives, a positive relationship exists between organisational commitment and job satisfaction with affective commitment having little or no significant relationship and continuance commitment having significant positive relationship. The study also found that the level of affective commitment was significantly lower than the other components. The study thus concludes that there is a significant positive relationship between organisation commitment and job satisfaction amongst the security operatives. Based on the findings, it was recommended that the selected Universities should focus on improving affective and normative commitment among security operatives in order to be able to deal with the problem of high job turnover and poor performance.

  1. Taking the road less taken: reorienting the state for periurban water security

    NARCIS (Netherlands)

    Narain, Vishal; Ranjan, Pranay; Vij, S.; Dewan, Aman

    2017-01-01

    This paper describes the intervention strategy to improve water security in Sultanpur, a village in periurban Gurgaon, India. Most approaches to improving natural resource management in periurban contexts focus on mobilising the community; little attention is paid to reorienting the state or

  2. Failing States as Epidemiologic Risk Zones: Implications for Global Health Security.

    Science.gov (United States)

    Hirschfeld, Katherine

    Failed states commonly experience health and mortality crises that include outbreaks of infectious disease, violent conflict, reductions in life expectancy, and increased infant and maternal mortality. This article draws from recent research in political science, security studies, and international relations to explore how the process of state failure generates health declines and outbreaks of infectious disease. The key innovation of this model is a revised definition of "the state" as a geographically dynamic rather than static political space. This makes it easier to understand how phases of territorial contraction, collapse, and regeneration interrupt public health programs, destabilize the natural environment, reduce human security, and increase risks of epidemic infectious disease and other humanitarian crises. Better understanding of these dynamics will help international health agencies predict and prepare for future health and mortality crises created by failing states.

  3. Security proof of continuous-variable quantum key distribution using three coherent states

    Science.gov (United States)

    Brádler, Kamil; Weedbrook, Christian

    2018-02-01

    We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss.

  4. Presidential elections in the United States: implications for international and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-10-01

    In conclusion it should be noted that the full implementation of D. Trump’s plans for international and European security will depend on how the declared initiatives will correspond to his real actions. Perhaps this would require more than a year, but now the world and the European community must be ready for serious structural and geopolitical changes. The presence of a number of acute problems makes the role of the United States in the process of ensuring international and European security hardly predictable.

  5. Deterministic secure direct communication using GHZ states and swapping quantum entanglement

    International Nuclear Information System (INIS)

    Gao, T; Yan, F L; Wang, Z X

    2005-01-01

    We present a deterministic secure direct communication scheme via entanglement swapping, where a set of ordered maximally entangled three-particle states (GHZ states), initially shared by three spatially separated parties, Alice, Bob and Charlie, functions as a quantum information channel. After ensuring the safety of the quantum channel, Alice and Bob apply a series of local operations on their respective particles according to the tripartite stipulation and the secret message they both want to send to Charlie. By three of Alice, Bob and Charlie's Bell measurement results, Charlie is able to infer the secret messages directly. The secret messages are faithfully transmitted from Alice and Bob to Charlie via initially shared pairs of GHZ states without revealing any information to a potential eavesdropper. Since there is no transmission of the qubits carrying the secret message between any two of them in the public channel, it is completely secure for direct secret communication if a perfect quantum channel is used

  6. Synchronization of the chaotic secure communication system with output state delay

    International Nuclear Information System (INIS)

    Changchien, S.-K.; Huang, C.-K.; Nien, H.-H.; Shieh, H.-W.

    2009-01-01

    In this paper, we utilize a proper Lyapunov function and Lyapunov theorem, combined with LMIs method, in order to design a controller L, which ensures the synchronization between the transmission and the reception ends of the chaotic secure communication system with time-delay of output state. Meanwhile, for the purpose of increasing communication security, we encrypt and decrypt the original to-be-transmitted message with the techniques of n-shift cipher and public key. The result of simulation shows that the proposed method is able to synchronize the transmission and the reception ends of the system, and moreover, to recover the original message at the reception end. Therefore, the method proposed in this paper is effective and feasible to apply in the chaotic secure communication system.

  7. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security/United States Secret Service--003 Non-Criminal Investigation... Security/United States Secret Service--003 Non-Criminal Investigation Information System.'' As a result of... Secret Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223. For privacy issues please...

  8. State regulation as a tool for improving the economic security of the regions

    Directory of Open Access Journals (Sweden)

    Yu. M. Sokolinskaya

    2017-01-01

    Full Text Available Providing economic security for the development of regions, increasing their competitiveness, risk-free and sustainable activities are the main tasks of the regional program of social and economic development, which occupies a special place in the system of instruments for public management of these processes. The program of social and economic development is a unique strategy of the region aimed at security and optimization of the spatial structure and relations between the center and the regions in order to ensure economic security and growth by maximizing the effective use of existing internal and external factors. The institutional influence of the state in order to improve the economic security of regions and enterprises occurs palliatively when the business of the region is supported in direct – subsidies, and more often indirectly – compliance with the laws and regulations of the Russian Federation and the region, on the principles of institutional and market synergies. Adaptation of enterprises in the region to the market is difficult, when specific socio-organizational, economic, technical and technological, scientific, information activities in their interrelations function in the field of Russian laws. The search for ways to improve the economic security of the Russian Federation, regions and enterprises takes place in the context of global integration through the improvement of the mechanism of state regulation. An important task of the current stage of economic security of the country and regions is the construction of a system of its institutional organization that would be able to balance the levers of government with the opportunities of private enterprises, provide a quality level of providing the business with protection from terrorism, predation, financial risks, legal competition etc.

  9. ANALYSIS OF INCOME INEQUALITIES AND FOOD SECURITY AMONG FARMERS IN ABIA STATE, SOUTH EASTERN NIGERIA

    Directory of Open Access Journals (Sweden)

    Nnanna M. AGWU

    2014-10-01

    Full Text Available The study analysed income inequalities and food security status of farmers in South Eastern Nigeria, using Abia State. Specifically, the study accessed the income inequalities of the farmers; determine the food security status of the farmers; estimate the factors that influence food security among the farmers in the study area. Multi-stage sampling technique was adopted in the selection of location and 180 respondents used for the study. The study employed Gini-coefficient, food security index and multiple regressions in the analysis of the data collected. Result shows that Gini coefficient value was 0.67, showing that there was high income inequality in the study area. Majority of the respondents, constituting about 68.57 percent were food insecurity in the study area. The regression results showed that age of the household head, educational attainment of the household head and monthly income of the head were the major determinants of food security status in the study area. The study recommends that government policies targeted at farmers should be strengthened, in order to bridge the gap in farmers’ income. Government should also create opportunities for small scale businesses to flourish in ural areas. This will provide the people the much needed income, amongst other things.

  10. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    Science.gov (United States)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  11. Formulation, computation and improvement of steady state security margins in power systems. Part II: Results

    International Nuclear Information System (INIS)

    Echavarren, F.M.; Lobato, E.; Rouco, L.; Gomez, T.

    2011-01-01

    A steady state security margin for a particular operating point can be defined as the distance from this initial point to the secure operating limits of the system. Four of the most used steady state security margins are the power flow feasibility margin, the contingency feasibility margin, the load margin to voltage collapse, and the total transfer capability between system areas. This is the second part of a two part paper. Part I has proposed a novel framework of a general model able to formulate, compute and improve any steady state security margin. In Part II the performance of the general model is validated by solving a variety of practical situations in modern real power systems. Actual examples of the Spanish power system will be used for this purpose. The same computation and improvement algorithms outlined in Part I have been applied for the four security margins considered in the study, outlining the convenience of defining a general framework valid for the four of them. The general model is used here in Part II to compute and improve: (a) the power flow feasibility margin (assessing the influence of the reactive power generation limits in the Spanish power system), (b) the contingency feasibility margin (assessing the influence of transmission and generation capacity in maintaining a correct voltage profile), (c) the load margin to voltage collapse (assessing the location and quantity of loads that must be shed in order to be far away from voltage collapse) and (d) the total transfer capability (assessing the export import pattern of electric power between different areas of the Spanish system). (author)

  12. Formulation, computation and improvement of steady state security margins in power systems. Part II: Results

    Energy Technology Data Exchange (ETDEWEB)

    Echavarren, F.M.; Lobato, E.; Rouco, L.; Gomez, T. [School of Engineering of Universidad Pontificia Comillas, C/Alberto Aguilera, 23, 28015 Madrid (Spain)

    2011-02-15

    A steady state security margin for a particular operating point can be defined as the distance from this initial point to the secure operating limits of the system. Four of the most used steady state security margins are the power flow feasibility margin, the contingency feasibility margin, the load margin to voltage collapse, and the total transfer capability between system areas. This is the second part of a two part paper. Part I has proposed a novel framework of a general model able to formulate, compute and improve any steady state security margin. In Part II the performance of the general model is validated by solving a variety of practical situations in modern real power systems. Actual examples of the Spanish power system will be used for this purpose. The same computation and improvement algorithms outlined in Part I have been applied for the four security margins considered in the study, outlining the convenience of defining a general framework valid for the four of them. The general model is used here in Part II to compute and improve: (a) the power flow feasibility margin (assessing the influence of the reactive power generation limits in the Spanish power system), (b) the contingency feasibility margin (assessing the influence of transmission and generation capacity in maintaining a correct voltage profile), (c) the load margin to voltage collapse (assessing the location and quantity of loads that must be shed in order to be far away from voltage collapse) and (d) the total transfer capability (assessing the export import pattern of electric power between different areas of the Spanish system). (author)

  13. The new PR of states: How nation branding practices affect the security function of public diplomacy

    DEFF Research Database (Denmark)

    Rasmussen, Rasmus Kjærgaard; Merkelsen, Henrik

    2012-01-01

    This paper investigates how the role of public relations practice in public diplomacy is undergoing a transformation as a consequence of the influence from nation branding. A case study of the Danish government's response to the so-called Cartoon Crisis illustrates how the threat from international...... a domestic audience. In the public diplomacy efforts towards transnational publics the link to national security will completely disappear whereby the public relations of states is transformed to the marketing of states....... terrorism to national security initially served as a catalyst for new public diplomacy initiatives. But as the initiatives were implemented within a framework of nation branding the focus on risk reduction became subjected to a marketing logic and a new focus on economic objectives took over. The paper...

  14. Implementation and Optimization of GPU-Based Static State Security Analysis in Power Systems

    Directory of Open Access Journals (Sweden)

    Yong Chen

    2017-01-01

    Full Text Available Static state security analysis (SSSA is one of the most important computations to check whether a power system is in normal and secure operating state. It is a challenge to satisfy real-time requirements with CPU-based concurrent methods due to the intensive computations. A sensitivity analysis-based method with Graphics processing unit (GPU is proposed for power systems, which can reduce calculation time by 40% compared to the execution on a 4-core CPU. The proposed method involves load flow analysis and sensitivity analysis. In load flow analysis, a multifrontal method for sparse LU factorization is explored on GPU through dynamic frontal task scheduling between CPU and GPU. The varying matrix operations during sensitivity analysis on GPU are highly optimized in this study. The results of performance evaluations show that the proposed GPU-based SSSA with optimized matrix operations can achieve a significant reduction in computation time.

  15. Fault tolerant deterministic secure quantum communication using logical Bell states against collective noise

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao; Chen Xiu-Bo; Bi Ya-Gang

    2015-01-01

    This study proposes two novel fault tolerant deterministic secure quantum communication (DSQC) schemes resistant to collective noise using logical Bell states. Either DSQC scheme is constructed based on a new coding function, which is designed by exploiting the property of the corresponding logical Bell states immune to collective-dephasing noise and collective-rotation noise, respectively. The secret message can be encoded by two simple unitary operations and decoded by merely performing Bell measurements, which can make the proposed scheme more convenient in practical applications. Moreover, the strategy of one-step quanta transmission, together with the technique of decoy logical qubits checking not only reduces the influence of other noise existing in a quantum channel, but also guarantees the security of the communication between two legitimate users. The final analysis shows that the proposed schemes are feasible and robust against various well-known attacks over the collective noise channel. (paper)

  16. Security of a kind of quantum secret sharing with entangled states.

    Science.gov (United States)

    Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng

    2017-05-30

    We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.

  17. A Model for Effective Organization and Communication of Homeland Security Activity at the State Level

    Science.gov (United States)

    2007-03-01

    whether managing the functional segments of a major corporation, i.e. sourcing, product development, inbound/ outbound logistics , or after-market services...homeland security concerns. While none specifically addresses the mechanics or logistics of the reorganization of state governments, it does assert...and around casino and hotels . Respond to all threats and hazards. Admit lawful bettors and visitors. Promote legal gaming.41 Department of

  18. Turkey’s New Regional Security Role: Implications for the United States

    Science.gov (United States)

    2014-09-01

    organizational reform, economic restructuring, and integrating recent members. Efforts to develop a Eu- ropean Security and Defense Identity (ESDI...the fed- eral state of Iraq. Turkish officials have also developed ties with moderate Kurdish leaders such as Iraqi Pres- ident Jalal Talabani and...most vis- ible presence is its pop culture, especially cinema , and Turkish goods. Turkish clothes, furniture, toys, build- ing materials, and other

  19. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    used to explain in general an individual state’s focus including restrictions on the application of regionalization and the impact of home rule...terrorist attack. Didn’t New York City Mayor Michael Bloomberg exhibit big city egoism over a reduction in homeland security funding? Some...been missed in the turmoil at DHS. Several states have eased legislative restrictions that interfere with regionalization. Indiana for example, has an

  20. Security of continuous-variable quantum cryptography using coherent states: Decline of postselection advantage

    International Nuclear Information System (INIS)

    Namiki, Ryo; Hirano, Takuya

    2005-01-01

    We investigate the security of continuous-variable (CV) quantum key distribution (QKD) using coherent states in the presence of quadrature excess noise. We consider an eavesdropping attack that uses a linear amplifier and a beam splitter. This attack makes a link between the beam-splitting attack and the intercept-resend attack (classical teleportation attack). We also show how postselection loses its efficiency in a realistic channel

  1. Security of embedded automotive networks: state of the art and a research proposal

    OpenAIRE

    Studnia , Ivan; Nicomette , Vincent; Alata , Eric; Deswarte , Yves; Kaâniche , Mohamed; Laarouchi , Youssef

    2013-01-01

    International audience; Embedded electronic components are nowadays a prominent part of a car's architecture. Moreover, modern cars are now able to communicate with other devices through many wired or wireless interfaces. As a consequence, the security of embedded systems in cars has become a main concern for the manufacturers. This paper aims at 1) presenting a short overview of the current attacks already known and experimented against vehicles as well as the current state of the art of the...

  2. The Ukrainian Crisis and European Security: Implications for the United States and U.S. Army

    Science.gov (United States)

    2015-01-01

    14 Chris Giles and Stefan Wagstyl, “IMF Warns of Third Eurozone Recession Since Finan- cial Crisis,” Financial Times, October 8, 2014. 15 Ulrich...Jones, and Kathrin Hille, “Russian Air Incursions Rattle Baltic States,” Financial Times, September 25, 2014. 25 Andrew Higgins , “Tensions Surge in...Opening of the Munich Security Conference, January 31, 2014. Giles, Chris , and Stefan Wagstyl, “IMF Warns of Third Eurozone Recession Since Financial

  3. SECURITY STRATEGIES OF MEMBER STATES OF THE EUROPEAN UNION FROM THE LISBON TREATY AND THE EUROPEAN SECURITY STRATEGY

    Directory of Open Access Journals (Sweden)

    PABLO RIVAS PARDO

    2017-09-01

    in mind, it is possible to study the variability of the Security Strategy in relation to four strategic guidelines: strategic self-perception, the necessity to tune these postulates with the common objectives of the European Union, the statement of threats and finally the actions projected by these strategies to face the changing environment of international security. This variability will seek the fact of the existence or nonexistence of tuning and consistency between the Security Strategies and the community positions in the matter of security and defense. The selected countries are those who have published their documents after the signing of the Treaty of Lisbon and the publication of the European Security Strategy, in other words, after2009: Austria, Bulgaria, Slovenia, Spain, Estonia, Holland, Hungary, Lithuania, UK and the Czech Republic.

  4. The united states and the world oil security. US oil policy and production of a global collective good

    International Nuclear Information System (INIS)

    Noel, P.

    2004-07-01

    The aim of this paper is to define and discusses the part of the Unites States in the world oil system operating and more particularly the US oil security policy in the world policy. It refutes some established ideas as the necessity of the US military supremacy to provide the oil security, the necessity of ''agreements'' with oil exporting countries facing the US energy consumption increase or the limitation of the resources access to other countries. At the opposite the United States seem to invest in the production of a global public good in matter of energy security. In order to illustrate this opinion the author defines the problem of the US oil security in a world context. He analyzes then the US policies to show the impacts in the world oil security and studies the specific part of the military factor in the security policy. (A.L.B.)

  5. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  6. Transactional costs of the interaction between business and government as a threat to the economic security of the state

    Directory of Open Access Journals (Sweden)

    Evmenov Aleksandr

    2018-01-01

    Full Text Available The article considers the costs of the interaction between the state and business as a threat to the development of the economy of the Russian Federation from the point of view of ensuring economic security. The authors identified significant obstacles both from the business and from the government side, which pose a threat to economic security. The study is of interest for the further development of a system of providing the economic security of the Russian Federation.

  7. The Policy Trade-off Between Energy Security and Climate Change in the GCC States

    Science.gov (United States)

    Shahbek, Shaikha Ali

    Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.

  8. Technical Training Skills Needs of Youth for Sustainable Job Security in Rice Production in Ebonyi State, Nigeria

    Science.gov (United States)

    Edu, Chukwuma Nwofe; Ogba, Ernest Ituma

    2016-01-01

    The study identifies technical training skills needs of youth for sustainable job security in rice production in Ebonyi State, Nigeria. This study was carried out in secondary schools in three educational zones in Ebonyi State, Nigeria. Ebonyi state is one of the states in the southeast geopolitical zone in Nigeria. Descriptive survey design was…

  9. Generalized projective synchronization via the state observer and its application in secure communication

    International Nuclear Information System (INIS)

    Wu Di; Li Juan-Juan

    2010-01-01

    Based on the improved state observer and the pole placement technique, by adding a constant which extends the scope of use of the original system, a new design method of generalized projective synchronization is proposed. With this method, by changing the projective synchronization scale factor, one can achieve not only complete synchronization, but also anti-synchronization, as well as arbitrary percentage of projective synchronization, so that the system may attain arbitrary synchronization in a relatively short period of time, which makes this study more meaningful. By numerical simulation, and choosing appropriate scale factor, the results of repeated experiments verify that this method is highly effective and satisfactory. Finally, based on this method and the relevant feedback concept, a novel secure communication project is designed. Numerical simulation verifies that this secure communication project is very valid, and moreover, the experimental result has been greatly improved in decryption time. (general)

  10. An Assessment of Teacher Retention on Job Security in Private Secondary Schools in Ogun State, Nigeria

    Directory of Open Access Journals (Sweden)

    M.F. Faremi

    2017-12-01

    Full Text Available This study assessed the relationship between teacher retention and job security in private secondary schools in Ogun state, Nigeria. The study assessed ade-quacy in teaching and learning infrastructure, evaluated mode of recruitment of teachers, the factors responsible for high teacher turnover and teachers retention strategies employed in private secondary schools. Descriptive research of the survey design was employed in this study. Data were collected using questionnaire. Multistage sampling technique was used for data collection among 200 teachers including the school principals. Data collected were analyzed with a mixture of descriptive and inferential statistics. Percentages, mean and frequency counts were used to answer the research questions raised while Pearson Moment Correlation Coefficient and t-test analysis were used to test the formulated hypotheses at 0.05 level of significance. The findings from this study revealed that teaching and learning infrastructure were inadequate in most of the schools. It was observed that books, classroom and teachers were very adequate in some of the schools. However, few of the schools had internet facility for knowledge transfer and student exposure to the worldwide web. The study also showed that the proprietors were primarily responsible for staff recruitment although there were instances where formal advertisement for recruitment was made. The study further revealed a significant relationship between teacher retention strategies and job security in private secondary schools in Osun state. The study also showed a significant relationship between teacher turnover and job security in the schools. In addition, the findings showed a significant relationship between teacher turnover and job security in private secondary schools in Osun state. Lastly, the study revealed a significant difference in the mean rate and female teachers' turnover in the selected private secondary schools. Based on the

  11. Asynchronous anti-noise hyper chaotic secure communication system based on dynamic delay and state variables switching

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongjun [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China); Weifang Vocational College, Weifang 261041 (China); Wang, Xingyuan, E-mail: wangxy@dlut.edu.cn [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China); Zhu, Quanlong [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China)

    2011-07-18

    This Letter designs an asynchronous hyper chaotic secure communication system, which possesses high stability against noise, using dynamic delay and state variables switching to ensure the high security. The relationship between the bit error ratio (BER) and the signal-to-noise ratio (SNR) is analyzed by simulation tests, the results show that the BER can be ensured to reach zero by proportionally adjusting the amplitudes of the state variables and the noise figure. The modules of the transmitter and receiver are implemented, and numerical simulations demonstrate the effectiveness of the system. -- Highlights: → Asynchronous anti-noise hyper chaotic secure communication system. → Dynamic delay and state switching to ensure the high security. → BER can reach zero by adjusting the amplitudes of state variables and noise figure.

  12. Sowing the Seeds of Strategic Success Across West Africa: Propagating the State Partnership Program to Shape the Security Environment

    Science.gov (United States)

    2017-06-09

    region’s continued growth in economics , population, influence, and the correlating 17 increase in risks to stability from radicalization and...environment and stem the tide of regional instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic... instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic Combatant Commanders can leverage to enhance the

  13. Field test of a practical secure communication network with decoy-state quantum cryptography.

    Science.gov (United States)

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.

  14. Improvement on Quantum Secure Direct Communication with W State in Noisy Channel

    International Nuclear Information System (INIS)

    Dong Li; Xiu Xiaoming; Gao Yajun; Chi Feng

    2009-01-01

    An improvement (Y-protocol) [Commun. Theor. Phys. 49 (2008) 103] on the quantum secure direct communication with W state (C-protocol) [Chin. Phys. Lett. 23 (2006) 290] is proposed by Yuan et al. The quantum bit error rate induced by eavesdropper is 4.17% in C-protocol and 6.25% in Y-protocol. In this paper, another improvement on C-protocol is given. The quantum bit error rate of the eavesdropping will increase to 8.75%, which is 1.1 times larger than that in C-protocol and 0.4 times larger than that in Y-protocol.

  15. Compliance with federal and state regulations regarding the emergency response plan and physical security plan at the Oregon State TRIGA reactor

    International Nuclear Information System (INIS)

    Johnson, A.G.; Ringle, J.C.; Anderson, T.V.

    1976-01-01

    Recent legislative actions within the State of Oregon have had a significant impact upon the OSU TRIGA Emergency Response Plan, and to a lesser extent upon the Physical Security Plan. These state imposed changes will be reviewed in light of existing federal requirements. With the upcoming acquisition of FLIP fuel in August 1976, NRC required several major changes to the existing Physical Security Plan. Within the limitations of public disclosure, these changes will be contrasted to the present plan. (author)

  16. Practical somewhat-secure quantum somewhat-homomorphic encryption with coherent states

    Science.gov (United States)

    Tan, Si-Hui; Ouyang, Yingkai; Rohde, Peter P.

    2018-04-01

    We present a scheme for implementing homomorphic encryption on coherent states encoded using phase-shift keys. The encryption operations require only rotations in phase space, which commute with computations in the code space performed via passive linear optics, and with generalized nonlinear phase operations that are polynomials of the photon-number operator in the code space. This encoding scheme can thus be applied to any computation with coherent-state inputs, and the computation proceeds via a combination of passive linear optics and generalized nonlinear phase operations. An example of such a computation is matrix multiplication, whereby a vector representing coherent-state amplitudes is multiplied by a matrix representing a linear optics network, yielding a new vector of coherent-state amplitudes. By finding an orthogonal partitioning of the support of our encoded states, we quantify the security of our scheme via the indistinguishability of the encrypted code words. While we focus on coherent-state encodings, we expect that this phase-key encoding technique could apply to any continuous-variable computation scheme where the phase-shift operator commutes with the computation.

  17. Natural gas to improve energy security in Small Island Developing States: A techno-economic analysis

    Directory of Open Access Journals (Sweden)

    Pravesh Raghoo

    Full Text Available There is a paucity of studies on natural gas-based energy production in Small Island Developing States (SIDS even though technological improvements today are likely to make the application of natural gas more and more feasible. The development of natural gas in some of the regions of the Pacific, Africa, Indian Ocean and Caribbean attracts nearby countries and the coming up of the compressed natural gas (CNG technology which can serve regional markets are two motivations for SIDS to develop natural gas-based energy provision. A third factor concerns long-term energy security. Due to continued reliance on fossil fuels and slow uptake of renewable energy, there is a need to diversify SIDS’ energy mix for a sustainable electricity industry. Comparing the opportunities and constraints of liquefied natural gas (LNG and compressed natural gas (CNG in a SIDS-specific context, this paper discusses how to improve the integration of natural gas in prevailing energy regimes in SIDS as an alternative fuel to oil and complementary to renewable energy sources. To illustrate feasibility in practice, a techno-economic analysis is carried out using the island of Mauritius as an example. Keywords: Energy security, Natural gas, Small Island Developing States

  18. HORTICOLA DIVERSITY FOR FOOD SECURITY MARGINALIZED MUNICIPALITIES IN STATE OF PUEBLA

    Directory of Open Access Journals (Sweden)

    Blanca Alicia Salcido-Ramos

    2013-04-01

    Full Text Available Backyards for rural households represent a strategy that ensures the production of plant foods and animal come to enrich and supplement their diet. Unfortunately there is no evidence of the contribution made by the horticultural component of biodiversity of species in relation to food, income generation and exchange of vegetables, based on the above plan the need for research aimed was to analyze the subsystem comprising the backyards vegetable operated by the State Program for Food Security (SPFS State establishing productive inputs, economic and social component that obtains horticultural peasant household (UDC, communities of Canoas- Atempan, Tezotepec-Mazatonal-Yaonáhuac Chignautla and the Northeastern Sierra Puebla state. In this northeastern region of 16 municipalities are located high deprivation and 8 highly marginalized state, population is of Náhuatl origin and it is common that women are responsible for the management and operation of the backyard based on their traditional knowledge and survival strategies. Fieldwork was conducted in the months of March to June 2011, with the participation of 37 rural women. Some of the findings are: Canoes and communities Mazatonal, 77% of horticultural production was assigned to food, 15% and 8% marketing to strengthen social relations within the community. In contrast, community of Tezotepec which earmarked 53% to the marketing, 46% to food and only 1% strengthening of social relations. There are also differences between communities in relation to the number of children, the diversity of vegetable grown, and the frequency of seeding and transplanting of vegetables contributing to the food security of the UDC.

  19. The Politics of Security Deployment of Security Operatives to Jos Metropolis, Plateau State, Nigeria 2001-2014

    Directory of Open Access Journals (Sweden)

    Dantani Umar

    2017-01-01

    Full Text Available The paper examines the politics of security deployment by the Federal Government of Nigeria to Jos, metropolis. A cross-sectional study was conducted and Public Opinion Theory adopted. Methodologically, mixed methods of data collection were conducted that involved the administration of 377 questionnaires to adult respondents, six In-Depth Interviews with religious and community leaders while three Key Informant Interviews with security personnel working with Special Task Force. The survey reveals that, the deployment of Mobile Police from 2001-2010 and the formation of Special Task Force in 2010 has generated mixed reactions and divergent perceptions among the residents of Jos metropolis. Majority of the ethnic groups that are predominantly Christians were more contented with the deployment of the Mobile Police whereas ethnic groups that are dominantly Muslims questioned the neutrality, capability, performance and strength of the Nigerian Police Force in managing the crises. The study recommends that, security personnel should display high degree of neutrality in order to earn the confidence of the residents and change their perceptions.

  20. Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Long, J.D.

    2013-01-01

    The IAEA has described the Safeguards by Design (SBD) concept as an approach in which international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning. Often, international safeguards features are added following completion of the facility design. Earlier consideration of safeguards features has the potential to reduce the need for costly re-designs or retrofits of the facility and can result in a more efficient and effective safeguards design. The U.S. Department of Energy's National Nuclear Security Administration (NNSA) initiated a project in 2008 through its Next Generation Safeguards Initiative (NGSI) to establish a global norm for the use of SBD. The NGSI SBD program is evolving in parallel with a similar effort at the IAEA, while taking into account the IAEA's SBD achievements and future plans. The NGSI program includes DOE laboratory studies, international workshops, engagement with industry and the IAEA, and setting an example through its planned use in new nuclear facilities in the United States. Consistent with this effort, the NGSI program has sponsored 'Lessons Learned' studies and the preparation of facility-specific SBD Guidance documents. The NGSI program also takes into account successes that the NNSA has had with implementing safeguards early into facility designs within the U.S. The purpose of this paper is the presentation of the most recent developments in SBD under NGSI within the U.S. as well as the presentation of 'Lessons Learned' integrating safeguards into new nuclear facility designs of the U.S. Nuclear Security Enterprise (NSE), namely the Uranium Processing Facility (UPF) project at the Y-12 National Security Complex in Oak Ridge, Tennessee and to discuss its relevance to international safeguards. The paper is followed by the slides of the presentation. (author)

  1. Three-party quantum secret sharing of secure direct communication based on χ-type entangled states

    International Nuclear Information System (INIS)

    Yu-Guang, Yang; Wei-Feng, Cao; Qiao-Yan, Wen

    2010-01-01

    Based on χ-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on χ-type entangled states |χ 00 ) 3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed. (general)

  2. To the Question of Information Security and Providing State and Municipal Services by Means of the Internet

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-09-01

    Full Text Available In the present article author investigates interconnected questions of information security and providing state and municipal services by means of the global information Internet. Author analyzes opinions of the number of leading Russian and foreign experts and scientists. In the summary author draws a conclusion that implementation of rules of law answering to modern realities and also fruitful work of law enforcement and supervisory authorities regarding law application practice improvement is necessary for information security and human rights protection.

  3. A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements

    International Nuclear Information System (INIS)

    Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong

    2011-01-01

    We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)

  4. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states

    Science.gov (United States)

    Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo

    2017-12-01

    This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.

  5. Financial security of the state in terms of globalization processes escalation

    Directory of Open Access Journals (Sweden)

    Svitlana Tkalenko

    2013-02-01

    Full Text Available The article provides review of the globalization and global integration processes impact on the financial sector formation characterized by an increase in financial flows with the lead role played by transnational corporations and transnational banks. The globalization study has been already reflected by numerous scientific publications and various issues of reputable international academic journals describing the process as irreversible and objective along with demonstrating globalization merits and demerits, etc. In the 21st century, globalization is an issue discussed by everyone: ranging from presidents, prime ministers and members of parliament supposed to solve problems of any scale taking into consideration the global development phenomenon, to ordinary citizens. Today, globalization has obviously become a major trend of the modern world development, which is why issues implying sound development assurance become pressing for each country. The article dwells upon the main component of economic security — the financial one (Ukraine case study. Thus, we are engaged in studying the global development trend in terms of assuring security of the state under conditions of financial flows globalization and existence of global integration processes.

  6. Present state and problems of the measures for securing stable supply of uranium resources

    International Nuclear Information System (INIS)

    Yoneda, Fumishige

    1982-01-01

    The long-term stable supply of uranium resources must be secured in order to accelerate the development and utilization of nuclear power in Japan. All uranium required in Japan is imported from foreign countries, and depends on small number of suppliers. On the use of uranium, various restrictions have been imposed by bilateral agreements from the viewpoint of nuclear non-proliferation policy. At present, the demand-supply relation in uranium market is not stringent, but in the latter half of 1980s, it is feared that it will be stringent. The prospect of the demand and supply of uranium resources, the state of securing uranium resources, the present policy on uranium resources, the necessity of establishing the new policy, and the active promotion of uranium resource measures are described. The measures to be taken are the promotion of exploration and development of mines, the participation in the management of such foreign projects, the promotion of diversifying the supply sources, the establishment of the structure to accept uranium resources, the promotion of the storage of uranium, and the rearrangement of general coordination and promotion functions for uranium resource procurement. (Kako, I.)

  7. Current state of commercial radiation detection equipment for homeland security applications

    International Nuclear Information System (INIS)

    Klann, R.T.; Shergur, J.; Mattesich, G.

    2009-01-01

    With the creation of the U.S. Department of Homeland Security (DHS) came the increased concern that terrorist groups would attempt to manufacture and use an improvised nuclear device or radiological dispersal device. As such, a primary mission of DHS is to protect the public against the use of these devices and to assist state and local responders in finding, locating, and identifying these types of devices and materials used to manufacture these devices. This assistance from DHS to state and local responders comes in the form of grant money to procure radiation detection equipment. In addition to this grant program, DHS has supported the development of American National Standards Institute standards for radiation detection equipment and has conducted testing of commercially available instruments. This paper identifies the types and kinds of commercially available equipment that can be used to detect and identify radiological material - for use in traditional search applications as well as primary and secondary screening of personnel, vehicles, and cargo containers. In doing so, key considerations for the conduct of operations are described as well as critical features of the instruments for specific applications. The current state of commercial instruments is described for different categories of detection equipment including personal radiation detectors, radioisotope identifiers, man-portable detection equipment, and radiation portal monitors. In addition, emerging technologies are also discussed, such as spectroscopic detectors and advanced spectroscopic portal monitors

  8. Mixed coherent states in coupled chaotic systems: Design of secure wireless communication

    Science.gov (United States)

    Vigneshwaran, M.; Dana, S. K.; Padmanaban, E.

    2016-12-01

    A general coupling design is proposed to realize a mixed coherent (MC) state: coexistence of complete synchronization, antisynchronization, and amplitude death in different pairs of similar state variables of the coupled chaotic system. The stability of coupled system is ensured by the Lyapunov function and a scaling of each variable is also separately taken care of. When heterogeneity as a parameter mismatch is introduced in the coupled system, the coupling function facilitates to retain its coherence and displays the global stability with renewed scaling factor. Robust synchronization features facilitated by a MC state enable to design a dual modulation scheme: binary phase shift key (BPSK) and parameter mismatch shift key (PMSK), for secure data transmission. Two classes of decoders (coherent and noncoherent) are discussed, the noncoherent decoder shows better performance over the coherent decoder, mostly a noncoherent demodulator is preferred in biological implant applications. Both the modulation schemes are demonstrated numerically by using the Lorenz oscillator and the BPSK scheme is demonstrated experimentally using radio signals.

  9. Determinants of Food Security Status of Maize-Based Farming Households in Southern Guinea Savannah Area of Oyo State, Nigeria.

    Directory of Open Access Journals (Sweden)

    Oluwayemisi Abidemi Onasanya

    2016-05-01

    Full Text Available Nigeria is one of the countries in sub-Saharan Africa with insufficient food and high food import bill, which have debilitating effects on the productive capacity of the citizens. Maize is the most important cereal after rice and its production contributes immensely to food availability on the tables of many Nigerians. This study examined the contribution of maize production to household food security status of rural maize-farming households in the southern guinea savannah of Oyo state, Nigeria. A multistage sampling procedure was used to select 200 farm households and the data were analysed using descriptive statistics, recommended daily calorie requirement (RDCR approach, Logit model. Results showed that about three-quarters of the households were food secure and were able to meet the recommended calorie intake of 2260Kcal per capita per day. The shortfall index (P which measures the extent of deviation from the food security line, indicated that the food secure households exceeded the RDCR by 65%, while the food insecure households fell short of the RDCR by 31%. The logit model showed that maize output, gender, primary occupation of the farmer, farm size and farming experience had a positive influence on food security status while age had a negative influence on the food security status of maize-based farming households in the Southern Guinea Savannah of Oyo State, Nigeria. This suggests need for specific support to improve maize production

  10. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation

    International Nuclear Information System (INIS)

    Li Jian; Song Danjie; Guo Xiaojing; Jing Bo

    2012-01-01

    In order to transmit secure messages, a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented. The five-particle cluster state is used to detect eavesdroppers, and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol. In the security analysis, the entropy theory method is introduced, and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all the information, the detection rate of the original ping-pong protocol is 50%; the second protocol, using two particles of the Einstein-Podolsky-Rosen pair as detection particles, is also 50%; while the presented protocol is 89%. Finally, the security of the proposed protocol is discussed, and the analysis results indicate that the protocol in this paper is more secure than the other two. (authors)

  11. The State-Society/Citizen Relationship in Security Analysis: Implications for Planning and Implementation of U.S. Intervention and Peace/State-Building Operations

    Science.gov (United States)

    2015-04-01

    of the state. Such threats may come into existence when 9 the organizing principles of two states contradict each other in a context where the...security is that the normal condition of actors in a market econ - omy is one of risk, competition, and uncertainty.12 In other words, the actors in the...liberal principles , federative states have no natural unifying principle and, consequently, are more vulnerable to dismemberment, separatism, and

  12. Compact, diode-pumped, solid-state lasers for next generation defence and security sensors

    Science.gov (United States)

    Silver, M.; Lee, S. T.; Borthwick, A.; McRae, I.; Jackson, D.; Alexander, W.

    2015-06-01

    Low-cost semiconductor laser diode pump sources have made a dramatic impact in sectors such as advanced manufacturing. They are now disrupting other sectors, such as defence and security (D&S), where Thales UK is a manufacturer of sensor systems for application on land, sea, air and man portable. In this talk, we will first give an overview of the market trends and challenges in the D&S sector. Then we will illustrate how low cost pump diodes are enabling new directions in D&S sensors, by describing two diode pumped, solid- state laser products currently under development at Thales UK. The first is a new generation of Laser Target Designators (LTD) that are used to identify targets for the secure guiding of munitions. Current systems are bulky, expensive and require large battery packs to operate. The advent of low cost diode technology, merged with our novel solid-state laser design, has created a designator that will be the smallest, lowest cost, STANAG compatible laser designator on the market. The LTD delivers greater that 50mJ per pulse up to 20Hz, and has compact dimensions of 125×70×55mm. Secondly, we describe an ultra-compact, eye-safe, solid-state laser rangefinder (LRF) with reduced size, weight and power consumption compared to existing products. The LRF measures 100×55×34mm, weighs 200g, and can range to greater than 10km with a single laser shot and at a reprate of 1Hz. This also leverages off advances in laser pump diodes, but also utilises low cost, high reliability, packaging technology commonly found in the telecoms sector. As is common in the D&S sector, the products are designed to work in extreme environments, such as wide temperature range (-40 to +71°C) and high levels of shock and vibration. These disruptive products enable next- generation laser sensors such as rangefinders, target designators and active illuminated imagers.

  13. State Regulatory Authority (SRA) Coordination of Safety, Security, and Safeguards of Nuclear Facilities: A Framework for Analysis

    International Nuclear Information System (INIS)

    Mladineo, S.; Frazar, S.; Kurzrok, A.; Martikka, E.; Hack, T.; Wiander, T.

    2013-01-01

    In November 2012 the International Atomic Energy Agency (IAEA) sponsored a Technical Meeting on the Interfaces and Synergies in Safety, Security, and Safeguards for the Development of a Nuclear Power Program. The goal of the meeting was to explore whether and how safeguards, safety, and security systems could be coordinated or integrated to support more effective and efficient nonproliferation infrastructures. While no clear consensus emerged, participants identified practical challenges to and opportunities for integrating the three disciplines’ regulations and implementation activities. Simultaneously, participants also recognized that independent implementation of safeguards, safety, and security systems may be more effective or efficient at times. This paper will explore the development of a framework for conducting an assessment of safety-security-safeguards integration within a State. The goal is to examine State regulatory structures to identify conflicts and gaps that hinder management of the three disciplines at nuclear facilities. Such an analysis could be performed by a State Regulatory Authority (SRA) to provide a self-assessment or as part of technical cooperation either with a newcomer State, or to a State with a fully developed SRA.

  14. Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, Arian Leigh

    2011-12-01

    The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

  15. The African State and the role and nature of non-state sources of security in the Democratic Republic of Congo and South Africa

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2012-01-01

    use of violence as being the domain of the modern state, which as a natural consequence, delegitimises non-state providers of security. Legitimacy is, therefore, tied to the formal state. Th e international debate concerning the role of PMSCs has been split primarily into two segments. One argues...... to control confl icts has led to low-intensity confl icts (LIC), which can be witnessed, for instance, in Uganda, the Democratic Republic of Congo, Colombia and Sri Lanka (O’Brien, 1998, p. 80). Since the end of the Cold War it has been common for weak state rulers with formal state legitimacy...... security contractors have led, both historically and at the present day, to fi erce academic and public debate. As Sarah Percy argues, the anti-mercenary discourse has two basic elements. One focuses on the fact that mercenaries use force outside what is considered to be legitimate, authoritative control...

  16. DYNAMICS OF DEVELOPMENT OF FINANCIAL SAFETY OF THE ENTERPRISE AS A COMPLEX ECONOMIC SECURITY OF THE STATE

    Directory of Open Access Journals (Sweden)

    Tetiana Ganushchak

    2017-09-01

    Full Text Available The purpose of the paper is to the performance of the evaluation of the financial safety of the enterprise. To achieve the stated aim it has been necessary to solve the following tasks: to use the approaches as to the evaluation of the financial safety of the enterprise, to introduce the analysis system of the financial safety of the enterprise, to consider the structural logical scheme of the analysis procedure of the financial safety of the enterprise, to give the description of the integral indicator of the financial safety of the enterprise; to evaluate and compare companies in the paltry industry according to the level of their financial safety. Methodology. Methodologial basis of the research are the scientific methods, such as : method of logical generalization, dialectical method of recognition of the economic phenomena – to give the definitions of «economic security of the enterprise», «financial security of the enterprise», grouping method, analysis which were used to estimate indicator position of the financial security of the poultry company, graph method which was applied to compare integral estimation of the enterprise;methods of synthesis, deduction, induction, method of the expert estimation to calculate and implement integral marker of the financial security of the poultry company;method of the correlation analysis which was used to identify weight coefficients of the all sided figures of the solvency , business activity, profitability, financial steadiness, pay ability. The priority in methods using was defined by the particular tasks and goals. Results of the research showned into a wide set of the ways of financial enterprise safety as a component of economic security of the state. There is an evaluation of enterprise financial safety on the basis of calculations of integral indicator, including combined indices of profitability (unprofitability, pay ability or the lack of that, business activity (fading, financial

  17. The Existence Of Leading Islands Securing And The Border Areas Unitary State Of Indonesia An Analysis In Law Perspective

    Directory of Open Access Journals (Sweden)

    Nazali

    2015-08-01

    Full Text Available Abstract The research was carried with the aim to discover the existence of securing the foremost islands and state border region of the Republic of Indonesia reviewed from a legal perspective which is directly related to the existence of security and dispute resolution methods as well as the governance of the foremost islands and border region in Kalimantan which bordering Malaysia. This study was conducted in Nunukan district and the surrounding provinces of Kalimantan in this research method that used is normative legal analysis data with juridical and qualitative descriptive approach. The results showed that the security of foremost islands and border region of law perspective in accordance with the Law No. 34 of 2004 regarding the Indonesian National Army has not been implemented to the fullest to realize the security of foremost islands and border region as the frontline of the Republic of Indonesia. The existence of leading islands securing and the border region of the Republic of Indonesia still contain many weaknesses in terms of both governance and security.

  18. Development and Validation of Mechanical Engineering Trade Skills Assessment Instrument for Sustainable Job Security in Yobe State

    Science.gov (United States)

    Adamu, Gishua Garba; Dawha, Josphine Musa; Kamar, Tiamiyu Salihu

    2015-01-01

    Mechanical Engineering Trade Skills Assessment Instrument (METSAI) is aimed at determining the extent to which students have acquired practical skills before graduation that will enable them get employment for sustainable job security in Yobe state. The study employed instrumentation research design. The populations of the study were 23 mechanical…

  19. Discursive field of dissertation research on the state of information security of Ukraine

    OpenAIRE

    O. S. Zozulya

    2016-01-01

    The article analyzed the of dissertations for science «Public Administration» on the problems ensuring information security of Ukraine. According to the data system catalog Vernadsky National Library of Ukraine was found that within the limits of science «Public Administration» problems of ensuring information security were devoted only 4 work. In view of the small number of dissertations, which explored the problems of public-management of ensuring information security Ukraine, we have to ad...

  20. Changes in Spending and Labor Supply in Response to a Social Security Benefit Cut: Evidence from Stated Choice Data.

    Science.gov (United States)

    Delavande, Adeline; Rohwedder, Susann

    2017-12-01

    We investigate how individuals in the U.S. expect to adjust their labor force participation and savings if Social Security benefits were cut by 30 percent. Respondents were asked directly what they would do under this scenario. Using the resulting stated choice data we find that respondents would on average reduce spending by 18.2 percent before retirement and 20.4 percent after retirement. About 34.1% of respondents state they would definitely work longer and they would postpone claiming Social Security by 1.1 years. We investigate how working longer and claiming Social Security later would compensate partially for the loss in benefits among the individuals who are currently working, under the assumption that individuals retire and claim at the same time. Individuals would increase their Social Security benefits from the post-reform level due to additional earnings entering the benefit calculation and a smaller early claiming penalty (or higher delayed claiming credit). As a result, the Social Security benefit people would receive would drop on average by 21 rather than 30 percent. Still, the net financial loss, even after accounting for additional earnings, is sizeable for individuals in the lowest wealth tertile.

  1. Place and Role of Customs Bodies of the Russian Federation in Ensuring Economic Security of the State

    Directory of Open Access Journals (Sweden)

    Alexey A. Buzlov

    2017-03-01

    Full Text Available In this article author considers basics of economic security of the state, analyzes the role of the customs bodies of the Russian Federation. Author analyzes some international and national acts, opinions of scientists and practitioners. Attention is drawn to restrictions of political and economic nature imposed on the Russian Federation, officials, state and commercial organizations. In the conclusion author draws attention to some of the problems that exist in law enforcement practice.

  2. The Turkish state as a "neoliberal leviathan" under the AKP rule : the case of private security companies

    OpenAIRE

    Şanver, Abdullah

    2015-01-01

    This study focuses on private security companies as a component of the AKP’s security policies, which has enabled the Turkish state to extend its dominance over the society. The AKP era, spanning over ten years in Turkey, is a continuity of the neoliberal transformation that began with the Özal era in the 1980s. As the new actor of neoliberal transformation in Turkey, the AKP has implemented the transformation in question extensively. Thus, the AKP reign has become a period when the instituti...

  3. Current state in the research on electronic monitoring systems for the security and flow of objects and individuals

    Directory of Open Access Journals (Sweden)

    Man Dietrich Marcela

    2017-01-01

    Full Text Available This paper sets forth the current state of security systems in prisons from Romania and around the world, particularly aiming electronic systems of monitoring the flow of people, materials control and perimeter security, focusing on the research results concluded by motion detection tests and devices. The currently used systems were observed in order to put an analysis of the methodology together and implement and perfect these systems in protected areas. The protection of citizens must be performed to the extent that is allowed by the legislation.

  4. 75 FR 39437 - Optimizing the Security of Biological Select Agents and Toxins in the United States

    Science.gov (United States)

    2010-07-08

    ... agents and toxins with the potential to pose a severe threat to public health and safety, animal and... mass casualties or devastating effects to the economy, critical infrastructure, or public confidence... establishment of appropriate practices for physical security and cyber security for facilities that possess Tier...

  5. Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

    Science.gov (United States)

    2016-12-01

    have begun discussing strategies for securing entities in cyberspace—includ- ing the files and software belonging to corporations , government...through the best strategies for deterring cyber-incursions. The immigration analogy is particularly useful for exploring how would-be intruders learn...analysis, evaluation, and refinement of professional expertise in war, strategy , operations, national security, resource management, and responsible

  6. Examining the Relationship of Business Operations and the Information Security Culture in the United States

    Science.gov (United States)

    Wynn, Cynthia L.

    2017-01-01

    An increase in information technology has caused and increased in threats towards information security. Threats are malware, viruses, sabotage from employees, and hacking into computer systems. Organizations have to find new ways to combat vulnerabilities and threats of internal and external threats to protect their information security and…

  7. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in

  8. Cooperative Wireless Communications and Physical Layer Security : State of the Art

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication....

  9. Complementarities Between Nuclear Security, Safeguards and State System of Accounting for and Control

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2010-01-01

    Nuclear security deals with prevention against theft and diversion of nuclear materials and sabotage against nuclear materials or installations. It is based on provisions of physical protection of nuclear materials and facilities complemented by: - Provisions for accounting for and control to prevent and, where appropriate, detect loss, theft or diversion of nuclear materials; - The nuclear safety provisions to protect nuclear materials and facilities against sabotage. Safeguards are based on the statements and accounting controls in the facilities. The respective aim of EURATOM and IAEA controls is to verify afterwards the respect for the declared use of materials or political commitments undertaken by States under the non-proliferation purpose. However, EURATOM and IAEA controls are not exercised at all facilities (including those working for defence purposes) or in respect of all nuclear materials subject to the French national control. In addition, these international safeguards do not deal with physical protection of nuclear materials which is the sole responsibility of the State. The state control, implemented in France, is positioned upstream to the international controls. It aims to prevent, deter and detect the loss, theft or diversion of nuclear materials in installations or during transport. It places the responsibility of a possible diversion at the operator level. It is made of different components that complement each other and form a coherent whole. This includes: - physical protection; - accounting for and control; - inspections. The physical protection system has to protect nuclear materials against a malicious act. Malicious act means a theft or diversion of nuclear material or an act of sabotage affecting nuclear materials or facilities which could lead to radiological releases into the environment. The accounting for and control system of nuclear materials has to allow the continuous and accurate knowledge of the quantity, quality and location

  10. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Science.gov (United States)

    2010-08-23

    ... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...

  11. Bio-Security Measures Employed by Poultry Farmers in Enugu State ...

    African Journals Online (AJOL)

    User

    In spite of this, food security, improved livelihood and attainment of self- ..... experience in farm business management enables farmers to set realistic time and ... had no significant effect on biosecurity practices of poultry farmers is inconsistent.

  12. Geothermal heating retrofit at the Utah State Prison Minimum Security Facility. Final report, March 1979-January 1986

    Energy Technology Data Exchange (ETDEWEB)

    1986-01-01

    This report is a summary of progress and results of the Utah State Prison Geothermal Space Heating Project. Initiated in 1978 by the Utah State Energy Office and developed with assistance from DOE's Division of Geothermal and Hydropower Technologies PON program, final construction was completed in 1984. The completed system provides space and water heating for the State Prison's Minimum Security Facility. It consists of an artesian flowing geothermal well, plate heat exchangers, and underground distribution pipeline that connects to the existing hydronic heating system in the State Prison's Minimum Security Facility. Geothermal water disposal consists of a gravity drain line carrying spent geothermal water to a cooling pond which discharges into the Jordan River, approximately one mile from the well site. The system has been in operation for two years with mixed results. Continuing operation and maintenance problems have reduced the expected seasonal operation from 9 months per year to 3 months. Problems with the Minimum Security heating system have reduced the expected energy contribution by approximately 60%. To date the system has saved the prison approximately $18,060. The total expenditure including resource assessment and development, design, construction, performance verification, and reporting is approximately $827,558.

  13. Towards a platform to visualize the state of South Africa's information security

    CSIR Research Space (South Africa)

    Swart, I

    2014-08-01

    Full Text Available by province Various groups in business requires differentiated views and this remains true on a national level. Figure 4 is a graph view representing all internet facing devices grouped by their detected province. While not strictly related to security...Anonymous 2012, . [13] J. Webb, S. Maynard, A. Ahmad and G. Shanks. Towards an intelligence-driven information security risk management process for organisations. Presented at 24th Australasian Conference on Information Systems Proceedings. 2013, . [14...

  14. Human trafficking as a threat for the security of member states of EU

    Directory of Open Access Journals (Sweden)

    Mirela Kapo

    2017-07-01

    Full Text Available The topic “Trafficking of human beings” as subject to advanced studies has been chosen due to a growing interest linked with the phenomenon in question. The study introduces a legal criminal overview of the criminal activity consisted of the recruitment, transport, transfer or reception of persons by means of force or forms of fraud for exploitation purposes. Human trafficking represents a threat for the security of member states. The trend to penetrate to all spheres of the society has obliged the European states to draft a new directive reflecting the growing concern about the phenomenon in question, by respecting human rights in accordance with the legal framework under the United Nations, International Labor Organization (ILO, and Council of Europe etc. The new European priorities aim at victims’ identification, their protection and prevention of the phenomenon and more intense criminal prosecution of traffickers. With the view of fully developing this topic, the outline consists of four chapters preceded by a historical background of human trafficking. Special importance in this study, specifically in the second chapter, is attached to the assistance and protection of the victims of human trafficking. It is crucial that these victims exercise their rights effectively. Therefore, the European directives foresee assistance and support before, after and during the criminal proceeding. The third chapter refers to the relevant legal mechanisms in this field assuring the victims of trafficking legal defense, the right to information and their social, psychological and physical recovery. One of the “key” legal instruments is the Palermo Convention, which gives for the first time a detailed definition of the term of trafficking and smuggling and makes the differences between them. All legal instruments converge to one point: the consent of the human trafficking victim is not important when it is used any of the means of force, threat

  15. Robust quantum secure direct communication and authentication protocol against decoherence noise based on six-qubit DF state

    International Nuclear Information System (INIS)

    Chang Yan; Zhang Shi-Bin; Yan Li-Li; Han Gui-Hua

    2015-01-01

    By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0′〉 state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0′〉. By using the |0′〉 state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping–pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042. (paper)

  16. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  17. Promoting Safe, Secure, and Peaceful Growth of Nuclear Energy: Next Steps for Russia and the United States

    OpenAIRE

    Bunn, Matthew G.; Vyacheslav P. Kuznetzov

    2010-01-01

    Russia, the United States and other countries must cooperate to enable large-scale growth of nuclear energy around the world while achieving even higher standards of safety, security, and nonproliferation than are in place today. This will require building a new global framework for nuclear energy, including new or strengthened global institutions. The Belfer Center's Managing the Atom (MTA) Project and the Russian Research Center's Kurchatov Institute developed these and additional recommend...

  18. Secure and Robust Transmission and Verification of Unknown Quantum States in Minkowski Space

    Science.gov (United States)

    Kent, Adrian; Massar, Serge; Silman, Jonathan

    2014-01-01

    An important class of cryptographic applications of relativistic quantum information work as follows. B generates a random qudit and supplies it to A at point P. A is supposed to transmit it at near light speed c to to one of a number of possible pairwise spacelike separated points Q1, …, Qn. A's transmission is supposed to be secure, in the sense that B cannot tell in advance which Qj will be chosen. This poses significant practical challenges, since secure reliable long-range transmission of quantum data at speeds near to c is presently not easy. Here we propose different techniques to overcome these diffculties. We introduce protocols that allow secure long-range implementations even when both parties control only widely separated laboratories of small size. In particular we introduce a protocol in which A needs send the qudit only over a short distance, and securely transmits classical information (for instance using a one time pad) over the remaining distance. We further show that by using parallel implementations of the protocols security can be maintained in the presence of moderate amounts of losses and errors. PMID:24469425

  19. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Directory of Open Access Journals (Sweden)

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  20. Current and Projected National Security Threats to the United States. Hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Eleventh Congress, Second Session

    Science.gov (United States)

    2010-02-02

    trainers see the tribal areas of Paki- stan as less secure and this had led al-Qa’ida to franchise into re- gional components in places such as North...and is still subject to sudden reversal or gradual erosion. The daunting array of challenges fac- ing African nations makes it highly likely in the... closure of Guantanamo and the transfer of detainees abroad. Now, the second paragraph of the letter states the following, ‘‘The professional

  1. Model, Characterization, and Analysis of Steady-State Security Region in AC/DC Power System with a Large Amount of Renewable Energy

    Directory of Open Access Journals (Sweden)

    Zhong Chen

    2017-08-01

    Full Text Available A conventional steady-state power flow security check only implements point-by-point assessment, which cannot provide a security margin for system operation. The concept of a steady-state security region is proposed to effectively tackle this problem. Considering that the commissioning of the increasing number of HVDC (High Voltage Direct Current and the fluctuation of renewable energy have significantly affected the operation and control of a conventional AC system, the definition of the steady-state security region of the AC/DC power system is proposed in this paper based on the AC/DC power flow calculation model including LCC/VSC (Line Commutated Converter/Voltage Sourced Converter-HVDC transmission and various AC/DC constraints, and hence the application of the security region is extended. In order to ensure that the proposed security region can accurately provide global security information of the power system under the fluctuations of renewable energy, this paper presents four methods (i.e., a screening method of effective boundary surfaces, a fitting method of boundary surfaces, a safety judging method, and a calculation method of distances and corrected distance between the steady-state operating point and the effective boundary surfaces based on the relation analysis between the steady-state security region geometry and constraints. Also, the physical meaning and probability analysis of the corrected distance are presented. Finally, a case study is demonstrated to test the feasibility of the proposed methods.

  2. Obstacles in energy security: An analysis of congressional and presidential framing in the United States

    International Nuclear Information System (INIS)

    Below, Amy

    2013-01-01

    Despite decades of policymaking, the U.S. has only recently made significant strides in becoming a more energy secure nation. With a focus on the executive and legislative branches, this paper investigates two possible political obstacles to achieve this policy goal. The first question it asks is whether or not the two branches have been defining energy security in the same way. As the concept itself has no universal definition, it is possible that the branches have been focusing on different aspects of the term. Results from a content analysis of presidential speeches and congressional hearings suggest that no such division has occurred. The subsequent question asks whether or not the two branches, in tandem, are providing the foundation for sound policy. Results suggest that Congress and presidents have defined and discussed energy security in a generally balanced, comprehensive and internally non-conflictual way. What policy emerges from these discussions should be the subject of future research. -- Highlights: •A content-analysis of congressional hearings and presidential speeches was conducted. •Executive and legislative branches have been generally unified in how they frame the issue of energy security. •Both have avoided overreliance on sensationalized frames. •Both do not focus enough attention on energy efficiency and intensity

  3. United States Security Assistance 1977-1980: Human Rights Issues Affecting Arms Transfers.

    Science.gov (United States)

    1995-09-01

    police attempted to break up the gathering, the crowd became enraged and proceeded to destroy a number of banks, cinemas , and hotels (Brown:296...According to Carter’s National Security Advisor, Zbigniew Brzezinski, the Peruvian government released over 300 prisoners in April 1977; "disappearances

  4. 76 FR 78085 - Permissible Investments for Federal and State Savings Associations: Corporate Debt Securities

    Science.gov (United States)

    2011-12-15

    ...; Guidance on Due Diligence Requirements for Savings Associations in Determining Whether a Corporate Debt... commitments under the security for the projected life of the investment. For purposes of the Proposed Rule, an... sets forth supervisory expectations for savings associations conducting due diligence to determine...

  5. 75 FR 38595 - Guidance to States Regarding Driver History Record Information Security, Continuity of Operation...

    Science.gov (United States)

    2010-07-02

    ... licensing agencies, NIST Interagency Report (IR) 7621, Small Business Information Security: The Fundamentals... emergency. These plans should include a business impact analysis (BIA) to determine: the interdependence of... associated with restoring critical functions (including a line of succession in cases of staff unavailability...

  6. Energy security and climate change concerns: Triggers for energy policy change in the United States?

    Energy Technology Data Exchange (ETDEWEB)

    Bang, Guri, E-mail: guri.bang@cicero.uio.n [CICERO - Center for International Climate and Environmental Research Oslo, P.O. Box 1129, 0318 Oslo (Norway)

    2010-04-15

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress-the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo.

  7. Energy security and climate change concerns. Triggers for energy policy change in the United States?

    Energy Technology Data Exchange (ETDEWEB)

    Bang, Guri [CICERO - Center for International Climate and Environmental Research Oslo, P.O. Box 1129, 0318 Oslo (Norway)

    2010-04-15

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress - the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo. (author)

  8. The United States and security in Africa: the impact of the military ...

    African Journals Online (AJOL)

    The focus of this article is to examine the dynamics influencing the militarization of US-Africa relations and their impact on security and transformation in Africa. The article attempts to illuminate the ideological, economic and social forces that influence the conception and practice of the militarization of US policy towards ...

  9. United States Seaport Security: Protection Against a Nuclear Device Attack Delivered in a Shipping Cargo Container

    Science.gov (United States)

    2014-06-13

    off a radioactive dirty bomb, and on 29 June Moldavian undercover security agents posing as a North African buyer arrested six men trying to sell...military targets in various countries, including the 11 September 2001 attacks, 1998 U.S. Embassy bombings, USS Cole bombings, and 2002 Bali bombings

  10. 77 FR 33634 - U.S. Treasury Securities-State and Local Government Series

    Science.gov (United States)

    2012-06-07

    ... available for purchase by issuers of tax-exempt securities. Current financial market conditions have... Commissioner for Public Debt Accounting, Bureau of the Public Debt, at (304) 480-5101 or [email protected] the SLGS rate table. Interest is accrued and added to the principal daily. Interest is computed on the...

  11. Visa Security Policy: Roles of the Departments of State and Homeland Sec

    Science.gov (United States)

    2010-03-08

    report pursuant to S. Res.137., committee print, 81st Cong., 2nd sess., April 20, 1950. 11 8 U.S.C. 1104 . 12 8 U.S.C. 1201. Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS

  12. Globalisation, States, and Regionalisation: Analysing post-Cold War Security in the Mediterranean Region

    NARCIS (Netherlands)

    Amineh, M.P.; Grin, J.; Brauch, H.G.; Liotta, P.H.; Marquina, A.; Rogers, P.; Selim, M.E.-S.

    2003-01-01

    Is it possible to promote security in the Mediterranean through a process of increasing regional cooperation that builds upon the commonality in problems and opportunities more than on the mutual divides? In a comprehensive and enlightening analysis, Brauch (2001) has argued that this option is

  13. Energy security and climate change concerns: Triggers for energy policy change in the United States?

    International Nuclear Information System (INIS)

    Bang, Guri

    2010-01-01

    Why is it so difficult to change the energy policy status quo away from dependence on fossil fuels when the need to become less dependent on imported oil seems to be generally accepted by US politicians? In recent energy debates in the House and Senate, references to climate change and energy security were frequently used as a rationale for the need for energy policy change. But policymakers were not in agreement about what policy programs would be the best alternative or what goals the programs were to achieve in terms of addressing energy security or climate change, or both at the same time. The paper explores whether putting energy security and climate change on the decision making agenda simultaneously helped craft a political compromise in the 110th Congress-the Energy Independence and Security Act of 2007, and points out how the political institutions of the US structured interaction and affected policy outcome, and ultimately the chance of changing the energy policy status quo.

  14. Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations

    Science.gov (United States)

    Davis, Robert E.

    2017-01-01

    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing…

  15. Human Security in the Context of Sudan's State Crisis: The Case of ...

    African Journals Online (AJOL)

    ... lost more than 5 million citizens in civil wars. A violent confl ict erupted in 2003, with more than 250 000 civilians killed and more than 2 million people displaced. This article traces and examines the genesis and magnitude of human security challenges in the Darfur region of the Sudan. Africa Insight Vol. 37 (4) 2008 pp.

  16. Changing Roles of the United States and Japan in the Security of Southeast Asia

    Science.gov (United States)

    1994-03-01

    Mahatir Mohamad invoked the Internal Security Act (ISA) in 1981, which enabled him to detain his opponents without trial. He applied the ISA liberally and...since World War II, the reaction of Southeast Asian leaders was positive. Prime Minister Mahatir of Malaysia had "no problems whatsoever" with the

  17. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  18. United States Responses to Japanese Wartime Inhuman Experimentation after World War II: National Security and Wartime Exigency

    Science.gov (United States)

    Brody, Howard; Leonard, Sarah E.; Nie, Jing-Bao; Weindling, Paul

    2015-01-01

    In 1945-46, representatives of the United States government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the U.S., influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the U.S. played an equally key role in concealing information about the biological warfare experiments and securing immunity from prosecution for the perpetrators. The greater force of appeals to national security and wartime exigency help to explain these different outcomes. PMID:24534743

  19. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  20. Arms and technology transfers: Security and economic considerations among importing and exporting states

    International Nuclear Information System (INIS)

    Lodgaard, S.; Pfaltzgraff, R.L. Jr.

    1995-01-01

    The issues of technology and armament transfers are increasingly at the forefront of problems of international security and disarmament. Three major reasons could explain this. First, the disarmament process has been very successful in the last few years, especially in the field of nuclear, as well chemical and conventional, weapons. Second the disarmament effort underway concerns primarily the old partners of the East-West confrontation. Last, the general context, characterized by the opening and widening of exchanges, the increasingly open and transparent circulation of techniques and material, and the globalization of economic relations, must be taken into account. This report, prepared by UNIDIR comprises the following subjects: General trends in defense related transfers; Political/military factors associated with the diffusion of advanced technology; economic and technological consideration; and facilitation of economic growth/maximization of regional security and stability

  1. Fast and secure key distribution using mesoscopic coherent states of light

    International Nuclear Information System (INIS)

    Barbosa, Geraldo A.

    2003-01-01

    This work shows how two parties A and B can securely share unlimited sequences of random bits at optical speeds. A and B possess true-random physical sources and exchange random bits by using a random sequence received to cipher the following one to be sent. A starting shared secret key is used and the method can be described as a one-time-pad unlimited extender. It is demonstrated that the minimum probability of error in signal determination by the eavesdropper can be set arbitrarily close to the pure guessing level. Being based on the M-ry encryption protocol this method also allows for optical amplification without security degradation, offering practical advantages over the Bennett-Brassard 1984 protocol for key distribution

  2. State and Local Homeland Security Officials: Who Are They and What Do They Do?

    Science.gov (United States)

    2011-09-01

    importance of social networking and its direct impact upon the effectiveness of their work during an emergency. (Marcus, 2005, as adapted by Bell...strict constructionists who maintain that homeland security is about terrorism, middle-of-the-road moderates who sense that an all-hazards approach... method . As the interviews were conducted, data was analyzed and patterns emerged, which then provide insight into the population being studied. The

  3. United States-Gulf Cooperation Council Security Cooperation in a Multipolar World

    Science.gov (United States)

    2014-10-01

    in U.S.-forged security alliances . Finally, the events of the Arab Spring beginning in 2010, which swept away several governments and have led to...wealthiest countries on a per capita basis. Storming ahead with post-modern skylines, and rapidly growing nonoil sectors such as tourism , culture, real...estate, and finance, many GCC members are now economic political brands in their own right, ranging from Dubai’s metropolism to Qatar’s knowledge

  4. Bio-security measures employed by poultry farmers in Enugu State ...

    African Journals Online (AJOL)

    Major bio-security measures used by farmers include: inspection of flock daily to pick mortalities (x̄ =3.7), isolation and quarantine of sick birds (x̄ =3.7), vaccination of birds (x̄ =3.6), as well as adequate cleaning of feeding and drinking troughs (x̄ =3.6). The standardized coefficients for age (0.327), farming experience ...

  5. Security Notice To Federal, State and Local Officials Receiving Access to the Risk Management Program’s Off-site Consequence Analysis Information

    Science.gov (United States)

    Based on the Chemical Safety Information, Site Security and Fuels Regulatory Relief Act (CSISSFRRA), this notice states that while you may share with the public data from OCA sections, it is illegal to disclose/distribute the sections themselves.

  6. The State of Food (InSecurity in the Trans-Himalaya, Upper-Mustang, Nepal

    Directory of Open Access Journals (Sweden)

    Rishikesh Pandey

    2016-10-01

    Full Text Available Food insecurity is a global issue, with higher prevalence of hunger in developing countries. Low crop yield and food production - due to difficult topography and traditional farming methods - combined with lower income; fluctuations in prices and supply, and low quality of food have been causing food insecurity in Nepal. This research examines food (insecurity situation in Upper-Mustang, Nepal. The results are derived from the data collected through face–to-face interviews with the heads of 66 households, in-depth interviews conducted with 22 key informants, and discussions with the group of local people in different (6 places. The household food system was studied from livelihood perspectives and food (insecurity was assessed in relation to self-sufficiency or production sufficiency, access, utilization, and stability of food. Households in the Trans-Himalaya acquire food from multiple sources such as farming and livestock ranching, buy food from the market, and also receive food aid for the sake of survival during the food crisis. Food security situation in terms of self-production in Upper-Mustang is at worst stage that many households are facing severe to chronic food insecurity. Studied households access marketed food, though the price they pay is very high. The worrisome issue is that there is no significant improvement in food security situation over time in the Trans-Himalaya. Study found that not the household size but dependency ratio in the household increases food insecurity. On the other hand, quality of farmland in terms of cropping intensity and availability of irrigation rather than the farm-plot size contribute for food security. The issue of food security is still a valid development policy goal for Nepal in general and for the Trans-Himalaya in particular. Accordingly, food security interventions are important. Yet, policy for interventions should look into all components of food systems, particularly providing irrigation

  7. Safeguards and security by design support for the next generation nuclear plant project - Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Bjornard, T.; Casey Durst, P.

    2013-01-01

    The Next Generation Nuclear Plant (NGNP) project was authorized by the United States Energy Policy Act of 2005 with the principal objective of designing, licensing, and building a Generation IV nuclear plant capable of producing both high-temperature process heat and electricity. The two candidate NGNP reactor concepts are pebble- and prismatic-fueled high-temperature gas reactors that will be licensed by the U.S. Nuclear Regulatory Commission (NRC). The conceptual design phase of the project was completed in December 2010. This paper summarizes support provided to the NGNP project to facilitate consideration of international safeguards during the design phase, or safeguards by design (SBD). Additional support was provided for domestic safeguards (material control and accounting) and physical protection, or safeguards and security by design (2SBD). The main focus of this paper is on SBD and international safeguards. Included is an overview of the international safeguards guidance contained in guidance reports for SBD. These reports contain guidance and suggestions intended to be useful to the industry design teams, but they do not contain ready-made solutions. Early and frequent interaction of design stakeholders with the International Atomic Energy Agency and the NRC are essential to a successful endeavor. The paper is followed by the slides of the presentation. (author)

  8. The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security.

    Science.gov (United States)

    Verhoeven, Harry

    2013-11-13

    As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces.

  9. Advances and current state of the security and privacy in electronic health records: survey from a social perspective.

    Science.gov (United States)

    Tejero, Antonio; de la Torre, Isabel

    2012-10-01

    E-Health systems are experiencing an impulse in these last years, when many medical agencies began to include digital solutions into their platforms. Electronic Health Records (EHRs) are one of the most important improvements, being in its most part a patient-oriented tool. To achieve a completely operational EHR platform, security and privacy problems have to be resolved, due to the importance of the data included within these records. But given all the different methods to address security and privacy, they still remain in most cases as an open issue. This paper studies existing and proposed solutions included in different scenarios, in order to offer an overview of the current state in EHR systems. Bibliographic material has been obtained mainly from MEDLINE and SCOPUS sources, and over 30 publications have been analyzed. Many EHR platforms are being developed, but most of them present weaknesses when they are opened to the public. These architectures gain significance when they cover all the requisites related to security and privacy.

  10. National Security in the Nuclear Age. A Conference for State Social Studies Coordinators on Pre-Collegiate National Security Education (Washington, DC, June 26-July 1, 1983).

    Science.gov (United States)

    Trout, B. Thomas; And Others

    This conference report addresses education on national security and international relations in secondary school courses in the social studies. Main conclusions of the conference are: (1) Topics on national security should be added to the secondary school curriculum. (2) Current institutional and instructional settings are open to inclusion of…

  11. Security, at what cost? A stated preference approach toward understanding individuals' privacy and civil liberties trade-offs regarding security measures

    NARCIS (Netherlands)

    Robinson, N.; Potoglou, D.

    2010-01-01

    In the presently heightened security environment there are a number of examples of policy that must strike a delicate balance between strengthening security without jeopardising public liberties and personal privacy. The introduction of national identity cards and biometric passports, the expansion

  12. The United States, Japan, and Australia: Security Linkages to Southeast Asia

    Science.gov (United States)

    2011-04-01

    Prime Minister and Defense Minister Datuk Seri Najib Tun Razak in mid-March 2007 stated that user states that want to see better safety arrangements...defense minister Najib stated that the U.S. would be welcome to provide aircraft for “Eyes in the Sky” as long as the personnel on board were exclusively

  13. The Security Aspect of Turkey-United States Relations: In Search For a New Model

    Directory of Open Access Journals (Sweden)

    Irina A. Svistunova

    2016-01-01

    Full Text Available Security cooperation has always been an important aspect of the relations between Turkey and the USA. In Cold War era Turkish-American interaction within NATO played a crucial role in this cooperation. After that period the two countries began to search for a new model of their relations. Both Turkey and the USA started to use cooperation within NATO for the purpose of strengthening their global positions. At the same time the USA aspiration to use military bases in Turkey beyond NATO obligations frequently becomes a source of disagreement and crises in the relations of the two countries as it happened during the American intervention to Iraq in 2003. At present new challenges for regional security, especially in the Middle East, demands new forms of interaction between Turkey and the USA. The beginning of "the Arab spring" was met in Ankara and Washington with overlapping interest in changing conservative regimes and promoting "Turkish model". At the same time such questions as participation of Turkey in the fight against ISIL and the USA military cooperation with the Syrian Kurds, whom Ankara considers to be connected with the PKK terrorist organization, has brought serious contradictions between the two countries. The cause of these contradiction is the difference in the perception of threats in Turkey and in the Western countries. While the search for new forms of security cooperation meets with difficulties, NATO remains important for the relations between Turkey and the USA, despite traditionally high level of anti-NATO moods in the Turkish society.

  14. Security, independence, and sustainability: Imprecise language and the manipulation of energy policy in the United States

    International Nuclear Information System (INIS)

    Littlefield, Scott R.

    2013-01-01

    This article examines the impact of imprecise terminology on the energy policymaking process in US, focusing on the manipulation of discourse by different political–economic interests seeking to sway popular opinion. Using the 2012 US Presidential Elections as a backdrop, the analysis highlights the cooption of the concepts “security,” “independence,” and “sustainability” in energy debates by different and often opposing interest groups. The article’s first section traces the malleability of energy terminology to the vagueness of the term “energy” itself and notes how qualifying words like security, independence, and sustainability have been selectively exploited to introduce further ambiguity to an already fungible concept. The second section notes that while energy is a critical and complex factor of macroeconomic production, its main public visibility comes via a few partially representative numbers, like gasoline prices. This mismatch of broad social importance and piecemeal public understanding enables organized interests to leverage vague terminology in support of particular policy ideas. The third section examines three policymaking tools (1) taxation, (2) regulation, and (3) technology promotion and compares these administrative instruments. Ultimately, the article concludes that loosely defined terminology inhibits energy policy discussion and stifles meaningful public debate over and action on energy issues. - Highlights: ► This article examines the impact of imprecise terminology on US energy policymaking. ► Energy security, energy independence, and sustainability are vaguely defined terms. ► Coordinated interests manipulate debate and exploit public ignorance. ► Taxes, regulation, and innovation incentives are used to apply policy prescriptions. ► Vague terminology stifles meaningful public debate over energy policy.

  15. MODELING OF PROCESSES OF OVERCOMING CONTRADICTIONS OF THE STATE AND ECONOMIC OPERATORS FOR THE SECURITY AND FACILITATION OF CUSTOMS PROCEDURES

    Directory of Open Access Journals (Sweden)

    Berezhnyuk Ivan

    2018-03-01

    Full Text Available Introduction. The issue of simultaneous provision of economic security of the state and simplification of customs procedures is actualized nowadays. The author of the study stressed the importance to create a «safe» business environment from the point of view of the customs sphere, which is based on «security», «justice» and «stability». Purpose. Development of methodical recommendations for modeling the processes of overcoming contradictions of the state and subjects of foreign economic activity in the field of security and simplification of customs procedures. Results. The research indicates that the appointment of revenue and fee bodies is the creation of favorable conditions for the development of foreign economic activity, ensuring the safety of society, protecting the customs interests of Ukraine. When performing customs duties by the SFS, the tasks assigned to them, aimed at ensuring the correct application, strict observance and prevention of non-compliance with the requirements of the Ukrainian legislation on state customs issues, may present risks that are inherently contradictory, conflicting in terms of the vector of action with respect to each other, namely: the probability of non-compliance by the subjects of foreign trade with the norms of customs legislation, or the creation of significant bureaucratic barriers in the process of economic operators. There is a peculiar conflict of interests between the state and the subjects of foreign economic activity. The main direction of creating a favorable business environment in accordance with the recommendations of WCO is the process of further simplification of customs procedures for subjects with a high degree of trust, fighting corruption and facilitating the movement of goods, vehicles and people in general. Conclusions. Thus, the scheme of «relations» between the state and the subjects of foreign economic activity can be modeled by the means of game theory, which is

  16. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  17. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  18. Do biofuel blending mandates reduce gasoline consumption? Implications of state-level renewable fuel standards for energy security

    Science.gov (United States)

    Lim, Shinling

    In an effort to keep America's addiction to oil under control, federal and state governments have implemented a variety of policy measures including those that determine the composition of motor gasoline sold at the pump. Biofuel blending mandates known as Renewable Fuel Standards (RFS) are designed to reduce the amount of foreign crude oil needed to be imported as well as to boost the local ethanol and corn industry. Yet beyond looking at changes in gasoline prices associated with increased ethanol production, there have been no empirical studies that examine effects of state-level RFS implementation on gasoline consumption. I estimate a Generalized Least Squares model for the gasoline demand for the 1993 to 2010 period with state and time fixed effects controlling for RFS. States with active RFS are Minnesota, Hawaii, Missouri, Florida, Washington, and Oregon. I find that, despite the onset of federal biofuel mandates across states in 2007 and the lower energy content of blended gasoline, being in a state that has implemented RFS is associated with 1.5% decrease in gasoline consumption (including blended gasoline). This is encouraging evidence for efforts to lessen dependence on gasoline and has positive implications for energy security.

  19. State of the Art of Network Security Perspectives in Cloud Computing

    Science.gov (United States)

    Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang

    Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

  20. "The Islamic State Of Iraq And The Levant" (ISIL In The System Of Threats To The National Security Of Russia

    Directory of Open Access Journals (Sweden)

    Pavel V. Agapov

    2014-09-01

    Full Text Available In the present work authors analyze political, economic, military and many other aspects of the "Islamic State of Iraq and Levant" activity as essential factor of the destabilization in the region of the Middle East. Authors investigate destructive consequences of this terrorist religious group's positions strengthening for the national security of the Russian Federation and border states. Authors note that actions in Syria and Iraq have indirect, but transnational effect, pose threat to the interests of the national security of Russia, especially including one, conducted in Crimea with the use of Islamic radicals for this purpose, who are on the peninsula and territory of the Ukraine. In the present article authors note that every year in the process of the population's psychological fatigue strengthening, new losses among the military personnel and the intelligence services staff and also death of peaceful citizens, their positions will only amplify. "Defeatism" will become a powerful political force. Problem of the international legal aspect of the counteraction to the threat from the actions of foreign fighters-terrorists who are hired or accepted with ISIL, al-Nusra Front and other groups and organizations of the terrorist orientation is connected with the implementation of the UN Security Council Resolution 2178 (2014 made on September 24, 2014. It’s main objective – development of the nonviolent ways of the conflicts prevention and settlement for the purposes of the radicalization to the level generating terrorism risk degree decrease. In the conclusion authors argument that it is especially actual for the Russian regions, which is extremely vulnerable to extremism (North Caucasus, Volga Region.

  1. (Mutual Security Mutual Affluence) Negative Factors = Sustained Stability: A Framework for Establishing Stability Between Like States

    Science.gov (United States)

    2017-03-31

    160-163. 2 The Concept of Mutually Assured Destruction (MAD) dates back to the post-WWFI em and the Cold War where the United States and Soviet Unions...United States. Following its defeat in W\\VH, Japan was in shambles. The bombing campaigns left nine million Japanese homeless and three million more...the United States, the Charlie Hebdo attacks in Paris in 2015, and the bombings in Istanbul in 2016. Michael Bamier, “From Mutual Assistance to

  2. Security of quantum key distribution with a laser reference coherent state, resistant to loss in the communication channel

    International Nuclear Information System (INIS)

    Molotkov, S N; Potapova, T A

    2015-01-01

    The problem of quantum key distribution security in channels with large losses is still open. Quasi-single-photon sources of quantum states with losses in the quantum communication channel open up the possibility of attacking with unambiguous state discrimination (USD) measurements, resulting in a loss of privacy. In this letter, the problem is solved by counting the classic reference pulses. Conservation of the number of counts of intense coherent pulses makes it impossible to conduct USD measurements. Moreover, the losses in the communication channel are considered to be unknown in advance and are subject to change throughout the series parcels. Unlike other protocols, differential phase shift (Inoue et al 2002 Phys. Rev. Lett. 89 037902, Inoue et al 2003 Phys. Rev. A 68 022317, Takesue et al 2007 Nat. Photon. 1 343, Wen et al 2009 Phys. Rev. Lett. 103 170503) and coherent one way (Stucki et al 2005 Appl. Phys. Lett. 87 194108, Branciard et al 2005 Appl. Phys. Lett. 87 194108, Branciard et al 2008 New J. Phys. 10 013031, Stucki et al 2008 Opt. Express 17 13326), the simplicity of the protocol makes it possible to carry out a complete analysis of its security. (letter)

  3. Recommendations for Homeland Security Organizational Approaches at the State Government Level

    National Research Council Canada - National Science Library

    Woodbury, Glen

    2004-01-01

    ..., administer, and ensure effectiveness of these structures. States have begun to establish decision-making bodies independently, inconsistently, and with few measurements to evaluate effectiveness...

  4. A new cyber security risk evaluation method for oil and gas SCADA based on factor state space

    International Nuclear Information System (INIS)

    Yang, Li; Cao, Xiedong; Li, Jie

    2016-01-01

    Based on comprehensive analysis of the structure and the potential safety problem of oil and gas SCADA(Supervisor control and data acquisition) network, aiming at the shortcomings of traditional evaluation methods, combining factor state space and fuzzy comprehensive evaluation method, a new network security risk evaluation method of oil and gas SCADA is proposed. First of all, formal description of factor state space and its complete mathematical definition were presented; secondly, factor fuzzy evaluation steps were discussed; then, using analytic hierarchy method, evaluation index system for oil and gas SCADA system was established, the index weights of all factors were determined by two-two comparisons; structure design of three layers in reasoning machine was completed. Experiments and tests show that the proposed method is accurate, reliable and practical. Research results provide the template and the new method for the other industries.

  5. Regional Security in the Gulf of Guinea; A Vital Interest of the United States

    Science.gov (United States)

    2010-03-18

    corrupt and authoritarian , and ultimately drove the country’s economy to a dilapidated state. This abuse of public funds and power led to the...Secretary Of State Rice said it well on June 6th, 2006, “Our policy toward Africa is rooted in partnership not paternalism , in doing things with

  6. The atomic power state and national security - the hazardous nuclear potential

    International Nuclear Information System (INIS)

    Damm, W.; Daniels, W.

    1989-01-01

    The authors have chosen the uranium/plutonium cycle, the problems involved in safety engineering of power plant, and the power industry's structural pattern in order to show and to prove the doubtfulness of safety philosophies developed for nuclear energy which in fact is not mastered by the country's technological, social, or economic capabilities. The party 'The Greens' considers nuclear energy to be a hazard to national security and therefore demands prompt abandonment of nuclear power in order to save man and the natural environment. Surplus power supply is to be replaced by the concept of demand-tailored power generation, which is to be placed on the following footing: (1) purposeful and intelligent utilisation of energy allowing dramatic reduction of energy consumption; (2) Use and promotion of renewable energy sources; (3) Abandonment of monopolistic and undemocratic structures in the energy sector of the economy. (orig./HSCH) [de

  7. SECURITY RISKS, MYTHS IN A TRANSITIONING SUB-NATIONAL REGIONAL ECONOMY (CROSS RIVER STATE AND IMAGINATIVE GEOGRAPHIES OF NIGERIA

    Directory of Open Access Journals (Sweden)

    J. K. UKWAYI

    2015-03-01

    Full Text Available The emergence of an “international community” through accumulation of perceived risks that contrasts with those risks (of considerably lower levels of seriousness compared to those perceived constitutes one of the interesting (or intriguing subjects of risks and disaster studies surrounding the 9/11 era. The constructions of “imaginative geographies”, have frequently been biased in the practices that underlie the mapping of the foreign places tend to put-down the affected regions in their “paintings” for the global community. The latter are subsequently “demonized” in their ratings of competence for participating in world trade, tourism, travel, among other social/cultural, and economic and political activities. The objective of this article is to highlight how the exaggeration of risks (contrasted to actually existing/lived risks, practices that are frequently associated with such adverse “imaginative geographies” poses sub-national regional development dilemma in Nigeria’s Niger Delta. We trace the roots of adverse “imaginative geographies” of Nigeria to the Abacha dictatorship (1993-1997. Then we highlight the mixed characteristics of the Niger Delta conditions during the “return of positive image recapture” by Nigeria’s federal government (re-democratisation of the Fourth Republic, 1999-present, re-branding campaigns; as well as adverse conditions present. Most significantly, we show that despite these adversities, a combination of favorable geographical size, differentiation, sub-national regional security programme formulation and management taking aims at diversification have created “large oases” of peace and security in Cross River State, a part of the Niger Delta that has been completely unscathed by insurgencies of the nearby sub-national region and further away national origin. Apart from identifying sub-national regions qualifying for delisting from “adverse imaginative geographies” due to

  8. Multi-state Markov model for disability: A case of Malaysia Social Security (SOCSO)

    Science.gov (United States)

    Samsuddin, Shamshimah; Ismail, Noriszura

    2016-06-01

    Studies of SOCSO's contributor outcomes like disability are usually restricted to a single outcome. In this respect, the study has focused on the approach of multi-state Markov model for estimating the transition probabilities among SOCSO's contributor in Malaysia between states: work, temporary disability, permanent disability and death at yearly intervals on age, gender, year and disability category; ignoring duration and past disability experience which is not consider of how or when someone arrived in that category. These outcomes represent different states which depend on health status among the workers.

  9. 77 FR 43151 - Permissible Investments for Federal and State Savings Associations: Corporate Debt Securities

    Science.gov (United States)

    2012-07-24

    ...), (E), or (F) of the Home Owners Loan Act (``HOLA''). The FDIC currently may require a state savings... authorized for a Federal savings association under any statute including the Home Owners' Loan Act (HOLA) (12...

  10. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    National Research Council Canada - National Science Library

    Shawhan, Karl

    2001-01-01

    .... Nontraditional threats, however, pose asymmetric dilemmas for the United States. The increased U.S. military and economic reliance on information systems introduces new vulnerabilities not adequately protected by traditional kinetic force arms...

  11. Northeast Asia - Cultural Influences on the United States National Security Strategy

    National Research Council Canada - National Science Library

    Rogers, Larry

    2004-01-01

    .... A decade ago this approach towards the states of the Northeast Asia region was highly effective as their economic or military dependency upon us or their fear of both usually forced them to respond...

  12. A cross-case comparative analysis of international security forces' impacts on health systems in conflict-affected and fragile states.

    Science.gov (United States)

    Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz

    2015-01-01

    Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts

  13. Repressive Actions of the State Security Against True Orthodox Church Structures in the Ukrainian SSR (1944–1953

    Directory of Open Access Journals (Sweden)

    Vedeneev Dmitrii

    2016-04-01

    Full Text Available In the article on the basis of unknown scientific community documents of the Soviet state security bodies provides an analysis of the objectives and key areas of operational work and repressive actions of the security services communities against True Orthodox Church (TOC in the Ukrainian SSR in 1944–1953. The characteristic of agent and operational developments NKGB–MGB–KGB of the USSR against the so-called «catacomb Church», as a form of religious and social protest against aggressive atheistic policy of the Communist authorities, infringement of the rights of believers. The basic forms and methods of intelligence and operational activities of the security organs, aimed at creating informer positions in the environment of the communities of the TOC, making the split in the ranks of the adepts of secret religious sects, the collection of «compromising material» as the basis for the application of harsh repressive measures against the movement of the TOC. The authors pay special attention to the organization and personnel of units of the NKGB–MGB–KGB, engaged, according to the terminology, «the struggle with the Church-sectarian counterrevolution» and «Church-monarchist underground», a leading representative of which was considered in the TOC, particularly active in Chernihiv, Sumy, and Kharkiv oblasts of the Ukrainian SSR and the Donbass, and also in the neighboring regions of the Russian black soil region and the North Caucasus. Given the author’s periodization of the development of the catacomb movement, highlights the historical conditions of its creation and release in the USSR. Through the prism of intelligence documents examines the liturgical aspect of the TOC, its governing structure, forms of secrecy and concealment from the prosecution authorities, the position of the catacomb members in relation to social life and social structure in the USSR.

  14. A survey of energy policy priorities in the United States: Energy supply security, economics, and the environment

    International Nuclear Information System (INIS)

    Manley, Dawn K.; Hines, Valerie A.; Jordan, Matthew W.; Stoltz, Ronald E.

    2013-01-01

    Security, environment, and economic concerns are commonly identified as three major objectives of energy policy. State and federal governments have set aggressive targets for carbon emissions reductions and for alternative fuel use and increased vehicle efficiency to reduce petroleum consumption. Moreover, jobs creation and GDP growth are often cited as key drivers for energy policies. Previous studies on energy policy decision-making have examined the process for developing and evaluating options using multi-criteria decision analysis tools. In addition, energy opinion polls have either elicited preferences between two goals or whether the public supports a specific policy action. In this article, we report results from a survey of 884 members of professional membership organizations on how the U.S. should prioritize energy policy across the goals of energy supply security, environment and climate, and economics and job creation. The majority favor policymaking that is balanced across all three. Security and economic concerns increase with age for male respondents, whereas environment is the highest priority for females regardless of age. Unlike previous surveys that target the general public and focus on a particular objective or technology, these results provide an example of eliciting a portfolio allocation across multiple energy policy goals from targeted constituents. - Highlights: • We surveyed 884 members of professional membership organizations on how the U.S. should prioritize energy policy. • The paper addresses direct elicitation of energy policy goal portfolio allocation for a large set of energy stakeholders. • The majority of respondents favor policymaking balanced across multiple goals. • We observed differences in priorities based on age and gender. • Respondents expressed a tension in allocating across goals that are interrelated

  15. The Impact of Pro-Government Militias on State and Human Security: A Comparative Analysis of the Afghan Local Police and the Janjaweed

    Science.gov (United States)

    2018-03-01

    employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and human security. This study also...security to the principal who employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and...Uzbek forces, the United States and its allied partners momentarily destroyed most of the al Qaeda operatives in Afghanistan while simultaneously

  16. State Labour Inspectorate – specialized authority exercising supervising and control tasks in the field of labour security and health

    Directory of Open Access Journals (Sweden)

    Nicolae ROMANDAŞ

    2016-06-01

    Full Text Available In present, State Labour Inspectorate is the main supervisory body in health and safety at the work, and has all the rights to exercise an efficient control in order to target the compliance of employers of legal regulations which aim mentioned sphere. Therefore, the mechanism which involves changes in work culture, the most important from of them which refers to security and healthy of work place, take place in our society for harmonization and labor market adjustment. It is obviously that more units start to realize that human resources are most important capital of an organization and is the decisive factor in the production process. That’s why employers should be conscious about the fact that security of an employee it’s not an expanse, but a necessary investment to avoid some costs, direct or indirect caused by work stoppages in the case of a serious and imminent danger or in cases the most unfortunate, the consequences of accidents at work and occupational diseases.

  17. United States foreign oil policy since World War 1 : for profits and security. 2 ed.

    Energy Technology Data Exchange (ETDEWEB)

    Randall, S.J.

    2005-07-01

    This book provided a historical context for United States global oil politics, with a focus on the goals, accomplishments and challenges of United States foreign oil policy, as well as on the relationship between the state and private sectors. This second edition has integrated developments in global politics since the end of the Cold War. It was suggested that many factors have provided the context for oil policy formation: a succession of crises in Iran since the 1950s; 2 wars in Iraq; U.S. intervention in Afghanistan; the threat of international terrorism since September 11, 2001; ongoing conflicts between Israel and the Arab nations in the Middle East; political instability in Saudi Arabia and in Venezuela and the trend towards trade and investment liberalization in Latin America in the 1990s. In addition, the emergence of oil sands reserves in Canada and other sources of non-conventional oil were discussed. Nationalism and oil policies in the Depression and World War 2 were examined. The structure of decision-making in oil policies was examined. Domestic and offshore resources were reviewed, and an outline of international agreements and relationships was presented. Issues concerning OPEC countries and the Iranian Revolution were examined. It was concluded that the United States has become more and not less vulnerable, despite its military strength. The author suggested that the main policy challenge to the United States may well be the tension between its commitment to Israel and its determination to avoid alienating the Arab oil-producing states. refs., tabs., figs.

  18. The Strategic Petroleum Reserve: United States energy security, oil politics, and petroleum reserves policies in the twentieth century

    Science.gov (United States)

    Beaubouef, Bruce Andre

    The history of U.S. petroleum reserves policies in the twentieth century, including the Strategic Petroleum Reserve (SPR) program, provides a case study of the economic and political aspects of national security, and shows the ways in which the American political economy influences national security. One key problem plagued federal petroleum reserve programs and proposals throughout the twentieth century. In a political economy which traditionally placed strong emphasis upon the sanctity of private property and free markets, could the government develop an emergency petroleum reserve policy despite opposition from the private sector? Previous literature on the SPR and oil-stockpiling programs has largely disregarded the historical perspective, focusing instead upon econometric models, suggesting future oil-stockpiling policy options. This study will also make conclusions about the future of governmental oil-stockpiling policies, particularly with regard to the SPR program, but it will do so informed by a systematic history of the emergency petroleum reserve impulse in the twentieth century. Through a study of the emergency petroleum reserve impulse, one can see how the American political economy of oil and energy changed over the twentieth century. As petroleum became crucial to the military and then economic security of the United States, the federal government sought to develop emergency petroleum reserves first for the military, then for the civilian economy. But while the American petroleum industry could deliver the energy "goods" to American energy consumers at a reasonable price, the companies reigned supreme in the political equation. While that was true, federal petroleum reserve programs and proposals conflicted with and were overwhelmed by the historic American tradition of individual economic and private property rights. The depletion of American petroleum reserves changed that political equation, and the ensuing energy crises of the 1970s not only

  19. Economic separatism in the European Union member states as a factor of regional security

    Directory of Open Access Journals (Sweden)

    A A Shakhina

    2014-12-01

    Full Text Available The article is devoted to the examination of the economic separatism problem in the European Union member states. It considers specific of the regional separatist movements as exemplified by the conflicts in Scotland, Catalonia, Bavaria, Flanders. Various points of view on the relevance of the budgetary separatism for the European integration process are given in the article.

  20. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Science.gov (United States)

    2012-12-26

    ..., Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records... made for the committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory..., Local, Tribal, and Private Sector Entities. DATES: The meeting will be held on January 30, 2013, 10:00 a...

  1. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.

    Science.gov (United States)

    Pirandola, Stefano; Braunstein, Samuel L; Lloyd, Seth

    2008-11-14

    We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.

  2. Environmental Security: What Environmental Issues Impact Regional Stability and Affect United States Foreign Policy with Mexico?

    Science.gov (United States)

    1997-03-01

    extraregional sponsor of Alianza para el Desarrollo Sostenible (Sustainable Development Alliance - ALIDES), along with United States and Canada. ALIDES is...more stable the government the better the country will be able to solve its environmental problems. 42 Glossary ALIDES Alianza para el Desarrollo ... Sostenible (Sustainable Development Alliance) C Centigrade CFCs Chlorofluorocarbons BECC Border Environment Cooperation Commission BNC Binational

  3. Northeast Asia - Cultural Influences on the United States National Security Strategy

    Science.gov (United States)

    2004-03-19

    established that it was socially responsible for an individual to take his or her own life for the good of the whole. Taoism states that life and death are...Confucian, Japanese, Islamic , Hindu, Slavic-Orthodox, Latin American and possibly African. Although this proposal is modern and forward thinking, there is

  4. Comment on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'

    International Nuclear Information System (INIS)

    Gao Fei; Guo Fenzhuo; Wen Qiaoyan; Zhu Fuchen

    2005-01-01

    In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], a quantum secret sharing protocol based on reusable Greenberger-Horne-Zeilinger states was proposed. However, in this Comment, it is shown that this protocol is insecure if Eve employs a special strategy to attack

  5. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition); Objetivo y elementos esenciales del régimen de seguridad física nuclear de un Estado. Nociones fundamentales de seguridad física nuclear

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2014-10-15

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  6. SOSPO-SP: Secure Operation of Sustainable Power Systems Simulation Platform for Real-Time System State Evaluation and Control

    DEFF Research Database (Denmark)

    Morais, Hugo; Vancraeyveld, Pieter; Pedersen, Allan Henning Birger

    2014-01-01

    Measurement Units (PMUs) provides more information and enables wide-area monitoring with accurate timing. One of the challenges in the near future is converting the high quantity and quality of information provided by PMUs into useful knowledge about operational state of a global system. The use of real-time...... simulation in closed-loop is essential to develop and validate new real-time applications of wide-area PMU data. This paper presents a simulation platform developed within the research project Secure Operation of Sustainable Power Systems (SOSPO). The SOSPO simulation platform (SOSPO-SP) functions...... in a closed-loop, integrating new real-time assessment methods to provide useful information to operators in power system control centers and to develop new control methodologies that handle emergency situations and avoid power system blackouts....

  7. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  8. Analysis of Maize versus Ethanol Production in Nebraska, United States and International Agricultural Droughts: Lessons for Global Food Security

    Science.gov (United States)

    Boken, V.; Tenkorang, F.

    2012-04-01

    Nebraska is one of the eight main corn (maize) belt states of the United States. Maize is the major crop of Nebraska with an average annual production of about 38 million tons (about 12% of U.S. production), which contributes billions of dollars to the state's economy. The yield of maize has increased significantly over the past century - from 1.6 t/ha in 1900 to 10.4 t/ha in 2010. While the majority of maize (about 40%) is currently used for animal feed and ethanol production, only about six percent is exported. It is estimated that about one billion people accounting for about 15% population of the world live in chronic hunger because of low agricultural productivity and drought. Most of these people depend on the U.S. for grains including maize. If a greater quantity of maize is diverted to ethanol production, considerably less quantity of maize would be available for export to developing countries where it could be used for human consumption and to mitigate hunger and improve food security. This paper presents analysis of maize production in Nebraska for the past three decades and examines how its commercialization for ethanol production has affected its exports in the face of drought at an international level.

  9. Venezuelas Pursuit of Caribbean Basin Interests: Implications for United States National Security.

    Science.gov (United States)

    1985-01-01

    sold to buyers in Western Europe and the United States. The most important Venezuelan exports in the 19th century were cocoa and coffee. In the 20th...confusion in the U.S. Congress over the difference between the Organiza- tion of Arab Petroleum Exporting Countries (OAPEC), of which Venezuela was not a...member, and the Organization of Petroleum Exporting Countries (OPEC), to which Venezuela belonged, the action remained in force even though Caracas had

  10. The National Guard State Partnership Program and Regional Security in the Western Balkans

    Science.gov (United States)

    2014-12-12

    educational system as well as youth movements are separated by ethnicity, which in turn leaves the young people susceptible to indoctrination and political...of the state to respond in natural emergencies.80 A testament of the effectiveness of the program is also its expansion from strictly mil-mil... testament of the friendship, we have deployed together to Afghanistan and continue to look for future military collaborations. Deployments are the

  11. Nuclear Electricity in the United States : Providing Energy For The Nation's Security and Well-Being

    International Nuclear Information System (INIS)

    Finger, Harold B.

    1988-01-01

    Nuclear energy in the United States has made major contributions since the small Shippingport prototype power plant began operating in 1957. Recent legislative and regulatory actions, as well as research an development, are indicating that additional nuclear capacity can be available in the years ahead. These actions reflect the public's recognition of the importance of nuclear energy. In addition, recent regulatory actions are reaffirming the health and safety of our current nuclear plants, as well as of those being completed. The performance of our current plants is being improved through the conscious dedication of the entire industry to excellence. There is increasing discussion in the United States of the importance of advanced reactor concepts development. The next generation of nuclear plants is already being ordered outside of the United States for example, here in Korea, in Japan, in the United Kingdom and those plants all use light water reactors. We are pleased that U. S. companies are working with you on these new plants. That continues to mean that we never let up on our drive for excellence. Excellence in operations must continue to be the conscious target of all operators. Excellence in communications to the public of the need for electrical capacity, of the benefits of nuclear energy, and of the excellence being achieved in operations is also essential. And excellence in communication to decision makers at all levels of government is also required to assure that sound legalisation and regulation is established and implemented

  12. Timor-Leste’s Foreign Policy: Securing State Identity in the Post-Independence Period

    Directory of Open Access Journals (Sweden)

    Selver B. Sahin

    2014-01-01

    Full Text Available This paper examines some of the major ideational aspects of Timor-Leste’s foreign policy orientation in the post-independence period. Drawing upon the constructivist accounts of state behaviour, the paper situates Timorese leaders’ foreign policy decisions in the broader context of their search to position the fledging nation in the global political order. It argues that Timor-Leste’s insecure state identity has shaped its leaders’ foreign policy preferences in the post-independence period. This identity can be examined by separating it into two parts: the construction of spatial boundaries and the creation of a temporal “other”. The former is evidenced by the leadership’s rhetorical emphasis on the country’s Portuguese heritage and their prioritisation of ASEAN membership, both of which are closely related to the consolidation of the young nation’s political and cultural identity. The creation of a temporal other, as illustrated by the rise of political discourse emphasising sovereignty, reflects a wider transitional process that is embedded in the country’s transformation from colony to independent state under international supervision as well as the state’s transformation from “fragile” or “failing” to “stable”. A detailed analysis of the basic aspects of Timor-Leste’s insecurities as a constitutive element of its foreign policy becomes instrumental to understanding the country’s nation-state-building experience since its separation from Indonesia in 1999, as it enters a new phase of socio-political structuring following the withdrawal of the international security presence in 2012.

  13. Conceptual Dimension of Problems of Joint Activity of the State and Civil Society Institutes on Ensuring National Security of the Russian Federation

    Directory of Open Access Journals (Sweden)

    Gulyaikhin Vyacheslav N.

    2016-09-01

    Full Text Available In the article the main methodological approaches to the problem of interaction of institutes of the state and civil society in the context of ensuring national security of Russia are analyzed. Two main alternative concepts (liberal and etatist to which the Russian researchers adhere are allocated. Supporters of liberal approach suppose that domination of the interests of civil society and ensuring equal cooperation with government institutions at the solution of problems of ensuring national security is necessary. Adherents of the etatist concept defend an unconditional priority of government bodies in this sphere. The authors provide the conceptual analysis of estimates by domestic researchers of the main activities of associations of the citizens connected with the counteraction to threats of national security. In the article positive impact of institutes of civil society on political and social and economic processes in Russia is noted, their assistance in development of the state institutes of the state and the potential of constructive interaction with federal and regional authorities on ensuring national security is estimated. The detailed analysis of the politological concept according to which more active participation of public organizations and socially responsible citizens in ensuring national security is necessary, is carried out. Their influence on development of a security system has to become more and more considerable because of social and economic problems which are objectively demanding participation of civil society in their decision-making. It is connected also with the need of modernization breakthrough, not possible without civil initiatives. In the article the conclusion that the Russian researchers attach great value to interaction of institutes of the state and civil society in ensuring national security of the Russian Federation is drawn, conceptually proving the need of their joint activity for this direction, and

  14. Perspectives on Security, Disarmament, and Nonproliferation: Views from the United States and South Africa

    Science.gov (United States)

    2014-03-01

    history   and  current... apartheid  eras,  relations  between  the  United   States  and  the  ruling  ANC  have  not  always  been  smooth...post-­‐ apartheid  era.  The  panelist  argued  that  South  Africa  is  the  only  member  of  NAM,  other

  15. United States assistance to Kazakstan in the area of nuclear material security

    International Nuclear Information System (INIS)

    Tittemore, G.; Mitchell, W.

    1996-01-01

    The US has agreed to pursue cooperative nuclear Material Protection, Control and Accounting (MPC and A) programs with the Republic of Kazakstan. As part of this cooperation, a state system of control accounting and physical protection for nuclear materials is being developed. The US Department of Energy is providing assistance at the four nuclear sites in the Republic to enhance MPC and A systems, techniques, hardware, software, procedures, and training. US survey teams, which include both material control and accounting (MC and A) and physical protection experts, have visited four nuclear sites in Kazakstan. MPC and A assistance is being provided to the Ulba State Holding Company, the Institute of Atomic Energy at Kurchatov City and Ala Tau, and the Mangyshlak Atomic Energy Complex (MAEC) BN-350 nuclear power plant in Aktau. At these sites, the facility staffs and DOE technical teams are working together to identify conditions not completely conforming with accepted international standards, as well as potential enhancements to correct such conditions. Design packages for enhancements at each of these facilities are prepared in collaboration with Kazakstani specialists. After agreement is reached on the specifications by the US and Kazakstan, MPC and A equipment is procured and installed. This paper summarizes the approach to the cooperative programs at these facilities, program status, and future plans

  16. Climate change and States security: an operational link to develop locally and on the medium term

    International Nuclear Information System (INIS)

    Taithe, Alexandre

    2007-01-01

    The author first notices that climate change and environmental degradations induce new logics in international relationships, and then discusses how consequences of climate change can be factors of instability for States, and how to address them. He recalls and comments the main effects of climate change as they have been described in IPCC reports. He outlines limitations of conventional approaches in terms of direct and indirect impacts on States. Direct effects concern territories (for example, a modification of borders due to sea level rise or to erosion), populations (impact of extreme events on housing, on health) and the economy (more particularly the primary sector and high levels of adaptation costs). The author outlines the limitations of these global models, and proposes additional and corrective approaches: hybrid (regional and global) approaches, local and medium term-based approach (some natural resource management can be assessed and organised only locally). An appendix proposes a contribution of an IPCC work-group in which impacts, adaptation and vulnerabilities of the different regions of the world in front of climate changes are summarized

  17. Conceptualizing Biopolitics: Citizen-State Interactions in the Securing of Water Services in South Africa.

    Science.gov (United States)

    Bulled, Nicola

    2015-01-01

    Despite constitutional obligations to provide clean water to all citizens in South Africa, access to water and related services remains highly contested. The discord between constitutional promises and lived realities of water access, particularly through national infrastructure, provides a platform on which to examine Foucauldian notions of biopolitics, the control of populations through technologies of governing. Drawing on the situations of residents in the rural Vhembe district in the north eastern corner of the country, I examine how individuals conceptualize the relationship that exists between citizen and state and the responsibilities of each in post-Apartheid South Africa as it relates to water access. In addition, I describe strategies employed throughout South Africa to voice rights to water and how these approaches are perceived. Finally, I consider how the three primary forms of 'water citizenship'-citizen, agent, and subject-influence the current and future health of vulnerable residents.

  18. The State of Food Security Report 2012 and the Enigma of Achieving Millennium Development Goals

    Directory of Open Access Journals (Sweden)

    Vikas Bajpai

    2013-07-01

    Full Text Available Globally quoted and unquestioningly accepted, the State of the Food Insecurity in the world report 2012, has made significant reduction in the numbers of hungry globally at 868 million. In case of India it has made significant upward revision of hunger prevalence in 1990-92 and significant downward revision for 2010 resulting in 34.9% estimated hunger decline. In the midst of claims of robust methodological revisions, its calculations and assumptions set a dangerous precedence for the policy-makers and planners of the reluctant country governments and worst for the hungry of the world. This paper discusses the SOFI 2012, critiques the declining hunger numbers in SOFI 2012 and produces alternate data sets including independent surveys of Government of India, to counter the reduction claims. It also makes a case for greater public dialogue and engagement in such reports, their methods, metrics and numbers.

  19. Solid-State Gas Sensors: Sensor System Challenges in the Civil Security Domain

    Directory of Open Access Journals (Sweden)

    Gerhard Müller

    2016-01-01

    Full Text Available The detection of military high explosives and illicit drugs presents problems of paramount importance in the fields of counter terrorism and criminal investigation. Effectively dealing with such threats requires hand-portable, mobile and affordable instruments. The paper shows that solid-state gas sensors can contribute to the development of such instruments provided the sensors are incorporated into integrated sensor systems, which acquire the target substances in the form of particle residue from suspect objects and which process the collected residue through a sequence of particle sampling, solid-vapor conversion, vapor detection and signal treatment steps. Considering sensor systems with metal oxide gas sensors at the backend, it is demonstrated that significant gains in sensitivity, selectivity and speed of response can be attained when the threat substances are sampled in particle as opposed to vapor form.

  20. Solid-State Gas Sensors: Sensor System Challenges in the Civil Security Domain.

    Science.gov (United States)

    Müller, Gerhard; Hackner, Angelika; Beer, Sebastian; Göbel, Johann

    2016-01-20

    The detection of military high explosives and illicit drugs presents problems of paramount importance in the fields of counter terrorism and criminal investigation. Effectively dealing with such threats requires hand-portable, mobile and affordable instruments. The paper shows that solid-state gas sensors can contribute to the development of such instruments provided the sensors are incorporated into integrated sensor systems, which acquire the target substances in the form of particle residue from suspect objects and which process the collected residue through a sequence of particle sampling, solid-vapor conversion, vapor detection and signal treatment steps. Considering sensor systems with metal oxide gas sensors at the backend, it is demonstrated that significant gains in sensitivity, selectivity and speed of response can be attained when the threat substances are sampled in particle as opposed to vapor form.

  1. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  2. Climate change adaptation: a panacea for food security in Ondo State, Nigeria

    Science.gov (United States)

    Fatuase, A. I.

    2017-08-01

    This paper examines the likely perceived causes of climate change, adaptation strategies employed and technical inefficiency of arable crop farmers in Ondo State, Nigeria. Data were obtained from primary sources using a set of structured questionnaire assisted with interview schedule. Multistage sampling technique was used. Data were analyzed using the following: descriptive statistics and the stochastic frontier production function. The findings showed that majority of the respondents (59.1 %) still believed that climate change is a natural phenomenon that is beyond man's power to abate while industrial release, improper sewage disposal, fossil fuel use, deforestation and bush burning were perceived as the most human factors that influence climate change by the category that chose human activities (40.9 %) as the main causes of climate change. The main employed adaptation strategies by the farmers were mixed cropping, planting early matured crop, planting of resistant crops and use of agrochemicals. The arable crop farmers were relatively technically efficient with about 53 % of them having technical efficiency above the average of 0.784 for the study area. The study observed that education, adaptation, perception, climate information and farming experience were statistically significant in decreasing inefficiency of arable crop production. Therefore, advocacy on climate change and its adaptation strategies should be intensified in the study area.

  3. Integrated Resources Management Approach to Ensuring Sustainable Food Security in Nigeria-The Nexus of Rice Production in Niger State

    Science.gov (United States)

    Omotoso, T.

    2015-12-01

    By 2050, the world will need to feed 9 billion people. This will require a 60% increase in agricultural production and subsequently a 6% increase in water use by the agricultural sector alone. By 2030, global water demand is expected to increase by 40%, mostly in developing countries like Nigeria (Addams, Boccaletti, Kerlin, & Stuchtey, 2009) and global energy demand is expected to increase by 33% in 2035, also, mostly in emerging economies (IEA, 2013). These resources have to be managed efficiently in preparation for these future demands. Population growth leads to increased demand for water, energy and food. More food production will lead to more water-for-food and energy-for-food usage; and more demand for energy will lead to more water-for-energy needs. This nexus between water, energy and food is poorly understood and furthermore, complicated by external drivers such as climate change. Niger State Nigeria, which is blessed with abundant water and arable land resources, houses the three hydropower dams in Nigeria and one of the governments' proposed Staple Crops Processing Zones (SCPZ) for rice production. Both of these capital intensive investments depend heavily on water resources and are all highly vulnerable to changes in climate. Thus, it is essential to know how the local climate in this state will likely change and its impacts on water, energy and food security, so that policy makers can make informed mitigation/adaptation plans; operational and investment decisions. The objective of this project is to provide information, using an integrated resources management approach, on the effects of future climate changes on water, energy (hydropower) and food resources in Niger State, Nigeria and improve knowledge on the interlinkages between water, energy and food at a local scale.

  4. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  5. Securing Fatherhood through Kin Work: A Comparison of Black Low-Income Fathers and Families in South Africa and the United States

    Science.gov (United States)

    Madhavan, Sangeetha; Roy, Kevin

    2012-01-01

    In this article, the authors examine how low-income Black men in South Africa and the United States work with their kin to secure fathering and ensure the well-being of children. They use ethnographic and life history data on men who fathered children from 1992 to 2005 to demonstrate how fathers' roles as kin workers enable them to meet culturally…

  6. Cause for Concern: A Mixed-Methods Study of Campus Safety and Security Practices in United States-Mexico Border Institutions of Higher Education

    Science.gov (United States)

    Holmes, Ryan Clevis

    2014-01-01

    Campus safety has been a source of concern since the 1990s. However, in 2007, the tragedy at the Virginia Polytechnic and State University sent a sense of alarm through many institutions of higher education. Immediately following this tragedy, institutions across the country began to evaluate and question their safety and security practices. While…

  7. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  8. The influence of powerful states of the Security Council during democratization processes the case of Côte D’ivoire

    Directory of Open Access Journals (Sweden)

    Vanessa Villalibre Fernández

    2009-01-01

    Full Text Available The Security Council is composed by 15 states: five of them (France, United Kingdom, United States, Russia and China exercising on a permanent basis and ten others exercise for two years. This difference is important to observe their influence on the global policy. Permanent states are in a better position to organize the Council’s agenda, but also to control the decisions to take thanks to their right of veto. Concerning the case of Côte d’Ivoire, France has played a crucial role in fostering the political process and deploys peacekeeping troops, also initiating the Council’s involvement and preparing statements and resolutions. For this reason, the measuresconcerning democratization processes taken by the Security Council in the African continent in general and in Cote d’Ivoire in particular provides a striking example of how the building or dismantling of states depends critically on external influences, both multilateral and unilateral pressures.

  9. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  10. Asia-Pacific from the perspective of the United States: an agenda where commercial and security priorities coexist

    Directory of Open Access Journals (Sweden)

    Alfredo Crespo Alcázar

    2017-07-01

    Full Text Available The Barack Obama cabinets (2008-2012; 2012-2016 entailed a significant shift regarding the issues considered as priorities during the former Republican administration (2000-2008. The priority of fighting against jihadist terrorism was coupled with an approach that gave more importance to diplomacy and international institutions. We should not interpret this phenomenon as the United States giving up the development of its role as a global leader. When it comes to the regional level, the main transformation constituted the new geostrategic and geopolitical importance conferred upon the Asia-Pacific region in detriment of the European Union, for instance. This was due to a variety of factors, some of which arise from the recent past (issues related to security and defense or the present (the economic crisis that the EU could not fight effectively. The new US agenda towards the Asia-Pacific generated reactions of different nature, since some international actors reacted cautiously (China, Russia or the European Union, each of them for different motives. Nevertheless, it was positively regarded by the traditional US allies in the region (Australia, Japan and South Korea.

  11. A Qualitative Meta-Analysis of the Diffusion of Mandated and Subsidized Technology: United States Energy Security and Independence

    Science.gov (United States)

    Noah, Philip D., Jr.

    2013-01-01

    The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…

  12. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  13. The Global Trends in the Alternative Energetics and Improvement of the State Policy in the Sphere of Fiscal Security: in Search for Equilibrium and Markets

    Directory of Open Access Journals (Sweden)

    Hnedina Kateryna V.

    2017-12-01

    Full Text Available Alternative energetics is an important component of the competitiveness and security of the national economy. Its rapid development over the past 10 years is caused by both the attempts of individual countries to maintain and strengthen their competitive advantage in the world markets and the efforts of international organizations (UN, IRENA, IEA to consolidate different stakeholders to achieve energy and fiscal security, protection of environment and improvement of climate conditions. The article is aimed at generalizing global trends in alternative energetics in the context of development of the State policy in the sphere of fiscal security. A brief overview of the latest trends in the alternative energetics development, most of which focus on identifying the basic sectoral trends, has been provided. However, the issues of fiscal security in the energy sector remain poorly researched, especially in terms of formation of the State policy, consolidating interests of different groups of stakeholders. It has been determined that in the developed countries a significant growth of alternative energetics is caused by the consistent State policy on creation of conditions for formation of effective branch markets and the solving of so-called energy trilemma.

  14. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  15. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  16. EVALUATION OF THE INFLUENCE OF THE STATE OF ENVIRONMENTAL SECURITY OF THE POPULATION OF KYIV ON THE LEVEL OF MORBIDITY

    Directory of Open Access Journals (Sweden)

    Maryna Kirova

    2017-08-01

    Fundamentals of National Security of Ukraine" to the priorities of the national interests of Ukraine (Article 6. The environment is considered safe when its state meets the criteria, standards, limits and norms, established in the legislation, concerning its purity (non-contamination, resource intensity (non-extinction, environmental sustainability, sanitary requirements, species diversity, and ability to satisfy citizens' interests. Today there is an increase in anthropogenic impact on the atmosphere, which is manifested mainly due to its pollution, and therefore inevitably affects the state of ecosystems and human health. That is why the study of problems associated with atmospheric air pollution - an extremely important natural component of human life and human life - is now becoming particularly acute and urgent. At present, the total air pollution in the large and medium-sized cities of Ukraine is 2-4 times higher than the permissible level and is dangerous for the health of the population. Consequently, the problems of ensuring environmental safety for the population of Kyiv, as many large cities of Ukraine, are very relevant. In connection with this, the article establishes a direct relationship between the increase in the concentration of harmful substances in the air of the contaminated area and the increase in the incidence of the population in the context of environmental safety.

  17. Evaluating of foreign trade security

    OpenAIRE

    Vasyliev Andriy

    2015-01-01

    A method of evaluating foreign trade security is considered based on horizontally integrated approach to research security issues, taking into account the conditions of management, factors, components and levels of external security. The work was based theories of security, economics, management theory, practice of state regulation of foreign trade.

  18. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  19. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  20. What role for law in achieving transboundary drainage basin security?--the development and testing of the Legal Assessment Model (LAM) for transboundary watercourse states.

    Science.gov (United States)

    Wouters, P K

    2004-01-01

    The beneficial use of the world's transboundary waters raises difficult issues for drainage basin security on most parts of the globe. International law provides that each transboundary watercourse State is entitled to, and obliged to ensure, an "equitable and reasonable use" of these shared waters. The IWLRI developed and tested a Legal Assessment Model (LAM) through the work of interdisciplinary teams working in three different transboundary situations--China (upstream), Mozambique (downstream) and Palestine (shared groundwater). The LAM provides a tool for transboundary watercourse States to use in the preparation of their national water strategy for use at the national and international levels. The model should now be tested at the basin level, with a view to assisting to accomplish the peaceful and rational use of transboundary waters in line with the governing rule of international law and thereby to facilitate the overall policy objective of drainage basin security.

  1. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  2. Household food security and HIV status in rural and urban communities in the Free State province, South Africa.

    Science.gov (United States)

    Pienaar, Michélle; van Rooyen, Francois C; Walsh, Corinna M

    2017-12-01

    Higher socioeconomic status impacts profoundly on quality of life. Life-event stressors, such as loss of employment, marital separation/divorce, death of a spouse and food insecurity, have been found to accelerate disease progression among people with human immunodeficiency virus (HIV). The objective of this study was to determine significant independent sociodemographic and food security factors associated with HIV status in people from rural and urban communities in the Assuring Health for All study, which was undertaken in rural Trompsburg, Philippolis and Springfontein and urban Mangaung, in the Free State Province of South Africa. Sociodemographic and food security factors associated with HIV status were determined in 886 households. Logistic regression with forward selection (p rural participants, 97 (17.1%) were HIV-infected, and 172 (40.6%) of the 424 urban participants. A relatively high percentage of respondents had never attended school, while very few participants in all areas had a tertiary education. The unemployment rate of HIV-infected adults was higher than that of HIV-uninfected adults. A high percentage of respondents in all areas reported running out of money to buy food, with this tendency occurring significantly more among urban HIV-infected than HIV-uninfected respondents. In all areas, a high percentage of HIV-infected respondents relied on a limited number of foods to feed their children, with significantly more HIV-infected urban respondents compared to their uninfected counterparts reporting this. Most participants in all areas had to cut the size of meals, or ate less because there was not enough food in the house or not enough money to buy food. During periods of food shortage, more than 50% of respondents in all areas asked family, relatives or neighbours for assistance with money and/or food, which occurred at a higher percentage of HIV-infected rural participants compared to HIV-uninfected rural participants. More than half of all

  3. Royal Order of 15 October 1979 creating and organising an Interministerial Commission for Nuclear Safety and State Security in the Nuclear Field

    International Nuclear Information System (INIS)

    1979-01-01

    This Royal Order setting up an Interministerial Commission for Nuclear Safety and State Security provides for the duties of the Commission. These are, in particular, to seek the means to ensure the protection of workers against the hazards which might arise from nuclear activities by co-ordinating the work of the ministerial departments concerned. The Commission is composed of representatives of ministries and bodies involved in that field. (NEA) [fr

  4. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  5. Dynamic model of minimax control over economic security state of the region in the presence of risks

    Directory of Open Access Journals (Sweden)

    Andrey Fedorovich Shorikov

    2012-06-01

    Full Text Available Investigation and solution of management of economic security state in the region (MESSR requires development of a dynamic economic-mathematical model that takes into account the presence of control actions, uncontrolled parameters (risk modeling errors, etc. and availability of information deficit. At the same time, the existing approaches to solving such problems are based primarily on static models and the use of stochastic modeling of the device, which is required for the application of knowledge of the probability characteristics of the main model parameters and special conditions for the realization of the process. We should note that to use the apparatus of stochastic modeling, very strict conditions are required, which in practice are usually not feasible in advance In this paper, we propose to use a deterministic approach for modeling and solving the original problem in the form of a dynamic programming problem of minimax control (optimization of a guaranteed result MESSR at the determined point of time, taking into account the availability of risks of deterministic and stochastic nature (combined risks model. At thesametime, under therisks in thesocial and economic system we understand thefactors that negatively catastrophically affect the results of the reviewed processes inside it. For an effective use, a technique of prediction and assessment of time rows and stochastic risks in MESSR optimization process is presented, which can serve as a basis for the development of appropriate computer software. To solve the problem of program minimax control MESSR in the presence of risks, we propose a method which is reduced to the realization of a finite number of solutions of linear and convex mathematical programming and discrete optimization problem. The proposed method makes it possible to develop efficient numerical procedures to implement computer simulation of the dynamics of the problem, build program minimax control and gain optimal

  6. Nuclear-weapon-free zones: Pursuing security, region by region. Conference of States Parties and Signatories of treaties that establish nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    The development of nuclear-weapon-free zones, over the past four decades, is a testament to what nations can do, region by region, to achieve common security objectives. In fact, when considering the history of nuclear non-proliferation efforts, it might be said that here in Mexico City is w here it all began . The 1967 Treaty of Tlatelolco was the first multilateral treaty to establish a region free of nuclear weapons and a requirement for comprehensive IAEA safeguards for its parties - and clearly gave impetus to the conclusion of the Treaty on the Non-Proliferation of Nuclear Weapons. Nuclear-weapon-free zones provide tangible security benefits. They help to reassure the larger international community of the peaceful nuclear intentions of countries in these regions. They provide their members with security assurances against the use, or threat of use, of nuclear weapons by a nuclear-weapon State. They include control mechanisms for dealing with non-compliance in a regional setting. And in all cases, they prohibit the development, stationing or testing of nuclear weapons in their respective regions. An important benefit of these zones is that they open a forum for expanded regional dialogue on issues of security. Because the causes of insecurity vary from region to region, security solutions do not come in a 'one-size-fits-all' package. It is for this reason that regional dialogues, as we see in the nuclear-weapon-free zones, are so beneficial. It is clear that such treaties, and such security dialogues, would be invaluable in other areas of the world, such as the Middle East and the Korean Peninsula. Since the end of the Cold War, the international security landscape has undergone dramatic changes. For example, the rise in terrorism, the discovery of clandestine nuclear programmes, and the emergence of covert nuclear procurement networks have heightened our awareness of vulnerabilities in the nuclear non-proliferation regime. This statement focuses on two issues

  7. Department of Homeland Security (DHS I-131)

    Data.gov (United States)

    Social Security Administration — This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for...

  8. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  9. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  10. Auditing Organizational Security

    Science.gov (United States)

    2017-01-01

    Organi- zation for Standardiza- tion ( ISO ): ISO 27000 : Information Systems Se- curity Management. A robust program of internal auditing of a...improvement is the basis and underpinning of the ISO . All processes must be considered ongoing and never at an “end state.” Top management develops a...security management system, including security policies and security objectives, plus threats and risks. Orga- nizations already working with ISO 9000

  11. On the Relation between Maternal State of Mind and Sensitivity in the Prediction of Infant Attachment Security

    Science.gov (United States)

    Atkinson, Leslie; Goldberg, Susan; Raval, Vaishali; Pederson, David; Benoit, Diane; Moran, Greg; Poulton, Lori; Myhal, Natalie; Zwiers, Michael; Leung, Eman

    2005-01-01

    Attachment theorists assume that maternal mental representations influence responsivity, which influences infant attachment security. However, primary studies do not support this mediation model. The authors tested mediation using 2 mother-infant samples and found no evidence of mediation. Therefore, the authors explored sensitivity as a…

  12. Securing the State through the Production of "Global" Citizens: Analyzing Neo-Liberal Educational Reforms in Jordan and the USA

    Science.gov (United States)

    Hantzopoulos, Maria; Shirazi, Roozbeh

    2014-01-01

    From a human capital perspective, schooling has long represented an engine of economic growth, individual advancement, and competitiveness in the global market. In recent years, this theorization of schooling has become linked with articulations of national security in both the Global North and South, as policymakers, private sector actors, and…

  13. 75 FR 81371 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Science.gov (United States)

    2010-12-28

    ...)(3) (Accounting for Disclosures) because release of the accounting of disclosures could alert the... recipient agency. Disclosure of the accounting would therefore present a serious impediment to law enforcement efforts and/or efforts to preserve national security. Disclosure of the accounting could also...

  14. A Surveillance Society and the Conflict State: Leveraging Ubiquitous Surveillance and Biometrics Technology to Improve Homeland Security

    Science.gov (United States)

    2002-09-01

    of Industrial Organizations AIDS: Acquired Immune Deficiency Syndrome ANSI: American National Standards Institute APHIS: Animal, Plant, and Health...between a specific person and an impostor than any other type of identification technique. They provide the additional, convenient security...preferable to an impostor being able to defeat the system (Ashbourn, p. 56). Retina scanning systems are resistant to fraud since duplicate artificial

  15. 76 FR 49500 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-020 Substance...

    Science.gov (United States)

    2011-08-10

    ... 7101 Washington, DC 20593. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0053] Privacy Act of... Treatment Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  16. Africa’s Booming Oil and Natural Gas Exploration and Production: National Security Implications for the United States and China

    Science.gov (United States)

    2013-12-01

    natural gas have also increased, on net, the environmental component of energy security. While hydraulic fracking , for example, car- ries risks of...tion, or “ fracking .” South Africa had awarded Shell a technical cooperation permit in 2009 to determine the Karoo’s natural gas potential, and the

  17. 76 FR 69749 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-029 Notice of...

    Science.gov (United States)

    2011-11-09

    ... person making the disclosure. I. To an organization or individual in either the public or private sector... vetting of individuals pursuant to its mission for protecting and securing the maritime sector. The..., date and place of birth, gender, country of citizenship, travel/mariner document type, number and...

  18. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  19. "Securing our survival (SOS": non-state actors and the campaign for a nuclear weapons convention through the prism of securitisation theory

    Directory of Open Access Journals (Sweden)

    Renata H. Dalaqua

    2013-12-01

    Full Text Available This article analyses the security practices of the anti-nuclear movement in the post-Cold War period through the prism of securitisation theory. By exploring Buzan and Wæver's conceptual developments on macrosecuritisations, the practices involved in the struggle against the Bomb are interpreted as securitising moves, in which the anti-nuclear movement is the leading securitiser. In the capacity of securitising actors, nuclear abolition activists argue that nuclear disarmament, under a Nuclear Weapons Convention (NWC, would be the only way to protect humankind from the threat posed by the existence of nuclear weapons. The empirical analysis of these non-state actors and their campaign for a NWC shows that, despite uttering security, the anti-nuclear movement has so far failed to achieve the proposed security measure, that is, nuclear disarmament. Nonetheless, securitisation has been instrumental for these non-state actors as a way of raising an issue on the agenda of decision-makers and urging them to take action.

  20. Non-proliferation of nuclear weapons and nuclear security. Overview of safeguards requirements for States with limited nuclear material and activities

    International Nuclear Information System (INIS)

    Lodding, J.; Ribeiro, B.

    2006-06-01

    This booklet provides an overview of safeguards obligations that apply to States which are parties to the Nuclear Non-Proliferation Treaty (NPT) that have no nuclear facilities and only limited quantities of nuclear material. Most State parties to the NPT have no nuclear facilities and only limited quantities of nuclear material. For such States, safeguards implementation is expected to be simple and straightforward. This booklet provides an overview of the safeguards obligations that apply to such States. It is hoped that a better understanding of these requirements will facilitate the conclusion and implementation of safeguards agreements and additional protocols, and thereby contribute to the strengthening of the IAEA?s safeguards system and of collective security

  1. Non-proliferation of nuclear weapons and nuclear security. Overview of Safeguards requirements for States with limited nuclear material and activities

    International Nuclear Information System (INIS)

    Lodding, J.; Ribeiro, B.

    2006-06-01

    This booklet provides an overview of safeguards obligations that apply to States which are parties to the Nuclear Non-Proliferation Treaty (NPT) that have no nuclear facilities and only limited quantities of nuclear material. Most State parties to the NPT have no nuclear facilities and only limited quantities of nuclear material. For such States, safeguards implementation is expected to be simple and straightforward. This booklet provides an overview of the safeguards obligations that apply to such States. It is hoped that a better understanding of these requirements will facilitate the conclusion and implementation of safeguards agreements and additional protocols, and thereby contribute to the strengthening of the IAEA?s safeguards system and of collective security

  2. The state of improvement of security management setup in the Japan Atomic Power Company and improvement of facilities in its Tsuruga Nuclear Power Station

    International Nuclear Information System (INIS)

    1982-01-01

    In connection with the series of accidents in the Tsuruga Nuclear Power Station of the Japan Atomic Power Company, the state of security management in JAPC and the safety of facilities in the Tsuruga Nuclear Power Station, which have resulted from improvement efforts, are described on the following items: security management setup - communication and reporting in emergency, the management of inspection and maintenance records, work control and supervision in repair, improvement, etc., functional authority and responsibility in maintenance management, operation management, radiation control, personnel education; improvement of facilities - feed water heaters, laundry waste-water filter room, radioactive waste treatment facility, general drainage, concentrated waste liquid storage tanks in newly-built waste treatment building, etc. (Mori, K.)

  3. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  4. The Security Gap in Syria: Individual and Collective Security in ‘Rebel-held’ Territories

    OpenAIRE

    Ali, Ali Abdul Kadir

    2015-01-01

    This paper examines security in Syria through the conceptual lens of the security gap, understood as the gap between security practices and objectives which have implications for individual and collective security. Practices of security can be the state apparatus, the military, and militias. The objective – safety – can refer to the safety or security of a range of collectives including the state, political parties, and ethnic groups, while individual security re...

  5. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  6. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  7. Hybrid Security Arrangements in Africa: Exploring the Implications ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    building. In the aftermath of war and conflict, state security forces and institutions are often severely weakened or decimated. When this happens, multiple state and non-state security actors and governance structures emerge to fill security vacuums.

  8. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  9. State Councillor of the Republic and Canton of Geneva in charge of the Department of Security, Police and Environment I Rochat signing the guest book with CERN Director-General R. Heuer on 25th January 2010.

    CERN Multimedia

    Maximilien Brice; Glass Box

    2010-01-01

    State Councillor of the Republic and Canton of Geneva in charge of the Department of Security, Police and Environment I Rochat signing the guest book with CERN Director-General R. Heuer on 25th January 2010.

  10. 6 CFR 37.41 - Security plan.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under § 37...

  11. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  12. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  13. The National Military Strategy of the United States of America 2015: The United States Military’s Contribution to National Security

    Science.gov (United States)

    2015-06-01

    are amplified by shifting demographics. Youth populations are rapidly growing in Africa and the Middle East, regions that face resource shortages...fear in opponents and generate support for their causes. They use improvised explosive devices (IED), suicide vests, and tailored cyber tools to...our security relationship with India and build upon our partnerships with New Zealand, Singapore, Indonesia, Malaysia , Vietnam, and Bangladesh. Such

  14. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  15. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  16. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  17. Food security among young adults with disabilities in the United States: Findings from the National Health Interview Survey.

    Science.gov (United States)

    Brucker, Debra L

    2016-04-01

    Prior research has suggested that young adults with disabilities face economic, health and social disadvantage. Food security, an area of disadvantage that can influence overall health, has not been fully explored for this population. To examine levels of food security between young adults with and without disabilities, controlling for individual characteristics. Logistic regression analysis of a nationally representative sample of young adults (age 18-25) (n = 32,795) with and without disabilities, using pooled data form the 2011-2013 National Health Interview Survey. Young adults with disabilities have significantly higher odds (OR: 2.58, p young adults without disabilities, even when controlling for individual characteristics. Odds of living in a household that is food insecure are particularly high (OR: 5.35, p young adults with high levels of psychological distress, controlling for other factors. Young adults with disabilities have increased odds of living in a household that is food insecure. This study has important policy and community program implications. Copyright © 2016 Elsevier Inc. All rights reserved.

  18. Maritime Cyber Security University Research

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-06-16 Maritime Cyber Security...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security University

  19. The production of human security in premodern and contemporary history

    OpenAIRE

    Zwierlein, Cornel; Graf, Rüdiger

    2010-01-01

    "Since the end of the Cold War, Human Security has become an important approach in international politics, law, and political science. In contrast to the so-called 'Westphalian System' that knows only states as subjects and objects of security, human security aims at the security of individual human beings if failed or failing states do not protect them nor provide for their basic needs. Thereby, such heterogeneous forms of security as security from war, food security, energy security or secu...

  20. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  1. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  2. INVESTMENT ACTIVITY OF AGRIBUSINESS IN THE AGROINDUSTRIAL COMPLEX REGION, AS ONE OF THE ELEMENTS OF THE FINANCIAL SECURITY OF THE AGRO-INDUSTRIAL COMPLEX OF THE STATE

    Directory of Open Access Journals (Sweden)

    Olga Nikolaevna Uglitskikh

    2015-09-01

    Full Text Available The developed economic-political situation around of Russia, specifies an indispensability of support of agricultural commodity producers as from their financial well-being, investment activity the financial security of agrarian and industrial complex of the state depends. Limitation of own financial resources at agrarians does not allow them to realize independently conceived projects. Studying of questions of formation and functioning of investment activity in agriculture of Stavropol Territory and an assessment of investment projects offered to reali-zation, have allowed to analyse investment activity of agrarian and industrial complex of region up to the introduction of Russia into WTO and in conditions of its membership. By results of the lead assessment the administrative areas of region showing the greatest investment activity, threats of a financial security of agrarian and industrial complex of region not putting by the activity have been revealed. It is drawn a conclusion on influence West-American sanctions on financial without-danger agra-rian and industrial complex of the state and the responsibility сельхозтоваропроизводителей about delivery of agricultural production in necessary volume and import substitution.

  3. 287(g): Cross-Delegating State and Local Law Enforcement Officers with Federal Immigration Authority - Homeland Security Remedy or Rue?

    National Research Council Canada - National Science Library

    Lines, Jonathan L

    2008-01-01

    As a result of the federal government's shortcomings in thwarting illegal immigration, state and local law enforcement agencies are now largely shouldering the problem of criminal activity associated...

  4. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  5. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  6. Supporting Data Use While Protecting the Privacy, Security and Confidentiality of Student Information: A Primer for State Policymakers

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    The education sector is beginning to embrace a culture that values, demands and uses data to support improved decisionmaking at every level--in classrooms, at kitchen tables and in state capitols. This shift is due in large part to state policymakers' leadership over the last six years in building statewide longitudinal data systems that collect…

  7. The Affect of Drug Trafficking in West Africa on the National Security Interests of the United States of America

    Science.gov (United States)

    2015-06-12

    countries like Columbia, Peru, and the Plurinational State of Bolivia can be broken into smaller shipments and be shipped via commercial air...colonial legacy of the region as well as the predatory and partisan nature of the state governments.50 Culturally , the region’s leadership often does

  8. The information security needs in radiological information systems-an insight on state hospitals of Iran, 2012.

    Science.gov (United States)

    Farhadi, Akram; Ahmadi, Maryam

    2013-12-01

    Picture Archiving and Communications System (PACS) was originally developed for radiology services over 20 years ago to capture medical images electronically. Medical diagnosis methods are based on images such as clinical radiographs, ultrasounds, CT scans, MRIs, or other imaging modalities. Information obtained from these images is correlated with patient information. So with regards to the important role of PACS in hospitals, we aimed to evaluate the PACS and survey the information security needed in the Radiological Information system. First, we surveyed the different aspects of PACS that should be in any health organizations based on Department of Health standards and prepared checklists for assessing the PACS in different hospitals. Second, we surveyed the security controls that should be implemented in PACS. Checklists reliability is affirmed by professors of Tehran Science University. Then, the final data are inputted in SPSS software and analyzed. The results indicate that PACS in hospitals can transfer patient demographic information but they do not show route of information. These systems are not open source. They don't use XML-based standard and HL7 standard for exchanging the data. They do not use DS digital signature. They use passwords and the user can correct or change the medical information. PACS can detect alternation rendered. The survey of results demonstrates that PACS in all hospitals has the same features. These systems have the patient demographic data but they do not have suitable flexibility to interface network or taking reports. For the privacy of PACS in all hospitals, there were passwords for users and the system could show the changes that have been made; but there was no water making or digital signature for the users.

  9. Enhancing Parliamentary Oversight for Effective Security Sector ...

    African Journals Online (AJOL)

    2015-06-09

    Jun 9, 2015 ... transition from violent conflict or prolonged authoritarian rule. .... State whose primary interest was to secure his regime and prevent ... June 12, 1993 presidential elections triggered the emergence of violent non-state security.

  10. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  11. Challenges of Regional Collective Security: Economic Community of West African States (ECOWAS) Standby Force: A Case Study

    National Research Council Canada - National Science Library

    Ibrahim, Miftah O

    2008-01-01

    ... through the establishment of an economic union in West Africa to raise the living standards of its peoples, foster relations among member states, and to contribute to the progress and development of the African continent...

  12. Climate change in the federated states of Micronesia: Food and water security, climate risk management, and adaptive strategies

    Science.gov (United States)

    Fletcher, Charles H.; Richmond, Bruce M.

    2010-01-01

    This is a report of findings following research and a three-week field assessment (April 2009) of the Federated States of Micronesia (FSM) in response to nation-wide marine inundation by extreme tides (December 2007, September 2008, December 2008).3 The study was conducted at the request of the US Department of Agriculture Forest Service and the state and federal governments of FSM.

  13. Repressive Actions of the State Security Communities Against ≪True Orthodox Church≫ Structuries in the Ukrainian SSR (1944–1953 (continued

    Directory of Open Access Journals (Sweden)

    Vedeneev Dmitrii

    2016-06-01

    Full Text Available In the article on the basis of unknown scientific community documents of the Soviet state security bodies provides an analysis of the objectives and key areas of operational work and repressive actions of the security services communities against «True Orthodox Church» (TOC in the Ukrainian SSR in 1944–1953. The characteristic of agent and operational developments NKGB-MGB-KGB of the USSR against the so-called «catacomb Church», as a form of religious and social protest against aggressive atheistic policy of the Communist authorities, infringement of the rights of believers. The basic forms and methods of intelligence and operational activities of the security organs, aimed at creating informer positions in the environment of the communities of the TOC, making the split in the ranks of the adepts of secret religious sects, the collection of «compromising material» as the basis for the application of harsh repressive measures against the movement of the TOC. The authors pay special attention to the organization and personnel of units of the NKGB-MGB-KGB, engaged, according to the terminology, «the struggle with the Church-sectarian counterrevolution» and «Church-monarchist underground», a leading representative of which was considered in the TOC, particularly active in Chernihiv, Sumy, and Kharkiv oblasts of the Ukrainian SSR and the Donbass, and also in the neighboring regions of the Russian black soil region and the North Caucasus. Given the author’s periodization of the development of the catacomb movement, highlights the historical conditions of its creation and release in the USSR. Through the prism of intelligence documents examines the liturgical aspect of the TOC, its governing structure, forms of secrecy and concealment from the prosecution authorities, the position of the catacomb members in relation to social life and social structure in the USSR.

  14. Do Small States Matter? : A comparative analysis of the discourses by three of the non-permanent members of the United Nations Security Council on the crisis in Libya and Syria between 2011 and 2012.

    OpenAIRE

    Chowdhury, Afrida

    2017-01-01

    A new era of wars and instability have left the world shaken with the civil wars in Syria and Libya. Although there are many similarities with Syria and Libya, the two states did not have the same end due to actions by the United Nations Security Council. Libya resulted in a military humanitarian intervention, while Syria did not. Studies about the Security Council usually focuses on the actions of the Permanent Five members who holds institutional power and influence over the council, mostly...

  15. A Guide to Directors of Homeland Security, Emergency Management, and Military Departments in the States and Territories of the United States

    Science.gov (United States)

    2007-12-01

    www3.state.id.us/idstat/ TOC /46010KTOC.html (Title 46—Militia and Military Affairs, chapter 10—State Disaster Preparedness Act). Adjutant General...officer in the national guard of Idaho and has attained the rank of colonel or above. Source: http://www3.state.id.us/idstat/ TOC /46001KTOC.html (Title 46...http://www.fortaleza.gobierno.pr/admin_fortaleza/ sistema /ordens/0028.pdf. Adjutant General Director: Colonel David Carrion Baralt Functions

  16. Challenge theme 7: Information support for management of border security and environmental protection: Chapter 9 in United States-Mexican Borderlands: Facing tomorrow's challenges through USGS science

    Science.gov (United States)

    Parcher, Jean W.; Page, William R.

    2013-01-01

    Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.

  17. Transmission grid security

    CERN Document Server

    Haarla, Liisa; Hirvonen, Ritva; Labeau, Pierre-Etienne

    2011-01-01

    In response to the growing importance of power system security and reliability, ""Transmission Grid Security"" proposes a systematic and probabilistic approach for transmission grid security analysis. The analysis presented uses probabilistic safety assessment (PSA) and takes into account the power system dynamics after severe faults. In the method shown in this book the power system states (stable, not stable, system breakdown, etc.) are connected with the substation reliability model. In this way it is possible to: estimate the system-wide consequences of grid faults; identify a chain of eve

  18. Secure quantum key distribution

    Science.gov (United States)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  19. Should Cops Be Spies? Evaluating the Collection and Sharing of National Security Intelligence by State, Local and Tribal Law Enforcement

    Science.gov (United States)

    2013-03-01

    criminal activity, while state, local and tribal law enforcement provide the local-area expertise. A side benefit of this symbiotic relationship is all...intelligence was focused primarily on geopolitical rivalries” (pp. 41–42). Now that al-Qa’ida, through its surrogates and franchisees —as well as through its

  20. IAEA Director General reviews state of the world's nuclear security, safety and technology at annual IAEA General Conference

    International Nuclear Information System (INIS)

    2002-01-01

    The IAEA has been unable to draw any conclusion or provide any assurance regarding Iraq's compliance with its obligations under the Security Council resolutions, it will therefore be important for the Agency to resolve, upon re-commencement of inspections, the key issue of whether the situation regarding Iraq's nuclear activities and capabilities has changed in any material way since December 1998. Regarding the status of IAEA's Safeguards Agreement with the Democratic People's Republic of Korea (DPRK) the Agency continues to be unable to verify that the DPRK has declared all the nuclear material that is subject to Agency safeguards measures under its NPT safeguards agreement. The work required to verify the correctness and completeness of the DPRK's initial declaration could take three or four years. On the issue of nuclear non-proliferation, the universalization, consolidation and strengthening of the non-proliferation regime, including concrete steps to reduce the number of and dependence on nuclear weapons, are more important than ever for the continuing sustainability and credibility of the regime. Only 27 countries had brought into force Additional Protocols agreements with the Agency, which gives the Agency increased authority to provide assurances that countries were using their nuclear actives for peaceful civilian purposes only. All countries are urged to do so. An expanded effort was needed including threat assessments to protect nuclear facilities against attack, sabotage or theft. The focus of these efforts must be expanded to cover other nuclear facilities, including research installations that also have nuclear and other radioactive material. A significant short-term priority is to bring radioactive sources under appropriate control, whether in use, storage, orphaned or in transport. Concerning global nuclear safety, it is satisfying to note that nuclear safety continues to improve at power plants worldwide. The future of nuclear power, depends on

  1. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  2. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  3. Adapt or Drown - Can the United States Chart a Safe Course Through the Troubled Waters of Energy Security

    Science.gov (United States)

    2010-04-01

    the cost of meat and dairy products. One solution, algae, has been discussed for decreasing the dependency of biodiesel production on crops—a...and maize/corn (United States). Ethanol is produced by fermenting sugars. Corn grain is processed to remove the sugar in wet and dry mills (by...crushing, soaking, and/or chemical treatment), the sugar is fermented , and the resulting mix is distilled and purified to obtain anhydrous ethanol. Major

  4. 22 CFR 8.7 - Security.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the committee...

  5. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  6. Emerging trends in ICT security

    CERN Document Server

    Akhgar, Babak

    2013-01-01

    Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach

  7. Assessing the Need for an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    Science.gov (United States)

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    4-H livestock projects present disease transmission risks that can be reduced by the use of bio-security practices. The responsibility of teaching bio-security to youth belongs primarily to volunteer leaders, who may not be aware of the importance of these practices. A needs assessment for an online educational module about bio-security revealed…

  8. Food Security and Cardiovascular Disease Risk Among Adults in the United States: Findings From the National Health and Nutrition Examination Survey, 2003–2008

    Science.gov (United States)

    2013-01-01

    Introduction Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. Methods A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003–2008 was conducted. Four levels of food security status were defined by using 10 questions. Results Among all participants, 83.9% had full food security, 6.7% had marginal food security, 5.8% had low food security, and 3.6% had very low food security. After adjustment, mean hemoglobin A1c was 0.15% greater and mean concentration of C-reactive protein was 0.8 mg/L greater among participants with very low food security than among those with full food security. The adjusted mean concentration of cotinine among participants with very low food security was almost double that of participants with full food security (112.8 vs 62.0 ng/mL, P security status and systolic blood pressure or concentrations of total cholesterol, high-density lipoprotein cholesterol, or non-high-density lipoprotein cholesterol were observed. Participants aged 30 to 59 years with very low food security were more likely to have a predicted 10-year cardiovascular disease risk greater than 20% than fully food secure participants (adjusted prevalence ratio, 2.38; 95% CI, 1.31–4.31). Conclusion Adults aged 30 to 59 years with very low food security showed evidence of increased predicted 10-year cardiovascular disease risk. PMID:24309090

  9. Food security and cardiovascular disease risk among adults in the United States: findings from the National Health and Nutrition Examination Survey, 2003-2008.

    Science.gov (United States)

    Ford, Earl S

    2013-12-05

    Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003-2008 was conducted. Four levels of food security status were defined by using 10 questions. Among all participants, 83.9% had full food security, 6.7% had marginal food security, 5.8% had low food security, and 3.6% had very low food security. After adjustment, mean hemoglobin A1c was 0.15% greater and mean concentration of C-reactive protein was 0.8 mg/L greater among participants with very low food security than among those with full food security. The adjusted mean concentration of cotinine among participants with very low food security was almost double that of participants with full food security (112.8 vs 62.0 ng/mL, P security status and systolic blood pressure or concentrations of total cholesterol, high-density lipoprotein cholesterol, or non-high-density lipoprotein cholesterol were observed. Participants aged 30 to 59 years with very low food security were more likely to have a predicted 10-year cardiovascular disease risk greater than 20% than fully food secure participants (adjusted prevalence ratio, 2.38; 95% CI, 1.31-4.31). Adults aged 30 to 59 years with very low food security showed evidence of increased predicted 10-year cardiovascular disease risk.

  10. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  11. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  12. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  13. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  14. Polish Security Printing Works in the system of public and economic security

    OpenAIRE

    Remigiusz Lewandowski

    2013-01-01

    The article raises the issue of placing PWPW in the system of economic and public security. Two particular categories of security connected with PWPW business activity, i.e. identification and transactional security, have been defined and discussed in the article. The most essential factors affecting the above security categories as well as relations between identification/transactional security and economic/public security. The article indicates that PWPW plays an important role in the state...

  15. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  16. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  17. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  18. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  19. Adaptation, Resilience, and Secure Attachment States of Mind in Young South African Female Students Exposed to Intimate Partner Violence in Childhood.

    Science.gov (United States)

    Bain, Katherine; Durbach, Carla

    2018-03-01

    Much research details the psychological risks to individuals exposed as children to intimate partner violence (IPV). However, resilience has been a neglected area of study within this population. This article details adaptive responses in six participants exposed to IPV in childhood. Adult attachment interviews (AAI) and follow-up semi-structured interviews analyzed using an interpretive thematic analysis revealed common themes relating to psychological defenses and adaptive strategies. Despite exposure to IPV in childhood, these six women were found to have secure attachment states of mind. Resilience was found not to be necessarily synonymous with the absence of distress. Despite the presence of suffering, it remained strongly associated with adaptive, robust defenses to manage distress and to retain caregiving relationships with parents. These defenses appeared to provide participants with ways to survive their traumatic environments and to remain connected to needed but frightening caregiving figures, and facilitated processing of trauma. Adaptation often entailed using compliance and caregiving responses in childhood in response to role reversal in parent-child relationships, but also the relinquishing of these roles in adulthood. Participants' abilities to coherently acknowledge and discuss their early experiences and retain compassion for their parents seemed linked to their abilities to attain some distance from troubling aspects of their pasts. In doing so, they separated from the unstable relationships of their parents, which fostered transitions to more integrated states of mind.

  20. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  1. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  2. Privatisation of security:

    DEFF Research Database (Denmark)

    use of violence as being the domain of the modern state, which as a natural consequence, delegitimises non-state providers of security. Legitimacy is, therefore, tied to the formal state. Th e international debate concerning the role of PMSCs has been split primarily into two segments. One argues...... to control confl icts has led to low-intensity confl icts (LIC), which can be witnessed, for instance, in Uganda, the Democratic Republic of Congo, Colombia and Sri Lanka (O’Brien, 1998, p. 80). Since the end of the Cold War it has been common for weak state rulers with formal state legitimacy...... security contractors have led, both historically and at the present day, to fi erce academic and public debate. As Sarah Percy argues, the anti-mercenary discourse has two basic elements. One focuses on the fact that mercenaries use force outside what is considered to be legitimate, authoritative control...

  3. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  4. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  5. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  6. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  7. Boolean Logic Tree of Label-Free Dual-Signal Electrochemical Aptasensor System for Biosensing, Three-State Logic Computation, and Keypad Lock Security Operation.

    Science.gov (United States)

    Lu, Jiao Yang; Zhang, Xin Xing; Huang, Wei Tao; Zhu, Qiu Yan; Ding, Xue Zhi; Xia, Li Qiu; Luo, Hong Qun; Li, Nian Bing

    2017-09-19

    The most serious and yet unsolved problems of molecular logic computing consist in how to connect molecular events in complex systems into a usable device with specific functions and how to selectively control branchy logic processes from the cascading logic systems. This report demonstrates that a Boolean logic tree is utilized to organize and connect "plug and play" chemical events DNA, nanomaterials, organic dye, biomolecule, and denaturant for developing the dual-signal electrochemical evolution aptasensor system with good resettability for amplification detection of thrombin, controllable and selectable three-state logic computation, and keypad lock security operation. The aptasensor system combines the merits of DNA-functionalized nanoamplification architecture and simple dual-signal electroactive dye brilliant cresyl blue for sensitive and selective detection of thrombin with a wide linear response range of 0.02-100 nM and a detection limit of 1.92 pM. By using these aforementioned chemical events as inputs and the differential pulse voltammetry current changes at different voltages as dual outputs, a resettable three-input biomolecular keypad lock based on sequential logic is established. Moreover, the first example of controllable and selectable three-state molecular logic computation with active-high and active-low logic functions can be implemented and allows the output ports to assume a high impediment or nothing (Z) state in addition to the 0 and 1 logic levels, effectively controlling subsequent branchy logic computation processes. Our approach is helpful in developing the advanced controllable and selectable logic computing and sensing system in large-scale integration circuits for application in biomedical engineering, intelligent sensing, and control.

  8. Comparison of External Exposure of Central and Eastern-European States as a Factor Threatening Financial Security of Their Economies

    Directory of Open Access Journals (Sweden)

    Magdalena Redo

    2018-06-01

    Full Text Available Central and Eastern-European countries are strongly linked to the international economic and financial systems, which results in their dependence on foreign capital and on the upturn in the global markets. This situation also makes them vulnerable to external shocks. Resilience of the economies of CEE countries was additionally diminished by their relatively quick and uncompromising opening up to the process of globalization and European integration. All the economies subject to scrutiny have quite a substantial external debt level (reaching 55–139% of GDP, their net international investment position is quite strongly in the negative (constituting 25–71% of GDP. They are also characterized by high level of foreign liabilities (85–350% of GDP, a significant degree of trade openness (export and import of goods and services amounting to 41–94% of GDP, considerable rate of foreign liquid portfolio investments (even as much as 32% of GDP. Another common feature is the strong financial support received from the EU budget, with CEE countries being its net beneficiaries (with the accumulated value of funds received from the EU budget in 2004–2015 at the level of 21–42% of GDP. It should be borne in mind that Lithuania, Latvia, Estonia, Slovenia and Slovakia are members of the Eurozone, i.e. operate an international currency, which improves their creditworthiness and augments the trust of the global markets. What seems not without significance for investors is the fact that the IMF classified these five CEE countries – as well as the Czech Republic – as advanced economies. In light of the above, it should be stated that the Polish economy is characterized by a relatively strong external exposure relative to the creditworthiness the country boasts. This exposure increases Poland’s vulnerability to shocks and makes it less immune thereto. These circumstances partially explain the higher estimation of the risk premium for investments in

  9. Non-state security governances and the implications for local-level citizenship in Danish semi-public city spaces

    DEFF Research Database (Denmark)

    Jensen, Thomas Søgaard

    directed at promoting peace and restoring the feel good factor - in public city space in Denmark. What precisely "security" is, what it should mean, and what should be done to guarantee it, has always been contested on an empirically level. The reason for this is that security often deals with social order......, being both the ontological condition of order, in the sense of absence of "real" and culturally constructed dangers, risks, and anxieties, and the political means to ensure this order. Based on a 5 month ethnographic field work among private security guards policing new kinds of public city spaces...... the globalisation and privatisation/commercialisation of security provision and how this development can be explained. Drawing on my own empirical data I hereafter argue that commercial security governance and local understandings of threats to (feelings of) security are not so much shaped by imaginaries...

  10. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  11. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  12. Governing for Enterprise Security (GES) Implementation Guide

    National Research Council Canada - National Science Library

    Westby, Jody R; Allen, Julia H

    2007-01-01

    .... If an organization's management does not establish and reinforce the business need for effective enterprise security, the organization's desired state of security will not be articulated, achieved, or sustained...

  13. Airline Security and a Strategy for Change

    National Research Council Canada - National Science Library

    Welch, Timothy J

    2006-01-01

    .... Obligated to secure the Homeland the United States Government scrambled to develop measures that would uphold societal values while providing an in-depth defense capable of ensuring a more secure society...

  14. National Reachback Systems for Nuclear Security: State-of-play report: ERNCIP Thematic Group Radiological and Nuclear Threats to Critical Infrastructure: Deliverable of task 3.1b

    OpenAIRE

    TOIVONEN H.; HUBERT Schoech; REPPENHAGEN GRIM P.; PIBIDA Leticia; JAMES Mark; ZHANG Weihua; PERÄJÄRVI K.

    2015-01-01

    Operational systems for nuclear security in Finland, France, Denmark, UK, US and Canada were reviewed. The Finnish case is a holistic approach to Nuclear Security Detection Architecture, as defined by the International Atomic Energy Agency; reachback is only one component of the system, albeit an important crosscutting element of the detection architecture. The French and US studies concentrate on the reachback itself. The Danish nuclear security system is information-driven, relying on th...

  15. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  16. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  17. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  18. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  19. Security with nuclear weapons

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    Recent improvements in East-West relations and the process of dramatic political change in Europe may result in unprecedented opportunities to reduce the global arsenal of nuclear weapons. Despite these welcome developments, the prospects for effectively controlling the spread of nuclear capability in the Third World have remained much less encouraging. The possibility of large reductions in nuclear weapons poses fundamental questions about their purpose. Why have some states chosen to acquire nuclear weapons? How and why have these decisions been maintained over time? Why have some states elected to approach, but not cross, the nuclear threshold? This book examines the commonalities and differences in political approaches to nuclear weapons both within and between three groups of states: nuclear, non-nuclear and threshold. The chapters explore the evolution of thinking about nuclear weapons and the role these weapons play in national security planning, and question the official security rationales offered by the nuclear weapon states for the maintenance of nuclear capabilities. For the non-nuclear weapon states, the book presents an analysis of alternative ways of assuring security and foreign policy effectiveness. For the threshold states, it examines the regional contexts within which these states maintain their threshold status. This book transcends traditional East-West approaches to analysis of nuclear issues by giving equal prominence to the issues of nuclear proliferation and non-nuclearism. The book also provides a comprehensive analysis of how current approaches to nuclear weapons have evolved both within and among the groups of countries under study

  20. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  1. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's... Entitlement of a Participant in favor of the United States to secure deposits of public money, including...

  2. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  3. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    Science.gov (United States)

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  4. [Food security in Mexico].

    Science.gov (United States)

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  5. Global Health Security

    Centers for Disease Control (CDC) Podcasts

    2017-09-21

    Dr. Jordan Tappero, a CDC senior advisor on global health, discusses the state of global health security.  Created: 9/21/2017 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID), Center for Global Health (CGH).   Date Released: 9/21/2017.

  6. The Gulf Security Dialogue and Related Arms Sale Proposals

    National Research Council Canada - National Science Library

    Blanchard, Christopher M; Grimmett, Richard F

    2008-01-01

    ...) security cooperation under the auspices of a new Gulf Security Dialogue (GSD). The Dialogue now serves as the principal security coordination mechanism between the United States and the six countries of the Gulf Cooperation Council (GCC...

  7. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  8. Resilience and (in)security

    DEFF Research Database (Denmark)

    dunn cavelty, myriam; Kaufmann, Mareile; Kristensen, Kristian Søby

    2015-01-01

    , and redefine relations of security and insecurity. We show the increased attention – scholarly as well as political – given to resilience in recent times and provide a review of the state of critical security studies literature on resilience. We argue that to advance this discussion, resilience needs...

  9. Cyber Security Applications: Freeware & Shareware

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…

  10. Application of learning from examples methods for on-line dynamic security assessment of electric power systems - state of the art

    Energy Technology Data Exchange (ETDEWEB)

    Pecas Lopes, J.A. [Universidade do Porto, Porto (Portugal). Faculdade de Engenharia] Hatziargyriou, Nikos D. [National Technical University of Athens, Athens (Greece)

    1994-12-31

    This paper provides an overview of the application of `learning from examples` techniques like pattern recognition, artificial neural networks and decision trees, when used for fast dynamic security assessment. Problems concerning the system security evaluation relatively to transient stability and voltage stability are addressed with more details and references to research works in this field are briefly described. (author) 44 refs., 3 tabs.

  11. Market Reactions to Publicly Announced Privacy and Security Breaches Suffered by Companies Listed on the United States Stock Exchanges: A Comparative Empirical Investigation

    Science.gov (United States)

    Coronado, Adolfo S.

    2012-01-01

    Using a sample of security and privacy breaches the present research examines the comparative announcement impact between the two types of events. The first part of the dissertation analyzes the impact of publicly announced security and privacy breaches on abnormal stock returns, the change in firm risk, and abnormal trading volume are measured.…

  12. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  13. Regional Security Partners: The Potential for Collective Security

    National Research Council Canada - National Science Library

    Tan, Jimmy

    1999-01-01

    ...." The threat of big power and regional conflicts has diminished. However, the security landscape is now characterized by political fragmentation, Third World chaos, failed states, and ethnic conflicts among others...

  14. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  15. Secure integrated circuits and systems

    CERN Document Server

    Verbauwhede, Ingrid MR

    2010-01-01

    On any advanced integrated circuit or 'system-on-chip' there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area,

  16. 49 CFR 659.23 - System security plan: contents.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  17. Secure cloud computing

    CERN Document Server

    Jajodia, Sushil; Samarati, Pierangela; Singhal, Anoop; Swarup, Vipin; Wang, Cliff

    2014-01-01

    This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters addres

  18. Optimization of airport security process

    Science.gov (United States)

    Wei, Jianan

    2017-05-01

    In order to facilitate passenger travel, on the basis of ensuring public safety, the airport security process and scheduling to optimize. The stochastic Petri net is used to simulate the single channel security process, draw the reachable graph, construct the homogeneous Markov chain to realize the performance analysis of the security process network, and find the bottleneck to limit the passenger throughput. Curve changes in the flow of passengers to open a security channel for the initial state. When the passenger arrives at a rate that exceeds the processing capacity of the security channel, it is queued. The passenger reaches the acceptable threshold of the queuing time as the time to open or close the next channel, simulate the number of dynamic security channel scheduling to reduce the passenger queuing time.

  19. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  20. Computer Security at Nuclear Facilities (French Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  1. Cloud Computing Security: A Survey

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2014-02-01

    Full Text Available Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

  2. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  3. Ethics and European security

    Energy Technology Data Exchange (ETDEWEB)

    Paskins, B.

    1986-01-01

    The alliance between the United States and her NATO partners has been strained severely in the last few years. American perceptions of European disloyalty and European impressions of American assertiveness and lack of judgment have played a large part in generating tensions between the allies and emphasising the new peace movements. This book is an attempt to develop a broader understanding of the problem of European security based on Christian ethics. There are disagreements and differences of emphasis among the contributors but they have in common the view that an exclusive preoccupation with the military dimension is damagingly one-sided. Instead the contributors argue that moral and theological concerns are a vital part of the politics and mechanics of European security and must be incorporated in any effort to devise new policies for security in Europe and the West.

  4. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  5. Grand Strategy for the United States in the 21st Century? (A Look at the National Security Strategy Document of 2002 and Beyond)

    National Research Council Canada - National Science Library

    Tinsley, Peter G

    2005-01-01

    This paper examines the National Security Strategy (NSS) document of September 2002 and determines whether it provides a grand strategic framework that can be sustained for the rest of the Bush presidency and beyond...

  6. Critically Important Object Security System Element Model

    Directory of Open Access Journals (Sweden)

    I. V. Khomyackov

    2012-03-01

    Full Text Available A stochastic model of critically important object security system element has been developed. The model includes mathematical description of the security system element properties and external influences. The state evolution of the security system element is described by the semi-Markov process with finite states number, the semi-Markov matrix and the initial semi-Markov process states probabilities distribution. External influences are set with the intensity of the Poisson thread.

  7. Associations between Food Security Status and Dietary Inflammatory Potential within Lower-Income Adults from the United States National Health and Nutrition Examination Survey, Cycles 2007 to 2014.

    Science.gov (United States)

    Bergmans, Rachel S; Palta, Mari; Robert, Stephanie A; Berger, Lawrence M; Ehrenthal, Deborah B; Malecki, Kristen M

    2018-06-01

    Evidence suggests both that chronic inflammation mediates the association of food insecurity with adverse health outcomes and that diet may be a significant source of inflammation among food insecure individuals. To examine whether food security status is associated with dietary inflammatory potential. Cross-sectional data came from the National Health and Nutrition Examination Survey (NHANES), cycles 2007 to 2014 (n=10,630). The analysis sample is representative of noninstitutionalized US adults with an income-to-poverty ratio ≤3.00. Dietary Inflammatory Index (DII) score, calculated using the average of two 24-hour dietary recalls, was the main outcome measure. Type III F tests or χ 2 tests compared population characteristics by food security status, defined using the US Food Security Survey Module. Multivariable linear regression was used to estimate the association between food security status and the DII score and moderation by demographic factors. Survey weighting procedures accounted for the effects of stratification and clustering used in the NHANES study design. When accounting for socioeconomic status, demographic factors, and health status, DII score was higher at greater levels of food insecurity (P=0.0033). Those with very low food security had a 0.31 (95% CI=0.12 to 0.49) higher DII score than those with high food security. Age moderated the association between food security status and DII score (interaction P=0.0103), where the magnitude of the association between DII score and severity of food insecurity was higher for those >65 years than for younger age groups. Food security status may be associated with dietary inflammatory potential, which is hypothesized to play a role in multiple chronic health conditions. Further research is needed to determine the causal nature of this relationship and evaluate how best to implement programs designed to address health disparities within food insecure populations. Copyright © 2018 Academy of Nutrition and

  8. Food Security and Cardiovascular Disease Risk Among Adults in the United States: Findings From the National Health and Nutrition Examination Survey, 2003?2008

    OpenAIRE

    Ford, Earl S.

    2013-01-01

    Introduction Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. Methods A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003?2008 was conducted. Fou...

  9. Food security is related to adult type 2 diabetes control over time in a United States safety net primary care clinic population.

    Science.gov (United States)

    Shalowitz, M U; Eng, J S; McKinney, C O; Krohn, J; Lapin, B; Wang, C-H; Nodine, E

    2017-05-15

    Successful Type 2 diabetes management requires adopting a high nutrient-density diet made up of food items that both meet dietary needs and preferences and can be feasibly obtained on a regular basis. However, access to affordable, nutrient-dense foods often is lacking in poorer neighbourhoods. Therefore, low food security should directly impair glucose control, even when patients have full access to and utilize comprehensive medical management. The present study sought to determine whether food security is related longitudinally to glucose control, over-and-above ongoing medication management, among Type 2 diabetes patients receiving comprehensive care at a Midwestern multi-site federally qualified health centre (FQHC). In this longitudinal observational study, we completed a baseline assessment of patients' food security (using the US Household Food Security Module), demographics (via Census items), and diabetes history/management (using a structured clinical encounter form) when patients began receiving diabetes care at the health centre. We then recorded those patients' A1C levels several times during a 24-month follow-up period. Three hundred and ninety-nine patients (56% with low food security) had a baseline A1c measurement; a subsample of 336 (median age=52 years; 56% female; 60% Hispanic, 27% African American, and 9% White) also had at least one follow-up A1c measurement. Patients with lower (vs higher) food security were more likely to be on insulin and have higher A1c levels at baseline. Moreover, the disparity in glucose control by food security status persisted throughout the next 2 years. Although results were based on one multi-site FQHC, potentially limiting their generalizability, they seem to suggest that among Type 2 diabetes patients, low food security directly impairs glucose control-even when patients receive full access to comprehensive medical management-thereby increasing their long-term risks of high morbidity, early mortality, and high

  10. Rebuilding Iraq: DoD and State Department Have Improved Oversight and Coordination of Private Security Contractors in Iraq, but Further Actions are Needed to Sustain Improvements

    Science.gov (United States)

    2008-07-01

    MNC-I Multi-National Corps-Iraq MNF-I Multi-National Force-Iraq PSC private security contractor RSO Regional Security Office TOC tactical...maritime and territorial jurisdiction’ to include a housing complex leased by the U.S. military on a military base in Germany where a sexual assault...and monitored by RSO personnel in the RSO TOC . Motorcade vehicles are equipped with video cameras that record and document motorcade movements and

  11. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  12. 15 CFR 742.4 - National security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States to...

  13. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  14. Gas markets and security of supply

    International Nuclear Information System (INIS)

    Gibot, G.

    1997-01-01

    In the natural gas business, some European states and companies seem to be concerned by security of supply. Security of supply for a governmental organisation is discussed, to share the author's conception and experience. The targets of a security of supply policy and the measures that can be set are described. The possible changes in implementing this policy are considered, according to recent developments in the field of gas security. The specificity of European gas markets justify the concern in security of supply, as concluded the Commission and the IEA. The integration of national gas markets in Europe will give new opportunities for managing this security of supply. (R.P.)

  15. Integrated Nuclear Security Support Plan (INSSP)

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    Integrated Nuclear Security Support Plan (INSSP) purposes the framework for a comprehensive approach to addressing specific national security needs. It provides means for coordinating nuclear security assistance to member states. Identifies responsible parties for completion of nuclear security activities which are necessary to build sustainable nuclear security programs. International Atomic Energy Agency INSSP development process is based on findings and recommendations from a range of nuclear security missions and other information needs assessments. Takes into account of the ongoing work activities of other bilateral assistance.

  16. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  17. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  18. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  19. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  20. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  1. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  2. Security of Nuclear Information. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance on implementing the principle of confidentiality and on the broader aspects of information security (i.e. integrity and availability). It assists States in bridging the gap between existing government and industry standards on information security, the particular concepts and considerations that apply to nuclear security and the special provisions and conditions that exist when dealing with nuclear material and other radioactive material. Specifically it seeks to assist states in the identification, classification, and assignment of appropriate security controls to information that could adversely impact nuclear security if compromised

  3. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  4. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  5. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  6. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  7. Security Management Model in Cloud Computing Environment

    OpenAIRE

    Ahmadpanah, Seyed Hossein

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  8. Security issues in mobile NFC devices

    CERN Document Server

    Roland, Michael

    2015-01-01

    This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.

  9. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  10. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  11. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  12. Enhancing QR Code Security

    OpenAIRE

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  13. Computer Security Incident Response Planning at Nuclear Facilities

    International Nuclear Information System (INIS)

    2016-06-01

    The purpose of this publication is to assist Member States in developing comprehensive contingency plans for computer security incidents with the potential to impact nuclear security and/or nuclear safety. It provides an outline and recommendations for establishing a computer security incident response capability as part of a computer security programme, and considers the roles and responsibilities of the system owner, operator, competent authority, and national technical authority in responding to a computer security incident with possible nuclear security repercussions

  14. Meeting Report: Institute for Social Security and Services for State Workers (ISSSTE on Acute Lymphoblastic Leukaemia, Mexico City, Mexico, 3rd to 4th October 2016

    Directory of Open Access Journals (Sweden)

    Alvarado Ibarra Martha

    2017-06-01

    Full Text Available From October 3 to 4, 2016, the fourth meeting of haematologists who belonged to the institute for social security and services for state workers (ISSSTE was held, the meeting was held in Mexico City, Mexico. Attending this working meeting, medical fellows of the specialty of Haematology and Paediatric Haematology, as well as attached doctors of both specialties that work in different hospitals in Mexico City and the rest of the country, the purpose of the attendees to this consensus was discuss, update, and homogenize the protocols of diagnostic and therapeutic approach in patients with acute lymphoblastic leukaemia of all ages. All participants appreciated the opportunity to participate in one of the most important cooperation projects of the ISSSTE and to be able to offer updated treatment protocols to this population or, failing that, to send them a Medical Center that can provide hospital care as soon as possible. Physicians took advantage of this meeting for the scientific exchange, the discussion on projects in course and were planned the development of other consensuses being the closest the one of lymphomas. As in the previous consensuses that were published in a National magazine. The coordinator of this project raised to the attendees the possibility of a publication in magazines of greater prestige international since in countries like Mexico the cooperative work is not frequent and the group of haematologists belonging to ISSSTE are working towards this goal. This consensus was considered as a very well-organized platform to support the research of young fellows in the specialty to stimulate the team work in protocols of the different haematological pathologies and to inform the world the results achieved in a population of patients attended by the ISSSTE. In agreement with the main objective of this consensus on acute lymphoblastic leukaemia once finished and discussed throughout the haematological group, the coordinator for the

  15. The role of the State Security Service (Stasi) in the context of international clinical trials conducted by western pharmaceutical companies in Eastern Germany (1961-1990).

    Science.gov (United States)

    Erices, Rainer; Frewer, Andreas; Gumz, Antje

    2018-01-01

    After the building of the Berlin Wall in the 1960s, a number of international pharmaceutical manufacturers from the West had their drugs tested in Eastern Germany (GDR). So far, the extensive collection of documents on the subject stored in the archives of the GDR State Security Service (Stasi, MfS) has not been systematically analysed. Until now, the role of the Stasi with respect to the surveillance of the trials has been unclear. A keyword search within the database of the Stasi files was conducted. All available files were screened in order to identify institutions, companies and personnel involved in the clinical trials. On this basis, further files were requested. A total of 259 files were available for analysis. Relevant data was derived from 160 of these files. A contextualised approach was applied, which critically explored the origin, content, and impact of the data. In addition, an approach guided by the central steps of document analysis was applied. At least 400 clinical trials were conducted during the GDR period. The exact number remains speculative. According to references found in the Stasi files, it might have been considerably higher. Initially, the main goal of the trials was for the GDR authorities to decide whether to import certain Western drugs. By 1983, this intention had changed. Now, the primary aim of the trials was the procurement of foreign currency. The Stasi feared that the pharmaceutical companies could have a significant influence on GDR Health System. Stasi spies were holding positions in the responsible medical committees, universities, and hospitals. Constant surveillance by the Stasi served the purpose of monitoring any contact between people from the West and the East. Unknowingly, representatives of Western companies were surveilled by the Stasi. The studied documents also point to the fact that a number of clinical trials conducted during the GDR period did not comply with GDR regulations, and were therefore deemed illegal

  16. Impacts of the Events on the 11. of September 2001 in the United States on Radiation Protection, the Nuclear Waste Management and the Nuclear Security in Germany

    International Nuclear Information System (INIS)

    Krumbach, H.; Steinmetz, H.J.; Odoj, R.

    2009-01-01

    This report describes the effects of the terrorist attacks of the 11 September 2001, when four airliners hijacked and crashed. These attacks take effects on radiation protection, nuclear disposal and nuclear safety in Germany. Some of the measures, which where taken after the September 11, 2001 in order to improve the safety of nuclear installations are presented in the following. The taken measures increasing security against terrorist attacks are also exemplarily described in this report. The examples include the introduction of new identity papers, which offer a higher security level as well as the prohibition of carrying liquids with more than 100 ml in the hand luggage. Also the human security measures taken by different companies since the attack happened are subject of the contribution. Due to the necessary confidentiality regarding the threat scenarios and the taken protective measures detailed descriptions of the measures in this report are limited. (authors)

  17. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  18. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  19. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  20. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  1. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  2. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  3. International Legal Framework for Nuclear Security

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    The responsibility for nuclear security rests entirely with each State. There is no single international instrument that addresses nuclear security in a comprehensive manner. The legal foundation for nuclear security comprises international instruments and recognized principles that are implemented by national authorities. Security systems at the national level will contribute to a strengthened and more universal system of nuclear security at the international level. The binding security treaties are; Convention on the Physical Protection of Nuclear Material, the 2005 amendment thereto, Safeguards Agreements between the Agency and states required in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Model Protocol additional to agreement(s) between State(s) and the Agency for the application of Safeguards Convention on Early Notification of a Nuclear Accident, Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency, Convention on Nuclear Safety, Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management

  4. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  5. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  6. Development and Evaluation of an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    Science.gov (United States)

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    An on-line module on disease prevention was created for 4-H volunteer leaders who work with livestock projects in Washington to better prepare them to teach youth about bio-security and its importance in 4-H livestock projects. Evaluation of the module and usage statistics since the module's debut were collected and evaluated. The module increases…

  7. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  8. Experience of executing security measures

    International Nuclear Information System (INIS)

    Nakano, Hiromasa

    1995-01-01

    Japan possesses many nuclear power stations and atomic energy research and development facilities, and obtained much experience of security measures such as the inspection by the government and IAEA, the technical development and so on in respective facilities. In this report, the activities of security measures in Japan are introduced, centering around the experience of Power Reactor and Nuclear Fuel Development Corporation. Japan ratified the nuclear nonproliferation treaty (NPT) in 1976, and concluded the agreement with IAEA in 1977. It is called security measures to technically confirm that nuclear substances are not used for nuclear weapons, and to find early and prevent the production of nuclear weapons. The security measures consist of the quantity management by the balance of nuclear substances are the inspection by the government and IAEA. The present state of security measures in centrifugal uranium enrichment plants, the fabrication factories of low enriched uranium fuel, nuclear reactors, fuel reprocessing plants, and plutonium fuel factories is reported. The amount of inspection works of the government was 1861 man-day/year in 1993. As the subjects related to security measures of hereafter, the quantity management by respective facilities, the technology of verifying the measurement by inspectors, the points of beginning and finishing security measures, the security measures of hereafter and the international cooperation are described. (K.I.)

  9. Principal Areas of Activity to Improve the Monitoring of Nuclear Material Security and Accounting in the Russian Federation Ministry of Atomic Energy, within the Framework of the Program of Cooperation with the United States of America

    International Nuclear Information System (INIS)

    Erastov, Victor V.; Cunningham, Mitchel E.

    2004-01-01

    One of the major elements of the Russian Federation state system of accounting and control of nuclear materials (SSAC NM) is a 'universal' oversight system for nuclear materials security covering MPC and A at the federal, agency and enterprise levels. Oversight of SSAC NM has always been considered important by the State. In 1951 an Order of the USSR Council of Ministers created a department responsible for the accounting and storing of nuclear materials at the enterprises. The accounting and storing of NM was assigned to the First Central administrative board of the Council of Ministers of the USSR (the former name of the Ministry of Atomic Energy of Russia). Originally this activity included, in general, oversight of the maintenance of secrecy and security during the performance of various kinds of work connected with special production (classified products and materials). Since 1995, beginning with the enactment of the Federal law 'On the use of atomic energy,' this activity has received additional development beyond organizational-methodological activities. Technical equipment and new technologies have been introduced into work on the control of nuclear materials security (for example, means of controlling access to nuclear material, equipment for detecting radiation from nuclear material, etc.). The questions connected to development and perfection of oversight activity are laid out in the 6th section of the Federal targeted program 'Nuclear and radiation safety of Russia' in which the overall working plan for the creation and perfection of the state system accounting and the control of nuclear material in Russia are described. Russian-American collaboration on MPC and A began nearly simultaneously with the enactment of the Law 'On the use of atomic energy.' The purpose of this collaborative program is the introduction of modern technologies in the area of nuclear materials security to the Russian installations using nuclear materials for industrial and

  10. Brazilian Hybrid Security in South America

    Directory of Open Access Journals (Sweden)

    Rafael Duarte Villa

    2017-10-01

    Full Text Available Abstract Existing research on security governance in South America functions on dichotomous lines. Analysis of Brazil’s security practices is a case in point. On the one hand, scholars point out the balance of power and hegemonic institutions as the main discourse in the security practices between Brazil and its South American neighbors. On the other hand, some other emphasize the importance of democracy, cooperation on defense and security, and peaceful conflict resolution between states in the region as indicators for the emergence of a security community between Brazil and its neighbors in the South American region. The way in which multiple orders coexist is not given adequate attention in empirical research. This article seeks to overcome this dichotomy. By foregrounding Brazil’s regional security practices, particularly during the Lula and Rousseff administration, I show the hybrid and sometimes ambivalent security governance system in Brazil, where mechanisms of balance of power and security community overlap in important ways.

  11. Secure Wireless Sensor Networks: Problems and Solutions

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  12. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  13. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  14. Soil Security Assessment of Tasmania

    Science.gov (United States)

    Field, Damien; Kidd, Darren; McBratney, Alex

    2017-04-01

    The concept of soil security aligns well with the aspirational and marketing policies of the Tasmanian Government, where increased agricultural expansion through new irrigation schemes and multiple-use State managed production forests co-exists beside pristine World Heritage conservation land, a major drawcard of the economically important tourism industry . Regarding the Sustainable Development Gaols (SDG's) this could be seen as a exemplar of the emerging tool for quantification of spatial soil security to effectively protect our soil resource in terms of food (SDG 2.4, 3.9) and water security (SDG 6.4, 6.6), biodiversity maintenance and safeguarding fragile ecosystems (SDG 15.3, 15.9). The recent development and application of Digital Soil Mapping and Assessment capacities in Tasmania to stimulate agricultural production and better target appropriate soil resources has formed the foundational systems that can enable the first efforts in quantifying and mapping Tasmanian Soil Security, in particular the five Soil Security dimensions (Capability, Condition, Capital, Codification and Connectivity). However, to provide a measure of overall soil security, it was necessary to separately assess the State's three major soil uses; Agriculture, Conservation and Forestry. These products will provide an indication of where different activities are sustainable or at risk, where more soil data is needed, and provide a tool to better plan for a State requiring optimal food and fibre production, without depleting its natural soil resources and impacting on the fragile ecosystems supporting environmental benefits and the tourism industry.

  15. Human security from paradigm shift to operationalisation: job description for a human security worker

    NARCIS (Netherlands)

    Glasius, M.

    2008-01-01

    This article shows how human security has functioned as both a paradigm-shifting and a bridging concept, with its most significant implications being, first, the shift from a focus on state security to one on human rights, and, second, the indivisibility of physical and material security. The

  16. 24 CFR 350.5 - Creation of Participant's Security Entitlement; Security Interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Creation of Participant's Security... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.5 Creation of Participant's Security Entitlement... States to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  17. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security... of the United States to secure deposits of public money, including, without limitation, deposits to...

  18. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2006-01-01

    Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.

  19. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  20. 49 CFR 659.27 - Internal safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Internal safety and security reviews. 659.27... State Oversight Agency § 659.27 Internal safety and security reviews. (a) The oversight agency shall... safety and security reviews in its system safety program plan. (b) The internal safety and security...