WorldWideScience

Sample records for technology security administration

  1. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  2. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  3. Social Security Administration

    Science.gov (United States)

    ... Languages Sign in / up The United States Social Security Administration Cost-Of-Living Adjustment (COLA) Information about ... replacement Medicare card Change of Address my Social Security Check out your Social Security Statement , change your ...

  4. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  5. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three month long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Proceeding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near term, cost effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  6. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  7. Security bingo for administrators

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Have you ever thought about the security of your service(s) or system(s)? Show us and win one of three marvellous books on computer security! Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us at Computer.Security@cern.ch or P.O. Box G19710, by November 14th 2011.   Winners[1] must show us that they follow at least five good practices in a continuous horizontal row, vertical column or diagonal. For details on CERN Computer Security, please consult http://cern.ch/security. My service or system…   …is following a software development life-cycle. …is patched in an automatic and timely fashion. …runs a tightened local ingress/egress firewall. …uses CERN Single-Sign-On (SSO). …has physical access protections in place. …runs all processes / services / applications with least privileges. …has ...

  8. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  9. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  10. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ... SPACE ADMINISTRATION 48 CFR Parts 1804 and 1852 RIN 2700-AD46 Information Technology (IT) Security... NASA FAR Supplement (NFS) to update requirements related to Information Technology Security, consistent with Federal policies for the security of unclassified information and information systems. The...

  11. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  12. 76 FR 2142 - Employee Benefits Security Administration

    Science.gov (United States)

    2011-01-12

    ... Benefits Security Administration Hearing on Definition of ``Fiduciary'' AGENCY: Employee Benefits Security Administration, Labor. ACTION: Notice of hearing and extension of comment period. SUMMARY: Notice is hereby given that the Employee Benefits Security Administration will hold a hearing to consider issues attendant...

  13. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  14. Securing smart grid technology

    Science.gov (United States)

    Chaitanya Krishna, E.; Kosaleswara Reddy, T.; Reddy, M. YogaTeja; Reddy G. M., Sreerama; Madhusudhan, E.; AlMuhteb, Sulaiman

    2013-03-01

    In the developing countries electrical energy is very important for its all-round improvement by saving thousands of dollars and investing them in other sector for development. For Growing needs of power existing hierarchical, centrally controlled grid of the 20th Century is not sufficient. To produce and utilize effective power supply for industries or people we should have Smarter Electrical grids that address the challenges of the existing power grid. The Smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high-power converters, modern communications infrastructure along with modern IT services, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability and so on. The main objective of this paper is to provide a contemporary look at the current state of the art in smart grid communications as well as critical issues on smart grid technologies primarily in terms of information and communication technology (ICT) issues like security, efficiency to communications layer field. In this paper we propose new model for security in Smart Grid Technology that contains Security Module(SM) along with DEM which will enhance security in Grid. It is expected that this paper will provide a better understanding of the technologies, potential advantages and research challenges of the smart grid and provoke interest among the research community to further explore this promising research area.

  15. Social Security Administration Data for Enumeration Accuracy

    Data.gov (United States)

    Social Security Administration — This dataset provides data at the national level from federal fiscal year 2006 onwards for the accuracy of the assignment of Social Security numbers (SSN) based on...

  16. Information Technology and Security

    OpenAIRE

    Denning, Dorothy E.

    2003-01-01

    in Grave New World: Global Dangers in the 21st Century (Michael Brown ed.), Georgetown Press, 2003. (.pdf of prepublication version) This paper examines key trends and developments in information technology, and the implications of those developments on stability and security. Focus is on cyber threats to computer networks, including information theft and sabotage, and acts that disrupt or deny services. Seven trend areas are examined: ubiquity, mobility, hacking tools, perform...

  17. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ... ADMINISTRATION Information Collection; Implementation of Information Technology Security Provision AGENCY... new information collection requirement regarding Implementation of Information Technology Security... of Information Technology Security Provision,'' under the heading ``Enter Keyword or ID''...

  18. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  19. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  20. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  1. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... Security Administration--011, Transportation Security Intelligence Service Operations Files Systems of... Administration--011 Transportation Security Intelligence Service Operations Files previously published on... Security Intelligence Service (TSIS) Operations Files System of Records (69 FR 71828, December 10,...

  2. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  3. National Security Technology Incubator Operations Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  4. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  5. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  6. 20 CFR 221.3 - Social Security Administration jurisdiction.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Social Security Administration jurisdiction... RETIREMENT ACT JURISDICTION DETERMINATIONS § 221.3 Social Security Administration jurisdiction. The Board... Security Administration considers in determining benefits payable) to the Social Security...

  7. Input from Key Stakeholders in the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-01-31

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  8. Social Security Administration - Equal Access to Justice Act Payments

    Data.gov (United States)

    Social Security Administration — A dataset containing payment amounts made by the Social Security Administration for court-approved Equal Access to Justice Act (EAJA) payments for fiscal year data...

  9. National Security Technology Incubator Action Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  10. Two RFID-based solutions for secure inpatient medication administration.

    Science.gov (United States)

    Yen, Yi-Chung; Lo, Nai-Wei; Wu, Tzong-Chen

    2012-10-01

    Medication error can easily cause serious health damage to inpatients in hospital. Consequently, the whole society has to spend huge amount of extra resources for additional therapies and medication on those affected inpatients. In order to prevent medication errors, secure inpatient medication administration system is required in a hospital. Using RFID technology, such administration system provides automated medication verification for inpatient's medicine doses and generates corresponding medication evidence, which may be audited later for medical dispute. Recently, Peris-Lopez et al. (Int. J. Med. Inform., 2011) proposed an IS-RFID system to enhance inpatient medication safety. Nevertheless, IS-RFID system does not detect the denial of proof attack efficiently and the generated medication evidence cannot defend against counterfeit evidence generated from the hospital. That is, the hospital possesses enough privilege from the design of IS-RFID system to modify generated medication evidence whenever it is necessary. Hence, we design two lightweight RFID-based solutions for secure inpatient medication administration, one for online verification environment and the other for offline validation situation, to achieve system security on evidence generation and provide early detection on denial of proof attack.

  11. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  12. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  13. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: On April 12, 2010, the Homeland Security Science and Technology Advisory Committee announced in the... supplements that original meeting notice. DATES: The Homeland Security Science and Technology Advisory...

  14. Technology-Enabled Crime, Policing and Security

    Science.gov (United States)

    McQuade, Sam

    2006-01-01

    Crime, policing and security are enabled by and co-evolve with technologies that make them possible. As criminals compete with security and policing officials for technological advantage perpetually complex crime, policing and security results in relatively confusing and therefore unmanageable threats to society. New, adaptive and ordinary crimes…

  15. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  16. Security Requirements and Security Solutions For Community Administrations

    OpenAIRE

    Koneva, Natalia

    2003-01-01

    The Internet is slowly becoming a mirror of the society. Everything we do in the real world, we want to do out on the Net: conduct private conversations, keep personal papers, sign letters and contracts, shop, publish documents etc. All these things require security, but we go ahead using the net without asking too many questions. Today security issues are not a fundamental starting point. This also means that the limits of security are the limits of the Internet. There are several reaso...

  17. Security administration plan for HANDI 2000 business management system

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, D.

    1998-09-29

    This document encompasses and standardizes the integrated approach for security within the PP and Ps applications, It also identifies the security tools and methods to be used. The Security Administration Plan becomes effective as of this document`s acceptance and will provide guidance through implementation efforts and, as a ``living document`` will support the operations and maintenance of the system.

  18. Security Administrator Street Smarts A Real World Guide to CompTIA Security+ Skills

    CERN Document Server

    Miller, David R

    2011-01-01

    A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition o

  19. Social Security Administration - Overall Customer Service Satisfaction Data

    Data.gov (United States)

    Social Security Administration — This dataset provides data at the national level for overall satisfaction of customers who have used one of the main methods for conducting business with the agency:...

  20. Social Security Administration Percentage of Fast-Track Receipts

    Data.gov (United States)

    Social Security Administration — The dataset provides the percentage of fast-track receipts by state during the reporting fiscal year. Fast-tracked cases consist of those cases identified as Quick...

  1. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration....

  2. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration...

  3. External Service Providers to the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-02-28

    This report documents the identification and assessment of external service providers to the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant to Arrowhead Center, New Mexico State University. This report contains 1) a summary of the services to be provided by NSTI; 2) organizational descriptions of external service providers; and 3) a comparison of NSTI services and services offered by external providers.

  4. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  5. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  6. Network Security: What Non-Technical Administrators Must Know

    Science.gov (United States)

    Council, Chip

    2005-01-01

    Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…

  7. New technology for food systems and security.

    Science.gov (United States)

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  8. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  9. Social Security Administration - Yearly Data for Spoken Language Preferences of Supplemental Security Income Aged Applicants

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for SSI Aged benefits from federal fiscal year 2011...

  10. Social Security Administration - Yearly Data for Spoken Language Preferences of Social Security Retirement and Survivor Claimants

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits from federal fiscal year...

  11. Social Security Administration - Yearly Data for Spoken Language Preferences of Social Security Disability Insurance Claimants

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits from federal fiscal year...

  12. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet July 20-21... will be partially closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  13. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet January 26-28, 2010, at the... public. DATES: The Homeland Security Science and Technology Advisory Committee will meet January 26, 2010...

  14. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ... SECURITY Homeland Security Science and Technology Advisory Committee AGENCY: Science and Technology...: The Homeland Security Science and Technology Advisory Committee will meet April 20-22, 2010 at the.... This meeting will be closed to the public. DATES: The Homeland Security Science and Technology Advisory...

  15. Communication Technologies Preferred by School Based Administrators

    Science.gov (United States)

    Weir, Paul

    2012-01-01

    The purpose of this study was to determine the communication technologies preferred by school based administrators. This study surveyed and interviewed 96 school based administrators in a mid-sized suburban school system. The data show that individual emails, email lists, and cell phone technologies had the highest percentage effectiveness ratings…

  16. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  17. 20 CFR 423.3 - Other process directed to the Social Security Administration or the Commissioner.

    Science.gov (United States)

    2010-04-01

    ... Administration or the Commissioner. 423.3 Section 423.3 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.3 Other process directed to the Social Security Administration or the... on the Social Security Administration or the Commissioner of Social Security in his or her...

  18. Administrative corruption from sociology perspective and the relationship between administrative corruption and social security

    Directory of Open Access Journals (Sweden)

    Mohsen Zarei Jlyany

    2014-08-01

    Full Text Available certain principles Observance and non- Observance on organizing a social system will have Indisputable effect at the Organization. And administrative systems are not exempt from this, also the selection of the Administration components and also How to Place the components together can affect its performance. Meanwhile, the government's role in the prevalence or no-prevalence, the extent type and the way of administrative corruption influence, in this article, researchers wants to explore the reasonable cause of this procedure prevalence. So Thought owners by thinking more in this context, compensate Analysis deficiencies. Also following topics are included in this article, first of all. A Administrative corruption and social security definitions B Impact of administrative corruption on Social Security In terms of rational - traditional C the most important point of  Sociological Analysis And sociological theories relation with administrative corruption And relate these theories to deviations And its role in administrative corruption cases have been investigated.

  19. Addressing social resistance in emerging security technologies

    Science.gov (United States)

    Mitchener-Nissen, Timothy

    2013-01-01

    In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus.1 Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake. PMID:23970863

  20. Addressing social resistance in emerging security technologies.

    Science.gov (United States)

    Mitchener-Nissen, Timothy

    2013-01-01

    In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus. Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake.

  1. Administrator and Fidelity Based Secure Routing (AFSR Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Rohit Singh

    2016-03-01

    Full Text Available The proliferation of mobile computing and communication devices are driving a revolutionary change in our information society. Among all the applications and services run by mobile devices, network connections and corresponding data services are without doubt the most demanded services by mobile users. A MANET is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires, which makes it ideal for the present scenario. But, due to lack of any centralized infrastructure and access to trusted authorities, the security in MANET poses a huge threat. The prominent routing protocols we know are generally designed for environments where the nodes within a network are non-malicious. Due to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb its development. We propose a protocol for MANETs named “Administrator and Fidelity Based Secure Routing Protocol” (AFSR, which ensures secure routing through the network: by electing an Administrator node on the basis of Willingness and Fidelity, after which a node only communicates to that secure Admin node. This selection of secured admin nodes results in mitigation of various threats. We have evaluated our proposed protocol by simulating and comparing in GloMoSim.

  2. Center for Coastline Security Technology, Year 3

    Science.gov (United States)

    2008-05-01

    Figure 2.6.8: Close-Up Photograph of RPUUV Tail Section. Figure 2.6.9: Force and moments applied on a hydrofoil . Figure 2.6.10: The NACA 21016... hydrofoil profile. Florida Atlantic University 4/28/08 Page 10 Center for Coastline Security Technology Year Three-Final Report Figure...as a 3D wing with a NACA 21016 hydrofoil profile (Figure 2.6.10) held by 3 cylinders (Figure 2.6.8). Center for Coastline Security Technology Year

  3. Energy Relations in Russia: Administration, Politics and Security

    Science.gov (United States)

    Makarychev, Andrey

    2005-01-01

    This chapter analyses energy relations through a prism of three interlinked concepts: administration, politics and security. This triad describes the basic approaches to questions about technical, politicised and securitised energy. These three concepts are logically linked to one another and represent an elementary matrix; a prism through which…

  4. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  5. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Science.gov (United States)

    2010-04-01

    ... Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the related forms prescribed by the Social Security Administration for use by the public in applying...

  6. Social Security Administration Data for Extra Help with Medicare Prescription Drug Plan Cost

    Data.gov (United States)

    Social Security Administration — This file contains information about Social Security determinations of eligibility for Extra Help with Medicare Prescription Drug Plan Costs. Specific data elements...

  7. Social Security Administration Retirement, Survivors, and Disability Insurance (RSDI) Improper Payments

    Data.gov (United States)

    Social Security Administration — This dataset shows improper payment experience for the Social Security Retirement, Survivors, and Disability Insurance program paid to workers, their dependents, and...

  8. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  9. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Science.gov (United States)

    2010-04-01

    ... Administration officials in their individual capacities. 423.5 Section 423.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their individual capacities. Process to be served on Social Security Administration officials in their...

  10. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-01-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  11. Safeguards technology and computer security training

    Energy Technology Data Exchange (ETDEWEB)

    Hunteman, W.J.; Zack, N.R.

    1992-09-01

    The Los Alamos National Laboratory Safeguards Systems Group provides a variety of training services to the federal government and its contractors. The US Department of Energy sponsors a Safeguards Technology Training Program at Los Alamos in which seminars are offered concerning materials accounting for nuclear safeguards, measurement control for materials accounting, and variance propagation and systems analysis. These seminars provide guidance and techniques for accounting for nuclear material, developing and quantifying quality nuclear material measurements, and assessing overall accounting system performance. The Safeguards Systems Group also provides training in computer and data security applications; i.e., a workshop and the Los Alamos Vulnerability/Risk Assessment System (LAVA), computer system security officer training, and nuclear material safeguards for managers training, which are available on request. This paper describes the purpose, content, and expected benefits of the training activities that can be applied at nuclear materials facilities or where there are computer and/or data security concerns.

  12. Infrared: A Key Technology for Security Systems

    Directory of Open Access Journals (Sweden)

    Carlo Corsi

    2012-01-01

    Full Text Available Infrared science and technology has been, since the first applications, mainly dedicated to security and surveillance especially in military field, besides specialized techniques in thermal imaging for medical diagnostic and building structures and recently in energy savings and aerospace context. Till recently the security applications were mainly based on thermal imaging as surveillance and warning military systems. In all these applications the advent of room temperature, more reliable due to the coolers avoidance, low cost, and, overall, completely integrable with Silicon technology FPAs, especially designed and tailored for specific applications, smart sensors, has really been impacted with revolutionary and new ideas and system concepts in all the infrared fields, especially for security applications. Lastly, the advent of reliable Infrared Solid State Laser Sources, operating up to the Long Infrared Wavelength Band and the new emerging techniques in Far Infrared Submillimeter Terahertz Bands, has opened wide and new areas for developing new, advanced security systems. A review of all the items with evidence of the weak and the strong points of each item, especially considering possible future developments, will be reported and discussed.

  13. Modern Quantum Technologies of Information Security

    CERN Document Server

    Korchenko, Oleksandr; Gnatyuk, Sergiy

    2010-01-01

    In the paper systematization and classification of modern quantum technologies of the information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of used quantum technologies is given. The qualitative analysis of advantages and disadvantages of concrete quantum protocols is made. The current status of a problem of practical quantum cryptography using in telecommunication networks is considered. In particular, the short review of existing commercial systems of quantum key distribution is given.

  14. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  15. Technology Foundations for Computational Evaluation of Software Security Attributes

    Science.gov (United States)

    2006-12-01

    Technology Foundations for Computational Evaluation of Software Security Attributes Gwendolyn H. Walton Thomas A. Longstaff Richard C...security attributes to the functional behavior of the software . The emergence of CERT’s new function extraction (FX) technology , unavailable to previous... software meets security requirements if they have been specified in behavioral terms. FX technology prescribes effective means to create and record

  16. 20 CFR 410.706 - Effect of the Social Security Administration determination of entitlement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Effect of the Social Security Administration determination of entitlement. 410.706 Section 410.706 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL... the Social Security Administration determination of entitlement. Under section 435 of the BLBRA...

  17. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  18. Social Security Administration - Quarterly Data for Spoken Language Preferences of Social Security Retirement and Survivor Claimants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for Retirement and Survivor benefits from fiscal...

  19. Social Security Administration - Quarterly Data for Spoken Language Preferences of Social Security Disability Insurance Claimants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing initial claims for Disability Insurance benefits from...

  20. Social Security Administration - Quarterly Data for Spoken Language Preferences of Social Security Disability Insurance Claimants (2014-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing initial claims for Disability Insurance benefits for...

  1. Social Security Administration - Quarterly Data for Spoken Language Preferences of Social Security Retirement and Survivor Claimants (2014-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for Retirement and Survivor benefits for fiscal...

  2. Community Needs Assessment Office Administration & Technology (OAT).

    Science.gov (United States)

    Pezzoli, J. A.; Lum, Ku'uipo; Meyer, Diane

    The purpose of this survey was to obtain from employers the requisite skills and potential employment demand for office workers on Maui. Of particular interest was: (1) the assessment of various clerical skills and computer software in its relevance to the Office Administration & Technology (OAT) curriculum at Maui Community College; and (2)…

  3. Technologies that make administration of vaccines safer.

    Science.gov (United States)

    Clements, C John; Larsen, Gordon; Jodar, Luis

    2004-05-01

    There is an ever-expanding technology that is aimed at making the administration of vaccines safer. Conventional ways of administering vaccines are being upgraded, modified or replaced by a wide variety of innovations. The paradigm of liquid vaccines, needles and syringes is slow to change, but already developments are occurring that will change for ever the way vaccines are administered and will improve the safety record of immunization. The oral route of vaccine administration has generally been thought of as safe, but until now only the polio vaccine has been widely used in this way. The conventional method of vaccine administration is by injection. Many ingenious devices have become available that now make injecting safer. Inventors are now looking imaginatively to alternative routes and technologies for delivering vaccines. Vaccines are generally manufactured to extremely high standards and rarely are shown to be the cause of safety issues. People remain the weakest safety link is vaccine administration. Technologies that bypasses the ability of man to make bad decisions or to behave incorrectly are of tremendous value. The vaccine world is in the middle of a radical re-think about how vaccines might best be administered. The presentation of the vaccine can be altered to fit new technologies such as powder jet guns, or skin patches. Even the conventional needle and syringe have evolved to much safer versions, and are set to continue this evolution. All this means even safer vaccines and their delivery.

  4. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  5. Secure Logistic Management System Using Wireless Technologies

    Directory of Open Access Journals (Sweden)

    K.R. Prasanna

    2012-06-01

    Full Text Available This study proposes an idea of solving problems arising in logistics management, with the aid of wireless communication technologies like RFID, GSM and GPS. This study includes the modules of goods delivery status, vehicle location tracking, overloading of goods, interlocking system and finding out the misplaced goods. The integrated system consists of RFID and GPS technology for goods count and vehicle tracking. Overloading of goods is identified with the help of the weight sensors. If the goods are misplaced, the secure system will indicate the authorized base station and will not allow the vehicle to move. If the wrong goods are taken out from the cargo the buzzer will be ON and the message will be intimated to the concerned person through GSM.

  6. Promoting Economic Security through Information Technology Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... today, we have witness a lot of national security issues that risks the continued existence of the country as one ... lack of economic security such as Income security, Employment security, Job security, ..... In Australia, building and .... Table 4.2.8 Respondents by IT on Oil and Gas production and distribution.

  7. Smart Door Lock System: Improving Home Security using Bluetooth Technology

    National Research Council Canada - National Science Library

    Jayant Dabhade; Amirush Javare; Tushar Ghayal; Ankur Shelar; Ankita Gupta

    2017-01-01

      In today's world, smart home control system is necessary in daily life. As the technology is emerging a lot it's time for us to be more technical related to home secure security and easy access to the user...

  8. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  9. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-01-12

    ... as new developments in systems engineering, cyber- security, knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Department of Homeland Security Science and Technology Directorate (DHS S&T), Department of Homeland Security....

  10. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  11. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and.... SUMMARY: The Homeland Security Science and Technology Advisory Committee (HSSTAC) will meet on...

  12. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Employment and Training Administration TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher, Pennsylvania; TA-W-82,634A, Prudential Global Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business...

  13. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... ADMINISTRATION Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service... Appropriations Act of 2010 (Pub. L. 111-117), we are publishing this notice to advise the public of...

  14. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... ADMINISTRATION Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service... Appropriations Act of 2010 (Pub. L. 111-117), we are publishing this notice to advise the public of...

  15. Information technology orientation for young hospital administrators.

    Science.gov (United States)

    Bakshi, Syed Murtuza Hussain

    2012-01-01

    Information technology has evolved over the years and taken its place in every sector, including health care. Every health care professional uses a computer almost every day. Information technology is expected to provide the staff with reliable information for decision making, reducing medical errors and processing time and improving communication. As the health care market grows increasingly competitive and complex, hospitals are relying more and more on information technology as a primary tool to help them compete. Every postgraduate should take a basic course on computers and IT applications. Many universities and colleges offer a masters program in health administration, and with enormous numbers of new post graduates, well grounded in IT, are offering their services to hospitals and allied health care divisions. Their experiences are reflected in the various job codes, which illustrate the need for planning, careful investment, and educational training to put information technology to work in today's sophisticated advanced health care setting. Information technology cannot reach its full potential without a properly trained staff working together as a team.

  16. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Science.gov (United States)

    2010-04-01

    ... Administration and its employees in their official capacities. 423.1 Section 423.1 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its... the Social Security Administration or the Commissioner of Social Security should be sent to the...

  17. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of informatio

  18. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of

  19. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    Science.gov (United States)

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  20. Key Technologies and Applications of Secure Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Guo

    2013-07-01

    Full Text Available With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introduced several key technologies of secure multiparty computation: secret sharing and verifiable secret sharing, homomorphic public key cryptosystem, mix network, zero knowledge proof, oblivious transfer, millionaire protocol. Second we discussed the applications of secure multiparty computation in electronic voting, electronic auctions, threshold signature, database queries, data mining, mechanical engineering and other fields.

  1. Social Security Administration Yearly Asian and Native Hawaiian or Other Pacific Islander Representation

    Data.gov (United States)

    Social Security Administration — Federal employees self-identify their race and ethnicity by completing OPM'S Standard Form 181, "Ethnicity and Race Identification". We input the information into...

  2. Social Security Administration Public Inquiry Data - Average Processing Time (in days)

    Data.gov (United States)

    Social Security Administration — This dataset shows the average processing time for completed inquiries. The data source is the Electronic Management of Assignments and Correspondence system (EMAC)....

  3. The security and recent technology of quantum key distribution

    Institute of Scientific and Technical Information of China (English)

    WANG Xiang-bin; YING Hao; MA Huai-xing; PENG Cheng-zhi; YANG Tao; PAN Jian-wei

    2006-01-01

    In principle,quantum key distribution (QKD)can be used to make unconditionally secure private communication.However,the security of the existing real system for QKD needs to be carefully examined.Actually,the existing experiments based on weak coherent states are not secure under photon-number-splitting attack.Fortunately,the decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology.

  4. On the Horizon: New Advances in Security Technology

    Science.gov (United States)

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  5. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  6. Social Security Administration - Quarterly Data for Spoken Language Preferences of Supplemental Security Income Aged Applicants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Aged benefits from fiscal year 2016 -...

  7. Social Security Administration - Yearly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits from federal fiscal year...

  8. Social Security Administration - Quarterly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits from fiscal...

  9. Provisions on the Administration of Foreign Exchange in Domestic Securities Investments of Qualified Foreign Institutional Investors

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    @@ In accordance with the Regulations on the Foreign Exchange Administration of the People's Republic of China and the Measures for the Administration of Domestic Securities Investment by Qualified Foreign Institutional Investors,the State Administration of Foreign Exchange has formulated the Provisions on the Administration of Foreign Exchange in Domestic Securities Investments of Qualified Foreign Institutional Investors,which came into effect on the date of its promulgation.

  10. Security Risks and Modern Cyber Security Technologies for Corporate Networks

    CERN Document Server

    Gharibi, Wajeb

    2011-01-01

    This article aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate products are determined according to the last report from av-comparatives.org [1]. The detailed analysis of new features is provided based on an overview of products available on the market nowadays. At the end, an enumeration of modern trends in antivirus industry for corporate users completes this article. Finally, the main goal of this article is to stress an attention about new trends suggested by AV vendors in their solutions in order to protect customers against newest security threats.

  11. Security Service Technology for Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Aiqun Hu; Tao Li; Mingfu Xue

    2011-01-01

    As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development.

  12. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security, administrative data standards, and national identifiers. (a) HIPAA covered entities. An endorsed sponsor is...

  13. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA.... ACTION: Notice of a renewal of an existing computer matching program that expired on May 10,...

  14. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA.... ACTION: Notice of a renewal of an existing computer matching program that will expire on October 1,...

  15. 20 CFR 410.686b - Fee for services performed for an individual before the Social Security Administration.

    Science.gov (United States)

    2010-04-01

    ... before the Social Security Administration. 410.686b Section 410.686b Employees' Benefits SOCIAL SECURITY... Administration. (a) General. A fee for services performed for an individual before the Social Security... except that pursuant to section 206(a) of the Social Security Act the Administration may certify...

  16. Provisions on the Administration of Foreign Exchange in Domestic Securities Investments of Qualified Foreign Institutional Investors

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    @@ Chapter I General Provisions Article 1 Pursuant to the Regulations on the Foreign Exchange Administration of the People's Republic of China and the Measures for the Administration of Domestic Securities Investment by Qualified Foreign Institutional Investors(Order No.36 of 2006 of the China Securities Regulatory Commission,the People's Bank of China and the State Administration of Foreign Exchange),the Provisions is enacted to regulate the administration of foreign exchange of the qualified foreign institutional investors(hereinafter referred to as QFIIs)in the domestic securities market of China.

  17. Wearable Technology Devices Security and Privacy Vulnerability Analysis

    Directory of Open Access Journals (Sweden)

    Ke Wan Ching

    2016-05-01

    Full Text Available Wearable Technology also called wearable gadget, is acategory of technology devices with low processing capabilities that can be worn by a user with the aim to provide information and ease of access to the master devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable technology becomes significant when people start their invention in wearable computing, where their mobile devices become one of the computation sources. However, wearable technology is not mature yet in term of device security and privacy acceptance of the public. There exists some security weakness that prompts such wearable devices vulnerable to attack. One of the critical attack on wearable technology is authentication issue. The low processing due to less computing power of wearable device causethe developer's inability to equip some complicated security mechanisms and algorithm on the device.In this study, an overview of security and privacy vulnerabilities on wearable devices is presented.

  18. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  19. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    Science.gov (United States)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  20. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  1. Applying the Legal Security Principle in Administrative Law

    Directory of Open Access Journals (Sweden)

    Vasilica NEGRUŢ

    2015-08-01

    Full Text Available The objective of the paper is founded on a very current topic and of real interest. Using content analysis, through a descriptive study research, this study aims at identifying the content of the legal security principle and the way in which the courts in Romania, the public authorities achieve a proper application of this European principle. For this purpose, it was achieved an analysis of specific objectives aiming at, in particular, the requirements of legal security principle and the way in which they manifest in the national law. We appreciate that, although it does not beneficiate of an express assignment in the Romanian legislation, being a creation of jurisprudence, the legal security principle is in the current context, a fundamental principle of state law, which should give every citizen the opportunity to evolve into a secured, predictable legal environment.

  2. Database security and encryption technology research and application

    Science.gov (United States)

    Zhu, Li-juan

    2013-03-01

    The main purpose of this paper is to discuss the current database information leakage problem, and discuss the important role played by the message encryption techniques in database security, As well as MD5 encryption technology principle and the use in the field of website or application. This article is divided into introduction, the overview of the MD5 encryption technology, the use of MD5 encryption technology and the final summary. In the field of requirements and application, this paper makes readers more detailed and clearly understood the principle, the importance in database security, and the use of MD5 encryption technology.

  3. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  4. Applying New Network Security Technologies to SCADA Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  5. The Institute for Security Technology Studies (ISTS): overview

    Science.gov (United States)

    Kotz, David F.

    2004-09-01

    The Institute for Security Technology Studies (ISTS) was founded at Dartmouth College in 2000 as a national center of security research and development. The Institute conducts interdisciplinary research and development projects addressing the challenges of cyber and homeland security, to protect the integrity of the Internet, computer networks, and other interdependent information infrastructures. ISTS also develops technology for providing the information and tools necessary to assist communities and first responders with the evolving, complex security landscape. ISTS is a member of and administers the Institute for Information Infrastructure Protection (I3P), a consortium of 24 leading academic institutions, non-profits and federal laboratories that brings industry, academia and government together to articulate and focus on problems that need to be solved to help ensure the nation's information infrastructure is safe, secure, and robust.

  6. Study on the Community Policing Administration Innovation from the Perspective of the Public Security Governance

    Institute of Scientific and Technical Information of China (English)

    Jian LIN

    2015-01-01

    Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security administration. Since the 21th century, all walks of life have paid more attention to the public security administration in China, along with the deepened implementation of the reform and opening-up policy and the rapid development of economic construction and the effects from the outbreak of the SARS crisis and the frequent occurrence of many coal mine security accidents, etc. In this process, the non-traditional security issues and man-made crisis are gradually becoming the main threats currently to the public security of China, because the conflicts of interest and the social contradictions overlap and the social crisis such as cadres-masses and police-masses conflicts is being aggravated. At present, the Ministry of Public Security of China is pushing forward a community policing reform and great numbers of community polices in community policing administration will directly confront with the challenges of the public security administration complexity, and therefore, the promotion of community policing urgently needs the innovation of administration concept.

  7. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  8. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  9. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  10. 20 CFR 404.455 - Request by Social Security Administration for reports of earnings and estimated earnings; effect...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Request by Social Security Administration for....455 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY...) Request by Social Security Administration for report during taxable year; effect of failure to comply....

  11. 20 CFR 404.452 - Reports to Social Security Administration of earnings; wages; net earnings from self-employment.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Reports to Social Security Administration of...; and Nonpayments of Benefits § 404.452 Reports to Social Security Administration of earnings; wages... writing and must be filed at a Social Security Administration office before your report is due....

  12. Social Security Administration - Yearly Data for Spoken Language Preferences of End Stage Renal Disease Medicare Claimants

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits from federal fiscal year...

  13. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  14. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  15. Massachusetts Institute of Technology Security Studies Program

    Science.gov (United States)

    2006-01-01

    postdoctoral fellowships at the Olin Institute for Strategic Studies at Harvard University and the Center for International Security and Cooperation...government and business have frequently invited him to speak on Middle Eastern affairs. JEANNE GUILLEMIN’s training in sociology and anthropology led to her...been the recipient of several scholarships and awards, including two NATO Fellowships and two Fulbright Scholarships. In 1995, he was named to the

  16. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  17. An Administrative Tool for Distributed Security Task Scheduling

    Science.gov (United States)

    2007-11-02

    an instance of the configuration dialog, this way all of them can share the same information. A UML diagram [Booch 1999] of this can be seen in...Dasgupta, D and Gonzalez, F. "An intelligence decision support system for intrusion detection and response", Information Assurance in Computer Networks...There are many software packages that are available for computer systems to detect and report potential or existing computer system security

  18. Social Security Administration - Quarterly Data for Spoken Language Preferences of Social Security Disability Insurance Claimants (FY 2016, including 53rd week)

    Data.gov (United States)

    Social Security Administration — This dataset provides quarterly volumes of the Social Security Disability initial claims at the national level from federal fiscal year 2016 with quarter 4 shown two...

  19. Technology for low-cost PIR security sensors

    Science.gov (United States)

    Liddiard, Kevin C.

    2008-03-01

    Current passive infrared (PIR) security sensors employing pyroelectric detectors are simple, cheap and reliable, but have several deficiencies. These sensors, developed two decades ago, are essentially short-range moving-target hotspot detectors. They cannot detect slow temperature changes, and thus are unable to respond to radiation stimuli indicating potential danger such as overheating electrical appliances and developing fires. They have a poor optical resolution and limited ability to recognize detected targets. Modern uncooled thermal infrared technology has vastly superior performance but as yet is too costly to challenge the PIR security sensor market. In this paper microbolometer technology will be discussed which can provide enhanced performance at acceptable cost. In addition to security sensing the technology has numerous applications in the military, industrial and domestic markets where target range is short and low cost is paramount.

  20. Business Administration and Computer Science Degrees: Earnings, Job Security, and Job Satisfaction

    Science.gov (United States)

    Mehta, Kamlesh; Uhlig, Ronald

    2017-01-01

    This paper examines the potential of business administration vs. computer science degrees in terms of earnings, job security, and job satisfaction. The paper focuses on earnings potential five years and ten years after the completion of business administration and computer science degrees. Moreover, the paper presents the income changes with…

  1. 20 CFR 217.7 - Claim filed with the Social Security Administration.

    Science.gov (United States)

    2010-04-01

    ... Administration. (a) Claim is for life benefits. An application for life benefits under title II of the Social... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Claim filed with the Social Security Administration. 217.7 Section 217.7 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE...

  2. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  3. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  4. Microsoft Windows 7 Administrator's Reference Upgrading, Deploying, Managing, and Securing Windows 7

    CERN Document Server

    Orchilles, Jorge

    2010-01-01

    Microsoft Windows 7 Administrator's Reference gives you a complete overview of all the important day-to-day duties for which administrators are responsible. From a complete overview of upgrading and implementing to a detailed view of security in Windows 7, this book will keep you on track. Coverage includes: installing and deployment, managing the new Windows 7 environment, overview of the new desktop features, and technical help for troubleshooting and networking (to name a few). Written by current systems administrators with a deep experience in Windows, security, and networked and enterpri

  5. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... systems engineering, cyber-security, knowledge management and how best to leverage related technologies... Security and the evolution of the Cyber Security Division of DHS S&T. The committee will review the... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science...

  6. A SURVEY REPORT ON VPN SECURITY & ITS TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    JAYANTHI GOKULAKRISHNAN

    2014-08-01

    Full Text Available Virtual Private Network (VPN is a communication network which provides secure data transmission in an unsecured or public network by using any combination of technologies. A virtual connection is made across the users who are geographically dispersed and networks over a shared or public network, like the Internet. Even though the data is transmitted in a public network, VPN provides an impression as if the data is transmitted through private connection. This paper provides a survey report on VPN security and its technologies.

  7. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  8. Cyber Security Evaluation of II&C Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Ken Thomas

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  9. Security Management System for Oilfield Based on GSM Technology

    Directory of Open Access Journals (Sweden)

    Batchu Spandana,

    2011-06-01

    Full Text Available Security Management at the industries mainly during the night times at the oil field is a critical task for the security people. Checking for the oil thefting, power failure, temperature range checking, tilt checking of the tanks, leakage of oil by rotating the pump done by the thieves is a critical task for the security people. To improve the security level by implantation of wireless embedded technology will solve this problem. By reducing the manual power, at the site locations, and by improving the security level with the help of GSM based wireless technology which consist of transmitter (GSM modem at the site location and receiver is the GSM mobile. Information transmitted by the GSM modem at the plant location will be sent to the respective person’s mobile as a text message. The security people will take appropriate action according to the problem. For this we are used LPC2148 (ARM7 based microcontroller, which is the current dominant microcontroller in mobile based products and Softwaredevelopment tools as Keil, flash magic for loading hex file into the microcontroller.

  10. PERSEUS Technology: New Trends in Information and Communication Security

    CERN Document Server

    Filiol, Eric

    2011-01-01

    Using cryptography to protect information and communication has bacically two major drawbacks. First, the specific entropy profile of encrypted data makes their detection very easy. Second, the use of cryptography can be more or less regulated, not to say forbidden, according to the countries. If the right to freely protect our personal and private data is a fundamental right, it must not hinder the action of Nation States with respect to National security. Allowing encryption to citizens holds for bad guys as well. In this paper we propose a new approach in information and communication security that may solve all these issues, thus representing a rather interesting trade-off between apparently opposite security needs. We introduce the concept of scalable security based on computationnally hard problem of coding theory with the PERSEUS technology. The core idea is to encode date with variable punctured convolutional codes in such a way that any cryptanalytic attempt will require a time-consuming encoder reco...

  11. Security technologies and protocols for Asynchronous Transfer Mode networks

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.

    1996-06-01

    Asynchronous Transfer Mode (ATM) is a new data communications technology that promises to integrate voice, video, and data traffic into a common network infrastructure. In order to fully utilize ATM`s ability to transfer real-time data at high rates, applications will start to access the ATM layer directly. As a result of this trend, security mechanisms at the ATM layer will be required. A number of research programs are currently in progress which seek to better understand the unique issues associated with ATM security. This paper describes some of these issues, and the approaches taken by various organizations in the design of ATM layer security mechanisms. Efforts within the ATM Forum to address the user communities need for ATM security are also described.

  12. Systems and technologies for enhanced coastal maritime security

    Science.gov (United States)

    Carapezza, Edward M.; Bucklin, Ann

    2008-04-01

    This paper describes a design for an innovative command and control system for an intelligent coastal maritime security system. The architecture for this intelligent coastal maritime security system is derived from the forth generation real-time control (RCS) system architecture1 developed by the National Institute of Science and Technology (NIST) over the past twenty years. This command and control system is a decision support system for real-time monitoring, response and training for security scenarios that can be hosted at various locations along the coast of the United States where homeland security surveillance and response activities are required. Additionally, this paper describes the design for a derivative real-time simulation based environment that can be used as a state-of-art test bed for developing new hardware and software components to be integrated into previous versions of deployed real-time control systems.

  13. 76 FR 34886 - General Services Administration Acquisition Regulation; Implementation of Information Technology...

    Science.gov (United States)

    2011-06-15

    ... of Information Technology Security Provision AGENCY: Office of Acquisition Policy, General Services... to implement policy and guidelines for contracts and orders that include information technology (IT... information technology (IT) supplies, services and systems with security requirements. Comment...

  14. Securing Wireless LANs A Practical Guide for Network Managers, LAN Administrators and the Home Office User

    CERN Document Server

    Held, Gilbert

    2003-01-01

    Wireless LANs will enable small teams and communities to communicate via their mobile devices without cables. This new technology will facilitate communication in small businesses/teams such as in hospitals, on construction sites, warehouses, etc.Held provides a comprehensive guide to the implementation, planning and monitoring of all aspects of wireless LAN security in small offices/small to medium business (SMBs).Securing Wireless LANs is timely in addressing the security issues of this important new technology and equips its readers with the tools they need to make the appropriate choice fo

  15. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  16. National Security and Information Technology: The New Regulatory Option?

    Science.gov (United States)

    Irwin, Manley R.

    1987-01-01

    Summarizes recent developments in information technology research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It is concluded that government regulation as a policy strategy depends on how one defines national security. (Author/CLB)

  17. Information Security / 2002 Command & Control Research & Technology Symposium

    OpenAIRE

    Buddenberg, Rex

    2002-01-01

    Approved for public display, distribution unlimited 2002 Command & Control Research & Technology Symposium, Naval Postgraduate School, Code IS/Bu, Monterey,CA,93943 Security in information systems is a complex problem. Single solutions to complex problems don't exist and matching the appropriate solution (or more accurately, a set of solutions) to a requirement is necessary.

  18. Satellite Technology Contribution to Water and Food Security

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  19. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  20. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  1. Administrative Strategies for Successful Adoption of Computer Technology.

    Science.gov (United States)

    Aitken, Joan E.; Shedletsky, Leonard J.

    2001-01-01

    Suggests that offering online courses extends the reach of education to people who otherwise may be unable to complete courses. Gives administrators a perspective from the standpoint of professors who are not "techies," but have been involved in the infusion of technology. Proposes that administrators keep seven critical ideas before them while…

  2. Biofuels. Environment, technology and food security

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, Jose C.; Lora, Electo S.; Venturini, Osvaldo J. [NEST - Excellence Group in Thermal Power and Distributed Generation, Mechanical Engineering Institute, Universidade Federal de Itajuba (Brazil); Yanez, Edgar E. [CENIPALMA, Oil Palm Research Center - Cenipalma, Calle 21 42-C-47, Bogota (Colombia); Castillo, Edgar F. [CENICANA - Sugarcane Research Center of Colombia, Calle 58 N, 3BN-110, A.A., 9138 - Cali (Colombia); Almazan, Oscar [ICIDCA - Instituto Cubano de Investigaciones de los Derivados de la Cana de Azucar, Via Blanca y Carretera Central 804, San Miguel del Padron, A.P. 4036, La Habana (Cuba)

    2009-08-15

    The imminent decline of the world's oil production, its high market prices and environmental impacts have made the production of biofuels to reach unprecedent volumes over the last 10 years. This is why there have been intense debates among international organizations and political leaders in order to discuss the impacts of the biofuel use intensification. Besides assessing the causes of the rise in the demand and production of biofuels, this paper also shows the state of the art of their world's current production. It is also discussed different vegetable raw materials sources and technological paths to produce biofuels, as well as issues regarding production cost and the relation of their economic feasibility with oil international prices. The environmental impacts of programs that encourage biofuel production, farmland land requirements and the impacts on food production are also discussed, considering the life cycle analysis (LCA) as a tool. It is concluded that the rise in the use of biofuels is inevitable and that international cooperation, regulations and certification mechanisms must be established regarding the use of land, the mitigation of environmental and social impacts caused by biofuel production. It is also mandatory to establish appropriate working conditions and decent remuneration for workers of the biofuels production chain. (author)

  3. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  4. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Security Science and Technology Advisory Committee (HSSTAC) AGENCY: Science and Technology Directorate, DHS..., 56662-56663 that the Homeland Security Science and Technology Advisory Committee (HSSTAC) would meet on... will be held at the Department of Homeland Security (DHS), Science and Technology Directorate, 1120...

  5. Enabling National Security Through Dual-Use Technology

    Science.gov (United States)

    2014-04-30

    efforts. Kratz leads Lockheed Martin’s Automatic Identification Technology implementation, including RFID and UID. After successfully completing eight...bäÉîÉåíÜ=^ååì~ä=^Åèìáëáíáçå= oÉëÉ~êÅÜ=póãéçëáìã= qÜìêëÇ~ó=pÉëëáçåë= sçäìãÉ=ff= = Enabling National Security Through Dual-Use Technology Lou Kratz...Security Through Dual-Use Technology 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER

  6. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  7. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  8. The Role of School Administrators in the Use of Technology

    Science.gov (United States)

    Öznacar, Behcet; Dericioglu, Sonay

    2017-01-01

    This research is conducted to obtain the thoughts of state high school administrators to determine the obstacles that they are exposed to while using technology and attempting to integrate technology into their schools. The research is carried out through using the qualitative research design "phenomenology." The sample group of this…

  9. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  10. Japanese Prime Minister Shinzo Abe's two administrations: successes and failures of domestic and security policies

    OpenAIRE

    Lee, Dae Kyu

    2016-01-01

    Approved for public release; distribution is unlimited Japanese Prime Minister Shinzo Abe's two premierships were different from one another, with his second tenure proving to be relatively successful. This study compares the two Abe administrations, focusing on agenda setting, economic policy, election tactics, and security policy. It provides relevant explanations for Abe's political success in his second administration. Abe's pragmatism in statecraft mainly originated from his own polit...

  11. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Science.gov (United States)

    2013-03-20

    ..., such as new developments in systems engineering, cyber-security, ] knowledge management and how best to... SECURITY Homeland Security Science and Technology Advisory Committee Meeting Cancellation AGENCY: Science... Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting...

  12. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ... engineering, cyber-security, knowledge management and how best to leverage related technologies funded by... SECURITY Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY: The Secretary of Homeland Security has determined that...

  13. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ... as new developments in systems engineering, cyber-security, knowledge management and how best to... SECURITY Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC) ACTION... Homeland Security has determined that the renewal of the charter of the Homeland Security Science...

  14. 计算机网络安全技术%Security Technologies of Computer Network

    Institute of Scientific and Technical Information of China (English)

    罗明宇; 卢锡城; 卢泽新; 韩亚欣

    2000-01-01

    With the development of computer network,requirements of computer network security have been more and more urgent. In tills paper, goals of network security are reviewed. Several network attack methods,such as interruption,interception, modification, fabrication,are studied. Network security technologies,such as security mechan!sm,encryption,security detection,firewall,were discussed.

  15. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  16. 77 FR 18716 - Transportation Security Administration Postal Zip Code Change; Technical Amendment

    Science.gov (United States)

    2012-03-28

    ... Postal Zip Code Change; Technical Amendment AGENCY: Transportation Security Administration, DHS. ACTION: Final rule. SUMMARY: This rule is a technical change to correct a regulatory reference to TSA's postal zip code. This rule revises existing regulations to reflect organizational changes and it has no...

  17. Architecture design of Exit-Entry Administration Building of Shanghai Municipal Public Security Bureau

    Institute of Scientific and Technical Information of China (English)

    JIANG Limin; JIANG Du

    2007-01-01

    In retrospect of the architecture design of Exit- Entry Administration Building of Shanghai Municipal Public Security Bureau, this paper elaborates on the architect's pursuit of the symbol of the image, the fluidity of the space and the sequence of the function. It promotes a case which deals with the harmony of the architecture individuality and the urban space commonness in city center.

  18. 75 FR 31273 - Social Security Administration Implementation of OMB Guidance for Drug-Free Workplace Requirements

    Science.gov (United States)

    2010-06-03

    ... makes no substantive change to our policy or procedures for a drug-free workplace. DATES: This direct to... unintended changes this action makes in our policies and procedures for drug-free workplace. All comments on...-Free Workplace Requirements AGENCY: Social Security Administration. ACTION: Final rule with request for...

  19. The Social Security Administration's Youth Transition Demonstration Projects: Interim Report on Transition WORKS

    Science.gov (United States)

    Fraker, Thomas; Black, Alison; Mamun, Arif; Manno, Michelle; Martinez, John; O'Day, Bonnie; O'Toole, Meghan; Rangarajan, Anu; Reed, Debbie

    2011-01-01

    The Social Security Administration is funding a random assignment evaluation of six demonstration projects to improve employment and other outcomes for youth ages 14 to 25 who are either receiving disability benefits or are at high risk of receiving them in the future. This report reviews the Youth Transition Demonstration (YTD) projects, located…

  20. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... SECURITY Coast Guard Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast... technology to meet certain provisions of the Cruise Vessel Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection technologies. The Notice of request for...

  1. 31 CFR 363.45 - What are the rules for judicial and administrative actions involving securities held in...

    Science.gov (United States)

    2010-07-01

    ... administrative actions involving securities held in TreasuryDirect ®? 363.45 Section 363.45 Money and Finance... BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT General Provisions Governing Securities Held in TreasuryDirect § 363.45 What are the rules for judicial and...

  2. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  3. Information technology security at the Advanced Photon Source.

    Energy Technology Data Exchange (ETDEWEB)

    Sidorowicz, K. V.; McDowell, W.; APS Engineering Support Division

    2007-01-01

    The proliferation of 'botnets,' phishing schemes, denial-of-service attacks, root kits, and other cyber attack schemes designed to capture a system or network creates a climate of concern for system administrators, especially for those managing accelerator and large experimental-physics facilities, as they are very public targets. This paper will describe the steps being taken at the Advanced Photon Source (APS) to protect the infrastructure of the overall network with emphasis on security for the APS control system.

  4. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    Directory of Open Access Journals (Sweden)

    Mustafijur Rahman

    2015-03-01

    Full Text Available "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detection and lock system etc. Furthermore it has advanced security compared to other houses and can send a message to the user for action that occur inside his/her house while he/she is away from home. It can also allow a person to control appliances from a remote location by mobile phone using GSM technology.

  5. Social Security Administration - Quarterly Data for Spoken Language Preferences of Supplemental Security Income Aged Applicants (FY 2016, including 53rd week)

    Data.gov (United States)

    Social Security Administration — This dataset provides quarterly volumes of SSI Aged initial claims at the national level from federal fiscal year 2016 with quarter 4 shown two ways—we base one on a...

  6. MAINTAINING HIGH RESOLUTION MASS SPECTROMETRY CAPABILITIES FOR NATIONAL NUCLEAR SECURITY ADMINISTRATION APPLICATIONS

    Energy Technology Data Exchange (ETDEWEB)

    Wyrick, S.; Cordaro, J.; Reeves, G.; Mcintosh, J.; Mauldin, C.; Tietze, K.; Varble, D.

    2011-06-06

    The Department of Energy (DOE) National Nuclear Security Administration (NNSA) has a specialized need for analyzing low mass gas species at very high resolutions. The currently preferred analytical method is electromagnetic sector mass spectrometry. This method allows the NNSA Nuclear Security Enterprise (NSE) to resolve species of similar masses down to acceptable minimum detection limits (MDLs). Some examples of these similar masses are helium-4/deuterium and carbon monoxide/nitrogen. Through the 1980s and 1990s, there were two vendors who supplied and supported these instruments. However, with declining procurements and down turns in the economy, the supply of instruments, service and spare parts from these vendors has become less available, and in some cases, nonexistent. The largest NSE user of this capability is the Savannah River Site (SRS), located near Aiken, South Carolina. The Research and Development Engineering (R&DE) Group in the Savannah River National Laboratory (SRNL) investigated the areas of instrument support that were needed to extend the life cycle of these aging instruments. Their conclusions, as to the focus areas of electromagnetic sector mass spectrometers to address, in order of priority, were electronics, software and hardware. Over the past 3-5 years, the R&DE Group has designed state of the art electronics and software that will allow high resolution legacy mass spectrometers, critical to the NNSA mission, to be operated for the foreseeable future. The funding support for this effort has been from several sources, including the SRS Defense Programs, NNSA Readiness Campaign, Pantex Plant and Sandia National Laboratory. To date, electronics systems have been upgraded on one development system at SRNL, two production systems at Pantex and one production system at Sandia National Laboratory. An NSE working group meets periodically to review strategies going forward. The R&DE Group has also applied their work to the electronics for a

  7. Legal rights, efficiency and citizen involvement in the administration of social security cash benefits

    DEFF Research Database (Denmark)

    Von Hielmcrone, Nina

    2010-01-01

    to a vast growth in very detailed and complex rules and thereby lack of transparency for citizens and social workers. The fact that benefits are administered with the aid of computers means that neither administrators nor politicians find the abundance of rules to be a problem, and no limits are thereby set......The Danish social security legislation has been distinguished in recent years by an intense growth in rules and regulations. Numerous laws and ordinances have been promulgated, which make it extremely difficult for both citizens and authorities to come to grips with the laws, much less to gain...... to social security legislation, but also to other areas of the law which are characterised by bulk administration....

  8. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Science.gov (United States)

    2012-09-17

    ... Bureau of Industry and Security Proposed Information Collection; Comment Request; National Security and Critical Technology Assessments of the U.S. Industrial Base AGENCY: Bureau of Industry and Security... of U.S. industrial base sectors deemed critical to U.S. national security. The information gathered...

  9. Decision Making During National Security Crisis: The Case of the JFK Administration

    OpenAIRE

    Beckner, Lauren Renee

    2012-01-01

    Decision-making during crises is an important task that many elected officials face during their time in office. This thesis seeks to identify principles that make up a sound policy decision-making process and may lead to more positive outcomes. The analysis here is a comparative case study of three national security crises that faced the John F. Kennedy administration: the Bay of Pigs, the Cuban Missile Crisis, and the Vietnam conflict. Each case is examined for the presence of indicators...

  10. Terahertz Technology for Defense and Security-Related Applications

    DEFF Research Database (Denmark)

    Iwaszczuk, Krzysztof

    This thesis deals with chosen aspects of terahertz (THz) technology that have potential in defense and security-related applications. A novel method for simultaneous data acquisition in time-resolved THz spectroscopy experiments is developed. This technique is demonstrated by extracting the sheet...... conductivity of photoexcited charge carriers in semi-insulating gallium arsenide. Comparison with results obtained using a standard data acquisition scheme shows that the new method minimizes errors originating from uctuations in the laser system output and timing errors in the THz pulse detection. Furthermore...

  11. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... security threat assessment of law enforcement, immigration, and intelligence databases, including a... agency to perform a security threat assessment. The security threat assessment will be used to identify... ] security threat assessment to identify individuals who present a low risk to transportation security....

  12. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  13. Individual social security accounts: issues in assessing administrative feasibility and costs.

    Science.gov (United States)

    Olsen, K A; Salisbury, D L

    1998-11-01

    Whether to add individual accounts (IAs) to the Social Security system is a highly political issue. But almost lost in the debate so far have been any practical considerations about how to administer such accounts. Any discussion of whether to create individual accounts must also address the basic but critical questions of how they would work: Who would run them? What would they cost? Logistically, are they even possible? This EBRI Issue Brief provides an overview of the most salient administrative issues facing the current Social Security reform debate--issues that challenge proponents to carefully think through how their proposals could be implemented so as to achieve their policy goals. The options and difficulties in administering IAs raise concerns that cut across ideology. The object of this report is neither to dissuade the advocates nor support the critics of individual accounts. Rather, it is to bring practical considerations to a political debate that has largely ignored the pragmatic challenges of whether IAs would be too complex for participants to understand or too difficult for record keepers to administer. The major findings in this analysis include: Adding individual accounts to Social Security could be the largest undertaking in the history of the U.S. financial market, and no system to date has the capacity to administer such a system. The number of workers currently covered by Social Security--the largest single entitlement program in the nation--is at least four times higher than the combined number of all tax-favored employment-based retirement accounts in the United States, which are administered by hundreds of entities. Direct comparisons between employment-based retirement savings plans and Social Security reform are tenuous at best. Social Security covers workers and businesses that are disproportionately excluded from employment-based plans. Because of these differences, a system of individual Social Security accounts would be more

  14. Evaluating Security Technologies Used to Enhance Physical Security Capabilities at Domestic and Deployed Bases

    Science.gov (United States)

    2013-07-01

    secure wireless communications, behavioral analysis , and installation access control 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...Secure Wireless Communications  Installation Access Control  Integrated Waterside Security  Behavioral Analysis , and  Other areas as prescribed...Wireless Communications  Installation Access Control  Situational Awareness  Behavioral Analysis  Integrated Waterside Security, and  Other areas

  15. Is technology the best medicine? Three practice theoretical perspectives on medication administration technologies in nursing.

    Science.gov (United States)

    Boonen, Marcel Jmh; Vosman, Frans Jh; Niemeijer, Alistair R

    2016-06-01

    Even though it is often presumed that the use of technology like medication administration technology is both safer and more effective, the importance of nurses' know-how is not to be underestimated. In this article, we accordingly try to argue that nurses' labor, including their different forms of knowledge, must play a crucial role in the development, implementation and use of medication administration technology. Using three different theoretical perspectives ('heuristic lenses') and integrating this with our own ethnographic research, we will explore how nursing practices change through the use of medication technology. Ultimately, we will argue that ignoring (institutional) complexity and the various types of important knowledge that nurses have, will seriously complicate the implementation of medication administration technology. © 2015 John Wiley & Sons Ltd.

  16. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  17. Based on combination of L2TP and IPSec VPN security technology research

    Directory of Open Access Journals (Sweden)

    Ya-qin Fan

    2012-01-01

    Full Text Available This report is written to provide a method of building secure VPN by combination of L2TP and IPSec in order to meet the requirements of secure transmission of data and improve the VPN security technology. It remedies the secured short comes of L2TP Tunneling Protocol Tunneling Protocol and IPSec security. Simulation and analysis show that the construction method can improve the security of data transmission, and the simulation results of VPN is valuable for security professionals to refer.

  18. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007)...

  19. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be...

  20. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan...

  1. The Relationship between Technology Use of Administrators and Technology Use of Teachers: A Quantitative Study

    Science.gov (United States)

    Szafranski, Sandra L.

    2009-01-01

    The purpose of this quantitative correlational study was to assess the relationship between the level of technology use of administrators and the level of technology use of their teachers. The target sample was principals and teachers in nine schools in three school districts in south central Wisconsin. Participants were from one elementary…

  2. Social Security Administration - Quarterly Data for Spoken Language Preferences of End Stage Renal Disease Medicare Claimants (2014-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits for fiscal years 2014...

  3. Social Security Administration - Quarterly Data for Spoken Language Preferences of End Stage Renal Disease Medicare Claimants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits from fiscal year 2016...

  4. Intelligent Facial Recognition Systems: Technology advancements for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  5. Privacy and Security within Biobanking: The Role of Information Technology.

    Science.gov (United States)

    Heatherly, Raymond

    2016-03-01

    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source.

  6. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  7. A tracking technology for security personnel and first responders

    Science.gov (United States)

    Womble, Phillip; Barzilov, Alexander; Paschal, Jon; Hopper, Lindsay; Music, Abe; Morgan, Timothy; Moore, Ryan; Pinson, Dudley; Schultz, Frederick; Maston, Michael J.; Kowalik, Robert

    2005-05-01

    Northwest Nuclear, LLC (NWN), the Applied Physics Institute (API) at Western Kentucky University, and Crisis Prep Services, LLC (CPS) have developed a tracking technology for first responders and security personnel based upon the AeroScout system (a product of AeroScout, Inc.) and technologies developed independently by NWN, API, and CPS. These systems provide location information using 802.11XXX architecture by measuring the time of arrival of packets from a set of active radio frequency (RF) tags to a set of location receivers. The system can track and graphically display the location on maps, drawings, floor plans or photographs of tagged items on any 802.11-compliant devices (PDAs, laptops, computers, WiFi telephones) situated both outside and inside structures. This location information would be vital for tracking the location of first responders, security, and other emergency personnel during rescue operations; particularly, under adverse conditions (e.g., fires). NWN, API, and CPS have been improving the precision of the location measurement to an uncertainty of 20 cm or 8 inches (under certain conditions) and also developing algorithms to increase the accuracy. NWN and API personnel have developed: 1) special tags which indicate tampering or sudden movement and transmit briefly under these conditions, and 2) permanent and portable systems which can be deployed rapidly. Additional software created by Crisis Prep Services, LLC allows response force personnel to be tracked and located inside a building in real time as well as use the software and tags as a training and rehersal system. The location of each person is depicted on a drawing of the building and is displayed on a laptop computer or any other browser capable device.

  8. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.; Joslyn, Cliff A.; West, Curtis L.; Schanfein, Mark J.; Sayre, Amanda M.

    2017-07-17

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLT to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.

  9. Grid Security

    CERN Document Server

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  10. Innovative application of bar coding technology to breast milk administration.

    Science.gov (United States)

    Fleischman, Ellen K

    2013-01-01

    Hospitalized infants often receive expressed breast milk, either from their mother or from banked milk. Breast milk provides optimal nutrition for infants but because it is a body fluid it carries the risk of disease transmission. Therefore, administering the correct breast milk to hospitalized infants is essential. Bar coding technology, used in hospitals to prevent errors related to medication administration, can be proactively applied to prevent breast milk administration errors. Bar coding systems offer advantages over manual verification processes, including decreasing errors due to human factors and providing for automated entry of feedings in the electronic health record. However, potential barriers to successful implementation must be addressed. These barriers include equipment and training costs, increased time to perform the additional steps with bar coding, and work-arounds.

  11. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  12. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  13. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Science.gov (United States)

    2010-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  14. Research Market Gap in Law Enforcement Technology: Lessons from Czech Security Research Funding Programmes

    Directory of Open Access Journals (Sweden)

    Luděk Moravec

    2014-12-01

    Full Text Available While security research funding schemes are nothing new to the EU (Horizon 2020 and FP7, or to several Member States, their priorities and procedures are usually decided administratively or shaped by advisory groups of varying membership. Only recently did the EU shift its focus to the role of end users in security research programmes, seeking their input in order to maximise the utility of funded solutions. Such a hint to limited usefulness of some industrial solutions is not exactly inconspicuous. This paper discusses the gap between the stated needs of law enforcement agencies in terms of R&D funding and the grant project applications in the area of law enforcement. It aims to define and describe the gap, and consequently the market opportunities, between the supply and demand sides represented by industry-driven grant project applications and end-user-formulated calls. The study is based on empirical data from two Czech security research funding programmes that have been running since 2010 and should deliver their results by 2015. It seeks to contribute some preliminary observations about the structure of both end user needs and industry capabilities in such a particular area as law enforcement technology.

  15. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology (IT) resources....

  16. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  17. Public Procurement of Security Technology : A multiple case study of Swedish municipalities and regions

    OpenAIRE

    Rolandsson, Rasmus

    2016-01-01

    Municipalities and regions in Sweden have an increasing need to purchase security technology to secure their properties and their operations. However this procurement process is strictly regulated by the Swedish procurement act (“Lagen om Offentlig Upphandling”, LoU), leading to a similar procurement process. However no academic studies have been done on the procurement of security technology in local authorities.This thesis explores and maps this process and the important aspects which affec...

  18. Patient safety and technology-driven medication - A qualitative study on how graduate nursing students navigate through complex medication administration.

    Science.gov (United States)

    Orbæk, Janne; Gaard, Mette; Fabricius, Pia; Lefevre, Rikke S; Møller, Tom

    2015-05-01

    The technology-driven medication process is complex, involving advanced technologies, patient participation and increased safety measures. Medication administration errors are frequently reported, with nurses implicated in 26-38% of in-hospital cases. This points to the need for new ways of educating nursing students in today's medication administration. To explore nursing students' experiences and competences with the technology-driven medication administration process. 16 pre-graduate nursing students were included in two focus group interviews which were recorded, transcribed and analyzed using the systematic horizontal phenomenological-hermeneutic template methodology. The interviews uncovered that understanding the technologies; professionalism and patient safety are three crucial elements in the medication process. The students expressed positivity and confidence in using technology, but were fearful of committing serious medication errors. From the nursing students' perspective, experienced nurses deviate from existing guidelines, leaving them feeling isolated in practical learning situations. Having an unclear nursing role model for the technology-driven medication process, nursing students face difficulties in identifying and adopting best practices. The impact of using technology on the frequency, type and severity of medication errors; the technologies implications on nursing professionalism and the nurses ability to secure patient adherence to the medication process, still remains to be studied. Copyright © 2014 Elsevier Ltd. All rights reserved.

  19. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  20. Graduate Research Assistant Program for Professional Development at Oak Ridge National Laboratory (ORNL) Global Nuclear Security Technology Division (GNSTD)

    Energy Technology Data Exchange (ETDEWEB)

    Eipeldauer, Mary D [ORNL; Shelander Jr, Bruce R [ORNL

    2012-01-01

    The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) was established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.

  1. Improving Drugs Administration Safety in Pediatric Resuscitation Using Mobile Technology.

    Science.gov (United States)

    Hagberg, Hamdi; Siebert, Johan; Gervaix, Alain; Daehne, Peter; Lovis, Christian; Manzano, Sergio; Ehrler, Frederic

    2016-01-01

    The fast preparation of drugs during pediatric resuscitation is of utmost importance. The influence of the patient's weight on the drug doses requires to perform complex calculations and is a source of errors. A technological solution could be a real help in avoiding these kinds of mistakes. Relying on a user centered approach we have developed an application supporting drug preparation. It has been tested in simulations with predefined scenario. The developed tool consists of a screen displaying a list of drug that can be administered. When the user select a drug, the instructions regarding its preparation are displayed with all dosage precisely calculated. The tool has demonstrated a significant reduction of errors associated to administration, a speeding up the overall process and has been well received by the nurses.

  2. Building Fit-For-Purpose Land Administration Systems: Providing Secure Tenure for All

    DEFF Research Database (Denmark)

    Lemmen, Christiaan; Enemark, Stig; McLaren, Robin

    2016-01-01

    administration following the FFP principles for building the spatial framework. The Social Tenure Domain Model (STDM) is recommended.  ‘Review (Conversion)’ means assessing the evidence of rights and any possible out-standing claims and when conditions are met, the security of the rights will be increased....... This paper discusses the building of the FFP approach at country level. Implementation is strongly related to the recognition of the continuum of land rights. Implementation of the FFP approach means to recognise, record and review land rights:  ’Recognise’ involves a procedure for recognition....... A complete overview is required of the tenure systems and land rights related to the areas affected. All formal and informal tenure categories and sub-categories should be identified and related to space. It is recommended that a National Tenure Atlas will be developed in order to get overview of the spatial...

  3. Privacy in confidential administrative micro data: implementing statistical disclosure control in a secure computing environment.

    Science.gov (United States)

    Hochfellner, Daniela; Müller, Dana; Schmucker, Alexandra

    2014-12-01

    The demand for comprehensive and innovative data is constantly growing in social science. In particular, micro data from various social security agencies become more and more attractive. In contrast to survey data, administrative data offer a census with highly reliable information but are restricted in their usage. To make them accessible for researchers, data or research output either have to be anonymized or released after disclosure review procedures have been used. This article discusses the trade-off between maintaining a high capability of research potential while protecting private information, by exploiting the data disclosure portfolio and the adopted disclosure strategies of the Research Data Center of the German Federal Employment Agency. © The Author(s) 2014.

  4. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  5. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  6. Exploring Relationships between Personal Innovativeness and Acceptance of Technology of School Administrators

    Science.gov (United States)

    Moore, Pamela Richardson

    2012-01-01

    An understanding of school administrators' personal innovativeness relative to technology acceptance is essential to the implementation of technology programs. School administrators serve as visionary instructional leaders whose beliefs about technology impact technology integration at their schools. The purpose of the "ex post…

  7. 76 FR 40352 - National Nuclear Security Administration; Amended Record of Decision: Site-Wide Environmental...

    Science.gov (United States)

    2011-07-08

    ...The National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of Energy (DOE), is amending its September 26, 2008 Record of Decision (ROD) issued pursuant to the Site-Wide Environmental Impact Statement for the Continued Operation of Los Alamos National Laboratory, Los Alamos, New Mexico (LANL SWEIS; DOE/EIS-0380). That ROD announced NNSA's decision, among other things, to continue and expand support for the Global Threat Reduction Initiative (GTRI) Off-Site Source Recovery Project (OSRP). These activities include the recovery, storage, and disposal of certain high-activity sealed sources to minimize risks to national security and public health and safety. The LANL SWEIS and subsequent ROD did not address shipment of sealed sources through the global commons and the use of a commercial facility in managing these sealed sources as part of the GTRI program's recovery of sealed sources. In April, 2011, NNSA prepared a Supplement Analysis for the Transport and Storage of High-Activity Sealed Sources from Uruguay and Other Locations (DOE/EIS-0380-SA-02) to analyze the potential impacts of these actions. Based on the LANL SWEIS and the Supplement Analysis, NNSA is amending the ROD for the LANL SWEIS to announce its decision that these actions can be expected to take place as part of the ongoing GTRI program.

  8. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Science.gov (United States)

    2013-09-12

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc... and accurate information concerning the securities of Security Intelligence Technologies, Inc. because...

  9. Development of a security system for assisted reproductive technology (ART).

    Science.gov (United States)

    Hur, Yong Soo; Ryu, Eun Kyung; Park, Sung Jin; Yoon, Jeong; Yoon, San Hyun; Yang, Gi Deok; Hur, Chang Young; Lee, Won Don; Lim, Jin Ho

    2015-01-01

    In the field of assisted reproductive technology (ART), medical accidents can result in serious legal and social consequences. This study was conducted to develop a security system (called IVF-guardian; IG) that could prevent mismatching or mix-ups in ART. A software program was developed in collaboration with outside computer programmers. A quick response (QR) code was used to identify the patients, gametes and embryos in a format that was printed on a label. There was a possibility that embryo development could be affected by volatile organic components (VOC) in the printing material and adhesive material in the label paper. Further, LED light was used as the light source to recognize the QR code. Using mouse embryos, the effects of the label paper and LED light were examined. The stability of IG was assessed when applied in clinical practice after developing the system. A total of 104 cycles formed the study group, and 82 cycles (from patients who did not want to use IG because of safety concerns and lack of confidence in the security system) to which IG was not applied comprised the control group. Many of the label paper samples were toxic to mouse embryo development. We selected a particular label paper (P touch label) that did not affect mouse embryo development. The LED lights were non-toxic to the development of the mouse embryos under any experimental conditions. There were no differences in the clinical pregnancy rates between the IG-applied group and the control group (40/104 = 38.5 % and 30/82 = 36.6 %, respectively). The application of IG in clinical practice did not affect human embryo development or clinical outcomes. The use of IG reduces the misspelling of patient names. Using IG, there was a disadvantage in that each treatment step became more complicated, but the medical staff improved and became sufficiently confident in ART to offset this disadvantage. Patients who received treatment using the IG system also went through a somewhat

  10. The impact of medical technology on sense of security in the palliative home care setting.

    Science.gov (United States)

    Munck, Berit; Sandgren, Anna

    2017-03-02

    The increase in the use of medical devices in palliative home care requires that patients and next-of-kin feel secure. Therefore, the aim was to describe medical technology's impact on the sense of security for patients, next-of-kin and district nurses. Deductive content analysis was conducted on data from three previous studies, using the theoretical framework 'palliative home care as a secure base'. The use of medical technology was shown to have an impact on the sense of security for all involved. A sense of control was promoted by trust in staff and their competence in managing the technology, which was linked to continuity. Inner peace and being in comfort implied effective symptom relief facilitated by pain pumps and being relieved of responsibility. Health care professionals need to have practical knowledge about medical technology, but at the same time have an awareness of how to create and maintain a sense of security.

  11. Soils and food security | Nortcliff | Nigerian Journal of Technological ...

    African Journals Online (AJOL)

    Soils and food security. ... Whilst all these threats are important of particular significance is the loss of soil through ... A threat impacting on food security strongly in Africa is nutrient mining where insufficient nutrients are returned to the soil after ...

  12. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  13. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    Science.gov (United States)

    Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.

    2002-08-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.

  14. State-of-The-Art Technologies Used in Training Delivery and Administration at the Institute of Public Administration: Case Study

    Science.gov (United States)

    Ewain, Saleh A. S.

    2005-01-01

    The Institute of Public Administration (IPA), in Saudi Arabia, is a well renowned training institution designated for training civil servants in the Kingdom of Saudi Arabia. This paper mainly discusses the uses of technologies in the administrative aspects of the IPA. The author also points out the obstacles faced and lessons learned from the…

  15. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  16. Advances in cyber security technology, operations, and experiences

    CERN Document Server

    Hsu, D Frank

    2013-01-01

    As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. The world's foremost cyber security experts, from Ruby Lee, Ph.D., the Forrest G. Hamrick professor of engineering and Director of the Princeton Architecture Laboratory for Multimedia and Security (PALMS) at Princeton University; to Nick Mankovich, Chief Information Security Officer of Royal Philips Electronics; to FBI Director Robert S. Mueller III; to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on ho

  17. Survey of Security Technologies on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuwei Yang

    2015-01-01

    Full Text Available Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized research progress of sensor network security issues as three aspects, key management, authentication, and secure routing, analyzed and commented on these results advantages and disadvantages and pointed out the future direction of the hot research field.

  18. Patient safety and technology-driven medication e A qualitative study on how graduate nursing students navigate through complex medication administration

    DEFF Research Database (Denmark)

    Orbæk, Janne; Gaard, Mette; Fabricius, Pia

    2014-01-01

    ways of educating nursing students in today's medication administration. Aim: To explore nursing students' experiences and competences with the technology-driven medication administration process. Methods: 16 pre-graduate nursing students were included in two focus group interviews which were recorded...... for the technology-driven medication process, nursing students face difficulties in identifying and adopting best practices. The impact of using technology on the frequency, type and severity of medication errors; the technologies implications on nursing professionalism and the nurses ability to secure patient......Background: The technology-driven medication process is complex, involving advanced technologies, patient participation and increased safety measures. Medication administration errors are frequently reported, with nurses implicated in 26e38% of in-hospital cases. This points to the need for new...

  19. U.S.-Brazil security cooperation and the challenge of technology transfer

    OpenAIRE

    Storer, Robert J.

    2014-01-01

    Approved for public release; distribution is unlimited. Since 2010, the United States and Brazil have made efforts to expand security cooperation between the two countries with the signing of a defense cooperation agreement, a general security of military information agreement, and the establishment of a defense cooperation dialogue. Despite these positive steps, the issue of technology transfer threatens to impede greater U.S.-Brazil security cooperation. Brazilian defense policy identifi...

  20. Water harvesting technologies in ensuring food security: Lessons ...

    African Journals Online (AJOL)

    Mo

    One of the success stories in water development and food security in the pastoral and agro-pastoral areas of Somali ... hydroelectric power, live animals for export, and tourist ... of overgrazing, land degradation and conflicts between clans.

  1. 48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.

    Science.gov (United States)

    2010-10-01

    ... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information...

  2. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible...

  3. An Analysis of Bluetooth Technology,Features,Future and Security

    OpenAIRE

    Ullah, Malik Zaka

    2009-01-01

    In this thesis I present my analysis on various aspects of Bluetooth wireless technology. The Bluetooth technology is relatively new as compared to other technologies and there is huge potential of its growth and practical application. Therefore during in this thesis I try to analysis the current status of this technology and issue which are related to this technology. The first section introduces Bluetooth technology, in which I discussed the architecture of Bluetooth and different terminolo...

  4. Adaptive security systems -- Combining expert systems with adaptive technologies

    Energy Technology Data Exchange (ETDEWEB)

    Argo, P.; Loveland, R.; Anderson, K. [and others

    1997-09-01

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting.

  5. Reviews of computing technology: Securing network applications, Kerberos and RSA

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, S.M.

    1992-06-01

    This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.

  6. Technology safeguards needed as security rule audits loom.

    Science.gov (United States)

    Gersh, Deborah; Hoey, Laura G; McCrystal, Timothy M; Tolley, David C

    2012-05-01

    The Department of Health and Human Services will conduct security rule audits that will involve on-site visits and include: Compliance-focused interviews with key organizational leaders. Scrutiny of physical operations controls, especially regarding storage, maintenance, and use of protected health information. Assessment of organizational policies and procedures to ensure compliance with privacy and security rules. Identification of regulatory compliance areas of concern.

  7. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  8. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... COMMISSION Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys... Energy Corp. because it has not filed any periodic reports since the period ended December 31, 2006. It... concerning the securities of Biomedical Waste Systems, Inc. because it has not filed any periodic reports...

  9. The Impact of Bar Code Medication Administration Technology on Reported Medication Errors

    Science.gov (United States)

    Holecek, Andrea

    2011-01-01

    The use of bar-code medication administration technology is on the rise in acute care facilities in the United States. The technology is purported to decrease medication errors that occur at the point of administration. How significantly this technology affects actual rate and severity of error is unknown. This descriptive, longitudinal research…

  10. [Supervised administration of Alzheimer's patients using information communication technology].

    Science.gov (United States)

    Noda, Yasuha; Sakata, Yoshifumi; Kubota, Masakazu; Uemura, Kengo; Kihara, Takeshi; Kimura, Toru; Ino, Masashi; Tsuji, Teruyuki; Hayashi, Michiyuki; Kinoshita, Ayae

    2014-12-01

    Drug adherence is central to the treatment of dementia, which might reduce compliance due to memory loss, particularly among home-based patients with dementia. In order to improve drug adherence, we suggest the efficient and effective supervised administration by use of information communication technology(ICT). ICT makes face-to-face real-time communication possible, and it also enables picture sharing. Therefore, it might be useful to apply ICT to controlling and supervising medication for patients with dementia to improve drug adherence. Accordingly, we enrolled patients who were supposed to take a newly prescribed anti-dementia patch containing the choline esterase inhibitor rivastigmine(Rivastach®)and investigated the effect of ICT-based intervention for drug adherence, emotional change, and cognitive change, utilizing Skype, a free communication software program. Scheduled Skype interventions increased drug adherence ratio, levels of subjective satisfaction, and instrumental activities of daily living(IADL). Furthermore, we can provide patients and their caregivers with a feeling of safety through regular bidirectional communication, as patients can easily consult medical staff regarding the adverse effects of newly prescribed drugs. Instead of frequent visits to their primary physicians, ICT-based communications can be used as a substitute for supervision of medication, given the availability of the telecommunication system. By directly connecting the medical institution to the home, we expect that this ICT-based system will expand into the geriatric care field, including the care of elderly individuals living alone.

  11. 75 FR 67804 - Future Systems Technology Advisory Panel Meeting

    Science.gov (United States)

    2010-11-03

    ... ADMINISTRATION Future Systems Technology Advisory Panel Meeting AGENCY: Social Security Administration (SSA... Hotel Washington, DC, Diplomat Room. ADDRESSES: 2500 Calvert Street, NW., Washington, DC 20008... Security independent advice and recommendations on the future of systems technology and electronic services...

  12. Investigate the Computer Information Network Security Technology and the Development Direction

    OpenAIRE

    Ping Teng

    2017-01-01

    After China’s accession to the WTO, the computer information network security technology of our country has a rapid development, bring many conveniences for the people’s life and work, indirectly changing their daily life and working mode. For the whole development situation of our country, the development direction of informatization is the inevitable trend of development in our country, while the using process of computer information network security technology in the society still exist ma...

  13. 76 FR 75799 - General Administrative Regulations; Mutual Consent Cancellation; Food Security Act of 1985...

    Science.gov (United States)

    2011-12-05

    ... Consent Cancellation; Food Security Act of 1985, Implementation; Denial of Benefits; and Ineligibility for... Crop Insurance Act. (1) Section 1764 of the Food Security Act of 1985 (Pub. L. 99-198); (2) 21 U.S.C...-- 3. Remove and Reserve subpart F, Food Security Act of 1985, Implementation; Denial of Benefits. 4...

  14. Evolving towards a European administration of the issues of Freedom, Security and Justice

    Directory of Open Access Journals (Sweden)

    Pablo Acosta Gallo

    2010-09-01

    Full Text Available Building Europe is a process that, for 50 years, has been characterised by a high degree of uncertainty, guided more by pragmatism than by ideological or dogmatic factors. However, the impact of the decisions adopted at the EU level on the social and legal sphere of EU citizens is one that is unquestionable and, furthermore, increasing. Among the most important aspects of EU law that have had the greatest individual impact are the measures that comprise the Area of Freedom, Security and Justice. True citizenship of the EU necessarily involves sufficient guarantees in these three areas, and the powers of the Union have committed themselves to constituting and strengthening these guarantees. Nevertheless, the successive EU enlargements have highlighted the shortcomings in this field. The entry of new countries into the EU provides economic capacity and social and cultural wealth, but it also adds new dimensions in the area of border control and of crime prevention and limitation, thereby increasing the need for greater capacity in the areas of policing and the law. Policies require institutions in order for them to be introduced. In the field of justice, Eurojust can be considered the embryo of an EU administration in this area. This is where the tension between the national and the EU is manifested.

  15. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  16. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Science.gov (United States)

    2010-10-01

    ... contractor shall include the following statement on deliveries of hardware, software, and data products... delivery of hardware, software, or data on diskettes under this contract. (d) This clause shall not limit... Virus Security. 2452.239-71 Section 2452.239-71 Federal Acquisition Regulations System DEPARTMENT...

  17. Using Automatic Identification System Technology to Improve Maritime Border Security

    Science.gov (United States)

    2014-12-01

    18 Dave Dixon et al., Security Modeling for Maritime Port Defense Resource Allocation ( Aiken , SC: Savannah River National Laboratory, 2010), 3...Maritime Port Defense Resource Allocation. Aiken , SC: Savannah River National Laboratory, 2010. Eggers, William D., and John O’Leary. If We Can Put a

  18. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  19. Semiconductor Technology and U.S. National Security

    Science.gov (United States)

    2010-04-21

    international community to a nation that ―is focused not on the world but on itself.Ŝ While China’s efforts to expand its economic and military strengths are...26, 2009) 39 Lieberman, 5. 40 Department of Commerce Home Page, http://www.osec.doc.gov/ omo /dmp/default. 41 Bureau of Industry and Security

  20. Sécurité, justice et technologies Security, Justice and Technologies

    Directory of Open Access Journals (Sweden)

    Jean-Charles Froment

    2011-10-01

    Full Text Available Les réflexions qui structurent cet article sont issues de près de quinze années d’observation du développement du recours aux nouvelles technologies de contrôle dans le champ de la justice et de la sécurité. Elles s’appuient plus spécifiquement sur l’étude de deux d’entre elles, principalement le placement sous surveillance électronique et accessoirement la vidéosurveillance, qui ont vu leur champ d’application s’élargir considérablement en l’espace d’une vingtaine d’années. De ces travaux se dégagent neuf clés de lecture à partir desquelles on peut analyser les caractéristiques et l’impact du développement de ces technologies (la vitesse de circulation des modèles ; le jeu du marché ; la question du contrôle ; les formes de la désinstitutionnalisation du pouvoir ; la problématique des libertés ; la plasticité des usages ; les stratégies de légitimation ; les enjeux de régulation ; l’insuffisance d’évaluation.This analysis is based over 15 years of investigation about new technologies in the field of justice and security, and more specifically about electronic monitoring and CCTV which have known a strong development for the last twenty years... From these reflections, Jean-Charles Froment introduces nine analysis keys about the characteristics and the impact of the development of this technologies (speed of policy transfer; rules of market; progressive change towards a «society of control»; power conversions; human rights; plasticity of uses; legitimacy strategies; regulation challenges; weakness of evaluation.

  1. Adapting to the Pedagogy of Technology in Educational Administration

    Science.gov (United States)

    Berry, James E.; Marx, Gary

    2010-01-01

    The field of educational administration is in a pedagogical transition. Though empirical evidence may be lacking about the efficacy of online teaching and learning, programs in educational administration are part of the greater movement to Internet delivery by virtue of market forces and advances in software and hardware tools for teaching in a…

  2. Information Technology and the Organization Chart of Public Administration

    NARCIS (Netherlands)

    Zouridis, S.; Snellen, I.Th.M.; van de Donk, W.B.H.J.

    1998-01-01

    To a certain extent the organization chart of public administration is inspired by the doctrines which are offered by public administration science. Some of these doctrines relate to policy implementation and the design of implementing agencies. In this chapter three of these main doctrines are disc

  3. Information Technology and the Organization Chart of Public Administration

    NARCIS (Netherlands)

    Zouridis, S.; Snellen, I.Th.M.; van de Donk, W.B.H.J.

    1998-01-01

    To a certain extent the organization chart of public administration is inspired by the doctrines which are offered by public administration science. Some of these doctrines relate to policy implementation and the design of implementing agencies. In this chapter three of these main doctrines are

  4. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  5. Technology Security Policy: From the Cold War to the New World Order

    Science.gov (United States)

    1993-12-01

    Mitchel B. Wallerstein , "Controlling Dual-Use Technologies in the New World Order," Issues in &ience and Technology, Summer 1991, pp. 74-5 and Aaron Karp...Relations and Armed Services, letter to Anthony Lake, the Assistant to the President for National Security Affairs, August 6, 1993. Wallerstein , Mitchell

  6. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    Science.gov (United States)

    2016-05-01

    areas. Advanced Computing and Communications The exponential growth of the digital economy, driven by ubiquitous computing and communication...technologies, holds tremendous potential for innovation, economic competitiveness , and national security. New and rapidly evolving technological...weapons- focused R&D, many of the capabilities being developed have significant dual-use potential. Digital connectivity, for instance, brings

  7. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information...

  8. Development of a computer-adaptive physical function instrument for Social Security Administration disability determination.

    Science.gov (United States)

    Ni, Pengsheng; McDonough, Christine M; Jette, Alan M; Bogusz, Kara; Marfeo, Elizabeth E; Rasch, Elizabeth K; Brandt, Diane E; Meterko, Mark; Haley, Stephen M; Chan, Leighton

    2013-09-01

    To develop and test an instrument to assess physical function for Social Security Administration (SSA) disability programs, the SSA-Physical Function (SSA-PF) instrument. Item response theory (IRT) analyses were used to (1) create a calibrated item bank for each of the factors identified in prior factor analyses, (2) assess the fit of the items within each scale, (3) develop separate computer-adaptive testing (CAT) instruments for each scale, and (4) conduct initial psychometric testing. Cross-sectional data collection; IRT analyses; CAT simulation. Telephone and Internet survey. Two samples: SSA claimants (n=1017) and adults from the U.S. general population (n=999). None. Model fit statistics, correlation, and reliability coefficients. IRT analyses resulted in 5 unidimensional SSA-PF scales: Changing & Maintaining Body Position, Whole Body Mobility, Upper Body Function, Upper Extremity Fine Motor, and Wheelchair Mobility for a total of 102 items. High CAT accuracy was demonstrated by strong correlations between simulated CAT scores and those from the full item banks. On comparing the simulated CATs with the full item banks, very little loss of reliability or precision was noted, except at the lower and upper ranges of each scale. No difference in response patterns by age or sex was noted. The distributions of claimant scores were shifted to the lower end of each scale compared with those of a sample of U.S. adults. The SSA-PF instrument contributes important new methodology for measuring the physical function of adults applying to the SSA disability programs. Initial evaluation revealed that the SSA-PF instrument achieved considerable breadth of coverage in each content domain and demonstrated noteworthy psychometric properties. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  9. Information technology convergence security, robotics, automations and communication

    CERN Document Server

    Barolli, Leonard; Xhafa, Fatos; Jeong, Hwa-Young

    2013-01-01

    Information technology and its convergence issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services. This area will be the most comprehensive topics with various aspects of advances in information technology and its convergence services. This book covers all topics as computational science and applications, electronics engineering, manufacturing technology, services, technical skill to control the robot, automatic operation and application, simulation and testing communication and many more.

  10. Wearable Technology Devices Security and Privacy Vulnerability Analysis

    OpenAIRE

    Ke Wan Ching; Manmeet Mahinderjit Singh

    2016-01-01

    Wearable Technology also called wearable gadget, is acategory of technology devices with low processing capabilities that can be worn by a user with the aim to provide information and ease of access to the master devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable technology becomes significant when people start their invention in wearable computing, where their mobile devices become one of the computation sources. However, wearable tec...

  11. Survey of Collaboration Technologies in Multi-level Security Environments

    Science.gov (United States)

    2014-04-28

    Dickson. 1996. "Teams in Organizations: Recent Research on Performance and Effectiveness". Annual Review of Psychology , 47:307-338. [32] Hall, D.L... Psychology , 94, 2, 535-546. [48] Moore, J.A. (2002). JView: an information visualization paradigm. Proc. SPIE, Vol. 4716, 367-374. In Enabling...date. Multilevel security solutions like the Multi-Layer Access Solution were developed by Gestalt and MAXIM Systems before these companies became

  12. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    OpenAIRE

    Mustafijur Rahman; A. H. M. Zadidul Karim; Sultanur Nyeem; Faisal Khan; Golam Matin

    2015-01-01

    "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detecti...

  13. Secure quantum signatures: a practical quantum technology (Conference Presentation)

    Science.gov (United States)

    Andersson, Erika

    2016-10-01

    Modern cryptography encompasses much more than encryption of secret messages. Signature schemes are widely used to guarantee that messages cannot be forged or tampered with, for example in e-mail, software updates and electronic commerce. Messages are also transferrable, which distinguishes digital signatures from message authentication. Transferability means that messages can be forwarded; in other words, that a sender is unlikely to be able to make one recipient accept a message which is subsequently rejected by another recipient if the message is forwarded. Similar to public-key encryption, the security of commonly used signature schemes relies on the assumed computational difficulty of problems such as finding discrete logarithms or factoring large primes. With quantum computers, such assumptions would no longer be valid. Partly for this reason, it is desirable to develop signature schemes with unconditional or information-theoretic security. Quantum signature schemes are one possible solution. Similar to quantum key distribution (QKD), their unconditional security relies only on the laws of quantum mechanics. Quantum signatures can be realized with the same system components as QKD, but are so far less investigated. This talk aims to provide an introduction to quantum signatures and to review theoretical and experimental progress so far.

  14. Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016

    CERN Document Server

    Serrhini, Mohammed; Felgueiras, Carlos

    2017-01-01

    This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Onli...

  15. 75 FR 24773 - Research and Innovative Technology Administration Advisory Council on Transportation Statistics...

    Science.gov (United States)

    2010-05-05

    ... Bureau of Transportation Statistics Research and Innovative Technology Administration Advisory Council on Transportation Statistics; Notice of Meeting AGENCY: Research and Innovative Technology Administration, U.S... on Transportation Statistics (ACTS). The meeting will be held on Friday, June 4, 2010, from 9 a.m....

  16. 78 FR 42430 - Revisions to the Export Administration Regulations Based on the 2012 Missile Technology Control...

    Science.gov (United States)

    2013-07-16

    ... (Definitions of Terms as Used in the Export Administration Regulations) by amending the definition of the term... Definitions of terms as used in the Export Administration Regulations (EAR). * * * * * Payload... Administration Regulations Based on the 2012 Missile Technology Control Regime Plenary Agreements AGENCY:...

  17. 75 FR 13766 - Food and Drug Administration and Process Analytical Technology for Pharma Manufacturing: Food and...

    Science.gov (United States)

    2010-03-23

    ... feature FDA's perspective on where PAT will be applicable in the manufacturing process and FDA's current... HUMAN SERVICES Food and Drug Administration Food and Drug Administration and Process Analytical Technology for Pharma Manufacturing: Food and Drug Administration--Partnering With Industry; Public...

  18. 45 CFR 1336.67 - Security and collateral: Responsibilities of the Loan Administrator.

    Science.gov (United States)

    2010-10-01

    ...) As a Credit Factor. The availability of collateral security normally is considered an important... interests which may be taken by the lender include, but are not limited to, liens on real or personal... the replacement value of the property secured (whichever is less) must be taken naming the lender...

  19. COmmunications and Networking with QUantum operationally Secure Technology for Maritime Deployment (CONQUEST)

    Science.gov (United States)

    2016-12-02

    Networking with QUantum operationally-Secure Technology for Maritime Deployment (CONQUEST) Contract Period of Performance: 2 September 2016 – 1 September...potential of using advanced photonic integrated circuits to enable high- speed quantum-secure communications. Task 5: QKD network via un-trusted quantum...has a practical advantage in its imple- mentation since it can use conventional optical telecom components, and does not require cryostats to support

  20. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  1. The Acceptance of Moodle Technology by Business Administration Students

    Science.gov (United States)

    Escobar-Rodriguez, Tomas; Monge-Lozano, Pedro

    2012-01-01

    The advent of information technologies to Universities has improved the teaching-learning process. Students can increase their learning skills using information technology. Those using the Moodle platform regularly seem to get better grades than those who rarely or never use it. This paper analyzes students' intention to use Moodle platforms to…

  2. Web 2.0 Technologies and Social Networking Security Fears in Enterprises

    Directory of Open Access Journals (Sweden)

    Fernando Almeida

    2012-02-01

    Full Text Available Web 2.0 systems have drawn the attention of corporation, many of which now seek to adopt Web 2.0 technologies and transfer its benefits to their organizations. However, with the number of different social networking platforms appearing, privacy and security continuously has to be taken into account and looked at from different perspectives. This paper presents the most common security risks faced by the major Web 2.0 applications. Additionally, it introduces the most relevant paths and best practices to avoid these identified security risks in a corporate environment.

  3. Hawai‘i Distributed Energy Resource Technologies for Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2012-09-30

    HNEI has conducted research to address a number of issues important to move Hawai‘i to greater use of intermittent renewable and distributed energy resource (DER) technologies in order to facilitate greater use of Hawai‘i's indigenous renewable energy resources. Efforts have been concentrated on the Islands of Hawai‘i, Maui, and O‘ahu, focusing in three areas of endeavor: 1) Energy Modeling and Scenario Analysis (previously called Energy Road mapping); 2) Research, Development, and Validation of Renewable DER and Microgrid Technologies; and 3) Analysis and Policy. These efforts focused on analysis of the island energy systems and development of specific candidate technologies for future insertion into an integrated energy system, which would lead to a more robust transmission and distribution system in the state of Hawai‘i and eventually elsewhere in the nation.

  4. Cyber-Security Issues in Healthcare Information Technology.

    Science.gov (United States)

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  5. Challenges of Information Technology Security in the NASA Environment

    Science.gov (United States)

    Santiago, S. S.

    2000-01-01

    A brief description of the NASA organization and how the CIO responsibilities are integrated into that organization followed by an introduction of the NASA ITS Program goals and objectives. An overview of the four major enterprises' cultures and how those cultures tie back to the Enterprises' missions. A description of the ITS challenges that exist stemming from the competing NASA Enterprises' requirements and how they have formed the basis of the NASA ITS Program. A talk will focus on policies and procedures and the technology being incorporated into the NASA infrastructure and how that technology ties back to the policies and procedures.

  6. Guidelines for contingency planning NASA (National Aeronautics and Space Administration) ADP security risk reduction decision studies

    Science.gov (United States)

    Tompkins, F. G.

    1984-01-01

    Guidance is presented to NASA Computer Security Officials for determining the acceptability or unacceptability of ADP security risks based on the technical, operational and economic feasibility of potential safeguards. The risk management process is reviewed as a specialized application of the systems approach to problem solving and information systems analysis and design. Reporting the results of the risk reduction analysis to management is considered. Report formats for the risk reduction study are provided.

  7. Medication administration technologies and patient safety: a mixed-method systematic review.

    Science.gov (United States)

    Wulff, Kelly; Cummings, Greta G; Marck, Patricia; Yurtseven, Ozden

    2011-10-01

    Healthcare leaders need evidence-based information on nursing medication administration technologies to guide the design of improvements to patient safety. The aim of this study was to evaluate the research evidence on relationships between the use of medication administration technologies and incidence of medication administration incidents and preventable adverse drug events to inform decision-making about existing technology options. Thirteen electronic databases and seven relevant patient safety websites were searched for the years 1980-2009. A mixed-method systematic literature review of research on medication administration technologies and associated links to patient safety, operationalized as medication administration incidents and preventable adverse drug events, was conducted. Twelve studies (two qualitative, five pre- and postinterventions and five correlational) met the inclusion criteria. All were assessed as medium quality with low generalizability of study findings. Only two studies sampled more than one hospital and none of the studies was driven by an explicit theoretical framework. The studies included in this review are generally positive towards medication administration technologies and their potential benefits, yet the level of evidence overall is equivocal. The majority of studies pointed to the development of workarounds by nurses following medication administration technology implementation that could compromise patient safety. More theoretically driven research is needed to determine which medication administration technologies should be implemented in what ways to most effectively reduce medication administration incidents and preventable adverse drug events and minimize the development of potentially unsafe workarounds. Further evidence is required to accurately assess the actual contribution of medication administration technologies for improving patient safety. © 2011 The Authors. Journal of Advanced Nursing © 2011 Blackwell

  8. Security Concerns in Telecommuting within the Information Technology Industry

    Science.gov (United States)

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  9. Competitive Technologies for National Security: Review and Recommendations

    Science.gov (United States)

    2008-02-29

    Ibid. 13. SPG Media , “ABL YAL 1A Airborne Laser, USA,” at www.airforce-technology.com/projects/abl (March 15, 2006). 14. Press release, “Boeing Receives...the first quar- ter of 2005, almost all of the venture capital invested in the nanotech industry went to four companies: NanoTex ($33 millon

  10. Security Concerns in Telecommuting within the Information Technology Industry

    Science.gov (United States)

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  11. How Secure Is Education in Information Technology? A Method for Evaluating Security Education in IT

    Science.gov (United States)

    Grover, Mark; Reinicke, Bryan; Cummings, Jeff

    2016-01-01

    As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…

  12. The Land Administration Domain Model

    NARCIS (Netherlands)

    Lemmen, C.; Van Oosterom, P.J.M.; Bennett, R.

    2015-01-01

    Societal drivers including poverty eradication, gender equality, indigenous recognition, adequate housing, sustainable agriculture, food security, climate change response, and good governance, influence contemporary land administration design. Equally, the opportunities provided by technological

  13. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  14. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  15. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  16. Assistive Technologies and Issues Relating to Privacy, Ethics and Security

    Science.gov (United States)

    Martin, Suzanne; Bengtsson, Johan E.; Dröes, Rose-Marie

    Emerging technologies provide the opportunity to develop innovative sustainable service models, capable of supporting adults with dementia at home. Devices range from simple stand-alone components that can generate a responsive alarm call to complex interoperable systems that even can be remotely controlled. From these complex systems the paradigm of the ubiquitous or ambient smart home has emerged, integrating technology, environmental design and traditional care provision. The service context is often complex, involving a variety of stakeholders and a range of interested agencies. Against this backdrop, as anecdotal evidence and government policies spawn further innovation it is critical that due consideration is given to the potential ethical ramifications at an individual, organisational and societal level. Well-grounded ethical thinking and proactive ethical responses to this innovation are required. Explicit policy and practice should therefore emerge which engenders confidence in existing supported living option schemes for adults with dementia and informs further innovation.

  17. Hybrid rice technology for food security in the world

    Institute of Scientific and Technical Information of China (English)

    YUAN Long-ping

    2004-01-01

    @@ The current world population is over 6 billion and will reach 8 billion in 2030. Meanwhile, the annual loss of land to other use is 10 to 35 million ha, with half of this lost land coming from cropland.Facing such severe situation of population growth pressure plus cropland reduction, it is obvious that the only way to solve food shortage problem is to greatly enhance the yield level of food crops per unit land area through advance of science and technology.

  18. Report on Sensor Technology for Battlefield and Physical Security Applications.

    Science.gov (United States)

    1977-07-01

    END ITEMS, IT SHOULD BE USEFUL IF WE GET A HANDLE ON THE OVERALL MANAGEMENT CONCEPTo THE PROGRAM OBJECTIVES, AND THE ESTIMATED FUNDING LEVELS...LEARN MORE ABOUT THE DEVICES THAT WILL BE AVAILABLE ON THE OPEN MARKET . WE WOULD EXPECT SUCH A CENTER TO BE ACCESSABLE BY ALL FEDERAL AGENCIES AND TO...that the ported coaxial cable sensor technology does work and that it appears to work better than other sensors on the market . The ADM development

  19. Innovation priorities optimization in the context of national technological security ensuring

    Directory of Open Access Journals (Sweden)

    V.A. Omelyanenko

    2016-12-01

    Full Text Available The aim of this article. The article is devoted to the main aspects of technological security providing through increasing the efficiency of innovation development priorities selection. The features of impact of technological security for national security and international experience of its software were analyzed. The scheme of determination of innovation priorities, based on the assessment of critical technologies and strategy of socio-economic development, were proposed. The scheme of innovation priorities based on “deployment policy” concept was developed. The results of the analysis. Based on analysis of possibilities of using the capacity of international environment, eliminating the technological gap between Ukraine and leading countries in framework of technological security provision should be implemented not by increasing the one-side transfer of foreign technologies, but with the improvement and development of national critical technologies based on foreign experience. Also positive balance of international technology transfer in future can’t be achieved the growth of dumping policy with the expansion of volumes of these technologies only when the country has to spend a resources, which is beneficial only for foreign partners. This balance should be focused on system-level processes, it is necessary to speed up the development of its own technology base, that can eliminate existing or possible “technological blockade”. Conclusions and perspectives for further research. The state’s ability to engage in complicated tech activities is a characteristic of scientific, technical and technological level of its development as well as has great impact on economic situation and national security and assists enhance its international prestige. However, the development of such industries and requires the creation of efficient innovation system and international cooperation mechanisms to compensate for negative effects of unilateral

  20. Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

    Directory of Open Access Journals (Sweden)

    Mei-Yu Wu

    2013-01-01

    Full Text Available Information technology has an enormous influence in many enterprises. Computers have not only become important devices that people rely on in their daily lives and work, but have also become essential tools for enterprises. More and more enterprises have shifted their focus to how to prevent outer forces from invading and stealing from networks. However, many enterprises have disregarded the significance of internal leaking, which also plays a vital role in information management. This research proposes an information security management approach that is based on context-aware role-based access control (RBAC and communication monitoring technology, in order to achieve enterprise information security management. In this work, it is suggested that an enterprise may, first, use an organizational chart to list job roles and corresponding permissions. RBAC is a model that focuses on different work tasks and duties. Subsequently, the enterprise may define a security policy to enforce the context-aware RBAC model. Finally, the enterprise may use communication monitoring technology in order to implement information security management. The main contribution of this work is the potential it provides to both reduce information security incidents, such as internal information leakage, and allow for effective cost control of information systems.

  1. Computer Network Security Technology%浅谈计算机网络安全技术

    Institute of Scientific and Technical Information of China (English)

    梁其烺

    2011-01-01

    从当前计算机网络安全现状入手,对主要的网络安全威胁进行了讨论。最后分析了计算机网络安全技术的类型,力图使网络设计者和使用者对网络安全有一个全面的认识,从而能正确采用成功对策。%The present situation of the current computer network security,network security of the main threats were discussed,the final analysis,the type of computer network security technology to try to make the network designers and users of network security with a comprehensive understanding, so that it can correctly the use of successful strategies.

  2. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  3. Finding the right technology solutions to secure our borders

    CSIR Research Space (South Africa)

    Venter, CP

    2015-10-01

    Full Text Available stream_source_info Venter-2015.pdf.txt stream_content_type text/plain stream_size 1509 Content-Encoding UTF-8 stream_name Venter-2015.pdf.txt Content-Type text/plain; charset=UTF-8 Finding the right technology solutions... • Real-life field conditions • Simulated events Maritime Scenario • Maritime and Harbour Protection in Saldanha area • Refugee Influx, Intertidal Poaching, Vessel Interception • Specific “Injects” – plausible events simulated • Various...

  4. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  5. Promise, Perils, and Planning: An Administrative Commentary on the Use of Technology To Expand Reference Services.

    Science.gov (United States)

    Allen, Nancy

    1999-01-01

    Presents an administrative overview on planning needed to implement information technology-based reference and instructional services in academic libraries. Discusses staffing; troubleshooting; fund raising and budget development; consortia and digital resources; and the need for continuing education. (LRW)

  6. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  7. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...The Department of State has submitted the following information collection request to the Office of Management and Budget (OMB) for approval in accordance with the Paperwork Reduction Act of 1995. Title of Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements Pursuant to 22 CFR 126.18. OMB Control Number: 1405-XXXX.......

  8. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... public comment period may end before the time indicated, following the last call for comments. To... Science and Technology, such as new developments in systems engineering, cyber-security, knowledge.... The agenda on December 5 focuses solely on the interaction between DHS S&T and Customs and...

  9. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  10. 大数据在公安交通管理行业的应用%Application of big data in public security traffic administration industry

    Institute of Scientific and Technical Information of China (English)

    蒋雄; 沈平; 常彬

    2016-01-01

    当前通过交通基础设施采集的信息越来越复杂。应用一种改进版的TDH Hadoop大数据技术,通过采集异构、动静结合的交通基础信息数据,对数据进行分析挖掘,在公安交通管理方面运用,改善了交通运行状况。%At present, the information collected by means of transport infrastructure is becoming more and more complex. Application of an improved version of the TDH Hadoop big data technology, which collects the heterogeneous, dynamic and static traffic basic information data, analyzes and mining the data, put it to use in public security traffic administration to improve the traffic operating condition.

  11. Social Security Administration - Quarterly Data for Spoken Language Preferences of End Stage Renal Disease Medicare Claimants (FY 2016, including 53rd week)

    Data.gov (United States)

    Social Security Administration — This dataset provides quarterly volumes of the Medicare claims based solely on ESRD at the national level for fiscal year 2016 with quarter 4 shown two ways—we base...

  12. Administration

    DEFF Research Database (Denmark)

    Bogen handler om den praksis, vi kalder administration. Vi er i den offentlige sektor i Danmark hos kontorfolkene med deres sagsmapper, computere, telefoner,, lovsamlinger,, retningslinier og regneark. I bogen udfoldes en mangfoldighed af konkrete historier om det administrative arbejde fra...... forskellige områder i den offentlige sektor. Hensigten er at forstå den praksis og faglighed der knytter sig til det administrative arbejde...

  13. Securing TCP/IP and Dial-up Access to Administrative Data.

    Science.gov (United States)

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  14. How Strong Is Europeanisation, Really? The Danish Defence Administration and the Opt-Out from the European Security and Defence Policy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2011-01-01

    The article questions how strong Europeanisation is as an explanation of administrative changes in EU member states. Denmark has an opt-out from the European cooperation on defence, and, therefore, its defence administration represents a critical or a less likely case to test the Europeanisation...... thesis. The article shows that in spite of the opt-out, the administrative structures and the policy processes in the Ministry of Foreign Affairs (MFA) have adapted to the common foreign and security policy (CFSP) and the European security and defence policy (ESDP). Surprisingly, the administrative...

  15. Exploration of technologies of use to civil security forces

    Energy Technology Data Exchange (ETDEWEB)

    Farnum, E.H.; Petrovic, J.; McClellan, K.; Trujillo, E.; Neuman, A.; Lounsbury, B. [Los Alamos National Lab., NM (United States); Mann, T. [Foster Miller, Inc., Waltham, MA (United States); Rousseau, R. [Ordnance Body Armor Company (United States)

    1998-12-01

    This is the final report of a two-year, Laboratory Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). The objective was to determine whether armor tile technology could be used to solve problems of civil law enforcement as identified by the New Mexico State Police. Most of the effort focused on the design and construction of a lightweight, portable box that could contain the shrapnel and redirect the blast from a steel-pipe/black-powder bomb. The bomb box task was carried out in collaboration with two companies, Foster Miller, Inc. and Ordnance Body Armor Co., who constructed most of the boxes tested. The results of the tests indicated that soft, flexible fabrics are superior to hard tiles in containing the bomb fragments. Subsequent to these experiments, Foster Miller has developed a bomb container that is commercialized and is currently being sold to law enforcement agencies.

  16. Image-Based Vehicle Identification Technology for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Clark, G A

    2002-10-08

    The threat of terrorist attacks against US civilian populations is a very real, near-term problem that must be addressed, especially in response to possible use of Weapons of Mass Destruction. Several programs are now being funded by the US Government to put into place means by which the effects of a terrorist attack could be averted or limited through the use of sensors and monitoring technology. Specialized systems that detect certain threat materials, while effective within certain performance limits, cannot generally be used efficiently to track a mobile threat such as a vehicle over a large urban area. The key elements of an effective system are an image feature-based vehicle identification technique and a networked sensor system. We have briefly examined current uses of image and feature recognition techniques to the urban tracking problem and set forth the outlines of a proposal for application of LLNL technologies to this critical problem. The primary contributions of the proposed work lie in filling important needs not addressed by the current program: (1) The ability to create vehicle ''fingerprints,'' or feature information from images to allow automatic identification of vehicles. Currently, the analysis task is done entirely by humans. The goal is to aid the analyst by reducing the amount of data he/she must analyze and reduce errors caused by inattention or lack of training. This capability has broad application to problems associated with extraction of useful features from large data sets. (2) Improvements in the effectiveness of LLNL's WATS (Wide Area Tracking System) by providing it accurate threat vehicle location and velocity. Model predictability is likely to be enhanced by use of more information related to different data sets. We believe that the LLNL can accomplish the proposed tasks and enhance the effectiveness of the system now under development.

  17. The Attitudes of Public School Administrators toward the Hiring of Women Technology Educators.

    Science.gov (United States)

    Pedras, Melvin J.; And Others

    1994-01-01

    Responses from 61 of 75 Idaho sprints and 105 of 148 principals show that, despite awareness of the need for more female technology education teachers, few administrators (male or female) would hire women over equally qualified men. Administrators were not well informed about teaching opportunities for women nor about female students preparing for…

  18. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S. [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-05-01

    The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.

  19. Perceptions of pharmacy students, faculty members, and administrators on the use of technology in the classroom.

    Science.gov (United States)

    DiVall, Margarita V; Hayney, Mary S; Marsh, Wallace; Neville, Michael W; O'Barr, Stephen; Sheets, Erin D; Calhoun, Larry D

    2013-05-13

    To gather and evaluate the perceptions of students, faculty members, and administrators regarding the frequency and appropriateness of classroom technology use. Third-year pharmacy students and faculty members at 6 colleges and schools of pharmacy were surveyed to assess their perceptions about the type, frequency, and appropriateness of using technology in the classroom. Upper-level administrators and information technology professionals were also interviewed to ascertain overall technology goals and identify criteria used to adopt new classroom technologies. Four hundred sixty-six students, 124 faculty members, and 12 administrators participated in the survey. The most frequently used and valued types of classroom technology were course management systems, audience response systems, and lecture capture. Faculty members and students agreed that faculty members appropriately used course management systems and audience response systems. Compared with their counterparts, tech-savvy, and male students reported significantly greater preference for increased use of classroom technology. Eighty-six percent of faculty members reported having changed their teaching methodologies to meet student needs, and 91% of the students agreed that the use of technology met their needs. Pharmacy colleges and schools use a variety of technologies in their teaching methods, which have evolved to meet the needs of the current generation of students. Students are satisfied with the appropriateness of technology, but many exhibit preferences for even greater use of technology in the classroom.

  20. Technology, the Law, and Higher Education Policy: Visions for Community College Administrators.

    Science.gov (United States)

    Basham, Matt

    2003-01-01

    Analyzes the impact of the U.S. Patriot Act on educational institutions, particularly in the area of information technology security. Warns that the Act could impact distance learning and campus Internet service providers, and that lawsuits are being filed against universities for having lax cybersecurity. Makes suggestions for dealing with these…

  1. National Security Science and Technology Initiative: Air Cargo Screening, Final Report for CRADA Number NFE-07-01081

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip [ORNL; Bush, John [Battelle Memorial Institute; Bowerman, Biays [Brookhaven National Laboratory; Cespedes, Ernesto [Idaho National Laboratory; White, Timothy [Pacific Northwest National Laboratory

    2004-12-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009.

  2. National Security Science and Technology Initiative: Air Cargo Screening, Final Report for CRADA Number NFE-07-01081

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip [ORNL; Bush, John [Battelle Memorial Institute; Bowerman, Biays [Brookhaven National Laboratory; Cespedes, Ernesto [Idaho National Laboratory; White, Timothy [Pacific Northwest National Laboratory

    2004-12-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009.

  3. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  4. Perceptions of Disability-Services Administrators about Assistive Technology at Postsecondary Institutions

    Science.gov (United States)

    Davis, Jeffrey S.

    2012-01-01

    The purpose of this study was to investigate the manifestation of assistive technology at postsecondary institutions from the perspectives of disability-services administrators, through their personal experiences. Exploration of assistive-technology-related experiences presents the potential to improve understanding of the operation of this vital…

  5. Managing the Growing Complexity of Administration of Academic Technology in Higher Education

    Science.gov (United States)

    Nworie, John

    2009-01-01

    The academic technology units support the process of using of technology and pedagogy in teaching and learning and so occupy an important position in higher education, as their functions impact the instructional mission of institutions. Similarly, the administrators who lead this important function area and who manage the resources that the…

  6. The Security Technology of E-commence——Intelligent Packet-filtering Firewalls

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Research has revealed that, in the next ten to twen ty years, the implementation of E-commence will become a new basis of economic in crease of China and other countries in the world. And the essence of implementin g E-commerce is the credit standing among the banks, the sellers and the custom ers. But the credit standing in the net ultimately depends on the security of th e network. Firewall is a useful network security technology to keep a network fr om being intruded. The rational use of firewalls can...

  7. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  8. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  9. Science and Technology to Advance Regional Security in the Middle East and Central Asia

    Energy Technology Data Exchange (ETDEWEB)

    Tompson, A F B; Richardson, J H; Ragaini, R C; Knapp, R B; Rosenberg, N D; Smith, D K; Ball, D Y

    2002-10-09

    This paper is concerned with the promotion and advancement of regional security in the Middle East and Central Asia through the development of bilateral and multilateral cooperation on targeted scientific and technical projects. It is widely recognized that increasing tensions and instability in many parts of the world emphasize--or reemphasize--a need to seek and promote regional security in these areas. At the Lawrence Livermore National Laboratory (LLNL), a national security research facility operated for the US Department of Energy, we are pursuing an effort to use science and technology as a ''low risk'' means of engagement in regions of strategic importance to the United States. In particular, we are developing collaborations and cooperative projects among (and between) national laboratory scientists in the US and our various counterparts in the countries of interest.

  10. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  11. Avionics Collaborative Engineering Technology Delivery Order 0035: Secure Knowledge Management (SKM) Technology Research Roadmap - Technology Trends for Collaborative Information and Knowledge Management Research

    Science.gov (United States)

    2004-06-01

    International Corporation 4031 Colonel Glenn Highway Beavercreek, OH 45431-1673 Nikolaos G. Bourbakis Wright State University Information Technology...NUMBER 2432 5e. TASK NUMBER 04 6. AUTHOR(S) Russell F. Moody (Science Applications International Corporation) Nikolaos G. Bourbakis (Wright...modeling, retrieving, distributing, and publishing documents on the Web ( Bourbakis ) − Research cryptanalysis. − System security. − Self-healing

  12. Clinicians, security and information technology support services in practice settings--a pilot study.

    Science.gov (United States)

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  13. An analysis of patient-provider secure messaging at two Veterans Health Administration medical centers: message content and resolution through secure messaging.

    Science.gov (United States)

    Shimada, Stephanie L; Petrakis, Beth Ann; Rothendler, James A; Zirkle, Maryan; Zhao, Shibei; Feng, Hua; Fix, Gemmae M; Ozkaynak, Mustafa; Martin, Tracey; Johnson, Sharon A; Tulu, Bengisu; Gordon, Howard S; Simon, Steven R; Woods, Susan S

    2017-09-01

    We sought to understand how patients and primary care teams use secure messaging (SM) to communicate with one another by analyzing secure message threads from 2 Department of Veterans Affairs facilities. We coded 1000 threads of SM communication sampled from 40 primary care teams. Most threads (94.5%) were initiated by patients (90.4%) or caregivers (4.1%); only 5.5% were initiated by primary care team members proactively reaching out to patients. Medication renewals and refills (47.2%), scheduling requests (17.6%), medication issues (12.9%), and health issues (12.7%) were the most common patient-initiated requests, followed by referrals (7.0%), administrative issues (6.5%), test results (5.4%), test issues (5.2%), informing messages (4.9%), comments about the patient portal or SM (4.1%), appreciation (3.9%), self-reported data (2.8%), life issues (1.5%), and complaints (1.5%). Very few messages were clinically urgent (0.7%) or contained other potentially challenging content. Message threads were mostly short (2.7 messages), comprising an average of 1.35 discrete content types. A substantial proportion of issues (24.2%) did not show any evidence of being resolved through SM. Time to response and extent of resolution via SM varied by message content. Proactive SM use by teams varied, but was most often for test results (32.7%), medication-related issues (21.8%), medication renewals (16.4%), or scheduling issues (18.2%). The majority of messages were transactional and initiated by patients or caregivers. Not all content categories were fully addressed over SM. Further education and training for both patients and clinical teams could improve the quality and efficiency of SM communication.

  14. U.S.-Brazil Security Cooperation and the Challenge of Technology Transfer

    Science.gov (United States)

    2014-03-01

    direction throughout the process. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. MAJOR RESEARCH QUESTION Since 2010, the United...weapons systems to the Middle East. Regarding the industry’s success in that era, Luis Bitencourt notes: The reason they got that market was mainly due...31. 143 Luis Bitencourt, The Problems of Defence Industrialization for Developing States,” in Arms and Technology Transfers: Security and Economic

  15. Supported Liquid Membrane Extraction Technology and Its Application in Detection of Meat Security

    Institute of Scientific and Technical Information of China (English)

    LIU Jia; LI Weijin

    2010-01-01

    As a novel technology, supported liquid membrane extraction has gradually become the direction of the research of extraction, for the advantages of using little organic solvents, good selectivity and repeatability. This paper is based on describing the working principle, structure and influencing factors of supported liquid membrane, and research in domestic and foreign literatures which are in the same period, and give a review on the application of supported liquid membrane in meat security determination.

  16. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  17. Factors affecting food security and contribution of modern technologies in food sustainability.

    Science.gov (United States)

    Premanandh, Jagadeesan

    2011-12-01

    The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels.

  18. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  19. Advances in AlGaInN laser diode technology for defence, security and sensing applications

    Science.gov (United States)

    Najda, S. P.; Perlin, P.; Suski, T.; Marona, L.; Boćkowski, M.; Leszczyński, M.; Wisnieski, P.; Czernecki, R.; Targowski, G.

    2016-10-01

    Laser diodes fabricated from the AlGaInN material system is an emerging technology for defence, security and sensing applications. The AlGaInN material system allows for laser diodes to be fabricated over a very wide range of wavelengths from u.v., 380nm, to the visible 530nm, by tuning the indium content of the laser GaInN quantum well, giving rise to new and novel applications including displays and imaging systems, free-space and underwater telecommunications and the latest quantum technologies such as optical atomic clocks and atom interferometry.

  20. RATING MODELS AND INFORMATION TECHNOLOGIES APPLICATION FOR MANAGEMENT OF ADMINISTRATIVE-TERRITORIAL COMPLEXES

    OpenAIRE

    O. M. Pshinko; Skalozub, V. V.

    2016-01-01

    Purpose. The paper aims to develop rating models and related information technologies designed to resolve the tasks of strategic planning of the administrative and territorial units’ development, as well as the tasks of multi-criteria control of inhomogeneous multiparameter objects operation. Methodology. When solving problems of strategic planning of administrative and territorial development and heterogeneous classes management of objects under control, a set of agreed methods is used. Name...

  1. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    Energy Technology Data Exchange (ETDEWEB)

    Steele, B.J.

    1996-12-31

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems; (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis.

  2. The Research on The Fusion Technology of Wireless LANs and Personal Area Networks for Emergency Secure in Coal Mine

    Science.gov (United States)

    Chiyuan, Li

    The author has provided craft brother with predictive wireless communication modality and imaginative solutions, and discussed the applied mode of amalgamation technology of wireless LANs and personal area networks for emergency secure in coal mine. The fire protection jobs of emergency secure will become more scientific, more efficient and more flexible in this circumstance. The study can supply bailout team with the situation of a disaster and the location of miner, enhance the efficiency of emergency secure in coal mine.

  3. Smith-Magenis Syndrome and Social Security Administration's Compassionate Allowances Initiative: An Evaluative Review of the Literature.

    Science.gov (United States)

    Burke, Shanna L; Maramaldi, Peter

    2016-08-01

    The Social Security Administration (SSA) launched the Compassionate Allowances List (CAL) in 2008. This created a mechanism for expediting review and delivery of disability benefits, while decreasing application backlog. This study hypothesized that developmental disorders, such as Smith-Magenis syndrome, may meet criterion for inclusion. An evaluative review of the literature was undertaken to determine if the expedited review criterion was met. Ten databases were searched and articles meeting pre-defined criteria were coded according to the SSA definition of disability to determine if severity indices screen in or screen out certain severity levels or exclude Smith-Magenis syndrome entirely in relation to the CAL program. It was strongly recommended that Smith-Magenis syndrome receive consideration for inclusion in the CAL.

  4. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  5. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  6. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  7. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  8. An Analysis of Teacher and School Administrator Technology Beliefs and Skills as They Enter into a High Achieving Schools Program

    Science.gov (United States)

    Hildebrand, Shelly Marie

    2009-01-01

    Teachers and administrators possess varied technology abilities and beliefs. In a study by Williams, Atkinson, Cate, and O'Hair (2008), technology integration and learning community development were positively related. As the teachers and administrators engaged in learning community development and technology integration substantive school…

  9. Multi-Level Security for Automotive–RFID Based Technology with Lab VIEW Implementation

    Directory of Open Access Journals (Sweden)

    Priya Darshini .V

    2013-03-01

    Full Text Available Security has become a prominent parameter for all the electronic gadgets. This proposed paper aims at securing the automotive and also preventing the unauthorized persons from accessing it. The technologies such as Radio Frequency Identification (RFID, thumb registration system and face recognition will be applied for the security measures. This proposed system will also be implemented in LabVIEW using Educational Laboratory Virtual Instrumentation Suite II (ELVIS. Initially, the RFID system will be authenticated .The importance of this system is that, it gets verification from the Road Transportation Office (RTO.The user will require an authentication to get proceed to the thumb registration module by which the efficiency of the thumb is enhanced using Pattern Matching Algorithm (PMA. Face recognition system is a technique which will be used after the thumb registration system. At last, this system allows the user to drive the car. For emergency, a key insertion slot will be placed in the system through which the user can insert the key. During this emergency mode of operation the camera captures the driver’s image and sends it to the owner’s mobile as Multimedia Messaging Service (MMS. The owner will provide the authentication password; this in turn allows the user to drive the vehicle. Global System for Mobile communication (GSM module is also kept inbuilt for tracking purpose. Among the different technologies proposed, RFID technique is briefly discussed in this paper.

  10. Security inspection in ports by anomaly detection using hyperspectral imaging technology

    Science.gov (United States)

    Rivera, Javier; Valverde, Fernando; Saldaña, Manuel; Manian, Vidya

    2013-05-01

    Applying hyperspectral imaging technology in port security is crucial for the detection of possible threats or illegal activities. One of the most common problems that cargo suffers is tampering. This represents a danger to society because it creates a channel to smuggle illegal and hazardous products. If a cargo is altered, security inspections on that cargo should contain anomalies that reveal the nature of the tampering. Hyperspectral images can detect anomalies by gathering information through multiple electromagnetic bands. The spectrums extracted from these bands can be used to detect surface anomalies from different materials. Based on this technology, a scenario was built in which a hyperspectral camera was used to inspect the cargo for any surface anomalies and a user interface shows the results. The spectrum of items, altered by different materials that can be used to conceal illegal products, is analyzed and classified in order to provide information about the tampered cargo. The image is analyzed with a variety of techniques such as multiple features extracting algorithms, autonomous anomaly detection, and target spectrum detection. The results will be exported to a workstation or mobile device in order to show them in an easy -to-use interface. This process could enhance the current capabilities of security systems that are already implemented, providing a more complete approach to detect threats and illegal cargo.

  11. Supervising nursing students in a technology-driven medication administration process in a hospital setting

    DEFF Research Database (Denmark)

    Gaard, Mette; Orbæk, Janne

    2016-01-01

    REVIEW QUESTION/OBJECTIVE: The objective of this review is to identify, describe and synthesize the experiences of nurse supervisors and the factors that influence the supervision of pre-graduate nursing students in undertaking technology-driven medication administration in hospital settings...

  12. The Effect of Relational Database Technology on Administrative Computing at Carnegie Mellon University.

    Science.gov (United States)

    Golden, Cynthia; Eisenberger, Dorit

    1990-01-01

    Carnegie Mellon University's decision to standardize its administrative system development efforts on relational database technology and structured query language is discussed and its impact is examined in one of its larger, more widely used applications, the university information system. Advantages, new responsibilities, and challenges of the…

  13. New Wave Computer Technology and the Administration of Speech Communication Performance Courses.

    Science.gov (United States)

    Behnke, Ralph R.; Sawyer, Chris R.

    1998-01-01

    Contends that the development of a new wave of computers, some characterized by small size and portability and others noted for powerful capabilities to record and edit electronically stored motion pictures, suggests a wide range of applications of these new technologies to the teaching and administration of performance-based communication…

  14. Manual for SFR R and D and Technology Monitoring System Administrator

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Dong Uk; Lee, Yong Bum; Won, Byung Chool; Kim, Young In; Hahn, Do Hee

    2008-05-15

    This report is a administrator manual on R and D and technology monitoring system that is applicable for managing the generation IV sodium-cooled fast reactor development. First of all, enterprise project management solution is introduced and then enterprise resources and data creation method are described. Also it made a description of project web assess design, data management method etc.

  15. The Development of Technology for Higher Education Institution's Administrative Personnel Assessment

    Science.gov (United States)

    Bakhtina, Olga Yurevna; Kirillov, Andrey Vladimirovich; Matyash, Sergey Askoldovich; Urzha, Olga Aleksandrovna

    2015-01-01

    The main approaches for development of assessment technology of higher education institution's administrative personnel are considered in this article. Alongside with it the following is defined: purposes, formation principles, indicators and criteria of the assessment system, rating scale, the procedure and order of assessment process of higher…

  16. Final priority; Rehabilitation Services Administration--Assistive Technology Alternative Financing Program. Final priority.

    Science.gov (United States)

    2014-08-14

    The Assistant Secretary for Special Education and Rehabilitative Services announces a priority under the Assistive Technology Alternative Financing Program administered by the Rehabilitation Services Administration (RSA). The Assistant Secretary may use this priority for competitions in fiscal year (FY) 2014 and later years. This priority is designed to ensure that the Department funds high-quality assistive technology (AT) alternative financing programs (AFPs) that meet rigorous standards in order to enable individuals with disabilities to access and acquire assistive technology devices and services necessary to achieve education, community living, and employment goals.

  17. Field studies of safety security rescue technologies through training and response activities

    Science.gov (United States)

    Murphy, Robin R.; Stover, Sam

    2006-05-01

    This paper describes the field-oriented philosophy of the Institute for Safety Security Rescue Technology (iSSRT) and summarizes the activities and lessons learned during calendar year 2005 of its two centers: the Center for Robot-Assisted Search and Rescue and the NSF Safety Security Rescue industry/university cooperative research center. In 2005, iSSRT participated in four responses (La Conchita, CA, Mudslides, Hurricane Dennis, Hurricane Katrina, Hurricane Wilma) and conducted three field experiments (NJTF-1, Camp Hurricane, Richmond, MO). The lessons learned covered mobility, operator control units, wireless communications, and general reliability. The work has collectively identified six emerging issues for future work. Based on these studies, a 10-hour, 1 continuing education unit credit course on rescue robotics has been created and is available. Rescue robots and sensors are available for loan upon request.

  18. Analysis of Computer Network Security Technology%浅析计算机网络安全技术

    Institute of Scientific and Technical Information of China (English)

    岳建

    2011-01-01

    本文就网络安全面临的威胁和网络安全存在的问题作一些分析,最后有针对性的介绍了几种常用的加强网络安全的技术。为网络安全工作探索一条新思路。%In this paper,network security threats and network security problems for some analysis,and finally targeted introduction of several commonly used to enhance network security technology for network security to explore a new idea.

  19. 浅析计算机网络安全建设及安全技术策略%Computer Network Security Construction and Security Technology Strategies Analysis

    Institute of Scientific and Technical Information of China (English)

    岳慧平; 刘广; 刘建平

    2011-01-01

    With the computer technology and communication technology in all aspects of social life, the extensive application of computer network security issues and more and more prominent.This definition of network security from the start,details the threat to computer network security considerations,and proposed technical and management aspects of the corresponding preventive measures.%随着计算机技术和通信技术在社会生活各方面的广泛应用,计算机网络安全防护问题也愈来愈突出。本文从网络全定义入手,详细阐述了威胁计算机网络安全的因素,并在技术及管理方面提出了相应的防范对策。

  20. Cyber Security Status and Technology Development%网络安全现状与技术发展

    Institute of Scientific and Technical Information of China (English)

    宁向延; 张顺颐

    2012-01-01

    The developments of open, free, international cyber technologies bring many revolutionary changes to all countries of the world, all government organizations, all enterprise organizations and all aspects of our lives. With the improved efficiency and the conveniences, many threats and challenges have appeared on open networks. Thus cyber security has become an indispensable part of information networks. Based on the developing security theories, application technologies , management standards, and so on, cyber security technology system has been gradually formed and mature. With the development of network technologies , new information security technologies ( such as IPv6 security, wireless security and embedded system security) will become the mainstream of network security. Many security technologies will be a-malgamated, at the same time the security technology will be syncretized with other technologies, and monitoring technology will become the mainstream of cyber security technologies.%开放、自由、国际化的信息网络技术的发展给世界各国、政府机构、企事业机构和个人生活带来了革命性的变革.伴随着提高效率和提供各种便利的同时,人们要面对开放网络带来的信息安全方面的威胁和挑战,网络的安全问题成为信息网络健康发展必不可少的重要一环.有关网络安全的研究,在安全理论、应用技术、规范管理等方面不断深入,安全技术体系逐步形成并成熟起来.随着网络技术的发展变化,新兴信息安全技术(如IPv6安全、无线安全和嵌入式系统安全等)将成为主流,网络安全技术也将逐渐发展和变化.许多安全技术将由独立走向融合,同时安全技术开始与其他技术进行融合,监控技术将成为信息网络安全技术的主流.

  1. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  2. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  3. Evaluating the influence of information and communications technology on food security

    Directory of Open Access Journals (Sweden)

    Ntabeni J. Jere

    2017-01-01

    Full Text Available Background: This study integrates the diffusion of innovation, technology acceptance model and Hofstede’s cultural dimensions theory to assess the role that information and communications technology (ICT plays in ensuring food security. A survey of smallholder farmers from the iLembe district municipality of the KwaZulu-Natal Province of South Africa was conducted, and the data were used to test the proposed model.Objectives: The study evaluates the influence of ICTs in improving food security in KwaZulu-Natal Province. A theoretical framework was developed as the lens through which diffusion and adoption of ICTs can be understood. The theorised model was developed using constructs from the diffusion of innovation (DOI theory, technology acceptance model (TAM and Hofstede’s cultural dimensions theory.Method: Survey data from 517 smallholder farmers from the district municipality of iLembe were collected using a questionnaire. A quantitative approach was followed, and the developed theorised model was analysed using structural equation modelling techniques.Results: This study proposes that ICT influence on food security is associated with culture, perceived usefulness and perceived ease of use. The study further finds that perceived ease of use of ICTs has the most significant effect with regard to ICT adoption and diffusion amongst smallholder farmers in iLembe district municipality. There are, however, no associations found with perceived attributes of innovation and the nature of social systems. The study consisted of a largely homogeneous social system; therefore, the researcher could not make any comparisons.Conclusion: The proposed framework for evaluating the influence of ICTs on food security put forward in this study highlights a number of issues. Firstly, there is need for further study to be conducted to understand adoption of ICTs specifically for food security. This would help in creating more accurate adoption strategies

  4. Digital Watermark-based Security Technology for Geo-spatial Graphics Data

    Institute of Scientific and Technical Information of China (English)

    JIA Peihong; CHEN Yunzhen; MA Jinsong; ZHU Dakui

    2006-01-01

    The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data, as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data. The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product, so as to effectively protect the data producer's rights as well as to facilitate the secure sharing of geo-spatial graphics data. So far in the GIS field throughout the world, few researches have been made on digital watermarking. The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique. An application software employing the proposed technology has been developed. A number of experimental tests on the 1:500,000 digital bathymetric chart of the South China Sea and 1:10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology.

  5. 77 FR 26641 - Aviation Security Advisory Committee (ASAC) Meeting

    Science.gov (United States)

    2012-05-04

    ... 4, 2012 Part III Department of Homeland Security Transportation Security Administration Aviation... Aviation Security Advisory Committee (ASAC) Meeting AGENCY: Transportation Security Administration, DHS... Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) on May...

  6. SecurIST: Ensuring Secure, Dependable & Resiliant ICT Technologies to Empower the European Citizen of the Future

    OpenAIRE

    Clarke, James (James H.); Fitzgerald, William M.

    2006-01-01

    Industry and companies are benefiting significantly from the increased productiv-ity, competitiveness and customer satisfac-tion provided by mobility. However, to be viable in the future, mobility must address the foremost challenge confronting it today ensuring a high level of security to protect the enterprise network and the valuable in-formation it carries, dependability along with subscriber privacy issues. With the advent of mobility, security is even more important than before. Any exi...

  7. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    Science.gov (United States)

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  8. Research on Food Science and Technology Innovation Based on National Food Security: A Case Study of Hubei Province

    Institute of Scientific and Technical Information of China (English)

    Qingfang; YANG; Junying; WEI

    2015-01-01

    Based on the background of national food security,this paper analyzes the current situation of food production in Hubei Province that except food yields,overall production situation is not good. Through the food production,storage and circulation,this paper describes the role of food science and technology innovation in food security,and further points out the problems of food science and technology innovation system in Hubei Province,such as disconnection between food science and technology innovation research and food production as well as economic development,backward management system failing to adapt to the needs of agricultural transformation,and low conversion rate of food scientific and technological innovation. Based on this,this paper sets forth the recommendations for food security in Hubei Province.

  9. Scientific and Technological Innovation Is an Important Approach to Ensuring China's Oil Security

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resources are unevenly distributed; global world's oil prices remain high; and over 70 percent of China's imported oil has to be shipped through the Malacca Strait. There are various ways to ensure China's oil security today, and the practical and feasible strategic option is to increase the discovery and production of domestic oil, raise energy efficiency and develop petroleum substitutes. Scientific and technological innovation is crucial both in new oil reserves discovery and production,energy conservation, and in the development of petroleum substitutes, establishment of a strategic oil reserve system and for environment protection. This indicates that China should take effective measures in investment strategy, fiscal policies, financing instruments, intellectual property protection, fostering talents and professionals, so as to establish its own scientific and technological innovation system in the petroleum industry and be better able to ensure oil security.

  10. 2003 U.S. Department of Energy Strategic Plan: Protecting National, Energy, and Economic Security with Advanced Science and Technology and Ensuring Environmental Cleanup

    Energy Technology Data Exchange (ETDEWEB)

    None,

    2003-09-30

    The Department of Energy contributes to the future of the Nation by ensuring energy security, maintaining the safety, security and reliability of the nuclear weapons stockpile, cleaning up the environment from the legacy of the Cold War, and developing innovations in science and technology. After 25 years in existence, the Department now operates 24 preeminent research laboratories and facilities and four power marketing administrations, and manages the environmental cleanup from 50 years of nuclear defense activities that impacted two million acres in communities across the country. The Department has an annual budget of about $23 billion and employs about 14,500 Federal and 100,000 contractor employees. The Department of Energy is principally a national security agency and all of its missions flow from this core mission to support national security. That is true not just today, but throughout the history of the agency. The origins of the Department can be traced to the Manhattan Project and the race to develop the atomic bomb during World War II. Following the war, Congress engaged in a vigorous and contentious debate over civilian versus military control of the atom. The Atomic Energy Act of 1946 settled the debate by creating the Atomic Energy Commission, which took over the Manhattan Project’s sprawling scientific and industrial complex.

  11. E-learning and the future of dental education: opinions of administrators and information technology specialists.

    Science.gov (United States)

    Hillenburg, K L; Cederberg, R A; Gray, S A; Hurst, C L; Johnson, G K; Potter, B J

    2006-08-01

    The digital revolution and growth of the Internet have led to many innovations in the area of electronic learning (e-learning). To survive and prosper, educators must be prepared to respond creatively to these changes. Administrators and information technology specialists at six dental schools and their parent institutions were interviewed regarding their opinions of the impact that e-learning will have on the future of dental education. Interview questions encompassed vision, rate of change, challenges, role of faculty, resources, enrolment, collaboration, responsibility for course design and content, mission and fate of the institution. The objective of this qualitative study was to sample the opinions of educational administrators and information technology specialists from selected US universities regarding the impact of e-learning on dental education to detect trends in their attitudes. Responses to the survey indicated disagreement between administrators and informational technology specialists regarding the rate of change, generation of resources, impact on enrolment, responsibility for course design and content, mission and fate of the university. General agreement was noted with regard to vision, challenges, role of faculty and need for collaboration.

  12. Disaster Management: AN Integral Part of Science & Technology System and Land Administration-Management System

    Science.gov (United States)

    Ghawana, T.; Zlatanova, S.

    2016-06-01

    Disaster management is a multidisciplinary field, which requires a general coordination approach as well as specialist approaches. Science and Technology system of a country allows to create policies and execution of technical inputs required which provide services for the specific types of disasters management. Land administration and management agencies, as the administrative and management bodies, focus more on the coordination of designated tasks to various agencies responsible for their dedicated roles. They get help from Scientific and technical inputs & policies which require to be implemented in a professional manner. The paper provides an example of such integration from India where these two systems complement each other with their dedicated services. Delhi, the Capital of India, has such a disaster management system which has lot of technical departments of government which are mandated to provide their services as Emergency Service Functionaries. Thus, it is shown that disaster management is a job which is an integral part of Science & Technology system of a country while being implemented primarily with the help of land administration and management agencies. It is required that new policies or mandates for the Science and technology organizations of government should give a primary space to disaster management

  13. RATING MODELS AND INFORMATION TECHNOLOGIES APPLICATION FOR MANAGEMENT OF ADMINISTRATIVE-TERRITORIAL COMPLEXES

    Directory of Open Access Journals (Sweden)

    O. M. Pshinko

    2016-12-01

    Full Text Available Purpose. The paper aims to develop rating models and related information technologies designed to resolve the tasks of strategic planning of the administrative and territorial units’ development, as well as the tasks of multi-criteria control of inhomogeneous multiparameter objects operation. Methodology. When solving problems of strategic planning of administrative and territorial development and heterogeneous classes management of objects under control, a set of agreed methods is used. Namely the multi-criteria properties analysis for objects of planning and management, diagnostics of the state parameters, forecasting and management of complex systems of different classes. Their states are estimated by sets of different quality indicators, as well as represented by the individual models of operation process. A new information technology is proposed and created to implement the strategic planning and management tasks. This technology uses the procedures for solving typical tasks, that are implemented in MS SQL Server. Findings. A new approach to develop models of analyze and management of complex systems classes based on the ratings has been proposed. Rating models development for analysis of multicriteria and multiparameter systems has been obtained. The management of these systems is performed on the base of parameters of the current and predicted state by non-uniform distribution of resources. The procedure of sensitivity analysis of the changes in the rating model of inhomogeneous distribution of resources parameters has been developed. The information technology of strategic planning and management of heterogeneous classes of objects based on the rating model has been created. Originality. This article proposes a new approach of the rating indicators’ using as a general model for strategic planning of the development and management of heterogeneous objects that can be characterized by the sets of parameters measured on different scales

  14. The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology

    CERN Document Server

    Barskar, Raju; Bharti, Jyoti; Ahmed, Gulfishan Firdose

    2010-01-01

    E-Commerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats. Information security, therefore, is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet. Still, its definition is a complex endeavor due to the constant technological and business change and requires a coordinated match of algorithm and technical solutions. Ecommerce is not appropriate to all business transactions and, within e-commerce there is no one technology that can or should be appropriate to all requirements. E-commerce is not a new phenomenon; electronic markets, electronic data interchange and customer e-commerce. The use of electronic data interchanges as a universal and non-proprietary way of doing business. Through the electronic transaction the security is the most important phenomena to enhance the banking transaction security via payment transaction.

  15. Can Technology Acceptance Model be Applied on the Rural Setting: The Case of Village Development and Security Committee in Malaysia

    Directory of Open Access Journals (Sweden)

    Bahaman A. Samah

    2011-01-01

    Full Text Available Problem statement: Malaysia has come out with a number of strategies such as National Information Technology Center, Universal Services Provider, Rural Internet Center and Rural Info Center to strengthen and encourage ICT usage among the rural community. Besides the efforts that are brought by the government, do the rural community especially their leaders which are the Village Development and Security Committee use ICT? Approach: The main objective of this study was to investigate any relationship that might occur between variables of Technology Acceptance Model and ICT usage among Village Development and Security Committee. A total of 240 Village Development and Security Committees were selected as the respondents for this study where a developed questionnaire was used to gain the data needed. For the purpose of analysis, SPSS was used where descriptive and inferential analyses were performed. Results: Based on the analyses run, it can be concluded that Village Development and Security Committee in Malaysia have a moderate level of ICT usage. Further analyses run showed that all of the three variables of Technology Acceptance Model namely attitude, perceive ease of use and perceive usefulness have a positive and significant relationship with ICT usage while attitude was detected as the main contributor towards ICT usage among Village Development and Security Committee. Conclusion/Recommendation: This study has revealed that Technology Acceptance Model that was used to explain ICT usage can be applied within the Malaysian rural setting. It also can be concluded that Village Development and Security Committee with a high level of attitude, perceive ease of use and perceive usefulness towards ICT will have higher level of ICT usage. To further develop and sustain this high level of attitude, perceive ease of use and perceive usefulness towards ICT usage, Village Development and Security Committee must be frequently exposed to ICT information and

  16. The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology

    OpenAIRE

    Raju Barskar; Anjana Jayant Deen; yoti Bharti; Gulfishan Firdose Ahmed

    2010-01-01

    E-Commerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats. Information security, therefore, is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet. Still, its definition is a complex endeavor due to the constant technological and business change and requires a coordinated match of algorithm and technical solutions. Ecommerce is not appro...

  17. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  18. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research

    Directory of Open Access Journals (Sweden)

    Dan Craigen

    2013-07-01

    Full Text Available This article addresses the challenges of cybersecurity and ultimately the provision of a stable and resilient information-technology infrastructure for Canada and, more broadly, the world. We describe the context of current cybersecurity challenges by synthesizing key source material whose importance was informed by our own real-world experiences. Furthermore, we present a checklist of guiding principles to a unified response, complete with a set of action-oriented research topics that are linked to known operational limitations. The focus areas are used to drive the formulation of a unified and relevant research and experimental development program, thereby moving us towards a stable and resilient cyberinfrastructure. When cybersecurity is viewed as an inherently interdisciplinary problem of societal concern, we expect that fundamentally new research perspectives will emerge in direct response to domain-specific protection requirements for information-technology infrastructure. Purely technical responses to cybersecurity challenges will be inadequate because human factors are an inherent aspect of the problem. This article will interest managers and entrepreneurs. Senior management teams can assess new technical developments and product releases to fortify their current security solutions, while entrepreneurs can harness new opportunities to commercialize novel technology to solve a high-impact cybersecurity problem..

  19. 校园网安全之ACL技术%ACL Technology of Campus Network Security

    Institute of Scientific and Technical Information of China (English)

    高琳

    2013-01-01

    With the development of large-scale open campus network, campus network is facing more and more threat. On the one hand, in order to develop the foreign exchange in college and universities, we must allow access to network resources development, on the other hand, we must ensure the safety of the campus network data and resources. Network security adopts a lot of technology, and through the access control list (ACL), it can filter the data flow, is a basic one of the campus network security means.%随着大规模开放式校园网络的开发,校园网面临的威胁也越来越多。一方面为了高校对外交流的开展,必须允许对网络资源的开发访问,另一方面,又必须确保校园网数据和资源的尽可能安全。网络安全采用的技术很多,而通过访问控制列表(ACL)可以对数据流进行过滤,是实现基本的校园网安全手段之一。

  20. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives

    Directory of Open Access Journals (Sweden)

    Delphine Christin

    2010-04-01

    Full Text Available Wireless Sensor Networks (WSNs are gradually adopted in the industrial world due to their advantages over wired networks. In addition to saving cabling costs, WSNs widen the realm of environments feasible for monitoring. They thus add sensing and acting capabilities to objects in the physical world and allow for communication among these objects or with services in the future Internet. However, the acceptance of WSNs by the industrial automation community is impeded by open issues, such as security guarantees and provision of Quality of Service (QoS. To examine both of these perspectives, we select and survey relevant WSN technologies dedicated to industrial automation. We determine QoS requirements and carry out a threat analysis, which act as basis of our evaluation of the current state-of-the-art. According to the results of this evaluation, we identify and discuss open research issues.

  1. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  2. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  3. 20 CFR 404.1362 - Treatment of social security benefits or payments where Veterans Administration pension or...

    Science.gov (United States)

    2010-04-01

    ... payments where Veterans Administration pension or compensation payable. 404.1362 Section 404.1362 Employees... Administration pension or compensation payable. (a) Before we receive notice from the Veterans Administration. If... status provisions in § 404.1350 before we receive notice from the Veterans Administration that a pension...

  4. A network collaboration implementing technology to improve medication dispensing and administration in critical access hospitals.

    Science.gov (United States)

    Wakefield, Douglas S; Ward, Marcia M; Loes, Jean L; O'Brien, John

    2010-01-01

    We report how seven independent critical access hospitals collaborated with a rural referral hospital to standardize workflow policies and procedures while jointly implementing the same health information technologies (HITs) to enhance medication care processes. The study hospitals implemented the same electronic health record, computerized provider order entry, pharmacy information systems, automated dispensing cabinets (ADC), and barcode medication administration systems. We conducted interviews and examined project documents to explore factors underlying the successful implementation of ADC and barcode medication administration across the network hospitals. These included a shared culture of collaboration; strategic sequencing of HIT component implementation; interface among HIT components; strategic placement of ADCs; disciplined use and sharing of workflow analyses linked with HIT applications; planning for workflow efficiencies; acquisition of adequate supply of HIT-related devices; and establishing metrics to monitor HIT use and outcomes.

  5. AlphaCo: A Teaching Case on Information Technology Audit and Security

    Directory of Open Access Journals (Sweden)

    Hüseyin Tanriverdi

    2006-03-01

    Full Text Available Recent regulations in the United States (U.S. such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal control mechanisms that minimize them have become important and created an urgent need for professionals who are equipped with IT audit and security skills and knowledge. However, there is severe shortage of teaching cases that can be used in courses aimed at training such professionals. This teaching case begins to address this gap by fostering classroom discussions around IT audit and security issues. It revolves around a hacking incident that compromised online order processing systems of AlphaCo and led to some fraudulent activity. The hacking incident raises a series of questions about IT security vulnerabilities, internal control deficiencies, integrity of financial statements, and independent auditors’ assessment of fraud in the context of the Sarbanes-Oxley Act. The case places students in the roles of executives, IT managers, and auditors and encourages them to discuss several important questions: how and why did the hacking incident happen; what harm did it cause to the firm; how can the firm prevent such hacking incidents in the future; if they do happen, how can the firm detect hacking incidents and fraud sooner; how do auditors assess the impact of such incidents in the context of a financial statement audit; and whether the management

  6. Computer Network Security Protection Technology Analysis%计算机网络安全防护技术探析

    Institute of Scientific and Technical Information of China (English)

    宋朋鸽

    2015-01-01

    本文以计算机网络安全隐患以及网络安全特点作为出发点,分析了影响计算机网络安全的主要因素,并从加密技术、入侵检测技术、病毒防范技术等方面探讨了优化计算机网络安全保护途径,以期为构建计算机网络安全防护体系提供参考。%This article to computer network security risks and characteristics of network security as the starting point, analyzes the main factors that affect computer network security, and explore optimization of computer network security protection by encryp-tion technology, intrusion detection technology, virus protection technology. This paper hopes to provide reference for construction of computer network security protection system.

  7. Regulations on Foreign Exchange Administration Of Domestic Securities Investments by Qualified Foreign Institutional Investors(QFII)%合格境外机构投资者境内证券投资外汇管理规定

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ Chapter I General Provisions Article 1 For the purpose of standardizing the foreign exchange administration of Qualified Foreign Institutional Investors (hereinafter referred to as QFII) in China's securities market, these Regulations are promulgated based on the Regulations of the People's Republic of China on Foreign Exchange Administration and the Measures for Administration of Domestic Securities Investments by Qualified Foreign Institutional Investors (QFII)(Decree [2006] No. 36 of the CSRC, PBOC, and SAFE).

  8. 78 FR 41413 - Aviation Security Advisory Committee (ASAC) Meeting

    Science.gov (United States)

    2013-07-10

    ... SECURITY Transportation Security Administration Aviation Security Advisory Committee (ASAC) Meeting AGENCY... Meeting. SUMMARY: The Transportation Security Administration (TSA) will hold a meeting of the Aviation... and provides advice and recommendations for improving aviation security measures to the Administrator...

  9. AlGaInN laser diode technology and systems for defence and security applications

    Science.gov (United States)

    Najda, Stephen P.; Perlin, Piotr; Suski, Tadek; Marona, Lujca; Boćkowski, Mike; Leszczyński, Mike; Wisniewski, Przemek; Czernecki, Robert; Kucharski, Robert; Targowski, Grzegorz; Watson, Scott; Kelly, Antony E.

    2015-10-01

    AlGaInN laser diodes is an emerging technology for defence and security applications such as underwater communications and sensing, atomic clocks and quantum information. The AlGaInN material system allows for laser diodes to be fabricated over a very wide range of wavelengths from u.v., ~380nm, to the visible ~530nm, by tuning the indium content of the laser GaInN quantum well. Thus AlGaInN laser diode technology is a key enabler for the development of new disruptive system level applications in displays, telecom, defence and other industries. Ridge waveguide laser diodes are fabricated to achieve single mode operation with optical powers up to 100mW with the 400-440nm wavelength range with high reliability. Visible free-space and underwater communication at frequencies up to 2.5GHz is reported using a directly modulated 422nm GaN laser diode. Low defectivity and highly uniform GaN substrates allow arrays and bars to be fabricated. High power operation operation of AlGaInN laser bars with up to 20 emitters have been demonstrated at optical powers up to 4W in a CS package with common contact configuration. An alternative package configuration for AlGaInN laser arrays allows for each individual laser to be individually addressable allowing complex free-space or optical fibre system integration with a very small form-factor.

  10. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery

    Energy Technology Data Exchange (ETDEWEB)

    Kolda, T; Brown, D; Corones, J; Critchlow, T; Eliassi-Rad, T; Getoor, L; Hendrickson, B; Kumar, V; Lambert, D; Matarazzo, C; McCurley, K; Merrill, M; Samatova, N; Speck, D; Srikant, R; Thomas, J; Wertheimer, M; Wong, P C

    2005-01-06

    The Department of Homeland Security (DHS) has vast amounts of data available, but its ultimate value cannot be realized without powerful technologies for knowledge discovery to enable better decision making by analysts. Past evidence has shown that terrorist activities leave detectable footprints, but these footprints generally have not been discovered until the opportunity for maximum benefit has passed. The challenge faced by the DHS is to discover the money transfers, border crossings, and other activities in advance of an attack and use that information to identify potential threats and vulnerabilities. The data to be analyzed by DHS comes from many sources ranging from news feeds, to raw sensors, to intelligence reports, and more. The amount of data is staggering; some estimates place the number of entities to be processed at 1015. The uses for the data are varied as well, including entity tracking over space and time, identifying complex and evolving relationships between entities, and identifying organization structure, to name a few. Because they are ideal for representing relationship and linkage information, semantic graphs have emerged as a key technology for fusing and organizing DHS data. A semantic graph organizes relational data by using nodes to represent entities and edges to connect related entities. Hidden relationships in the data are then uncovered by examining the structure and properties of the semantic graph.

  11. Data Security Technology of Cloud Computing%云计算数据安全技术探讨

    Institute of Scientific and Technical Information of China (English)

    吴绘萍

    2014-01-01

    计算机技术发展的过程中,数据安全问题一直是一个重要课题,云计算概念的提出为计算机数据安全工作提供了新的解决办法。文章根据目前计算机网络安全的现状,对云计算数据安全技术的相关工作进行探讨。%The process of development of computer technology, data security issue has been an important topic, proposed the concept of cloud computing computer data safe work provides a new solution to. According to the article the current status of computer network security, cloud computing data security technologies related work are discussed.

  12. INFORMATION TECHNOLOGY SERVICE MANAGEMENT PROCESSES MATURITY IN THE BRAZILIAN FEDERAL DIRECT ADMINISTRATION

    Directory of Open Access Journals (Sweden)

    Maria Albeti Vieira Vitoriano

    2015-12-01

    Full Text Available This work aims at the scrutiny of the current situation of the Information Technology Service Management practices within the Brazilian Federal Direct Administration, from the perceptions of the Information Technology Managers of twelve Ministries. The methodology used followed the Process Maturity Framework as a guideline, which is a maturity model whose patterns are described in ITIL v3. The work consists of interviews with questions related to the five maturity levels, as follows: initial, repetitive, defined, managed and optimized. Information on the five basic Information Technology Service Management processes was collected. Besides the classification of the maturity levels of the processes, the interviews allowed us to gather information about the possible causes that hinder the improvement of the maturity of the processes. The outcomes of the survey on the researched ministries showed low maturity level in all the assessed service management processes. The Incident Management Process presented the highest level of maturity, while Problem Management proved to be the most flawed one, in relation to maturity. The other assessed processes, like Change Management, Service Assets and Configuration Management and Release and Deployment Management presented some sort of homogeneity among the ministries. As for the probable causes that hinder the improvement of the maturity level of the Information Technology Service Management processes, pointed by the managers, the following one stand out: the reduced staff, the lack of resources, the gap between the organizational targets and their processes aims, and the lack of skilled labor.

  13. Students' Ontological Security and Agency in Science Education--An Example from Reasoning about the Use of Gene Technology

    Science.gov (United States)

    Lindahl, Mats Gunnar; Linder, Cedric

    2013-01-01

    This paper reports on a study of how students' reasoning about socioscientific issues is framed by three dynamics: societal structures, agency and how trust and security issues are handled. Examples from gene technology were used as the forum for interviews with 13 Swedish high-school students (year 11, age 17-18). A grid based on modalities from…

  14. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    Science.gov (United States)

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-03-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  15. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Science.gov (United States)

    2012-11-27

    ... resources; Date and time of access; Logs of activity of DHS IT resources; IP address of access; Logs of... to the Department that is derived from other sources to facilitate authorized access to DHS... General Information Technology Access Account Records system of records security protocols will...

  16. Investing in Science and Technology to Meet Africa’s Maritime Security Challenges (Africa Security Brief, Number 10, February 2011)

    Science.gov (United States)

    2011-02-01

    collaborative “anchors” to sustain the effectiveness of maritime security efforts. H I G H L I G H T S N O . 1 0 / F E B R U A R Y 2 0 11 continue...endowed. —Nelson Mandela Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated...for assess- ing the most cost- effective strategies for monitoring Africa’s waters for illegal activity. The engagement of African researchers in

  17. Analysis of Network Security and Security Technology%网络安全及保障技术探析

    Institute of Scientific and Technical Information of China (English)

    王淼

    2011-01-01

    In the twenty-first century,along with the rapid development of Internet,computer networks,applications to enterprises and institutions have in-depth field.Computer networks has brought great convenience to mankind,but also information on the human security challenges as well.How to more effectively protect information security computer network to better serve the people and national interests,we now have become urgent problems.%在二十一世纪,伴随着互联网的迅猛发展,计算机网络的应用已经深入到企事业单位领域。计算机网络在给人类带来极大便利的同时,也对人类的信息以及安全提出了挑战。如何更有效地保障计算机网络的信息安全以便更好的为人民以及国家利益服务,便成为我们目前所急需解决的问题。

  18. APEC energy security and sustainable development through efficiency and diversity - economic issues in technology R & D, adoption and transfer

    Energy Technology Data Exchange (ETDEWEB)

    Hogan, L.; Curtotti, R.; Austin, A.

    2007-04-15

    The Asia Pacific Economic Cooperation forum (APEC) has an important role to play in strengthening regional economic cooperation and in addressing the regional energy security and sustainable energy development issues that have become more prominent in recent years. Key objectives in this report are to present an overview of the challenges facing APEC economies in meeting the region's growing energy requirements, with a focus on the energy requirements of the APEC stationary energy sector, and to assess the role that cleaner fuels and energy technologies can play in achieving a more secure and sustainable energy sector in the APEC region. The report also examines barriers to investment and policy options that encourage the development and deployment of energy technologies that can enhance energy security and environmental sustainability in the APEC region. Appendix D deals with coal fired power generation technologies. The report was prepared in anticipation of the eighth meeting of the APEC Energy Ministers Meeting. To support energy policy formulation by energy ministers, relevant background information is provided on clean and energy efficient technologies, alternative and renewable fuels, and environmentally sustainable energy technologies. 59 refs., 24 figs., 19 tabs., 5 apps.

  19. Research on Cloud Computing, SDN and Security Technology%云计算及SDN与安全技术研究

    Institute of Scientific and Technical Information of China (English)

    胡章丰; 郭春梅; 毕学尧

    2013-01-01

    文章重点围绕云计算、SDN及安全这3方面的内容展开讨论,深入分析和研究了3者之间的相互关系,并提出了一种基于SDN的云计算安全架构。%This paper investigates the internal relationships between cloud computing, SDN and security technology, and then proposes a SDN-based security architecture for cloud computing.

  20. Analysis of the technology acceptance model in examining hospital nurses' behavioral intentions toward the use of bar code medication administration.

    Science.gov (United States)

    Song, Lunar; Park, Byeonghwa; Oh, Kyeung Mi

    2015-04-01

    Serious medication errors continue to exist in hospitals, even though there is technology that could potentially eliminate them such as bar code medication administration. Little is known about the degree to which the culture of patient safety is associated with behavioral intention to use bar code medication administration. Based on the Technology Acceptance Model, this study evaluated the relationships among patient safety culture and perceived usefulness and perceived ease of use, and behavioral intention to use bar code medication administration technology among nurses in hospitals. Cross-sectional surveys with a convenience sample of 163 nurses using bar code medication administration were conducted. Feedback and communication about errors had a positive impact in predicting perceived usefulness (β=.26, Pmodel predicting for behavioral intention, age had a negative impact (β=-.17, Pmodel explained 24% (Ptechnology.

  1. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  2. Impact of Information and Communication Technologies on School Administration: Research on the Greek Schools of Secondary Education

    Science.gov (United States)

    Saiti, Anna; Prokopiadou, Georgia

    Information and Communication Technologies (ICT) may be considered as a synonym for the modernization of all organizations, including school units, as they provide for advanced and updated technological tools and applications. Nowadays, the implementation of new technologies in the schools of secondary education in Greece has been rapidly increasing. This adoption of ICT reinforces the teaching process, but also facilitates administrative transactions. The current research aims to determine the level of technological infrastructure present in the secondary schools of Greece, to what extent this equipment meets their administrative needs, to study the role of the school libraries in their contribution to the modernization of school administration, and to examine the conditions that influence the implementation of ICT in school management.

  3. The Adoption of Information and Communications Technology in the Administration of Health Insurance Schemes in Ghana

    Directory of Open Access Journals (Sweden)

    Jeffrey Mingle

    2013-12-01

    Full Text Available This study evaluated the level of information andcommunications technologies (ICTs adoption in theadministration of the National Health Insurance Scheme (NHISin Ghana within the context of the Activity Theory. The studyused the mixed methods which involved the survey of 104 staffusing questionnaires and an interview with the Regional ICTCoordinator of the NHIS in Accra. The study revealed that theNHIS’ in the Region did not have an ICT policy of their ownderived from the national ICT policy. Also, the level of adoptionin ICTs was not satisfactory as essential processes in the schemesadministration were still being done manually. ICT usage in theschemes was not adequate and effective. The majority of the staffhad basic-intermediate ICT skills; and training in ICTs for staffwere not adequate. The study concluded that even though ICTshold great potential for health insurance scheme administration,these benefits for now remains an illusion in Ghana’s NHISsetup. A policy driven and training led strategies wererecommended.

  4. Information Technology Service Management with Cloud Computing Approach to Improve Administration System and Online Learning Performance

    Directory of Open Access Journals (Sweden)

    Wilianto Wilianto

    2015-10-01

    Full Text Available This work discusses the development of information technology service management using cloud computing approach to improve the performance of administration system and online learning at STMIK IBBI Medan, Indonesia. The network topology is modeled and simulated for system administration and online learning. The same network topology is developed in cloud computing using Amazon AWS architecture. The model is designed and modeled using Riverbed Academic Edition Modeler to obtain values of the parameters: delay, load, CPU utilization, and throughput. The simu- lation results are the following. For network topology 1, without cloud computing, the average delay is 54  ms, load 110 000 bits/s, CPU utilization 1.1%, and throughput 440  bits/s.  With  cloud  computing,  the  average  delay  is 45 ms,  load  2 800  bits/s,  CPU  utilization  0.03%,  and throughput 540 bits/s. For network topology 2, without cloud computing, the average delay is 39  ms, load 3 500 bits/s, CPU utilization 0.02%, and throughput database server 1 400 bits/s. With cloud computing, the average delay is 26 ms, load 5 400 bits/s, CPU utilization email server 0.0001%, FTP server 0.001%, HTTP server 0.0002%, throughput email server 85 bits/s, FTP    server 100 bits/sec, and HTTP server 95  bits/s.  Thus,  the  delay, the load, and the CPU utilization decrease; but,  the throughput increases. Information technology service management with cloud computing approach has better performance.

  5. Arrangement on the Recognition of Common Criteria Certificates In the Field of Information Technology Security

    Science.gov (United States)

    2000-05-01

    Security Establishment from Canada and Ministry of Finance from Finland and Service Central de la Sécurité des Systèmes d’Information from France and...39 HQ Defence Command Norway/Security Division from Norway and Ministerio de Administraciones Públicas from Spain and Communications-Electronics...Canadian Common Criteria Evaluation and Certification Scheme sponsored by Communications Security Establishment, from Canada Schema d’Evaluation et

  6. Transition-ready technologies and expertise from the Chemical and Biological National Security Program at LLNL

    Energy Technology Data Exchange (ETDEWEB)

    Folta, P A; McBride, M T

    2006-02-22

    HSARPA has initiated a new Bioinformatics and Assay Development solicitation, BIAD2 (BAA 06-01), to address a number of technology gaps and requirements for biodetection (www.hsarpabaa.com). This solicitation will leverage the vast research and development capabilities of the private sector and academia in order to meet the needs of HSARPA and Homeland Security. In order to meet these requirements, this solicitation will: (1) Develop and validate actionable assays for the public and private sector; (2) Develop and validate new assays and novel assay methodologies to enhance existing detection systems and enable future detection platforms; (3) Develop next generation assays which are robust against novel, emerging and engineered threats; (4) Develop novel assays that detect low levels of ribonucleic acid (RNA)-based viral threats in complex backgrounds; (5) Develop novel assays to characterize the viability, degree of virulence or toxicity, and countermeasure resistance of a biological agent; and (6) Develop new bioinformatics tools to support assay development and assay validation The Lawrence Livermore National Laboratory (LLNL) Bioassays and Signature Program (BSP) develops nationally-validated detection and identification assays to cover the full range of biological threat agents, starting from human, animal, and plant pathogens on the Select Agent list. The assays that have been co-developed by the CDC and the BSP are used internationally and represent the gold standard for molecular detection of select agent pathogens for the public health community. They are also used in the DHS environmental monitoring operations such as BioWatch and DHS National Security Special Events support. These reagents have been used to process and analyze more than 5 million samples and have delivered exceptional performance for the end users, with zero false positives since their deployment. Currently, highly-multiplexed nucleic acid assays that represent the &apos

  7. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  8. New technologies applied to education: Case study in the agency for administrative modernisation

    Directory of Open Access Journals (Sweden)

    A.P. Sousa

    2015-05-01

    Full Text Available This study focuses on the approach of the new technologies applied to training in the organizational context . As objectives we intend to analyze the importance and effectiveness of b-learning training as a tool for workers’ development in the Citizen Shops, and realize how the new information and communication technologies can be a dominant tool in the continuous training of workers. The method used was the case study – Agency for Administrative Modernisation – in order to verify the impact, between 2008 and 2012, of the training and learning process on the organization and on the individuals. For the collection of information appealed to the semi-structured interview (head of training , trainer, trainees. The results suggest that the implementation of the b-learning training methodology had a positive impact on the learning process and on the performance of the training groups, allowing the organization to support the creation of a training department to respond effectively to its needs.

  9. Study on application of the information security technology. Survey on a technology to assure safety on communication routes; Joho security gijutsu no tekiyo kenkyu. Tsushin keirojo no anzen hosho gijutsu no chosa

    Energy Technology Data Exchange (ETDEWEB)

    Kimura, S. [Kansai Electric Power Co. Inc., Osaka (Japan)

    1998-11-10

    This paper describes the communication information security technology. Encoding is a generic term for the method to make data unreadable to persons other than those authorized. Of the encoding algorithms in the Internet, the common key system uses the same key for both of encoding and decoding, where the same key is shared and maintained confidentially by a transmitter and a receiver. The open key system uses two keys made in two pairs called an open key and a confidential key. Encoding is performed by using the open key possessed by a transmitter and decoding is possible only by the counterpart possessing the confidential key. Good points of both systems are combined and mounted in actual systems. This paper also describes a verification technology as a mechanism to prevent unauthorized data alteration. In security protocols, security function (encoding) is added to a communication protocol. The virtual private network has come recently to the practical application phase to realize such an environment that a dedicated line is installed virtually on an Internet line by applying the encoding technology, making it possible to structure a low-cost and safe communication routes. (NEDO)

  10. 公安机关参与行政诉讼应注意的问题%Attentive Problems on Public Security Organs Participating in Administrative Proceedings

    Institute of Scientific and Technical Information of China (English)

    张力燕

    2012-01-01

      行政诉讼所确立保护公民、法人和其他组织的合法权益不受侵犯的目的,与公安机关的根本宗旨是完全一致的。为了确保公民、法人和其他组织的合法权益,公安行政行为必须接受人民法院的监督。熟悉和掌握行政诉讼规则对于我们依法办案、文明办案,提高办案效率和质量非常必要。本人认为,公安机关在收到人民法院送达的起诉状副本后,应从程序上充分行使诉讼权,从实体上准确把握规定,做透庭审过程细节三方面做好功课,为诉讼打下良好的基础%  Administrative proceedings are established to protect the legitimate rights of citizens, legal persons and other organizations from infringement, which is entirely in line with the basic aim of the public security organs. In order to ensure their legitimate rights, public security administrative acts must be under the supervision of the People's Court. It’s necessary to grasp and be familiar with the rules of administrative proceedings in handling cases by law and civilization, and improving the efficiency and quality of handling cases. After receiving a copy of the bill of complaint, public security organs should pave the way for litigation from using litigation rights in procedures, exactly grasping regulations in entity and mastering details in the process of court trial.

  11. Analysis of Key Technologies on Cloud Computing Security%云计算安全关键技术分析

    Institute of Scientific and Technical Information of China (English)

    郭瑞鹏

    2012-01-01

    The emergence of cloud computing enables the enterprises and individuals through the network to use computing resources and storage resources conveniently, cloud computing in data security issues are also increasingly attracted widespread attention. This paper discusses the objectives and requirements of cloud computing security, and analyzes the cloud computing user access, encryption technology, access control, virtualization security and other critical security technologies.%云计算的出现使企业与个人可以通过网络方便地使用云中的计算资源和存储资源,云计算中数据安全问题也越来越引起人们的广泛关注.本文讨论云计算安全的目标和要求,对云计算中的用户接入、加密技术、访问控制、虚拟化安全等关键安全技术进行分析.

  12. Effect of Tri-Staple Technology and Slow Firing on Secure Stapling Using an Endoscopic Linear Stapler.

    Science.gov (United States)

    Hasegawa, Suguru; Nakayama, Shinya; Hida, Koya; Kawada, Kenji; Sakai, Yoshiharu

    2015-01-01

    To evaluate the effect of Tri-staple technology and slow firing using the Endo-GIA endoscopic linear stapler. The cardiac and pyloric portions of porcine stomachs were divided using the endoscopic linear stapler with different reload types. A total of 8 min of waiting time was employed during firing in the slow-firing group and no waiting time was employed in the normal-firing group. The shape of the staples was then evaluated. The length of the staple line and serosal laceration was also determined. There was a moderate negative correlation between tissue thickness and secure staple formation. Tri-staple reloads (purple, black) offered more secure staple formation compared with Universal green reload. Although slow firing enhanced secure staple formation, its effect was greater when using green reload, compared with Tri-staple reloads. Significantly shorter staple line length and longer serosal laceration was observed in the thick tissue. Although the cartridge type did not influence lengths of the staple line or serosal laceration, both were better in the slow-firing group. Tri-staple reloads offered more secure staple formation compared with the Universal reload. Although slow firing improved staple line shortening and serosal laceration, its effect on secure stapling was relatively small when using Tri-staple reloads. © 2015 S. Karger AG, Basel.

  13. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  14. United States Department of Energy National Nuclear Security Administration Sandia Field Office NESHAP Annual Report CY2014 for Sandia National Laboratories New Mexico

    Energy Technology Data Exchange (ETDEWEB)

    evelo, stacie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Miller, Mark L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-05-01

    This report provides a summary of the radionuclide releases from the United States (U.S.) Department of Energy (DOE) National Nuclear Security Administration facilities at Sandia National Laboratories, New Mexico (SNL/NM) during Calendar Year (CY) 2014, including the data, calculations, and supporting documentation for demonstrating compliance with 40 Code of Federal Regulation (CFR) 61, Subpart H--NATIONAL EMISSION STANDARDS FOR EMISSIONS OF RADIONUCLIDES OTHER THAN RADON FROM DEPARTMENT OF ENERGY FACILITIES. A description is given of the sources and their contributions to the overall dose assessment. In addition, the maximally exposed individual (MEI) radiological dose calculation and the population dose to local and regional residents are discussed.

  15. Supporting Case-Based Learning in Information Security with Web-Based Technology

    Science.gov (United States)

    He, Wu; Yuan, Xiaohong; Yang, Li

    2013-01-01

    Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…

  16. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    Science.gov (United States)

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  17. Teaching Information Security with Workflow Technology--A Case Study Approach

    Science.gov (United States)

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  18. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Science.gov (United States)

    2010-10-01

    ..., computer ethics, and best practices, in accordance with DOC IT Security Program Policy, chapter 15, section... term “Sensitive” is defined by the guidance set forth in the Computer Security Act of 1987 (Pub. L. 100... of computer systems, networks, and telecommunications systems. (c) The contractor shall...

  19. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    Science.gov (United States)

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  20. Teaching Information Security with Workflow Technology--A Case Study Approach

    Science.gov (United States)

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  1. Supporting Case-Based Learning in Information Security with Web-Based Technology

    Science.gov (United States)

    He, Wu; Yuan, Xiaohong; Yang, Li

    2013-01-01

    Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…

  2. AlGaInN laser diode technology for defence, security and sensing applications

    Science.gov (United States)

    Najda, Stephen P.; Perlin, Piotr; Suski, Tadek; Marona, Lucja; Boćkowski, Mike; Leszczyński, Mike; Wisniewski, Przemek; Czernecki, Robert; Kucharski, Robert; Targowski, Grzegorz; Watson, Scott; Kelly, Antony E.

    2014-10-01

    The latest developments in AlGaInN laser diode technology are reviewed for defence, security and sensing applications. The AlGaInN material system allows for laser diodes to be fabricated over a very wide range of wavelengths from u.v., i.e, 380nm, to the visible, i.e., 530nm, by tuning the indium content of the laser GaInN quantum well. Advantages of using Plasma assisted MBE (PAMBE) compared to more conventional MOCVD epitaxy to grow AlGaInN laser structures are highlighted. Ridge waveguide laser diode structures are fabricated to achieve single mode operation with optical powers of communications at high frequency (up to 2.5 Gbit/s) using a directly modulated 422nm Gallium-nitride (GaN) blue laser diode is reported. High power operation of AlGaInN laser diodes is demonstrated with a single chip, AlGaInN laser diode `mini-array' with a common p-contact configuration at powers up to 2.5W cw at 410nm. Low defectivity and highly uniform GaN substrates allow arrays and bars of nitride lasers to be fabricated. GaN laser bars of up to 5mm with 20 emitters, mounted in a CS mount package, give optical powers up to 4W cw at ~410nm with a common contact configuration. An alternative package configuration for AlGaInN laser arrays allows for each individual laser to be individually addressable allowing complex free-space and/or fibre optic system integration within a very small form-factor.or.

  3. Wireless Security

    CERN Document Server

    Osterhage, Wolfgang

    2011-01-01

    In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared. In each chapter a major part is devoted to security risks and provisions includin

  4. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  5. 76 FR 72967 - Aviation Security Advisory Committee (ASAC) Meeting

    Science.gov (United States)

    2011-11-28

    ... SECURITY Transportation Security Administration Aviation Security Advisory Committee (ASAC) Meeting AGENCY... Meeting. SUMMARY: The Transportation Security Administration (TSA) will hold a meeting of the Aviation... matters affecting civil aviation security. This meeting is open to the public, but participation is...

  6. 技术进步挑战电信监管%Administration Facing New Challenges with Technology Advancing

    Institute of Scientific and Technical Information of China (English)

    翟雪梅

    2005-01-01

    The history of telecom industry development can be said to be the history of communications technology development and advance in a sense. Especially in the new century, information technology develops and changes quickly out of our imagination. Innovation in new services makes the limit among all services becoming not clear any more. Also the integration of telecom network, internet and TV net becomes a trend. All those bring new challenges for telecom administration.

  7. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    that S&T is appropriately harnessed to continue its valued contribution to our nation’s security. The purpose of the policy will be to:  define...Commonwealth resources by ensuring the right research is being done, by the most appropriate providers,  ensure the research team/s are held accountable ...policy will realise the leadership role of DSTO as Australia’s national security S&T coordinator and program manager. As the coordinator, DSTO will be

  8. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  9. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  10. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  11. R&D ADMINISTRATION IN THE HIGH TECHNOLOGY INDUSTRY: HOW TO MANAGE A PARADOX

    Directory of Open Access Journals (Sweden)

    Nobuiuki Costa Ito

    2010-10-01

    Full Text Available The competitive environment of the knowledge age is getting more complex, dynamic, and fast-moving each day. The high tech industry is intensively tied to its effects and demands for innovation, so the field of Research and Development must act strategically, generating innovations and granting success and sustainability to the business. However, there is a paradox in R&D which may lay traps and obstacles disguised by the busy day-to-day activity of the organization. The purpose of this paper is to point out directions that managers may take to cope with these contradictions in R&D administration. The R&D paradox is rooted in the conflict between exploitation, achieved by continual improvement through incremental innovation, and by exploration, which seeks new opportunities in the creation of new technologies through disruptive innovations. These two sides of the paradox demand different, and sometimes even divergent, organizations. Top management leadership is crucial for the acceptance and balancing of the contradictions created by this paradox, and can align exploitation/exploration through distributive and integrative decisions and transform companies into truly ambidextrous organizations.    Key-words:  Research & Development. Innovation. Paradox. Ambidextrous organizations. Strategy. 

  12. 光纤通信系统保密技术研究%Research on the Security Technology of Optical Fiber Communication System

    Institute of Scientific and Technical Information of China (English)

    吉文龙

    2011-01-01

    For the wide transmission band and good secrecy performance, Optical fiber communication is one of the world's most promising communication technologies. In this thesis, the chaotic secure communication, optical code division multiple access security technology and quantum secure communication technology are discussed, and the three kinds of security technology principle and technical features are described in detail.%光纤通信传输频带宽,保密性能好,是当今世界上最有发展前途的通信技术。本论文就混沌保密通信技术、光纤码分多址保密技术和量子保密通信技术进行了讨论,并详细阐述了该三种保密技术的原理、技术特点等。

  13. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education.

    Science.gov (United States)

    Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K

    2013-08-09

    Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality

  14. Nurses' Perceptions of the Impact of Work Systems and Technology on Patient Safety during the Medication Administration Process

    Science.gov (United States)

    Gallagher Gordon, Mary

    2012-01-01

    This dissertation examines nurses' perceptions of the impacts of systems and technology utilized during the medication administration process on patient safety and the culture of medication error reporting. This exploratory research study was grounded in a model of patient safety based on Patricia Benner's Novice to Expert Skill Acquisition model,…

  15. Nurses' Perceptions of the Impact of Work Systems and Technology on Patient Safety during the Medication Administration Process

    Science.gov (United States)

    Gallagher Gordon, Mary

    2012-01-01

    This dissertation examines nurses' perceptions of the impacts of systems and technology utilized during the medication administration process on patient safety and the culture of medication error reporting. This exploratory research study was grounded in a model of patient safety based on Patricia Benner's Novice to Expert Skill…

  16. Nurses' Perceptions of the Impact of Work Systems and Technology on Patient Safety during the Medication Administration Process

    Science.gov (United States)

    Gallagher Gordon, Mary

    2012-01-01

    This dissertation examines nurses' perceptions of the impacts of systems and technology utilized during the medication administration process on patient safety and the culture of medication error reporting. This exploratory research study was grounded in a model of patient safety based on Patricia Benner's Novice to Expert Skill Acquisition model,…

  17. Japanese Prime Minister Shinzo Abe’s Two Administrations: Successes and Failures of Domestic and Security Policies

    Science.gov (United States)

    2016-12-01

    8 Robert Pekkanen, “What Is Koizumi’s Legacy? Evaluating Change in Fukuda’s LDP,” Woodrow Wilson International...12 Shinju Fujihira, “Legacies of the Abe Administration,” Woodrow Wilson International Center for Scholars Asia Program...Democratic Party of Japan and Japan’s Future,” Woodrow Wilson International Center for Scholars Asia Program Special Report 139 (January 2008): 15, https

  18. 物联网技术及安全问题%Technology and Security Issues of Internet of Things

    Institute of Scientific and Technical Information of China (English)

    朱新良

    2015-01-01

    物联网被称为继计算机和互联网之后的第三次信息技术革命,其应用无处不在,而物联网的安全问题直接关系到它的广泛应用。从物联网的安全构架和特点出发,阐述了物联网三层体系结构中存在的安全问题,提出了解决方案和涉及到的关键技术,对感知层的安全措施进行了具体的阐述,包括密钥管理算法、安全路由协议、数据融合技术以及身份认证和访问控制,等等。最后介绍了物联网的典型应用和发展前景。%Internet of things is called the third IT revolution following the computer and the internet, and now it is everywhere.The security issues of the Internet of Things (IoT)are directly related to the wide application of its system.Beginning with introducing the architecture and features of IoT security,this paper expounds several security issues of IoT that exist in the three-layer system structure,and comes up with solutions coupled with key technologies involved.Among these safety measures concerned,those in perception layer are particularly elaborated,including key management and algorithm,security routing protocol,data fusion technology,as well as authentication and access control,etc.The paper also presents the typical application and future prospect of the internet of things.

  19. The Application of ElGamal Encryption Technology to the Information Security of Digital Library

    Directory of Open Access Journals (Sweden)

    Zhang Fu jun

    2013-07-01

    Full Text Available     Nowadays, the construction and application of digital library leads a new era of the way people obtain knowledge and information, and promotes the academic exchanges and social progress. Digital library, however, also involves great risk, hacker attacks become the main threat of the information security of digital library, and may probably cause the loss and damage of the information resources in library. This article mainly introduces the advantages and the potential safety hazard of digital library, and then makes an analysis aiming at the information security of digital library, and finally puts forward an algorithm based on ElGamal encryption to protect library information encryptedly, and effectively guarantee the information security of digital library.

  20. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    Science.gov (United States)

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  1. Using Information and Communication Technologies in School Administration: Researching Greek Kindergarten Schools

    Science.gov (United States)

    Prokopiadou, Georgia

    2012-01-01

    New technologies are widely used in several domains of human activity and business, including education, because of their positive impact on information management and service delivery. Considering technology's ability to provide for advanced and updated technological tools and applications, information and communication technologies (ICT) have…

  2. Using Information and Communication Technologies in School Administration: Researching Greek Kindergarten Schools

    Science.gov (United States)

    Prokopiadou, Georgia

    2012-01-01

    New technologies are widely used in several domains of human activity and business, including education, because of their positive impact on information management and service delivery. Considering technology's ability to provide for advanced and updated technological tools and applications, information and communication technologies (ICT) have…

  3. 软件定义网络安全技术研究%Research on Software Defined Network Security Technology

    Institute of Scientific and Technical Information of China (English)

    邵延峰; 贾哲

    2016-01-01

    With the rapid development of network scale and the diversification of network services,the original network structure is difficult to meet the needs of the future development.Software Defined Network (SDN) as a new technology realizes the separation of control plane and data plane,which can provide centralized network controll and the flexible traffic management. This will take place great changes in communication field.This paper firstly analyses the features of SDN architecture and the security threat;then gives a survey on the present development of SDN security;and finally propose the development orientation of SDN security technology including network dynamic defense,software defined monitoring,and security enforcement,which can reinforce the security of SDN,and enhance the dynamic arrangement of security resources.%随着网络规模的快速扩大及网络业务的多样化,原有的网络架构难以满足未来发展需要。软件定义网络( Software Defined Network, SDN)作为一种新兴技术,实现了控制面与数据面的解耦,能够提供网络的集中控制与流量的灵活调度,将引起通信领域的巨大变革。研究了SDN架构的特点及其面临的安全威胁;针对SDN安全技术研究现状进行了综述;从网络动态防御、软件定义监控和自身安全性增强3个方面提出了SDN安全技术的发展方向。在加强SDN自身安全性的同时提高了网络安全资源的动态调度能力。

  4. How does administrative law cope with scientific and technological developments. Die Bewaeltigung der wissenschaftlichen und technischen Entwicklung durch das Verwaltungsrecht

    Energy Technology Data Exchange (ETDEWEB)

    Ronellenfitsch, M.

    1989-09-01

    The contribution discusses the means available to administrative law in coping with scientific and technological developments. The potentials and chances of technology are reviewed in contrast to the immanent risks, and technology and law are discussed in their interactive relations. The role of the law is explained with regard to supervisory and controlling functions, referring to practical examples (licensing of installations, biological and genetic engineering, information and communication science and technology). The author discusses the efficiency of control (preventive prohibition subject to possible licensing, averting danger, preventing risks, strict liability regimes, planning laws), as well as the time problem (protection of existing rights, stepwise licensing procedures, subsequent instructions and supervision), and judical review. Finally, the author discusses the ways technology may win (improvement of acceptance procedures, judicial control) and the rather unsatisfactory conditions today. (RST).

  5. An explosives detection system for airline security using coherent x-ray scattering technology

    Science.gov (United States)

    Madden, Robert W.; Mahdavieh, Jacob; Smith, Richard C.; Subramanian, Ravi

    2008-08-01

    L-3 Communications Security and Detection Systems (SDS) has developed a new system for automated alarm resolution in airline baggage Explosive Detection Systems (EDS) based on coherent x-ray scattering spectroscopy. The capabilities of the system were demonstrated in tests with concealed explosives at the Transportation Security Laboratory and airline passenger baggage at Orlando International Airport. The system uses x-ray image information to identify suspicious objects and performs targeted diffraction measurements to classify them. This extra layer of detection capability affords a significant reduction in the rate of false alarm objects that must presently be resolved by opening passenger bags for hand inspection.

  6. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  7. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  8. 网络安全管理技术在企业网中的应用%The Application of Network Security Technology in Enterprise Network

    Institute of Scientific and Technical Information of China (English)

    何向东

    2013-01-01

    For enterprise network security issues,this paper analyzes the corporate network security threats,combined with a production enterprise network security deployment plans,proposed enterprise network security management,combined with a certain product and technology,given enterprise network security solutions to achieve the protection of corporate network security issues.%针对企业的网络安全问题,通过对企业网络安全威胁的分析,结合一个生产型企业网安全部署图,提出企业网的安全管理方法,同时结合一定的产品和技术,给出企业网络中的安全解决方案,实现了保护企业网络的安全问题.

  9. Technological Proficiency as a Key to Job Security. Trends and Issues Alert No. 6.

    Science.gov (United States)

    Imel, Susan

    Although not all current jobs require basic computer skills, technological advances in society have created new jobs and changed the ways many existing jobs are performed. Clearly, workers who are proficient in technology have a greater advantage in the current workplace and the need for technologically proficient workers will only continue to…

  10. Securing Public Safety Vehicles: Reducing Vulnerabilities by Leveraging Smart Technology and Design Strategies

    Science.gov (United States)

    2013-12-01

    Three 154 Ibid., 34. 155 Frost and Sullivan , Using Wireless Technology to Manage and Optimize...Government Fleets (Mountain View, CA: Frost & Sullivan , 2011). 156 Ibid., 3. 42 components combined: interconnectivity solutions, mobile devices...research-technology/report/vit-best- practices-law-enforcement-nov2007.pdf. Frost & Sullivan . Using Wireless Technology to Manage and Optimize

  11. Building Future Security: Strategies for Restructuring the Defense Technology and Industrial Base.

    Science.gov (United States)

    1992-06-01

    engineers in a specialized project shop. Although this approach initially sparked resistance, it promoted greater manufactura - bility by forcing...69, p. 760. 106 • Building Future Security video and animation at each employee workstation. Construction, however, remains primarily a hands- on

  12. Technology transfer of dynamic IT outsourcing requires security measures in SLAs

    NARCIS (Netherlands)

    F. Dickmann (Frank); M. Brodhun (Maximilian); J. Falkner (Jürgen); T.A. Knoch (Tobias); U. Sax (Ulrich)

    2010-01-01

    textabstractFor the present efforts in dynamic IT outsourcing environments like Grid or Cloud computing security and trust are ongoing issues. SLAs are a proved remedy to build up trust in outsourcing relations. Therefore, it is necessary to determine whether SLAs can improve trust from the perspect

  13. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  14. Leadership and New Technologies. New Security Issues for Management of Internet Connectivity and Remote Control in Automotive Industry

    Directory of Open Access Journals (Sweden)

    Cosmin Cătălin Olteanu

    2015-05-01

    Full Text Available The main purpose of the paper is to illustrate the importance of implementing new security policies for infotainment systems in automotive industry. A car is full of technology and is easier today to control car systems through an internet connection linked to car system infotainment. This is how it is possible to gain control of critical car systems. More than 84% of users doesn’t even know the risk of remote control of the car in the presence of Internet connection.

  15. Developing a voltage-stability-constrained security assessment system part II : Structure and function design and technology used

    OpenAIRE

    Ni, YX; Wu, FF; Shi, LB; Zhou, HF; Tam, PTC; Chang, NC; Su, JF; Du, ZB

    2005-01-01

    This is the second part in a two-part paper on the development of a voltage stability constrained security assessment system (VSC-SAS). In this part, overall VSC-SAS structure and function design and technology used will be presented. The system is expected to be used in both on-line and off-line modes. In on-line mode, on-line SCADA/EMS data will be used for VSC-SAS use; while in off-line mode (usually day-ahead calculation), historical data can be used for VSC-SAS. Both results (i.e. system...

  16. The appropriate and effective use of security technologies in U.S. schools : a guide for schools and law enforcement agencies.

    Energy Technology Data Exchange (ETDEWEB)

    Green, Mary Wilson

    2005-06-01

    The purpose of this report is to provide school administrators with the ability to determine their security system requirements, so they can make informed decisions when working with vendors and others to improve their security posture. This is accomplished by (1) explaining a systems-based approach to defining the objectives and needs of the system, and (2), providing information on the ability of common components (sensors, cameras, metal detectors, etc) to achieve those objectives, in an effectively integrated system.

  17. Official Position of the American Academy of Clinical Neuropsychology Social Security Administration Policy on Validity Testing: Guidance and Recommendations for Change.

    Science.gov (United States)

    Chafetz, M D; Williams, M A; Ben-Porath, Y S; Bianchini, K J; Boone, K B; Kirkwood, M W; Larrabee, G J; Ord, J S

    2015-01-01

    The milestone publication by Slick, Sherman, and Iverson (1999) of criteria for determining malingered neurocognitive dysfunction led to extensive research on validity testing. Position statements by the National Academy of Neuropsychology and the American Academy of Clinical Neuropsychology (AACN) recommended routine validity testing in neuropsychological evaluations. Despite this widespread scientific and professional support, the Social Security Administration (SSA) continued to discourage validity testing, a stance that led to a congressional initiative for SSA to reevaluate their position. In response, SSA commissioned the Institute of Medicine (IOM) to evaluate the science concerning the validation of psychological testing. The IOM concluded that validity assessment was necessary in psychological and neuropsychological examinations (IOM, 2015 ). The AACN sought to provide independent expert guidance and recommendations concerning the use of validity testing in disability determinations. A panel of contributors to the science of validity testing and its application to the disability process was charged with describing why the disability process for SSA needs improvement, and indicating the necessity for validity testing in disability exams. This work showed how the determination of malingering is a probability proposition, described how different types of validity tests are appropriate, provided evidence concerning non-credible findings in children and low-functioning individuals, and discussed the appropriate evaluation of pain disorders typically seen outside of mental consultations. A scientific plan for validity assessment that additionally protects test security is needed in disability determinations and in research on classification accuracy of disability decisions.

  18. Research on Network Security Technology%关于网络安全技术的探讨

    Institute of Scientific and Technical Information of China (English)

    曾照华; 王晓霞

    2013-01-01

    In this paper,from two aspects of network attack anddefense of the existing network security technologies areintroduced,the main means of network attacksand the corresponding defense measures are discussed,the network protocol security,firewall,encryption,transmission process invade to examine the technique principle of these four kinds of network defense are given,so as to solve some problems the existing network security.%从网络攻击和网络防御两个方面针对现有网络安全技术进行了探讨,讨论了网络攻击的主要手段和相应的防御措施,给出了网络协议安全、传输过程加密、防火墙、入侵检测技术这4种网络防御手段的原理,从而解决了现有网络安全面临的一些问题。

  19. My, your and our needs for safety and security: relatives' reflections on using information and communication technology in dementia care.

    Science.gov (United States)

    Olsson, Annakarin; Engström, Maria; Skovdahl, Kirsti; Lampic, Claudia

    2012-03-01

    The present paper reports on a study aimed at describing relatives' reflections on different kinds of information and communication technology (ICT) devices that are used or can be used in the daily care of persons with dementia. Many persons with dementia continue living in their own homes, which requires the support of their relatives. One way to meet the needs of relatives and persons with dementia is to use ICT. An interview study was conducted in Sweden (2007-2008) with a purposive sample of 14 spouses of a person with dementia. Qualitative content analysis was used to identify categories and themes in the data. Relatives' reflections on the use of ICT were described as ICT - a support in daily life, ICT - internal and external conditions and ICT - the decision to use or not use. Based on these categories, a theme was revealed: shifting between different perspectives: my, your and our needs for safety and security. Relatives struggle to create a situation of safety and security in daily life for themselves and the persons with dementia. ICT devices with the right functionality and used at the right time are regarded as useful in solving everyday problems. In the decision to use or not use ICT, the opportunity to create a safe and secure environment overshadows potential ethical problems. Providing early information about ICT to persons with dementia and their relatives could facilitate joint decision-making regarding use of ICT. © 2011 The Authors. Scandinavian Journal of Caring Sciences © 2011 Nordic College of Caring Science.

  20. Research of Information Security Based on Cookie Technology%基于Cookie技术的信息安全研究

    Institute of Scientific and Technical Information of China (English)

    熊俊

    2014-01-01

    Cookie solves the complexity of Internet users operating in a certain extent, but also causes some security threats about the user's personal information. This paper introduces related concept, the main function, working principle of Cookie, analyzes the technical loophole from, provides encryption technology, the Cookie management tools, browser security settings and other safety measures for the professional staff, to enhance the security of Cookie from many aspects, to ensure that the premise of the normal access to the Web site, to accomplish that the user privacy data is not leaked.%Cookie在一定程度上解决了用户上网操作的繁琐性,但同时也对用户的个人信息造成一定的安全威胁。通过介绍Cookie的相关概念、主要功能、工作原理,从中分析出存在的技术漏洞,为专业人员提供了加密技术、Cookie管理工具、览器安全设置等安全措施,从多个方面提升使用Cookie的安全性,确保在正常访问Web站点的前提下,实现用户隐私数据不被泄露。

  1. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  2. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  3. Institutionalizing information security.

    OpenAIRE

    2008-01-01

    Information security has become a much discussed subject all over the world in the last few years. This is because information security is no longer a luxury, but a necessity in all organisations. The securing of information is not an easy task because information security is flexible and always seems to be in a state of development. This means that information security has undergone different development changes due to new technologies in the past few years. Information security became promi...

  4. Information Communication and Technology for Water Resource Management and Food Security in Kenya: A Case Study of Kericho and Uasin Gishu Districts

    Science.gov (United States)

    Omboto, P. I.; Macharia, J.; Mbagaya, Grace; Standa, F. N.

    2011-01-01

    Recent reports on Kenya have indicated food insecurity and destruction of water catchments as serious problems facing the country. Despite the tremendous strides in Information and Communication Technology (ICT), the country has not taken advantage of the technology to improve food security by effectively managing her water resources. A survey on…

  5. Information Communication and Technology for Water Resource Management and Food Security in Kenya: A Case Study of Kericho and Uasin Gishu Districts

    Science.gov (United States)

    Omboto, P. I.; Macharia, J.; Mbagaya, Grace; Standa, F. N.

    2011-01-01

    Recent reports on Kenya have indicated food insecurity and destruction of water catchments as serious problems facing the country. Despite the tremendous strides in Information and Communication Technology (ICT), the country has not taken advantage of the technology to improve food security by effectively managing her water resources. A survey on…

  6. U.S. Military Technology Dependence: The Hidden Vulnerability to National Security

    Science.gov (United States)

    2016-06-10

    vulnerabilities.14 The introduction of technology into a complex system can create more problems than it solves . Vulnerability is defined in three environments...vulnerabilities at the strategic level, while solving technology challenges at the tactical level. The dependency on technology that is being...combination of military and private R&D allows flexibility and broadens the field of experts, which in turn facilitates creativity in design and problem

  7. Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead

    Science.gov (United States)

    2017-03-28

    footprint is matched by its increasing importance in shaping the evolving global security architecture , and exploring this dynamic relationship will allow...participants from 12 countries of the Asia-Pacific region, namely: Australia, Canada, India, Japan , Malaysia, Mongolia, the People’s Republic of China...as well as to create network architectures that are intelligent and regenerative. Increasing public-private partnerships will provide significant

  8. Research on Security Technology of Web Service%Web Services安全技术研究

    Institute of Scientific and Technical Information of China (English)

    朱创录

    2012-01-01

    Web Service的安全性在当前的应用中起到基础作用.在分析了Web Service安全现状的基础上,根据Web Service的主要安全需求,提出了安全的SOAP消息方法,主要采用文档对象的加密方法并且定义了数据加密的过程,给出了基于元素方式的数据加密的一个安全机制,可有效的保证SOAP消息的安全传输.%The security of Web Service is important. This article analyzes the current situation of its security and brings up a safe SOAP information method according to the main security needs of Web Service. That takes the measures of encrypting the document object and defines the data encryption. It can effectively guarantee that the SOAP information will be passed safely.

  9. The use of information technology security assessment criteria to protect specialized computer systems

    Energy Technology Data Exchange (ETDEWEB)

    Lykov, V.A.; Shein, A.V. [Atominform of Russia (Russian Federation); Piskarev, A.S. [Atomzashchitinform of Russia (Russian Federation); Devaney, D.M.; Melton, R.B. [Pacific Northwest National Lab., Richland, WA (United States); Hunteman, W.J.; Prommel, J.M. [Los Alamos National Lab., NM (United States); Rothfuss, J.S. [Lawrence Livermore National Lab., CA (United States)

    1997-10-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry.

  10. Ad Hoc Network Security Technology%Ad hoc网络安全技术简介

    Institute of Scientific and Technical Information of China (English)

    李俊; 李鑫; 黄红伟

    2011-01-01

    Ad hoc network is a kind of mobile network without fixed infrastructure;all nodes are composed of mobile host.As the mobility of the node leads to network topology changing quickly and node communication is based on wireless links,Ad hoc network is facing greater challenges more than cane network about security.In this paper,according to Ad hoe network security issues,we analysis common attacks in the Ad hoe network,focused on secure routing,key management and other key issues.%Ad hoc网络是一种没有有线基础设施支持的移动网络,网络中的节点均由移动主机构成。由于节点的移动性导致网络拓扑结构不断变化,节点通信完全依靠无线链路,相对于有线网络在安全性上面临更大的挑战。本文根据Ad hoc网络面临的安全问题,分析了Ad hoc网络中常见的攻击方式,并集中讨论了Ad hoc网络的安全路由、密钥管理等关键问题。

  11. [The impact of technological change on census taking: some thoughts on implications for the 1990 round of censuses and on the statistical use of administrative records].

    Science.gov (United States)

    Brackstone, G J

    1984-01-01

    The author presents some general thoughts on the implications of technological change for the 1990 round of censuses and for the statistical use of administrative records. Consideration is also given to alternative methods of obtaining the type of data traditionally collected in a population census, by using these new technologies in association with administrative record systems.

  12. Evaluation of the feasibility of security technologies in teleradiology as biometric fingerprint scanners for data exchange over a satellite WAN

    Science.gov (United States)

    Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter

    2000-05-01

    We evaluated the feasibility of fingerprint-scanners in combination with smart cards for personal identification and transmission of encrypted TCP/IP-data-packages via satellite between the university-hospital of Innsbruck and the rural hospital of Reutte. The aim of our study was the proof of the userfriendliness of the SkymedTM technology for security purpose in teleradiology. We examined the time of the personal identification process, the time for the necessary training and the personal satisfaction. The images were sent from the local PACS in Reutte via a Data-Encryption-and-Transmission- Box via satellite from Reutte to Innsbruck. We used an asymmetric bandwidth of 512 kbit/s from Reutte to Innsbruck and 128 kbit/s in the opposite direction. Window NT 4.0- operating PCs were used for the electronical patient record, the medical inquiry of the referring physician and the final report of the radiologist. The images were reported on an UNIX-PACS viewing station. After identification through fingerprint-scanners in combination with the smart card the radiologist was able to open the electronic patient record (EPR) from Reutte and sign with his digital signature his confirmed final report before it was send back to Reutte. The used security technology enables encrypted communication over a WAN, which fulfill data-protection.

  13. COmmunications and Networking with QUantum Operationally-Secure Technology for Maritime Deployment (CONQUEST)

    Science.gov (United States)

    2017-03-06

    in nitrogen-vacancy diamond, high-dimensional quantum key distribution, and photonic integrated circuits for quantum communication and computation ...Raytheon BBN Technologies; Dr. Saikat Guha Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: COmmunications and...Contract Data Requirements List In accordance with the reference requirement of the subject contract, Raytheon BBN Technologies (BBN) hereby submits

  14. Assessing the Economic and National Security Benefits from Publicly Funded Technology Investments: An IDA Round Table.

    Science.gov (United States)

    1995-09-01

    Narin, Francis; Olivastro, Dominic and Stevens, Kimberly A. " Bibliometrics / Theory , Practice, and Problems," Evaluation Review, vol. 18, no. 1...Partnerships (MEP) Program 46 Advanced Technology Program (ATP) 49 Technology Impact Measurement Issues 53 Session Three: Metrics For Multiple Policy...providing orderly information on the likely impact of proposed investments, based upon historical observation and experience. Metrics are also an

  15. Survey of information security

    Institute of Scientific and Technical Information of China (English)

    SHEN ChangXiang; ZHANG HuangGuo; FENG DengGuo; CAO ZhenFu; HUANG JiWu

    2007-01-01

    The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of jnformation security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.

  16. 网络安全管理技术在企业网中的应用%Network security management technology in the application of enterprise network

    Institute of Scientific and Technical Information of China (English)

    陈张荣

    2016-01-01

    While the rapid development of network technology brings convenient, the information communication has also increased the threat of network security. So the attention to network security and management becomes the important content of enterprise management. The paper summarized the common network security threats, and proposed the effective network security maintenance technology.%网络技术的迅猛发展在带来信息交流沟通便利的同时,也加剧了网络安全的威胁。因此做好对网络安全的关注与管理成为企业管理的重要内容。文章就常见的网络安全威胁因素进行了总结,并提出了有效的网络安全维护技术。

  17. Administrative Reform

    DEFF Research Database (Denmark)

    Plum, Maja

    Through the example of a Danish reform of educational plans in early childhood education, the paper critically addresses administrative educational reforms promoting accountability, visibility and documentation. Drawing on Foucaultian perspectives, the relation between knowledge and governing...... of administrative technology, tracing how the humanistic values of education embed and are embedded within ‘the professional nursery teacher' as an object and subject of administrative practice. Rather than undermining the humanistic potential of education, it is argued that the technology of accounting...

  18. 49 CFR 1542.205 - Security of the security identification display area (SIDA).

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the security identification display... (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA)....

  19. An Investigation of the Administrator's Role as Instructional Leader in Effective Computer Technology Integration

    Science.gov (United States)

    Thomas, Shailendra Nelle

    2010-01-01

    Purpose, scope, and method of study: Although computer technology has been a part of the educational community for many years, it is still not used at its optimal capacity (Gosmire & Grady, 2007b; Trotter, 2007). While teachers were identified early as playing important roles in the success of technology implementation, principals were often…

  20. Utilizing Technology to Improve the Administration of Instructional Physical Activity Programs in Higher Education

    Science.gov (United States)

    Melton, Bridget; Burdette, Trey

    2011-01-01

    The purpose of this article is to provide examples of how technology is being used in one university to increase the organization and effectiveness of instructional physical activity programs (IPAPs). The article outlines ways in which technology can organize materials for students, instructors, and programs. Additionally, the article describes…

  1. 云数据安全存储技术分析%Analysis on Cloud Data Storage Technology Related to Security

    Institute of Scientific and Technical Information of China (English)

    朱斌

    2015-01-01

    文章对云数据存储模式进行分析,对云数据安全存储存在的问题进行研究,对云数据安全存储技术进行了探讨。%The paper analyzed cloud data storage mode,cloud data storage problems of security research,security of cloud data storage technologies were discussed.

  2. Automotive Security Functions; The Use of New Technologies to Tackle Vehicle-Related Crime

    NARCIS (Netherlands)

    Knapik, Peter

    2016-01-01

    Daily life is increasingly penetrated by new technologies. Advanced driver assistance systems with sophisticated sensors are increasingly available in all classes of vehicles. Moreover, mobile devices, such as smartphones, have become our daily companions. With the help of wireless communication

  3. Secure Biometric Multi-Logon System Based on Current Authentication Technologies

    Science.gov (United States)

    Tait, Bobby L.

    The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.

  4. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  5. Sustaining World Food Security with Improved Cassava Processing Technology: The Nigeria Experience

    Directory of Open Access Journals (Sweden)

    Peter O. Kolawole

    2010-11-01

    Full Text Available Cassava is a very important food crop that is capable of providing food security. However, a lot of problems prevent the development and use of modern equipment for its production. Most of the cassava produced still comes from peasant farmers who depend on manual tools for their field operations and these farmers have made Nigeria the world’s largest producer of the crop. An increase in production of cassava to sustain the world food security needs improved machinery to allow its continuous cultivation and processing. Reasons for the low success recorded in the mechanization of cassava harvesting and processing were traced, and the attempts that have been made in the recent past by various engineers in Nigeria researching towards achieving mechanized harvesting and processing of cassava are well explained. The machinery required for cassava production in Africa, the development of new machines, and the need for more research and development in harvesting and processing machineries, which can reduce poverty worldwide and make food available and accessible for all, are also discussed. Research efforts made and the challenges facing the engineers, farmers, scientists and food processors towards achieving mechanical harvesting and processing of cassava are presented. Breeding a cassava variety with a regular shape for easy mechanization is one solution that could help the engineers worldwide.

  6. 基于防火墙的网络安全技术的研究%Research on Technology of Network Security Based on Firewall

    Institute of Scientific and Technical Information of China (English)

    吴国强

    2014-01-01

    Aiming at attack the current network security problems, this paper researches on network security based on firewall technology and solves the problems of network security. At first, the paper analyzes the network security technology, the specific description of the network security, the threat of the network, the network attack and protection measures; secondly, through the two aspects of the function of firewall and firewall technology is specific analyzed;At last, the specific examples of network security are analyzed. This paper has certain positive significance for network maintenance and network engineer.%针对当前网络安全受到越来越多攻击的问题,在防火墙技术的基础上进行研究网络安全,给出解决网络安全的方法。首先分析了网络安全技术,具体描述了网络安全、网络受到的威胁、网络攻击和防护措施;其次从防火墙的功能和技术两个方面来具体分析防火墙;最后给出了网络安全的具体实例分析。对于网络维护人员和网络工程师都具有一定的积极意义。

  7. Rehabilitation Services Administration

    Science.gov (United States)

    ... of Veterans Affairs, Equal Employment Opportunity Commission, National Council on Disability, Office of Personnel Management, and the Social Security Administration. This resource guide identifies relevant federal and federally ...

  8. Invasive Technologies: How Administrators, Teachers, and Students Negotiate the Use of Students’ Mobile Technologies in the Classroom

    OpenAIRE

    2016-01-01

    The rise in popularity of mobile technologies, particularly with respect to youth, has created new challenges and opportunities for districts, schools, and classrooms. As more students come to own these devices they have increasingly sought to use them in their schools and classrooms, with or without their schools’ official support. Districts and schools have responded to this encroachment in a variety of ways ranging from establishing policies that dictate common practices across all classro...

  9. Secure transfer of surveillance data over Internet using Virtual Private Network technology. Field trial between STUK and IAEA

    Energy Technology Data Exchange (ETDEWEB)

    Smartt, H.; Martinez, R.; Caskey, S. [Sandia National Laboratories (United States); Honkamaa, T.; Ilander, T.; Poellaenen, R. [Radiation and Nuclear Safety Authority, Helsinki (Finland); Jeremica, N.; Ford, G. [Nokia (Finland)

    2000-01-01

    One of the primary concerns of employing remote monitoring technologies for IAEA safeguards applications is the high cost of data transmission. Transmitting data over the Internet has been shown often to be less expensive than other data transmission methods. However, data security of the Internet is often considered to be at a low level. Virtual Private Networks has emerged as a solution to this problem. A field demonstration was implemented to evaluate the use of Virtual Private Networks (via the Internet) as a means for data transmission. Evaluation points included security, reliability and cost. The existing Finnish Remote Environmental Monitoring System, located at the STUK facility in Helsinki, Finland, served as the field demonstration system. Sandia National Laboratories (SNL) established a Virtual Private Network between STUK (Radiation and Nuclear Safety Authority) Headquarters in Helsinki, Finland, and IAEA Headquarters in Vienna, Austria. Data from the existing STUK Remote Monitoring System was viewed at the IAEA via this network. The Virtual Private Network link was established in a proper manner, which guarantees the data security. Encryption was verified using a network sniffer. No problems were? encountered during the test. In the test system, fixed costs were higher than in the previous system, which utilized telephone lines. On the other hand transmission and operating costs are very low. Therefore, with low data amounts, the test system is not cost-effective, but if the data amount is tens of Megabytes per day the use of Virtual Private Networks and Internet will be economically justifiable. A cost-benefit analysis should be performed for each site due to significant variables. (orig.)

  10. Perceptions of pharmacy students, faculty members, and administrators on the use of technology in the classroom

    National Research Council Canada - National Science Library

    DiVall, Margarita V; Hayney, Mary S; Marsh, Wallace; Neville, Michael W; O'Barr, Stephen; Sheets, Erin D; Calhoun, Larry D

    2013-01-01

    .... Third-year pharmacy students and faculty members at 6 colleges and schools of pharmacy were surveyed to assess their perceptions about the type, frequency, and appropriateness of using technology in the classroom...

  11. Emerging Technologies in Global Communication: Using Appreciative Inquiry to Improve the Preparation of School Administrators

    Science.gov (United States)

    Calabrese, Raymond L.; Roberts, B. E.; McLeod, Scott; Niles, Rae; Christopherson, Kelly; Singh, Paviter; Berry, Miles

    2008-01-01

    Purpose: The purpose of this paper is to describe how practitioners from Canada, the UK, Singapore, and the USA, university educational administration faculty from the USA, and the editor of a premier international journal of educational management engaged in a collaborative process to discover how to improve the preparation and practice of…

  12. Operations research, engineering, and cyber security trends in applied mathematics and technology

    CERN Document Server

    Rassias, Themistocles

    2017-01-01

    Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists,...

  13. Security of distributed processing of medical image data using JINI technology.

    Science.gov (United States)

    Ruminski, Jacek

    2007-01-01

    Health Care Organizations (HCOs) are highly computerized using broadband networks for data communication within and outside of their departments. However their computer resources are usually task oriented, and not effectively used. Already introduced and new standards for e-Health (e.g. DICOM, TC251-standards) offer workflow management models to organize different resources towards a one, complex task. Distributed processing can be used to implement such models. Similarly, computational resources can be used for any complicated problem-solving task inside a HCO department, between HCO departments and between HCOs. In this article the security analysis of Jini-based computational grids and cost of safeguards introduction is presented. The Jini-based GRID was analyzed in two medical parametric imaging tasks: active, dynamic infrared imaging and dynamic susceptibility contrast imaging (DSC-MRI).

  14. Students' Ontological Security and Agency in Science Education—An Example from Reasoning about the Use of Gene Technology

    Science.gov (United States)

    Lindahl, Mats Gunnar; Linder, Cedric

    2013-09-01

    This paper reports on a study of how students' reasoning about socioscientific issues is framed by three dynamics: societal structures, agency and how trust and security issues are handled. Examples from gene technology were used as the forum for interviews with 13 Swedish high-school students (year 11, age 17-18). A grid based on modalities from the societal structures described by Giddens was used to structure the analysis. The results illustrate how the participating students used both modalities for 'Legitimation' and 'Domination' to justify positions that accept or reject new technology. The analysis also showed how norms and knowledge can be used to justify opposing positions in relation to building trust in science and technology, or in democratic decisions expected to favour personal norms. Here, students accepted or rejected the authority of experts based on perceptions of the knowledge base that the authority was seen to be anchored in. Difficulty in discerning between material risks (reduced safety) and immaterial risks (loss of norms) was also found. These outcomes are used to draw attention to the educational challenges associated with students' using knowledge claims (Domination) to support norms (Legitimation) and how this is related to the development of a sense of agency in terms of sharing norms with experts or with laymen.

  15. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  16. Secure metropolitan network and the management of branches in the technological infrastructure:Case study GADM Babahoyo City

    Directory of Open Access Journals (Sweden)

    Joffre Vicente León Acurio

    2016-12-01

    Full Text Available This study aims to identify the nonexistent network to the general system of data communication that currently has the GADM (Autonomous Government Decentralized Municipal of Babahoyo located in the province of Los Rios in order to develop a logical design of a metropolitan network that can support new technologies and protocols ensuring the information conveyed between branches of GADM of Babahoyo, besides providing the institution of a compatible platform with the requirements of the e-Government (eGovernment. This research allowed to collect information through instruments such as interviews, meetings and literature review also visits took place at the premises of GADM Babahoyo, reviewing aspects of securities in telecommunications under the ISO / IEC 27002: 2013 citing reference the control objective Management network security. Identification, analysis and design of a proposed network infrastructure is made, allowing communication of the various units that are in distant places. It is concluded that the implementation of a system of networks throughout the municipal entity is considered a solution to the problem and generate many benefits.

  17. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  18. Edible Mushroom Cultivation for Food Security and Rural Development in China: Bio-Innovation, Technological Dissemination and Marketing

    Directory of Open Access Journals (Sweden)

    Yaoqi Zhang

    2014-05-01

    Full Text Available Mushrooms traditionally collected from forests and now more cultivated have recently become the products of the fifth-largest agricultural sector in China. It was estimated that more than 25 million farmers in China are currently engaged in the collection, cultivation processing and marketing of mushrooms. The total value of mushroom products amounted to 149 billion RMB Yuan (24 billion USD in 2011. The raw materials have expanded from a few hardwoods to a variety of woods and increasing more into agricultural residues and wastes. The average annual growth rate has been over 10% over the past 30 years in China. This paper describes the rapid growth of mushroom cultivation and its contribution to food security and rural sustainable development. The roles of bio-innovation, technological dissemination, and marketing are also examined. Mushrooms could potentially be very important in future food supplies and in new dimensions of sustainable agriculture and forestry.

  19. SCINTILLA A European project for the development of scintillation detectors and new technologies for nuclear security

    CERN Document Server

    Alemberti, A; Botta, E; De Vita, R; Fanchini, E; Firpo, G

    2014-01-01

    Europe monitors transits using radiation detectors to prevent illicit trafficking of nuclear materials. The SCINTILLA project aims to develop a toolbox of innovative technologies designed to address different usage cases. This article will review the scope, approach, results of the first benchmark campaign and future plans of the SCINTILLA project.

  20. Tecnologias mas nuevas para la seguridad escolar (Newer Technologies for School Security). ERIC Digest.

    Science.gov (United States)

    Schneider, Tod

    This digest in Spanish describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that…