WorldWideScience

Sample records for understanding environmental security

  1. Understanding computer security

    NARCIS (Netherlands)

    Etalle, Sandro; Zannone, N.

    2014-01-01

    Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the very idea of privacy – a concept closely

  2. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  3. Understanding the Colombian security situation

    Energy Technology Data Exchange (ETDEWEB)

    Ossa, C.

    1997-05-05

    Colombia is notorious for its violence. Lack of security can be related to: irregular war, social decay and a weak state. High poverty levels lead to a lack of respect for the law. Thus, drug dealing and kidnapping have become prominent in Colombian society with little hope of redress. State weakness means that crime remains uncontrolled, and Maxist guerillas have been unopposed by state forces. This has given rise to vigilantism in the form of paramilitaries, who simply add to the lawlessness. So far the international coal industry has been selectively protected by government troops and policies but the general chaos in society is increasingly likely to penetrate even these heavily defended enclaves, as the fundamental problems in Colombian society are as present in the coal areas as in society at large. Presidential elections are in process. The new government will either have to tackle lawlessness throughout the country or the coal industry may have to withdraw as paramilitaries escalate violence in the coal districts. 1 tab.

  4. Understanding sexuality from the security gospel perspective ...

    African Journals Online (AJOL)

    This article examines a new dimension in the Nigerian Pentecostal understanding of sexuality, which is influenced by the security gospel emanating from Mountain of Fire and Miracles Ministries in Nigeria. This new dimension is noted in how Mountain of Fire and Miracles Ministries intricately connects sexuality with destiny.

  5. Understanding sustainable diets: a descriptive analysis of the determinants and processes that influence diets and their impact on health, food security, and environmental sustainability.

    Science.gov (United States)

    Johnston, Jessica L; Fanzo, Jessica C; Cogill, Bruce

    2014-07-01

    The confluence of population, economic development, and environmental pressures resulting from increased globalization and industrialization reveal an increasingly resource-constrained world in which predictions point to the need to do more with less and in a "better" way. The concept of sustainable diets presents an opportunity to successfully advance commitments to sustainable development and the elimination of poverty, food and nutrition insecurity, and poor health outcomes. This study examines the determinants of sustainable diets, offers a descriptive analysis of these areas, and presents a causal model and framework from which to build. The major determinants of sustainable diets fall into 5 categories: 1) agriculture, 2) health, 3) sociocultural, 4) environmental, and 5) socioeconomic. When factors or processes are changed in 1 determinant category, such changes affect other determinant categories and, in turn, the level of "sustainability" of a diet. The complex web of determinants of sustainable diets makes it challenging for policymakers to understand the benefits and considerations for promoting, processing, and consuming such diets. To advance this work, better measurements and indicators must be developed to assess the impact of the various determinants on the sustainability of a diet and the tradeoffs associated with any recommendations aimed at increasing the sustainability of our food system. © 2014 American Society for Nutrition.

  6. Understanding Sustainable Diets: A Descriptive Analysis of the Determinants and Processes That Influence Diets and Their Impact on Health, Food Security, and Environmental Sustainability123

    Science.gov (United States)

    Johnston, Jessica L.; Fanzo, Jessica C.; Cogill, Bruce

    2014-01-01

    The confluence of population, economic development, and environmental pressures resulting from increased globalization and industrialization reveal an increasingly resource-constrained world in which predictions point to the need to do more with less and in a “better” way. The concept of sustainable diets presents an opportunity to successfully advance commitments to sustainable development and the elimination of poverty, food and nutrition insecurity, and poor health outcomes. This study examines the determinants of sustainable diets, offers a descriptive analysis of these areas, and presents a causal model and framework from which to build. The major determinants of sustainable diets fall into 5 categories: 1) agriculture, 2) health, 3) sociocultural, 4) environmental, and 5) socioeconomic. When factors or processes are changed in 1 determinant category, such changes affect other determinant categories and, in turn, the level of “sustainability” of a diet. The complex web of determinants of sustainable diets makes it challenging for policymakers to understand the benefits and considerations for promoting, processing, and consuming such diets. To advance this work, better measurements and indicators must be developed to assess the impact of the various determinants on the sustainability of a diet and the tradeoffs associated with any recommendations aimed at increasing the sustainability of our food system. PMID:25022991

  7. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  8. Nevada National Security Site Environmental Report 2011

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  9. Nevada National Security Site Environmental Report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  10. Environmental ethics: An African understanding

    African Journals Online (AJOL)

    user

    environmental ethical theories, that is, normative environmental ethics, sentientist ethics, ... environmental ethics is challenging those life-threatening concerns, critical explorations of ..... such negligence, every business organization must be.

  11. Environmental security and gas exports

    International Nuclear Information System (INIS)

    Bankes, N.

    1996-01-01

    It is argued that Canadian regulatory commissions have systematically rebuffed efforts by environmental groups to review their concerns regarding the cumulative environmental effects of oil and gas exploration and development in western Canada. The concerns include the opening-up of wilderness areas through access roads construction, exploratory drilling, environmental degradation caused by pipeline construction and gas processing plants, and the cumulative effects on air, and water quality, loss of habitat, etc. The author is of the opinion that the decisions have been based on policy considerations and not on law, and in making the decisions the courts ignored policy questions raised by the environmental groups in favor of those advanced by gas interests. Specifically, the author provided a critique of the decision of the Alberta Court of Appeal in the matter of Rocky Mountain Ecosystem Coalition (RMEC) vs. Alberta Energy and Utilities Board (AEUB). He also proposed an appropriate forum and method for considering the issues involved, and a mechanism to ensure that the cumulative effects of ongoing gas exploration do not undermine ecosystem health

  12. Understanding the security situation in Colombia

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, C.O. [Colombia Central Bank (Colombia)

    1997-11-01

    The following aspects influencing Colombia are considered: the causes of security problems, including social, political and criminal violence; the political and economic crises produced by financing of the presidential campaign; coal`s social, economic and cultural environment in Guajira and Cesar; a description of the security situation in the carboniferous region focusing on guerrilla, crime and paramilitary threats; and three possible scenarios in the region`s security future. The government`s strategy of assuring restricted security to carboniferous and petroleum plants has proven expensive for the state and country. A competitive regional economy would bring social and economic benefits in the medium and long terms. 1 tab.

  13. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. Understanding Sustainable Diets: A Descriptive Analysis of the Determinants and Processes That Influence Diets and Their Impact on Health, Food Security, and Environmental Sustainability 1 2 3

    OpenAIRE

    Johnston, Jessica L.; Fanzo, Jessica C.; Cogill, Bruce

    2014-01-01

    The confluence of population, economic development, and environmental pressures resulting from increased globalization and industrialization reveal an increasingly resource-constrained world in which predictions point to the need to do more with less and in a “better” way. The concept of sustainable diets presents an opportunity to successfully advance commitments to sustainable development and the elimination of poverty, food and nutrition insecurity, and poor health outcomes. This study exa...

  15. Understanding Southern Influence in Cyberspace Security and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... it a matter of national security - is perhaps the most important force shaping global communications today. ... The project will provide evidence of the benefits of openness in cyberspace that can inform international ... Training materials.

  16. Nevada National Security Site Environmental Report 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills (editor), Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple

  17. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  18. Understanding and applying cryptography and data security

    CERN Document Server

    Elbirt, Adam J

    2009-01-01

    Introduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Substitution Ciphers Basic Cryptanalysis Shift Ciphers Affine Ciphers Homework ProblemsSymmetric-Key Cryptography: Stream Ciphers Random Numbers The One-Time Pad Key Stream GeneratorsReal-World ApplicationsHomework ProblemsSymmetric-Key Cryptography: Block Ciphers The Data Encryption StandardThe Advance

  19. Understanding Application Behaviours for Android Security: A Systematic Characterization

    OpenAIRE

    Cai, Haipeng; Ryder, Barbara

    2016-01-01

    In contrast to most existing research on Android focusing on specific security issues, there is little broad understanding of Android application run-time characteristics and their security implications. To mitigate this gap, we present the first dynamic characterization study of Android applications that targets such a broad understanding for Android security. Through lightweight method-level profiling, we have collected 33GB traces of method calls and inter-component communication (ICC) fro...

  20. Environmental security in North-West Russia

    International Nuclear Information System (INIS)

    Bjerke, S.

    1999-01-01

    The arms race and military security during the Cold War cost trillions of dollars. It has been claimed that the processes of disarmament, and the large-scale conversion from military to civilian production that is now under way, will be equally costly. This includes the cost of environmental clean up and other measures to deal with the environmental legacy of the Cold War. Norway strongly supports a holistic approach to environmental issues. The armed forces and military industry must also adapt to environmental demands and adopt the principles of modern environmental management. Our own defence forces have for some time been basing their choice of equipment partly on modern environmental criteria and are taking steps to remedy previous environmental damage. Field training and exercises are subject to stringent environmental restrictions. All along the former East-West divide the scope of military activity has been dramatically reduced. The time has come to focus more attention on military or arms-related environmental issues

  1. Ecological and Economic Problems of Environmental Security

    Directory of Open Access Journals (Sweden)

    Mashchenko Maryna A.

    2018-03-01

    Full Text Available The article is aimed at defining a common mechanism for assessing the ecological and economic threats and ecological losses on the basis of a long-term study to ensure the environmental security of the State. The necessity of a new approach to the State regulation through achievement of environmental security is displayed, that will allow to reduce tensions of the ecological-economic problems in Ukraine. For implementation of this approach, a general mechanism for estimation of ecological-economic threats and ecological losses is provided, which is carried out through formation of an integral costs system. The costs system is presented in the article in the form of an in-depth mechanism for estimating the ecological-economic threats on the example of ecological impacts. Structuring and preparation of the costs system for applied researches is the next stage of this prolonged research.

  2. Environmental and security challenges of nuclear plants

    International Nuclear Information System (INIS)

    Omar, A.S.

    2014-01-01

    The world population increase, the acceleration of global requirement for development and the need to expand energy production, have led to the depletion of natural resources. The international efforts are increasing to get clean, safe and economical energy sources . The electricity generated from nuclear energy considers less polluting and high economic competitiveness as well as reliability and efficiency. The nuclear power plants projects face significant challenges, especially after two major accidents, in Chernobyl 1986 and Fukushima 2011 including the fears of radiation effects, nuclear waste management and nuclear proliferation issues, as well as the lack of public acceptance. So those bodies interested in operating nuclear power plants work to increase nuclear safety standards, review the nuclear facilities safety, know the strict application of laws, seek to prove the economic competitiveness, maintain environmental security, assist in the nonproliferation regime and gain public acceptance. This article discusses the most important environmental and security challenges of nuclear power plants. It highlights the importance of the peaceful uses of nuclear energy as a source of sustainable development and environmental security. It also offers a number of recommendations to support the Arab countries trend towards the inclusion of nuclear energy option within their national programs to generate electricity. (author)

  3. Nevada National Security Site Environmental Report 2010

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  4. Nevada National Security Site Environmental Report 2011 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  5. Nevada National Security Site Environmental Report 2011 Summary

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  6. Environmental security: The problems of Northwestern Russia

    International Nuclear Information System (INIS)

    Yablokov, A.V.

    1999-01-01

    The review of main existing environmental problems of North-West Russia covers the radioactive pollution, atmospheric pollution, destroying of the tundra and forest ecosystems, inland and water pollution, consequences of space activities. This region includes: Karelia and Komi republics; Yamalo-Nenetzk autonomous region; Murmansk; Leningrad and Vologda regions; White Sea; Southern and eastern parts of Barents Sea; eastern part of Kara Sea; and eastern part of the Baltic (Finnish Bay). The environmental situation in northwestern Russia is extremely unsafe. The fundamental reason for this situation is Soviet over-militarization in the past. There is an urgent need now to tackle the international environmental security in the Arctic and Scandinavian regions at least in two fields: 1. The existing radioactive pollution (mostly connected with military activities), and even more dangerous - the potential radioactive pollution of the Arctic and Scandinavia. 2. Atmospheric pollution (long distance transportation of pollutant, mostly sulphur dioxide and heavy metals, from melting factories on Kola Peninsula). Several other problems relating to the environmental security of the region (among them deforestation, oil/gas pollution of the ocean, development of the diamond industry) need international attention in the nearest future. It is unrealistic to think that Russia alone can overcome these long-standing problems in the foreseeable future: we need international support for this. But foreign money for solving our environmental problems is not the solution, firstly, because for environmental restoration and recovery Russia needs much more than the international community can allocate; secondly, because there is much money inside Russia (every month, during 1993-1996, up to two billions US dollars were flowing out from Russia to western banks). To utilize this money in a proper way, we drastically need international help to awaken the Russian public environmental awareness

  7. Understanding leadership in the environmental sciences

    OpenAIRE

    Evans, L.; Hicks, C.; Cohen, P.; Case, P.; Prideaux, M.; Mills, D.

    2015-01-01

    Leadership is often assumed, intuitively, to be an important driver of sustainable development. To understand how leadership is conceptualised and analysed in the environmental sciences and to discover what this research says about leadership outcomes, we conducted a review of environmental leadership research over the last ten years. We find that much of the environmental leadership literature we reviewed focuses on a few key individuals and desirable leadership competencies. It also reports...

  8. Nevada National Security Site Environmental Report Summary 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and

  9. Arctic Energy Resources: Security and Environmental Implications

    Directory of Open Access Journals (Sweden)

    Peter Johnston

    2012-08-01

    Full Text Available n recent years, there has been considerable interest in the Arctic as a source for resources, as a potential zone for commercial shipping, and as a region that might experience conflict due to its strategic importance. With regards to energy resources, some studies suggest that the region contains upwards of 13 percent of global undiscovered oil, 30 percent of undiscovered gas, and multiples more of gas hydrates. The decreasing amount and duration of Arctic ice cover suggests that extraction of these resources will be increasingly commercially viable. Arctic and non-arctic states wish to benefit from the region's resources and the potential circum-polar navigation possibilities. This has led to concerns about the environmental risks of these operations as well as the fear that competition between states for resources might result in conflict. Unresolved offshore boundaries between the Arctic states exacerbate these fears. Yet, the risk of conflict seems overstated considering the bilateral and multilateral steps undertaken by the Arctic states to resolve contentious issues. This article will examine the potential impact of Arctic energy resources on global security as well as the regional environment and examine the actions of concerned states to promote their interests in the region.

  10. Understanding leadership in the environmental sciences

    Directory of Open Access Journals (Sweden)

    Louisa S. Evans

    2015-03-01

    Full Text Available Leadership is often assumed, intuitively, to be an important driver of sustainable development. To understand how leadership is conceptualized and analyzed in the environmental sciences and to discover what this research says about leadership outcomes, we conducted a review of environmental leadership research over the last 10 years. We found that much of the environmental leadership literature focuses on a few key individuals and desirable leadership competencies. The literature also reports that leadership is one of the most important of a number of factors contributing to effective environmental governance. Only a subset of the literature highlights interacting sources of leadership, disaggregates leadership outcomes, or evaluates leadership processes in detail. We argue that the literature on environmental leadership is highly normative. Leadership is typically depicted as an unequivocal good, and its importance is often asserted rather than tested. We trace how leadership studies in the management sciences are evolving and argue that, taking into account the state of the art in environmental leadership research, more critical approaches to leadership research in environmental science can be developed.

  11. Theoretical Aspects of Analysis of International Environmental Security

    Directory of Open Access Journals (Sweden)

    Juliya A. Rusakova

    2015-01-01

    Full Text Available Abstract: International environmental security is a very hot contemporary issue of world politics, which in a large part defines the future of our environment. Dealing with this issue is of outmost importance since its failure will render all other issues and challenges as negligible. The article examines the theoretical aspects of solving the problem of environmental security. In particular, it analyzes the problem of negative social externalities, and the related concept of "tragedy of the commons." These problems create a fundamental obstacle to the implementation of environmental security at the global level. Traditionally, the problem of externalities in the environmental field have been approached economically, states and their manufacturers were to pay for the externalities in the form of additional taxes. However, experience shows that the economic tools of dealing with environmental security are not effective. The author suggests alternative non-economic approaches: strengthening and developing the system of permanent institutions of international negotiations on environmental security and promotion of environmental awareness. Solving the acute environmental problems is impossible without a change of the political philosophy of the ruling elites in most states.

  12. Women's Environmental Literacy As Social Capital In Environmental Management For Environmental Security of Urban Area

    Science.gov (United States)

    Asteria, Donna; Herdiansyah, Herdis; Wayan Agus Apriana, I.

    2016-02-01

    This study is about experience of women's role in environmental management to raise environmental security and form of women's emancipation movement. Environmental concerns conducted by residents of urban women who become environmental activists based on environmental literacy. Because of that, women's experience in interacting with both physic and social environment have differences in managing the environment including managing household waste by applying the principles of the 3Rs (reduce, reuse, recycle) and their persuasive efforts on their communities. This is the key to achieving sustainable development by anticipating environmental problem and preserving the environment. This study is conducted qualitative research method and its type is descriptive-explanative. The result of this study is environmental literacy of women activist on pro-environment action in their community that has achieved spiritual environmental literacy. Environmental literacy may differ due to internal and external condition of each individual. Pro-environment activities conducted as a form of responsibility of environmental concern such as eco-management, educational, and economic action, by persuading residents to proactively and consistently continue to do environmental management and develop a sense of community in shaping the networks of environmental concern in local context for global effect.

  13. Environmental mineralogy - Understanding element behavior in ecosystems

    International Nuclear Information System (INIS)

    Brown Jr, G.E.; Calas, G.

    2011-01-01

    Environmental Mineralogy has developed over the past decade in response to the recognition that minerals are linked in many important ways with the global ecosystem. Minerals are the main repositories of the chemical elements in Earth's crust and thus are the main sources of elements needed for the development of civilization, contaminant and pollutant elements that impact global and local ecosystems, and elements that are essential plant nutrients. These elements are released from minerals through natural processes, such as chemical weathering, and anthropogenic activities, such as mining and energy production, agriculture and industrial activities, and careless waste disposal. Minerals also play key roles in the biogeochemical cycling of the elements, sequestering elements and releasing them as the primary minerals in crustal rocks undergo various structural and compositional transformations in response to physical, chemical, and biological processes that produce secondary minerals and soils. These processes have resulted in the release of toxic elements such as arsenic in groundwater aquifers, which is having a major impact on the health of millions of people in South and Southeast Asia. The interfaces between mineral surfaces and aqueous solutions are the locations of most chemical reactions that control the composition of the natural environment, including the composition of natural waters. The nuclear fuel cycle, from uranium mining to the disposition of high-level nuclear waste, is also intimately related to minerals. A fundamental understanding of these processes requires molecular-scale information about minerals, their bulk structures and properties such as solubility, their surfaces, and their interactions with aqueous solutions, atmospheric and soil gases, natural organic matter, and biological organisms. Gaining this understanding is further complicated by the presence of natural, incidental, and manufactured nano-particles in the environment, which

  14. Environmentally-induced displacement and human security

    OpenAIRE

    Terminski, Bogumil

    2012-01-01

    We can distinguish two general causes of internal displacement worldwide: 1. the impact of threats to and ensuing decline in the level of human security below that needed for normal existence in the homeland territory, 2. administrative compulsion to leave the current place of residence. Every year, at least tens of millions of people on all continents are forced to leave their places of residence. The predominant cause is the occurrence of natural disasters, creating the most dynamic categor...

  15. Understanding the development of international environmental agreements

    DEFF Research Database (Denmark)

    Stærdahl, Jens

    There are many different theoretical schools concerned with how international regimes develop, and each supplies its own interpretation focusing on one or a few aspects of the process. Such ‘one shot’ explanations may be fruitful for scientific debate, but less useful as conceptual frameworks...... for practitioners and planners manoeuvring in a complex world. On the basis of a review of selected theories of international and environmental regulation, this article initiates the development of a conceptual framework for understanding the development of internationalenvironmental agreements. The point...... of departure for developing the model is the actor-structure debate within social science and theory of international relations. Based on critical realism, a framework is developed specifying the relation between collective action problem situations and negotiation situations. It is argued that the main...

  16. Understanding the security management practices of humanitarian organizations.

    Science.gov (United States)

    Bollettino, Vincenzo

    2008-06-01

    Humanitarian organisations operate in increasingly hostile environments. Although authoritative statistics are scarce, anecdotal evidence suggests that aid workers face life-threatening risks that are exacerbated by the growing number of humanitarian organisations operating in the field, the diversity of their mandates, the lack of common professional security standards, and limited success in inter-agency security coordination. Despite broad acceptance of the need for better security management and coordination, many humanitarian organisations remain ambivalent about devoting increased resources to security management and security coordination. A critical lack of basic empirical knowledge of the field security environment hampers efforts to enhance security management practices. The absence of a systematic means of sharing incident data undermines the capacity of the humanitarian community to address proactively security threats. In discussions about humanitarian staff safety and security, the least common denominator remains cumulative anecdotal evidence provided by the many security personnel working for humanitarian organisations in the feld.

  17. INDUSTRIAL WASTE MANAGEMENT TO IMPROVE ENVIRONMENTAL SECURITY

    Directory of Open Access Journals (Sweden)

    V. A. Perfilov

    2016-01-01

    Full Text Available Aim. Disposal of industrial waste to improve the environmental safety by means of recycling and reusing in the manufacture of building materials.Materials and methods. We made a selection of new optimum compositions of fiber-concretes using industrial carbon black from heat generating productions, glass fibers, plasticizers, activated mixing water produced using an ultrasonic unit.Results. New fiber-reinforced concrete compositions were developed using carbon black as an additive. As a result of the processing of the experimental data, it has been revealed that introduction of carbon black as an additive contributed to the increase of the strength characteristics of nearly all fiber-reinforced concrete compositions. It has been found that microparticles of carbon black accumulate the products of hydration of portlandcement-hydrosilicate calcium on the surface and contribute to the formation of a solid microarming concrete structure.Conclusions. The use of industrial carbon black in fibrous concrete mixture using restructured water improves its rheological properties, reduces its segregation and improves the homogeneity of the concrete. Recycling and re-using carbon black in the production of building materials will improve the environmental ecology.

  18. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  19. The effects of environmental resource and security on aggressive behavior.

    Science.gov (United States)

    Ng, Henry Kin Shing; Chow, Tak Sang

    2017-05-01

    Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  20. Understanding human factors in cyber security as a dynamic system

    NARCIS (Netherlands)

    Young, H.J.; Vliet, A.J. van; Ven, J.G.S. van de; Jol, S.C.; Broekman, C.C.M.T.

    2018-01-01

    The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing

  1. The Political Economy of Carbon Securities and Environmental Policy

    DEFF Research Database (Denmark)

    Polborn, Sarah

    The costs of the current suboptimal carbon abatement policy are likely in the range of 3 to 6 trillion 2005 US dollars. Using methods from the political economy of environmental policy, the paper develops a new carbon abatement policy instrument, carbon securities. A carbon security entitles its...... owner to a ?xed proportion of ex ante unknown total emissions. This creates an additional group of stakeholders on the side of the issue that has traditionally been underrepresented. The advantages over existing systems include an equilibrium carbon price closer to the social optimum, a more predictable...

  2. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2006-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  3. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2007-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  4. The cloud understanding the security, privacy and trust challenges

    CERN Document Server

    Robinson, Neil; Cave, Jonathan; Starkey, Tony; Graux, Hans

    2011-01-01

    This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.

  5. Understanding the Perils of our Power Grid Security

    OpenAIRE

    Unton, Chris

    2016-01-01

    Our nation depends on electric power to support daily conveniences as well as critical functions like street lights, hospitals, and 911 phone calls. As the equipment to operate the bulk electric system becomes increasingly computerized and connected, we face an increasing risk of Cyber Security breach disabling or damaging the grid. Regulators have devised Critical Infrastructure Protection standards to enforce a minimum level of Cyber Security protection at utilities and other companies resp...

  6. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  7. A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices

    OpenAIRE

    Beyene, Yordanos

    2014-01-01

    In this dissertation, we attempt to understand and predict the performance of security devices. More specifically, we examine the following types of questions: (a) Given a security device, and a traffic load, can we predict the performance of the device? (b) Given a traffic load and a security device, how can we tune the performance of the device to achieve the desired trade-off between security and performance? We consider both stateful firewalls and Network Intrusion Prevention systems (NIP...

  8. Towards understanding the known-key security of block ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2014-01-01

    ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indifferentiability to capture the security of such block ciphers under a known key. To show its...... meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indifferentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher...... with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indifferentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks....

  9. Understanding food security issues in remote Western Australian Indigenous communities.

    Science.gov (United States)

    Pollard, Christina M; Nyaradi, Anett; Lester, Matthew; Sauer, Kay

    2014-08-01

    Food insecurity in remote Western Australian (WA) Indigenous communities. This study explored remote community store managers' views on issues related to improving food security in order to inform health policy. A census of all remote WA Indigenous community store managers was conducted in 2010. Telephone interviews sought managers' perceptions of community food insecurity, problems with their store, and potential policy options for improving the supply, accessibility, affordability and consumption of nutritious foods. Descriptive analyses were conducted using SPSS for Windows version 17.0. Managers stated that freight costs and irregular deliveries contributed to high prices and a limited range of foods. Poor store infrastructure, compromised cold chain logistics, and commonly occurring power outages affected food quality. Half of the managers said there was hunger in their community because people did not have enough money to buy food. The role of nutritionists beyond a clinical and educational role was not understood. Food security interventions in remote communities need to take into consideration issues such as freight costs, transport and low demand for nutritious foods. Store managers provide important local knowledge regarding the development and implementation of food security interventions. SO WHAT? Agencies acting to address the issue of food insecurity in remote WA Indigenous communities should heed the advice of community store managers that high food prices, poor quality and limited availability are mainly due to transport inefficiencies and freight costs. Improving healthy food affordability in communities where high unemployment and low household income abound is fundamental to improving food security, yet presents a significant challenge.

  10. Diagnosing water security in the rural North with an environmental security framework.

    Science.gov (United States)

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. How 21st century droughts affect food and environmental security

    Science.gov (United States)

    Kogan, Felix

    The first 13th years of the 21st century has begun with a series of widespread, long and intensive droughts around the world. Extreme and severe-to-extreme intensity droughts covered 2-6% and 7-16% of the world land, respectively, affecting environment, economies and humans. These droughts reduced agricultural production, leading to food shortages, human health deterioration, poverty, regional disturbances, population migration and death. This presentation is a travelogue of the 21st century global and regional droughts during the warmest years of the past 100 years. These droughts were identified and monitored with the NOAA operational space technology, called Vegetation Health (VH), which has the longest period of observation and provide good data quality. The VH method was used for assessment of vegetation condition or health, including drought early detection and monitoring. The VH method is based on operational satellites data estimating both land surface greenness (NDVI) and thermal conditions. The 21st century droughts in the USA, Russia, Australia Argentina, Brazil, China, India and other principal grain producing countries were intensive, long, covered large areas and caused huge losses in agricultural production, which affected food and environmental security and led to food riots in some countries. This presentation investigate how droughts affect food and environmental security, if they can be detected earlier, how to monitor their area, intensity, duration and impacts and also their dynamics during the climate warming era with satellite-based vegetation health technology.

  12. Understanding of the Cyber Security and the Development of CAPTCHA

    Science.gov (United States)

    Yang, Yu

    2018-04-01

    CAPTCHA is the abbreviation of "Completely Automated Public Turing Test to Tell Computers and Humans Apart", which is a program algorithm for distinguishing between computers and humans. It is able to generate and evaluate tests that are easy for human to pass yet are not possible for computers to. Common CAPTCHA generally contains symbols, text, pictures, and even videos, which is mainly used for human-computer verification. With the popularization of the Internet and its related applications, many malicious attacks against websites, systems and servers gradually appear. Therefore, the research on CAPTCHA is especially important. This article will briefly summarize and introduce the existing CAPTCHA technology, and summarizes the common problems of network attacks and information security. After listing the common type of CAPTCHA, it will finally propose feasible suggestions for the development of CAPTCHA.

  13. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods

    Science.gov (United States)

    Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman

    2017-01-01

    Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones. PMID:28297719

  14. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.

    Directory of Open Access Journals (Sweden)

    Mansour Alsaleh

    Full Text Available Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users' security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals' awareness of the consequences of security threats. By comparing participants' behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users' security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.

  15. Understanding International Environmental Security: A Strategic Military Perspective

    Science.gov (United States)

    2000-11-01

    Angeles, Mexico City, or Santiago , Chile , or the water concerns in such places as Tucson, Phoenix, and numerous other towns in the southwestern U.S. These...issue. There is complete certainty that, over the short term of atmospheric measurement available, the concentration of CO2 in the air is increasing and...in Figure 3-8. First, we need to recognize that there is a natural or good concentration of CO2 in air that is essential for photosynthetic reactions

  16. The basics of information security understanding the fundamentals of InfoSec in theory and practice

    CERN Document Server

    Andress, Jason

    2014-01-01

    As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these princi

  17. PCI compliance understand and implement effective PCI data security standard compliance

    CERN Document Server

    Williams, Branden R

    2012-01-01

    The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of

  18. Nevada National Security Site Environmental Report 2012 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy A

    2013-09-11

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  19. Nevada National Security Site Environmental Report 2016, Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2016 (prepared by National Security Technologies, LLC [NSTec], 2017). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological settings and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  20. Nevada National Security Site Environmental Report 2013 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  1. Environmental Identity: A New Approach to Understanding Students' Participation in Environmental Learning Programs

    Science.gov (United States)

    Jaksha, Amanda P.

    2013-01-01

    The goal of this study is to develop an understanding of how participants express their environmental identities during an environmental learning program. Past research on the outcomes of environmental learning programs has focused primarily on changes in knowledge and attitudes. However, even if knowledge or attitudes can be accurately measured,…

  2. Environmental support, energy security and economic growth in Japan

    International Nuclear Information System (INIS)

    Gasparatos, Alexandros; Gadda, Tatiana

    2009-01-01

    This study investigates the resource consumption of Japanese society since 1979 and its subsequent effects on the economic output of the nation and the environment. In order to quantify resource appropriation and trends in production and consumption, the concept of emergy synthesis is employed. Our results show a significant increase in the total amount of emergy consumed by 66.9% between 1979 and 2003 which comes hand in hand with an increase in the level of environmental stress by 93.7% (quantified as the environmental loading ratio). On the other hand the emergy required to produce 1 USD of economic output has been gradually decreasing which denotes an increase in the efficiency of the conversion of natural capital into economic output. What is most interesting though is the growing dependence of the Japanese economy on imported emergy, increasingly from developing nations, that severely affects the potential for unhindered economic growth. This can prove to be a big barrier that could affect the resource security of the Japanese economy and render it susceptible to risks associated with access to natural resources which in turn can jeopardise its long-term economic sustainability.

  3. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  4. Security of the electricity supply. The area of conflict between profitability and environmental compatibility

    International Nuclear Information System (INIS)

    Praktiknjo, Aaron

    2013-01-01

    The scope of the book is on the one hand support for the power industry defining investment and sales strategies that intend optimum supply security in the view of the customer and on the other hand the information for energy and environmental politicians demonstrating the conflict of objectives. The following issues are covered: technical and organizational aspects of electricity supply, theoretical background of the security of electricity supply, security of supply for economic sections, security of electricity supply for private households: theoretical microeconomic approach, security of electricity supply for private households: method of defined preferences, security of electricity supply in the context of climate protection and nuclear phase-out.

  5. Nevada National Security Site Environmental Report 2011 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed.

    2012-09-12

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  6. Nevada National Security Site Environmental Report 2011 Attachment A: Site Description

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  7. Environmental degradation, population displacement and global security: An overview of the issues

    International Nuclear Information System (INIS)

    1992-12-01

    An initial investigation is presented on the interrelationship between environmental degradation and population displacements, in the broader context of how this linkage affects human security. Emphasis is placed on both the causes and effects of population movements, with specific examples drawn from Southeast Asia. Types of migrants, the importance of environmental degradation with respect to other contributing factors, and the effects on origin and destination regions are considered. A key issue is the multi-causality of population displacements and the importance of improving understanding of the issues in order to develop appropriate policies. It is clear from the study that the discussion of environment as a cause or contributing factor to population displacement has, to date, been speculative, and the information provided largely anecdotal. 58 refs., 1 fig., 3 tabs

  8. Science implementation of Forecast Mekong for food and environmental security

    Science.gov (United States)

    Turnipseed, D. Phil

    2012-01-01

    Forecast Mekong is a significant international thrust under the Delta Research and Global Observation Network (DRAGON) of the U.S. Geological Survey (USGS) and was launched in 2009 by the U.S. Department of State and the Foreign Ministers of Cambodia, Laos, Thailand, and Vietnam under U.S. Department of State Secretary Hillary R. Clinton's Lower Mekong Initiative to enhance U.S. engagement with countries of the Lower Mekong River Basin in the areas of environment, health, education, and infrastructure. Since 2009, the USGS has worked closely with the U.S. Department of State; personnel from Cambodia, Laos, Thailand, and Vietnam; nongovernmental organizations; and academia to collect and use research and data from the Lower Mekong River Basin to provide hands-on results that will help decisionmakers in future planning and design for restoration, conservation, and management efforts in the Lower Mekong River Basin. In 2012 Forecast Mekong is highlighting the increasing cooperation between the United States and Lower Mekong River Basin countries in the areas of food and environmental security. Under the DRAGON, Forecast Mekong continues work in interactive data integration, modeling, and visualization system by initiating three-dimensional bathymetry and river flow data along with a pilot study of fish distribution, population, and migratory patterns in the Lower Mekong River Basin. When fully developed by the USGS, in partnership with local governments and universities throughout the Mekong River region, Forecast Mekong will provide valuable planning tools to visualize the consequences of climate change and river management.

  9. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    Science.gov (United States)

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  10. Learning from “Shadow Security”: Why understanding non-compliance provides the basis for effective security

    OpenAIRE

    Kirlappos, I.; Parkin, S.; Sasse, M. A.

    2014-01-01

    Over the past decade, security researchers and practitioners have tried to understand why employees do not comply with organizational security policies and mechanisms. Past re-search has treated compliance as a binary decision: people comply, or they do not. From our analysis of 118 in-depth interviews with individuals (employees in a large multinational organization) about security non-compliance, a 3rd response emerges: shadow security. This describes the instances where security-conscious ...

  11. An evaluation of the ecological and environmental security on China's terrestrial ecosystems.

    Science.gov (United States)

    Zhang, Hongqi; Xu, Erqi

    2017-04-11

    With rapid economic growth, industrialization, and urbanization, various ecological and environmental problems occur, which threaten and undermine the sustainable development and domestic survival of China. On the national scale, our progress remains in a state of qualitative or semi-quantitative evaluation, lacking a quantitative evaluation and a spatial visualization of ecological and environmental security. This study collected 14 indictors of water, land, air, and biodiversity securities to compile a spatial evaluation of ecological and environmental security in terrestrial ecosystems of China. With area-weighted normalization and scaling transformations, the veto aggregation (focusing on the limit indicator) and balanced aggregation (measuring balanced performance among different indicators) methods were used to aggregate security evaluation indicators. Results showed that water, land, air, and biodiversity securities presented different spatial distributions. A relatively serious ecological and environmental security crisis was found in China, but presented an obviously spatial variation of security evaluation scores. Hotspot areas at the danger level, which are scattered throughout the entirety of the country, were identified. The spatial diversities and causes of ecological and environmental problems in different regions were analyzed. Spatial integration of regional development and proposals for improving the ecological and environmental security were put forward.

  12. Food security and environmental degradation in northern Nigeria: demographic perspectives.

    Science.gov (United States)

    Lockwood, M

    1991-07-01

    The Malthusian controversy about the causes of environmental change and food insecurity in Hausaland in northern Nigeria is examined. The argument is irresolvable based on available data at the macro level. The individual and household level are appropriate for answering the question about how high density populations survive on a savannah. To understand population pressure in Hausaland, it is important to read Malthus very carefully and to understand the existing demographic structure in which economic and kinship relations support high fertility even where land is scarce. Demographic responses vary with economic strata. Policies ignore individual level differences. Since 1953, the densely populated areas of Sokoto, Katsina, Zaria, and Kano have spread in an area that is largely dry with a moderate-to-high risk of desertification. Food insecurity exists not only in times of drought, but also annually in the form of chronic shortages of staples for poor farmers. Average land holdings/capita have become smaller. Population pressure has also contributed to shifts in land use. Food prices have increased. Possible explanations include 1) the drought and the oil boom have a greater impact on environmental change and food insecurity and rural Hausa farmers have responded by raising yields, managing tree resources, and practicing soil conservation and 2) an independent source of income from non-agricultural activities is an essential part of the economy. The relationship among population pressure, land shortage, and food insecurity is complex. It is inaccurate to label Hausa as subsistence farmers, when trading in grain is an important enterprise. The role that commercialization of agriculture plays in food insecurity is discussed. Malthusian disaster is not imminent. The proximate determinants of fertility, birth spacing practices and infertility, should lead to high fertility rates, but in this case they do not. Determinants responsive to economic factors tend to be

  13. Public understanding of environmental impacts of electricity deregulation

    International Nuclear Information System (INIS)

    Johnson, Branden B.; Frank, Pamela G.

    2006-01-01

    Electricity deregulation has aroused concern that environmental quality might be harmed by consumer preferences for cheap, 'dirty' (e.g., coal) electricity products, despite the perhaps stronger influence of supply side policy on environmental impacts. This outcome depends on public understanding of the environmental impacts of their decisions, which this study explored with interviews, focus groups, and surveys in New Jersey. People had thought little about the topic, were unable to articulate how electricity production might affect the environment except in very general terms, and were mostly unwilling to guess whether deregulation's impacts would be negative, neutral or positive. Those who did guess expected negative impacts less than any other kind. Reactions to specific 'reasons' for expecting no, positive or negative impacts suggested that consumers had little structure to their mental models in this area; for example, people who thought positive-impact reasons were probably true were not necessarily likely to see negative-impact reasons as probably false. However, in the aggregate, people seemed to have a fairly consistent ranking of energy sources by expected negative environmental impacts. Earlier research found that consumers comparing two electricity products on environmental impacts reached different decisions if they had energy-source-only or energy-source-plus-emissions information. Although regulator-required 'environmental labels' for electricity products provide both source and emissions data, it is not clear that they do an adequate job of both alerting consumers to the possibility of negative environmental impacts and identifying the relative life-cycle impacts of different products so as to produce informed consumer decisions

  14. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  15. Globalization and environmental challenges. Reconceptualizing security in the 21{sup st} century

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Mexico City (MX). Centro Regional de Investigaciones Multidisciplinarias (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dunay, Pal [Geneva Centre for Security Policy (Switzerland); Chadha Behera, Navnita [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Kameri-Mbote, Patricia [Nairobi Univ. (Kenya), Dept. of Private Law; Liotta, P.H. (eds.) [Salve Regina Univ., Newport, RI (United States). Pell Center for International Relations and Public Policy

    2008-07-01

    Put quite simply, the twin impacts of globalization and environmental degradation pose new security dangers and concerns. In this comprehensive new work on global security thinking, 91 authors from five continents and many disciplines, from science and practice, assess the worldwide reassessment of the meaning of security triggered by the end of the Cold War and globalization, as well as the multifarious impacts of global environmental change in the early 21st century. Chapters address the theoretical, philosophical, ethical and religious and spatial context of security. They analyze the relationship between security, peace, development and environment. The authors move on to review the rethinking of security in international law, economics and political science, as well as in the key political, military and economic milieux. The book also examines the environmental security dimension and the adaptation of the institutional security concepts of the UN, EU and NATO, and analyzes the effect of change on regional security. Finally, it posits alternative security futures and draws conclusions for future research and action. (orig.)

  16. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  17. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  18. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  19. Understanding Mechanism of Photocatalytic Microbial Decontamination of Environmental Wastewater

    Directory of Open Access Journals (Sweden)

    Chhabilal Regmi

    2018-02-01

    Full Text Available Several photocatalytic nanoparticles are synthesized and studied for potential application for the degradation of organic and biological wastes. Although these materials degrade organic compounds by advance oxidation process, the exact mechanisms of microbial decontamination remains partially known. Understanding the real mechanisms of these materials for microbial cell death and growth inhibition helps to fabricate more efficient semiconductor photocatalyst for large-scale decontamination of environmental wastewater or industries and hospitals/biomedical labs generating highly pathogenic bacteria and toxic molecules containing liquid waste by designing a reactor. Recent studies on microbial decontamination by photocatalytic nanoparticles and their possible mechanisms of action is highlighted with examples in this mini review.

  20. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  1. Laser Applications to Chemical, Security, and Environmental Analysis: introduction to the feature issue

    International Nuclear Information System (INIS)

    Dreizler, Andreas; Fried, Alan; Gord, James R.

    2007-01-01

    This Applied Optics feature issue on Laser Applications to Chemical, Security,and Environmental Analysis (LACSEA) highlights papers presented at theLACSEA 2006 Tenth Topical Meeting sponsored by the Optical Society ofAmerica

  2. Laser applications to chemical, security, and environmental analysis: introduction to the feature issue.

    Science.gov (United States)

    Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna

    2017-04-10

    This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.

  3. 76 FR 5209 - Notice of Availability of the Environmental Assessment for New Low Security Beds

    Science.gov (United States)

    2011-01-28

    ...-security male criminal aliens. In accordance with the National Environmental Policy Act (NEPA) of 1969, the... initiative (known as the Criminal Alien Requirement), the BOP has identified a specific requirement to confine a population of approximately 1,000 low-security adult male inmates that are primarily criminal...

  4. Understanding the Value of a Computer Emergency Response Capability for Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Gasper, Peter Donald [Idaho National Laboratory; Rodriguez, Julio Gallardo [Idaho National Laboratory

    2015-06-01

    The international nuclear community has a great understanding of the physical security needs relating to the prevention, detection, and response of malicious acts associated with nuclear facilities and radioactive material. International Atomic Energy Agency (IAEA) Nuclear Security Recommendations (INFCIRC_225_Rev 5) outlines specific guidelines and recommendations for implementing and maintaining an organization’s nuclear security posture. An important element for inclusion into supporting revision 5 is the establishment of a “Cyber Emergency Response Team (CERT)” focused on the international communities cybersecurity needs to maintain a comprehensive nuclear security posture. Cybersecurity and the importance of nuclear cybersecurity require that there be a specific focus on developing an International Nuclear CERT (NS-CERT). States establishing contingency plans should have an understanding of the cyber threat landscape and the potential impacts to systems in place to protect and mitigate malicious activities. This paper will outline the necessary components, discuss the relationships needed within the international community, and outline a process by which the NS-CERT identifies, collects, processes, and reports critical information in order to establish situational awareness (SA) and support decision-making

  5. ENVIRONMENTAL SECURITY IN THE REGION IN THE SERVICE OF SUSTAINABLE DEVELOPMENT OF LOCAL SPATIAL

    Directory of Open Access Journals (Sweden)

    Ljiljana Stošić Mihajlović

    2016-04-01

    Full Text Available A fundamental prerequisite for the existence, growth and development of each social community is environmental safety. In modern conditions of environmental degradation as a global process, it is bound to increase social stratification, ethnic and even religious conflict, conflict and intolerance that threatens the safety of society. It is a notorious fact that the world of Simply is no longer in a position to deal with new shocks. The financial crisis has reduced global economic resilience, while geopolitical tensions and increased social concerns point to the fact that the state and society less able than ever to cope with global challenges, among which is the primary problem of environmental security. In modern countries, political, security and other interests of the citizens' day-to-day modeling, transform, get the content, in accordance with the general civilization changes. In this connection, sustainable local spatial development is crucial conditioned ecological without security region and aims to achieve a balance between current consumption of natural resources and the ability of the system to maintain the level at which future generations will be able to use them. The work represents a contribution to the achievement of environmental security as a new, modern forms of security, and originated from the need to once again draw attention to the evident environmental degradation as an integral part of human security. Ecological security of the region protects the basic components of the environment and determinants of the local spatial development. In fact, safety in the field of protection and preservation of the environment is one of the most important factors Security Council shall contemporary world. In doing so, it is important to emphasize, however, that environmental security has no borders and is a global problem, a task and an obligation.

  6. Nevada National Security Site Environmental Report 2010, Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    Introduction to the Nevada National Security Site Environmental Report 2010. Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  7. Understanding environmental pollution: a primer. 2nd ed.

    Energy Technology Data Exchange (ETDEWEB)

    Marquita K. Hill [University of Maine, Orono, MN (United States)

    2004-08-15

    The book moves from the definition of pollution and how pollutants behave, to air and water pollution basics, pollution and global change, solid waste, and pollution in the home. It also discusses persistent and bioaccumulative chemicals, and pesticides, and it places greater stress on global pollutants. The relationship between energy generation and use, and pollution is stressed, as well as the importance of going beyond pollution control, to pollution prevention. Impacts on human and environmental health are emphasized throughout. Contents are: 1. Understanding pollution; 2. Reducing pollution; 3. Chemical toxicity; 4. Chemical exposures and risk assessment; 5. Ambient air pollution; 6. Acid deposition; 7. Global climate change; 8. Stratispheric ozone depletion; 9. Water pollution; 10. Drinking water; 11. Solid waste; 12. Hazardous waste; 13. Energy; 14. Persistent, bioaccumulative and toxic; 15. Metals; 16. Pesticides; 17. Pollution at home; and 18. Zero waste, zero emissions. 69 figs., 42 tabs.

  8. Actinides and environmental interfaces: striving for molecular-level understanding

    International Nuclear Information System (INIS)

    Heino Nitsche

    2005-01-01

    Actinides can undergo a variety of complex chemical reactions in the environment. In addition to the formation of solid precipitates, colloids and dissolved solution species common to aqueous systems, actinide ions can interact with the surrounding geo and biomedia to change oxidation states or sorb on surfaces and colloids. The rate of migration is determined by aqueous solubility, and interactions with solid surfaces such as minerals, soils, natural organic matter, and soil microorganisms Sorption of aqueous actinide species on biological and geological matrices can be quantitatively described by a surface complexation or site-binding model. The disadvantage of this model is the difficulty in the experimental determination of the model parameters and surface reaction constants. Usually, a set of surface reactions and species are proposed based on knowledge of the solution speciation of the solute, and the reaction constants are usually derived by fitting computer-calculated absorption curves to experimental data. Because this process typically involves a large number of potentially adjustable parameters, it is likely to lead to non-unique parameter fitting and does not always result in a consistent set of parameters for the same systems. A fundamental molecular-level understanding of sorption processes of actinides on environmental surfaces is required to better understand and predict their transport behavior in nature. Several different surface spectroscopic techniques have been applied to the characterization of the adsorbed species and surface reactions and a direct determination of the sorbed species and surface reactions has become possible. The non-linear optical techniques of second harmonic and sum frequency generation (SHG and SFG) are ideally suited to study surfaces and interfaces of mineral oxides, biosurfactants and biopolymers, organic adlayers adsorbed on solid/mineral surfaces and soil organic matter, including humic and fulvic acids. Resonant

  9. THE ENVIRONMENTAL CHALLENGE AND HEALTH SECURITY IN CHINA

    Directory of Open Access Journals (Sweden)

    Wang Wuyi

    2010-01-01

    Full Text Available China has achieved impressive rapid development over the past 30 years. But China also faces the challenge of environmental change resulting from rapid economic growth and the attendant risks to human health. In this paper we described the environmental change and health risk in China from evident fluctuation of China’s climate, major changes in natural hydrological condition, raw materials and energy demand, changes of disease epidemic pattern related to climate change and ecosystem damage, new health risk raised by rapid urbanization and rural environmental quality degradation. The suggestion and countermeasures were discussed.

  10. An African Understanding of Environmental Ethics | Ojomo | Thought ...

    African Journals Online (AJOL)

    Global concerns about the current environmental crisis have culminated in some controversial environmental ethical theories, among which are normative environmental ethics, sentientist ethics, biocentric ethics, ecocentric ethics and eco-feminist ethics. One of the underlying features connecting these environmental ...

  11. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  12. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  13. PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance

    CERN Document Server

    Chuvakin, Anton

    2010-01-01

    Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant?. Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the curre

  14. Environmental security as related to scale mismatches of disturbance patterns in a panarchy of social-ecological landscapes

    Science.gov (United States)

    Giovanni Zurlini; Irene Petrosillo; Nicola Zaccarelli; Kurt Riitters

    2008-01-01

    Environmental security, as the opposite of environmental fragility (vulnerability), is multilayered, multi-scale and complex, existing in both the objective realm of biophysics and society, and the subjective realm of individual human perception. For ecological risk assessments (ERAs), the relevant objects of environmental security are social-ecological landscapes (...

  15. Making US Soil Taxonomy more scientifically applicable to environmental and food security issues.

    Science.gov (United States)

    Monger, Curtis; Lindbo, David L.; Wysocki, Doug; Schoeneberger, Phil; Libohova, Zamir

    2017-04-01

    US Department of Agriculture began mapping soils in the 1890s on a county-by-county basis until most of the conterminous United States was mapped by the late 1930s. This first-generation mapping was followed by a second-generation that re-mapped the US beginning in the 1940s. Soil classification during these periods evolved into the current system of Soil Taxonomy which is based on (1) soil features as natural phenomena and on (2) soil properties important for agriculture and other land uses. While this system has enabled communication among soil surveyors, the scientific applicability of Soil Taxonomy to address environmental and food security issues has been under-utilized. In particular, little effort has been exerted to understand how soil taxa interact and function together as larger units—as soil systems. Thus, much soil-geomorphic understanding that could be applied to process-based modeling remains unexploited. The challenge for soil taxonomists in the United States and elsewhere is to expand their expertise and work with modelers to explore how soil taxa are linked to each other, how they influence water, nutrient, and pollutant flow through the landscape, how they interact with ecology, and how they change with human land use.

  16. Global environmental change: local perceptions, understandings, and explanations

    Directory of Open Access Journals (Sweden)

    Aili Pyhälä

    2016-09-01

    Full Text Available Global environmental change (GEC is an increasingly discussed phenomenon in the scientific literature as evidence of its presence and impacts continues to grow. Yet, while the documentation of GEC is becoming more readily available, local perceptions of GEC - particularly in small-scale societies - and preferences about how to deal with it, are still largely overlooked. Local knowledge and perceptions of GEC are important in that agents make decisions (including on natural resource management based on individual perceptions. We carried out a systematic literature review that aims to provide an exhaustive state-of-the-art of the degree to and manner in which the study of local perceptions of change are being addressed in GEC research. We reviewed 126 articles found in peer-reviewed journals (between 1998 and 2014 that address local perceptions of GEC. We used three particular lenses of analysis that are known to influence local perceptions, namely (i cognition, (ii culture and knowledge, and (iii possibilities for adaptation.We present our findings on the geographical distribution of the current research, the most common changes reported, perceived drivers and impacts of change, and local explanations and evaluations of change and impacts. Overall, we found the studies to be geographically biased, lacking methodological reporting, mostly theory based with little primary data, and lacking of indepth analysis of the psychological and ontological influences in perception and implications for adaptation. We provide recommendations for future GEC research and propose the development of a "meta-language" around adaptation, perception, and mediation to encourage a greater appreciation and understanding of the diversity around these phenomena across multiple scales, and improved codesign and facilitation of locally relevant adaptation and mitigation strategies.

  17. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  18. Impacts of multiple global environmental changes on African crop yield and water use efficiency: Implications to food and water security

    Science.gov (United States)

    Pan, S.; Yang, J.; Zhang, J.; Xu, R.; Dangal, S. R. S.; Zhang, B.; Tian, H.

    2016-12-01

    Africa is one of the most vulnerable regions in the world to climate change and climate variability. Much concern has been raised about the impacts of climate and other environmental factors on water resource and food security through the climate-water-food nexus. Understanding the responses of crop yield and water use efficiency to environmental changes is particularly important because Africa is well known for widespread poverty, slow economic growth and agricultural systems particularly sensitive to frequent and persistent droughts. However, the lack of integrated understanding has limited our ability to quantify and predict the potential of Africa's agricultural sustainability and freshwater supply, and to better manage the system for meeting an increasing food demand in a way that is socially and environmentally or ecologically sustainable. By using the Dynamic Land Ecosystem Model (DLEM-AG2) driven by spatially-explicit information on land use, climate and other environmental changes, we have assessed the spatial and temporal patterns of crop yield, evapotranspiration (ET) and water use efficiency across entire Africa in the past 35 years (1980-2015) and the rest of the 21st century (2016-2099). Our preliminary results indicate that African crop yield in the past three decades shows an increasing trend primarily due to cropland expansion (about 50%), elevated atmospheric CO2 concentration, and nitrogen deposition. However, crop yield shows substantially spatial and temporal variation due to inter-annual and inter-decadal climate variability and spatial heterogeneity of environmental drivers. Climate extremes especially droughts and heat wave have largely reduced crop yield in the most vulnerable regions. Our results indicate that N fertilizer could be a major driver to improve food security in Africa. Future climate warming could reduce crop yield and shift cropland distribution. Our study further suggests that improving water use efficiency through land

  19. Biomass cogeneration: industry response for energy security and environmental consideration

    International Nuclear Information System (INIS)

    Bacareza-Pacudan, L.; Lacrosse, L.; Pennington, M.; Dale Gonzales, A.

    1999-01-01

    Biomass occurs in abundance in the highly agricultural-based countries of South-East Asia. If these are processed in the wood and agro-processing industries, large volumes of residues are generated. The residue are potential sources of energy which the industries can tap through the use of cogeneration systems, in order to meet their own thermal and electrical requirements. This will reduce the industry's dependence on power from the grid and thus increase their own self-sufficiency in terms of energy. Biomass cogeneration brings the environmental, as well as economic benefits to the industries. It makes use of clean and energy-efficient technologies and utilises biomass as fuels which cause less environment al pollution and the greenhouse effect, as against the use of fossil fuels. A particular mill that embarks on biomass cogeneration is also able to realise, among others, income from the export of excess electricity to the grid. Biomass residue if not used for other purposes have negative values as they need to be disposed of. They can, however, be profit-generating as well. (Author)

  20. Achieving a secure energy future: Environmental and economic issues

    International Nuclear Information System (INIS)

    Pimentel, David; Herdendorf, M.; Eisenfeld, S.

    1994-01-01

    Energy, economics, and the environment are interdependent. Land, water, atmospheric, and biological resources are being degraded by current high energy consumption. U.S. energy consumption is the highest in the world and the U.S. Department of Energy reports that the United States has only about 10 years of known and potentially discoverable oil reserves. The U.S. should reduce its energy consumption by one half to help restore the quality of the environment while improving the American standard of living by strengthening the economy and increasing the number of jobs. Because of the interdependence of energy, economics, and the environment, energy efficiency and transition to renewable energy sources are critical. An estimated 40% of current energy consumption could be produced employing solar energy technologies, but would require about 20% of total U.S. land area. Therefore, the development of solar energy technologies to substitute for fossil energy is projected to compete for land required for agriculture and forestry as well as have other environmental impacts

  1. Global Survey of the Concepts and Understanding of the Interfaces Between Nuclear Safety, Security, and Safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Kovacic, Don N.; Stewart, Scott; Erickson, Alexa R.; Ford, Kerrie D.; Mladineo, Stephen V.

    2015-07-15

    There is increasing global discourse on how the elements of nuclear safety, security, and safeguards can be most effectively implemented in nuclear power programs. While each element is separate and unique, they must nevertheless all be addressed in a country’s laws and implemented via regulations and in facility operations. This topic is of particular interest to countries that are currently developing the infrastructure to support nuclear power programs. These countries want to better understand what is required by these elements and how they can manage the interfaces between them and take advantages of any synergies that may exist. They need practical examples and guidance in this area in order to develop better organizational strategies and technical capacities. This could simplify their legal, regulatory, and management structures and avoid inefficient approaches and costly mistakes that may not be apparent to them at this early stage of development. From the perspective of IAEA International Safeguards, supporting Member States in exploring such interfaces and synergies provides a benefit to them because it acknowledges that domestic safeguards in a country do not exist in a vacuum. Instead, it relies on a strong State System of Accounting and Control that is in turn dependent on a capable and independent regulatory body as well as a competent operator and technical staff. These organizations must account for and control nuclear material, communicate effectively, and manage and transmit complete and correct information to the IAEA in a timely manner. This, while in most cases also being responsible for the safety and security of their facilities. Seeking efficiencies in this process benefits international safeguards and nonproliferation. This paper will present the results of a global survey of current and anticipated approaches and practices by countries and organizations with current or future nuclear power programs on how they are implementing, or

  2. Scenario and multiple criteria decision analysis for energy and environmental security of military and industrial installations.

    Science.gov (United States)

    Karvetski, Christopher W; Lambert, James H; Linkov, Igor

    2011-04-01

    Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.

  3. ROLE OF GRASSROOTS ENVIRONMENTAL LITERACY: The case of water security at Bwaila Secondary School in Malawi

    Science.gov (United States)

    Chasukwa Mwalwenje, Yvonne; Chasukwa, Steria

    2015-04-01

    water. The main challenge is the degradation of water resources which result into siltation that blocks the water sources due to rain while in the dry season the water level in reservoirs goes down. Other challenges include inadequate service coverage, insufficient literacy on climate change, inadequate mitigation measures for water related disasters and inadequate promotion of hygiene and sanitation. Bwaila Secondary School in Malawi is no exception in experiencing inadequate water service coverage amidst opportunities such as availability of relatively abundant water resources, political will, active women and youth. The formal education curriculum in secondary schools has enriched students' knowledge of environmental management in subjects such as Geography, Agriculture and Biology to improve their understanding of natural resource management. However, the primary gap is that students do not use the skills in environmental management acquired from the formal school setting in their day to day life henceforth rendering it to be a mere academic exercise confined within classroom walls. It is against such background that Grassroots Environmental Literacy (GEL), an environmental management social marketing franchise in non-formal education was established to fill in the gap. GEL's mission is to inspire students to become change agents in environmental management in their own lives in both formal and non-formal settings in Malawi. GEL believes that the cultivation of broad-based private and public support is the key to bringing about positive and lasting environmental change hence contributing to water security. The education sector in general and school attendance in particular is largely affected by water security. Furthermore, technological limitations have also affected the accessibility of water resources. UNICEF (2008) asserts that water resources may be scarce as it is capital intensive to sink a bore hole in Malawi. Bwaila secondary school is one of the examples

  4. Cyber security in the workplace: Understanding and \\ud promoting behaviour change

    OpenAIRE

    Blythe, John

    2013-01-01

    Cyber security and the role employees play in securing information are major concerns for businesses. The aim of this research is to explore employee security behaviours and design interventions that can motivate behaviour change. Previous research has focused on exploring factors that influence information security policy compliance; however there are several limitations with this approach. Our work-to-date has explored the behaviours that constitute ‘information security’ and potential infl...

  5. A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  6. Understand the Big Picture So You Can Plan for Network Security

    Science.gov (United States)

    Cervone, Frank

    2005-01-01

    This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…

  7. Renewable biomass energy: Understanding regional scale environmental impacts

    Energy Technology Data Exchange (ETDEWEB)

    Graham, R.L.; Downing, M.

    1993-12-31

    If biomass energy is to become a significant component of the US energy sector, millions of acres of farmland must be converted to energy crops. The environmental implications of this change in land use must be quantitatively evaluated. The land use changes will be largely driven by economic considerations. Farmers will grow energy crops when it is profitable to do so. Thus, models which purport to predict environmental changes induced by energy crop production must take into account those economic features which will influence land use change. In this paper, we present an approach for projecting the probable environmental impacts of growing energy crops at the regional scale. The approach takes into account both economic and environmental factors. We demonstrate the approach by analyzing, at a county-level the probable impact of switchgrass production on erosion, evapotranspiration, nitrate in runoff, and phosphorous fertilizer use in multi-county subregions within the Tennessee Valley Authority (TVA) region. Our results show that the adoption of switchgrass production will have different impacts in each subregion as a result of differences in the initial land use and soil conditions in the subregions. Erosion, evapotranspiration, and nitrate in runoff are projected to decrease in both subregions as switchgrass displaces the current crops. Phosphorous fertilizer applications are likely to increase in one subregion and decrease in the other due to initial differences in the types of conventional crops grown in each subregion. Overall these changes portend an improvement in water quality in the subregions with the increasing adoption of switchgrass.

  8. Using GIS to understand the environmental chemistry of manganese ...

    African Journals Online (AJOL)

    Iron on the other hand is very low in the mine working area and is high on the northern part of the study area. Suggestions are advanced for the Mn interplay in the soils and environment around the Kgwakgwe abandoned Mn oxides ore mine. Journal of Applied Sciences and Environmental Management Vol 9(2) 2005: 37- ...

  9. Renewable biomass energy: Understanding regional scale environmental impacts

    International Nuclear Information System (INIS)

    Graham, R.L.; Downing, M.

    1993-01-01

    If biomass energy is to become a significant component of the US energy sector, millions of acres of farmland must be converted to energy crops. The environmental implications of this change in land use must be quantitatively evaluated. The land use changes will be largely driven by economic considerations. Farmers will grow energy crops when it is profitable to do so. Thus, models which purport to predict environmental changes induced by energy crop production must take into account those economic features which will influence land use change. In this paper, we present an approach for projecting the probable environmental impacts of growing energy crops at the regional scale. The approach takes into account both economic and environmental factors. We demonstrate the approach by analyzing, at a county-level, the probable impact of switchgrass production on erosion, evapotranspiration, nitrate in runoff, and phosphorous fertilizer use in two multi-county subregions within the Tennessee Valley Authority (TVA) region. Our results show that the adoption of switchgrass production will have different impacts in each subregion as a result of differences in the initial land use and soil conditions in the subregions. Erosion, evapotranspiration, and nitrate in runoff are projected to decrease in both subregions as switchgrass displaces the current crops. Phosphorous fertilizer applications are likely to increase in one subregion and decrease in the other due to initial differences in the types of conventional crops grown in each subregion. Overall these changes portend an improvement in water quality in the subregions with the increasing adoption of switchgrass

  10. Understanding, Classifying, and Selecting Environmentally Acceptable Hydraulic Fluids

    Science.gov (United States)

    2016-08-01

    traditional mineral oil; therefore, the life cycle costs over time may be reduced . REPLACEMENT OF EXISTING HYDRAULIC FLUIDS: Hydraulic fluids in existing...properly maintaining the fluid can extend the time interval between fluid changes, thus reducing the overall operating cost of the EA hydraulic fluid. It...Environmentally Acceptable Hydraulic Fluids by Timothy J. Keyser, Robert N. Samuel, and Timothy L. Welp INTRODUCTION: On a daily basis, the United States Army

  11. Visualizing and Understanding Socio-Environmental Dynamics in Baltimore

    Science.gov (United States)

    Zaitchik, B. F.; Omeara, K.; Guikema, S.; Scott, A.; Bessho, A.; Logan, T. M.

    2015-12-01

    The City of Baltimore, like any city, is the sum of its component neighborhoods, institutions, businesses, cultures, and, ultimately, its people. It is also an organism in its own right, with distinct geography, history, infrastructure, and environments that shape its residents even as it is shaped by them. Sometimes these interactions are obvious but often they are not; while basic economic patterns are widely documented, the distribution of socio-spatial and environmental connections often hides below the surface, as does the potential that those connections hold. Here we present results of a collaborative initiative on the geography, design, and policy of socio-environmental dynamics of Baltimore. Geospatial data derived from satellite imagery, demographic databases, social media feeds, infrastructure plans, and in situ environmental networks, among other sources, are applied to generate an interactive portrait of Baltimore City's social, health, and well-being dynamics. The layering of data serves as a platform for visualizing the interconnectedness of the City and as a database for modeling risk interactions, vulnerabilities, and strengths within and between communities. This presentation will provide an overview of project findings and highlight linkages to education and policy.

  12. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  13. Bechtel Hanford, Inc. network security plan for the environmental restoration contract

    International Nuclear Information System (INIS)

    McCaffrey, M.B.

    1997-01-01

    As part of the Computer Protection Program, this Network Security Plan identifies the specific security measures used to protect the Bechtel Hanford, Inc. (BHI) enterprise network. The network consists of the communication infrastructure and information systems used by BHI to perform work related to the Environmental Restoration Contract (ERC) at the Hanford Site. It provides electronic communication between the ERC-leased facilities in Richland, Washington and other facilities located on the Hanford Site. Network gateways to other site and offsite networks provide electronic communication with the rest of the Hanford community. The enterprise network is comprised of several individual networks that operate under different conditions and perform different functions. The principal network used by BHI is the Bechtel Local Area Network (BLAN). This document identifies specific security issues surrounding the BLAN and the measures BHI takes to protect it. The other BHI-operated networks are discussed from the perspective of the security impact they have on the BLAN. This plan addresses security for individual and shared computer systems connected to the BHI networks as well as the gateways between other site and external networks. It specifically does not address computer-based information systems that store or process particularly sensitive data, computer systems connected to other site networks (e.g., Hanford Local Area Network), or standalone computers located in ERC facilities

  14. Information security of children and adolescents in understanding parents and teachers

    Directory of Open Access Journals (Sweden)

    Bovina I.B.

    2015-11-01

    Full Text Available The article presents the first part of the work devoted to the study of ordinary representations of parents and teachers about information security of children and adolescents. It is about addressing the problem of information security of children and adolescents, discuss the effects of observing violence in the mass media on the subsequent behaviour of viewers, refers to directing television roles on the example of transfer schemes by S. Milgram in the context of television game (experiment J. L. Beauvois with colleagues. This paper examines the impact on users has the Internet, discusses the main directions of action in relation to ensuring information security of children and adolescents, focusing on psychological aspects of the concept of information security of children, demonstrates the importance of studying "naive theories" that govern the actions aimed at ensuring information security of children. The authors explain the prospect of studying problems of information security of children in the framework of the theory of social representations.

  15. Nuclear Security Summit and Workshop 2015: Preventing, Understanding and Recovering from Nuclear Accidents lessons learned from Chernobyl and Fukushima

    Science.gov (United States)

    2016-09-01

    Workshop 2015 "Preventing, Understanding and Recovering from Nuclear Accidents"--lessons learned from Chernobyl and Fukushima Distribution Statement...by the factor to get the U.S. customary unit. “Preventing, Understanding and Recovering from Nuclear Accidents” – lessons learned from Chernobyl ...and Fukushima NUCLEAR SECURITY SUMMIT & WORKSHOP 2015 2 Background The 1986 Chernobyl and the 2011 Fukushima accidents provoked world-wide concern

  16. Maternal Mental State Language and Preschool Children's Attachment Security: Relation to Children's Mental State Language and Expressions of Emotional Understanding

    Science.gov (United States)

    Mcquaid, Nancy; Bigelow, Ann E.; McLaughlin, Jessica; MacLean, Kim

    2008-01-01

    Mothers' mental state language in conversation with their preschool children, and children's preschool attachment security were examined for their effects on children's mental state language and expressions of emotional understanding in their conversation. Children discussed an emotionally salient event with their mothers and then relayed the…

  17. Characterizing, Classifying, and Understanding Information Security Laws and Regulations: Considerations for Policymakers and Organizations Protecting Sensitive Information Assets

    Science.gov (United States)

    Thaw, David Bernard

    2011-01-01

    Current scholarly understanding of information security regulation in the United States is limited. Several competing mechanisms exist, many of which are untested in the courts and before state regulators, and new mechanisms are being proposed on a regular basis. Perhaps of even greater concern, the pace at which technology and threats change far…

  18. Secure Data Exchange in Environmental Health Monitoring System through Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Amang Sudarsono

    2016-04-01

    Full Text Available Recently, disseminating latest sensory information regarding the status of environmental health in the surroundings of human life is one of very important circumstances which must be known by everyone. These circumstances should be accessible at anytime and anywhere by everyone through any type of end-user devices, both fixed and mobile devices, i.e., Desktop PCs, Laptop PCs, and Smartphones. Wireless Sensor Network (WSN is one of the networks which deals with data sensors distribution from sensor nodes to the gateway node toward a Data Center Server. However, there is a big possibility for many adversaries to intercept and even manipulate data sensors crossing the network. Hence, a secure data sensor exchange in the system would be strongly desirable. In this research, we propose an environmental health conditions monitoring system through WSN and its implementation with considering secure data sensor exchange within the network and secure data sensor access. This work may contribute to support a part of smart cities and take in part the Internet of Thing (IoT technology. In our proposed system, we collect some environmental health information such as temperature, humidity, luminosity, noise, carbon monoxide (CO and carbon dioxide (CO2 from sensor nodes. We keep the confidentiality and integrity of transmitted data sensors propagating through IEEE802.15.4-based communication toward a gateway node. Further, the collected data sensors in the gateway are synchronized to the Data Center Server through a secure TCP/IP connection for permanently storing. At anytime and anywhere, only legitimated users who successfully pass-through an attribute-based authentication system are able to access the data sensors.

  19. THE ENERGY COMPONENT OF THE ENVIRONMENTAL SECURITY: UKRAINE IN THE MIRROR

    Directory of Open Access Journals (Sweden)

    G. Kharlamova

    2015-03-01

    Full Text Available Energy security is important for any state. It is important for the state’s environment and economy. Ukraine is an energy dependent state, as well as an import-energy dependent one. The paper is devoted to the statistical analyses of Ukrainian energy sector from the position of its world representation. The purpose of this research is on the base of statistical analysis of current internal and external trends in the energy sector of Ukraine to consider possible mechanisms to stimulate and accelerate environmental-friendly energy security of Ukraine. Main objectives: to trace the dynamics of world and Ukrainian main energy indicators in the synergy with the state energy security index; to cluster launched efficiency-targeted energy projects in Ukraine in geoindustry aspect. Analyses of dynamics of energetic vs environmental performance of Ukraine in 2000–2014 world ranks shows that being in low segment of world rankings on aspects of energy and environmental security, Ukraine shows positive tendencies to the improvement, however with slow steps. In order to identify the most promising and most attractive sector of the economy in Ukraine to investors we held grouping of current launching energy-efficient projects in the aspect of industries and sectors where energy-efficient technologies operate. The rank analyses depicted that the most popular among economic sectors for energyefficiency investments are enterprises of agriculture and consumer goods industry, and the most attractive regions of Ukraine for implementation of investments in energy efficient technologies are Ivano-Frankivsk, Luhansk and Kherson oblasts.

  20. Environmental Security: What Environmental Issues Impact Regional Stability and Affect United States Foreign Policy with Mexico?

    Science.gov (United States)

    1997-03-01

    extraregional sponsor of Alianza para el Desarrollo Sostenible (Sustainable Development Alliance - ALIDES), along with United States and Canada. ALIDES is...more stable the government the better the country will be able to solve its environmental problems. 42 Glossary ALIDES Alianza para el Desarrollo ... Sostenible (Sustainable Development Alliance) C Centigrade CFCs Chlorofluorocarbons BECC Border Environment Cooperation Commission BNC Binational

  1. SOCIO-ENVIRONMENTAL FOOD SECURITY OBSERVATORY: ANALYSIS OF FOOD PRODUCTION INDICATORS AT THE MUNICIPAL LEVEL IN RIO GRANDE DO SUL

    Directory of Open Access Journals (Sweden)

    Angélica Cristina da Siqueira

    2016-09-01

    Full Text Available Since the 1990, the theme of Human Rights and Food Security (FS has been developed in Brazil, culminating in the construction of the National Policy and Plan of Food Security (PNSAN Observatório Socioambiental em Segurança Alimentar e Nutricional: análise dos indicadores... Redes (St. Cruz Sul, Online, v. 21, nº 2, p. 49 - 62, maio/ago. 2016 50 and PLANSAN 2012/2015. The PLANSAN proposes sixty indicators divided into seven dimensions, which are clearly related to the Millennium Development Goals. In order to operationalize these indicators in the State of Rio Grande do Sul (RS, the Socio-Environmental Food Security Observatory of Rio Grande do Sul (OBSSAN-RS was created in partnership with the State Council for Nutrition and Food Security (CONSEA-RS and the Informatics Department of UFRGS. In this context, the aim of this paper is to present the analysis of indicators of Dimension I (Food Production of the OBSSAN-RS at municipal level, discussing the importance of this tool for monitoring the establishment of the Human Right to Adequate Food (DHAA. The data available to the municipal level were compared with the indicators suggested by PLANSAN. It was observed that although contemplate important information for understanding the context of food production in the municipalities of the state, the proposed indicators have not reached entirely the requirements to monitoring the SAN in this territorial level, so adapting it is necessary to rating the state of SAN in municipalities of the RS.

  2. Final Site-Wide Environmental Impact Statement for the Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2001-01-01

    The National Nuclear Security Administration (NNSA) a separately organized agency within the U.S. Department of Energy (DOE) is responsible for providing the Nation with nuclear weapons and ensuring that those nuclear weapons remain safe, secure, and reliable. As one of the DOE major production facilities, the Y-12 National Security Complex has been DOE's primary site for enriched uranium processing and storage, and one of the manufacturing facilities for maintaining the U.S. nuclear weapons stockpile. In response to the end of the Cold War and changes in the world's political regimes, the emphasis of the U.S. weapons program has shifted dramatically over the past few years from developing and producing new weapons to dismantlement and maintenance of a smaller, enduring stockpile. The ''Stockpile Stewardship and Management Programmatic Environmental Impact Statement'' [SSM PEIS], DOE/EIS-0236, issued in September 1996, evaluated alternatives for maintaining the safety and reliability of the nuclear weapons stockpile without underground nuclear testing or production of new-design weapons. In the SSM PEIS Record of Decision (ROD), DOE decided to maintain the national security missions at the Y-12 National Security Complex, but to downsize Y-12 consistent with reduced requirements. These national security missions include (1) maintaining the capability and capacity to fabricate secondaries, limited life components, and case parts for nuclear response; (2) evaluating components and subsystems returned from the stockpile; (3) storing enriched uranium that is designated for national security purposes; (4) storing depleted uranium and lithium parts; (5) dismantling nuclear weapons secondaries returned from the stockpile; (6) processing uranium and lithium (which includes chemical recovery, purification, and conversion of enriched uranium and lithium to a form suitable for long-term storage and/or further use); and (7) providing support to weapons laboratories. During the

  3. Notification: Audit of the U.S. Environmental Protection Agency’s Compliance with the Federal Information Security Management Act

    Science.gov (United States)

    Project #OA-FY14-0135, February 10, 2014. The Office of Inspector General plans to begin fieldwork for an audit of the U.S. Environmental Protection Agency's compliance with the Federal Information Security Management Act (FISMA).

  4. ENVIRONMENTAL INNOVATIVE BUSINESS SOLUTIONS AS A STRATEGIC FACTOR OF ECONOMIC SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    A. S. Senin

    2016-01-01

    Full Text Available The relevance of this work lies in the fact that it attempts to disclose the key theoretical and practical issues of economic security solutions, taking into account the problems of global transformations taking place in the global economy. As part of the article we have been studied various aspects that characterize global economic, environmental trends that will shape the future of modern civilization. The article also addresses the problem of exit from the raw model of the economy, the formation of economic mechanisms that take into account environmental costs, proposed internalization of environmental externalities.The purpose/goal. The purpose of this article and its main task is to systematize the areas of environmentally oriented development of economic entities, as well as the determination of the list of key provisions of environmental policies, which will ensure the further socio-economic development of Russia in line with the green economy.Methods. In this article, based on content analysis of theoretical and empirical basic conceptual provisions of economic security were formulated in the context of eco-oriented production, the transition to which world civilization is currently implementing. It was concluded that the economic, energy, environmental and social issues of sustainable development of modern civilization is directly linked, so the transition to ecooriented production is possible, firstly, it provided aggressive reduction of production and wasteful use of traditional hydrocarbon resources, and, secondly, on the condition of rational replacement of traditional energy sources with renewable energy.Results. This article outlines the basic solutions that can be used to provide environmentally responsible operation and development of Russian business and corporate structures. Also offered in the basic decisions that are to be included in the national environmental policy as a major incentive for the further transition to a

  5. Understanding the biological and environmental implications of nanomaterials

    Science.gov (United States)

    Lin, Sijie

    quantified by UV-vis spectrophotometry and fitted with the Freundlich isothem. Effects of the adsorption of QDs on the photosynthetic activities of the algae are evaluated using O2 evolution and CO2 depletion assays, and the ecological impact of such adsorption is discussed. To understand the effects of nanomaterials on the cell membrane, nanoparticles (Au, TiO2, and QDs) of different surface charges and chemical compositions are introduced to HT-29 mammalian cells in Chapter 4. The polarization of the cell membrane is investigated using a FLIPR membrane potential kit. The phase of the cell membrane, in the presence of both positively and negatively charged nanoparticles, are examined using laurden, a lipophilic dye that serves as a molecular reporter on the fluidic or gel phase of the host membrane. To address the effects of nanomaterials on biological and ecological systems within the same context, Chapter 5 offers a first parallel comparison between mammalian and plant cell responses to nanomaterials. This study is conducted using a plant cell viability assay, complimented by bright field, fluorescence, and electron microscopy imaging. Discussions of this study are presented based on the hydrophobicity and solubility of C60(OH) 20 and of supramolecular complex C70-NOM, hydrophobicity and porous structure of the plant Allium cepa cell wall, and the amphiphilic structure and endocytosis of the plasma cell membrane of both Allium cepa and HT-29 cells. Chapter 6 summarizes and rationalizes results obtained from the entire dissertation research. Future work inspired by this research is presented at the end of the chapter. Specifically, this dissertation is structured to embody the following essential and complementary chapters: (1) Chapter 1: Literature review (2) Chapter 2: Nano-Eco interactions at the whole organism level; (3) Chapter 3: Nano-Eco interactions at the cellular level; (4) Chapter 4: Nano-Bio interactions at the cellular level; (5) Chapter 5: Parallel comparison

  6. Cybersecurity via Intermediaries : Analyzing Security Measurements to Understand Intermediary Incentives and Inform Public Policy

    NARCIS (Netherlands)

    Asghari, H.

    2016-01-01

    Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure

  7. Addressing China's grand challenge of achieving food security while ensuring environmental sustainability.

    Science.gov (United States)

    Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C; Bailey, Mark; Gordon, Iain J; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin

    2015-02-01

    China's increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies.

  8. Food safety/food security aspects related to the environmental release of pharmaceuticals.

    Science.gov (United States)

    Brambilla, Gianfranco; Testa, Cecilia

    2014-11-01

    The environmental presence of pharmaceuticals in top soil and in water where extensive animal farming occurs may represent an involuntary source of residues in food that might affect both food safety and food security. We modelled the presence of residues in animal matrices from the inventoried environmental concentration of selected drugs in surface waters (range: 0.1-10μgL(-1)) and agriculture soils (range: 1-100μgkg(-1) dry weight), accounting for animal production parameters (i.e., forages, water intake and milk and egg production) and drug pharmacokinetics. The results indicate that the contamination of tetracyclines in top soil may represent a major issue both for the compliance with maximum residue levels in food (100-300ngg(-1)) and for the claim of organic products. via surface water, animals may be vulnerable to the intake of anabolics and growth-promoting agents, such as 17-beta estradiol and clenbuterol, only under a worst-case scenario. Their identification, which is currently achievable at a pgg(-1) level in animal specimens, is considered proof of illegal treatment and can lead to the prosecution of farmers. The Environmental Quality Standards that have been proposed for priority substances in surface waters may also be considered protective in terms of food security/food safety; however, a broad-spectrum characterisation of drugs within the agriculture context could be envisaged to refine the uncertainties in the risk assessment and for combined intakes. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Preschool Children's Understanding of Pro-Environmental Behaviours: Is It Too Hard for Them?

    Science.gov (United States)

    Kos, Marjanca; Jerman, Janez; Anžlovar, Urška; Torkar, Gregor

    2016-01-01

    Early childhood is a period of life in which lifelong attitudes, values and patterns of behaviour regarding nature are shaped. Environmental education is becoming a growing area of interest in early childhood education. The aim of the research study was to identify children's understanding of why and how their pro-environmental behaviours…

  10. Oceans and environmental security: Shared U.S. and Russian perspectives

    International Nuclear Information System (INIS)

    Broadus, J.M.; Vartanov, R.V.

    1994-01-01

    In 1989, the Institute for World Economy and International Relations of the Russian Academy of Sciences and the Marine Policy Center of Woods Hole Oceanographic Institution instituted a joint project to examine environmental security as it applies to the world's oceans. The book is a unified expression of their findings. The book focuses on seven specific concerns, land-based marine pollution, North Pacific fisheries depletion, hazardous materials transport, nuclear contamination, the Arctic Ocean, the Southern Ocean and Antarctica, and the Law of the Sea

  11. Perspective on energy security and other non environmental externalities in electricity generation

    International Nuclear Information System (INIS)

    Bohi, D.R.

    1994-01-01

    Applications of the term externality to non environmental matters are often controversial and ambiguous. This paper argues that these externalities are also rarer or less important than sometimes alleged. The paper examines various potential energy security externalities and concludes that none of them are relevant to decisions regarding electric generation. Externalities may exist with regard to effects on local employment and the local infrastructure, although their importance is location specific and their measurement is highly subjective. In short, the consideration of this subset of externalities may confuse policy makers more than it helps them. (author). 15 refs

  12. African agricultural subsidy impacts food security, poverty, drought tolerance, and environmental quality

    Science.gov (United States)

    Galford, G. L.; Palm, C.; DeFries, R. S.; Nziguheba, G.; Droppelmann, K.; Nkonya, E.; Michelson, H.; Clark, C.; Kathewera, F.; Walsh, M.

    2011-12-01

    Malawi has spearheaded an unprecedented policy change in sub-Saharan Africa (SSA) since 2005 when it started a widespread agricultural inputs subsidy program (AISP) targeting small farmer maize production with mineral fertilizer and improved seeds. Since then, the mean N fertilizer load has increased significantly, from ~ 0 to a modest 35 kg N/ha or 7 times greater than SSA's average 5 kg N/ha average. During the tenure of AISP, Malawi has transitioned from a food aid recipient to an exporter. Maize yields each year of AISP are double the long-term average (0.8 tons/ha/yr, 1960-2005). In 2007, subsidy inputs combined with good rains led to of an unprecedented increase in national average yields of 2.7 tons/ha. National-scale assessments covering, agriculture, poverty, and environment such as this one are required to understand the trade-offs between development, climate and the environment. Environmentally, N2O emissions from fertilizer are a concern. First order estimates put emissions from AISP fertilizers at 2,600 Mg N2O/year (0.81 Tg CO2-e). While globally insignificant, these emissions may be equivalent to 16% of Malawi's annual fossil fuel and deforestation emissions. However, our partial nutrient budgets indicate that crop removal is still higher than N applied and therefore little loss of N to the environment is expected. Mineral fertilizers are a rapid first step to increase soil N after 40 years of serious depletion. Once restored, the soils will support robust agroforestry and other forms of organic inputs produced on-farm. Fertilizer use increases carbon sequestration on agricultural soils and reduces pressure to clear forests, which may partially compensate for the N2O emissions. We find evidence that AISP significantly increases food security and mitigates the impacts of drought on maize production. This is the first work linking the distribution of fertilizer subsidies to local crop yields using government records, remotely-sensed time series of

  13. Understanding Attitudes and Pro-Environmental Behaviors in a Chilean Community

    Directory of Open Access Journals (Sweden)

    Nicolás C. Bronfman

    2015-10-01

    Full Text Available Environmental protection and restoration are some of the major challenges faced by our society. To address this problem, it is fundamental to understand pro-environmental behaviors in the population, as well as the factors that determine them. There are, however, very few studies conducted in Latin America that are focused in understanding the environmental behavior of its citizens. The main goal of this research was to study the environmental behaviors of a Chilean community and identify the factors that determine them. To that end, a diverse set of environmental behaviors (power and water conservation, environmentally-aware consumer behavior, biodiversity protection, rational automobile use and ecological waste management and sociodemographic and attitudinal factors—based on the VBN model—were evaluated. Survey data was obtained from a statistically representative sample (N = 1537 in Santiago, Chile. Our results suggest that several participants displayed tendencies that favor more responsible environmental behaviors, with high environmental concern, and demonstrating their ample awareness of the consequences of failing to protect the environment. Nevertheless, the highest average scores of environmental behavior were related to low cost behaviors and those that imposed the fewest behavioral restrictions. In global terms, we concluded that the youngest subjects in the lowest socioeconomic group obtained the lowest scores across the pro-environmental behavior spectrum.

  14. Trends in Global Agricultural Land Use: Implications for Environmental Health and Food Security.

    Science.gov (United States)

    Ramankutty, Navin; Mehrabi, Zia; Waha, Katharina; Jarvis, Larissa; Kremen, Claire; Herrero, Mario; Rieseberg, Loren H

    2018-04-29

    The eighteenth-century Malthusian prediction of population growth outstripping food production has not yet come to bear. Unprecedented agricultural land expansions since 1700, and technological innovations that began in the 1930s, have enabled more calorie production per capita than was ever available before in history. This remarkable success, however, has come at a great cost. Agriculture is a major cause of global environmental degradation. Malnutrition persists among large sections of the population, and a new epidemic of obesity is on the rise. We review both the successes and failures of the global food system, addressing ongoing debates on pathways to environmental health and food security. To deal with these challenges, a new coordinated research program blending modern breeding with agro-ecological methods is needed. We call on plant biologists to lead this effort and help steer humanity toward a safe operating space for agriculture.

  15. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint.

    Science.gov (United States)

    Chen, Han-Shen

    2017-01-30

    In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015-2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level.

  16. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint

    Directory of Open Access Journals (Sweden)

    Han-Shen Chen

    2017-01-01

    Full Text Available In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015–2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs, meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI, with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level.

  17. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint

    Science.gov (United States)

    Chen, Han-Shen

    2017-01-01

    In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015–2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level. PMID:28146086

  18. Understanding varieties of flexibility and security in multinationals: Product markets, institutional variation and local bargaining

    NARCIS (Netherlands)

    Pulignano, V.; Keune, M.

    2015-01-01

    Most studies of flexicurity have focused on formal institutions within distinctive national labour market systems. However, the level and types of flexibility and security in a national labour market are to an important extent influenced by company-level processes, relationships and policies; thus a

  19. Understanding Information Security Culture in an Organization: An Interpretive Case Study

    Science.gov (United States)

    Bess, Donald Arlo

    2012-01-01

    Information systems are considered to be a critical and strategic part of most organizations today. Because of this it has become increasingly important to ensure that there is an effective information security program in place protecting those information systems. It has been well established by researchers that the success of an information…

  20. Managing nutrient for both food security and environmental sustainability in China: an experiment for the world

    Directory of Open Access Journals (Sweden)

    Fusuo ZHANG, Zhenling CUI, Weifeng ZHANG

    2014-02-01

    Full Text Available The challenges of how to simultaneously ensure global food security, improve nitrogen use efficiency (NUE and protect the environment have received increasing attention. However, the dominant agricultural paradigm still considers high yield and reducing environmental impacts to be in conflict with one another. Here we examine a Three-Step-Strategy of past 20 years to produce more with less in China, showing that tremendous progress has been made to reduce N fertilizer input without sacrificing crop yield. The first step is to use technology for in-season root-zone nutrient management to significantly increase NUE. The second is to use technology for integrated nutrient management to increase both yield and NUE by 15%—20%. The third step is to use technology for integrated soil-crop system management to increase yield and NUE by 30%—50% simultaneously. These advances can thus be considered an effective agricultural paradigm to ensure food security, while increasing NUE and improving environmental quality.

  1. Understanding High Incidence of Severe Obesity and Very Low Food Security in Food Pantry Clients: Implications For Social Work.

    Science.gov (United States)

    Kaiser, Michelle L; Cafer, Anne

    2018-01-01

    The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.

  2. Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security.

    Science.gov (United States)

    Hahn, Erin; Blazes, David; Lewis, Sheri

    2016-01-01

    Improving global health security will require bold action in all corners of the world, particularly in developing settings, where poverty often contributes to an increase in emerging infectious diseases. In order to mitigate the impact of emerging pandemic threats, enhanced disease surveillance is needed to improve early detection and rapid response to outbreaks. However, the technology to facilitate this surveillance is often unattainable because of high costs, software and hardware maintenance needs, limited technical competence among public health officials, and internet connectivity challenges experienced in the field. One potential solution is to leverage open source software, a concept that is unfortunately often misunderstood. This article describes the principles and characteristics of open source software and how it may be applied to solve global health security challenges.

  3. Beyond Firewalls: Professional Certification Ensures Your Staff Will Understand Information Security in Its Proper Context

    Science.gov (United States)

    Svetcov, Eric

    2004-01-01

    When it comes to security, many people do not know what they do not know. Consider for example, an administrator who leaves her password taped under her keyboard, or a teacher who doesn't change his password (ever!) or can't be bothered to log out or lock the computer, all the firewalls and antivirus programs in the world will not protect a…

  4. Understanding complexities in coupled dynamics of human-water and food security

    Science.gov (United States)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  5. On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2015-01-01

    Full Text Available Security management is one of the most significant issues in nowadays data centers. Selection of appropriate security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. In this paper, we propose a specialized decision support system with a multilevel, comprehensive analysis scheme. As a result of the extensive use of mathematical methods and statistics, guidelines and indicators returned by the proposed approach facilitate the decision-making process and conserve decision-maker’s time and attention. In the paper we utilized proposed multilevel analysis scheme to manage security-based data flow in the example data center. Determining the most secure, energy-efficient, environmental friendly security mechanisms, we implemented the role-based access control method in Quality of Protection Modeling Language (QoP-ML and evaluated its performance in terms of mentioned factors.

  6. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    Science.gov (United States)

    Dabova, E. L.

    2013-11-01

    In addition to facilitating peaceful trade and economic development, sovereign territory, territorial waters and international waters are being used by various criminal groups that pose threats to governments, businesses and civilian population in Southeast Asia. Nonstate criminal maritime activities were not receiving appropriate attention as they were overshadowed by traditional military security challenges. Yet more and more frequently, the non-traditional actors challenge lines of communication, jeopardize access to strategic resources, complicate traditional defence tasks, and harm the environment. Understanding the nature of non-traditional threats, and the ways to combat them, requires international legal, historical and political science analysis within a united problem-oriented approach. A fair critique to pure interest, power and knowledge -based theories of regime formation was developed by E.K. Leonard's1, who explained the evolution of the international system from the global governance perspective. The present study is based on the premise that pure nation-state approaches are incapable of providing a theoretical ground for addressing the growing influence of international criminal networks in South East Asia. From an international relations theory perspective, the author of this study agrees with D.Snidal2 that the hegemonic stability theory has "limits" and is insufficient in describing modern challenges to sustainable international security regime, including non-traditional threats, where collective action is more efficient from an interest and capability standpoint. At the same time the author of this study does not share the viewpoint on "marginalization"3 of international law in current international order due to its fragmentation and regionalization4 and "global power shifts"5 . The United Nations, as a global institution at the top of the vertical hierarchy of international legal order, and the EU as an example of "self-contained" regime along

  7. Achieving the Security, Environmental, and Economic Potential of Bioenergy. Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Riggs, John A

    2006-06-07

    A group of business, government, environmental and academic leaders convened in a dialogue by the Aspen Institute proposed a series of actions to promote the widespread commercialization of both corn and cellulosic ethanol to improve energy security, the environment, and the economy. Co-chaired by Booz Allen Hamilton Vice President and former CIA Director R. James Woolsey and former Congressman Tom Ewing (R. IL), they developed a series of recommendations involving improved crop yields, processing of biomass into ethanol, manufacture of more cars that can burn either ethanol or gasoline, and the provision of ethanol pumps at more filling stations. Their report, "A High Growth Strategy for Ethanol, includes a discussion of the potential of ethanol, the group's recommendations, and a series of discussion papers commissioned for the dialogue.

  8. Environmental security of the coastal seafloor in the sea ports and waterways of the Mediterranean region

    Energy Technology Data Exchange (ETDEWEB)

    Obhodas, Jasmina, E-mail: jobhodas@irb.h [Institute Ruder Boskovic, Bijenicka c.54, 10000 Zagreb (Croatia); Valkovic, Vladivoj [A.C.T.d.o.o., Prilesje 4, 10000 Zagreb (Croatia); Sudac, Davorin [Institute Ruder Boskovic, Bijenicka c.54, 10000 Zagreb (Croatia); Matika, Dario [Institute for Researches and Development of Defense Systems, Ilica 256b, 10000 Zagreb (Croatia); Pavic, Ivica [Ministry of Defense, Croatian Navy, Dubrovacka 49, 21000 Split (Croatia); Kollar, Robert [A.C.T.d.o.o., Prilesje 4, 10000 Zagreb (Croatia)

    2010-07-21

    The Mediterranean coastal seafloor is littered with man-made objects and materials, including a variety of ammunition in many areas. In addition, sediments in ports, harbors and marinas are contaminated with elevated concentrations of chemicals used as biocides in antifouling paints. In order to reach a satisfactory level of environmental security of the coastal sea areas, fast neutron activation analysis with detection of associated alpha particles and energy dispersive X-ray fluorescence, both in laboratory and inside an autonomous underwater vehicle for in-situ measurements, has been used for the characterization of the objects on the seafloor. Measurements have shown that gamma ray spectra are able to distinguish threat material from the surrounding material. Analysis of more than 700 coastal sea sediment samples has resulted in concentration distribution maps indicating the locations of 'hot spots', which might interfere with threat material identification.

  9. Risk perception and environmental health concerns in conditions of social security threat

    International Nuclear Information System (INIS)

    Kolarova, D.

    1998-01-01

    Full text of publication follows: this study explores the connection between the perception of different societal risk, health concerns and behavioral attitudes of people in condition of social security threat. Two small and two big industrial towns were chosen in order to observe the social and psychological price of the structural changes in the industry such as unemployment and its reflection on the households and the individuals' social attitudes. Key stakeholders were interviewed and questionnaire survey was carried out. The results showed high level of risk sensitivity and health concerns when people felt threatened by lack of social and economic security. The pollution was found to be important problem when it caused direct and obvious risk to human health and the environment. In the same time reverse environmental behavior like insensitiveness and neglectful attitude was observed in cases when the health consequences of the pollution were perceived to be unclear and with delayed effect. In situation of a great socio-economic threat noninvolvement helped the individuals to adapt. The research proved the influence of several risk characteristics on risk perception. It was found a connection between the risk perception and risk controllability, voluntariness of exposure and cost/benefits distribution. In the study areas respondents' judgments on these characteristics reflected directly their social status and material state. The study presented here is in progress - it i's supported by research grant from Open Society Foundation. (author)

  10. Energy security from the Russian perspective. Think pipes not rockets

    Energy Technology Data Exchange (ETDEWEB)

    Gudowski, Waclaw

    2008-07-01

    The presentation reviews the understanding of energy security, the Russian role in the energy source market and discusses how to increase the energy security. Environmental aspects such as climate change, CO2 reduction and the environmental costs of fossil fuel consumption with respect to the energy security are emphasized (tk)

  11. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  12. Understanding the socio-institutional context to support adaptation for future water security in forest landscapes

    Directory of Open Access Journals (Sweden)

    Tahia Devisscher

    2016-12-01

    Full Text Available During the first half of the 21st century, socioeconomic development is expected to contribute faster and to a greater extent to global water stress than climate change. Consequently, we aimed to identify conditions that can facilitate local adaptation planning for future water security, accounting for the socio-institutional context, developmental needs, and interests affecting water use and management. Our study focused on three forest landscapes in Latin America where water stress was identified as a current concern potentially leading to future social conflict if not addressed. In the three sites, we adopted a participatory approach to implement a systematic diagnostic framework for the analysis of socio-institutional barriers and opportunities influencing local adaptation decision making. This novel application enabled science-society engagement in which civil society organizations were coleading the research. The field methods we used involved participatory social network mapping, semistructured interviews, and validation workshops. Our study generated insights into several interventions that could help overcome barriers affecting the adaptation decision-making process, particularly in the diagnosis and early planning phases. Points of intervention included fostering local participation and dialogue to facilitate coproduction of knowledge, and strengthening the role of key central actors in the water governance networks. These key actors are currently bridging multiple interests, information sources, and governance levels, and thus, they could become agents of change that facilitate local adaptation processes. Working jointly with civil society to frame the research proved effective to increase awareness about water issues, which related not only to the technological, economic, and political aspects of water, but also to organizational processes. The involvement of civil society created genuine interest in building further capacity for

  13. Understanding the Attitude-Action Gap: Functional Integration of Environmental Aspects in Car Purchase Intentions

    Science.gov (United States)

    Mairesse, Olivier; Macharis, Cathy; Lebeau, Kenneth; Turcksin, Laurence

    2012-01-01

    This study aims at understanding how a general positive attitude toward the environment results in a limited purchase of environmentally friendlier cars, often referred to as the attitude-action gap. In a first experiment 27 volunteers performed a judgment task on car purchase intention. Participants were asked to evaluate the probability of…

  14. Understanding of extreme temperature events by environmental health stakeholders in South Africa

    CSIR Research Space (South Africa)

    John, J

    2015-09-01

    Full Text Available The purpose of the work is to understand the potential need and use of extreme temperature forecasting products in the environmental health sector in South Africa by using an online questionnaire. Seven of 19 respondents currently receive hot...

  15. Proceedings of Regional Asia Pacific Defence Environmental Workshop Held in Darwin, Australia on 11-14 May 1998 (Environmental Security Series Number 5)

    Science.gov (United States)

    1998-05-01

    actions being undertaken to combat these issues, and the mutual benefits obtained through the partnership arrangement. The Conference was also attended...1993 (Oxford: Oxford University Press) Butts, Kent Hughes (1994) Environmental security: a partnership for peace. Strategic Studies Institute...GOVERNMENTAL ORGANISATIONS (NGOs) Mr. Michael Rae Program Leader-Resource Conservation World Wide Fund For Nature-Australia ( WWF -Australia

  16. The “geotoxicology” of airborne particulate matter: implications for public health, public policy, and environmental security (Invited)

    Science.gov (United States)

    Plumlee, G. S.; Morman, S. A.

    2009-12-01

    substantial public health risk. PM is at the core of diverse policy issues related to air quality, public health, and environmental security, at scales from local to global. Interdisciplinary earth and health science investigations are crucial to the development of effective policy. For example, earth science input will be key for understanding and managing potential risks associated with living on or near asbestos-containing rocks. Particularly in dry climates, a better understanding of the roles of geogenic PM versus anthropogenic PM as triggers of disease is needed in the development of appropriate air quality regulations at local to regional scales; this issue will only increase in importance in the future as human inhabitation increases in some arid regions, and as arid regions expand or shift due to climate change or human-induced stresses. Over the last decade, it has been recognized that dusts can transport contaminants and pathogens between continents. Hence, human practices and policies that influence dust generation in one continent or country may ultimately have an impact on public health, policy, and environmental security in distant downwind countries.

  17. DOES TRAINING IN THE CIRCLE OF SECURITY FRAMEWORK INCREASE RELATIONAL UNDERSTANDING IN INFANT/CHILD AND FAMILY WORKERS?

    Science.gov (United States)

    McMahon, Catherine; Huber, Anna; Kohlhoff, Jane; Camberis, Anna-Lisa

    2017-09-01

    This article evaluated whether attendance at Circle of Security training workshops resulted in attendees showing greater empathy and attachment-related knowledge and understanding, and fewer judgmental responses to viewing a stressful parent-child interaction. Participants were 202 practitioners who attended and completed a 2-day (n = 70), 4-day (n = 105), or 10-day (n = 27) COS training workshop in Australia or New Zealand in 2015. In a pre/post design, participant reactions to a video clip of a challenging parent-child interaction were coded for empathic, judgmental, or attachment-focused language. Attachment understanding was coded in response to questions about the greatest challenge that the dyad faced. In all training conditions, participants provided significantly more attachment-focused descriptors and showed significantly greater attachment understanding after training, but significantly fewer empathic descriptors. While participants at the longer workshops provided significantly fewer judgmental/critical descriptors, there was no change for those attending the 2-day workshop. Irrespective of workshop duration or professional background, participants took a more relational perspective on the vignette after the training workshops. More detailed research is required to establish the extent to which this increased knowledge and understanding is retained and integrated into infant mental health practice with parents and young children. © 2017 Michigan Association for Infant Mental Health.

  18. Bechtel Hanford, Inc. Network Security Plan for the Environmental Restoration Contract

    International Nuclear Information System (INIS)

    Slade, B.E.

    2000-01-01

    This document was created to address ERC computer security needs that are outlined by DOE Order 1360.2B, Unclassified Computer Security Program. DOE Order 1360.2B has been canceled and replaced with DOE Notice 205.1, Unclassified Cyber Security Program. The ERC response to DOE Notice 205.1 is to generate BHI-01343, Cyber Security Program Plan, which is not available for public access or viewing

  19. Understanding and applying principles of social cognition and decision making in adaptive environmental governance

    Directory of Open Access Journals (Sweden)

    Daniel A. DeCaro

    2017-03-01

    Full Text Available Environmental governance systems are under greater pressure to adapt and to cope with increased social and ecological uncertainty from stressors like climate change. We review principles of social cognition and decision making that shape and constrain how environmental governance systems adapt. We focus primarily on the interplay between key decision makers in society and legal systems. We argue that adaptive governance must overcome three cooperative dilemmas to facilitate adaptation: (1 encouraging collaborative problem solving, (2 garnering social acceptance and commitment, and (3 cultivating a culture of trust and tolerance for change and uncertainty. However, to do so governance systems must cope with biases in people's decision making that cloud their judgment and create conflict. These systems must also satisfy people's fundamental needs for self-determination, fairness, and security, ensuring that changes to environmental governance are perceived as legitimate, trustworthy, and acceptable. We discuss the implications of these principles for common governance solutions (e.g., public participation, enforcement and conclude with methodological recommendations. We outline how scholars can investigate the social cognitive principles involved in cases of adaptive governance.

  20. Security of the electricity supply. The area of conflict between profitability and environmental compatibility; Sicherheit der Elektrizitaetsversorgung. Das Spannungsfeld von Wirtschaftlichkeit und Umweltvertraeglichkeit

    Energy Technology Data Exchange (ETDEWEB)

    Praktiknjo, Aaron

    2013-07-01

    The scope of the book is on the one hand support for the power industry defining investment and sales strategies that intend optimum supply security in the view of the customer and on the other hand the information for energy and environmental politicians demonstrating the conflict of objectives. The following issues are covered: technical and organizational aspects of electricity supply, theoretical background of the security of electricity supply, security of supply for economic sections, security of electricity supply for private households: theoretical microeconomic approach, security of electricity supply for private households: method of defined preferences, security of electricity supply in the context of climate protection and nuclear phase-out.

  1. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    they are dependent on mountainous headwaters. This study offers new insights towards a better understanding of global water security issues that can inform and help guide international water governance.

  2. Hazy Days: Forest Fires and the Politics of Environmental Security in Indonesia

    Directory of Open Access Journals (Sweden)

    Scott Adam Edwards

    2015-01-01

    Full Text Available The Indonesian “haze” that engulfs Southeast Asia is a result of the burning of forests and has a detrimental effect on the health of millions of people. Indonesia is currently the third largest emitter of carbon dioxide in the world. In response to the dangers posed by forest fires to national and global environmental security, the then Indonesian president publicly declared a “war on haze” in 2006 and called for the use of all necessary measures to stop the deliberate setting of fires. Although his strong “securitising” rhetoric received much public support, it is yet to produce results. The Indonesian authorities have had little success in preventing fires or prosecuting the culprits. Indonesia thus appears to be a null case – that is, a case of an unsuccessful securitisation. We argue that this unsuccessful securitisation needs to be understood against the backdrop of Indonesia’s vast decentralisation process, which resulted in certain powers being devolved from Jakarta to the provinces. We find that it is the ability of local and regional elites (often entrenched in patronage networks with plantation owners to curtail environmental policies which explains the continuation of forest fires. With regard to securitisation theory, our findings suggest that securitising moves and audience acceptance do not necessarily lead to the successful implementation of emergency measures. It appears that there are intermediate factors – in our case mainly linked to the nature of and the distribution of power within the political regime – that impact on the success of securitisation processes.

  3. Integrating different understandings of landscape stewardship into the design of agri-environmental schemes

    DEFF Research Database (Denmark)

    Raymond, Christopher Mark; Reed, Mark; Bieling, Claudia

    2016-01-01

    While multiple studies have identified land managers’ preferences for agri-environmental schemes (AES), few approaches exist for integrating different understandings of landscape stewardship into the design of these measures. We compared and contrasted rural land managers’ attitudes toward AES...... to the reduced amount of funding available for entry-level and higher-level stewardship schemes in the UK since 2008, changing funding priorities, perceived overstrict compliance and lack of support for farm succession and new entrants into farming. However, there were differences in concerns across...... understandings of landscape stewardship, with production respondents citing that AES do not encourage food production, whereas environmental and holistic farmers citing that AES do not support the development of a local green food culture and associated social infrastructure. These differences also emerged...

  4. The Transmission of Environmental Values from Sources of Influence to Young Adults: Toward an Understanding of the Process Leading to Environmental Values Internalization

    Science.gov (United States)

    Depper, Gina L.

    2017-01-01

    The world faces significant environmental challenges due largely to unsustainable human behavior. Values have been found to be a direct and indirect predictor of human behavior and understanding how they are formed/influenced is critical to any strategy of behavioral change. Our understanding of how environmental values are transmitted and…

  5. Effects of cross-border power trade between Laos and Thailand: Energy security and environmental implications

    International Nuclear Information System (INIS)

    Watcharejyothin, Mayurachat; Shrestha, Ram M.

    2009-01-01

    This paper analyzed the effects of hydropower development in Laos and power trade between Laos and Thailand on economy wide, energy resource mix, power generation capacity mix, energy system cost, environment, as well as, energy security. A MARKAL-based model for an integrated energy system of Laos and Thailand was developed to assess the effects of energy resource development and trade to meet the national energy demands of the two countries. Two national MARKAL-based energy system models of Laos and Thailand were formulated for the study. The results show that 80% exploitation of water resource in Laos would induce power trade between the countries. The integrated energy system cost is found to decrease marginally but it would mitigate the CO 2 emission by 2% when compared with the base case. Thailand is expected to gain benefit from the increased level of power imported from Laos in terms of the lower energy system cost, better environmental quality and, greater diversification of energy sources. As compared to the base case, Laos would become the net energy exporter, earn significant export revenue, and improve the increase in revenue of energy export per increase in total energy system cost from the maximum exploitation of hydropower resource.

  6. Accelerator mass spectrometry of Strontium-90 for homeland security, environmental monitoring, and human health

    Energy Technology Data Exchange (ETDEWEB)

    Tumey, S J; Brown, T A; Hamilton, T F; Hillegonds, D J

    2008-03-03

    Strontium-90 is one of the most hazardous materials managed by agencies charged with protecting the public from radiation. Traditional radiometric methods have been limited by low sample throughput and slow turnaround times. Mass spectrometry offers the advantage of shorter analysis times and the ability to measure samples immediately after processing, however conventional mass spectrometric techniques are susceptible to molecular isobaric interferences that limit their overall sensitivity. In contrast, accelerator mass spectrometry is insensitive to molecular interferences and we have therefore begun developing a method for determination of {sup 90}Sr by accelerator mass spectrometry. Despite a pervasive interference from {sup 90}Zr, our initial development has yielded an instrumental background of {approx} 10{sup 8} atoms (75 mBq) per sample. Further refinement of our system (e.g., redesign of our detector, use of alternative target materials) is expected to push the background below 10{sup 6} atoms, close to the theoretical limit for AMS. Once we have refined our system and developed suitable sample preparation protocols, we will utilize our capability in applications to homeland security, environmental monitoring, and human health.

  7. The application of nuclear science technology to understanding and solving environmental problems

    International Nuclear Information System (INIS)

    Zuk, W.M.

    1997-01-01

    The Australian Nuclear Science and Technology Organisation (ANSTO) has for many years been involved in applying nuclear science-based and related technologies to the understanding of environmental processes and to the development and implementation of practical and effective solutions to site specific problems, for a broad spectrum of industry, government regulatory agencies, and other organisations in Australia, Europe, North and South America and South East Asia. ANSTO's environmental science program arose out of the need for research to predict, measure, evaluate and monitor the environmental impacts associated with : uranium mining and processing in Australia; the operation of the research reactor at Lucas Heights; and the safe treatment and disposal of radioactive and conventional wastes associated with these activities. The expertise developed in these activities, has found application to a much broader range of environmental concerns. This paper will present an overview of ANSTO's application of nuclear science-based techniques to, inter alia: coastal and marine studies; minesite rehabilitation; transport and geochemical modelling of radionuclides, heavy metals and organic chemicals in the geosphere; the application of naturally-occurring radionuclides and radioactive tracers to corrosion and sedimentation studies in the coastal environment; dating sediments, fish corals and archaeological samples; the understanding of the kinetics and the physiological responses of aquatic organisms to radionuclides and metals in the environment: and the use of aquatic organism as archival and 'realtime' monitors of pollutants

  8. Security, at what cost? A stated preference approach toward understanding individuals' privacy and civil liberties trade-offs regarding security measures

    NARCIS (Netherlands)

    Robinson, N.; Potoglou, D.

    2010-01-01

    In the presently heightened security environment there are a number of examples of policy that must strike a delicate balance between strengthening security without jeopardising public liberties and personal privacy. The introduction of national identity cards and biometric passports, the expansion

  9. Integrating Social Science, Environmental Science, and Engineering to Understand Vulnerability and Resilience to Environmental Hazards in the Bengal Delta

    Science.gov (United States)

    Gilligan, J. M.; Ackerly, B.; Goodbred, S. L.

    2013-12-01

    In populated delta environments, it is impossible to separate human and natural systems. Human activities change the landscape by altering the dynamics of water and sediment and in return, humans themselves are affected by the natural and anthropogenic changes to the landscape. Such interactions can also have significant impacts on the ecology and natural resources of a delta system, affecting local and regional food supply, livelihoods, and economies, particularly in developing nations. Successful adaptation to environmental change in a strongly coupled human-natural system, such as the Bengal delta, requires understanding how the physical environment and the changing social, political, and economic conditions of people's lives interact. Research on human-delta interactions has largely focused on macro-scale effects from major dams, water diversions, and catchment-scale land use; but at the smaller scale of households and communities, decisions, actions, and outcomes may occur abruptly and have significant local impacts (positive or negative). Southwest Bangladesh experiences profound environmental problems at the local human-landscape interface, including groundwater salinity, soil fertility, conflicting land-use practices, management of engineering structures, and declining land-surface elevations. The impacts of climate-induced sea-level rise, especially with respect to population migration, receive great attention and concern, but neither sea level rise nor migration occurs against a background of static physical or human environments. For example, changing land use (e.g., building embankments, which affect drainage, sediment transport, and the evolution of tidal channels; and the transformation of rice fields to shrimp aquaculture, which affects soil chemistry, labor markets, river ecology, and possibly the integrity of embankments) can significantly change the impact that sea level rise will have on flood hazards and the resulting effect on people living on

  10. Exploring the association of urban or rural county status and environmental, nutrition- and lifestyle-related resources with the efficacy of SNAP-Ed (Supplemental Nutrition Assistance Program-Education) to improve food security.

    Science.gov (United States)

    Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A

    2018-04-01

    To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.

  11. Preliminary Strategic Environmental Assessment of the Great Western Development Strategy: Safeguarding Ecological Security for a New Western China

    Science.gov (United States)

    Li, Wei; Liu, Yan-Ju; Yang, Zhifeng

    2012-02-01

    The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.

  12. “The Thinking Eye” and “The Open Sky:” Developing a Framework of an Environmental View of Security

    Directory of Open Access Journals (Sweden)

    Dr. Helen MARGARITOU-ANDRIANESSI

    2016-07-01

    Full Text Available Discussion of security integration began with discussion of the threatened local time-frame of our existence and preferred forms of behavior. We examine strategic requirements and stances toward environmental security, because the “gestalt thinking and ontology” and the “reflective cast of mind” influence our experience of security procedures in order to evaluate successful modes of interventions in ecosystem, changes in politics and security exchanges. The goal is a multi-criterion optimization problem which we suggest to bring to a single criterion one: to embrace more gestalt relations in order to reproduce the basic elements of the concept of security and common strategies.

  13. Understanding sudden environmental and societal change through coupled geochronological and artefact shape analyses

    DEFF Research Database (Denmark)

    Hoggard, Christian Steven; Sauer, Florian Rudolf; Zernack, Anke Verena

    Over the last twenty years, advances in geometric morphometric methodologies have revolutionised how archaeologists understand changes in artefact shape and form (size plus shape) throughout the Quaternary period. Such methodologies provide a high resolution of artefact coverage, and allow...... a critical analysis of previous taxonomic classificatory schemas and human tool-use in the past. Despite this, methodologies into artefact shape through geometric morphometrics have not been integrated within extensive geochronological data to better understand periods of high environmental stress and......, with respect to archaeology, how past societies reacted to such stress. The Laacher See volcanic eruption (c. 13,000 BP) in western Germany is believed, given its hypothesised characteristics, to have had profound impact on the lifeways of hunter-gatherers towards the end of the Final Palaeolithic (Riede, 2017...

  14. 3D Geological Mapping - uncovering the subsurface to increase environmental understanding

    Science.gov (United States)

    Kessler, H.; Mathers, S.; Peach, D.

    2012-12-01

    Geological understanding is required for many disciplines studying natural processes from hydrology to landscape evolution. The subsurface structure of rocks and soils and their properties occupies three-dimensional (3D) space and geological processes operate in time. Traditionally geologists have captured their spatial and temporal knowledge in 2 dimensional maps and cross-sections and through narrative, because paper maps and later two dimensional geographical information systems (GIS) were the only tools available to them. Another major constraint on using more explicit and numerical systems to express geological knowledge is the fact that a geologist only ever observes and measures a fraction of the system they study. Only on rare occasions does the geologist have access to enough real data to generate meaningful predictions of the subsurface without the input of conceptual understanding developed from and knowledge of the geological processes responsible for the deposition, emplacement and diagenesis of the rocks. This in turn has led to geology becoming an increasingly marginalised science as other disciplines have embraced the digital world and have increasingly turned to implicit numerical modelling to understand environmental processes and interactions. Recent developments in geoscience methodology and technology have gone some way to overcoming these barriers and geologists across the world are beginning to routinely capture their knowledge and combine it with all available subsurface data (of often highly varying spatial distribution and quality) to create regional and national geological three dimensional geological maps. This is re-defining the way geologists interact with other science disciplines, as their concepts and knowledge are now expressed in an explicit form that can be used downstream to design process models structure. For example, groundwater modellers can refine their understanding of groundwater flow in three dimensions or even directly

  15. Safeguarding National Security Through Public Release of Environmental Information: Moving the Debate to the Next Level

    National Research Council Canada - National Science Library

    Jacobson, Joseph

    2002-01-01

    ..., and the Chemical Safety Information, Site Security and Fuels Regulatory Relief Act The article then focuses on the current state of the law regarding release or withholding of chemical-hazard information...

  16. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  17. Closing the N-use efficiency gap to achieve food and environmental security.

    Science.gov (United States)

    Cui, Zhenling; Wang, Guiliang; Yue, Shanchao; Wu, Liang; Zhang, Weifeng; Zhang, Fusuo; Chen, Xinping

    2014-05-20

    To achieve food and environmental security, closing the gap between actual and attainable N-use efficiency should be as important as closing yield gaps. Using a meta-analysis of 205 published studies from 317 study sites, including 1332 observations from rice, wheat, and maize system in China, reactive N (Nr) losses, and total N2O emissions from N fertilization both increased exponentially with increasing N application rate. On the basis of the N loss response curves from the literature meta-analysis, the direct N2O emission, NH3 volatilization, N leaching, and N runoff, and total N2O emission (direct + indirect) were calculated using information from the survey of farmers. The PFP-N (kilogram of harvested product per kilogram of N applied (kg (kg of N)(-1))) for 6259 farmers were relative low with only 37, 23, and 32 kg (kg of N)(-1) for rice, wheat, and maize systems, respectively. In comparison, the PFP-N for highest yield and PFP-N group (refers to fields where the PFP-N was within the 80-100th percentile among those fields that achieved yields within the 80-100th percentile) averaged 62, 42, and 53 kg (kg of N)(-1) for rice, wheat, and maize systems, respectively. The corresponding grain yield would increase by 1.6-2.3 Mg ha(-1), while the N application rate would be reduced by 56-100 kg of N ha(-1) from average farmer field to highest yield and PFP-N group. In return, the Nr loss intensity (4-11 kg of N (Mg of grain)(-1)) and total N2O emission intensity (0.15-0.29 kg of N (Mg of grain)(-1)) would both be reduced significantly as compared to current agricultural practices. In many circumstances, closing the PFP-N gap in intensive cropping systems is compatible with increased crop productivity and reductions in both Nr losses and total N2O emissions.

  18. Understanding the Impact of Anthropogenic and Environmental Changes on Dengue Fever Cases in Puerto Rico

    Science.gov (United States)

    Akanda, A. S.; Serman, E. A.; Couret, J.; Puggioni, G.; Ginsberg, H. S.

    2016-12-01

    Worldwide, there are an estimated 50-100 million cases of dengue fever each year, roughly 30 times the number of cases as 50 years ago. Dengue was introduced to Puerto Rico (PR) in 1963 and it has experienced epidemic activity ever since. There have been 4 large epidemics since 1990, the most recent in 2010 where almost 27,000 cases were reported. Vaccine development remains in the testing stages, and years away from mass distribution. Effective control thus depends on our understanding of the complex relationships between environmental and anthropogenic factors, mosquito vector ecology, and disease epidemiology. Dengue virus is primarily transmitted by Aedes aegypti mosquitoes, which also carry the Zika virus, and humans in urban environments are their preferred hosts. The purpose of our analysis is to identify trends between anthropogenic and environmental changes and dengue fever cases in PR over the past 15 years. Data on housing and population density, percent impervious surface, and percent tree canopy at the municipality level were procured from the U.S. Census Bureau and the Multi-Resolution Land Characteristics Consortium (MLRC) project, respectively. Land cover data from the National Land Cover Database, created by USGS and NOAA, as well as environmental data from the National Climatic Data Center (NCDC), were also used. Smaller land cover and green space analysis studies have been performed for PR, but this is the first study to consider the island as a whole, and in six distinct regions, with regards to increases in dengue fever cases. The results from this study can be used to understand the effects of urbanization and climate change on vector-borne disease transmission in PR and to project the impact of growing sub-urban and urban areas on dengue cases in coming years. Our results could also be used to assess Dengue and Zika transmission in growing megacites of the world, where urban slums provide a favorable habitat for Ae. aegypti and foster

  19. Improving our understanding of environmental controls on the distribution of C3 and C4 grasses.

    Science.gov (United States)

    Pau, Stephanie; Edwards, Erika J; Still, Christopher J

    2013-01-01

    A number of studies have demonstrated the ecological sorting of C3 and C4 grasses along temperature and moisture gradients. However, previous studies of C3 and C4 grass biogeography have often inadvertently compared species in different and relatively unrelated lineages, which are associated with different environmental settings and distinct adaptive traits. Such confounded comparisons of C3 and C4 grasses may bias our understanding of ecological sorting imposed strictly by photosynthetic pathway. Here, we used MaxEnt species distribution modeling in combination with satellite data to understand the functional diversity of C3 and C4 grasses by comparing both large clades and closely related sister taxa. Similar to previous work, we found that C4 grasses showed a preference for regions with higher temperatures and lower precipitation compared with grasses using the C3 pathway. However, air temperature differences were smaller (2 °C vs. 4 °C) and precipitation and % tree cover differences were larger (1783 mm vs. 755 mm, 21.3% vs. 7.7%, respectively) when comparing C3 and C4 grasses within the same clade vs. comparing all C4 and all C3 grasses (i.e., ignoring phylogenetic structure). These results were due to important differences in the environmental preferences of C3 BEP and PACMAD clades (the two main grass clades). Winter precipitation was found to be more important for understanding the distribution and environmental niche of C3 PACMADs in comparison with both C3 BEPs and C4 taxa, for which temperature was much more important. Results comparing closely related C3 -C4 sister taxa supported the patterns derived from our modeling of the larger clade groupings. Our findings, which are novel in comparing the distribution and niches of clades, demonstrate that the evolutionary history of taxa is important for understanding the functional diversity of C3 and C4 grasses, and should have implications for how grasslands will respond to global change. © 2012

  20. One Health: Understanding and Improving Human, Animal, and Environmental Health as a Connected System Across NOAA

    Science.gov (United States)

    Giltz, S.; Trtanj, J.; Jones, H.

    2017-12-01

    The One Health concept recognizes that the health of humans is inextricably linked with the health of animals and the environment. With a growing world population, changing climate, and increased global travel One Health approaches are increasingly useful. The National Oceanic and Atmospheric Administration (NOAA) provides key stakeholders in the public health sector with the environmental intelligence they need to mitigate emerging health threats. The NOAA One Health Working Group's mission is to integrate and coordinate the network of observing systems and in situ sensors, detection and diagnostic capacity, research and modeling efforts, and sustained engagement with health partners to deliver useful information to public health and resource management communities. The NOAA One Health group divides its broad focus into themes: thermal extremes, water-borne disease, seafood security, Arctic, wildlife and zoonotic disease, vector-borne disease, and air quality (including wildfire). The group connects the work being done throughout NOAA to coordinate One Health related efforts, increase information sharing, promote interdisciplinary approaches, and work towards better disease prevention. We are working to enhance NOAA Science and services to deliver useful information on current and emerging health risks and benefits to health decision makers.

  1. China, The Environmental Dragon: The Environmental Security Implications of China’s Rise to Great-Power Status

    Science.gov (United States)

    2000-09-01

    York Times, March 10, 1997, p. C16. 26 See John Naisbitt, Megatrends Asia (New York: Simon & Schuster, 1996), pp. 19-20; Arthur Waldron, “The Bamboo...deterioration of earth’s biological systems: The military threat to national security is only one of many that governments must now address. The...rationally develop and use our natural resources, including land, water, forests, grasslands, minerals and biological resources according to the law, and

  2. Worldwide Emerging Environmental Issues Affecting the U.S. Military. Summarizing Environmental Security Monthly Scanning, July 2006-June 2007

    Science.gov (United States)

    2007-06-01

    to the Council. During the debate on April 17, 2007, China argued against this position along with Russia, Qatar , Indonesia, and South Africa...most likely long-term national security threats. The most vulnerable area is the Guarani aquifer that neighbors Uruguay, Brazil, and Paraguay. The...the world’s rivers and aquifers are shared among countries, conflicts are likely to be exacerbated, unless integrated cross-border water management

  3. Worldwide Emerging Environmental Issues Affecting the U.S. Military. Summarizing Environmental Security Monthly Scanning January 2008 - June 2008

    Science.gov (United States)

    2008-06-01

    collaboration among DOE’s Pacific Northwest National Laboratory, the Chinese Academy of Sciences’ Dalian Institute of Chemical Physics, and China’s...cause of climate change. Chinese and Australian scientists are examining possibilities for deeper drilling in parts of Antarctica to find atmospheric...comprehensive adaptation approach. Food’s Failed Estates = Paris’s Hot Cuisine ; Food Sovereignty – à la Cartel? by ETC Group analyzes food security prospects

  4. Environmental Sampling FY03 Annual Report - Understanding the Movement of Mercury on the INEEL

    International Nuclear Information System (INIS)

    Michael L. Abbott

    2003-01-01

    Environmental mercury measurements were started in Fy-01 at the Idaho National Engineering Laboratory (INEEL) to monitor downwind impacts from on-going waste treatment operations at the Idaho Nuclear Technology and Engineering Center (INTEC) and to improve our scientific understanding of mercury fate and transport in this region. This document provides a summary of the sampling done in FY04. Continuous total gaseous mercury (TGM) measurements were made using a Tekran Model 2537A mercury vapor analyzer during October 2002 and from February through July 2003. The equipment was deployed in a self-contained field trailer at the Experimental Field Station (EFS) four kilometers downwind (northeast) of INTEC. Mercury surface-to-air flux measurements were made in October 2002 and from February through May 2003 to better understand the fate of the estimated 1500 kg of mercury emitted from 36 years of calciner operations at INTEC and to improve our scientific understanding of mercury environmental cycling in this region. Flux was measured using an INEEL-designed dynamic flux chamber system with a Tekran automated dual sampling (TADS) unit. Diel flux was positively correlated with solar radiation (r = 0.65), air temperature (r = 0.64), and wind speed (r = 0.38), and a general linear model for flux prediction at the INEEL was developed. Reactive gaseous mercury (RGM) was measured at EFS in July using a Tekran Model 1130 mercury speciation unit. Based on comparisons with other published data around the U.S., mercury air concentrations and surface flux rates directly downwind from INTEC were not distinguishable from remote area (non-industrial) background levels during the monitoring period

  5. Understanding organization and institutional changes for management of environmental affairs in the Brazilian petroleum sector

    International Nuclear Information System (INIS)

    Oliveira, J.A.P. de

    2003-01-01

    This article analyzes how governments and an oil company adapted their institutional and organization frameworks to manage actual and potential environmental impacts of oil-related activities in Brazil. Two major factors are important for understanding these changes. First, the monopoly of the state to explore and produce oil is over. Foreign companies have entered Brazil and increased the competitiveness of the oil sector. Second, major oil spills into waterways in recent years resulted in severe fines and an increasing outcry from government and civil society representatives for greater control over oil activities. These two factors raised a debate about what are, or should be, the roles of various stakeholders involved in controlling oil activities and their impacts on the environment. Legislative changes assigned different roles to the state oil company, to a newly created regulatory agency, to the Navy and to federal and state environmental agencies. Because many of the legal changes were not well defined, accountability among institutional actors remained unclear and institutional conflicts about who is accountable for what were likely to occur. As well, government organizations, public prosecutors, media and civil society increasingly influenced the regulation of both government agencies and companies. As a result, these responded to regulatory change and market forces by changing their relations with external stakeholders and their organizational arrangements for environmental management. This article identifies some of the institutional conflicts in selected case studies from the oil industry, the difficulties in clarifying regulatory roles within the industry, and responses in terms of the environmental strategies of regulatory bodies and oil companies, specifically the Brazilian state company, Petrobas. (author)

  6. Understanding students visions about environmental global problems. Experience and lessons learned of teaching in Lithuania.

    Science.gov (United States)

    Pereira, Paulo; Siarova, Hanna; Misiūnė, Ieva; Cerda, Artemi; Úbeda, Xavier

    2015-04-01

    Nowadays, environment is accepted to be an important element of our welfare. Our activities and societal status are strongly related with the quality of the environment where we live. On the other hand historical and cultural backgrounds shape importantly our views about the environment and how we act towards it in our daily life. In a context of globalization and increase of competition at international level, knowledge appears to be one of the key components for the advance of the word. Most of the knowledge produced comes from high level education institutions and research centres, which have responsibility to create and encourage critical thinking. Individuals aware of the problems can be more active and can push things forward. We think that environmental knowledge and awareness are fundamental for the future of the society. In order to develop better methodologies are developed if we have a better perception of students understanding of environmental problems. The objective of this work is to study the Lithuanian university level student's perception about some environmental challenges of our society. We selected several questions for the students rate according the relevance of the question, as "Air Pollution", "Waste Management", "Resources overexplotation", "Biodiversity reduction", "Human Overpopulation" "Poverty", "Global Warming/Climate change", Natural disasters", "Terrorism", "Economical crisis", "War and armed conflicts" and the "Spread of infectious diseases". We ask to the respondents to rate the importance using a likert scale (1=Not Important, 2= not so important, 3=important, 4=very important, 5=the most important). Among all the questions, the most rated where the Water pollution, the Spread of infectious diseases and Air Pollution and the less important where Biodiversity Reduction, Human overpopulation and climate change. These results helped us to identify where some efforts should be taken to raise student's awareness about global

  7. Environmental Assessment for Proposed Security Forces Operations Facility, Buckley Air Force Base, Colorado

    National Research Council Canada - National Science Library

    Meyer, Elizabeth; Myklebust, Jessica; Denier, James; Christner, Jennifer; Fontaine, Kathyrn

    2006-01-01

    The United States Air Force (USAF) has prepared this EA in accordance with the National Environmental Policy Act to evaluate the potential environmental and social impacts from the construction and operation of the proposed SFOF...

  8. Environmental justice and health practices: understanding how health inequities arise at the local level.

    Science.gov (United States)

    Frohlich, Katherine L; Abel, Thomas

    2014-02-01

    While empirical evidence continues to show that people living in low socio-economic status neighbourhoods are less likely to engage in health-enhancing behaviour, our understanding of why this is so remains less than clear. We suggest that two changes could take place to move from description to understanding in this field; (i) a move away from the established concept of individual health behaviour to a contextualised understanding of health practices; and (ii) a switch from focusing on health inequalities in outcomes to health inequities in conditions. We apply Pierre Bourdieu's theory on capital interaction but find it insufficient with regard to the role of agency for structural change. We therefore introduce Amartya Sen's capability approach as a useful link between capital interaction theory and action to reduce social inequities in health-related practices. Sen's capability theory also elucidates the importance of discussing unequal chances in terms of inequity, rather than inequality, in order to underscore the moral nature of inequalities. We draw on the discussion in social geography on environmental injustice, which also underscores the moral nature of the spatial distribution of opportunities. The article ends by applying this approach to the 'Interdisciplinary study of inequalities in smoking' framework. © 2013 The Authors. Sociology of Health & Illness © 2013 Foundation for the Sociology of Health & Illness/John Wiley & Sons Ltd.

  9. Studying and understanding the environmental impacts of the Three Gorges Dam in China

    Science.gov (United States)

    Schönbrodt-Stitt, Sarah; Stumpf, Felix; Schmidt, Karsten; Althaus, Paul; Bi, Renneng; Bieger, Katrin; Buzzo, Giovanni; Dumperth, Christian; Fohrer, Nicola; Rohn, Joachim; Strehmel, Alexander; Udelhoven, Thomas; Wei, Xiang; Zimmermann, Karsten; Scholten, Thomas

    2013-04-01

    Since its planning phase and its completion and start of operation in 2009, the Three Gorges Dam (TGD) at the Yangtze River, has been discussed in a controversial manner. Due to considerable resettlements along with the associated expansion of the infrastructure network and large-scale shifts in land use and management, the TGD in Central China is among the most prominent human-induced examples for large-scale environmental impacts. As a consequence of the rapid ecosystem changes, the region is largely characterized by an enormous boost of typical geo-risks such as soil erosion, mass movements, and diffuse sediment and matter fluxes into the reservoir. Within the joint research project YANGTZE-GEO, Chinese and German scientists jointly focus on the human-induced environmental changes in the reservoir of the TGD after the impoundment of the Yangtze River and its tributaries. An integrative approach was set up in order to combine multi-scale investigation methods and state-of-the-art techniques from soil science, geology, hydrology, geophysics, geodesy, remote sensing, and data survey and monitoring. By means of eco-hydrological and soil erosion modeling, geo-statistical approaches such as digital soil mapping and Artificial Neuronal Networks, spatially and temporally differentiated simulation of the water budget as well as the balance of diffuse matter such as phosphorus and sediment, three-dimensional dynamic modeling, seismoacoustics and terrestrial radarinterferometry, multi-temporal land use classification from recent and historical remote sensing data and laser scanning, the research aims at (i) the understanding of the mechanisms and anthropogenic and environmental control factors of the environmental changes in the highly dynamic region and (ii) the development of spatially explicit land use options and recommendations for a sustainable land use management. Finally, based on the integrate modelling, we aim at the conception of a monitoring- and measuring

  10. Microarray applications to understand the impact of exposure to environmental contaminants in wild dolphins (Tursiops truncatus).

    Science.gov (United States)

    Mancia, Annalaura; Abelli, Luigi; Kucklick, John R; Rowles, Teresa K; Wells, Randall S; Balmer, Brian C; Hohn, Aleta A; Baatz, John E; Ryan, James C

    2015-02-01

    It is increasingly common to monitor the marine environment and establish geographic trends of environmental contamination by measuring contaminant levels in animals from higher trophic levels. The health of an ecosystem is largely reflected in the health of its inhabitants. As an apex predator, the common bottlenose dolphin (Tursiops truncatus) can reflect the health of near shore marine ecosystems, and reflect coastal threats that pose risk to human health, such as legacy contaminants or marine toxins, e.g. polychlorinated biphenyls (PCBs) and brevetoxins. Major advances in the understanding of dolphin biology and the unique adaptations of these animals in response to the marine environment are being made as a result of the development of cell-lines for use in in vitro experiments, the production of monoclonal antibodies to recognize dolphin proteins, the development of dolphin DNA microarrays to measure global gene expression and the sequencing of the dolphin genome. These advances may play a central role in understanding the complex and specialized biology of the dolphin with regard to how this species responds to an array of environmental insults. This work presents the creation, characterization and application of a new molecular tool to better understand the complex and unique biology of the common bottlenose dolphin and its response to environmental stress and infection. A dolphin oligo microarray representing 24,418 unigene sequences was developed and used to analyze blood samples collected from 69 dolphins during capture-release health assessments at five geographic locations (Beaufort, NC, Sarasota Bay, FL, Saint Joseph Bay, FL, Sapelo Island, GA and Brunswick, GA). The microarray was validated and tested for its ability to: 1) distinguish male from female dolphins; 2) differentiate dolphins inhabiting different geographic locations (Atlantic coasts vs the Gulf of Mexico); and 3) study in detail dolphins resident in one site, the Georgia coast, known to

  11. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  12. A broadened typology on energy and security

    International Nuclear Information System (INIS)

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  13. Agroenergy production from biomass in integrated agroforestry systems: an alternative to achieve food security and environmental protection

    International Nuclear Information System (INIS)

    Suárez, J.; Martín, G. J.

    2010-01-01

    The objective of this paper is to offer considerations about agroenergy production from biomass in integrated agroforestry systems. At present, worldwide, marked by a group of hazards that threaten human existence, there is a challenge mainly in the rural context: how can the coexistence of agroenergy, food security and environmental protection be achieved?, in the presence of climate changes, environmental degradation, food crises and the growing biofuels vs food contradiction, generated by a senseless policy for obtaining first-generation agrofuels from large extensions of food monocrops, which is morally rejectable. Biofuels are also considered an ecological alternative to fossil fuels, because of their reduction capacity in the emission of greenhouse gasses and because they promote the development of rural communities in southern countries; this is enhanced in integrated agroforestry systems, in which biofuels, of first as well as second generation, can be produced, especially with the application of the concept of biorefinery which allows converting biomass into many products, which total added value can be higher than the one generated by fossil fuels. International projects, which promote integrated and sustainable food and energy production in the context of agroforestry integrated systems, at local scale, contribute to this purpose. The authors consider that the execution of projects and experiences about agroenergy has the main objective of achieving energetic sustainability and food security at local scale, in rural areas, taking into account environmental protection. (author)

  14. Time series models of environmental exposures: Good predictions or good understanding.

    Science.gov (United States)

    Barnett, Adrian G; Stephen, Dimity; Huang, Cunrui; Wolkewitz, Martin

    2017-04-01

    Time series data are popular in environmental epidemiology as they make use of the natural experiment of how changes in exposure over time might impact on disease. Many published time series papers have used parameter-heavy models that fully explained the second order patterns in disease to give residuals that have no short-term autocorrelation or seasonality. This is often achieved by including predictors of past disease counts (autoregression) or seasonal splines with many degrees of freedom. These approaches give great residuals, but add little to our understanding of cause and effect. We argue that modelling approaches should rely more on good epidemiology and less on statistical tests. This includes thinking about causal pathways, making potential confounders explicit, fitting a limited number of models, and not over-fitting at the cost of under-estimating the true association between exposure and disease. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Omics Approaches for Understanding Grapevine Berry Development: Regulatory Networks Associated with Endogenous Processes and Environmental Responses

    Directory of Open Access Journals (Sweden)

    Alejandra Serrano

    2017-09-01

    Full Text Available Grapevine fruit development is a dynamic process that can be divided into three stages: formation (I, lag (II, and ripening (III, in which physiological and biochemical changes occur, leading to cell differentiation and accumulation of different solutes. These stages can be positively or negatively affected by multiple environmental factors. During the last decade, efforts have been made to understand berry development from a global perspective. Special attention has been paid to transcriptional and metabolic networks associated with the control of grape berry development, and how external factors affect the ripening process. In this review, we focus on the integration of global approaches, including proteomics, metabolomics, and especially transcriptomics, to understand grape berry development. Several aspects will be considered, including seed development and the production of seedless fruits; veraison, at which anthocyanin accumulation begins in the berry skin of colored varieties; and hormonal regulation of berry development and signaling throughout ripening, focusing on the transcriptional regulation of hormone receptors, protein kinases, and genes related to secondary messenger sensing. Finally, berry responses to different environmental factors, including abiotic (temperature, water-related stress and UV-B radiation and biotic (fungi and viruses stresses, and how they can significantly modify both, development and composition of vine fruit, will be discussed. Until now, advances have been made due to the application of Omics tools at different molecular levels. However, the potential of these technologies should not be limited to the study of single-level questions; instead, data obtained by these platforms should be integrated to unravel the molecular aspects of grapevine development. Therefore, the current challenge is the generation of new tools that integrate large-scale data to assess new questions in this field, and to support

  16. Next Steps Toward Understanding Human Habitation of Space: Environmental Impacts and Mechanisms

    Science.gov (United States)

    Globus, Ruth

    2016-01-01

    factor alone implying at least some shared underlying mechanisms. Thus, both ground based and spaceflight research utilizing model organisms provide the opportunity to better understand environmental factors and biological mechanisms that contribute to human health and survival in space.

  17. World geography and power, national capitals, and inequality as cross-national causes of food security and environmental outcomes

    Directory of Open Access Journals (Sweden)

    Edward Kick

    2016-12-01

    Full Text Available Treatments of sustainability outcomes such as food security, economic development and environmental degradation typically have adopted monocausal approaches. Many have argued for substantial increases in world meat production as the panacea to global food insecurity. We use global and national synthetic explanations and path analytic approaches to examine sustainability outcomes for 200 nations. Both strong direct or indirect links are found among global geography, global power and national capitals, as well as warfare and military expenditures, and economic development. These factors are differentially predictive of the other key measures of sustainability.

  18. Understanding how environmental enhancement and conservation activities may benefit health and wellbeing: a systematic review.

    Science.gov (United States)

    Lovell, Rebecca; Husk, Kerryn; Cooper, Chris; Stahl-Timmins, Will; Garside, Ruth

    2015-09-07

    Action taken to enhance or conserve outdoor environments may benefit health and wellbeing through the process of participation but also through improving the environment. There is interest, amongst both health and environmental organisations, in using such activities as health promotion interventions. The objective of this systematic review was to investigate the health and wellbeing impacts of participation in environmental enhancement and conservation activities and to understand how these activities may be beneficial, to whom and in what circumstances or contexts. A theory-led mixed-method systematic review was used to assess evidence of effect and to identify pathways to change (protocol: http://onlinelibrary.wiley.com/doi/ 10.1002/14651858.CD010351/full ). Due to the multi-disciplinary, dispersed and disparate body of evidence an extensive multi-stage search strategy was devised and undertaken. Twenty-seven databases and multiple sources of grey literature were searched and over 200 relevant organisations were contacted. The heterogenous evidence was synthesised using a narrative approach and a conceptual model was developed to illustrate the mechanisms of effect. Due to the limited nature of the evidence additional higher order evidence was sought to assess the plausibility of the proposed mechanisms of effect through which health and wellbeing may accrue. The majority of the quantitative evidence (13 studies; all poor quality and lower-order study designs) was inconclusive, though a small number of positive and negative associations were observed. The qualitative evidence (13 studies; 10 poor quality, 3 good) indicated that the activities were perceived to have value to health and wellbeing through a number of key mechanisms; including exposure to natural environments, achievement, enjoyment and social contact. Additional high level evidence indicated that these pathways were plausible. Despite interest in the use of environmental enhancement activities as a

  19. Policy in Conflict: The Struggle Between Environmental Policy and Homeland Security Goals

    Science.gov (United States)

    2013-09-01

    environmental and energy 34 policy (Murkowski, 2010). However, a good set of literature on the broader, macro level question central to this investigation...terms of increasing efficiency of the automotive fleet (demand side), certain environmental policies have the unintended consequence of restricting the...Middle East  Broader aspects of the struggle between environmental policy and energy policy  A broad analysis of ways to diminish animus toward the

  20. Understanding the Environmental and Climate Impacts of Biomass Burning in Northern Sub-Saharan Africa

    Science.gov (United States)

    Ichoku, Charles; Gatebe, Charles; Bolten, John; Policelli, Fritz; Habib, Shahid; Lee, Jejung; Wang, Jun; Wilcox, Eric; Adegoke, Jimmy

    2011-01-01

    The northern sub-Saharan African (NSSA) region, bounded on the north and south by the Sahara and the Equator, respectively, and stretching from the West to the East African coastlines, has one of the highest biomass-burning rates per unit land area among all regions of the world. Because of the high concentration and frequency of fires in this region, with the associated abundance of heat release and gaseous and particulate smoke emissions, biomass-burning activity is believed to be one of the drivers of the regional carbon and energy cycles, with serious implications for the water cycle. A new interdisciplinary research effort sponsored by NASA is presently being focused on the NSSA region, to better understand the possible connection between the intense biomass burning observed from satellite year after year across the region and the rapid depletion of the regional water resources, as exemplified by the dramatic drying of Lake Chad. A combination of remote sensing and modeling approaches is being utilized in investigating multiple regional surface, atmospheric, and water-cycle processes, and inferring possible links between them. In this presentation, we will discuss preliminary results as well as the path toward improved understanding'of the interrelationships and feedbacks between the biomass burning and the environmental change dynamics in the NSSA region.

  1. Environmental and climate security: improving scenario methodologies for science and risk assessment

    Science.gov (United States)

    Briggs, C. M.; Carlsen, H.

    2010-12-01

    Governments and popular discussions have increasingly referred to concepts of ‘climate security’, often with reference to IPCC data. Development of effective methodologies to translate complex, scientific data into risk assessments has lagged, resulting in overly simplistic political assumptions of potential impacts. Climate security scenarios have been developed for use by security and military agencies, but effective engagement by scientific communities requires an improved framework. Effective use of data requires improvement both of climate projections, and the mapping of cascading impacts across interlinked, complex systems. In this research we propose a process for systematic generation of subsets of scenarios (of arbitrary size) from a given set of variables with possible interlinkages. The variables could include climatic changes as well as other global changes of concerns in a security context. In coping with possible challenges associated with the nexus of climate change and security - where deep structural uncertainty and possible irreversible changes are of primary interest - it is important to explore the outer limits of the relevant uncertainties. Therefore the proposed process includes a novel method that will help scenario developers in generating scenario sets where the scenarios are in a quantifiable sense maximally different and therefore best ‘span’ the whole set of scenarios. When downscaled onto a regional level, this process can provide guidance to potentially significant and abrupt geophysical changes, where high uncertainty has often prevented communication of risks. Potential physical changes can then be used as starting points for mapping cascading effects across networks, including topological analysis to identify critically vulnerable nodes and fragile systems, the existence of positive or negative feedback loops, and possible intervention points. Advanced knowledge of both potential geo-physical shifts and related non

  2. Understanding the Structure-Function Relationships of Dendrimers in Environmental and Biomedical Applications

    Science.gov (United States)

    Wang, Bo

    We are living an era wherein nanoparticles (NPs) have been widely applied in our lives. Dendrimers are special polymeric NPs with unique physiochemical properties, which have been intensely explored for a variety of applications. Current studies on dendrimers are bottlenecked by insufficient understandings of their structure and dynamic behaviors from a molecular level. With primarily computational approaches supplemented by many other experimental technics, this dissertation aims to establish structure-function relationships of dendrimers in environmental and biomedical applications. More specifically, it thoroughly investigates the interactions between dendrimers and different biomolecules including carbon-based NPs, metal-based NPs, and proteins/peptides. Those results not only provide profound knowledge for evaluating the impacts of dendrimers on environmental and biological systems but also facilitate designing next-generation functional polymeric nanomaterials. The dissertation is organized as following. Chapter 1 provides an overview of current progresses on dendrimer studies, where methodology of Discrete Molecular Dynamics (DMD), my major research tool, is also introduced. Two directions of utilizing dendrimers will be discussed in following chapters. Chapter 2 will focus on environmental applications of dendrimers, where two back-to-back studies are presented. I will start from describing some interesting observations from experiments i.e. dendrimers dispersed model oil molecules. Then, I will reveal why surface chemistries of dendrimers lead to different remediation efficiencies by computational modelings. Finally, I will demonstrate different scenarios of dendrimer-small molecules association. Chapter 3 is centered on dendrimers in the biomedical applications including two subtopics. In the first topic, we will discuss dendrimers as surfactants that modulating the interactions between proteins and NPs. Some fundamental concepts regarding to NPs

  3. Towards a Stochastic Predictive Understanding of Ecosystem Functioning and Resilience to Environmental Changes

    Science.gov (United States)

    Pappas, C.

    2017-12-01

    Terrestrial ecosystem processes respond differently to hydrometeorological variability across timescales, and so does our scientific understanding of the underlying mechanisms. Process-based modeling of ecosystem functioning is therefore challenging, especially when long-term predictions are envisioned. Here we analyze the statistical properties of hydrometeorological and ecosystem variability, i.e., the variability of ecosystem process related to vegetation carbon dynamics, from hourly to decadal timescales. 23 extra-tropical forest sites, covering different climatic zones and vegetation characteristics, are examined. Micrometeorological and reanalysis data of precipitation, air temperature, shortwave radiation and vapor pressure deficit are used to describe hydrometeorological variability. Ecosystem variability is quantified using long-term eddy covariance flux data of hourly net ecosystem exchange of CO2 between land surface and atmosphere, monthly remote sensing vegetation indices, annual tree-ring widths and above-ground biomass increment estimates. We find that across sites and timescales ecosystem variability is confined within a hydrometeorological envelope that describes the range of variability of the available resources, i.e., water and energy. Furthermore, ecosystem variability demonstrates long-term persistence, highlighting ecological memory and slow ecosystem recovery rates after disturbances. We derive an analytical model, combining deterministic harmonics and stochastic processes, that represents major mechanisms and uncertainties and mimics the observed pattern of hydrometeorological and ecosystem variability. This stochastic framework offers a parsimonious and mathematically tractable approach for modelling ecosystem functioning and for understanding its response and resilience to environmental changes. Furthermore, this framework reflects well the observed ecological memory, an inherent property of ecosystem functioning that is currently not

  4. Achieve a Better Understanding of Cloud and Precipitation Processes for the Promotion of Water Security in Arid and Semi-Arid Regions

    Science.gov (United States)

    Farrah, S.; Al Yazidi, O.

    2016-12-01

    The UAE Research Program for Rain Enhancement Science (UAEREP) is an international research initiative designed to advance the science and technology of rain enhancement. It comes from an understanding of the needs of countries suffering from scarcity of fresh water, and its will to support innovation globally. The Program focuses on the following topics: Climate change, Climate modelling, Climatology, Atmospheric physics, Atmospheric dynamics, Weather modification, Cloud physics, Cloud dynamics, Cloud seeding, Weather radars, Dust modelling, Aerosol physics , Aerosol chemistry, Aerosol/cloud interactions, Water resources, Physics, Numerical modelling, Material science, Nanotechnology, Meteorology, Hydrology, Hydrogeology, Rocket technology, Laser technology, Water sustainability, Remote sensing, Environmental sciences... In 2015, three research teams from Japan, Germany and the UAE led by Prof. Masataka Murakami, Volker Wulfmeyer and Linda Zou have been respectively awarded. Together, they are addressing the issue of water security through innovative ideas: algorithms and sensors, land cover modification, and nanotechnologies to accelerate condensation. These three projects are undergoing now with extensive research and progresses. This session will be an opportunity to present their latest results as well as to detail the evolution of research in rain enhancement. In 2016 indeed, the Program saw a remarkable increase in participation, with 91 pre-proposals from 398 scientists, researchers and technologists affiliated to 180 institutes from 45 countries. The projects submitted are now focusing on modelling to predict weather, autonomous vehicles, rocket technology, lasers or new seeding materials… The science of rain enhancement offers considerable potential in terms of research, development and innovation. Though cloud seeding has been pursued since the late 1940s, it has been viewed as a relatively marginal field of interest for scientists. This benign neglect

  5. Worldwide Emerging Environmental Issues Affecting the U.S. Military. Summarizing Environmental Security Monthly Scanning. July 2008 - June 2009

    Science.gov (United States)

    2009-06-01

    Anglia’s Nathan Gillet. A report by the Dirección General de Aguas de Chile , the country’s official water authority, warned that the Echaurren...Argentina (about 50% of current world production), Chile , China, and Australia. However, at the recent Lithium Market and Supply Emerging Environmental...held in Santiago, Chile , it was said that there is plenty of lithium supply to meet demand for the foreseeable future. Considering the potential

  6. Teachers' understandings and enactments of social and environmental justice issues in the classroom: What's "critical" in the manufacturing of road-smart squirrels?

    Science.gov (United States)

    Sammel, Alison J.

    How do five new teachers understand and enact counter-hegemonic pedagogies in their own classes? This study developed from this question. The question arose as I taught critical environmental education, a counter-hegemonic pedagogy, to preservice science teachers. I encouraged the exploration of social and environmental injustices and how they function to reproduce dominant economic agendas. To understand how five teachers, in the second year of their practice and my former students, made sense of the critical environmental education I taught them, I used Gadamer's hermeneutic phenomenology as my research frame. Gadamer argues that meaning develops through dialogue, so data collection occurred mainly through lively research conversations over leisurely dinners. As practicing teachers, the six of us jointly explored taken-for-granted meanings and actions in our everyday pedagogical experiences. In these conversations we made meaning (the hermeneutic aspect) of the lived experiences (phenomenological aspect) of incorporating critical environmental education into our practices. This led me to a deeper understanding and increased awareness of how science education reform agendas have influenced and shaped our individual science pedagogies. The analytic lens of critical education showed that these teachers were strongly influenced by the dominant science reform agenda. Regardless of the science curriculum, or the strong social and environmental beliefs some of these teachers held, they did not perceive the teaching of the social and environmental justice issues to be 'critical' or 'their job.' They demonstrated a belief that it was 'critical' to teach well-defined, "hard science" facts. Student success, hence teacher success, involved playing the academic game well and gaining long-term financial security. Re/viewing the data stories through the additional analytic lens of feminist poststructuralism, I saw how dominant discourse constructs the identity of teachers

  7. The North American power delivery system: Balancing market restructuring and environmental economics with infrastructure security

    International Nuclear Information System (INIS)

    Massoud Amin, S.; Gellings, Clark W.

    2006-01-01

    The North American electric power system was developed over the last 100 years without a conscious awareness and analysis of the system-wide implications of its current evolution under the forces of deregulation, system complexity, power-market impacts, terrorism, and human error. The possibility of power delivery beyond neighboring areas was a distant secondary consideration. Today, the North American power network may realistically be considered to be the largest machine in the world. With the advent of deregulation and competition in the electric power industry, new ways are being sought to improve the efficiency of that network without seriously diminishing its reliability and security. Controlling a heterogeneous, widely dispersed, yet globally interconnected system is a serious technological problem in any case. It is even more complex and difficult to control it for optimal efficiency and maximum benefit to the ultimate consumers while still allowing all its business components to compete fairly and freely. In this paper we present an overview of key issues and the context in which the electricity infrastructure is being operated under the above forces along with a strategic vision extending to a decade, or longer, that would enable more secure and robust systems operation, security monitoring, and efficient energy markets. (author)

  8. Understanding environmental contributions to autism: Causal concepts and the state of science.

    Science.gov (United States)

    Hertz-Picciotto, Irva; Schmidt, Rebecca J; Krakowiak, Paula

    2018-04-01

    The complexity of neurodevelopment, the rapidity of early neurogenesis, and over 100 years of research identifying environmental influences on neurodevelopment serve as backdrop to understanding factors that influence risk and severity of autism spectrum disorder (ASD). This Keynote Lecture, delivered at the May 2016 annual meeting of the International Society for Autism Research, describes concepts of causation, outlines the trajectory of research on nongenetic factors beginning in the 1960s, and briefly reviews the current state of this science. Causal concepts are introduced, including root causes; pitfalls in interpreting time trends as clues to etiologic factors; susceptible time windows for exposure; and implications of a multi-factorial model of ASD. An historical background presents early research into the origins of ASD. The epidemiologic literature from the last fifteen years is briefly but critically reviewed for potential roles of, for example, air pollution, pesticides, plastics, prenatal vitamins, lifestyle and family factors, and maternal obstetric and metabolic conditions during her pregnancy. Three examples from the case-control CHildhood Autism Risks from Genes and the Environment Study are probed to illustrate methodological approaches to central challenges in observational studies: capturing environmental exposure; causal inference when a randomized controlled clinical trial is either unethical or infeasible; and the integration of genetic, epigenetic, and environmental influences on development. We conclude with reflections on future directions, including exposomics, new technologies, the microbiome, gene-by-environment interaction in the era of -omics, and epigenetics as the interface of those two. As the environment is malleable, this research advances the goal of a productive and fulfilling life for all children, teen-agers and adults. Autism Res 2018, 11: 554-586. © 2018 International Society for Autism Research, Wiley Periodicals, Inc

  9. Notification: Assessment of the Qualifications of Environmental Protection Agency Personnel With Significant Security Responsibilities

    Science.gov (United States)

    Project #OMS-FY12-0006, February 15, 2012. The U.S. Environmental Protection Agency (EPA) Office of Inspector General plans to begin preliminary research for the subject project, which will be performed by a contractor.

  10. How innovative ICT tools can enhance understanding of interactions between societal, hydrological and environmental changes

    Science.gov (United States)

    Foglia, L.; Borsi, I.; Cannata, M.; De Filippis, G.; Criollo, R.; Mehl, S.; Rossetto, R.

    2017-12-01

    The interaction of environmental, physical, and socioeconomic processes alter and are altered by water and by how human can affect water use. For example, a warming climate increases the chance of warm temperatures and lack of precipitation, and when combined with growing population requires understanding of impact on water resources and on all the processes related to the water budget including evapotranspiration. On this foundation, humans add engineered and social systems to control, manage, utilize, and alter our water environment for a variety of uses and through a variety of organizational and individual decisions. Some engineered systems have mixed consequences, for example groundwater helped sustain agriculture during drought periods, but then groundwater levels critically decrease with no chances to recover in some parts of the world. Innovative ICT tools have been demonstrated as a helpful tool for enhancing human understanding of the effect that societal, economical, and policy-based decisions have on the water resources and on the environment in general. Here we apply the new FREEWAT platform to demonstrate the importance of developing ad-hoc database and hydrological models to simulate different scenarios using a participatory approach. Stakeholders have been involved in data collection, database design and model development during the entire project period and discussion between researcher and stakeholders have been fostered during Focus Groups and workshops organized in many countries in Europe and beyond (including case studies in Ukraine and Africa). FREEWAT is an open source and public domain GIS integrated modelling environment for simulation of water quantity and quality in surface water and groundwater with an integrated water management and planning module. FREEWAT aims at promoting water resource management by simplifying the application of the Water Framework Directive and related Directives. Fourteen case studies have been considered and

  11. A Security plan for LMOs - concentrated on environmental policy of Biosafety Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Park, Yong Ha [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    Biotechnology industry in Korea is raised by the national support. Also, Korea imports 70% of entire agricultural products. Considering the present situation in Korea, signing a Biosafety Protocol is necessary to prevent harm by LMOs and to protect associated biotechnological industry. Therefore, the problems on signing Biosafety Protocol were analyzed and the environmental policy to be pursued was proposed. This study result will be a cornerstone to prepare a definite environmental policy by government. 54 refs., 7 figs., 27 tabs.

  12. Understanding differences in the diffusion of environmentally beneficial technology. Final project report

    Energy Technology Data Exchange (ETDEWEB)

    Blackman, A.; Boyd, J.; Simpson, R.D.; Toman, M.

    1996-12-31

    The factors affecting the diffusion of technical discoveries among firms and nations remain one of the most interesting and important but least understood elements of economic behavior. Recently, interest in technology diffusion has been heightened by a recognition that the spread of technologies could have important implications for environmental quality as well as for market goods and services. A specific motivation for this study was the question of how rapidly technologies that reduce greenhouse gas emissions might diffuse. Technologies in this category include technologies that improve the efficiency of fossil energy use or promote substitution of renewable energy resources. The speed with which these technologies spread could have a significant effect on the rate of accumulation of carbon in the atmosphere. From a modeling perspective, the rate of innovation and diffusion of carbon-reducing technology is known to be a crucial parameter in integrated assessments of climate change risks and policy responses. Thus, a better understanding of factors that might influence the spread of carbon-reducing technologies could be valuable in studies on long-term global change and policy assessment.

  13. Understanding and applying principles of social cognition and decision making in adaptive environmental governance

    Science.gov (United States)

    Environmental governance systems are under greater pressure to adapt and to cope with increased social and ecological uncertainty from stressors like climate change. We review principles of social cognition and decision making that shape and constrain how environmental governance...

  14. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    Science.gov (United States)

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-11-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  15. Neutron reflectivity study of critical adsorption. Application to the understanding of environmental mechanisms

    International Nuclear Information System (INIS)

    Jestin, Jacques

    2001-01-01

    This study is within the scope of fundamental knowledge transfer to a field case-study, i.e. the understanding of the adsorption properties of binary mixtures against a wall in the case of soil pollution by liquid hydrocarbons. From the theoretical study of critical adsorption, which has been well described in the literature, we carried out experiments on model systems by using neutron techniques. Neutron reflectivity was then applied to the liquid-vapor interface of three different binary mixtures: perfluorohexane-hexane, deuterated methanol-cyclohexane and methanol-deuterated cyclohexane. The experimental data were analysed according to the theoretical prediction of Fisher and De Gennes, along with Liu and Fisher that suggested a power law decrease of the concentration profile (with an exponent equal to 0.52) followed by an exponential function. The characteristic exponent and the amplitude ratios for the methanol-cyclohexane mixtures were found fitted well with theoretical values for the three systems. Only the perfluorohexane-hexane mixture exhibited a particular behavior in the adsorption process that affected the power law amplitude value. This step allowed us to study non critical adsorption and to apply neutrons techniques, e.g. reflectivity and small angles neutrons scattering, to a water-2,5 dimethylpyridine mixture against silica, which is a model system for soils polluted by water/hydrocarbon mixtures. These experiments highlighted new experimental difficulties, which were not fully solved over this study, together with some problems in the analysis that would require specific modelling. Nevertheless, this study shows the capabilities of neutrons techniques to investigate some environmental mechanisms. Moreover, some of the results reported here can be used as a basis for future experiments. (author)

  16. Developing markets for forest environmental services: an opportunity for promoting equity while securing efficiency?

    Science.gov (United States)

    Landell-Mills, Natasha

    2002-08-15

    Market-based approaches to environmental management are all the rage. Claims that market mechanisms can encourage environmental protection and promote greater economic efficiency while saving taxpayers' money are tantalizing. In the forestry sector, policy makers are widely heeding this advice and shrinking command-and-control systems in favour of incentive mechanisms that seek to align private enthusiasm with the public good. In some cases, governments are even promoting the creation of markets where none existed before. In others, markets are evolving of their own accord. In such times of change, it is difficult to stand back and take stock. Yet, it is during such times that guidance is most needed. In the rush to introduce market-based solutions to environmental problems, a particular concern is how markets are impacting on the poor. In this paper an effort is made to draw on a recent review of markets for four forest environmental services (biodiversity conservation, carbon sequestration, watershed protection and landscape beauty) to draw out preliminary insights into how markets are performing with respect to their impacts on the poor. The evidence suggests a need for caution. While the potential benefits are significant, the poor face an uphill battle in realizing them. Key constraints facing the poor include a lack of property rights over forest resources and their environmental services; inadequate skills and education; poor market information; lack of market contacts; inadequate communication infrastructure; inappropriate contract design; and lack of access to financial resources. To tackle these, four potential ways forward are highlighted: (1) assign property rights to forest assets and their related environmental services in ways that respect customary arrangements and poor people's tenure; (2) strengthen capacity for market participation, e.g. through training and education; (3) invest in the provision of market information, advice and, essentially, a

  17. The Use of Space Technology for Environmental Security, Disaster Rehabilitation and Sustainable Development in Afghanistan and Iraq

    Science.gov (United States)

    Lovett, Kian

    Since the dawn of time, humans have engaged in war. In the last 5,600 years of recorded history 14,600 wars have been waged1. The United Nations has sought to save succeeding generations from the scourge of war and to foster peace. Wars have recently taken place in Afghanistan and Iraq. Both countries are now faced with a range of complex problems. In-depth country assessments reveal significant shortcomings in the areas of water, sanitation, health, security and natural resource management. These are key factors when examining environmental security, sustainable development and trans-boundary problems, all of which are issues relevant to the Middle East and Central Asian states. Space technology can be applied to support the reconstruction and development plans for Afghanistan and Iraq; however, there needs to be an investigation and open discussion of how these resources can best be used. Already, agencies within the United Nations possess considerable expertise in the use of space technologies in the area of disaster management. If this capability is to be used, there will need to be inter-agency coordination, not to mention a further expansion and development of the United Nations role in both Afghanistan and Iraq.

  18. The understanding of co-owners' rights in the context of the genesis of environmental rights

    Directory of Open Access Journals (Sweden)

    Kudeikina I.

    2014-01-01

    Full Text Available Environmental rights obtain a special importance in the context of real distribution of joint property. The common practice, where the building regulations are applied to legal relationships when carrying out the real distribution of a joint property, is associated with the genesis of environmental rights, but cannot be supported by the doctrine of absolutism of the property rights. In this Article, the author analyzes the legal reasoning and legal consequences of applicability of environmental rights. The essence of real distribution of joint property is the termination of the joint property as a legal act without a target of environmental transformation. The real distribution of joint property is not an action leaving any environmental impacts. The author concludes that the application of the environmental rights to the real distribution of the joint property unreasonably limits the property rights of co-owners.

  19. Understanding and managing environmental liability in the Saskatchewan oil and gas industry

    International Nuclear Information System (INIS)

    Andrychuk, L.D.; LeBlanc, L.B.

    1998-01-01

    An overview of Saskatchewan legislative framework regarding the oil and gas industry was presented. In the oil and gas industry, environmental issues are regulated at the provincial level, but the industry must also be aware of federal environmental law when dealing with federal lands, federal financial assistance, interprovincial or international projects or projects which have transboundary environmental effects. In this context, the provisions of the Oil and Gas Conservation Act (OGCA) and the Oil and Gas Conservation Regulations (OGCR), the licensing of oil and gas wells, the acquisition and surrender of surface rights, and the procedures involved in environmental assessment approval were outlined. Emission control, air pollution abatement, the storage and disposal of hazardous materials, environmental issues in property transactions, and corporate environmental management are also subject to regulation under OGCA and OGCR. 42 refs

  20. The United States and Environmental Security: Deforestation and Conflict in Southeast Asia

    Science.gov (United States)

    1992-06-01

    October 1991, Prime Minister Mahatir spoke out strongly against thle campaigns of western green groups. Individually we will be victlims of’ these global...conference onl environmental problems held in Kuala Lumpur on 26-29 April 1992, Mahatir once again placed thle environmient within the North-South...In a letter addressed to Prime Minister Mahatir , dated 19 February 1992, the groups expressed their concern for Mutang and requested his immediate and

  1. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  2. Rooted in the Soil: How Understanding the Perspectives of Landowners Can Enhance the Management of Environmental Disputes.

    Science.gov (United States)

    Peterson, Tarla Rai; Horton, Cristi Choat

    1995-01-01

    Uses mythic criticism to examine missed opportunities for identifying with landowners in ways that would enhance the constructive management of environmental disputes. Offers an alternative mythic understanding of the American West drawn from discourse with Texas ranchers. Argues for the inclusion of communities that are directly influenced, yet…

  3. The role of Latin America's land and water resources for global food security: environmental trade-offs of future food production pathways.

    Science.gov (United States)

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity's major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC's agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)-a global dynamic partial equilibrium model of the agricultural sector-to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths.

  4. The Role of Latin America’s Land and Water Resources for Global Food Security: Environmental Trade-Offs of Future Food Production Pathways

    Science.gov (United States)

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D.; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity’s major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC’s agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)—a global dynamic partial equilibrium model of the agricultural sector—to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths. PMID:25617621

  5. The Legacy Effect: Understanding How Segregation and Environmental Injustice Unfold over Time in Baltimore

    Science.gov (United States)

    Morgan Grove; Laura Ogden; Steward Pickett; Chris Boone; Geoff Buckley; Dexter H. Locke; Charlie Lord; Billy Hall

    2018-01-01

    Legacies of social and environmental injustices can leave an imprint on the present and constrain transitions for more sustainable futures. In this article, we ask this question: What is the relationship of environmental inequality and histories of segregation? The answer for Baltimore is complex, where past practices of de jure and de facto segregation have created...

  6. Understanding the environmental implications of energy transitions. A case study for wind power

    Energy Technology Data Exchange (ETDEWEB)

    Arvesen, Anders

    2013-03-01

    A fundamental change in the ways in which we provide energy to run our economies, an energy transition, is needed to mitigate climate change. Wind power is an important part of future global energy supply in most energy scenarios. This thesis aims to contribute to a better understanding of the environmental implications of energy transitions, primarily by examining the case of wind power. This involves new investigations of both potential negative impacts of wind power and the positive role of the technology in emission reduction, as well as a critical review of past research. Three papers on wind power are presented: a comprehensive literature review of life cycle assessments (LCA) of wind power, a scenario-based LCA of large-scale adoption of wind power, and an LCA of an offshore wind farm. A hybrid LCA methodology is employed in the scenario-based LCA and LCA of an offshore wind farm. Another paper is presented which is not concerned with wind power in particular, but takes the form of an evaluation of limitations of climate change mitigation literature. It helps to achieve the aim stated above by bringing together knowledge of indirect effects of mitigation measures, and by elucidating how these effects may influence the viability of proposed mitigation strategies. The literature review aims to take stock of insights from past research, with a particular view to identifying remaining challenges. A survey of results indicates 0.063 ({+-}0.061) and 0.055 ({+-}0.037) kWh energy used and 20 ({+-}14) and 16 ({+-}10) Co2 emitted per kWh electricity for onshore and offshore cases. Evidence suggests strong positive effects of scale in the lower end of the turbine size spectrum, but is inconclusive for the megawatt range. LCAs tend to assume higher capacity factors than current real-world averages. Limitations of existing research are discussed; this includes poorly understood toxicity and resource depletion impacts, cut-off errors and seemingly inconsistent modelling

  7. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  8. Expanding electricity capacity in Thailand to meet the twin challenges of supply security and environmental protection

    International Nuclear Information System (INIS)

    Nakawiro, Thanawat; Bhattacharyya, Subhes C.; Limmeechokchai, Bundit

    2008-01-01

    Rapid growth in electricity demand in Thailand is a major challenge for electric utilities trying to ensure adequate supply. Continued reliance on natural gas for power supply makes the supply mix non-diversified and exposes the country to supply risks while a diversification to other fossil fuels imposes additional environmental burdens. To find an acceptable solution to this twin challenge, this paper assesses four scenarios of electricity capacity expansion planning for Thailand for the period between 2011 and 2025 under two different assumptions of fuel prices to reflect the case of international high oil price affecting cost of fuels for power generation in Thailand. It is found that the lowest environmental emissions are obtained from the scenario where power generation is highly dominated by natural gas. In contrast, the least cost electricity generation is achieved from the case if nuclear power plant is added into the Thai power system. Reliance on natural gas for power generation increases the spending on gas purchase as a share of the gross domestic product (GDP) - between 2.38% and 3.61% of (GDP). In addition, fuel import dependence, particularly for natural gas and coal, increases exposing the country to possible price volatility. (author)

  9. Streamlined Approach for Environmental Restoration Plan for Corrective Action Unit 574: Neptune, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2011-08-31

    This Streamlined Approach for Environmental Restoration (SAFER) Plan identifies the activities required for closure of Corrective Action Unit (CAU) 574, Neptune. CAU 574 is included in the Federal Facility Agreement and Consent Order (FFACO) (1996 [as amended March 2010]) and consists of the following two Corrective Action Sites (CASs) located in Area 12 of the Nevada National Security Site: (1) CAS 12-23-10, U12c.03 Crater (Neptune); (2) CAS 12-45-01, U12e.05 Crater (Blanca). This plan provides the methodology for the field activities that will be performed to gather the necessary information for closure of the two CASs. There is sufficient information and process knowledge regarding the expected nature and extent of potential contaminants to recommend closure of CAU 574 using the SAFER process. Based on historical documentation, personnel interviews, site process knowledge, site visits, photographs, field screening, analytical results, the results of the data quality objective (DQO) process (Section 3.0), and an evaluation of corrective action alternatives (Appendix B), closure in place with administrative controls is the expected closure strategy for CAU 574. Additional information will be obtained by conducting a field investigation to verify and support the expected closure strategy and provide a defensible recommendation that no further corrective action is necessary. This will be presented in a Closure Report that will be prepared and submitted to the Nevada Division of Environmental Protection (NDEP) for review and approval.

  10. EVALUATION OF THE INFLUENCE OF THE STATE OF ENVIRONMENTAL SECURITY OF THE POPULATION OF KYIV ON THE LEVEL OF MORBIDITY

    Directory of Open Access Journals (Sweden)

    Maryna Kirova

    2017-08-01

    Fundamentals of National Security of Ukraine" to the priorities of the national interests of Ukraine (Article 6. The environment is considered safe when its state meets the criteria, standards, limits and norms, established in the legislation, concerning its purity (non-contamination, resource intensity (non-extinction, environmental sustainability, sanitary requirements, species diversity, and ability to satisfy citizens' interests. Today there is an increase in anthropogenic impact on the atmosphere, which is manifested mainly due to its pollution, and therefore inevitably affects the state of ecosystems and human health. That is why the study of problems associated with atmospheric air pollution - an extremely important natural component of human life and human life - is now becoming particularly acute and urgent. At present, the total air pollution in the large and medium-sized cities of Ukraine is 2-4 times higher than the permissible level and is dangerous for the health of the population. Consequently, the problems of ensuring environmental safety for the population of Kyiv, as many large cities of Ukraine, are very relevant. In connection with this, the article establishes a direct relationship between the increase in the concentration of harmful substances in the air of the contaminated area and the increase in the incidence of the population in the context of environmental safety.

  11. Introducing the Green Protein Footprint method as an understandable measure of the environmental cost of anchovy consumption.

    Science.gov (United States)

    Laso, Jara; Margallo, María; Serrano, María; Vázquez-Rowe, Ian; Avadí, Angel; Fullana, Pere; Bala, Alba; Gazulla, Cristina; Irabien, Ángel; Aldaco, Rubén

    2018-04-15

    In a global framework of growing concern for food security and environmental protection, the selection of food products with higher protein content and lower environmental impact is a challenge. To assess the reliability of different strategies along the food supply chain, a measure of food cost through the environmental impact-protein content binomial is necessary. This study proposes a standardized method to calculate the Green Protein Footprint (GPF) index, a method that assesses both the environmental impact of a food product and its protein content provided to consumers. Life Cycle Assessment (LCA) was used to calculate the environmental impact of the selected food products, and a Life Cycle Protein Assessment (LCPA) was performed by accounting for the protein content along the supply chain. Although the GPF can be applied to all food chain products, this paper is focused on European anchovy-based products for indirect human consumption (fishmeal) and for direct human consumption (fresh, salted and canned anchovies). Moreover, the circular economy concept was applied considering the valorization of the anchovy residues generated during the canning process. These residues were used to produce fishmeal, which was employed in bass aquaculture. Hence, humans are finally consuming fish protein from the residues, closing the loop of the original product life cycle. More elaborated, multi-ingredient food products (salted and canned anchovy products), presented higher GPF values due to higher environmental impacts. Furthermore, the increase of food loss throughout their life cycle caused a decrease in the protein content. Regarding salted and canned products, the packaging was the main hotspot. The influence of the packaging was evaluated using the GPF, reaffirming that plastic was the best alternative. These results highlighted the importance of improving packaging materials in food products. Copyright © 2017. Published by Elsevier B.V.

  12. Optimizing Green Computing Awareness for Environmental Sustainability and Economic Security as a Stochastic Optimization Problem

    Directory of Open Access Journals (Sweden)

    Emmanuel Okewu

    2017-10-01

    Full Text Available The role of automation in sustainable development is not in doubt. Computerization in particular has permeated every facet of human endeavour, enhancing the provision of information for decision-making that reduces cost of operation, promotes productivity and socioeconomic prosperity and cohesion. Hence, a new field called information and communication technology for development (ICT4D has emerged. Nonetheless, the need to ensure environmentally friendly computing has led to this research study with particular focus on green computing in Africa. This is against the backdrop that the continent is feared to suffer most from the vulnerability of climate change and the impact of environmental risk. Using Nigeria as a test case, this paper gauges the green computing awareness level of Africans via sample survey. It also attempts to institutionalize green computing maturity model with a view to optimizing the level of citizens awareness amid inherent uncertainties like low bandwidth, poor network and erratic power in an emerging African market. Consequently, we classified the problem as a stochastic optimization problem and applied metaheuristic search algorithm to determine the best sensitization strategy. Although there are alternative ways of promoting green computing education, the metaheuristic search we conducted indicated that an online real-time solution that not only drives but preserves timely conversations on electronic waste (e-waste management and energy saving techniques among the citizenry is cutting edge. The authors therefore reviewed literature, gathered requirements, modelled the proposed solution using Universal Modelling Language (UML and developed a prototype. The proposed solution is a web-based multi-tier e-Green computing system that educates computer users on innovative techniques of managing computers and accessories in an environmentally friendly way. We found out that such a real-time web-based interactive forum does not

  13. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source

    International Nuclear Information System (INIS)

    Tsvetkov, Pavel Valeryevich; Rodriguez, Salvador B.; Ames, David E. II; Rochau, Gary Eugene

    2009-01-01

    The impact associated with energy generation and utilization is immeasurable due to the immense, widespread, and myriad effects it has on the world and its inhabitants. The polar extremes are demonstrated on the one hand, by the high quality of life enjoyed by individuals with access to abundant reliable energy sources, and on the other hand by the global-scale environmental degradation attributed to the affects of energy production and use. Thus, nations strive to increase their energy generation, but are faced with the challenge of doing so with a minimal impact on the environment and in a manner that is self-reliant. Consequently, a revival of interest in nuclear energy has followed, with much focus placed on technologies for transmuting nuclear spent fuel. The performed research investigates nuclear energy systems that optimize the destruction of nuclear waste. In the context of this effort, nuclear energy system is defined as a configuration of nuclear reactors and corresponding fuel cycle components. The proposed system has unique characteristics that set it apart from other systems. Most notably the dedicated High-Energy External Source Transmuter (HEST), which is envisioned as an advanced incinerator used in combination with thermal reactors. The system is configured for examining environmentally benign fuel cycle options by focusing on minimization or elimination of high level waste inventories. Detailed high-fidelity exact-geometry models were developed for representative reactor configurations. They were used in preliminary calculations with Monte Carlo N-Particle eXtented (MCNPX) and Standardized Computer Analysis for Licensing Evaluation (SCALE) code systems. The reactor models have been benchmarked against existing experimental data and design data. Simulink(reg s ign), an extension of MATLAB(reg s ign), is envisioned as the interface environment for constructing the nuclear energy system model by linking the individual reactor and fuel component sub

  14. Critical Knowledge Gaps in Our Understanding of Environmental Cycling and Transmission of Leptospira spp.

    Science.gov (United States)

    Barragan, Veronica; Olivas, Sonora; Keim, Paul; Pearson, Talima

    2017-10-01

    Exposure to soil or water contaminated with the urine of Leptospira -infected animals is the most common way in which humans contract leptospirosis. Entire populations can be at high risk of leptospirosis while working in inundated fields, when engaging in aquatic sports, or after periods of heavy rainfall. The risk of infection after contact with these environmental sources depends on the ability of Leptospira bacteria to survive, persist, and infect new hosts. Multiple variables such as soil and water pH, temperature, and even environmental microbial communities are likely to shape the environmental conditions needed by the pathogen to persist. Here we review what is known about the environmental phase of the infectious Leptospira transmission cycle and identify knowledge gaps that will serve as a guide for future research. Copyright © 2017 Barragan et al.

  15. Understanding Crisis-based Communication on Environmental Protection in China : Mass Media and Individuals

    OpenAIRE

    Huang, Bo; Yabe, Mitsuyasu; Xia, Wei; Zeng, Yinchu; 矢部, 光保

    2010-01-01

    Beijing has been frequently stroked by sandstorms. During the occurrence of sandstorms, related information increased dramatically due to mass media. How did the mass media in China react to the sandstorm crisis? Did the crisis arouse public awareness of environmental protection? Were the majority willing to pay an environmental tax for air quality improvement? In response to these questions, the purpose of this study is to analyze the impacts of a short-term information explosion from mass m...

  16. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, M.; Mandere, N.; Olsson, L. [Lund Univ., Centre for Sustainability Studies (LUCSUS) (Sweden)

    2006-07-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  17. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    International Nuclear Information System (INIS)

    Zakaria, M.; Mandere, N.; Olsson, L.

    2006-01-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  18. Tensions of network security and collaborative work practice: understanding a single sign-on deployment in a regional hospital.

    Science.gov (United States)

    Heckle, Rosa R; Lutters, Wayne G

    2011-08-01

    Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. Single sign-on (SSO) promises to improve usability of authentication for multiple-system users, increase compliance, and help curb system maintenance costs. However, complexities are introduced when SSO is placed within a collaborative environment. These complexities include unanticipated workflow implications that introduce greater security vulnerability for the individual user. OBJECTIVES AND METHODOLOGY: In this work, we examine the challenges of implementing a single sign-on authentication technology in a hospital environment. The aim of the study was to document the factors that affected SSO adoption within the context of use. The ultimate goal is to better inform the design of usable authentication systems within collaborative healthcare work sites. The primary data collection techniques used are ethnographically informed - observation, contextual interviews, and document review. The study included a cross-section of individuals from various departments and varying rolls. These participants were a mix of both clinical and administrative staff, as well as the Information Technology group. The field work revealed fundamental mis-matches between the technology and routine work practices that will significantly impact its effective adoption. While single sign-on was effective in the administrative offices, SSO was not a good fit for collaborative areas. The collaborative needs of the clinical staff unearthed tensions in its implementation. An analysis of the findings revealed that the workflow, activities, and physical environment of the clinical areas create increased security vulnerabilities for the individual user. The clinical users were cognizant of these vulnerabilities and this created resistance to the implementation due

  19. The use of ‘macro’ legal analysis in the understanding and development of global environmental governance

    OpenAIRE

    Turner, Stephen J.

    2017-01-01

    This article examines the manner in which ‘macro’ legal analysis can potentially assist in overcoming some of the issues that are faced in the understanding and development of global environmental governance (GEG). It argues that the analysis of law through separate and distinct disciplines such as environmental law, trade law, corporate law, and human rights law, results in what this article refers to as ‘micro’ legal analysis. As such, it contends that this can have the effect of creating o...

  20. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source

    International Nuclear Information System (INIS)

    Tsvetkov, Pavel Valeryevich; Rodriguez, Salvador B.; Ames, David E. II; Rochau, Gary Eugene

    2010-01-01

    A new high-fidelity integrated system method and analysis approach was developed and implemented for consistent and comprehensive evaluations of advanced fuel cycles leading to minimized Transuranic (TRU) inventories. The method has been implemented in a developed code system integrating capabilities of Monte Carlo N - Particle Extended (MCNPX) for high-fidelity fuel cycle component simulations. In this report, a Nuclear Energy System (NES) configuration was developed to take advantage of used fuel recycling and transmutation capabilities in waste management scenarios leading to minimized TRU waste inventories, long-term activities, and radiotoxicities. The reactor systems and fuel cycle components that make up the NES were selected for their ability to perform in tandem to produce clean, safe, and dependable energy in an environmentally conscious manner. The diversity in performance and spectral characteristics were used to enhance TRU waste elimination while efficiently utilizing uranium resources and providing an abundant energy source. A computational modeling approach was developed for integrating the individual models of the NES. A general approach was utilized allowing for the Integrated System Model (ISM) to be modified in order to provide simulation for other systems with similar attributes. By utilizing this approach, the ISM is capable of performing system evaluations under many different design parameter options. Additionally, the predictive capabilities of the ISM and its computational time efficiency allow for system sensitivity/uncertainty analysis and the implementation of optimization techniques.

  1. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source.

    Energy Technology Data Exchange (ETDEWEB)

    Tsvetkov, Pavel Valeryevich (Texas A& M University, College Station, TX); Rodriguez, Salvador B.; Ames, David E., II (Texas A& M University, College Station, TX); Rochau, Gary Eugene

    2010-10-01

    A new high-fidelity integrated system method and analysis approach was developed and implemented for consistent and comprehensive evaluations of advanced fuel cycles leading to minimized Transuranic (TRU) inventories. The method has been implemented in a developed code system integrating capabilities of Monte Carlo N - Particle Extended (MCNPX) for high-fidelity fuel cycle component simulations. In this report, a Nuclear Energy System (NES) configuration was developed to take advantage of used fuel recycling and transmutation capabilities in waste management scenarios leading to minimized TRU waste inventories, long-term activities, and radiotoxicities. The reactor systems and fuel cycle components that make up the NES were selected for their ability to perform in tandem to produce clean, safe, and dependable energy in an environmentally conscious manner. The diversity in performance and spectral characteristics were used to enhance TRU waste elimination while efficiently utilizing uranium resources and providing an abundant energy source. A computational modeling approach was developed for integrating the individual models of the NES. A general approach was utilized allowing for the Integrated System Model (ISM) to be modified in order to provide simulation for other systems with similar attributes. By utilizing this approach, the ISM is capable of performing system evaluations under many different design parameter options. Additionally, the predictive capabilities of the ISM and its computational time efficiency allow for system sensitivity/uncertainty analysis and the implementation of optimization techniques.

  2. Understanding and valuing environmental issues: the effects of availability and anchoring on judgment.

    Science.gov (United States)

    van der Pligt, J; van Schie, E C; Hoevenagel, R

    1998-01-01

    This paper addresses the effects of availability and anchoring-and-adjustment on people's beliefs and values concerning environmental issues. The first three studies focus on lay people's perceptions of the causes of large scale environmental risks, the second series of three studies deals with how people value environmental goods and how much they are prepared to pay to mitigate environmental risks. In studies 1-3 we investigate the effects of availability and anchoring-and-adjustment on estimating the contribution of various factors to large scale environmental risks. Highly complex risks such as acid rain and global warming tend to be associated with multiple causes, and our results show that estimating the role of these causes is clearly affected by availability and anchoring-and-adjustment. Both have sizeable effects and persist over time. Moreover, corrective procedures only seem to have a limited effect. Availability and anchoring-and-adjustment not only play a role in judging the possible causes of risks; they also play a role in research attempting to assess the public's willingness to pay (WTP) to protect our environment. The outcomes of WTP surveys are often used as a tool to help policy decision making. In the second part of this article we present three studies on this issue. Results provide further evidence of the impact of the two heuristics on the outcomes of WTP research. Implications for research and practice are briefly discussed.

  3. Using a novel environmental quality measure to understand population-level physical inactivity

    Science.gov (United States)

    Physical inactivity has been associated with numerous adverse health outcomes including obesity, heart disease, and depression, and is considered a major contributor to all-cause mortality worldwide. Understanding the role of the overall ambient environment in population inactivi...

  4. A synoptic summary approach to better understanding groundwater contamination problems and evaluating long-term environmental consequences

    International Nuclear Information System (INIS)

    Nelson, R.W.

    1990-09-01

    A summary approach has been developed within groundwater hydrology to communicate with a broad audience and more completely evaluate the long-term impacts of subsurface contamination problems. This synoptic approach both highlights the dominant features occurring in subsurface contamination problems and emphasizes the information required to determine the long-term environmental impacts. The special merit of a summary approach is in providing a better understanding of subsurface contamination problems to adjoining technical disciplines, public decision makers, and private citizens. 14 refs

  5. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  6. Integrating Process and Factor Understanding of Environmental Innovation by Water Utilities

    NARCIS (Netherlands)

    Spiller, Marc; McIntosh, Brian S.; Seaton, Roger A.F.; Jeffrey, Paul J.

    2015-01-01

    Innovations in technology and organisations are central to enabling the water sector to adapt to major environmental changes such as climate change, land degradation or drinking water pollution. While there are literatures on innovation as a process and on the factors that influence it, there is

  7. Understanding Our Energy Footprint: Undergraduate Chemistry Laboratory Investigation of Environmental Impacts of Solid Fossil Fuel Wastes

    Science.gov (United States)

    Berger, Michael; Goldfarb, Jillian L.

    2017-01-01

    Engaging undergraduates in the environmental consequences of fossil fuel usage primes them to consider their own anthropogenic impact, and the benefits and trade-offs of converting to renewable fuel strategies. This laboratory activity explores the potential contaminants (both inorganic and organic) present in the raw fuel and solid waste…

  8. Chemical approaches to understanding the environmental behavior of Pu, Np, and Tc

    International Nuclear Information System (INIS)

    Bondietti, E.A.

    1978-01-01

    Some topics discussed are as follows: speciation behavior of Pu, Np, and Tc; thermodynamic and radiochemical behavior; sorption studies with soils; Pu oxidation states in fresh water; Np oxidation states in soils; effect of oxidation state of Tc on environmental transport predictions; and thermodynamic calculations of Tc speciation

  9. Understanding environmental DNA detection probabilities: A case study using a stream-dwelling char Salvelinus fontinalis

    Science.gov (United States)

    Taylor M. Wilcox; Kevin S. McKelvey; Michael K. Young; Adam J. Sepulveda; Bradley B. Shepard; Stephen F. Jane; Andrew R. Whiteley; Winsor H. Lowe; Michael K. Schwartz

    2016-01-01

    Environmental DNA sampling (eDNA) has emerged as a powerful tool for detecting aquatic animals. Previous research suggests that eDNA methods are substantially more sensitive than traditional sampling. However, the factors influencing eDNA detection and the resulting sampling costs are still not well understood. Here we use multiple experiments to derive...

  10. Developments since 2005 in understanding potential environmental impacts of CO2 leakage from geological storage

    NARCIS (Netherlands)

    Jones, D.G.; Beaubien, S.E.; Blackford, J.C.; Foekema, E.M.; Lions, J.; Vittor, de C.; West, J.M.; Widdicombe, S.; Hauton, C.; Queiros, A.M.

    2015-01-01

    This paper reviews research into the potential environmental impacts of leakage from geological storage of CO2 since the publication of the IPCC Special Report on Carbon Dioxide Capture and Storage in 2005. Possible impacts are considered on onshore (including drinking water aquifers) and offshore

  11. The premises is the premise: understanding off- and on-premises alcohol sales outlets to improve environmental alcohol prevention strategies.

    Science.gov (United States)

    Chinman, Matthew; Burkhart, Q; Ebener, Patricia; Fan, Cha-Chi; Imm, Pamela; Osilla, Karen Chan; Paddock, Susan M; Wright, Annie

    2011-06-01

    Environmental strategies to prevent the misuse of alcohol among youth--e.g., use of public policies to restrict minors' access to alcohol--have been shown to reduce underage drinking. However, implementation of policy changes often requires public and private partnerships. One way to support these partnerships is to better understand the target of many of the environmental strategies, which is the alcohol sales outlet. Knowing more about how off-premises outlets (e.g., liquor and convenience stores) and on-premises outlets (e.g., bars and restaurants) are alike and different could help community-based organizations better tailor, plan, and implement their environmental strategies and strengthen partnerships between the public and commercial sectors. We conducted a survey of managerial or supervisory staff and/or owners of 336 off- and on-premises alcohol outlets in six counties in South Carolina, comparing these two outlet types on their preferences regarding certain alcohol sales practices, beliefs toward underage drinking, alcohol sales practices, and outcomes. Multilevel logistic regression showed that while off- and on-premises outlets did have many similarities, off-premises outlets appear to engage in more practices designed to prevent sales of alcohol to minors than on-premises outlets. The relationship between certain Responsible Beverage Service (RBS) practices and outcomes varied by outlet type. This study furthers the understanding of the differences between off- and on-premises alcohol sales outlets and offers options for increasing and tailoring environmental prevention efforts to specific settings.

  12. A Micro and Mesocosm Approach to Understanding the Response of Branched GDGTs to Environmental Perturbation

    Science.gov (United States)

    Martínez-Sosa, P.; Tierney, J. E.; Castañeda, I. S.

    2017-12-01

    Branched glycerol dialkyl glycerol tetraethers (brGDGTs) are membrane lipids with 15 known structures. Thought to be synthesized by bacteria, they are found in peatlands, soils, near-shore marine sediments and lakes. Previous studies have reported a correlation between the number and position of methyl groups and cyclopentane moieties in these lipids with environmental factors such as pH and temperature, leading to the creation of the methylation and cyclisation indices (MBT and CBT respectively). Although an empirical relationship between these structural modifications and environmental conditions has been described, the source organism for these molecules remains unknown. Lacking pure cultures of brGDGT producing bacteria, a different approach is necessary to study their response to environmental perturbations under controlled conditions. To this end, we studied the production of brGDGTs in water from two fishing lakes in Arizona using a series of microcosms, comprised by 1L flasks filled with environmental water; and mesocosm experiments, where two 20L tanks were filled with either lake water or lake water and synthetic sediments. This experimental design allowed us to modify environmental factors while preserving the natural conditions of the sample. Our experiments point to a production of brGDGTs on the suspended particulate matter in the water column, which appears to contribute to some extent to the presence of this molecules on lake sediments. Furthermore, we observed a shift in the ratio between 5' and 6' isomers related to both the presence of a carbon source and temperature. Limited oxygen availability appears to correlate with higher brGDGT concentration. Notably, we find that methylation decreases with increasing temperature in our experiments at a rate that is roughly in agreement with empirical observations. To our knowledge, these experiments provide the first evidence of growth and alteration of brGDGTs under laboratory conditions, which could be

  13. Genetics and evolution of function-valued traits: understanding environmentally responsive phenotypes.

    Science.gov (United States)

    Stinchcombe, John R; Kirkpatrick, Mark

    2012-11-01

    Many central questions in ecology and evolutionary biology require characterizing phenotypes that change with time and environmental conditions. Such traits are inherently functions, and new 'function-valued' methods use the order, spacing, and functional nature of the data typically ignored by traditional univariate and multivariate analyses. These rapidly developing methods account for the continuous change in traits of interest in response to other variables, and are superior to traditional summary-based analyses for growth trajectories, morphological shapes, and environmentally sensitive phenotypes. Here, we explain how function-valued methods make flexible use of data and lead to new biological insights. These approaches frequently offer enhanced statistical power, a natural basis of interpretation, and are applicable to many existing data sets. We also illustrate applications of function-valued methods to address ecological, evolutionary, and behavioral hypotheses, and highlight future directions. Copyright © 2012 Elsevier Ltd. All rights reserved.

  14. Using Interactive Case Studies to Support Students Understandings of Local Environmental Problems

    Directory of Open Access Journals (Sweden)

    Z. Kostova

    2012-12-01

    Full Text Available The article presents designed and refined an interactive-enhanced curriculum module for 9th grade secondary school students in Bulgaria, based on environmental case studies. In the module activities students from two schools studied the local environments, performed observations and experiments, collected and analyzed data, prepared and presented posters and role plays, made connections between scientific processes and socio-scientific issues and drew conclusions about the global effects of locally created environmental problems. The students’ critical observations of the quality of their surroundings helped them to make a list of local environmental problems, to apply interactive strategies in studying them and to propose rational scientifically based solutions. In the study the attention was directed to the advantages and disadvantages of poster presentations and role playing and to the specific learning difficulties that students had to overcome. Students’ achievements from the two experimental schools were assessed independently in order to give us insights into the details of learning using different interactive strategies and into the acquired performance skills, dependant on students’ interests and personal abilities. The three versions of the module (traditional, dominated by teacher presentation; poster preparation and presentation in which students imitate scientific team research; and role playing in which students not only study the local environmental problems but assume social roles to cope with them demonstrate three levels of students learning independence. Specific assessment tests and check lists were developed for analyzing, evaluating and comparing students’ achievements in each version of the module and in each school. Ecological knowledge assessment tests were based on Bloom’s taxonomy of educational objectives. Poster and role playing preparations and presentations were assessed by specific criteria, shown in the

  15. Educational understanding of pollution prevention in decontamination and decommissioning/environmental restoration activities

    International Nuclear Information System (INIS)

    Betsch, M.D.; Lewis, R.A.

    1995-05-01

    Demolishing outdated structures from the US Department of Energy Hanford Site in Washington, generates large quantities of waste which can be minimized. The Hanford cleanup is one of the world's largest and most complex environmental restoration efforts. Approximately 280 square miles of ground water and soil are contaminated; there are more than 80 surplus facilities, including nine shut-down nuclear reactors in various stages of decay; and there are 177 underground waste storage tanks containing highly radioactive waste. In all, 1,500 cleanup sites have been identified and the Environmental Restoration Contractor (ERC) is currently responsible for surveillance and maintenance of 170 structures. A two hour orientation training in pollution prevention was developed by the Westinghouse Hanford Company to provide all Decontamination and Decommissioning/Environmental Restoration (D ampersand D/ER) personnel with the knowledge to apply waste minimization principles during their cleanup activities. The ERC Team Pollution Prevention Workshop serves to communicate pollution prevention philosophies and influences the way D ampersand D/ER projects are conducted at the Hanford Site

  16. A phenomenological understanding of residents' emotional distress of living in an environmental justice community.

    Science.gov (United States)

    Dory, Gabriela; Qiu, Zeyuan; Qiu, Christina M; Fu, Mei R; Ryan, Caitlin E

    2017-12-01

    Deteriorative environmental conditions in environmental justice (EJ) communities not only post direct health risks such as chronic illnesses, but also cause emotional distress such as anxiety, fear, and anger among residents, which may further exacerbate health risks. This study applies a descriptive phenomenological method to explore and describe the emotional experience of residents living in Ironbound, a known EJ community located in Newark, New Jersey. Twenty-three residents participated in the study. Four essential themes regarding the residents' emotional experiences were elicited from 43 interviews: (1) being worried about the harmful effects of the surrounding pollution; (2) being distressed by the known historical pollution sources; (3) being frustrated by the unheard voices and/or lack of responses; and (4) being angered by the ongoing pollution sources. Participants not only expressed their emotions of worry, distress, frustration, and anger in detail but also described reasons or situations that provoked such negative emotions. Such detailed depictions provide insights into potential meaningful strategies to improve residents' psychological wellbeing by alleviating negative emotions and meaningfully engaging residents in developing, implementing, and enforcing environmental laws, regulations, and policies to achieve EJ goals.

  17. Understanding tourists’ perceptions of distance: a key to reducing the environmental impacts of tourism mobility

    DEFF Research Database (Denmark)

    Larsen, Gunvor Riber; Guiver, Jo W

    2013-01-01

    This paper seeks to understand how tourists might reduce their travel distances by better understanding their perception and “performance” of distances to destinations. Travel accounts for 75% of tourism's GHG emissions, the majority from flying. Tourist travel distances are growing rapidly...... to scales including cost, time and cultural difference to express relative distances. Some distances were seen as “zonal”, (e.g. “away from home” or “sun and sea” or winter sports destinations), others “ordinal”, having degrees of difference, time or costs to cross. The desire for distance also resulted...

  18. Collaboration with East African security organisations

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja L.

    2012-01-01

    of the concept. At the same time the three organisations represent different constellations of member nations and thus different national interests, and locally they have different legitimacy and political strength. Thus, when choosing collaboration partners for a security project it is not simply a question......When it comes to understanding the concept of security and the way fragile security situations should be solved, the difference is big. While EASF – the East African Standby Force – is a regular military force with a rather traditional, military perception of the concept of security, EAC (East...... African Community) and IGAD (Intergovernmental Authority on Development) have broader perceptions of the concept. According to EAC, security also concerns matters such as policy reform, legislation, education and infrastructure. IGAD considers food security and environmental and economic issues as part...

  19. Children's and Adolescents' Thoughts on Pollution: Cognitive Abilities Required to Understand Environmental Systems

    Science.gov (United States)

    Rodríguez, Manuel; Kohen, Raquel; Delval, Juan

    2015-01-01

    Pollution phenomena are complex systems in which different parts are integrated by means of causal and temporal relationships. To understand pollution, children must develop some cognitive abilities related to system thinking and temporal and causal inferential reasoning. These cognitive abilities constrain and guide how children understand…

  20. How Understandings Colour the Means and Ends in the Case of Environmental Innovations

    DEFF Research Database (Denmark)

    Holgaard, Jette Egelund

    2002-01-01

    Different understandings of the concept of innovation have resulted in different means and ends in the innovation activities within Dan-ish industry. The different emphasis on economic, technical, organ-isational, inter-organisational and institutional issues in product and process-innovation has...

  1. Understanding social complexity within the wildland urban interface: A new species of human habitation? Environmental Management

    Science.gov (United States)

    Travis B. Paveglio; Pamela J. Jakes; Matthew S. Carroll; Daniel R. Williams

    2009-01-01

    The lack of knowledge regarding social diversity in the Wildland Urban Interface (WUI) or an in-depth understanding of the ways people living there interact to address common problems is concerning, perhaps even dangerous, given that community action is necessary for successful wildland fire preparedness and natural resource management activities. In this article, we...

  2. Integrated approach to the understanding of the degradation of an urban river: local perceptions, environmental parameters and geoprocessing.

    Science.gov (United States)

    Collier, Carolina A; Almeida Neto, Miguel S de; Aretakis, Gabriela M A; Santos, Rangel E; de Oliveira, Tiago H; Mourão, José S; Severi, William; El-Deir, Ana C A

    2015-09-15

    The use of interdisciplinary approaches such as the proposed report provides a broad understanding of the relationship between people and the environment, revealing reliable aspects not previously considered in the study of this relationship. This study compiled evidence on the environmental degradation of an urbanized river over the past few decades, providing a diagnosis of the consequences of this process for the river, its ichthyofauna, and the local human population. The study was focused on the Beira Rio community on the Capibaribe River in the municipality of São Lourenço da Mata, Pernambuco, Brazil. Data were collected using geoprocessing and ethnobiological approaches, as well as environmental parameters. This research was conducted with the most experienced long-term residents in the local community, through interviews and participatory methodologies to recovering information about the river environment, its ichthyofauna and its environmental services for the last decades. According to the GIS analysis, the study area was subject to an accelerated process of urbanization, with the total urban area increasing from 73 565, 98 m(2) in 1974 to 383 363, 6 m(2) in 2005. The informants perceived the urban growth, especially in the late twentieth century, being this period recognized as the phase of greatest negative changes in the river environment. The perceived decline of fish stocks was indicated by the community as one of the effects of river degradation. According to the interviews, the deterioration of the river affected the ecosystem services and the relationship of the adjacent human community with this ecosystem. The environmental data indicated that the river is suffering eutrophization and has fecal coliform concentrations 160 times higher than the maximum level permitted by Brazilian legislation. The interdisciplinary approach used in this research allowed the understanding of the degradation process of an urban river and some negative effects

  3. Effective Two-way Communication of Environmental Hazards: Understanding Public Perception in the UK

    Science.gov (United States)

    Lorono-Leturiondo, Maria; O'Hare, Paul; Cook, Simon; Hoon, Stephen R.; Illingworth, Sam

    2017-04-01

    Climate change intensified hazards, such as floods and landslides, require exploring renewed ways of protecting at-risk communities (World Economic Forum 2016). Scientists are being encouraged to explore new pathways to work closely with affected communities in search of experiential knowledge that is able to complement and extend scientific knowledge (see for instance Whatmore and Landström 2011 and Höpner et al. 2010). Effective two-way communication of environmental hazards is, however, a challenge. Besides considering factors such as the purpose of communication, or the characteristics of the different formats; effective communication has to carefully acknowledge the personal framework of the individuals involved. Existing experiences, values, beliefs, and needs are critical determinants of the way they perceive and relate to these hazards, and in turn, of the communication process in which they are involved (Longnecker 2016 and Gibson et al. 2016). Our study builds on the need to analyze how the public perceives environmental hazards in order to establish forms of communication that work. Here we present early findings of a survey analysing the UK public's perception and outline how survey results can guide more effective two-way communication practices between scientists and affected communities. We explore the perception of environmental hazards in terms of how informed and concerned the public is, as well as how much ownership they claim over these phenomena. In order to gain a more accurate image, we study environmental hazards in relation to other risks threatening the UK, such as large-scale involuntary migration or unemployment (World Economic Forum 2016, Bord et al. 1998). We also explore information consumption in relation to environmental hazards and the public's involvement in advancing knowledge. All these questions are accompanied by an extensive demographics section that allows us to ascertain how the context or environment in which an

  4. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  5. Pathways of understanding: The interactions of humanity and global environmental change

    International Nuclear Information System (INIS)

    Jacobson, H.K.; Katzenberger, J.; Lousma, J.; Mooney, H.A.; Moss, R.H.; Kuhn, W.; Luterbacher, U.; Wiegandt, E.

    1992-01-01

    How humans, interacting within social systems, affect and are affected by global change is explored. Recognizing the impact human activities have on the environment and responding to the need to document the interactions among human activities, the Consortium for International Earth Science Information Network (CIESIN) commissioned a group of 12 scientists to develop a framework illustrating the key human systems that contribute to global change. This framework, called the Social Process Diagram, will help natural and social scientists, educators, resource managers and policy makers envision and analyze how human systems interact among themselves and with the natural system. The Social Process Diagram consists of the following blocks that constitute the Diagram's structural framework: (1) fund of knowledge and experience; (2) preferences and expectations; (3) factors of production and technology; (4) population and social structure; (5) economic systems; (6) political systems and institutions; and (7) global scale environmental processes. To demonstrate potential ways the Diagram can be used, this document includes 3 hypothetical scenarios of global change issues: global warming and sea level rise; the environmental impact of human population migration; and energy and the environment. These scenarios demonstrate the Diagram's usefulness for visualizing specific processes that might be studied to evaluate a particular global change issues. The scenario also shows that interesting and unanticipated questions may emerge as links are explored between categories on the Diagram

  6. Pathways of Understanding: the Interactions of Humanity and Global Environmental Change

    Science.gov (United States)

    Jacobson, Harold K.; Katzenberger, John; Lousma, Jack; Mooney, Harold A.; Moss, Richard H.; Kuhn, William; Luterbacher, Urs; Wiegandt, Ellen

    1992-01-01

    How humans, interacting within social systems, affect and are affected by global change is explored. Recognizing the impact human activities have on the environment and responding to the need to document the interactions among human activities, the Consortium for International Earth Science Information Network (CIESIN) commissioned a group of 12 scientists to develop a framework illustrating the key human systems that contribute to global change. This framework, called the Social Process Diagram, will help natural and social scientists, educators, resource managers and policy makers envision and analyze how human systems interact among themselves and with the natural system. The Social Process Diagram consists of the following blocks that constitute the Diagram's structural framework: (1) fund of knowledge and experience; (2) preferences and expectations; (3) factors of production and technology; (4) population and social structure; (5) economic systems; (6) political systems and institutions; and (7) global scale environmental processes. To demonstrate potential ways the Diagram can be used, this document includes 3 hypothetical scenarios of global change issues: global warming and sea level rise; the environmental impact of human population migration; and energy and the environment. These scenarios demonstrate the Diagram's usefulness for visualizing specific processes that might be studied to evaluate a particular global change issues. The scenario also shows that interesting and unanticipated questions may emerge as links are explored between categories on the Diagram.

  7. Understanding wider environmental influences on mentoring: Towards an ecological model of mentoring in academic medicine

    Directory of Open Access Journals (Sweden)

    Dario Sambunjak

    2015-05-01

    Full Text Available Mentoring is a complex developmental relationship that contributes to individual growth and career advancement in different areas of human activity, including academic medicine. This article describes a broader environmental milieux in which mentoring occurs and considers the ways in which the environmental factors may affect the process and outcomes of mentoring. An ecological model of mentoring is proposed that takes into account various factors broadly operating at three contextual levels. The first is societal or “macro” level, which implies cultural, economic, and political factors. The second is institutional or “meso” level, consisting of a system-related factors such as field and discipline characteristics, and government policies, and b organization-related factors such as mentoring climate, reward structure, and work design. The third contextual level relates to intrapersonal and interpersonal characteristics of mentor-mentee dyads. If mentoring dyad is viewed as the focal point, societal and institutional levels may be labeled as “external”, and personal level as “internal”. The conceptual diversity and methodological challenges in the study of mentoring need to be acknowledged, but should not be an excuse to leave the external contextual elements out of the researchers’ horizon, as they inevitably shape and modify the mentoring relationships. Conclusion. Model presented in this article offers a holistic view of mentoring in academic medicine that may help one comprehend and appreciate the complexity of influences on mentoring, and inform the future research agenda on this important topic.

  8. Toward an Understanding of Citywide Urban Environmental Governance: An Examination of Stewardship Networks in Baltimore and Seattle.

    Science.gov (United States)

    Romolini, Michele; Morgan Grove, J; Ventriss, Curtis L; Koliba, Christopher J; Krymkowski, Daniel H

    2016-08-01

    Efforts to create more sustainable cities are evident in the proliferation of sustainability policies in cities worldwide. It has become widely proposed that the success of these urban sustainability initiatives will require city agencies to partner with, and even cede authority to, organizations from other sectors and levels of government. Yet the resulting collaborative networks are often poorly understood, and the study of large whole networks has been a challenge for researchers. We believe that a better understanding of citywide environmental governance networks can inform evaluations of their effectiveness, thus contributing to improved environmental management. Through two citywide surveys in Baltimore and Seattle, we collected data on the attributes of environmental stewardship organizations and their network relationships. We applied missing data treatment approaches and conducted social network and comparative analyses to examine (a) the organizational composition of the network, and (b) how information and knowledge are shared throughout the network. Findings revealed similarities in the number of actors and their distribution across sectors, but considerable variation in the types and locations of environmental stewardship activities, and in the number and distribution of network ties in the networks of each city. We discuss the results and potential implications of network research for urban sustainability governance.

  9. Environmental Security in Botswana

    Science.gov (United States)

    2011-10-01

    Ambo, Bemba, Herero, Himba, Makua, Ndebele (North and South), Shona, Swazi, Venda, Xhosa and Zulu . As with other African regions, a mix of ethnic...primarily from one ethnic group, the Tswana tribe , which is advantageous given the many ethnic groups in many African countries. But their progress has

  10. Socio-environmental cooperation and conflict? A discursive understanding and its application to the case of Israel and Palestine

    Science.gov (United States)

    Ide, T.; Fröhlich, C.

    2015-10-01

    The existing literature faces difficulties when accounting for the simultaneity of socio-environmental conflict and cooperation. We suggest that this puzzle can be solved by more recent constructivist works, which argue that conflictive or cooperative behavior is driven by discursively constructed interests, identities and situation assessments. Based on a literature review and field interviews, we analyze and compare the dominant water discourses in Israel and Palestine with the discourse dominant among the activists of a water cooperation project between communities from Israel and the West Bank. Our main result is that discourses are indeed crucial for understanding water-related conflict and cooperation. This finding highlights the relevance of constructivist approaches in the study of socio-environmental conflict and cooperation as well as of practices of bottom-up discursive conflict transformation.

  11. Toward an integrated understanding of perceived biodiversity values and environmental conditions in a national park

    Science.gov (United States)

    van Riper, Carena J.; Kyle, Gerard T.; Sherrouse, Ben C.; Bagstad, Kenneth J.; Sutton, Stephen G.

    2016-01-01

    In spatial planning and management of protected areas, increased priority is being given to research that integrates social and ecological data. However, public viewpoints of the benefits provided by ecosystems are not easily quantified and often implicitly folded into natural resource management decisions. Drawing on a spatially explicit participatory mapping exercise and a Social Values for Ecosystem Services (SolVES) analysis tool, the present study empirically examined and integrated social values for ecosystem services and environmental conditions within Channel Islands National Park, California. Specifically, a social value indicator of perceived biodiversity was examined using on-site survey data collected from a sample of people who visited the park. This information was modeled alongside eight environmental conditions including faunal species richness for six taxa, vegetation density, categories of marine and terrestrial land cover, and distance to features relevant for decision-makers. Results showed that biodiversity value points assigned to places by the pooled sample of respondents were widely and unevenly mapped, which reflected the belief that biodiversity was embodied to varying degrees by multiple locations in the park. Models generated for two survey subgroups defined by their self-reported knowledge of the Channels Islands revealed distinct spatial patterns of these perceived values. Specifically, respondents with high knowledge valued large spaces that were publicly inaccessible and unlikely to contain on-ground biodiversity, whereas respondents with low knowledge valued places that were experienced first-hand. Accessibility and infrastructure were also important considerations for anticipating how and where people valued the protected land and seascapes of Channel Islands National Park.

  12. Understanding the development of internal competencies from an environmental point of view

    DEFF Research Database (Denmark)

    Madsen, Svend Ole; Andersen, Povl Erik Rostgård

    2000-01-01

    Companies currently aim to develop their competence profile through continuous develop-ment processes. Due to the limited resources of SME´s they are particularly dependent on being able to exploit the possibilities in the environment in order to maintain competitiveness. This paper presents...... a framework, which seeks to describe, how the development of compe-tences takes place through an interaction between market demands and supplier contributions. The purpose of the paper is to give an understanding of and an insight in this process. The paper is based on a single case study with an SME in a low...

  13. Preparation and Characterization Challenges to Understanding Environmental and Biological Impacts of Ceria Nanoparticles

    Energy Technology Data Exchange (ETDEWEB)

    Karakoti, Ajay S.; Munusamy, Prabhakaran; Hostetler, Kasey E.; Kodali, Vamsi K.; Kuchibhatla, Satyanarayana V N T; Orr, Galya; Pounds, Joel G.; Teeguarden, Justin G.; Thrall, Brian D.; Baer, Donald R.

    2012-08-01

    It has been increasingly recognized that understanding and predicting the behaviors of nanoparticles is often limited by the degree to which the particles can be reliably produced and are adequately characterized. Examining data from the literature for ceria nanoparticles suggests that thermal history is one factor that has a strong influence on biological impact. Thermal processing may alter many physicochemical properties of the particles including density, crystal structure and the presence of surface contamination, but these may not be sufficiently recorded or reported to determine the ultimate source of an observed impact. A second example shows the types of difficulties that can be encountered in efforts to apply a well-studied synthesis route to producing well defined particles for biological studies. These examples and others highlight the importance of characterizing particles thoroughly and recording details of particle processing and history that are often not recorded and/or reported.

  14. Complex response of white pines to past environmental variability increases understanding of future vulnerability.

    Directory of Open Access Journals (Sweden)

    Virginia Iglesias

    Full Text Available Ecological niche models predict plant responses to climate change by circumscribing species distributions within a multivariate environmental framework. Most projections based on modern bioclimatic correlations imply that high-elevation species are likely to be extirpated from their current ranges as a result of rising growing-season temperatures in the coming decades. Paleoecological data spanning the last 15,000 years from the Greater Yellowstone region describe the response of vegetation to past climate variability and suggest that white pines, a taxon of special concern in the region, have been surprisingly resilient to high summer temperature and fire activity in the past. Moreover, the fossil record suggests that winter conditions and biotic interactions have been critical limiting variables for high-elevation conifers in the past and will likely be so in the future. This long-term perspective offers insights on species responses to a broader range of climate and associated ecosystem changes than can be observed at present and should be part of resource management and conservation planning for the future.

  15. New dimensions in our understanding of the human health effects of environmental pollutants

    Energy Technology Data Exchange (ETDEWEB)

    Carpenter, D.O. [Univ. of Albany, Rensselaer, NY (United States)

    1996-12-31

    The term {open_quotes}hazardous{close_quotes} waste is used primarily in reference to potential hazards to human health and, to a lesser decree, hazards to wildlife and the ecosystem. Many of the chemicals associated with hazardous waste sites are also widely distributed throughout the environment; therefore, the health hazards associated with hazardous waste sites are not different from those associated with general environmental contamination. Until recently, it was generally assumed that cancer was the human disease of greatest concern associated with toxic chemicals. In fact, most governmental regulations related to exposure are designed on the basis of presumed cancer risks. Since the evidence that hazardous chemicals can cause cancer is strong, it is appropriate to be concerned about cancer risk. Recent evidence, however, has triggered a reevaluation of the assumption that only cancer is of concern. New evidence suggests that noncancer endpoints may occur more frequently than cancer, may affect a greater number of individuals, and may occur at lower concentrations. Of particular concern is evidence of irreversible effects on the embryo and very young children, which influence intelligence, attention span, sexual development, and immune function. Although these effects are often subtle and difficult to quantify, the combined evidence is sufficiently compelling to necessitate a reevaluation of those outcomes of primary concern to human health. 57 refs., 2 figs., 3 tabs.

  16. Understanding environmental DNA detection probabilities: A case study using a stream-dwelling char Salvelinus fontinalis

    Science.gov (United States)

    Wilcox, Taylor M; Mckelvey, Kevin S.; Young, Michael K.; Sepulveda, Adam; Shepard, Bradley B.; Jane, Stephen F; Whiteley, Andrew R.; Lowe, Winsor H.; Schwartz, Michael K.

    2016-01-01

    Environmental DNA sampling (eDNA) has emerged as a powerful tool for detecting aquatic animals. Previous research suggests that eDNA methods are substantially more sensitive than traditional sampling. However, the factors influencing eDNA detection and the resulting sampling costs are still not well understood. Here we use multiple experiments to derive independent estimates of eDNA production rates and downstream persistence from brook trout (Salvelinus fontinalis) in streams. We use these estimates to parameterize models comparing the false negative detection rates of eDNA sampling and traditional backpack electrofishing. We find that using the protocols in this study eDNA had reasonable detection probabilities at extremely low animal densities (e.g., probability of detection 0.18 at densities of one fish per stream kilometer) and very high detection probabilities at population-level densities (e.g., probability of detection > 0.99 at densities of ≥ 3 fish per 100 m). This is substantially more sensitive than traditional electrofishing for determining the presence of brook trout and may translate into important cost savings when animals are rare. Our findings are consistent with a growing body of literature showing that eDNA sampling is a powerful tool for the detection of aquatic species, particularly those that are rare and difficult to sample using traditional methods.

  17. Assessing Canadian inventories to understand the environmental impacts of mercury releases to the Great Lakes region

    International Nuclear Information System (INIS)

    Trip, Luke; Bender, Tonya; Niemi, David

    2004-01-01

    North American pollutant release and transfer registries have been continuously developing with an eye to understanding source/receptor relationships and ensuring that the polluter-paid principle is applied to the appropriate parties. The potential contribution of mercury to the Great Lakes Basin arising from the rerelease of historic mercury pollution from contaminated aquatic and terrestrial media is poorly understood and the subject of concern. Although a considerable amount of data may be available on the atmospheric component of mercury releases to the Basin, further inventory work is needed to quantify the rerelease of the historic mercury. Much of the related existing inventory information is either not derived from direct measurement or not bounded by a mass-balance accounting. Critical to this determination is an increased confidence in the inventories of mercury from past and current practices. This may be enhanced through comprehensive and thorough surveys of contributions from specific products and their life-cycle assessments. An even greater challenge is to determine the bioavailability of the mercury emanating from land-based sources and from aquatic media. This paper describes the interplay among the sources and receptors of mercury and provides a quantitative assessment of current Canadian contributions of mercury as a contaminant to the Great Lakes. Recommendations for improved assessments are provided

  18. Health-related claims on food labels in Australia: understanding environmental health officers' roles and implications for policy.

    Science.gov (United States)

    Condon-Paoloni, Deanne; Yeatman, Heather R; Grigonis-Deane, Elizabeth

    2015-01-01

    Health and related claims on food labels can support consumer education initiatives that encourage purchase of healthier foods. A new food Standard on Nutrition, Health and Related Claims became law in January 2013. Implementation will need careful monitoring and enforcement to ensure that claims are truthful and have meaning. The current study explored factors that may impact on environmental health officers' food labelling policy enforcement practices. The study used a mixed-methods approach, using two previously validated quantitative questionnaire instruments that provided measures of the level of control that the officers exercised over their work, as well as qualitative, semi-structured, in-depth interviews. Local government; Australia. Thirty-seven officers in three Australian states participated in semi-structured in-depth interviews, as well as completing the quantitative questionnaires. Senior and junior officers, including field officers, participated in the study. The officers reported a high level of autonomy and control of their work, but also a heavy workload, dominated by concerns for public health and food safety, with limited time for monitoring food labels. Compliance of labels with proposed health claims regulations was not considered a priority. Lipsky's theory of street-level bureaucracy was used to enhance understanding of officers' work practices. Competing priorities affect environmental health officers' monitoring and enforcement of regulations. Understanding officers' work practices and their perceptions of enforcement is important to increase effectiveness of policy implementation and hence its capacity to augment education initiatives to optimize health benefits.

  19. Fool’s Gold: Understanding Social, Economic and Environmental Impacts from Gold Mining in Quang Nam Province, Vietnam

    Directory of Open Access Journals (Sweden)

    Nhi Nguyen

    2018-04-01

    Full Text Available Extractive industries are often claimed to contribute to both poverty reduction and economic growth. Yet, there is also a body of research that suggests natural resource dependence can result in limited development, environmental degradation and social upheaval. This paper examines differences in the socioeconomic and environmental state of mining and non-mining communities in rural Vietnam in order to understand the extent to which mining contributes to livelihood development and socioeconomic well-being. In particular, we examine the role that “corporate social responsibility” (CSR plays in supporting community development in Phuoc Son and Phu Ninh districts, Quang Nam province. Content analysis of newspapers, government documents and mining company reports provided a contextual overview of mining operations and community relations in each study area. Semi-structured interviews were used to collect information from local and regional stakeholders to further understand perceived impacts of mining operations on local communities. Our study finds that in comparison to non-mining communities, communities with active mines demonstrated increased job development, decreased poverty rates, enhanced infrastructure and social development along with increased incidences of CSR initiatives. However, a number of adverse effects from mining activities were reported including environmental degradation (e.g., deforestation, water pollution, etc. increased criminal activity and drug addiction. Dependence on mine-related employment in local communities becomes acutely apparent when temporary mine closures result in widespread unemployment. Local governments may be the greatest beneficiaries of mining with increased tax revenues and enhanced management potential of leased land. Non-mining communities without direct benefits from mining activities maintained economic diversity and were therefore more resilient to economic shocks such as nearby mine closures.

  20. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  1. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  2. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  3. Toward a mechanistic understanding of human-induced rapid environmental change: A case study linking energy development, avian nest predation, and predators

    Science.gov (United States)

    Hethcoat, Matthew G.; Chalfoun, Anna D.

    2015-01-01

    Demographic consequences of human-induced rapid environmental change (HIREC) have been widely documented for many populations. The mechanisms underlying such patterns, however, are rarely investigated and yet are critical to understand for effective conservation and management.

  4. Environmental mineralogy - Understanding element behavior in ecosystems; Mineralogie environnementale: comprendre le comportement des elements dans les ecosystemes

    Energy Technology Data Exchange (ETDEWEB)

    Brown Jr, G.E. [Department of Geological and Environmental Sciences, Stanford University, Stanford, CA 94305-2115 (United States); Department of Photon Science and Stanford Synchrotron Radiation Lightsource, SLAC National Accelerator Laboratory, Menlo Park, CA 94025 (United States); Calas, G. [Institut de mineralogie et de physique des milieux condenses (IMPMC), universite Paris-6 - universite Paris-7, IPGP, CNRS, case 115, 75252 Paris (France)

    2011-02-15

    Environmental Mineralogy has developed over the past decade in response to the recognition that minerals are linked in many important ways with the global ecosystem. Minerals are the main repositories of the chemical elements in Earth's crust and thus are the main sources of elements needed for the development of civilization, contaminant and pollutant elements that impact global and local ecosystems, and elements that are essential plant nutrients. These elements are released from minerals through natural processes, such as chemical weathering, and anthropogenic activities, such as mining and energy production, agriculture and industrial activities, and careless waste disposal. Minerals also play key roles in the biogeochemical cycling of the elements, sequestering elements and releasing them as the primary minerals in crustal rocks undergo various structural and compositional transformations in response to physical, chemical, and biological processes that produce secondary minerals and soils. These processes have resulted in the release of toxic elements such as arsenic in groundwater aquifers, which is having a major impact on the health of millions of people in South and Southeast Asia. The interfaces between mineral surfaces and aqueous solutions are the locations of most chemical reactions that control the composition of the natural environment, including the composition of natural waters. The nuclear fuel cycle, from uranium mining to the disposition of high-level nuclear waste, is also intimately related to minerals. A fundamental understanding of these processes requires molecular-scale information about minerals, their bulk structures and properties such as solubility, their surfaces, and their interactions with aqueous solutions, atmospheric and soil gases, natural organic matter, and biological organisms. Gaining this understanding is further complicated by the presence of natural, incidental, and manufactured nano-particles in the environment

  5. Maritime energy and security: Synergistic maximization or necessary tradeoffs?

    International Nuclear Information System (INIS)

    Nyman, Elizabeth

    2017-01-01

    Offshore energy is big business. The traditional source of maritime energy, offshore petroleum and gas, has been on the rise since a reliable method of extraction was discovered in the mid-20th century. Lately, it has been joined by offshore wind and tidal power as alternative “green” sources of maritime energy. Yet all of this has implications for maritime environmental regimes as well, as maritime energy extraction/generation can have a negative effect on the ocean environment. This paper considers two major questions surrounding maritime energy and environmental concerns. First, how and why do these two concerns, maritime energy and environmental protection, play against each other? Second, how can states both secure their energy and environmental securities in the maritime domain? Maximizing maritime energy output necessitates some environmental costs and vice versa, but these costs vary with the type of offshore energy technology used and with the extent to which states are willing to expend effort to protect both environmental and energy security. - Highlights: • Security is a complicated concept with several facets including energy and environmental issues. • Offshore energy contributes to energy supply but can have environmental and monitoring costs. • Understanding the contribution of offshore energy to security depends on which security facet is deemed most important.

  6. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  7. Is Hunting Still Healthy? Understanding the Interrelationships between Indigenous Participation in Land-Based Practices and Human-Environmental Health

    Directory of Open Access Journals (Sweden)

    Ursula King

    2014-05-01

    Full Text Available Indigenous participation in land-based practices such as hunting, fishing, ceremony, and land care has a long history. In recent years, researchers and policy makers have advocated the benefits of these practices for both Indigenous people and the places they live. However, there have also been documented risks associated with participation in these activities. Environmental change brought about by shifts in land use, climate changes, and the accumulation of contaminants in the food chain sit alongside equally rapid shifts in social, economic and cultural circumstances, preferences and practices. To date, the literature has not offered a wide-ranging review of the available cross-disciplinary or cross-ecozone evidence for these intersecting benefits and risks, for both human and environmental health and wellbeing. By utilising hunting as a case study, this paper seeks to fill part of that gap through a transdisciplinary meta-analysis of the international literature exploring the ways in which Indigenous participation in land-based practices and human-environmental health have been studied, where the current gaps are, and how these findings could be used to inform research and policy. The result is an intriguing summary of disparate research that highlights the patchwork of contradictory understandings, and uneven regional emphasis, that have been documented. A new model was subsequently developed that facilitates a more in-depth consideration of these complex issues within local-global scale considerations. These findings challenge the bounded disciplinary and geographic spaces in which much of this work has occurred to date, and opens a dialogue to consider the importance of approaching these issues holistically.

  8. Is hunting still healthy? Understanding the interrelationships between indigenous participation in land-based practices and human-environmental health.

    Science.gov (United States)

    King, Ursula; Furgal, Christopher

    2014-05-28

    Indigenous participation in land-based practices such as hunting, fishing, ceremony, and land care has a long history. In recent years, researchers and policy makers have advocated the benefits of these practices for both Indigenous people and the places they live. However, there have also been documented risks associated with participation in these activities. Environmental change brought about by shifts in land use, climate changes, and the accumulation of contaminants in the food chain sit alongside equally rapid shifts in social, economic and cultural circumstances, preferences and practices. To date, the literature has not offered a wide-ranging review of the available cross-disciplinary or cross-ecozone evidence for these intersecting benefits and risks, for both human and environmental health and wellbeing. By utilising hunting as a case study, this paper seeks to fill part of that gap through a transdisciplinary meta-analysis of the international literature exploring the ways in which Indigenous participation in land-based practices and human-environmental health have been studied, where the current gaps are, and how these findings could be used to inform research and policy. The result is an intriguing summary of disparate research that highlights the patchwork of contradictory understandings, and uneven regional emphasis, that have been documented. A new model was subsequently developed that facilitates a more in-depth consideration of these complex issues within local-global scale considerations. These findings challenge the bounded disciplinary and geographic spaces in which much of this work has occurred to date, and opens a dialogue to consider the importance of approaching these issues holistically.

  9. Characterizing large river sounds: Providing context for understanding the environmental effects of noise produced by hydrokinetic turbines.

    Science.gov (United States)

    Bevelhimer, Mark S; Deng, Z Daniel; Scherelis, Constantin

    2016-01-01

    Underwater noise associated with the installation and operation of hydrokinetic turbines in rivers and tidal zones presents a potential environmental concern for fish and marine mammals. Comparing the spectral quality of sounds emitted by hydrokinetic turbines to natural and other anthropogenic sound sources is an initial step at understanding potential environmental impacts. Underwater recordings were obtained from passing vessels and natural underwater sound sources in static and flowing waters. Static water measurements were taken in a lake with minimal background noise. Flowing water measurements were taken at a previously proposed deployment site for hydrokinetic turbines on the Mississippi River, where sounds created by flowing water are part of all measurements, both natural ambient and anthropogenic sources. Vessel sizes ranged from a small fishing boat with 60 hp outboard motor to an 18-unit barge train being pushed upstream by tugboat. As expected, large vessels with large engines created the highest sound levels, which were, on average, 40 dB greater than the sound created by an operating hydrokinetic turbine. A comparison of sound levels from the same sources at different distances using both spherical and cylindrical sound attenuation functions suggests that spherical model results more closely approximate observed sound attenuation.

  10. Young children’s environmental judgement and its relationship with their understanding of the concept of living things

    Directory of Open Access Journals (Sweden)

    Villarroel José Domingo

    2017-03-01

    Full Text Available Do young children think that plants deserve morally-based respect or, on the contrary, do they feel that respect for plant life is nothing more than another behavioural norm similar to, for instance, one that states that you should not pick your nose in public? This study examines how dilemmas involving environmental, moral and socio-conventional situations are comprehended in early childhood so as to investigate the issue of whether young children attach a significant degree of severity to transgressions against plant life in comparison with disregarding socially accepted rules. Additionally, young children’s judgements are put into perspective alongside their understanding of the concept of living things in order to shed light on the role that grasping essential biological notions might play in the emergence of young children’s assessments of actions that pose a threat to the environment. The sample of the study consists of 328 children (162 girls and 166 boys who attend Early Years Education or Primary Education and the data examined comes from the individual interviews conducted with the children. The results are discussed in connection with the current understanding of the source of ethical judgements which emphasises the importance that emotions seem to play in the construction of moral thinking.

  11. ENVIROSUITE: USING STATE-OF-THE-ART SYNCHROTRON TECHNIQUES TO UNDERSTAND ENVIRONMENTAL REMEDIATION SCIENCE ISSUES AT THE MOLECULAR LEVEL.

    Energy Technology Data Exchange (ETDEWEB)

    FITTS,J.P.; KALB,P.D.; FRANCIS,A.J.; FUHRMANN,M.; DODGE,C.J.; GILLOW,J.B.

    2004-03-01

    Although DOE's Environmental Management program has made steady progress in cleaning up environmental legacies throughout the DOE complex, there are still significant remediation issues that remain to be solved. For example, DOE faces difficult challenges related to potential mobilization of radionuclides (e.g., actinides) and other hazardous contaminants in soils, removal and final treatment of high-level waste and residuals from leaking tanks, and the long-term stewardship of remediated sites and engineered disposal facilities, to name just a few. In some cases, new technologies and technology applications will be required based on current engineering expertise. In others, however, basic scientific research is needed to understand the mechanisms of how contaminants behave under specific conditions and how they interact with the environment, from which new engineering solutions can emerge. At Brookhaven National Laboratory (BNL) and Stony Brook University, scientists have teamed to use state-of-the-art synchrotron techniques to help understand the basic interactions of contaminants in the environment. Much of this work is conducted at the BNL National Synchrotron Light Source (NSLS), which is a user facility that provides high energy X-ray and ultraviolet photon beams to facilitate the examination of contaminants and materials at the molecular level. These studies allow us to determine how chemical speciation and structure control important parameters such as solubility, which in turn drive critical performance characteristics such as leaching. In one study for example, we are examining the effects of microbial activity on actinide contaminants under conditions anticipated at the Waste Isolation Pilot Plant. One possible outcome of this research is the identification of specific microbes that can trap uranium or other contaminants within the intracellular structure and help mitigate mobility. In another study, we are exploring the interaction of contaminants

  12. ENVIROSUITE: USING STATE-OF-THE-ART SYNCHROTRON TECHNIQUES TO UNDERSTAND ENVIRONMENTAL REMEDIATION SCIENCE ISSUES AT THE MOLECULAR LEVEL

    International Nuclear Information System (INIS)

    FITTS, J.P.; KALB, P.D.; FRANCIS, A.J.; FUHRMANN, M.; DODGE, C.J.; GILLOW, J.B.

    2004-01-01

    Although DOE's Environmental Management program has made steady progress in cleaning up environmental legacies throughout the DOE complex, there are still significant remediation issues that remain to be solved. For example, DOE faces difficult challenges related to potential mobilization of radionuclides (e.g., actinides) and other hazardous contaminants in soils, removal and final treatment of high-level waste and residuals from leaking tanks, and the long-term stewardship of remediated sites and engineered disposal facilities, to name just a few. In some cases, new technologies and technology applications will be required based on current engineering expertise. In others, however, basic scientific research is needed to understand the mechanisms of how contaminants behave under specific conditions and how they interact with the environment, from which new engineering solutions can emerge. At Brookhaven National Laboratory (BNL) and Stony Brook University, scientists have teamed to use state-of-the-art synchrotron techniques to help understand the basic interactions of contaminants in the environment. Much of this work is conducted at the BNL National Synchrotron Light Source (NSLS), which is a user facility that provides high energy X-ray and ultraviolet photon beams to facilitate the examination of contaminants and materials at the molecular level. These studies allow us to determine how chemical speciation and structure control important parameters such as solubility, which in turn drive critical performance characteristics such as leaching. In one study for example, we are examining the effects of microbial activity on actinide contaminants under conditions anticipated at the Waste Isolation Pilot Plant. One possible outcome of this research is the identification of specific microbes that can trap uranium or other contaminants within the intracellular structure and help mitigate mobility. In another study, we are exploring the interaction of contaminants with

  13. Agro forestry systems and food security among smallholder farmers of the Brazilian Amazon: A strategy for environmental global crisis

    OpenAIRE

    Abreu, Dr. Santiago de Lucimar; Watanabe, Dr. Maria Aico

    2008-01-01

    The Amazon is known for its environmental importance for the climatic equilibrium, for its abundance and richness in biodiversity and its preservation is important to reduce global heating. Nevertheless, little research has analysed the possible positive role of the local farm population for environmental conservation. The paper investigates the possibility to conciliate the environmental conservation with the small farming expansion in the Amazon, to build agrobiodiversity, and at the same t...

  14. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  15. Understanding Title V of the Social Security Act: A Guide to the Provisions of the Federal Maternal and Child Health Block Grant.

    Science.gov (United States)

    Health Resources and Services Administration (DHHS/PHS), Washington, DC. Maternal and Child Health Bureau.

    The Maternal and Child Health (MCH) Services Block Grant (Title V of the Social Security Act) has operated as a federal-state partnership since the Social Security Act was passed in 1935. Through Title V, the federal government pledged its support of state efforts to extend health and welfare services for mothers and children. Title V has been…

  16. Coupling environmental, social and economic models to understand land-use change dynamics in the Mekong Delta

    Directory of Open Access Journals (Sweden)

    Alexis eDrogoul

    2016-03-01

    Full Text Available The Vietnamese Mekong Delta has undergone in recent years a considerable transformation in agricultural land-use, fueled by a boom of the exportation, an increase of population, a focus on intensive crops, but also environmental factors like sea level rise or the progression of soil salinity. These transformations have been, however, largely misestimated by the ten-year agricultural plans designed at the provincial levels, on the predictions of which, though, most of the large-scale investments (irrigation infrastructures, protection against flooding or salinity intrusion, and so on are normally planned. This situation raises the question of how to explain the divergence between the predictions used as a basis for these plans and the actual situation. Answering it could, as a matter of fact, offer some insights on the dynamics at play and hopefully allow designing them more accurately.The dynamics of land-use change at a scale of a region results from the interactions between heterogeneous actors and factors at different scales, among them institutional policies, individual farming choices, land-cover and environmental changes, economic conditions, social dynamics, just to name a few. Understanding its evolution, for example, in this case, to better support agricultural planning, therefore requires the use of models that can represent the individual contributions of each actor or factor, and of course their interactions.We address this question through the design of an integrated hybrid model of land-use change in a specific and carefully chosen case study, which relies on the central hypothesis that the main force driving land-use change is actually the individual choices made by farmers at their local level. Farmers are the actors who decide (or not to switch from one culture to another and the shifts observed at more global levels (village, district, province, region are considered, in this model, as a consequence of the aggregation of these

  17. Understanding environmental and climatic influences on regional differences and spatio-temporalscale issues of dengue fever transmission in Puerto Rico

    Science.gov (United States)

    Serman, E. A.; Akanda, A. S. S.; Ginsberg, H. S.; Couret, J.

    2015-12-01

    Each year, there are an estimated 50-100 million cases of dengue fever worldwide, roughly 30 times the number of cases as 50 years ago, with some estimates even higher. Puerto Rico (PR) has experienced epidemic dengue activity since 1963, and the disease is currently endemic. Since 1990 there have been 4 large epidemics, the most recent in 2010 where there were nearly 27,000 cases reported, amounting to almost 1% of the island's total population. Because no vaccine is currently available, effective control is dependent on our ability to understand the complex relationship between environmental factors, mosquito vector ecology, and disease epidemiology. Dengue virus is transmitted primarily by Aedes aegypti mosquitoes, as humans are the preferred host for Ae. aegypti. The purpose of our analysis is to assess temporal and spatial patterns of dengue transmission in PR and relate this to both climatic and anthropogenic factors. Unlike past studies, which have used San Juan to represent the island as a whole, our research will investigate regional dynamics in dengue transmission, as preliminary results have shown significant differences in population density, disease incidence, and environmental and climatic variables. Data from the Passive Dengue Surveillance System of CDC, meteorological observations from NCDC, and remote sensing data from USGS and NASA will be used together to identify relationships between climate, urbanization, and dengue incidence for PR at various spatial and temporal scales. Preliminary climatic factors considered include precipitation, temperature, humidity, and soil moisture. Finally, we will assess measures of urbanization such as land cover, land use, population density, and infrastructure that can make regional differences in dengue incidence each year. Results from this study could help create early warning systems for dengue surveillance in Puerto Rico, and develop techniques that can be applied to other areas of the world.

  18. How Do Environmental Issues Contribute to Regional Instability? and Which Regions Will Pose the Greatest Threat to U.S. Security as a Result of Environmental Degredation?

    National Research Council Canada - National Science Library

    Schantz, Blair

    1998-01-01

    .... The primary objective of this research is to determine and define how environmental issues contribute to regional political, economic or physical instability and then apply this definition to the regions of the world...

  19. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  20. Security Theories of Third World

    Directory of Open Access Journals (Sweden)

    Alexandra Victorovna Khudaykulova

    2016-12-01

    Full Text Available This article analyzes the security studies in the “Third World”. The evolution of the conceptual apparatus in the field of security studies and in the understanding of the “Third World” is given. The author provides us an analysis of the security issues in the so-called “post-colonial” countries in the years of “cold war” and in the post-bipolar period, defines the domain of security for the developing world and the current agenda. Particular attention is paid to the analysis of the security concepts of the late XX century - the “security of the person”, “securitization”, “humanitarian intervention” - which are of particular concern to countries of the “Third World”. An alternative format of the “Third World” in the categories of postmodern, modern and premodern worlds is given, the term of “non-Westphalian” state is used as well. Basic characteristics of the “Third World” in the socio-economic and political spheres are provided. The author emphasizes that the state of security of the “Third World” is fundamentally different from that of the developed Western countries, since most threats in non-Western countries, does not come from the outside, but from within. Accordingly, the non-Western security theory does not focus exclusively on military issues and explore a wide range of issues of civil nature - economic, political, social, environmental and development challenges, as well as poverty and underdevelopment.

  1. 2011 U.S. Pacific Environmental Security Conference (PESC) held in Honolulu, Hawaii on 14-17 March 2011

    Science.gov (United States)

    2011-03-01

    agricultural technology have contributed to a decline in global yields of maize and wheat in recent years. This decrease in yields , combined with a...medical communities to examine gaps in preparedness and iden- tify capabilities that must be built in military forces so that they can properly support...of yields . Rain fed agricultural could fall by about 50 percent by 2020. Health security, clean air water, food, shelter and the degra- dation cause

  2. Challenge theme 7: Information support for management of border security and environmental protection: Chapter 9 in United States-Mexican Borderlands: Facing tomorrow's challenges through USGS science

    Science.gov (United States)

    Parcher, Jean W.; Page, William R.

    2013-01-01

    Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.

  3. 76 FR 61360 - Notice of Intent To Prepare an Environmental Impact Statement for the Foreign Affairs Security...

    Science.gov (United States)

    2011-10-04

    ... ranges, mock urban environmental, and explosives ranges; soft skills training, such as classrooms.... Possible action alternatives that will be evaluated in the EIS are alternative layouts for construction of...

  4. Understanding the Success of an Environmental Policy: The case of the 1989-1999 Integrated Pest Management Program in Indonesia

    OpenAIRE

    Budy P Resosudarmo

    2010-01-01

    The fact that most environmental degradation occurs in developing countries shows that they face difficulties in implementing environmental policies. It is hence extremely valuable to take lessons from any instances of the successful implementation of an environmental policy in a developing country. This paper aims to show, from a political economy perspective, why the 1989–1999 Integrated Pest Management program, is an environmentally-friendly policy, worked in Indonesia. It concludes that t...

  5. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  6. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  7. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  8. Understanding environmental drivers in the regulation of soil respiration dynamics after fire in semi-arid ecosystems

    Science.gov (United States)

    Muñoz-Rojas, Miriam; Lewandrowski, Wolfgang; Erickson, Todd E.; Dixon, Kingsley W.; Merritt, David J.

    2016-04-01

    Keywords: Pilbara, soil CO2 efflux, soil C, soil moisture, soil temperature Introduction Soil respiration (Rs) has become a major research focus given the increase in atmospheric CO2 emissions and the large contribution of these CO2 fluxes from soils (Van Groenigen et al., 2014). In addition to its importance in the global C cycle, Rs is a fundamental indicator of soil health and quality that reflects the level of microbial activity and provides an indication of the ability of soils to support plant growth (Oyonarte et al., 2012; Munoz-Rojas et al., 2015). Wildfires can have a significant impact on Rs rates, with the scale of the impact depending on environmental factors such as temperature and moisture, and organic C content in the soil. Vegetation cover can have a significant effect on regulating organic C contents; and while advances are made into understanding the effects of fire on organic C contents and CO2 fluxes (Granged et al., 2011; Willaarts et al., 2015; Muñoz-Rojas et al., 2016), there is limited knowledge of the variability of Rs across ecosystem types, vegetation communities, and responses to fire. In this research we aimed to assess the impacts of a wildfire on the soil CO2 fluxes and soil respiration in a semi-arid ecosystem of Western Australia (Pilbara biogeographical region), and to understand the main environmental drivers controlling these fluxes in different vegetation types. The study has application for other arid and semi-arid regions of the world. Methods The study area was selected following a wildfire that affected 25 ha in February 2014. Twelve plots were established in the burnt site (B) within a 400 m2 area, and 12 plots in an adjacent unburnt control site. At each site, three plots were installed below the canopy of each of the most representative vegetation types of the areas: Eucalyptus trees, Acacia shrubs and Triodia grasses, and three on bare soil. Soil sampling and measurement of soil CO2 efflux, temperature and moisture were

  9. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  10. Air quality models and unusually large ozone increases: Identifying model failures, understanding environmental causes, and improving modeled chemistry

    Science.gov (United States)

    Couzo, Evan A.

    Several factors combine to make ozone (O3) pollution in Houston, Texas, unique when compared to other metropolitan areas. These include complex meteorology, intense clustering of industrial activity, and significant precursor emissions from the heavily urbanized eight-county area. Decades of air pollution research have borne out two different causes, or conceptual models, of O 3 formation. One conceptual model describes a gradual region-wide increase in O3 concentrations "typical" of many large U.S. cities. The other conceptual model links episodic emissions of volatile organic compounds to spatially limited plumes of high O3, which lead to large hourly increases that have exceeded 100 parts per billion (ppb) per hour. These large hourly increases are known to lead to violations of the federal O 3 standard and impact Houston's status as a non-attainment area. There is a need to further understand and characterize the causes of peak O 3 levels in Houston and simulate them correctly so that environmental regulators can find the most cost-effective pollution controls. This work provides a detailed understanding of unusually large O 3 increases in the natural and modeled environments. First, we probe regulatory model simulations and assess their ability to reproduce the observed phenomenon. As configured for the purpose of demonstrating future attainment of the O3 standard, the model fails to predict the spatially limited O3 plumes observed in Houston. Second, we combine ambient meteorological and pollutant measurement data to identify the most likely geographic origins and preconditions of the concentrated O3 plumes. We find evidence that the O3 plumes are the result of photochemical activity accelerated by industrial emissions. And, third, we implement changes to the modeled chemistry to add missing formation mechanisms of nitrous acid, which is an important radical precursor. Radicals control the chemical reactivity of atmospheric systems, and perturbations to

  11. Assessing the links among environmental contaminants, endocrinology, and parasites to understand amphibian declines in montane regions of Costa Rica.

    Science.gov (United States)

    Leary, Christopher J; Ralicki, Hannah F; Laurencio, David; Crocker-Buta, Sarah; Malone, John H

    2018-01-01

    Amphibians inhabiting montane riparian zones in the Neotropics are particularly vulnerable to decline, but the reasons are poorly understood. Because environmental contaminants, endocrine disruption, and pathogens often figure prominently in amphibian declines it is imperative that we understand how these factors are potentially interrelated to affect montane populations. One possibility is that increased precipitation associated with global warming promotes the deposition of contaminants in montane regions. Increased exposure to contaminants, in turn, potentially elicits chronic elevations in circulating stress hormones that could contribute to montane population declines by compromising resistance to pathogens and/or production of sex steroids regulating reproduction. Here, we test this hypothesis by examining contaminant levels, stress and sex steroid levels, and nematode abundances in male drab treefrogs, Smilisca sordida, from lowland and montane populations in Costa Rica. We found no evidence that montane populations were more likely to possess contaminants (i.e., organochlorine, organophosphate and carbamate pesticides or benzidine and chlorophenoxy herbicides) than lowland populations. We also found no evidence of elevational differences in circulating levels of the stress hormone corticosterone, estradiol or progesterone. However, montane populations possessed lower androgen levels, hosted more nematode species, and had higher nematode abundances than lowland populations. Although these results suggested that nematodes contributed to lower androgens in montane populations, we were unable to detect a significant inverse relationship between nematode abundance and androgen level. Our results suggest that montane populations of this species are not at greater risk of exposure to contaminants or chronic stress, but implicate nematodes and compromised sex steroid levels as potential threats to montane populations.

  12. Assessing the links among environmental contaminants, endocrinology, and parasites to understand amphibian declines in montane regions of Costa Rica.

    Directory of Open Access Journals (Sweden)

    Christopher J Leary

    Full Text Available Amphibians inhabiting montane riparian zones in the Neotropics are particularly vulnerable to decline, but the reasons are poorly understood. Because environmental contaminants, endocrine disruption, and pathogens often figure prominently in amphibian declines it is imperative that we understand how these factors are potentially interrelated to affect montane populations. One possibility is that increased precipitation associated with global warming promotes the deposition of contaminants in montane regions. Increased exposure to contaminants, in turn, potentially elicits chronic elevations in circulating stress hormones that could contribute to montane population declines by compromising resistance to pathogens and/or production of sex steroids regulating reproduction. Here, we test this hypothesis by examining contaminant levels, stress and sex steroid levels, and nematode abundances in male drab treefrogs, Smilisca sordida, from lowland and montane populations in Costa Rica. We found no evidence that montane populations were more likely to possess contaminants (i.e., organochlorine, organophosphate and carbamate pesticides or benzidine and chlorophenoxy herbicides than lowland populations. We also found no evidence of elevational differences in circulating levels of the stress hormone corticosterone, estradiol or progesterone. However, montane populations possessed lower androgen levels, hosted more nematode species, and had higher nematode abundances than lowland populations. Although these results suggested that nematodes contributed to lower androgens in montane populations, we were unable to detect a significant inverse relationship between nematode abundance and androgen level. Our results suggest that montane populations of this species are not at greater risk of exposure to contaminants or chronic stress, but implicate nematodes and compromised sex steroid levels as potential threats to montane populations.

  13. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  14. Issues of Security and Informational Privacy in relation to an Environmental Scanning System for Fighting Organized Crime

    DEFF Research Database (Denmark)

    Gerdes, Anne; Larsen, Henrik Legind; Rouces, Jacobo

    2013-01-01

    This paper clarifies privacy challenges related to the EU project, ePOOLICE, which aims at developing an environmental scanning system for fighting organized crime by improving law enforcement agencies opportunities for strategic proactive planning in response to emerging organized crime threats...... privacy all through the system design process....

  15. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  16. Organic quinoa (Chenopodium quinoa L.) production in Peru: Environmental hotspots and food security considerations using Life Cycle Assessment.

    Science.gov (United States)

    Cancino-Espinoza, Eduardo; Vázquez-Rowe, Ian; Quispe, Isabel

    2018-05-08

    Quinoa is a plant that is cultivated in the Andean highlands across Peru and Bolivia. It is increasingly popular due to its high nutritive value and protein content. In particular, the cultivation of organic quinoa has grown substantially in recent years since it is the most demanded type of quinoa in the foreign market. Nevertheless, despite the interest that quinoa has generated in terms of its nutritional properties, little is known regarding the environmental profile of its production and processing. Therefore, the main objective of this study was to analyze the environmental impacts that are linked to the production and distribution of organic quinoa to the main export destinations through the application of the Life Cycle Assessment (LCA) methodology. An attributional LCA perspective was conducted including data from approximately 55 ha of land used for quinoa production in the regions of Huancavelica and Ayacucho, in southern-central Peru. IPCC, 2013 and ReCiPe 2008 were the two assessment methods selected to estimate the environmental impact results using the SimaPro 8.3 software. Results, which were calculated for one 500 g package of organic quinoa, showed that GHG emissions are in the upper range of other organic agricultural products. However, when compared to other high protein content food products, especially those from animal origin, considerably low environmental impacts are obtained. For instance, if 20% of the average annual beef consumption in Peru is substituted by organic quinoa, each Peruvian would mitigate 31 kg CO 2 eq/year in their diet. Moreover, when the edible protein energy return on investment (i.e., ep-EROI) is computed, a ratio of 0.38 is obtained, in the higher range of protein rich food products. However, future research should delve into the environmental and food policy implications of agricultural land expansion to produce an increasing amount of quinoa for a growing global demand. Copyright © 2018 Elsevier B.V. All

  17. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  18. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  19. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  20. Comparison between the Understanding Levels of Boys and Girls on the Concepts of Environmental Degradation, Meteorology and Climate Change in Tanzanian Secondary Schools

    Science.gov (United States)

    Kira, Ernest S.; Komba, Sotco C.

    2015-01-01

    The study aimed to determine whether there was any significant difference in understanding levels between secondary school boys and girls on the concepts of environmental degradation, meteorology and climate change. Both structured survey and focus group discussions were used to collect information from 480 students, sampled randomly from 12…

  1. Opinion Formation on Environmental Protection: Understanding the Origins of Attitudes toward Resource Enhancement and Protection in Iowa.

    Science.gov (United States)

    Rodriguez, Lulu; Farnall, Olan; Geske, Joel; Peterson, Jane W.

    1998-01-01

    A study of 483 Iowa citizens and state legislators found that self-interest had the strongest effect on formation of opinions toward environmental protection; sociotropic and symbolic politics models were also effective. Results indicate that campaign messages must stress the benefits of environmental protection to the individual. (JOW)

  2. Understanding the Macro-context of Teaching Environmental Education: A Case Study from Queensland, 1989-1991.

    Science.gov (United States)

    Fien, John

    1992-01-01

    Analyzes and critiques the sociocultural and educational features that comprise the macrocontext for teaching environmental education in Queensland, Australia. Concepts outlined in the analysis include the global context of teaching environmental education; the political, economic, and social context of Queensland; the national party; the…

  3. Understanding Barriers to Optimal Cleaning and Disinfection in Hospitals: A Knowledge, Attitudes, and Practices Survey of Environmental Services Workers.

    Science.gov (United States)

    Bernstein, Daniel A; Salsgiver, Elizabeth; Simon, Matthew S; Greendyke, William; Eiras, Daniel P; Ito, Masahiro; Caruso, Dean A; Woodward, Timothy M; Perriel, Odette T; Saiman, Lisa; Furuya, E Yoko; Calfee, David P

    2016-12-01

    In this study, we used an online survey to assess knowledge, attitudes, and practices related to environmental cleaning and other infection prevention strategies among environmental services workers (ESWs) at 5 hospitals. Our findings suggest that ESWs could benefit from additional education and feedback as well as new strategies to address workflow challenges. Infect Control Hosp Epidemiol 2016;1492-1495.

  4. FOOD SECURITY AND UNIVERSITY AGRICULTURAL STUDENTS ...

    African Journals Online (AJOL)

    OGA AMOLEGBE

    Food security and its relationship to sustainable agricultural and rural development have ... JOURNAL OF RESEARCH IN FORESTRY, WILDLIFE AND ENVIRONMENTAL VOLUME 6, No. ... environmental degradation, rapid changes in.

  5. «GREEN» LOGISTICS AS A TOOL TO ENSURE ENVIRONMENTAL SECURITY AND INSTITUTIONAL INNOVATION SUBSOIL EUROPEAN ARCTIC

    Directory of Open Access Journals (Sweden)

    M. N. Dudin

    2016-01-01

    Full Text Available This article is an overview of the major logistics and technology solutions to be implemented to streamline the subsoil use in the European Arctic. The theme of this work is very urgent, because Russia, despite the high resource base is underdeveloped institutional framework and resource extraction is characterized by the maximum level of loss of potential gross value of the hydrocarbon potential.The purpose of this article is to study Russian priorities at national and regional level, related to mining, through the use of «green» logistics as an instrument for environmental safety and institutional innovation subsoil of the European Arctic.Methodology. The methodological basis of this article are comparative, economic and statistical analysis methods.The results of this paper have become the solutions to problems, to achieve this goal, in particular: a substantiated conclusion that the Arctic is a world heritage and «climate laboratory» of the planet, so the development of the resource, industrial, transport and logistics potential of the region need to be based on «green» technologies; The article describes four environmentally-oriented direction (creating material and technical base, the formation of a safe icebreaker fleet, the development of new navigation and communication systems, power supply, which will enable to master the industrial, transport and logistics potential of the Arctic with minimal anthropogenic load.Conclusions. The following basic conclusions were as follows: first, subarctic and arctic areas are world heritage, so the development of deposits on them should be in the interest of the world community on a non-discriminatory  basis; secondly, hydrocarbon reserves, concentrated in the European Arctic, currently can not be extracted without environmental impacts, access to these resources is limited due to lack of development of the transport component, therefore, should be used aggressive techniques of extraction of

  6. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  7. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  8. Cyber Security : Home User's Perspective

    OpenAIRE

    Ikonen, Mikko

    2014-01-01

    Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...

  9. Streamlined Approach for Environmental Restoration (SAFER) Plan for Corrective Action Unit 575: Area 15 Miscellaneous Sites, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-12-01

    This Streamlined Approach for Environmental Restoration (SAFER) Plan addresses the actions needed to achieve closure for Corrective Action Unit (CAU) 575, Area 15 Miscellaneous Sites, identified in the Federal Facility Agreement and Consent Order (FFACO). CAU 575 comprises the following four corrective action sites (CASs) located in Area 15 of the Nevada National Security Site: 15-19-02, Waste Burial Pit, 15-30-01, Surface Features at Borehole Sites, 15-64-01, Decontamination Area, 15-99-03, Aggregate Plant This plan provides the methodology for field activities needed to gather the necessary information for closing each CAS. There is sufficient information and process knowledge from historical documentation and investigations of similar sites regarding the expected nature and extent of potential contaminants to recommend closure of CAU 575 using the SAFER process. Additional information will be obtained by conducting a field investigation to document and verify the adequacy of existing information, to affirm the predicted corrective action decisions, and to provide sufficient data to implement the corrective actions. This will be presented in a closure report that will be prepared and submitted to the Nevada Division of Environmental Protection (NDEP) for review and approval.

  10. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  11. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  12. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  13. Understanding Phlebotomus perniciosus abundance in south-east Spain: assessing the role of environmental and anthropic factors.

    Science.gov (United States)

    Risueño, José; Muñoz, Clara; Pérez-Cutillas, Pedro; Goyena, Elena; Gonzálvez, Moisés; Ortuño, María; Bernal, Luis Jesús; Ortiz, Juana; Alten, Bulent; Berriatua, Eduardo

    2017-04-19

    Leishmaniosis is associated with Phlebotomus sand fly vector density, but our knowledge of the environmental framework that regulates highly overdispersed vector abundance distributions is limited. We used a standardized sampling procedure in the bioclimatically diverse Murcia Region in Spain and multilevel regression models for count data to estimate P. perniciosus abundance in relation to environmental and anthropic factors. Twenty-five dog and sheep premises were sampled for sand flies using adhesive and light-attraction traps, from late May to early October 2015. Temperature, relative humidity and other animal- and premise-related data recorded on site and other environmental data were extracted from digital databases using a geographical information system. The relationship between sand fly abundance and explanatory variables was analysed using binomial regression models. The total number of sand flies captured, mostly with light-attraction traps, was 3,644 specimens, including 80% P. perniciosus, the main L. infantum vector in Spain. Abundance varied between and within zones and was positively associated with increasing altitude from 0 to 900 m above sea level, except from 500 to 700 m where it was low. Populations peaked in July and especially during a 3-day heat wave when relative humidity and wind speed plummeted. Regression models indicated that climate and not land use or soil characteristics have the greatest impact on this species density on a large geographical scale. In contrast, micro-environmental factors such as animal building characteristics and husbandry practices affect sand fly population size on a smaller scale. A standardised sampling procedure and statistical analysis for highly overdispersed distributions allow reliable estimation of P. perniciosus abundance and identification of environmental drivers. While climatic variables have the greatest impact at macro-environmental scale, anthropic factors may be determinant at a micro

  14. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  15. Understanding Child-Based Effects on Parenting: Temperament as a Moderator of Genetic and Environmental Contributions to Parenting

    Science.gov (United States)

    Ganiban, Jody M.; Ulbricht, Jennifer; Saudino, Kimberly J.; Reiss, David; Neiderhiser, Jenae M.

    2011-01-01

    The degree to which child temperament moderates genetic and environmental contributions to parenting was examined. Participants were drawn from the Nonshared Environment and Adolescent Development project and included 720 sibling pairs, ages 13.5 + 2.0 years (Sibling 1) to 12.1 + 1.3 years (Sibling 2). The sample consisted of 6 sibling types: 93…

  16. Towards Understanding and Managing Sustainable Complex, Dynamic Environmental/Economic/Social Systems - The Evolving Role of the Natural Sciences

    Science.gov (United States)

    Historically the natural sciences have played a major role in informing environmental management decisions. However, review of landmark cases like Love Canal, NY and Times Beach, MO have shown that the value of natural science information in decision making can be overwhelmed by ...

  17. An Understanding of How Peer, Genetic, and Environmental Influences Can Motivate Terrorists or Ordinary People to Kill Themselves and Others

    Science.gov (United States)

    Lavoie-Perusse, Simon

    2009-01-01

    The purpose of this research paper is to find a correlation between peer, genetic, and environmental influences and the behavior and personality development during childhood. This study focuses on the 1999 Columbine High School Massacre to try to explain certain kinds of behavior. The study made on 275 freshmen at Cornell University showed that…

  18. Developing Seventh Grade Students' Understanding of Complex Environmental Problems with Systems Tools and Representations: a Quasi-experimental Study

    Science.gov (United States)

    Doganca Kucuk, Zerrin; Saysel, Ali Kerem

    2017-03-01

    A systems-based classroom intervention on environmental education was designed for seventh grade students; the results were evaluated to see its impact on the development of systems thinking skills and standard science achievement and whether the systems approach is a more effective way to teach environmental issues that are dynamic and complex. A quasi-experimental methodology was used to compare performances of the participants in various dimensions, including systems thinking skills, competence in dynamic environmental problem solving and success in science achievement tests. The same pre-, post- and delayed tests were used with both the comparison and experimental groups in the same public middle school in Istanbul. Classroom activities designed for the comparison group (N = 20) followed the directives of the Science and Technology Curriculum, while the experimental group (N = 22) covered the same subject matter through activities benefiting from systems tools and representations such as behaviour over time graphs, causal loop diagrams, stock-flow structures and hands-on dynamic modelling. After a one-month systems-based instruction, the experimental group demonstrated significantly better systems thinking and dynamic environmental problem solving skills. Achievement in dynamic problem solving was found to be relatively stable over time. However, standard science achievement did not improve at all. This paper focuses on the quantitative analysis of the results, the weaknesses of the curriculum and educational implications.

  19. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  20. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  1. The Elaborated Environmental Stress Hypothesis as a Framework for Understanding the Association between Motor Skills and Internalizing Problems: A mini-review

    Directory of Open Access Journals (Sweden)

    Vincent Oreste Mancini

    2016-02-01

    Full Text Available Poor motor skills have been shown to be associated with a range of psychosocial issues, including internalizing problems (anxiety and depression. While well-documented empirically, our understanding of why this relationship occurs remains theoretically underdeveloped. The Elaborated Environmental Stress Hypothesis by Cairney, Rigoli, and Piek (2013 provides a promising framework that seeks to explain the association between motor skills and internalizing problems, specifically in children with Developmental Coordination Disorder (DCD. The framework posits that poor motor skills predispose the development of internalizing problems via interactions with intermediary environmental stressors. At the time the model was proposed, limited direct evidence was available to support or refute the framework. Several studies and developments related to the framework have since been published. This mini-review seeks to provide an up-to-date overview of recent developments related to the Elaborated Environmental Stress Hypothesis. We briefly discuss the past research that led to its development, before moving to studies that have investigated the framework since it was proposed. While originally developed within the context of DCD in childhood, recent developments have found support for the model in community samples. Through the reviewed literature, this article provides support for the Elaborated Environmental Stress Hypothesis as a promising theoretical framework that explains the psychosocial correlates across the broader spectrum of motor ability. This evidence promotes the external validity of the framework for use across the broader spectrum of motor ability. However, given its recent conceptualisation, ongoing evaluation of the Elaborated Environmental Stress Hypothesis is recommended.

  2. The Elaborated Environmental Stress Hypothesis as a Framework for Understanding the Association Between Motor Skills and Internalizing Problems: A Mini-Review

    Science.gov (United States)

    Mancini, Vincent O.; Rigoli, Daniela; Cairney, John; Roberts, Lynne D.; Piek, Jan P.

    2016-01-01

    Poor motor skills have been shown to be associated with a range of psychosocial issues, including internalizing problems (anxiety and depression). While well-documented empirically, our understanding of why this relationship occurs remains theoretically underdeveloped. The Elaborated Environmental Stress Hypothesis by Cairney et al. (2013) provides a promising framework that seeks to explain the association between motor skills and internalizing problems, specifically in children with developmental coordination disorder (DCD). The framework posits that poor motor skills predispose the development of internalizing problems via interactions with intermediary environmental stressors. At the time the model was proposed, limited direct evidence was available to support or refute the framework. Several studies and developments related to the framework have since been published. This mini-review seeks to provide an up-to-date overview of recent developments related to the Elaborated Environmental Stress Hypothesis. We briefly discuss the past research that led to its development, before moving to studies that have investigated the framework since it was proposed. While originally developed within the context of DCD in childhood, recent developments have found support for the model in community samples. Through the reviewed literature, this article provides support for the Elaborated Environmental Stress Hypothesis as a promising theoretical framework that explains the psychosocial correlates across the broader spectrum of motor ability. However, given its recent conceptualization, ongoing evaluation of the Elaborated Environmental Stress Hypothesis is recommended. PMID:26941690

  3. Beyond Hearts and Minds: How The Operational Commander Must Understand Islamic War-Fighting Doctrine to Secure Victory in the Long War

    National Research Council Canada - National Science Library

    Vartanian, James M

    2008-01-01

    This paper examines the need for the operational commander to fully understand the religious, military and political doctrine of Islam's Prophet Muhammad if success is to be realized in the long war...

  4. Assessing and managing security risk in IT systems a structured methodology

    CERN Document Server

    McCumber, John

    2004-01-01

    SECURITY CONCEPTSUsing ModelsIntroduction: Understanding, Selecting, and Applying Models Understanding AssetsLayered Security Using Models in Security Security Models for Information Systems Shortcomings of Models in SecuritySecurity in Context Reference Defining Information SecurityConfidentiality, Integrity, and Availability Information AttributesIntrinsic versus Imputed Value Information as an Asset The Elements of Security Security Is Security Only in Context Information as an Asset Introduction Determining Value Managing Information Resources ReferencesUnderstanding Threat and Its Relatio

  5. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on environment laboratories: Protecting the environment

    International Nuclear Information System (INIS)

    2012-01-01

    According to the Millennium Development Goals, managing the environment is considered an integral part of the global development process. The main purpose of the IAEA's environment laboratories is to provide Member States with reliable information on environmental issues and facilitate decision making on protection of the environment. An increasingly important feature of this work is to assess the impact of climate change on environmental sustainability and natural resources. The IAEA's environment laboratories use nuclear techniques, radionuclides, isotopic tracers and stable isotopes to gain a better understanding of the various marine processes, including locating the sources of pollutants and their fate, their transport pathways and their ultimate accumulation in sediments. Radioisotopes are also used to study bioaccumulation in organisms and the food chain, as well as to track signals of climate change throughout history. Natural and artificial radionuclides are used to track ocean currents in key regions. They are also used to validate models designed to predict the future impact of climate change and ocean acidification. The laboratories study the fate and impact of contamination on a variety of ecosystems in order to provide effective preventative diagnostic and remediation strategies. They enhance the capability of Member States to use nuclear techniques to understand and assess changes in their own terrestrial and atmospheric environments, and adopt suitable and sustainable remediation measures when needed. Since 1995, the IAEA environment laboratories have coordinated the international network of Analytical Laboratories for the Measurement of Environmental Radioactivity, providing accurate analysis in the event of an accident or an intentional release of radioactivity. In addition, the laboratories work alongside other organizations, such as UNESCO, the IOC, UNEP and the EC. The laboratories collaborate with Member States through direct involvement with

  6. Current Understanding of Lifestyle and Environmental Factors and Risk of Non-Hodgkin Lymphoma: An Epidemiological Update

    International Nuclear Information System (INIS)

    Bassig, B. A.; Zhang, Y.; Zheng, T.; Lan, Q.; Rothman, N.

    2012-01-01

    The incidence rates of non-Hodgkin lymphoma (NHL) have steadily increased over the last several decades in the United States, and the temporal trends in incidence can only be partially explained by the HIV epidemic. In 1992, an international workshop sponsored by the United States National Cancer Institute concluded that there was an “emerging epidemic” of NHL and emphasized the need to investigate the factors responsible for the increasing incidence of this disease. Over the past two decades, numerous epidemiological studies have examined the risk factors for NHL, particularly for putative environmental and lifestyle risk factors, and international consortia have been established in order to investigate rare exposures and NHL subtype-specific associations. While few consistent risk factors for NHL aside from immunosuppression and certain infectious agents have emerged, suggestive associations with several lifestyle and environmental factors have been reported in epidemiologic studies. Further, increasing evidence has suggested that the effects of these and other exposures may be limited to or stronger for particular NHL subtypes. This paper examines the progress that has been made over the last twenty years in elucidating the etiology of NHL, with a primary emphasis on lifestyle factors and environmental exposures.

  7. Energy security and the IEA ExCo on combustion

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, P. [Hutchinson Consultant (United Kingdom)

    2009-07-01

    Energy security is an issue for those nations which consume more energy than is available from indigenous sources. A failure to secure adequate energy supplies at an acceptable price prejudices both national and economic security. Energy security is therefore a significant policy issue. A discussion of energy security and the International Energy Agency ExCo on combustion was offered in this presentation. The purpose of the discussion was to determine if a task or set of tasks on combustion research related to energy security should be launched; the structure of such a task; topics of interest; who would wish to participate; who would lead the collaboration; and the next steps. The presentation discussed the proper understanding and analysis of energy security and the interactions between international politics; defence; economics and economic development; present and future technologies; national infrastructure; resource distribution; and environmental science and politics. The presentation also discussed whether there was a shortage of energy, world reserves of crude oil, coal, and hydrocarbons. Oil supply disruptions and nominal and real world oil prices were also discussed. Options for addressing energy security were presented, with particular reference to increasing the energy intensity of the economy; using a wide range of different fuels such as coal; developing indigenous supplies such as renewables; and developing a reliable long life energy source. It was concluded that imports of energy can be reduced when energy security improves. tabs., figs.

  8. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  9. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  10. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  11. Information system of industrial security and environmental protection (SISPA) of PEMEX; Sistema de informacion de seguridad industrial y proteccion ambiental (SISPA) de PEMEX

    Energy Technology Data Exchange (ETDEWEB)

    Carrisoza B, Vicente; Bernal M, Hector M [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico); Cortazar F, Segio [Petroleos Mexicanos (Mexico)

    2002-07-01

    The Management of Supervision of Processes (GSP) in collaboration with the Management of Control and Instrumentation (GCI) of the Instituto de Investigaciones Electricas (IIE), has developed a system able to respond in a opportune and coordinated way to the attention and handling of emergencies, optimization of the number of reports and its content, reduction of the time in which the reports of industrial security and environmental protection arrive at their destiny, diminution of the manual process in the elaboration of reports and information and, finally, able to automatically calculate the associated performance indicators related to the efficiency of actions in each one the involved areas. [Spanish] La Gerencia de Supervision de Procesos (GSP) en colaboracion con la Gerencia de Control e Instrumentacion (GCI) del Instituto de Investigaciones Electricas (IIE), ha desarrollado un sistema capaz de responder de manera oportuna y coordinada a la atencion y manejo de emergencias, optimizacion del numero de reportes y su contenido, reduccion del tiempo en que los reportes de seguridad industrial y proteccion ambiental llegan a su destino, disminucion del proceso manual en la elaboracion de reportes e informes y, finalmente, capaz de calcular automaticamente los indicadores de desempeno asociados a la eficiencia de las acciones en cada una las areas involucradas.

  12. A Process-Philosophical Understanding of Organizational Learning as "Wayfinding": Process, Practices and Sensitivity to Environmental Affordances

    Science.gov (United States)

    Chia, Robert

    2017-01-01

    Purpose: This paper aims to articulate a practice-based, non-cognitivist approach to organizational learning. Design/methodology/approach: This paper explores the potential contribution of a process-based "practice turn" in social theory for understanding organizational learning. Findings: In complex, turbulent environments, robust…

  13. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  14. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  15. Training and Mentoring the Next Generation of Scientists and Engineers to Secure Continuity and Successes of the US DOE's Environmental Remediation Efforts - 13387

    Energy Technology Data Exchange (ETDEWEB)

    Lagos, L. [Applied Research Center, Florida International University, 10555 West Flagler Street, Suite 2100, Miami FL 33174 (United States)

    2013-07-01

    presentations given at WM. The DOE Fellows participation at WM has resulted in three Best Student Poster Awards (WM09, WM10, and WM11) and one Best Professional Poster Award (WM09). DOE Fellows have also presented their research at ANS DD and R and ANS Robotics Topical meetings. Moreover, several of our DOE Fellows have already obtained employment with DOE-EM, other federal agencies, DOE contractors. This paper will discuss how DOE Fellows program is training and mentoring FIU STEM students in Department of Energy's Office of Environmental Management technical challenges and research. This training and mentoring has resulted in the development of well trained and polished young scientists and engineers that will become the future workforce in charge of carrying on DOE-EM's environmental cleanup mission. The paper will showcase FIU's DOE Fellows model and highlight some of the applied research the DOE Fellows have conducted at FIU's Applied Research Center and across the Complex by participating in summer internship assignments. This paper will also present and highlight other Fellowships and internships programs sponsored by National Nuclear Security Agency (NNSA), DOE-EM, NRC, Energy (NE), and other federal agencies targeting workforce development. (authors)

  16. Training and Mentoring the Next Generation of Scientists and Engineers to Secure Continuity and Successes of the US DOE's Environmental Remediation Efforts - 13387

    International Nuclear Information System (INIS)

    Lagos, L.

    2013-01-01

    participation at WM has resulted in three Best Student Poster Awards (WM09, WM10, and WM11) and one Best Professional Poster Award (WM09). DOE Fellows have also presented their research at ANS DD and R and ANS Robotics Topical meetings. Moreover, several of our DOE Fellows have already obtained employment with DOE-EM, other federal agencies, DOE contractors. This paper will discuss how DOE Fellows program is training and mentoring FIU STEM students in Department of Energy's Office of Environmental Management technical challenges and research. This training and mentoring has resulted in the development of well trained and polished young scientists and engineers that will become the future workforce in charge of carrying on DOE-EM's environmental cleanup mission. The paper will showcase FIU's DOE Fellows model and highlight some of the applied research the DOE Fellows have conducted at FIU's Applied Research Center and across the Complex by participating in summer internship assignments. This paper will also present and highlight other Fellowships and internships programs sponsored by National Nuclear Security Agency (NNSA), DOE-EM, NRC, Energy (NE), and other federal agencies targeting workforce development. (authors)

  17. Environmental Aesthetics

    DEFF Research Database (Denmark)

    Svabo, Connie; Ekelund, Kathrine

    2015-01-01

    The philosophical subfield environmental aesthetics can contribute to the design of sustainable futures. Environmental aesthetics provides a conceptual framework for understanding the relationship between nature and culture. Current positions in environmental aesthetics are lined out and used...

  18. Streamlined Approach for Environmental Restoration (SAFER) Plan for Corrective Action Unit 465: Hydronuclear Nevada National Security Site, Nevada, with ROTC 1, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-11-01

    This Streamlined Approach for Environmental Restoration (SAFER) Plan addresses the actions needed to achieve closure for Corrective Action Unit (CAU) 465, Hydronuclear, identified in the Federal Facility Agreement and Consent Order (FFACO). Corrective Action Unit 465 comprises the following four corrective action sites (CASs) located in Areas 6 and 27 of the Nevada National Security Site: (1) 00-23-01, Hydronuclear Experiment; (2) 00-23-02, Hydronuclear Experiment; (3) 00-23-03, Hydronuclear Experiment; (4) 06-99-01, Hydronuclear. The sites will be investigated based on the data quality objectives (DQOs) developed on July 6, 2011, by representatives of the Nevada Division of Environmental Protection (NDEP) and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to determine and implement appropriate corrective actions for each CAS in CAU 465. For CAU 465, two potential release components have been identified. The subsurface release component includes potential releases of radiological and nonradiological contaminants from the subsurface hydronuclear experiments and disposal boreholes. The surface release component consists of other potential releases of radiological and nonradiological contaminants to surface soils that may have occurred during the pre- and post-test activities. This plan provides the methodology for collection of the necessary information for closing each CAS component. There is sufficient information and process knowledge from historical documentation, contaminant characteristics, existing regional and site groundwater models, and investigations of similar sites regarding the expected nature and extent of potential contaminants to recommend closure of CAU 465 using the SAFER process. For potential subsurface releases, flow and transport models will be developed to integrate existing data into a conservative

  19. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  20. Understanding and Designing the Strategies for the Microbe-Mediated Remediation of Environmental Contaminants Using Omics Approaches

    Directory of Open Access Journals (Sweden)

    Muneer A. Malla

    2018-06-01

    Full Text Available Rapid industrialization and population explosion has resulted in the generation and dumping of various contaminants into the environment. These harmful compounds deteriorate the human health as well as the surrounding environments. Current research aims to harness and enhance the natural ability of different microbes to metabolize these toxic compounds. Microbial-mediated bioremediation offers great potential to reinstate the contaminated environments in an ecologically acceptable approach. However, the lack of the knowledge regarding the factors controlling and regulating the growth, metabolism, and dynamics of diverse microbial communities in the contaminated environments often limits its execution. In recent years the importance of advanced tools such as genomics, proteomics, transcriptomics, metabolomics, and fluxomics has increased to design the strategies to treat these contaminants in ecofriendly manner. Previously researchers has largely focused on the environmental remediation using single omics-approach, however the present review specifically addresses the integrative role of the multi-omics approaches in microbial-mediated bioremediation. Additionally, we discussed how the multi-omics approaches help to comprehend and explore the structural and functional aspects of the microbial consortia in response to the different environmental pollutants and presented some success stories by using these approaches.

  1. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  2. NASA's Advanced Environmental Barrier Coatings Development for SiC/SiC Ceramic Matrix Composites: Understanding Calcium Magnesium Alumino-Silicate (CMAS) Degradations and Resistance

    Science.gov (United States)

    Zhu, Dongming

    2014-01-01

    Environmental barrier coatings (EBCs) and SiCSiC ceramic matrix composites (CMCs) systems will play a crucial role in next generation turbine engines for hot-section component applications because of their ability to significantly increase engine operating temperatures with improved efficiency, reduce engine weight and cooling requirements. The development of prime-reliant environmental barrier coatings is essential to the viability and reliability of the envisioned CMC engine component applications, ensuring integrated EBC-CMC system durability and designs are achievable for successful applications of the game-changing component technologies and lifing methodologies.This paper will emphasize recent NASA environmental barrier coating developments for SiCSiC turbine airfoil components, utilizing advanced coating compositions, state-of-the-art processing methods, and combined mechanical and environment testing and durability evaluations. The coating-CMC degradations in the engine fatigue-creep and operating environments are particularly complex; one of the important coating development aspects is to better understand engine environmental interactions and coating life debits, and we have particularly addressed the effect of Calcium-Magnesium-Alumino-Silicate (CMAS) from road sand or volcano-ash deposits on the durability of the environmental barrier coating systems, and how the temperature capability, stability and cyclic life of the candidate rare earth oxide and silicate coating systems will be impacted in the presence of the CMAS at high temperatures and under simulated heat flux conditions. Advanced environmental barrier coating systems, including HfO2-Si with rare earth dopant based bond coat systems, will be discussed for the performance improvements to achieve better temperature capability and CMAS resistance for future engine operating conditions.

  3. The Intersection of Environmental Variability, Policy, and Human Values: International Treaties, Yukon River Salmon, and Food Security in a Changing Arctic (Invited)

    Science.gov (United States)

    Gerlach, S.; Loring, P. A.; Murray, M. S.

    2009-12-01

    2009 was a particularly devastating year for rural communities of the Yukon River in Alaska. For a number of reasons, including annual variability in Chinook and Chum salmon runs, imperfect monitoring and information, “best practices” management decisions by regulatory agencies, and international treaty obligations related to conservation and total allowable catch allocation, the smokehouses and freezers of many Alaska Native families, particularly those in up-river communities in the Yukon Flats region, are empty; a problem that has prompted Alaska’s Governor Sean Parnell to ask the US Federal Government to declare a disaster. However, depending on whom you ask, this year’s management of these resources, which provide food security and enable self-reliance in rural communities, may be evaluated as a failure or as a success. How can we reconcile an institutional assessment that claims success as defined in terms of internationally-agreed upon conservation and escapement goals, with the negative economic and health impacts on communities? We use this case to illustrate how the whole Yukon River watershed and drainage, including Alaska and Canada, provides an elegant, geographic context for the discussion and analysis of the human dimensions of environmental change and regional sustainability. Policymakers have arguably gone to great lengths to reconcile competing ‘uses’ of the Yukon River, including commercial and subsistence uses as well as conservation goals, but while managers continue to strive to be ‘adaptive learners’ in their approach to balancing these goals, the impacts on rural communities are immediate and cumulative, synergistic, temporally and spatially scaled, and directly related to rural livelihoods, community health, well-being and sustainability. The cost of this ‘adaptive’ process may be too high, both for the ecosystem and for the people who live there. Are we asking too much of the Yukon River? Are we asking too much of the

  4. The response of stream periphyton to Pacific salmon: using a model to understand the role of environmental context

    Science.gov (United States)

    Bellmore, J. Ryan; Fremier, Alexander K.; Mejia, Francine; Newsom, Michael

    2014-01-01

    1. In stream ecosystems, Pacific salmon deliver subsidies of marine-derived nutrients and disturb the stream bed during spawning. The net effect of this nutrient subsidy and physical disturbance on biological communities can be hard to predict and is likely to be mediated by environmental conditions. For periphyton, empirical studies have revealed that the magnitude and direction of the response to salmon varies from one location to the next. Salmon appear to increase periphyton biomass and/or production in some contexts (a positive response), but decrease them in others (a negative response). 2. To reconcile these seemingly conflicting results, we constructed a system dynamics model that links periphyton biomass and production to salmon spawning. We used this model to explore how environmental conditions influence the periphyton response to salmon. 3. Our simulations suggest that the periphyton response to salmon is strongly mediated by both background nutrient concentrations and the proportion of the stream bed suitable for spawning. Positive periphyton responses occurred when both background nutrient concentrations were low (nutrient limiting conditions) and when little of the stream bed was suitable for spawning (because the substratum is too coarse). In contrast, negative responses occurred when nutrient concentrations were higher or a larger proportion of the bed was suitable for spawning. 4. Although periphyton biomass generally remained above or below background conditions for several months following spawning, periphyton production returned quickly to background values shortly afterwards. As a result, based upon our simulations, salmon did not greatly increase or decrease overall annual periphyton production. This suggests that any increase in production by fish or invertebrates in response to returning salmon is more likely to occur via direct consumption of salmon carcasses and/or eggs, rather than the indirect effects of greater periphyton production. 5

  5. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  6. Environmental security, politics and markets

    NARCIS (Netherlands)

    Gaay Fortman, B. de

    2009-01-01

    While sustainable development has shown a remarkable degree of persistence and staying power as a concept, implementation of intragenerational as well as intergenerational equity remains as problematic as true universality of human rights. Notable is the Earth Charter that

  7. Environmental security of coastal seas

    International Nuclear Information System (INIS)

    Valkovic, Vladivoj; Sudac, Davorin; Nad, Karlo; Obhodas, Jasmina; Kollar, Robert; Matika, Dario

    2008-01-01

    Full text: The bottoms of the coastal seas are contaminated by many man-made objects including a variety of ammunition. This contamination is world wide spread with some areas being highly polluted presenting a serious threat to local population and to visitors as well. All littoral nations are investing lots of effort into the remediation of their coastal areas. In this report an effort to identify the nature of the object on the sea bottom is presented. Once the presence of the anomaly on the bottom of the shallow coastal sea water is confirmed (by visual identification and by using one or several sensors, namely magnetometer, sonar and optical cameras) it is necessary to establish if it contains explosive and/or chemical warfare charge. In our work we propose this to be performed by using neutron sensor installed within an underwater vessel - 'Surveyor'. When positioned above the object, or to its side, the system inspects the object for the presence of the threat material by using alpha particle tagged neutrons from the sealed tube d+t neutron generator. The inside of the first prototype of the underwater system 'Surveyor' containing neutron generator, shielding and gamma ray detector is shown in figure. The neutron generator used by the 'Surveyor' is rotated by two step motors so that different volume elements chosen by the relative position of the neutron generator and gamma ray detector could be inspected. In such a way a profile of concentrations could also be measured. The preliminary results from the laboratory tests are presented

  8. Indonesia: An Environmental Security Assessment

    Science.gov (United States)

    1998-04-01

    Planet. New York: The Free Press, 1995. Baker, M. Sharon. “McCaw Raises $1.1 Billion To Wire Asia And Latin America .” Business Journal Serving San...Other illnesses that have been aggravated or caused by the smoke include conjunctivitis, asthma , bronchitis, eczema, and skin and eye ailments. 5...assessment and mitigation project 200,000 UNICEF Provision of 21,650 face masks 20,000 Procurement of ARI drugs for children in Sumatra and Kalimantan

  9. Applying a new understanding of supergene REE deposit formation to global exploration initiatives for environmentally sustainable resources

    Science.gov (United States)

    Hardy, Liam; Smith, Martin; Hood, Leo; Heller, Shaun; Faltyn, Rowan; Blum, Astrid; Bamberger, Axel

    2017-04-01

    ). Rare earth elements: A review of production, processing, recycling and associated environmental issues; EPA600/R-12/572. United States Environmental Protection Agency. Hardy, L. (2016). A novel mechanism for the formation of REE ion-adsorption deposits. Presented to: MDSG Winter Meeting, Bristol University, 20/12/16. Jenkins, R. (1979). The Road to Alto: An account of peasants, capitalists and their soil in the mountains of Southern Portugal. London: Pluto, ISBN: 0861040767. Marquis, E. (2016). Ion Adsorption-Type REE Deposit associated with the Ambohimirahavavy Alkaline Complex: Potential Controls on Mineralisation. Presented to: MDSG Winter Meeting, Bristol University, 20/12/16.

  10. Land-Use Change and the Billion Ton 2016 Resource Assessment: Understanding the Effects of Land Management on Environmental Indicators

    Science.gov (United States)

    Kline, K. L.; Eaton, L. M.; Efroymson, R.; Davis, M. R.; Dunn, J.; Langholtz, M. H.

    2016-12-01

    The federal government, led by the U.S. Department of Energy (DOE), quantified potential U.S. biomass resources for expanded production of renewable energy and bioproducts in the 2016 Billion-Ton Report: Advancing Domestic Resources for a Thriving Bioeconomy (BT16) (DOE 2016). Volume 1 of the report provides analysis of projected supplies from 2015 to2040. Volume 2 (forthcoming) evaluates changes in environmental indicators for water quality and quantity, carbon, air quality, and biodiversity associated with production scenarios in BT16 volume 1. This presentation will review land-use allocations under the projected biomass production scenarios and the changes in land management that are implied, including drivers of direct and indirect LUC. National and global concerns such as deforestation and displacement of food production are addressed. The choice of reference scenario, input parameters and constraints (e.g., regarding land classes, availability, and productivity) drive LUC results in any model simulation and are reviewed to put BT16 impacts into context. The principal LUC implied in BT16 supply scenarios involves the transition of 25-to-47 million acres (net) from annual crops in 2015 baseline to perennial cover by 2040 under the base case and 3% yield growth case, respectively. We conclude that clear definitions of land parameters and effects are essential to assess LUC. A lack of consistency in parameters and outcomes of historic LUC analysis in the U.S. underscores the need for science-based approaches.

  11. Indirection and computer security.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  12. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  13. Toward an analytical framework for understanding complex social-ecological systems when conducting environmental impact assessments in South Africa

    Directory of Open Access Journals (Sweden)

    Rebecca Bowd

    2015-03-01

    Full Text Available Consideration of biophysical impacts has historically dominated environmental impact assessment (EIA practice. Despite the emergence of social impact assessment, the consideration of socioeconomic impacts in EIA is variable, as is the extent of their integration in EIA findings. There is growing recognition for the need to move EIA practice toward sustainability assessment, characterized by comprehensiveness, i.e., scope of impacts, integration, i.e., of biophysical and socioeconomic impacts, and a greater strategic focus. This is particularly the case in developing regions and in countries like South Africa, which have statutory requirements for the full consideration of socioeconomic impacts in EIA. We suggest that EIA practice could benefit from incorporating evolving theory around social-ecological systems (SES as an effective way of moving toward sustainability assessment. As far as we are aware, our study constitutes the first attempt to apply and formalize SES constructs to EIA practice within a regulated procedure. Our framework goes beyond conventional scoping approaches reliant on checklists and matrices by requiring the EIA practitioner to cocreate a conceptual model of the current and future social-ecological system with the implicated communities. This means social and biophysical impacts are assessed integratively, and that communities participate meaningfully in the EIA process, thereby helping address two of the most common shortfalls of EIA practice. The framework was applied in two case studies, establishment of community-based accommodation linked to existing tourism infrastructure (Eastern Cape, South Africa, and a proposed wine estate (KwaZulu-Natal, South Africa. The framework revealed impacts, which would not be considered in a biophysically-oriented EIA, and helped identify development synergies and institutional and governance needs that are equally likely to have been overlooked. We suggest the framework has value as a

  14. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  15. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  16. Indigenous Knowledge - A Holistic View Through a Food Security Lens

    Science.gov (United States)

    Angnaboogok, V.; Behe, C.; Daniel, R. G.

    2017-12-01

    Rapid changes occurring within the Arctic heighten the need to understand the multiple drivers pushing change and their cumulative impacts. Most importantly to better understand Arctic change a holistic view is needed that can only be achieved through bringing together multiple knowledge systems and scientific disciplines. Inuit have called the Arctic home from time immemorial acquiring a knowledge system. The Inuit knowledge system continues to grow, and holds methodologies and assessment processes that provide a pathway for holistically understanding the Arctic. This holistic view is largely attributed to a focus on relationships between system components, close attention to food webs, and a unique understanding of interconnecting systems. The Alaskan Inuit understanding of food security represents an Indigenous way of viewing the world - where food security encompasses complex and interlinked cultural and environmental systems. These systems are comprised of connections among the health of people, animals, and plants; the different states of land, sea, and air; and the cultural fabric held together by language, cultural expression, and social integrity. Within the Inuit knowledge system, it is impossible to disentangle some of these relationships; when we discuss an Inuit food security perspective, it is this interconnectivity and these relationships that we refer to. This presentation will offer an introduction to what it means to adopt a food security lens approach - a view needed to build our knowledge of the changes that are occurring and further our understanding of cumulative impacts while illuminating the nexus between all pieces that make up Arctic ecosystems.

  17. High frequency monitoring of pesticides in runoff water to improve understanding of their transport and environmental impacts.

    Science.gov (United States)

    Lefrancq, Marie; Jadas-Hécart, Alain; La Jeunesse, Isabelle; Landry, David; Payraudeau, Sylvain

    2017-06-01

    Rainfall-induced peaks in pesticide concentrations can occur rapidly. Low frequency sampling may therefore largely underestimate maximum pesticide concentrations and fluxes. Detailed storm-based sampling of pesticide concentrations in runoff water to better predict pesticide sources, transport pathways and toxicity within the headwater catchments is lacking. High frequency monitoring (2min) of seven pesticides (Dimetomorph, Fluopicolide, Glyphosate, Iprovalicarb, Tebuconazole, Tetraconazole and Triadimenol) and one degradation product (AMPA) were assessed for 20 runoff events from 2009 to 2012 at the outlet of a vineyard catchment in the Layon catchment in France. The maximum pesticide concentrations were 387μgL -1 . Samples from all of the runoff events exceeded the legal limit of 0.1μgL -1 for at least one pesticide (European directive 2013/39/EC). High resolution sampling used to detect the peak pesticide levels revealed that Toxic Units (TU) for algae, invertebrates and fish often exceeded the European Uniform principles (25%). The point and average (time or discharge-weighted) concentrations indicated up to a 30- or 4-fold underestimation of the TU obtained when measuring the maximum concentrations, respectively. This highlights the important role of sampling methods for assessing peak exposure. High resolution sampling combined with concentration-discharge hysteresis analyses revealed that clockwise responses were predominant (52%), indicating that Hortonian runoff is the prevailing surface runoff trigger mechanism in the study catchment. The hysteresis patterns for suspended solids and pesticides were highly dynamic and storm- and chemical-dependent. Intense rainfall events induced stronger C-Q hysteresis (magnitude). This study provides new insights into the complexity of pesticide dynamics in runoff water and highlights the ability of hysteresis analysis to improve understanding of pesticide supply and transport. Copyright © 2017 Elsevier B.V. All

  18. Using a Prediction Model to Manage Cyber Security Threats

    Directory of Open Access Journals (Sweden)

    Venkatesh Jaganathan

    2015-01-01

    Full Text Available Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  19. Using a Prediction Model to Manage Cyber Security Threats.

    Science.gov (United States)

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  20. Using a Prediction Model to Manage Cyber Security Threats

    Science.gov (United States)

    Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization. PMID:26065024

  1. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Science.gov (United States)

    2011-05-12

    ... Subjects Environmental protection, Business and industry, Government property, Security measures. Dated... Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information...

  2. A multidisciplinary environmental integrated approach to better understand the Tegnue Reefs formation, offshore Chioggia, Northern Adriatic Sea.

    Science.gov (United States)

    Bergamasco, Andrea; Donnici, Sandra; Tosi, Luigi; Tagliapietra, Davide; Zaggia, Luca; Bonaldo, Davide; Braga, Federica; Da Lio, Cristina; Keppel, Erica; Lorenzetti, Giuliano; Manfè, Giorgia; Franceschini, Gianluca; Giovanardi, Otello; Carol, Eleonora; Fornaro, Elena; Grant, Carley

    2014-05-01

    Several hard substrata cover the northwestern Adriatic shelf around 20 m depth as patchy reefs called 'Tegnue'. These submerged reefs form many discrete sets from offshore Grado south to the Po river delta with a large field located off Chioggia. Even if the outer part of the reef is constituted by a thick biogenic formation the underlying structure, mainly buried, is made by cemented sand and this seems to be correlated with its origin not yet fully understood. Different genetic interpretations have been proposed thus far, contemplating among other cementation due to beach-rock like processes (e.g., Stefanon, 1969, Bonardi and Tosi, 2002, Bonardi et al., 2006) or the action of ascending fluids enriched in hydrocarbons (e.g., Gabbianelli et al., 1997, Casellato and Stefanon, 2008). An on-going project, mainly a multidisciplinary integrated approach, combining physical, biological, geological, geomorphological, hydrogeological and geochemical data, supported by a detailed bathymetric mapping, an overall general circulation modeling at high resolution, a robust geophysical evidence, and detailed underwater surveys performed by a team of scuba-diver scientists, aims to better understand the genetic processes backing the distribution, early genesis and evolution of such relevant habitats. Actually, using all the new available data, our plan is to verify which previous interpretations on the origin of the Tegnue core better match with the diagenetic processes that led to the cementation of the sand layers lying at the base of the organic reefs. Preliminary results suggest that the Tegnue reefs formed along paleochannels features related to the former alluvial plain and submerged by the Holocene transgression. Whatever their genesis, once exposed such rocky substrata are then quickly colonized by living organisms, which contribute to the growth and expansion of the reef. Calcareous algae and in general the organic concretion could have a role during the reef accretion

  3. ENVIRONMENTAL CONCERN AND ENVIRONMENTALLY ...

    African Journals Online (AJOL)

    critique of theoretical approaches towards understanding the formation of environmental attitudes, a model has been developed ... instances, people must have the motivation and know- ... feelings and emotion, and behaviour to behavioural.

  4. Information Security - Data Loss Prevention Procedure

    Science.gov (United States)

    The purpose of this procedure is to extend and provide specificity to the Environmental Protection Agency (EPA) Information Security Policy regarding data loss prevention and digital rights management.

  5. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  6. Development and analysis of security policies in security enhanced Android

    OpenAIRE

    Rimando, Ryan A.

    2012-01-01

    Approved for public release; distribution is unlimited. This thesis examines Security Enhanced Android. Both its policy and its additional security features are explored. The policy is examined in depth, providing a better understanding of the security provided by SE Android. We analyze the default SE Android policy. We identify a potential weakness and change the policy to facilitate control over communication channels. A proof-of-concept set of applications is developed to demonstrate ho...

  7. Understanding the ‘Intensive’ in ‘Data Intensive Research’: Data Flows in Next Generation Sequencing and Environmental Networked Sensors

    Directory of Open Access Journals (Sweden)

    Ruth McNally

    2012-03-01

    Full Text Available Genomic and environmental sciences represent two poles of scientific data. In the first, highly parallel sequencing facilities generate large quantities of sequence data. In the latter, loosely networked remote and field sensors produce intermittent streams of different data types. Yet both genomic and environmental sciences are said to be moving to data intensive research. This paper explores and contrasts data flow in these two domains in order to better understand how data intensive research is being done. Our case studies are next generation sequencing for genomics and environmental networked sensors.Our objective was to enrich understanding of the ‘intensive’ processes and properties of data intensive research through a ‘sociology’ of data using methods that capture the relational properties of data flows. Our key methodological innovation was the staging of events for practitioners with different kinds of expertise in data intensive research to participate in the collective annotation of visual forms. Through such events we built a substantial digital data archive of our own that we then analysed in terms of three traits of data flow: durability, replicability and metrology.Our findings are that analysing data flow with respect to these three traits provides better insight into how doing data intensive research involves people, infrastructures, practices, things, knowledge and institutions. Collectively, these elements shape the topography of data and condition how it flows. We argue that although much attention is given to phenomena such as the scale, volume and speed of data in data intensive research, these are measures of what we call ‘extensive’ properties rather than intensive ones. Our thesis is that extensive changes, that is to say those that result in non-linear changes in metrics, can be seen to result from intensive changes that bring multiple, disparate flows into confluence.If extensive shifts in the modalities of

  8. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  9. Environmental change and hydrological responses in the interior of western Canada: Towards improved understanding, diagnosis, and prediction by the Changing Cold Regions Network

    Science.gov (United States)

    DeBeer, C. M.; Wheater, H. S.; Carey, S. K.; Pomeroy, J. W.; Stewart, R. E.

    2016-12-01

    The past several decades have been a period of rapid climatic and environmental change. In western Canada, as in other areas globally, warming and changes in precipitation have led to vast reductions in seasonal snowcover and freshwater ice cover, retreating glaciers, thawing permafrost, changing forest composition and structure, increasing northern shrub coverage, and earlier timing of river flows in spring. Yet streamflow volume has exhibited a variety of responses across the region and over different time scales, and patterns of change are not easily generalizable. Improved understanding, diagnosis, and prediction of the rapidly changing components of the Earth system are key to managing uncertain water futures, but this is challenging due to complex system behavior and sometimes compensatory responses. The Changing Cold Regions Network (CCRN) is a Canadian research network and GEWEX Regional Hydroclimate Project that is addressing these issues, with a geographic focus on the Saskatchewan and Mackenzie River basins. This paper will present examples of the changes that have been observed at a set of long-term and well-studied headwater research basins, and highlight how various processes confound hydrological responses here, pointing to the need for careful diagnosis. We will discuss some recent CCRN activities and progress toward improving conceptual understanding and developing scenarios of change for the 21st century, which can then be applied within process-based hydrological models for future prediction. Several priority research areas that will be a focus of continued work in CCRN will be recommended.

  10. Teaching Teaching & Understanding Understanding

    DEFF Research Database (Denmark)

    2006-01-01

    "Teaching Teaching & Understanding Understanding" is a 19-minute award-winning short-film about teaching at university and higher-level educational institutions. It is based on the "Constructive Alignment" theory developed by Prof. John Biggs. The film delivers a foundation for understanding what...

  11. Socio-hydrologic modeling to understand and mediate the competition for water between agriculture development and environmental health: Murrumbidgee River basin, Australia

    Science.gov (United States)

    van Emmerik, T. H. M.; Li, Z.; Sivapalan, M.; Pande, S.; Kandasamy, J.; Savenije, H. H. G.; Chanan, A.; Vigneswaran, S.

    2014-10-01

    Competition for water between humans and ecosystems is set to become a flash point in the coming decades in many parts of the world. An entirely new and comprehensive quantitative framework is needed to establish a holistic understanding of that competition, thereby enabling the development of effective mediation strategies. This paper presents a modeling study centered on the Murrumbidgee River basin (MRB). The MRB has witnessed a unique system dynamics over the last 100 years as a result of interactions between patterns of water management and climate driven hydrological variability. Data analysis has revealed a pendulum swing between agricultural development and restoration of environmental health and ecosystem services over different stages of basin-scale water resource development. A parsimonious, stylized, quasi-distributed coupled socio-hydrologic system model that simulates the two-way coupling between human and hydrological systems of the MRB is used to mimic and explain dominant features of the pendulum swing. The model consists of coupled nonlinear ordinary differential equations that describe the interaction between five state variables that govern the co-evolution: reservoir storage, irrigated area, human population, ecosystem health, and environmental awareness. The model simulations track the propagation of the external climatic and socio-economic drivers through this coupled, complex system to the emergence of the pendulum swing. The model results point to a competition between human "productive" and environmental "restorative" forces that underpin the pendulum swing. Both the forces are endogenous, i.e., generated by the system dynamics in response to external drivers and mediated by humans through technology change and environmental awareness, respectively. Sensitivity analysis carried out with the model further reveals that socio-hydrologic modeling can be used as a tool to explain or gain insight into observed co-evolutionary dynamics of diverse

  12. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  13. Fostering Environmental Knowledge and Action through Online Learning Resources

    DEFF Research Database (Denmark)

    Maier, Carmen Daniela

    2010-01-01

    In order to secure correct understanding of environmental issues, to promote behavioral change and to encourage environmental action, more and more educational practices support and provide environmental programs. This article explores the design of online learning resources created for teachers...... and students by the GreenLearning environmental education program. The topic is approached from a social semiotic perspective. I conduct a multimodal analysis of the knowledge processes and the knowledge selection types that characterize the GreenLearning environmental education program and its online...

  14. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  15. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  16. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  17. The Historical, Environmental and Socio-Economic Context of Forests and Tree-Based Systems for Food Security and Nutrition (Chapter 3)

    Science.gov (United States)

    John A. Parrotta; Jennie Dey de Pryck; Beatrice Darko Obiri; Christine Padoch; Bronwen Powell; Chris Sandbrook

    2015-01-01

    Forests and tree-based systems are an important component of rural landscapes, sustaining livelihoods and contributing to the food security and nutritional needs of hundreds of millions of people worldwide. Historically, these systems developed under a wide variety of ecological conditions, and cultural and socio-economic contexts, as integrated approaches that...

  18. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  19. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  20. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  1. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  2. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  3. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  4. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  5. The Relationship between Academic Major and Environmentalism among College Students: Is It Mediated by the Effects of Gender, Political Ideology and Financial Security?

    Science.gov (United States)

    Lang, Kenneth Brandon

    2011-01-01

    Several studies have found a relationship between college students' academic majors and their environmental attitudes and behaviors. Results from this study of incoming first-year students at a medium-sized public university suggest that students majoring in different programs of study were likely to have different environmental attitudes and…

  6. Spring security 3.x cookbook

    CERN Document Server

    Mankale, Anjana

    2013-01-01

    This book follows a cookbook style exploring various security solutions provided by Spring Security for various vulnerabilities and threat scenarios that web applications may be exposed to at the authentication and session level layers.This book is for all Spring-based application developers as well as Java web developers who wish to implement robust security mechanisms into web application development using Spring Security.Readers are assumed to have a working knowledge of Java web application development, a basic understanding of the Spring framework, and some knowledge of the fundamentals o

  7. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  8. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  9. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on nuclear physics: Facilitating the peaceful and practical uses of nuclear science

    International Nuclear Information System (INIS)

    2012-01-01

    When properly applied, nuclear science - the study of atomic nuclei and other subatomic particles - can contribute in many ways to the health, development and security of communities around the world. In this context, the IAEA plays an important role in helping interested Member States develop the capabilities and infrastructure necessary to manage their own programmes devoted to nuclear and radiological applications. The IAEA's nuclear science programme helps Member States to establish sound frameworks for the efficient, safe and secure use of new nuclear technologies, including accelerator facilities, research reactors and future nuclear fusion facilities. By applying nuclear technologies in a wide variety of areas such as energy production, health care, food and agriculture, industry and the environment, Member States can benefit immensely from the ensuing socioeconomic developments, as well as providing better living conditions for their citizens.

  10. Understanding Resilience

    Directory of Open Access Journals (Sweden)

    Gang eWu

    2013-02-01

    Full Text Available Resilience is the ability to adapt successfully in the face of stress and adversity. Stressful life events, trauma and chronic adversity can have a substantial impact on brain function and structure, and can result in the development of PTSD, depression and other psychiatric disorders. However, most individuals do not develop such illnesses after experiencing stressful life events, and are thus thought to be resilient. Resilience as successful adaptation relies on effective responses to environmental challenges and ultimate resistance to the deleterious effects of stress, therefore a greater understanding of the factors that promote such effects is of great relevance. This review focuses on recent findings regarding genetic, epigenetic, developmental, psychosocial and neurochemical factors that are considered essential contributors to the development of resilience. Neural circuits and pathways involved in mediating resilience are also discussed. The growing understanding of resilience factors will hopefully lead to the development of new pharmacological and psychological interventions for enhancing resilience and mitigating the untoward consequences.

  11. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  12. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  13. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  14. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  15. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  16. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  17. Introduction to network security

    CERN Document Server

    Jacobson, Douglas

    2008-01-01

    … Students can easily understand how things work thanks to the different figures/definitions … students can see the different steps taken to build a secure environment and avoid most of the usual mistakes. … A website (http://www.dougj.net/textbook) is provided to support the book, where the reader can find additional content, like instructor materials, slides to support the book, on-line tutorials, help to start the programming parts. It is not mandatory at all to understand the book, but it is a really nice addition. … the book is really well written, and easily understandable without lackin

  18. Center for Strategic Leadership, Issue Paper, January 2004, Volume 02-04. Addressing Transnational Threats in Southeast Asia: Environmental Security and Counter Terrorism

    National Research Council Canada - National Science Library

    Butts, Kent

    2004-01-01

    ... (Installations & Environmental), The U.S. Army, Pacific (USARPAC), and The U.S. Army War College (USAWC) Center for Strategic Leadership sponsored the conference in coordination with the Republic...

  19. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  20. Private Security Contractors in Darfur

    DEFF Research Database (Denmark)

    Leander, Anna

    2006-01-01

    This article argues that the role of Private Security Contractors in Darfur reflects and reinforces neo-liberal governmentality in contemporary security governance. It is an argument (in line with other articles in this special issue) which is more interested in discussing how the privatization....... It underlines that governance is increasingly taking place through a set of (quasi-) markets, it is marked by entrepreneurial values, and a hands off approach to governance. We then discuss the way this overall change is reflected in and reinforced by the role of private security contractors in Darfur. Drawing...... at these processes is necessary to understand the role of private security contractors in Darfur. But more than this, practices in Darfur entrench neo-liberal governmentality in security more generally. The managerial and `de-politicizing' approach to security in Darfur displaces alternative views not only...

  1. MovingU: A prospective cohort study to understand behavioural and environmental contexts influencing physical activity during the transition into emerging adulthood

    Directory of Open Access Journals (Sweden)

    Matthew Y. W. Kwan

    2016-08-01

    Full Text Available Abstract Background Children and youth are often considered the most active segment of the population, however, research indicates that physical activity (PA tends to peak during the adolescent years, declining thereafter with age. In particular, the acute transition out of high school is a period for which individuals appear to be at high-risk for becoming less active. Relatively few studies have investigated the factors influencing the changes in PA during this transition period. Therefore the purpose of the MovingU study is to gain a comprehensive understanding of the behavioural patterns and the socio-ecological factors related to the changes in PA during the transition out of high school. Methods/Design MovingU is comprised of two phases. Phase I is a prospective cohort design and aims to follow 120 students in their last year of high school through to their first year out of high school. Students will be asked to complete questionnaires measuring various psychosocial and socio-environmental variables (e.g., self-efficacy and distress four times throughout this transition period. Students will also be given a wrist-worn accelerometer to wear for 7-days at each of the four assessments. Phase II is a cross-sectional study involving 100 first-year university students. Students will be asked to complete the same questionnaire from phase I, wear a wrist-worn accelerometer for 5-days, and complete ecological momentary assessments (EMA using their smartphones at randomly selected times throughout the day for 5-days. EMA items will capture information regarding contextual and momentary correlates of PA. Discussion The MovingU study represents the first to evaluate the social and environmental influences of PA behaviour changes, including the use of intensive real-time data capture strategies during the transition out of high school. This information will be critical in the development of interventions aimed to prevent or attenuate such drastic

  2. Ethics and European security

    Energy Technology Data Exchange (ETDEWEB)

    Paskins, B.

    1986-01-01

    The alliance between the United States and her NATO partners has been strained severely in the last few years. American perceptions of European disloyalty and European impressions of American assertiveness and lack of judgment have played a large part in generating tensions between the allies and emphasising the new peace movements. This book is an attempt to develop a broader understanding of the problem of European security based on Christian ethics. There are disagreements and differences of emphasis among the contributors but they have in common the view that an exclusive preoccupation with the military dimension is damagingly one-sided. Instead the contributors argue that moral and theological concerns are a vital part of the politics and mechanics of European security and must be incorporated in any effort to devise new policies for security in Europe and the West.

  3. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  4. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  5. Zen and the art of information security

    CERN Document Server

    Winkler, Ira

    2007-01-01

    While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.

  6. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  7. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  8. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  9. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  10. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  11. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  12. Information security becoming a priority for utilities

    Energy Technology Data Exchange (ETDEWEB)

    Nicolaides, S. [Numerex, Atlanta, GA (United States)

    2009-10-15

    As part of North America's national critical infrastructure, utilities are finding themselves at the forefront of a security issue. In October 2007, a leading security service provider reported a 90 per cent increase in the number of hackers attempting to attack its utility clients in just one year. Utilities are vulnerable to cyber attacks that could disrupt power production and the transmission system. This article discussed the need for intelligent technologies in securely enabling resource management and operational efficiency of the utilities market. It discussed the unique security challenges that utilities face at a time of greater regulatory activity, heightened environmental concerns, tighter data security requirements and an increasing need for remote monitoring and control. A new tool has emerged for cyber security in the form of an international standard that may offer a strong guideline to work toward 11 security domains. These include security policy; organization of information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information systems acquisition; development and maintenance; information security incident management; business continuity management; and compliance. 2 figs.

  13. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  14. Nevada National Security Site Waste Acceptance Criteria

    International Nuclear Information System (INIS)

    2013-01-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: DOE hazardous and non-hazardous non-radioactive classified waste; DOE low-level radioactive waste (LLW); DOE mixed low-level waste (MLLW); and, U.S. Department of Defense (DOD) classified waste. The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  15. Developing Seventh Grade Students' Understanding of Complex Environmental Problems with Systems Tools and Representations: A Quasi-Experimental Study

    Science.gov (United States)

    Doganca Kucuk, Zerrin; Saysel, Ali Kerem

    2018-01-01

    A systems-based classroom intervention on environmental education was designed for seventh grade students; the results were evaluated to see its impact on the development of systems thinking skills and standard science achievement and whether the systems approach is a more effective way to teach environmental issues that are dynamic and complex. A…

  16. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  17. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  18. Security careers skills, compensation, and career paths

    CERN Document Server

    Walker, Stephen W

    2014-01-01

    The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, ethics, environmental, health and safety occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushée Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a th

  19. Assessing the impacts of the changes in farming systems on food security and environmental sustainability of a Chinese rural region under different policy scenarios: an agent-based model.

    Science.gov (United States)

    Yuan, Chengcheng; Liu, Liming; Qi, Xiaoxing; Fu, Yonghu; Ye, Jinwei

    2017-07-01

    Since China has undergone a series of economic reforms and implemented opening up policies, its farming systems have significantly changed and have dramatically influenced the society, economy, and environment of China. To assess the comprehensive impacts of these changes on food security and environmental sustainability, and establish effective and environment-friendly subsidy policies, this research constructed an agent-based model (ABM). Daligang Town, which is located in the two-season rice region of Southern China, was selected as the case study site. Four different policy scenarios, i.e., "sharply increasing" (SI), "no-increase" (NI), "adjusted-method" (AM), and "trend" (TD) scenarios were investigated from 2015 to 2029. The validation result shows that the relative prediction errors between the simulated and actual values annually ranged from -20 to 20%, indicating the reliability of the proposed model. The scenario analysis revealed that the four scenarios generated different variations in cropping systems, rice yield, and fertilizer and pesticide inputs when the purchase price of rice and the non-agricultural income were assumed to increase annually by 0.1 RMB per kg and 10% per person, respectively. Among the four different policy scenarios in Daligang, the TD scenario was considered the best, because it had a relatively high rice yield, fairly minimal use of fertilizers and pesticides, and a lower level of subsidy. Despite its limitations, ABM could be considered a useful tool in analyzing, exploring, and discussing the comprehensive effects of the changes in farming system on food security and environmental sustainability.

  20. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  1. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  2. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  3. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  4. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  5. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  6. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  7. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  8. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  9. Particle (Soot Pollution in Port Harcourt Rivers State, Nigeria—Double Air Pollution Burden? Understanding and Tackling Potential Environmental Public Health Impacts

    Directory of Open Access Journals (Sweden)

    Okhumode H. Yakubu

    2017-12-01

    Full Text Available Residents of Port Harcourt in Rivers State, Nigeria, and its environs have since the last quarter of 2016 been experiencing adverse environmental impacts of particle (soot pollution. This “double air pollution burden”—the unresolved prevailing widespread air pollution and the “added” emergence of particle pollution considered an environmental health threat, led to protests against government inaction in some parts of the state. In February 2017, several months following the onset of the pollution, the government declared an Emergency, and set up a Task Force to investigate and find a solution to the problem. Global research suggests that particle pollution correlates positively with a range of morbidities and an increased risk of mortality among exposed populations. This underscores the need for rigorous implementation of existing environmental legislations established to protect the environment and public health. Nigeria’s rapid response to the 2014–2015 Ebola Virus Disease (EVD and successful prevention of its spread provides some lessons for addressing such environmental health emergencies—strategic action, including effective environmental risk communication, environmental audit, and monitoring is key. Epidemiological studies of the affected population is imperative. A concerted effort by the Rivers State Ministries of Environment and Health, as well as academia and private organizations is required. Public service campaign in terms of government providing up to date information on the existing situation is required.

  10. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  11. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2006-01-01

    Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.

  12. Metaphors for cyber security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  13. Hot Under the Collar: Lessons from the 2003 Heatwave in France and the Security Implications for Coping with Environmental Threats in the EU

    Directory of Open Access Journals (Sweden)

    Paul J. Stephenson

    2009-08-01

    Full Text Available In the sweltering temperatures of August 2003 there were over 15,000 fatalities in France, the majority among the elderly. The heatwave (canicule was the greatest natural catastrophe in Europe for 50 years. Political mismanagement contributed to the death toll and government initially to blame medical services. However, other politico-cultural, societal and psychological factors may have contributed to the failure to protect the most vulnerable citizens. This article identifies 20 obstacles (“pathogens” to ensuring effective response in the face of environmental or weather-related threats, distinguishing between state-institutional and individual-community barriers, most of which have a cultural dimension. These factors require greater consideration by policy-makers to improve preparedness for environmental threats in the EU. The case raises questions about crisis management and how best to reduce risk for elderly populations, illustrating the limits of the state in offering social protection through institutionalised solidarity mechanisms, and recognises calls to strengthen community-capacity.

  14. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  15. Security matters : privacy in voting and fairness in digital exchange

    NARCIS (Netherlands)

    Jonker, H.L.

    2009-01-01

    Security matters. In the real world, there are various basic mechanisms that provide security. The digital counterparts of these basic mechanisms have been studied and are now well understood. Understanding of more complex security notions has yet to mature. This thesis studies two complex security

  16. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on food and agriculture: Building better agriculture one atom at a time

    International Nuclear Information System (INIS)

    2012-01-01

    In a world facing the dilemmas posed by exponential population growth and changing climates, nuclear technology offers possible avenues to solve production problems, protect soil and water resources and conserve biodiversity, which, in turn, means increased hope for global food security. Application of nuclear technology has a proven record in increasing agricultural production. Higher and more reliable yields not only improve farmers' livelihoods, they mean better quality and safer food for consumers. The methods used vary: isotope measurements identify and trace the efficiency of crop inputs such as water and fertilizer and of animal feeds; gamma rays sterillize male insects so that when they are returned to the wild they are unable to produce progeny; irradiation stops the growth of pests and expands the shelf life of grains, spices and processed foods; radiation induced mutation speeds up natural genetic changes in crops to support plant breeders; and genetic markers expedite the identification of animal diseases thereby allowing treatment to begin sooner. All of these methods, plus a host of others that come under the heading of nuclear technology, are invaluable tools for agriculture and food production. For almost five decades, the IAEA, together with its partner the FAO, guided development of new nuclear based methodologies, requested by its Member States and facilitated their adaptation, adoption and application. A harbinger of the United Nation's Delivering as One, the Joint FAO/IAEA Division stands as the United Nations' system's only joint venture. It also operates its own agriculture and biotechnology laboratories in Seibersdorf where technical services, R and D and laboratory training activities are conducted in support of the development and transfer of new technologies and their adaptation to local needs and environments.

  17. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  18. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  19. Environmental history

    DEFF Research Database (Denmark)

    Pawson, Eric; Christensen, Andreas Aagaard

    2017-01-01

    Environmental history is an interdisciplinary pursuit that has developed as a form of conscience to counter an increasingly powerful, forward-looking liberal theory of the environment. It deals with the relations between environmental ideas and materialities, from the work of the geographers George...... risks”. These are exposed by environmental history’s focus on long-run analysis and its narrative form that identifies the stories that we tell ourselves about nature. How a better understanding of past environmental transformations helps to analyse society and agency, and what this can mean...... for solutions and policies, is the agenda for an engaged environmental history from now on....

  20. Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

    Directory of Open Access Journals (Sweden)

    Christian Schmitt

    2015-07-01

    Full Text Available This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security information and knowledge sources and relevant compliance obligations, in a structured and reusable form. The resulting repository is intended to be used by development teams during the elicitation and analysis of security requirements with the goal to understand the security problem space, incorporate all relevant requirements sources, and to avoid unnecessary effort for identifying, understanding, and correlating applicable security requirements sources on a project-wise basis. We start with an overview and categorization of important security requirements sources, followed by the description of the generic model. To demonstrate the applicability and benefits of the model, the instantiation approach and details of the resulting repository of security requirements sources are presented.

  1. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  2. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Brown, G.E. Jr.

    1990-01-01

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world's inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  3. New technologies and the search for security: Prospects for a post-cold-war era

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Jr, G E

    1991-12-31

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world`s inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  4. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  5. Secure system design and trustable computing

    CERN Document Server

    Potkonjak, Miodrag

    2016-01-01

    This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions, and networking services.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.

  6. An Empirical Study of Security Issues Posted in Open Source Projects

    DEFF Research Database (Denmark)

    Zahedi, Mansooreh; Ali Babar, Muhammad; Treude, Christoph

    2018-01-01

    When developers gain thorough understanding and knowledge of software security, they can produce more secure software. This study aims at empirically identifying and understanding the security issues posted on a random sample of GitHub repositories. We tried to understand the presence of security...

  7. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  8. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  9. Contribution of Renewables to Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The environmental benefits of renewable energy are well known. But the contribution that they can make to energy security is less widely recognised. This report aims to redress the balance, showing how in electricity generation, heat supply, and transport, renewables can enhance energy security and suggesting policies that can optimise this contribution.

  10. Over-the-horizon, connected home/office (OCHO): situation management of environmental, medical, and security conditions at remote premises via broadband wireless access

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    Broadband wireless access standards, together with advances in the development of commercial sensing and actuator devices, enable the feasibility of a consumer service for a multi-sensor system that monitors the conditions within a residence or office: the environment/infrastructure, patient-occupant health, and physical security. The proposed service is a broadband reimplementation and combination of existing services to allow on-demand reports on and management of the conditions by remote subscribers. The flow of on-demand reports to subscribers and to specialists contracted to mitigate out-of-tolerance conditions is the foreground process. Service subscribers for an over-the-horizon connected home/office (OCHO) monitoring system are the occupant of the premises and agencies, contracted by the service provider, to mitigate or resolve any observed out-of-tolerance condition(s) at the premises. Collectively, these parties are the foreground users of the OCHO system; the implemented wireless standards allow the foreground users to be mobile as they request situation reports on demand from the subsystems on remote conditions that comprise OCHO via wireless devices. An OCHO subscriber, i.e., a foreground user, may select the level of detail found in on-demand reports, i.e., the amount of information displayed in the report of monitored conditions at the premises. This is one context of system operations. While foreground reports are sent only periodically to subscribers, the information generated by the monitored conditions at the premises is continuous and is transferred to a background configuration of servers on which databases reside. These databases are each used, generally, in non-real time, for the assessment and management of situations defined by attributes like those being monitored in the foreground by OCHO. This is the second context of system operations. Context awareness and management of conditions at the premises by a second group of analysts and

  11. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  12. Understanding Cultural Differences in the Antecedents of Pro-Environmental Behavior: A Comparative Analysis of Business Students in the United States and Chile

    Science.gov (United States)

    Cordano, Mark; Welcomer, Stephanie; Scherer, Robert; Pradenas, Lorena; Parada, Victor

    2010-01-01

    We surveyed business students in the U. S. (n = 256) and Chile (n = 310). The survey included measures drawn from studies of pro-environmental behavior using Schwartz's norm activation theory (Schwartz, 1977), the theory of reasoned action (Ajzen & Fishbein, 1980), and a values-beliefs-norms model created by Stern, Dietz, Abel, Guagnano, and…

  13. Understanding and managing health and environmental risks of CIS, CGS, and CdTe photovoltaic module production and use: A workshop

    Energy Technology Data Exchange (ETDEWEB)

    Moskowitz, P.D.; Zweibel, K.; DePhillips, M.P. [eds.

    1994-04-28

    Environmental, health and safety (EH&S) risks presented by CIS, CGS and CdTe photovoltaic module production, use and decommissioning have been reviewed and discussed by several authors. Several EH&S concerns exit. The estimated EH&S risks are based on extrapolations of toxicity, environmental mobility, and bioavailability data for other related inorganic compounds. Sparse data, however, are available for CIS, CGS or CdTe. In response to the increased interest in these materials, Brookhaven National Laboratory (BNL) has been engaged in a cooperative research program with the National Renewable Energy Laboratory (NREL), the Fraunhofer Institute for Solid State Technology (IFT), the Institute of Ecotoxicity of the GSF Forschungszentrum fair Umwelt und Gesundheit, and the National Institute of Environmental Health Sciences (NIEHS) to develop fundamental toxicological and environmental data for these three compounds. This workshop report describes the results of these studies and describes their potential implications with respect to the EH&S risks presented by CIS, CGS, and CdTe module production, use and decommissioning.

  14. Understanding the Consumers’ Behavior Intention in Using Green Ecolabel Product through Pro-Environmental Planned Behavior Model in Developing and Developed Regions: Lessons Learned from Taiwan and Indonesia

    Directory of Open Access Journals (Sweden)

    Ilma Mufidah

    2018-05-01

    Full Text Available An ecolabel product is an environmentally friendly substance that can be selected to maintain environmental sustainability. Both developed and developing regions are promoting the use of green products. The current study aimed to know the behavior intention on ecolabel product usage from citizens in developing and developed regions. The extended Theory of Planned Behavior, known as Pro-Environmental Planned Behavior Model (PEPB, was used as the assessment model. Two questionnaire surveys were conducted to extract the necessary information for analyzing user’s behavior intention in two different regions. Taiwan and Indonesia were selected as case studies of developed and developing regions, respectively. Structural Equation Modeling (SEM was used to analyze the proposed model and the result reveals that the model explains 49% of behavior intention to use ecolabel product in Taiwan’s case and 72% in Indonesia’s case. The findings revealed that attitude (AT is the key factor to determine the behavioral intention (BI in both Taiwan and Indonesia. Several practical recommendations based on the finding can be considered as input for the governments and related agencies to persuade manufacturing companies to produce more ecolabel products. Increased citizens’ intention to use ecolabel products help the company to reach broader target market and provide incentives to manufacturing companies to produce more environmentally friendly products.

  15. Responsible Investing in the Asia-Pacific Region: Understanding Sustainability and Investments in Japan and Hong Kong/China in an Era of Global Climate and Environmental Change

    NARCIS (Netherlands)

    J. Park (Jacob)

    2014-01-01

    markdownabstract__Abstract__ The author of this thesis examined the concept and market development of responsible investing (RI), which can be defined as an investment process that integrates social and environmental considerations within the context of traditional investment processes. RI has

  16. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  17. Natural Resources Management and Food Security in the Context of Sustainable Development

    International Nuclear Information System (INIS)

    John, H.

    2011-01-01

    This paper elaborates on the inseparable link between sustain ability of natural resources and food security. A strategic framework that envisages conservation, improvement and sustainable uses of natural resources is proposed which meets the essential requirements for food security. Sustainability has traditionally been accepted as encompassing three dimensions, namely environment, economics and society but it is necessary to widen this approach for a more complete understanding of this term. Environmental degradation curtails ecosystem services, leading to impoverishment of vulnerable communities and insecurity. Food, whether derived from land or sea, is a product of complex environmental linkages, and biodiversity has a pivotal role to play in producing it. Technology, production methods and management requirements are different for food derived from land and sea, but essentially all foodstuffs utilize environmental resources whose sustain ability is crucial for food security. This analysis necessitates consideration of the basic concepts of sustainable development and food security, the strength of the link between these and differences in the patterns of sustainable management of agriculture, fisheries and aquaculture. The growing role of genetically engineered organisms has been included because of the immense possibilities these offer for maximizing food production despite the environmental and ethical concerns raised. (author)

  18. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  19. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on nuclear sciences and applications collaborating centres: Establishing a culture of cooperation

    International Nuclear Information System (INIS)

    2012-01-01

    As a large international organization with a variety of programmes, initiatives and laboratories, one of the mandates of the IAEA is to promote the peaceful use of nuclear techniques worldwide while also collaborating with other institutions in its Member States in order to implement part of its approved activities. In this regard, the IAEA designates selected institutions as official IAEA collaborating centres (IAEA-CCs). Recognizing the need to preserve and transfer nuclear knowledge, the IAEA-CCs are dedicated to furthering the research, development and training in peaceful applications of nuclear science and technology. By working alongside various nuclear related institutions from around the world, the IAEA contributes to reaching important targets laid out by the United Nations Millennium Development Goals. The IAEA-CCs are, in general, scientific institutions such as laboratories, universities, research facilities, etc., that receive public recognition by the IAEA and have been designated to collaborate with the IAEA in a variety of fields, such as food safety, environmental protection, water resources and human health. In line with the objectives of the IAEA, IAEA-CCs are expected to further the research, development and training in the peaceful applications of nuclear science and technology. Through these research and academic institutions, Member States can assist the IAEA with their own original research, development and training in nuclear technologies. As a cooperative mechanism, the IAEA-CC is also efficient, as it encourages centres to share resources, knowledge and expertise. One of the goals of the IAEA-CC is also to help developing Member States expand their capabilities in these areas and thus improve the quality of life of their citizens. So far, the IAEA-CC has led to socioeconomic benefits in many parts of the world, from Asia to Latin America.

  20. Environmental contaminants: assessment and control

    National Research Council Canada - National Science Library

    Vallero, Daniel A

    2004-01-01

    ... Understanding Policy by Understanding Science Connections and Interrelationships of Environmental Science Environmental Assessment and Intervention Engineering Technical Note: Cleaning up a Hazardous Waste Site Social Aspects of Environmental Science Introduction to Environmental Policy The National Environmental Policy Act Issues in Environmental Science: Co...

  1. Understanding the relative contributions of direct environmental effects and passive genotype-environment correlations in the association between familial risk factors and child disruptive behavior disorders.

    Science.gov (United States)

    Bornovalova, M A; Cummings, J R; Hunt, E; Blazei, R; Malone, S; Iacono, W G

    2014-03-01

    Previous work reports an association between familial risk factors stemming from parental characteristics and offspring disruptive behavior disorders (DBDs). This association may reflect (a) the direct effects of familial environment and (b) a passive gene-environment correlation (r(GE)), wherein the parents provide both the genes and the environment. The current study examined the contributions of direct environmental influences and passive r(GE) by comparing the effects of familial risk factors on child DBDs in genetically related (biological) and non-related (adoptive) families. Participants were 402 adoptive and 204 biological families. Familial environment was defined as maternal and paternal maladaptive parenting and antisociality, marital conflict and divorce; offspring DBDs included attention deficit hyperactivity disorder (ADHD), conduct disorder (CD) and oppositional defiant disorder (ODD). Mixed-level regressions estimated the main effects of familial environment, adoption status and the familial environment by adoption status interaction term, which tested for the presence of passive r(GE). There was a main effect of maternal and paternal maladaptive parenting and marital discord on child DBDs, indicating a direct environmental effect. There was no direct environmental effect of maternal or paternal antisociality, but maternal and paternal antisociality had stronger associations with child DBDs in biological families than adoptive families, indicating the presence of a passive r(GE). Many familial risk factors affected children equally across genetically related and non-related families, providing evidence for direct environmental effects. The relationship of parental antisociality and offspring DBDs was best explained by a passive r(GE), where a general vulnerability toward externalizing psychopathology is passed down by the parents to the children.

  2. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  3. ARCHAEOLOGICAL AND ENVIRONMENTAL CHANGES BETWEEN 9500 BP AND 4500 BP: A CONTRIBUTION FROM THE SAHARA TO UNDERSTAND EXPANDING DROUGHTS IN THE “GREAT MEDITERRANEAN”

    Directory of Open Access Journals (Sweden)

    E. A.A. Garcea

    2013-03-01

    Full Text Available The Sahara is more connected to the Mediterranean than often assumed and palynology, in particular, has provided evidence of past interrelations between the Mediterranean and the Sahara with pollen spectra from prehistoric Saharan deposits including Mediterranean taxa. In order to show human-environment relationships and populations’ strategies in response to changing environments, this paper presents a case study from the southern Sahara. This region offered a natural laboratory for the study of human/climate interaction as the range of environmental change extended from flood to drought, forcing people to cope with periodic environmental instability. When the tropical rainfall belt migrated northward, watertable outcropped in interdunal depressions and formed permanent lakes, which alternated with severe arid spells. As a case study, this paper presents the results of interdisciplinary investigations on climate changes, human adaptations and subsistence strategies at Gobero, in the southern Sahara of Niger. Gobero is a restricted archaeological area comprising 8 sites that surround the shores of a palaeolake. It was intermittently occupied between about 9500 cal years BP and 4500 BP. Due to alternating environmental conditions it could only be occupied at the beginning and at the end of the most humid periods.

  4. Understanding the determinants of active transportation to school among children: evidence of environmental injustice from the Quebec Longitudinal Study of Child Development.

    Science.gov (United States)

    Pabayo, Roman A; Gauvin, Lise; Barnett, Tracie A; Morency, Patrick; Nikiéma, Béatrice; Séguin, Louise

    2012-03-01

    To examine the combined influence of poverty and dangerousness of the neighborhood on active transportation (AT) to school among a cohort of children followed throughout the early school years. Growth curve modeling was used to identify determinants of AT to school among 710 children participating in the Quebec Longitudinal Study of Child Development from 2003 through 2006. Parent-reported dangerousness and pedestrian-vehicle collision data were merged with travel mode and health data. At age 6 years, insufficient household income, having an older sibling, and living in a neighborhood that is not excellent for raising children, or characterized with high decay were predictive of greater likelihood of using AT and remained unchanged as children progressed from kindergarten through grade 2. A public health concern is children experiencing environmental injustice. Since AT is most likely to be adopted by those living in poverty and because it is also associated with unsafe environments, some children are experiencing environmental injustice in relation to AT. Interventions may be implemented to reduce environmental injustice through improvements in road safety. Copyright © 2011 Elsevier Ltd. All rights reserved.

  5. Adaptation of a load-inject valve for a flow injection chemiluminescence system enabling dual-reagent injection enhances understanding of environmental Fenton chemistry

    International Nuclear Information System (INIS)

    Jones, Matthew R.; Nightingale, Philp D.; Turner, Suzanne M.; Liss, Peter S.

    2013-01-01

    Graphical abstract: -- Highlights: •Measurement of multiple components of Fenton chemistry; Fe(II) and H 2 O 2 . •Rapid, quasi-simultaneous analysis enables calculation of environmental kinetics. •Low, nano to pico-molar detection limits with dual analyte analysis. •Able to measure complex matrix samples – organically enriched seawater. •Low cost system with appreciable sensitivity compared to single analyte analysis. -- Abstract: Environmental Fenton chemistry has been poorly constrained within the marine environment at a multi-component level. A simple, unique, reconfiguration of a flow-injection analytical system combined with luminol chemiluminescence allows quasi-simultaneously the measurement, using a single load-inject valve and a single photon multiplier tube, of reduced iron, Fe(II), and hydrogen peroxide. The system enables rapid, every 22 s, measurements with good accuracy at environmentally relevant concentrations, less than 5% relative standard deviations on both a 5 nM Fe(II) standard and a 60 nM hydrogen peroxide standard. Limits of detection were as low as 40 pM Fe(II) and 100 pM hydrogen peroxide. The system showed excellent capability by measuring from within an organic rich seawater the photochemically induced production of Fe(II) and hydrogen peroxide and their subsequent cycling and Fenton like interactions

  6. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  7. Instant Spring security starter

    CERN Document Server

    Jagielski, Piotr

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A concise guide written in an easy-to-follow format following the Starter guide approach.This book is for people who have not used Spring Security before and want to learn how to use it effectively in a short amount of time. It is assumed that readers know both Java and HTTP protocol at the level of basic web programming. The reader should also be familiar with Inversion-of-Control/Dependency Injection, preferably with the Spring framework itsel

  8. Investigation of Employee Security Behaviour: A Grounded Theory Approach

    OpenAIRE

    Connolly , Lena; Lang , Michael; Tygar , J. ,

    2015-01-01

    Part 5: Security Management and Human Aspects of Security; International audience; At a time of rapid business globalisation, it is necessary to understand employee security behaviour within diverse cultural settings. While general deterrence theory has been extensively used in Behavioural Information Security research with the aim to explain the effect of deterrent factors on employees’ security actions, these studies provide inconsistent and even contradictory findings. Therefore, a further...

  9. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on nuclear and atomic data: Providing values for science

    International Nuclear Information System (INIS)

    2012-01-01

    The IAEA supports nuclear research activities in Member States by providing essential nuclear data and serving as the central agency for the collection and dissemination of data from laboratories worldwide. The EXFOR database contains a compilation of experimental reaction data from all around the world, and this effort - led by the IAEA - has been very well received, as it provides invaluable data for nuclear calculations and evaluations to researchers in Member States. ENSDF is a collection of evaluated data on the structure and decay properties of radioactive nuclides collected worldwide through a network coordinated by the IAEA. The IAEA has also developed tools to allow users to visualize data, since visual presentation of data in the form of a plot makes them easier to understand and appreciate. Two important applications are available from the Nuclear Data Services web site: LiveChart interactively presents nuclide properties, and ZVView plots reaction cross-sections, both from evaluated files and from EXFOR, as 2-D or 3-D plots. Concerted efforts by the IAEA include coordination of activities in Member States, such as EXFOR and ENSDF, coordinated research project (CRP) implementation, and also staff efforts, which have resulted in data libraries of immense value. IBANDL and RIPL-3 are examples of two databases resulting from CRPs. IBANDL is a database of experimental and evaluated nuclear cross-sections relevant to ion beam analysis. RIPL-3 is a library of reference input parameters which are essential ingredients of theoretical modelling codes. By providing a complete set of verified parameters, it is ensured that evaluations carried out around the world are compatible and can be produced easily and efficiently.

  10. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  11. The nature of international health security.

    Science.gov (United States)

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  12. Understanding Mediation Support

    OpenAIRE

    Lanz, David; Pring, Jamie; von Burg, Corinne; Zeller, Mathias

    2017-01-01

    Recent decades have witnessed increasing institutionalization of mediation support through the establishment of mediation support structures (MSS) within foreign ministries and secretariats of multilateral organizations. This study sheds light on this trend and aims to better understand the emergence, design and development of different MSS. This study analyzes six MSS, namely those established in the United Nations (UN), the Organization for Security and Co-operation in Europe (OSCE), the Eu...

  13. Soil Security Assessment of Tasmania

    Science.gov (United States)

    Field, Damien; Kidd, Darren; McBratney, Alex

    2017-04-01

    The concept of soil security aligns well with the aspirational and marketing policies of the Tasmanian Government, where increased agricultural expansion through new irrigation schemes and multiple-use State managed production forests co-exists beside pristine World Heritage conservation land, a major drawcard of the economically important tourism industry . Regarding the Sustainable Development Gaols (SDG's) this could be seen as a exemplar of the emerging tool for quantification of spatial soil security to effectively protect our soil resource in terms of food (SDG 2.4, 3.9) and water security (SDG 6.4, 6.6), biodiversity maintenance and safeguarding fragile ecosystems (SDG 15.3, 15.9). The recent development and application of Digital Soil Mapping and Assessment capacities in Tasmania to stimulate agricultural production and better target appropriate soil resources has formed the foundational systems that can enable the first efforts in quantifying and mapping Tasmanian Soil Security, in particular the five Soil Security dimensions (Capability, Condition, Capital, Codification and Connectivity). However, to provide a measure of overall soil security, it was necessary to separately assess the State's three major soil uses; Agriculture, Conservation and Forestry. These products will provide an indication of where different activities are sustainable or at risk, where more soil data is needed, and provide a tool to better plan for a State requiring optimal food and fibre production, without depleting its natural soil resources and impacting on the fragile ecosystems supporting environmental benefits and the tourism industry.

  14. Environmental permits in Arab Gulf countries - local government perspective

    International Nuclear Information System (INIS)

    Kuczynski, L.

    2002-01-01

    The legacy of past environmentally careless oil and gas exploration practices is becoming more apparent as time goes by and our understanding of causes and results increase. In many petroleum producing countries and in Arab Gulf countries in particular, this understanding has resulted in greater social demand for environmental protection and responsible exploitation of limited resources. In response to this demand, governments of the Gulf Region are paying increasingly more attention to the responsible management of environmental impacts of new developments. As a result, most of them require developers to obtain environmental permits supported by a variety of environmental baseline studies, Environmental Impact Assessments and comprehensive Environmental Management Plans. These local environmental requirements are similar to those in North America and Europe, although there are some important differences on account of local environmental, historical and socioeconomic conditions. Developers, who choose to ignore them, often find their projects caught in a web of unfamiliar environmental regulations or administrative procedures that may cause costly and unnecessary delays. Based on the author's Canadian and Arab Gulf regulatory experience, this paper describes some common causes that may delay obtaining environmental permits or cause cancellation of a project, and provides ideas to assist companies in securing necessary permits and licenses. (author)

  15. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  16. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  17. Environmental education and indigenous approach

    International Nuclear Information System (INIS)

    Babar, S.M.; Hussain, M.; Mahmood, T.

    2005-01-01

    Environmental pollution control is the most important and highly discussed issue at the international level. Our and our's next generation survival highly depends on environment. Environmental security is not less important than territorial security. Living in the Competitive trade, Business and Commerce era. WTO threats of globalization to countries like Pakistan require sharp and immediate actions. SOS(Save our Sole) steps should be taken in Environmental Education in order to reorganizing values and clarifying Concepts to develop the necessary skills and attitude necessary to understand and appreciate the interrelatidness among masses, the Cultures and Ecosystem. Historical backgrounds along with different approaches were discussed particularly reference to Pakistan. In this presentation a new but indigenous idea is flashed to improve the environment education system in poor third world countries including Pakistan. Instead of imported ideas, previous implemented as such, indigenous approach highly Perfumed with Islamic, Ideological and cultural blends will do the right job in right direction if employed with true sense of commitment. (author)

  18. Women's Marginalization, Economic Flows, and Environmental Flows: A Classroom Approach.

    Science.gov (United States)

    O'Lear, Shannon

    1999-01-01

    Discusses environmental security, focusing on the meaning of "security." Defines the global economy as a process in which the security of groups is sought, maintained, or threatened. Illustrates connections among environmental security, the global economy, and abuse of women and children in less economically developed places,…

  19. Database Security: What Students Need to Know

    Science.gov (United States)

    Murray, Meg Coffin

    2010-01-01

    Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…

  20. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application.