3,267 research outputs found

    Controlling Financial Chaos: The Power and Limits of Law

    Get PDF
    This Essay examines how law can help to control financial chaos. To that end, regulation should strive to not only maximize economic efficiency within the financial system but also protect the financial system itself. Any regulatory framework for achieving these goals, however, will be imperfect and have tradeoffs. Increasing financial complexity has created information failures that even disclosure cannot remedy, whereas law-imposed standardization would have its own flaws. Bounded human rationality limits the effectiveness of even otherwise ideal laws. Furthermore, the increasing dispersion of financial risk is undermining monitoring incentives. We also do not yet fully understand how systemic risk is triggered and spread. Because regulation therefore cannot prevent systemic shocks, regulation should also operate to reduce systemic consequences by stabilizing parts of the financial system afflicted by those shocks

    Tier 1 Highway Security Sensitive Material Dynamic Risk Management

    Get PDF
    Each year, over 2 billion tons of hazardous materials are shipped in the United States, with over half of that being moved on commercial vehicles. Given their relatively poor or nonexistent defenses and inconspicuousness, commercial vehicles transporting hazardous materials are an easy target for terrorists. Before carriers or security agencies recognize that something is amiss, their contents could be detonated or released. From 2006 to 2015, the U.S. Department of Transportation’s Pipeline and Hazardous Materials Safety Administration (PHMSA) recorded 144,643 incidents involving a release of hazardous materials. Although there were no known instances of terrorism being the cause, accidental releases involving trucks carrying hazardous materials are not an uncommon occurrence. At this time, no systems have been developed and operationalized to monitor the movement of vehicles transporting hazardous materials. The purpose of this dissertation is to propose a comprehensive risk management system for monitoring Tier 1 Highway Security Sensitive Materials (HSSMs) which are shipped aboard commercial vehicles in the U.S. Chapter 2 examines the history and current state of hazardous materials transportation. Since the late 19th century, the federal government often introduced new regulations in response to hazardous materials incidents. However, over the past 15 years few binding policies or legislation have been enacted. This demonstrates that government agencies and the U.S. Congress are not inclined to introduce new laws and rules that could hamper business. In 2003, the Federal Motor Carrier Safety Administration (FMCSA) and other agencies led efforts to develop a prototype hazardous materials tracking system (PHTS) that mapped the location of hazardous materials shipments and quantified the level of risk associated with each one. The second half of this chapter uses an in-­‐depth gap analysis to identify deficiencies and demonstrate in what areas the prototype system does not comply with government specifications. Chapter 3 addresses the lack of customized risk equations for Tier 1 HSSMs and develops a new set of risk equations that can be used to dynamically evaluate the level of risk associated with individual hazardous materials shipments. This chapter also discusses the results of a survey that was administered to public and private industry stakeholders. Its purpose was to understand the current state of hazardous materials regulations, the likelihood of hazardous materials release scenarios, what precautionary measures can be used, and what influence social variables may have on the aggregate consequences of a hazardous materials release. The risk equation developed in this paper takes into account the survey responses as well as those risk structures already in place. The overriding goal is to preserve analytical tractability, implement a form that is usable by federal agencies, and provide stakeholders with accurate information about the risk profiles of different vehicles. Due to congressional inaction on hazardous 3 materials transportation issues, securing support from carriers and other industry stakeholders is the most viable solution to bolstering hazardous materials security. Chapter 4 presents the system architecture for The Dynamic Hazardous Materials Risk Assessment Framework (DHMRA), a GIS-­‐based environment in which hazardous materials shipments can be monitored in real time. A case study is used to demonstrate the proposed risk equation; it simulates a hazardous materials shipment traveling from Ashland, Kentucky to Philadelphia, Pennsylvania. The DHMRA maps risk data, affording security personnel and other stakeholders the opportunity to evaluate how and why risk profiles vary across time and space. DHRMA’s geo-­‐fencing capabilities also trigger automatic warnings. This framework, once fully implemented, can inform more targeted policies to enhance the security of hazardous materials. It will contribute to maintaining secure and efficient supply chains while protecting the communities that live nearest to the most heavily trafficked routes. Continuously monitoring hazardous materials provides a viable way to understand the risks presented by a shipment at a given moment and enables better, more coordinated responses in the event of a release. Implementation of DHRMA will be challenging because it requires material and procedural changes that could disrupt agency operations or business practices — at least temporarily. Nevertheless, DHRMA stands ready for implementation, and to make the shipment of hazardous materials a more secure, safe, and certain process. Although DHMRA was designed primarily with terrorism in mind, it is also useful for examining the impacts of accidental hazardous materials releases. Future iterations of DHMRA could expand on its capabilities by incorporating modeling data on the release and dispersion of toxic gases, liquids, and other substances

    Building the Infrastructure for Cloud Security

    Get PDF
    Computer scienc

    Building the Infrastructure for Cloud Security: A Solutions View

    Get PDF
    For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations

    Remote M2M healthcare : applications and algorithms

    Get PDF
    Tese de mestrado. Mestrado Integrado em Engenharia Informática e Computação. Faculdade de Engenharia. Universidade do Porto. 201

    The North American Transportation Security Center – Technology Prototype Gap Analysis

    Get PDF
    Executive Summary There are over 800,000 hazardous materials (hazmat) shipments over the nation’s roads each day. According to the U.S. Department of Homeland Security (DHS), terrorist activity related to the transportation of hazardous materials represents a significant threat to public safety and the nation’s critical infrastructure. Specifically, the federal government has identified the government’s inability to track hazmat shipments on a real-time basis as a significant security vulnerability. In 2004, the U.S. Federal Motor Carrier Safety Administration (FMCSA) completed a study to determine if “smart truck” technology such as GPS tracking, wireless modems, panic buttons, and onboard computers could be used to enhance hazmat shipment security. The FMCSA study concluded that “smart truck” technology will be highly effective in protecting hazmat shipments from terrorists. The FMCSA study also concluded that “smart truck” technology deployment will produce a huge security benefit and an overwhelmingly positive return on investment for hazmat carriers. The FMCSA study led to the U.S. Transportation Security Administration’s (TSA) Hazmat Truck Security Pilot (HTSP). This congressionally mandated pilot program was undertaken to demonstrate if a hazmat truck tracking center was feasible from a technology and systems perspective. The HTSP project team built a technology prototype of a hazmat truck tracking system to show that “smart truck” technology could be crafted into an effective and efficient system for tracking hazmat shipments. The HTSP project team also built the Universal Communications Interface – the XML gateway for hazmat carriers to use to provide data to a centralized truck tracking center. In August 2007, Congress enacted the 9/11 Act (PL110-53) that directs TSA to develop a program - consistent with the Hazmat Truck Security Pilot - to facilitate the tracking of motor carrier shipments of security-sensitive materials. In June 2008, TSA took a major step forward in establishing a national hazmat security program by issuing guidance for shipments of Tier 1 Highway Security Sensitive Materials (HSSMs), the riskiest shipments from a security perspective. TSA’s Tier 1 HSSM guidance includes Security Action Items which specify security measures – including vehicle tracking – that TSA believes are prudent security measures for shippers and carriers to follow. Compliance with TSA’s Tier 1 HSSM guidance is voluntary but TSA is expected to issue regulations based on the Tier 1 HSSM Security Action Items that will make compliance mandatory. Establishment of a Tier 1 HSSM truck tracking center is critical to implementation of a Tier 1 HSSM regulatory program based on the Security Action items by TSA. The HTSP technology prototype was an excellent first step toward an operational Tier 1 HSSM truck tracking system, however, it falls far short of what TSA needs in an operational system. This deliverable examines the “gaps” between the HTSP technology prototype and an operational Tier 1 HSSM truck tracking system. It draws upon the work of an Independent Verification and Validation contractor that evaluated the HTSP technology prototype. It also examines TSA needs related to implementation of a regulatory program based on Tier 1 HSSM Security Action Items

    Key technologies for safe and autonomous drones

    Get PDF
    Drones/UAVs are able to perform air operations that are very difficult to be performed by manned aircrafts. In addition, drones' usage brings significant economic savings and environmental benefits, while reducing risks to human life. In this paper, we present key technologies that enable development of drone systems. The technologies are identified based on the usages of drones (driven by COMP4DRONES project use cases). These technologies are grouped into four categories: U-space capabilities, system functions, payloads, and tools. Also, we present the contributions of the COMP4DRONES project to improve existing technologies. These contributions aim to ease drones’ customization, and enable their safe operation.This project has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 826610. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Spain, Austria, Belgium, Czech Republic, France, Italy, Latvia, Netherlands. The total project budget is 28,590,748.75 EUR (excluding ESIF partners), while the requested grant is 7,983,731.61 EUR to ECSEL JU, and 8,874,523.84 EUR of National and ESIF Funding. The project has been started on 1st October 2019

    Standardization Roadmap for Unmanned Aircraft Systems, Version 1.0

    Get PDF
    This Standardization Roadmap for Unmanned Aircraft Systems, Version 1.0 (“roadmap”) represents the culmination of the UASSC’s work to identify existing standards and standards in development, assess gaps, and make recommendations for priority areas where there is a perceived need for additional standardization and/or pre-standardization R&D. The roadmap has examined 64 issue areas, identified a total of 60 gaps and corresponding recommendations across the topical areas of airworthiness; flight operations (both general concerns and application-specific ones including critical infrastructure inspections, commercial services, and public safety operations); and personnel training, qualifications, and certification. Of that total, 40 gaps/recommendations have been identified as high priority, 17 as medium priority, and 3 as low priority. A “gap” means no published standard or specification exists that covers the particular issue in question. In 36 cases, additional R&D is needed. The hope is that the roadmap will be broadly adopted by the standards community and that it will facilitate a more coherent and coordinated approach to the future development of standards for UAS. To that end, it is envisioned that the roadmap will be widely promoted and discussed over the course of the coming year, to assess progress on its implementation and to identify emerging issues that require further elaboration

    The impact of gated communities on spatial transformation in the Greater Johannesburg area

    Get PDF
    The authors were assisted by Trudi Horak with the literature review and Trisha van Rhyn with the field visits.Gated communities in south Africa have increased tremendously since the late 1990’s, with various types spreading across the urban landscape. they can broadly be divided into two groups, namely enclosed neighbourhood s and new security developments. Enclosed neighbourhoods refer to existing neighbourhoods that have been fenced or walled in and where access is controlled or prohibited by means of gates or booms erected across existing roads. New security developments are private developments in which the entire area is developed by a private developer. these areas/buildings are physically walled or fenced off and usually have a security gate or controlled access point, with or without a security guard. this type can include large security estates, gated townhouse clusters/complexes and gated apartment complexes. these three sub-types are predominantly residential. new security developments can, however, also include gated offi ce parks and gated mixed-use developments (Landman 2012). As a signifi cant contributor to urban spatia l transformation, there is a need to understand the current extent and impact of different types of gated communities in the greater johannesburg area and implications for urban restructuring and sustainable development.NRF
    corecore