304,546 research outputs found

    U. S. labor supply in the twenty-first century

    Get PDF
    The American labor force will be transformed as the twenty-first century unfolds, a change that will confront policymakers and business firms with new challenges and new opportunities. The impending slowdown of labor force growth that will accompany the retirement of the baby boom generation already is playing a central role in national debates over the future solvency of Social Security and Medicare, as well as U.S. immigration policies. But labor supply changes will be influenced by other dimensions as well. In the coming decades, American workers are likely to be, on average, older and better educated than today’s labor force. The globalization of labor markets is already opening new employment opportunities for some Americans and changing the wage rates paid to others. The production technologies and personnel policies adopted by tomorrow’s firms will undoubtedly reflect the numbers and types of workers available for employment.Labor supply ; Baby boom generation

    Enhanced Prediction of Network Attacks Using Incomplete Data

    Get PDF
    For years, intrusion detection has been considered a key component of many organizations’ network defense capabilities. Although a number of approaches to intrusion detection have been tried, few have been capable of providing security personnel responsible for the protection of a network with sufficient information to make adjustments and respond to attacks in real-time. Because intrusion detection systems rarely have complete information, false negatives and false positives are extremely common, and thus valuable resources are wasted responding to irrelevant events. In order to provide better actionable information for security personnel, a mechanism for quantifying the confidence level in predictions is needed. This work presents an approach which seeks to combine a primary prediction model with a novel secondary confidence level model which provides a measurement of the confidence in a given attack prediction being made. The ability to accurately identify an attack and quantify the confidence level in the prediction could serve as the basis for a new generation of intrusion detection devices, devices that provide earlier and better alerts for administrators and allow more proactive response to events as they are occurring

    LEGAL PERSPECTIVES ON NUCLEAR ENERGY AND SUSTAINABLE DEVELOPMENT IN MALAYSIA

    Get PDF
    This paper explores the potential of nuclear energy, particularly in the power sector, to solve energy challenges and to address the pertinent issues regarding energy sustainability in Malaysia. The deployment of nuclear energy in various developed and developing countries has conspicuously helped sustaining energy security and sustainability due to its compatibility and protection of the environment. In addition to energy security, nuclear energy also offers significant benefits to socio-economic aspects. Thus, nuclear energy in developing countries, including Malaysia, has the potential to emerge as a new prospect in the energy sector using sophisticated technology and expert personnel to maximize the energy benefits with the least environmental risk. This step would certainly meet future energy demands and help accelerate the country’s development with optimum energy generation in the country. Therefore, Malaysia should aim to resort to nuclear power generation whereby the current power sector is mainly generated by traditional means, with only a small fraction of it being renewable energy. With no experience in this field, Malaysia needs to establish collaboration with some country rich with nuclear-resource in order to build, maintain nuclear reactors and treat nuclear wastes. The development of such facility should also comply with the requirements of the International Atomic Energy Agency. Moreover, Malaysia has to introduce legislation and policies related to future nuclear energy. Thus, this paper discusses some of the pertinent issues related to the prospects of nuclear power generation in the country towards achieving Sustainable Development Goals (SDGs).   Keywords: Atomic energy, energy security, governance, sustainable development.   Cite as: Ghazali, F., Ansari, A. H., Mustafa, M., & Wan Zahari, W. M. Z. (2020). Legal perspectives on nuclear energy and sustainable development in Malaysia. Journal of Nusantara Studies, 5(1), 169-188. http://dx.doi.org/10.24200/jonus.vol5iss1pp169-18

    Upholding the Promise: Supporting Veterans and Military Personnel in the Next Four Years

    Get PDF
    After more than a decade of war, several years of constrained national budgets and a changing veteran population, the second Obama administration must confront how best to uphold its promises to the nation's men and women who serve or have served in uniform.In this report, CNAS Non-Resident Senior Fellow Phillip Carter urges the Obama Administration to develop an inclusive, strategic policy approach that serves veterans and military personnel as well as they have served the nation. He calls upon the administration to tackle urgent issues such as military and veteran suicide, while working over the long term to prevent the civilian "sea of goodwill" toward veterans from turning into an ocean of apathy as current wars wind down, and public attention turns away from the men and women who have fought those wars

    Security policy refinement using data integration: a position paper.

    No full text
    In spite of the wide adoption of policy-based approaches for security management, and many existing treatments of policy verification and analysis, relatively little attention has been paid to policy refinement: the problem of deriving lower-level, runnable policies from higher-level policies, policy goals, and specifications. In this paper we present our initial ideas on this task, using and adapting concepts from data integration. We take a view of policies as governing the performance of an action on a target by a subject, possibly with certain conditions. Transformation rules are applied to these components of a policy in a structured way, in order to translate the policy into more refined terms; the transformation rules we use are similar to those of global-as-view database schema mappings, or to extensions thereof. We illustrate our ideas with an example. Copyright 2009 ACM

    Applying the lessons of the attack on the World Trade Center, 11th September 2001, to the design and use of interactive evacuation simulations

    Get PDF
    The collapse of buildings, such as terminal 2E at Paris' Charles de Gaule Airport, and of fires, such as the Rhode Island, Station Night Club tragedy, has focused public attention on the safety of large public buildings. Initiatives in the United States and in Europe have led to the development of interactive simulators that model evacuation from these buildings. The tools avoid some of the ethical and legal problems from simulating evacuations; many people were injured during the 1993 evacuation of the World Trade Center (WTC) complex. They also use many concepts that originate within the CHI communities. For instance, some simulators use simple task models to represent the occupants' goal structures as they search for an available exit. However, the recent release of the report from the National Commission on Terrorist Attacks upon the United States (the '9/11 commission') has posed serious questions about the design and use of this particular class of interactive systems. This paper argues that simulation research needs to draw on insights from the CHI communities in order to meet some the challenges identified by the 9/11 commission

    Creating a Canadian profession: the nuclear engineer, c. 1940-1968

    Get PDF
    Canada, as one of the three Allied nations collaborating on atomic energy development during the Second World War, had an early start in applying its new knowledge and defining a new profession. Owing to postwar secrecy and distinct national aims for the field, nuclear engineering was shaped uniquely by the Canadian context. Alone among the postwar powers, Canadian exploration of atomic energy eschewed military applications; the occupation emerged within a governmental monopoly; the intellectual content of the discipline was influenced by its early practitioners, administrators, scarce resources, and university niches; and a self-recognized profession coalesced later than did its American and British counterparts. This paper argues that the history of the emergence of Canadian nuclear engineers exemplifies unusually strong shaping of technical expertise by political and cultural context

    A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes

    Get PDF
    Insider threats are perhaps the most serious challenges that nuclear security systems face. All of the cases of theft of nuclear materials where the circumstances of the theft are known were perpetrated either by insiders or with the help of insiders; given that the other cases involve bulk material stolen covertly without anyone being aware the material was missing, there is every reason to believe that they were perpetrated by insiders as well. Similarly, disgruntled workers from inside nuclear facilities have perpetrated many of the known incidents of nuclear sabotage. The most recent example of which we are aware is the apparent insider sabotage of a diesel generator at the San Onofre nuclear plant in the United States in 2012; the most spectacular was an incident three decades ago in which an insider placed explosives directly on the steel pressure vessel head of a nuclear reactor and then detonated them.While many such incidents, including the two just mentioned, appear to have been intended to send a message to management, not to spread radioactivity, they highlight the immense dangers that could arise from insiders with more malevolent intent. As it turns out, insiders perpetrate a large fraction of thefts from heavily guarded non-nuclear facilities as well. Yet organizations often find it difficult to understandand protect against insider threats. Why is this the case?Part of the answer is that there are deep organizational and cognitive biases that lead managers to downplay the threats insiders pose to their nuclear facilities and operations. But another part of the answer is that those managing nuclear security often have limited information about incidents that have happened in other countries or in other industries, and the lessons that might be learned from them.The IAEA and the World Institute for Nuclear Security (WINS) produce"best practices" guides as a way of disseminating ideas and procedures that have been identified as leading to improved security. Both have produced guides on protecting against insider threats.5 But sometimes mistakes are even moreinstructive than successes.Here, we are presenting a kind of "worst practices" guide of serious mistakes made in the past regarding insider threats. While each situation is unique, and serious insider problems are relatively rare, the incidents we describe reflect issues that exist in many contexts and that every nuclear security manager should consider. Common organizational practices -- such as prioritizing production over security, failure to share information across subunits, inadequate rules or inappropriate waiving of rules, exaggerated faith in group loyalty, and excessive focus on external threats -- can be seen in many past failures to protect against insider threats
    • …
    corecore