10,143 research outputs found

    China’s WAPI Policy: Security Measure or Trade Protectionism?

    Get PDF
    In December of 2003, the Chinese government announced that all WLAN equipment sold in China must conform to a propriety standard called WAPI, rather than the internationally accepted Wi-Fi standard. Moreover, for foreign firms to gain access to WAPI technology, they would need to partner with one of two-dozen Chinese firms designated by the Chinese government. The policy ostensibly grew out of security concerns regarding Wi-Fi, although it is unclear whether WAPI is more secure. Beijing has now indefinitely postponed the implementation of this policy, but WAPI is still relevant. This iBrief argues that WAPI is illustrative of many Chinese technical barriers to trade in the high-tech sector, and evaluates this policy\u27s consistency with China\u27s WTO obligations

    China’s WAPI Policy: Security Measure or Trade Protectionism?

    Get PDF
    In December of 2003, the Chinese government announced that all WLAN equipment sold in China must conform to a propriety standard called WAPI, rather than the internationally accepted Wi-Fi standard. Moreover, for foreign firms to gain access to WAPI technology, they would need to partner with one of two-dozen Chinese firms designated by the Chinese government. The policy ostensibly grew out of security concerns regarding Wi-Fi, although it is unclear whether WAPI is more secure. Beijing has now indefinitely postponed the implementation of this policy, but WAPI is still relevant. This iBrief argues that WAPI is illustrative of many Chinese technical barriers to trade in the high-tech sector, and evaluates this policy\u27s consistency with China\u27s WTO obligations

    Concurrent Validity of the Face Valid Food Security Measure

    Get PDF
    Our objective was to assess the concurrent validity of the face valid food security categorical algorithm with Hawaii residents. We also hypothesized that there would be differences in food security status between ethnic groups. We used the 18 question indicators of the Core Food Security Module (CFSM) to develop the face valid food security measure. The “face valid” measure was created previously by this research team as a more valid food security measure in Hawaii. Findings compared the face valid categorical measure and the CFSM scale measure with various demographic, economic, dietary variables, and use of assistance programs. The sample included 1,603 Hawaii residents drawn from a statewide telephone survey and a survey of charitable food recipients. Statistical analysis included ANOVA, chi-square, and regression analysis of food security measures with related variables. In general, progressively deteriorating food security status resulted in concurrent decreases in vegetable intake, increased reliance on a cheap, high-fat, high-sodium noodle product, and increased reliance on resource augmentation behaviors. Factors such as a greater number of children, limited savings, and recent loss of a job were found to compromise food security status. WIC benefits, frequent use of a food pantry, and the presence of a senior adult in the household appeared protective. In this sample Asians, except for Filipinos, were more food secure; Hawaiians and Part-Hawaiians, and Samoans, were more likely to experience hunger. Findings were consistent with previous work and suggest that the face valid food security measure does exhibit concurrent validity.

    A Neural Network Measurement of Relative Military Security: The Case of Greece and Cyprus

    Get PDF
    This paper aims at introducing a relative security measure, applicable to evaluating the impact of arms races on the military security of allies. This measure is based on demographic criteria, which play a dominant role in a number of arms races involving military alliances. The case of Greece and Cyprus, on one hand, and Turkey on the other, is the one to which our relative security measure is applied and tested. Artificial neural networks were trained to forecast the future behaviour of relative security. The high forecasting performance permitted the application of alternative scenarios for predicting the impact of the Greek - Turkish arms race on the relative security of the Greek - Cypriot alliance.Arms Race, Neural Networks, Relative Military Security

    A Measure for Ending Hunger in the United States

    Get PDF
    Hunger is a persistent problem in the United States. In 1999, three percent of U.S. households (more than 7.5 million people) were food insecure with hunger.2(p7) An additional seven percent of households (more than 23 million people) were food insecure without hunger. In all, 31 million Americans, including 12 million children, did not have enough food to meet their basic needs.In response, PARTNERS IN ENDING HUNGER (a grass-roots organization with over 17 years of experience) has declared itself an organization accountable for providing communities with the tools and training necessary to create and implement effective action plans for ending hunger (see Appendix A). Two essential tools for this work are: (1) a direct and accurate way to measure hunger in a community and (2) criteria that define when hunger has ended.The hunger measure PARTNERS has chosen is the U.S. Household Food Security Measure. It is a survey instrument and severity scale developed under the joint leadership of the U.S. Departments of Agriculture (USDA) and Health and Human Services (HHS). It has been used to measure the extent of hunger at national and state levels since 1995 and was specifically designed to be used at the local level as well.Building on distinctions and definitions presented in the U.S. Household Food Security Measure, PARTNERS has established criteria that define when hunger in a community has ended. According to PARTNERS' criteria, a community has ended hunger when, for two consecutive years, the results of the U.S. Household Food Security Measure show that none of the community's households have members who experience hunger and four percent or fewer of the community's households experience food insecurity. PARTNERS asserts that when communities meet these criteria and sustain these results over time, they have ended the persistence of hunger. These communities will then serve as models and catalysts for other communities to do the same

    Evaluation of the Usda Food Security Measure with Generalized Linear Mixed Models (An)

    Get PDF
    Over the last decade, new information has been developed and collected to measure the extent of food insecurity and hunger in the United States. Common measurement of the phenomenon of hunger and food insecurity has become possible through efforts of the U.S. Department of Agriculture (USDA) to develop a set of survey questions that can be used to obtain estimates of the prevalence and severity of food insecurity. This paper takes a closer look at the measurement of food insecurity and the effect of household variables on measured food insecurity. The effects of demographic and survey-specific variables on the food insecurity/hunger scale are evaluated using a generalized linear model with mixed effects. Data come from the 1995, 1997, and 1999 Food Security Module of the Current Population Survey. The results generally validate the model currently used by the U.S. Department of Agriculture. In addition, our approach makes it possible to consider the effect of demographics and several survey design variables on food security among measurably food-insecure households. The analysis of the expanded model with the 1995 data finds results similar to those reported based on the Rasch model used by the USDA. Even though the sample size was reduced and a number of screening and questionnaire changes were introduced in 1997 and 1999, the results for those years appear mostly unchanged and confirm the robustness of the scale in measuring food insecurity. There is some evidence that interpretation of questions may vary among different demographic groups.food insecurity, household hunger, Rasch model.

    Implementing Additional Security Measure on ATM Through Biometric

    Get PDF
    With the development of computer network technology and e-commerce, the self-service banking system has got extensive generalization with the characteristic offering high-quality 24 hours service for customer. Nowadays, using the ATM (Automatic Teller Machine) which provides customers with the convenient banknote trading is very common. However, the financial crime case rises repeatedly in recent years. A lot of criminals tamper with the ATM and steal user's credit card and password by illegal means, Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer. How to carry on the valid identity to the customer becomes the focus in current financial circle. Traditional ATM systems authenticate generally by using the credit card and the password, the method has some defects. Using credit card and password cannot verify the client's identity exactly. In recent years, Biometric systems, fingerprint technology in particular, can give the possibility to develop a system of protection in ATM machines
    • …
    corecore