Appendix H: Bibliography of Ecotox Open Literature Data Excluded Or Not Evaluated

Total Page:16

File Type:pdf, Size:1020Kb

Appendix H: Bibliography of Ecotox Open Literature Data Excluded Or Not Evaluated APPENDIX H: BIBLIOGRAPHY OF ECOTOX OPEN LITERATURE DATA EXCLUDED OR NOT EVALUATED Explanation of OPP Acceptability Criteria and Rejection Codes for ECOTOX Data Studies located and coded into ECOTOX must meet acceptability criteria, as established in the Interim Guidance of the Evaluation Criteria for Ecological Toxicity Data in the Open Literature, Phase I and II, Office of Pesticide Programs, U.S. Environmental Protection Agency, July 16, 2004. Studies that do not meet these criteria are designated in the bibliography as “Accepted for ECOTOX but not OPP.” The intent of the acceptability criteria is to ensure data quality and verifiability. The criteria parallel criteria used in evaluating registrant-submitted studies. Specific criteria are listed below, along with the corresponding rejection code. • The paper does not report toxicology information for a chemical of concern to OPP; (Rejection Code: NO COC) • The article is not published in English language; (Rejection Code: NO FOREIGN) • The study is not presented as a full article. Abstracts will not be considered; (Rejection Code: NO ABSTRACT) • The paper is not publicly available document; (Rejection Code: NO NOT PUBLIC (typically not used, as any paper acquired from the ECOTOX holding or through the literature search is considered public) • The paper is not the primary source of the data; (Rejection Code: NO REVIEW) • The paper does not report that treatment(s) were compared to an acceptable control; (Rejection Code: NO CONTROL) • The paper does not report an explicit duration of exposure; (Rejection Code: NO DURATION) • The paper does not report a concurrent environmental chemical concentration/dose or application rate; (Rejection Code: NO CONC) • The paper does not report the location of the study (e.g., laboratory vs. field); (Rejection Code: NO LOCATION) • The paper does not report a biological effect on live, whole organisms; (Rejection Code: NO IN-VITRO) • The paper does not report the species that was tested; and this species can be verified in a reliable source; (Rejection Code: NO SPECIES) • The paper does not report effects associated with exposure to a single chemical. (Rejection Code: NO MIXTURE). It should be noted that all papers including data on pesticide mixtures are considered. Additionally, efficacy studies on target species are excluded and coded as NO TARGET. Data that originated from the OPP Pesticide Ecotoxicity Database is coded as NO EFED. These data are already available to the chemical team. Excluded from ECOTOX Red Facts: Prometryn. Govt reports announcements & index (gra&i), issue 22, 2096. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. 1 Report on Adsorption of Hex by a Cape Fear Loam Soil (1979). Epa/ots; doc #40-7949065. Chem Codes: Chemical of Concern: PMT Rejection Code: FATE. Reregistration Eligiblity Decision (Red): Prometryn. (Includes Red Facts: Prometryn Fact Sheet). Govt reports announcements & index (gra&i), issue 23, 2096. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. 1987). Studies on Side Effect on Soil Nematodes of Pesticides Used in Agrocenoses Au - Kozlowska J. Wiad ekol 33: 367-378. Chem Codes: Chemical of Concern: PMT Rejection Code: NON-ENGLISH. Abbitt, K. B., Rainger, G. E., and Nash, G. B. ( Effects of Fluorescent Dyes on Selectin and Integrin- Mediated Stages of Adhesion and Migration of Flowing Leukocytes. J immunol methods. 2000, may 26; 239(1-2):109-19. [Journal of immunological methods]: J Immunol Methods. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Abe, Y., Sugisaki, K., and Dannenberg, A. M. Jr ( Rabbit Vascular Endothelial Adhesion Molecules: Elam- 1 Is Most Elevated in Acute Inflammation, Whereas Vcam-1 and Icam-1 Predominate in Chronic Inflammation. J leukoc biol. 1996, dec; 60(6):692-703. [Journal of leukocyte biology]: J Leukoc Biol. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Abernathy-Carver, K. J., Sampson, H. A., Picker, L. J., and Leung, D. Ym (1995). Milk-Induced Eczema Is Associated With the Expansion of T Cells Expressing Cutaneous Lymphocyte Antigen. Journal of clinical investigation 95: 913-918. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Abeyama, K., Oh, S., Kawano, K., Nakajima, T., Soejima, Y., Nakano, K., and Maruyama, I. ( Nonionic Contrast Agents Produce Thrombotic Effect by Inducing Adhesion of Leukocytes on Human Endothelium. Biochem biophys res commun. 1995, jul 26; 212(3):776-83. [Biochemical and biophysical research communications]: Biochem Biophys Res Commun. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Abitorabi, M. A., Pachynski, R. K., Ferrando, R. E., Tidswell, M., and Erle, D. J. ( Presentation of Integrins on Leukocyte Microvilli: a Role for the Extracellular Domain in Determining Membrane Localization. J cell biol. 1997, oct 20; 139(2):563-71. [The journal of cell biology]: J Cell Biol. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Abou El Hassan, M. A., Verheul, H. M., Jorna, A. S., Schalkwijk, C., Van Bezu, J., Van Der Vijgh, W. J., and Bast, A. ( The New Cardioprotector Monohydroxyethylrutoside Protects Against Doxorubicin-Induced Inflammatory Effects in Vitro. Br j cancer. 2003, jul 21; 89(2):357-62. [British journal of cancer]: Br J Cancer. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Abrams, J. R., Kelley, S. L., Hayes, E., Kikuchi, T., Brown, M. J., Kang, S., Lebwohl, M. G., Guzzo, C. A., Jegasothy, B. V., Linsley, P. S., and Krueger, J. G. ( Blockade of T Lymphocyte Costimulation With Cytotoxic T Lymphocyte-Associated Antigen 4-Immunoglobulin (Ctla4ig) Reverses the Cellular Pathology of Psoriatic Plaques, Including the Activation of Keratinocytes, Dendritic Cells, and Endothelial Cells. J exp med. 2000, sep 4; 192(5):681-94. [The journal of experimental medicine]: J Exp Med. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Abrams, K., Yunusov, M. Y., Slichter, S., Moore, P., Nelp, W. B., Burstein, S. A., Mcdonough, S., Durack, L., Storer, B., Storb, R., Gass, M. J., Georges, G., and Nash, R. A. ( Recombinant Human Macrophage Colony-Stimulating Factor-Induced Thrombocytopenia in Dogs. Br j haematol. 2 2003, may; 121(4):614-22. [British journal of haematology]: Br J Haematol. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Abu Zuhri Az and Voelter, W. (1998). Applications of Adsorptive Stripping Voltammetry for the Trace Analysis of Metals, Pharmaceuticals and Biomolecules. Fresenius' journal of analytical chemistry 360: 1-9. Chem Codes: Chemical of Concern: PMT Rejection Code: CHEM METHODS. Adams, D. H., Burra, P., Hubscher, S. G., Elias, E., and Newman, W. ( Endothelial Activation and Circulating Vascular Adhesion Molecules in Alcoholic Liver Disease. Hepatology. 1994, mar; 19(3):588-94. [Hepatology (baltimore, md.)]: Hepatology . Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Adams, D. H., Hubscher, S. G., Fisher, N. C., Williams, A., and Robinson, M. ( Expression of E-Selectin and E-Selectin Ligands in Human Liver Inflammation. Hepatology. 1996, sep; 24(3):533-8. [Hepatology (baltimore, md.)]: Hepatology. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Adams, S. W., Wang, L., Fortney, J., and Gibson, L. F. ( Etoposide Differentially Affects Bone Marrow and Dermal Derived Endothelial Cells. J cell mol med. 2004 jul-sep; 8(3):338-48. [Journal of cellular and molecular medicine]: J Cell Mol Med. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Addison, D. A. and Bardsley, C. E. (1968). Chlorella vulgaris Assay of the Activity of Soil Herbicides. Weed Sci. 16: 427-429 . Chem Codes: EcoReference No.: 72181 Chemical of Concern: DU,PMT Rejection Code: MIXTURE. Adejonwo, K. O., Ahmed, M. K., Lagoke, S. T. O., and Karikari, S. K. (1991). Chemical Weed Control in Irrigated Okra in the Nigerian Sudan Savanna Zone. Trop.Pest Manag. 37: 91-95. Chem Codes: EcoReference No.: 73896 Chemical of Concern: MTL,PMD,PMT,ACR Rejection Code: MIXTURE. Agace, W. W., Patarroyo, M., Svensson, M., Carlemalm, E., and Svanborg, C. ( Escherichia Coli Induces Transuroepithelial Neutrophil Migration by an Intercellular Adhesion Molecule-1-Dependent Mechanism. Infect immun. 1995, oct; 63(10):4054-62. [Infection and immunity]: Infect Immun. Chem Codes: Chemical of Concern: PMT Rejection Code: HUMAN HEALTH. Agnihotri, N. P. and Barooah, A. K. (1994). Bound Residues of Pesticides in Soil and Plant a Review. Journal of scientific and industrial research (india) 53: 850-861. Chem Codes: Chemical of Concern: PMT Rejection Code: REVIEW, SURVEY. Aguilar, C., Borrull, F., and Marce, R. M. (1997). Determination of Pesticides in Environmental Waters by Solid-Phase Extraction and Gas Chromatography With Electron-Capture and Mass Spectrometry Detection. Journal of chromatography a 771: 221-231. Chem Codes: Chemical of Concern: PMT Rejection Code: CHEM METHODS. Aguilar, C., Ferrer, I., Borrull, F., Marce, R. M., and Barcelo, D. (1998). Comparison of Automated on- Line Solid-Phase Extraction Followed by Liquid Chromatography-Mass Spectrometry With Atmospheric Pressure Chemical Ionization and Particle Beam Mass Spectrometry for the Determination of a Priority Group of Pesticides in Environmental Waters. Journal of chromatography a 794: 147-163. Chem Codes: Chemical of Concern: PMT Rejection Code: CHEM METHODS. Aguilar, C., Penalver, S., Pocurull, E., Borrull, F., and Marce, R. M. (1998). Solid-Phase Microextraction 3 and Gas Chromatography With Mass
Recommended publications
  • A the Hacker
    A The Hacker Madame Curie once said “En science, nous devons nous int´eresser aux choses, non aux personnes [In science, we should be interested in things, not in people].” Things, however, have since changed, and today we have to be interested not just in the facts of computer security and crime, but in the people who perpetrate these acts. Hence this discussion of hackers. Over the centuries, the term “hacker” has referred to various activities. We are familiar with usages such as “a carpenter hacking wood with an ax” and “a butcher hacking meat with a cleaver,” but it seems that the modern, computer-related form of this term originated in the many pranks and practi- cal jokes perpetrated by students at MIT in the 1960s. As an example of the many meanings assigned to this term, see [Schneier 04] which, among much other information, explains why Galileo was a hacker but Aristotle wasn’t. A hack is a person lacking talent or ability, as in a “hack writer.” Hack as a verb is used in contexts such as “hack the media,” “hack your brain,” and “hack your reputation.” Recently, it has also come to mean either a kludge, or the opposite of a kludge, as in a clever or elegant solution to a difficult problem. A hack also means a simple but often inelegant solution or technique. The following tentative definitions are quoted from the jargon file ([jargon 04], edited by Eric S. Raymond): 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    [Show full text]
  • The United States and Democracy Promotion in Iraq and Lebanon in the Aftermath of the Events of 9/11 and the 2003 Iraq War
    The United States and democracy promotion in Iraq and Lebanon in the aftermath of the events of 9/11 and the 2003 Iraq War A Thesis Submitted to the Institute of Commonwealth Studies, School of Advanced Study, University of London in fulfilment of the requirements for the Degree of PhD. in Political Science. By Abess Taqi Ph.D. candidate, University of London Internal Supervisors Dr. James Chiriyankandath (Senior Research Fellow, Institute of Commonwealth Studies, School of Advanced Study, University of London) Professor Philip Murphy (Director, Institute of Commonwealth Studies, School of Advanced Study, University of London) External Co-Supervisor Dr. Maria Holt (Reader in Politics, Department of Politics and International Relations, University of Westminster) © Copyright Abess Taqi April 2015. All rights reserved. 1 | P a g e DECLARATION I hereby declare that this thesis is my own work and effort and that it has not been submitted anywhere for any award. Where other sources of information have been used, they have been duly acknowledged. Signature: ………………………………………. Date: ……………………………………………. 2 | P a g e Abstract This thesis features two case studies exploring the George W. Bush Administration’s (2001 – 2009) efforts to promote democracy in the Arab world, following military occupation in Iraq, and through ‘democracy support’ or ‘democracy assistance’ in Lebanon. While reviewing well rehearsed arguments that emphasise the inappropriateness of the methods employed to promote Western liberal democracy in Middle East countries and the difficulties in the way of democracy being fostered by foreign powers, it focuses on two factors that also contributed to derailing the U.S.’s plans to introduce ‘Western style’ liberal democracy to Iraq and Lebanon.
    [Show full text]
  • Annual Report 1999
    Akzo Nobel Annual Report 1999 Annual Report 1999 PROFILE Akzo Nobel is an international company that serves customers around the world with healthcare products, coatings, and chemicals. The fibers business, which operated as a stand-alone company under the name Acordis, was divested at year- end 1999. Akzo Nobel has a two-layer top structure: business units in Pharma, Coatings, and Chemicals, and a corporate center. Headquartered in the Netherlands, Akzo Nobel has activities in 75 countries and employed 85,000 people during 1999. Sales in 1999 were EUR 14.4 billion, with Pharma, Coatings, and Chemicals accounting for EUR 2.9 billion, EUR 5.5 billion, and EUR 3.8 billion. With 17,000 employees, Acordis contributed EUR 2.2 billion. The corporate center coordinates key tasks in such areas as strategy; finance and control; human resources; technology; legal affairs and intellectual property; communications; health, safety, and environment; information management; and risk and insurance management. ▼ COMPANY STATEMENT (please turn over) Gross cash flow Operating income before nonrecurring items plus depreciation of property, plant and equipment, and amortization of intangible assets Cash flow per share Net income excluding extraordinary and nonrecurring items plus depreciation of property, plant and equipment, and amortization of intangible assets, divided by the weighted average number of common shares outstanding Net income (excluding extraordinary and nonrecurring items) per share Net income (excluding extraordinary and nonrecurring items) divided by the weighted average number of common shares outstanding Shareholders’ equity per share Akzo Nobel N.V. shareholders’ equity divided by the number of common shares outstanding at December 31 Working capital Inventories and receivables less current liabilities, exclusive of dividends Invested capital Total assets less cash and cash equivalents and less current liabilities Equity Akzo Nobel N.V.
    [Show full text]
  • Department of State Key Officers List
    United States Department of State Telephone Directory This customized report includes the following section(s): Key Officers List (UNCLASSIFIED) 1/17/2017 Provided by Global Information Services, A/GIS Cover UNCLASSIFIED Key Officers of Foreign Service Posts Afghanistan RSO Jan Hiemstra AID Catherine Johnson CLO Kimberly Augsburger KABUL (E) Great Massoud Road, (VoIP, US-based) 301-490-1042, Fax No working Fax, INMARSAT Tel 011-873-761-837-725, ECON Jeffrey Bowan Workweek: Saturday - Thursday 0800-1630, Website: EEO Erica Hall kabul.usembassy.gov FMO David Hilburg IMO Meredith Hiemstra Officer Name IPO Terrence Andrews DCM OMS vacant ISO Darrin Erwin AMB OMS Alma Pratt ISSO Darrin Erwin Co-CLO Hope Williams DCM/CHG Dennis W. Hearne FM Paul Schaefer Algeria HRO Dawn Scott INL John McNamara ALGIERS (E) 5, Chemin Cheikh Bachir Ibrahimi, +213 (770) 08- MGT Robert Needham 2000, Fax +213 (21) 60-7335, Workweek: Sun - Thurs 08:00-17:00, MLO/ODC COL John Beattie Website: http://algiers.usembassy.gov POL/MIL John C. Taylor Officer Name SDO/DATT COL Christian Griggs DCM OMS Sharon Rogers, TDY TREAS Tazeem Pasha AMB OMS Carolyn Murphy US REP OMS Jennifer Clemente Co-CLO Julie Baldwin AMB P. Michael McKinley FCS Nathan Seifert CG Jeffrey Lodinsky FM James Alden DCM vacant HRO Dana Al-Ebrahim PAO Terry Davidson ICITAP Darrel Hart GSO William McClure MGT Kim D'Auria-Vazira RSO Carlos Matus MLO/ODC MAJ Steve Alverson AFSA Pending OPDAT Robert Huie AID Herbie Smith POL/ECON Junaid Jay Munir CLO Anita Kainth POL/MIL Eric Plues DEA Craig M.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • Combating Spyware in the Enterprise.Pdf
    www.dbebooks.com - Free Books & magazines Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you will find an assortment of value-added features such as free e-booklets related to the topic of this book, URLs of related Web site, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE EBOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These eBooks are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our ebooks onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Using Deception to Enhance Security: a Taxonomy, Model, and Novel Uses Mohammed H
    Purdue University Purdue e-Pubs Open Access Dissertations Theses and Dissertations January 2015 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses Mohammed H. Almeshekah Purdue University Follow this and additional works at: https://docs.lib.purdue.edu/open_access_dissertations Recommended Citation Almeshekah, Mohammed H., "Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses" (2015). Open Access Dissertations. 1334. https://docs.lib.purdue.edu/open_access_dissertations/1334 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. Graduate School Form 30 Updated 1/15/2015 PURDUE UNIVERSITY GRADUATE SCHOOL Thesis/Dissertation Acceptance This is to certify that the thesis/dissertation prepared By Almeshekah, Mohammed Hamoud Entitled Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses For the degree of Doctor of Philosophy Is approved by the final examining committee: Eugene H. Spafford Co-chair Mikhail J. Atallah Co-chair Samuel S. Wagstaff, Jr Matt Bishop To the best of my knowledge and as understood by the student in the Thesis/Dissertation Agreement, Publication Delay, and Certification Disclaimer (Graduate School Form 32), this thesis/dissertation adheres to the provisions of Purdue University’s “Policy of Integrity in Research” and the use of copyright material. Eugene H. Spafford Approved by Major Professor(s): William Gorman July 20th, 2015 Approved by: Head of the Departmental
    [Show full text]
  • Automating Cyber Attacks
    Automating Cyber Attacks HYPE AND REALITY AUTHORS Ben Buchanan John Bansemer Dakota Cary Jack Lucas Micah Musser NOVEMBER 2020 Established in January 2019, the Center for Security and Emerging Technology (CSET) at Georgetown’s Walsh School of Foreign Service is a research organization fo- cused on studying the security impacts of emerging tech- nologies, supporting academic work in security and tech- nology studies, and delivering nonpartisan analysis to the policy community. CSET aims to prepare a generation of policymakers, analysts, and diplomats to address the chal- lenges and opportunities of emerging technologies. During its first two years, CSET will focus on the effects of progress in artificial intelligence and advanced computing. CSET.GEORGETOWN.EDU | [email protected] 2 Center for Security and Emerging Technology NOVEMBER 2020 Automating Cyber Attacks HYPE AND REALITY AUTHORS Ben Buchanan John Bansemer Dakota Cary Jack Lucas Micah Musser ACKNOWLEDGMENTS The authors would like to thank Perri Adams, Max Guise, Drew Lohn, Igor Mikolic-Torreira, Chris Rohlf, Lynne Weil, and Alexandra Vreeman for their comments on earlier versions of this manuscript. PRINT AND ELECTRONIC DISTRIBUTION RIGHTS © 2020 by the Center for Security and Emerging Technology. This work is licensed under a Creative Commons Attribution- NonCommercial 4.0 International License. To view a copy of this license, visit: https://creativecommons.org/licenses/by-nc/4.0/. Document Identifier: doi: 10.51593/2020CA002 Cover photo: KsanaGraphica/ShutterStock. Contents EXECUTIVE SUMMARY III INTRODUCTION V 1 | THE CYBER KILL CHAIN 1 2 | HOW MACHINE LEARNING CAN (AND CAN’T) 11 CHANGE OFFENSIVE OPERATIONS 3 | CONCLUSION: KEY JUDGMENTS 21 ENDNOTES 29 Center for Security and Emerging Technology i iv Center for Security and Emerging Technology Executive Summary acking is a well-established part of statecraft.
    [Show full text]
  • Creating a Platform for Growth
    CREATING A COMPANY PLATFORM FOR STATEMENT OUR COMPANY GROWTH Akzo Nobel is a multicultural company. Its subsidiaries are market-driven and technology-based, serving customers throughout the world with pharma products, coatings, and chemicals. ANNUAL REPORT 2004 Akzo Nobel conducts its diversified activities through decentralized business units. We maintain a product portfolio with leadership positions in important market segments. OUR PEOPLE Akzo Nobel regards people as its most important resource. We foster leadership, individual accountability, and teamwork. Our employees are professionals whose entrepreneurial behavior is result-oriented and guided by personal integrity. Akzo Nobel Akzo They strive for the success of their own units in the interest of Akzo Nobel as a global company. In return, our employees can count on opportunities for individual and professional development in an international working environment. FOR DEFINITIONS SEE INSIDE COVER PROFILE We offer them rewarding and challenging assignments with room for initiative. Annual Report Akzo Nobel is a multicultural OUR COMMITMENTS company headquartered in the We will focus our efforts on the success of our customers. Netherlands, holding many leading We will provide competitive returns on our shareholders’ investments. positions in pharma products, We will create an attractive working environment for our employees. coatings, and chemicals. Employing We will conduct our activities in a socially responsible manner. 63,600 people in 2004, the 2004 Company conducts its activities OUR AMBITION through 16* business units and has To be the first choice of customers, shareholders, and employees, and to be a subsidiaries in more than respected member of society. 80 countries. Sales in 2004 aggregated EUR 12.7 billion, of which 25% in pharma products, 41% in coatings, and 34% in chemical products.
    [Show full text]
  • International Women's Peace Movements
    Feminisms and feminist movements International Women’s Peace Movements Annika WILMERS ABSTRACT International women’s peace movements took on different forms: in the 19th century, internationally minded women pacifists often initially built contacts between two or three countries. In the first half of the 20th century, international organisational structures were established. Moreover, some existing international women’s organisations turned towards peace work in the mid-1920s and 1930s. After 1945, European women’s peace work was confronted with new political constellations and global perspectives. Campaigning against the arms race led to new activities which were less formally organised but influenced female pacifism in many countries. In feminist pacifist discourse, peace was always linked to other topics which were seen as reciprocal, influential and highly important for future peacekeeping, such as women’s rights, democracy, nutrition and socioeconomic contexts, education or environmentalism. Platform at the International Congress of Women at The Hague, April 1915. Sixth person from the left side: Jane Addams (President of the Congress), LSE Library. “Women of Europe in Action for Peace” Conference, organized by Women's International League for Peace and Freedom ; WILPF), on November, the 27th 1981 at the Tropenmuseum, Amsterdam, Nationaal Archief Source: Wikimedia Commons https://goo.gl/BpPkZG The combination of the women’s and the peace movement as a visible international phenomenon is primarily an outcome of World War I, although initiatives had already existed where women strove for a women’s peace movement with international dimensions. Linkage of the peace and the women’s movement did not happen as a matter of course.
    [Show full text]
  • The Air Force Can Learn a Lot from What It Has Already Seen in Cyberspace. Old Lessons
    The Air Force can learn a lot from what it has already seen in cyberspace. Old Lessons, “New”By Rebecca Grant Domain Cape Cod radar tower in Massachusetts was a prototype for the SAGE air defense system. SAGE needed computers with memory, digital relays linking radar sites, and systems engineering to bring them together. 86 AIR FORCE Magazine / September 2013 ashington is once again strategic challenges, such as continental wrestling with how to tack- air defense in the 1950s and real-time le the military challenges command and control in the 1980s, of cyberspace. “The rise of fueled progress in the exploitation of Photos via MITRE Corp. cyber is the most striking cyberspace. development in the post-9/11 national In its infancy, the domain of cyber- Wsecurity landscape,” Chairman of the space did not look much like the clouds Joint Chiefs of Staff Army Gen. Martin and commons known around the globe E. Dempsey said in a June 27 speech at today. The special qualities of cyberspace the Brookings Institution. Dempsey said emerged only when computers gained about 4,000 new military cyber positions more memory and power and networks could be created. Perhaps 1,000 of those linked them together. may be within the Air Force. Responding to new growth in the In the (Cyber) Beginning cyber mission poses a challenge to the Back before social media, the World Air Force. Over the past decade, the Wide Web, the fi rst emails, and even USAF position has swung from taking before ARPAnet, the fi rst closed cy- a vigorous lead in the mission area to berspace system was the Air Force’s going slow on cyber—to avoid a po- Semi-automatic Ground Environment, tential “black hole” as Air Force Chief or SAGE.
    [Show full text]
  • Cyber Conflicts in International Relations: Framework and Case Studies
    Cyber Conflicts in International Relations: Framework and Case Studies Alexander Gamero-Garrido Engineering Systems Division Massachusetts Institute of Technology [email protected] | [email protected] Executive Summary Overview Although cyber conflict is no longer considered particularly unusual, significant uncertainties remain about the nature, scale, scope and other critical features of it. This study addresses a subset of these issues by developing an internally consistent framework and applying it to a series of 17 case studies. We present each case in terms of (a) its socio-political context, (b) technical features, (c) the outcome and inferences drawn in the sources examined. The profile of each case includes the actors, their actions, tools they used and power relationships, and the outcomes with inferences or observations. Our findings include: • Cyberspace has brought in a number of new players – activists, shady government contractors – to international conflict, and traditional actors (notably states) have increasingly recognized the importance of the domain. • The involvement of the private sector on cybersecurity (“cyber defense”) has been critical: 16 out of the 17 cases studied involved the private sector either in attack or defense. • All of the major international cyber conflicts presented here have been related to an ongoing conflict (“attack” or “war”) in the physical domain. • Rich industrialized countries with a highly developed ICT infrastructure are at a higher risk concerning cyber attacks. • Distributed Denial of Service (DDoS) is by far the most common type of cyber attack. • Air-gapped (not connected to the public Internet) networks have not been exempt from attacks. • A perpetrator does not need highly specialized technical knowledge to intrude computer networks.
    [Show full text]