ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Explore membership for yourself or for your organization.
Conference Spotlight
2026 ANS Annual Conference
May 31–June 3, 2026
Denver, CO|Sheraton Denver
Latest Magazine Issues
Jan 2026
Jul 2025
Latest Journal Issues
Nuclear Science and Engineering
February 2026
Nuclear Technology
December 2025
Fusion Science and Technology
November 2025
Latest News
Radium sources yield cancer-fighting Ac-225 in IAEA program
The International Atomic Energy Agency has reported that, to date, 14 countries have made 14 transfers of disused radium to be recycled for use in advanced cancer treatments under the agency’s Global Radium-226 Management Initiative. Through this initiative, which was launched in 2021, legacy radium-226 from decades-old medical and industrial sources is used to produce actinium-225 radiopharmaceuticals, which have shown effectiveness in the treatment of patients with breast and prostate cancer and certain other cancers.
Michael T. Rowland, Lee T. Maccarone, Andrew J. Clark
Nuclear Technology | Volume 209 | Number 3 | March 2023 | Pages 471-487
Technical Paper—Instrumentation and Controls | doi.org/10.1080/00295450.2022.2087841
Articles are hosted by Taylor and Francis Online.
The Information Harm Triangle (IHT) is a novel approach that aims to adapt intuitive engineering concepts to simplify defense in depth for instrumentation and control (I&C) systems at nuclear power plants. This approach combines digital harm, real-world harm, and unsafe control actions (UCAs) into a single graph named “Information Harm Triangle.” The IHT is based on the postulation that the consequences of cyberattacks targeting I&C systems can be expressed in terms of two orthogonal components: a component representing the magnitude of data harm (DH) (i.e., digital information harm) and a component representing physical information harm (PIH) (i.e., real-world harm, e.g., an inadvertent plant trip). The magnitude of the severity of the physical consequence is the aspect of risk that is of concern. The sum of these two components represents the total information harm.
The IHT intuitively informs risk-informed cybersecurity strategies that employ independent measures that either act to prevent, reduce, or mitigate DH or PIH. Another aspect of the IHT is that the DH can result in cyber-initiated UCAs that result in severe physical consequences. The orthogonality of DH and PIH provides insights into designing effective defense in depth. The IHT can also represent cyberattacks that have the potential to impede, evade, or compromise countermeasures from taking appropriate action to reduce, stop, or mitigate the harm caused by such UCAs. Cyber-initiated UCAs transform DH to PIH.