Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 7.227
Filtrar
1.
JAMA Netw Open ; 7(10): e2437160, 2024 Oct 01.
Artículo en Inglés | MEDLINE | ID: mdl-39365587
2.
Sci Rep ; 14(1): 23952, 2024 10 14.
Artículo en Inglés | MEDLINE | ID: mdl-39397044

RESUMEN

In public spaces, threats to societal security are a major concern, and emerging technologies offer potential countermeasures. The proposed intelligent person identification system monitors and identifies individuals in public spaces using gait, face, and iris recognition. The system employs a multimodal approach for secure identification and utilises deep convolutional neural networks (DCNNs) that have been pretrained to predict individuals. For increased accuracy, the proposed system is implemented on a cloud server and integrated with citizen identification systems such as Aadhar/SSN. The performance of the system is determined by the rate of accuracy achieved when identifying individuals in a public space. The proposed multimodal secure identification system achieves a 94% accuracy rate, which is higher than that of existing public space person identification systems. Integration with citizen identification systems improves precision and provides immediate life-saving assistance to those in need. Utilising secure deep learning techniques for precise person identification, the proposed system offers a promising solution to security threats in public spaces. This research is necessary to investigate the efficacy and potential applications of the proposed system, including accident identification, theft identification, and intruder identification in public spaces.


Asunto(s)
Aprendizaje Profundo , Humanos , Identificación Biométrica/métodos , Redes Neurales de la Computación , Medidas de Seguridad
3.
Turk J Med Sci ; 54(4): 822-837, 2024.
Artículo en Inglés | MEDLINE | ID: mdl-39295625

RESUMEN

Background/aim: The Global Health Security Index (GHSI), which is used to assess the global health security preparedness levels of countries, and the Bulut Index-Beta (BI-ß) method, developed as a multicriteria decision-making method, were compared in terms of global health security in the context of the world's countries. It was aimed to demonstrate the feasibility of the BI-ß method by testing it on GHSI datasets and contribute to the methodological development of the GHSI. Materials and methods: The datasets used in this study were the publicly available GHSI datasets, which allow for comparative evaluations of countries. The BI-ß method and GHSI were used to compare countries in terms of global health security. Results: In 2021, the top three best-performing countries in terms of global health security were the United States (BI-ß = 85.46), Australia (BI-ß = 82.53), and the United Kingdom (BI-ß = 82.29). For 2019, the United States (BI-ß = 85.44) and Australia (BI-ß = 81.69) had the same ranks as in 2021, but the United Kingdom (BI-ß = 76.63) dropped to 9th place. There was a statistically significant positive weak monotonic relationship between BI-ß and GHSI rankings. Conclusion: Since the GHSI scoring system is not consistent or questionable, the weighting process needs to be objectively reconsidered and the reasons for the weighting process need to be explained. The GHSI was conceptualized based on a narrow and technical framework. Therefore, it is recommended that the social and political determinants of public health be taken into account in the GHSI. On the other hand, the BI-ß method can be easily used in solving other multicriteria decision-making problems, especially in public health areas such as global health security.


Asunto(s)
Salud Global , Humanos , Australia , Medidas de Seguridad/estadística & datos numéricos , Toma de Decisiones
4.
J Vis ; 24(8): 8, 2024 Aug 01.
Artículo en Inglés | MEDLINE | ID: mdl-39150739

RESUMEN

Examination of imported commodities by trained inspectors searching for pest organisms is a common practice that phytosanitary regulatory agencies use to mitigate biosecurity risks along trade pathways. To investigate the effects of target size and color on the efficacy of these visual assessments, we affixed square decals to polystyrene models of mandarins. Sample units of 100 model fruit containing up to 10 marked models were examined by inspectors. Six sizes in six shades of brown were tested across two prevalence levels. The experiment consisted of five inspection rounds where 11 inspectors examined 77 sample units within an allocated time. The probability that decals were detected increased with mark size and color contrast. Smaller, low-contrast marks were mainly missed. The prevalence rate did not affect the detectability. Through the experiment, the false-positive rate dropped from 6% to 3%, whereas false-negative rates were constant throughout. Large, dark targets were readily found with a mean recall of >90%, whereas small, pale marks had a mean recall of 9%. Increased experience made inspectors more competent at recognizing decals, reducing the false positive rate. However, constant false-negative rates indicate that experience did not prevent inspectors from overlooking targets they could not perceive.


Asunto(s)
Medidas de Seguridad , Humanos , Medidas de Seguridad/normas
5.
Front Public Health ; 12: 1385579, 2024.
Artículo en Inglés | MEDLINE | ID: mdl-39148646

RESUMEN

The German Biosecurity Programme was launched in 2013 with the aim to support partner countries overcome biological threats including natural outbreaks or the intentional misuse of highly pathogenic agents. As part of this programme, this paper describes the development and implementation of a multilateral biosafety and biosecurity training initiative, called 'Global Partnership Initiated Biosecurity Academia for Controlling Health Threats' (GIBACHT). To achieve its objectives, GIBACHT implemented a blended-learning approach with self-directed, distance-based learning phases and three training-of-trainer workshops. The programme follows Kirkpatrick's model of learning to guarantee sustainable effects of improved knowledge and skills. One hundred nine fellows from 26 countries have been trained in seven cohorts. Many GIBACHT alumni have established additional biosafety/biosecurity trainings in their home countries. The knowledge exchange is strengthened by the implementation of a Moodle-based alumni network. GIBACHT has the potential to contribute to strengthening the capacities of partner countries in Africa, the Middle East, and South and Central Asia to respond and build resilience to biological threats.


Asunto(s)
Becas , Preparación para una Pandemia , Humanos , Creación de Capacidad , Becas/organización & administración , Alemania , Cooperación Internacional , Pandemias/prevención & control , Medidas de Seguridad
6.
Sci Eng Ethics ; 30(4): 37, 2024 Aug 09.
Artículo en Inglés | MEDLINE | ID: mdl-39120832

RESUMEN

I defend the claim that life-suspending technologies can constitute a catastrophic and existential security factor for risks structurally similar to those related to climate change. The gist of the argument is that, under certain conditions, life-suspending technologies such as cryonics can provide self-interested actors with incentives to efficiently tackle such risks-in particular, they provide reasons to overcome certain manifestations of generational egoism, a risk factor of several catastrophic and existential risks. Provided we have reasons to decrease catastrophic and existential risks such as climate change, we also have a (defeasible) reason for investing in developing and making life-suspending technologies (more) widespread.


Asunto(s)
Cambio Climático , Humanos , Tecnología , Riesgo , Existencialismo , Principios Morales , Medidas de Seguridad
7.
PLoS One ; 19(7): e0303524, 2024.
Artículo en Inglés | MEDLINE | ID: mdl-39008466

RESUMEN

Space security has emerged as a concern for the European Union (EU), given that space systems have become integral to ensuring the safety of all European society. This strategy reflects the interaction of geopolitical dynamics and the rising specter of hybrid threats. However, grappling with hybrid threats targeting the EU space presents distinct challenges, primarily owing to their elusive nature. Hence, our objective is to develop practical methodologies to identify and mitigate such threats effectively. To meet this objective, we propose an innovative 8-step process. This approach streamlines the systematic identification and analysis of discourses of hybrid threats within online platforms dedicated to EU space discussions. Our methodology underwent rigorous scrutiny, including a comprehensive literature review that prioritized peer-reviewed manuscripts from sources such as Web of Science and Elsevier Scopus. Additionally, we selected documents from Google Scholar to ensure comprehensive coverage of diverse scholarly contributions, enriching the depth of our analysis. Our research yielded a conceptual framework for Online Discourse Analysis (ODA) tailored to evaluate hybrid threats targeting EU space defense and security. The results highlight the importance of leveraging advanced ODA techniques to deepen our understanding of emerging threats. In conclusion, we advocate for the adoption of these innovative methods to enhance the robustness of EU space defense strategies in the face of evolving security scenarios. The establishment of the 8-step ODA framework marks a pivotal milestone, offering a structured approach to deciphering hybrid threats. Looking ahead, we aim to empirically validate this framework by creating and deploying custom-tailored software designed to identify potential hybrid threats jeopardizing the security of European space assets. Through continued research and practical implementation, we endeavor to fortify the EU's defenses against emerging threats in the space domain.


Asunto(s)
Unión Europea , Medidas de Seguridad , Humanos , Internet
8.
PLoS One ; 19(7): e0301908, 2024.
Artículo en Inglés | MEDLINE | ID: mdl-38990958

RESUMEN

Real-time security surveillance and identity matching using face detection and recognition are central research areas within computer vision. The classical facial detection techniques include Haar-like, MTCNN, AdaBoost, and others. These techniques employ template matching and geometric facial features for detecting faces, striving for a balance between detection time and accuracy. To address this issue, the current research presents an enhanced FaceNet network. The RetinaFace is employed to perform expeditious face detection and alignment. Subsequently, FaceNet, with an improved loss function is used to achieve face verification and recognition with high accuracy. The presented work involves a comparative evaluation of the proposed network framework against both traditional and deep learning techniques in terms of face detection and recognition performance. The experimental findings demonstrate that an enhanced FaceNet can successfully meet the real-time facial recognition requirements, and the accuracy of face recognition is 99.86% which fulfills the actual requirement. Consequently, the proposed solution holds significant potential for applications in face detection and recognition within the education sector for real-time security surveillance.


Asunto(s)
Aprendizaje Profundo , Humanos , Cara , Seguridad Computacional , Medidas de Seguridad , Reconocimiento Facial Automatizado/métodos , Reconocimiento Facial , Algoritmos
9.
Monash Bioeth Rev ; 42(1): 137-167, 2024 Jun.
Artículo en Inglés | MEDLINE | ID: mdl-39078602

RESUMEN

The COVID-19 pandemic has highlighted the importance of biosafety in the biomedical sciences. While it is often assumed that biosafety is a purely technical matter that has little to do with philosophy or the humanities, biosafety raises important ethical issues that have not been adequately examined in the scientific or bioethics literature. This article reviews some pivotal events in the history of biosafety and biosecurity and explores three different biosafety topics that generate significant ethical concerns, i.e., risk assessment, risk management, and risk distribution. The article also discusses the role of democratic governance in the oversight of biosafety and offers some suggestions for incorporating bioethics into biosafety practice, education, and policy.


Asunto(s)
Bioética , COVID-19 , SARS-CoV-2 , Humanos , COVID-19/prevención & control , Medición de Riesgo , Contención de Riesgos Biológicos/ética , Pandemias/ética , Gestión de Riesgos/ética , Discusiones Bioéticas , Medidas de Seguridad/ética
10.
Anaesthesiologie ; 73(8): 543-552, 2024 Aug.
Artículo en Alemán | MEDLINE | ID: mdl-39052084

RESUMEN

BACKGROUND: The risk of terrorist attacks in the Federal Republic of Germany is present and is currently increasing. Publicly funded acute care hospitals and their owners are involved in disaster control as part of their remit and are responsible for taking comprehensive precautions to ensure their operational capability in the event of disasters. This mandate must also be ensured in the event of terrorist attacks and amok incidents. For this purpose, an optimal cooperation between preclinical and clinical care is indispensable. AIM: Recommended actions for collaboration between nonclinical and clinical planning to manage a mass casualty incident in terrorist life-threatening response situations are presented. MATERIAL AND METHODS: The Inter-Hospital Security Conference Baden-Württemberg (IHSC BW) is an association of representatives of acute hospitals in Baden-Württemberg, the Ministry of the Interior, Digitalization and Migration Baden-Württemberg, the Ministry of Social Affairs and Integration Baden-Württemberg, the State Police Headquarters Baden-Württemberg and the Baden-Württemberg Hospital Association. From 2018 to 2020, the IHSC BW developed recommendations for action on cooperation between police, hospitals and non-police emergency response. The recommendations for action were agreed by the group members in 6 working sessions and initialled in two subsequent video conferences. A recommendation was considered adopted when the IHSC BW plenary assembly finally gave its approval with an absolute majority. RESULTS AND DISCUSSION: Competence-based interface solutions for a smooth cooperation between prehospital and hospital management in the care of patients who have become victims of a terrorist attack are to be demanded. For preliminary planning, the establishment of a local safety conference at the county disaster control authority level with the following participants is recommended: disaster control authority, fire department, regional police headquarters, chief emergency physician, rescue services and disaster control officers of affected clinics. It is recommended to set up a joint command and situation center (CSC), where management personnel from the police, rescue service, fire department and disaster control can meet to organize the handling of the incident jointly, competently and without loss of time. From this CSC, a liaison officer should then provide the clinics with information at regular intervals. Exercises should take place regularly. Cross-organizational exercises are particularly important, and this is one of the tasks of the local safety conference.


Asunto(s)
Planificación en Desastres , Policia , Medidas de Seguridad , Terrorismo , Humanos , Alemania , Planificación en Desastres/organización & administración , Hospitales/normas , Servicios Médicos de Urgencia/normas , Servicios Médicos de Urgencia/legislación & jurisprudencia
11.
J Law Med ; 31(2): 353-369, 2024 Jun.
Artículo en Inglés | MEDLINE | ID: mdl-38963250

RESUMEN

AI technologies can pose a major national security concern. AI programs could be used to develop chemical and biological agents which circumvent existing protective measures or medical treatments, or to design pathogens with capabilities they do not naturally possess (gain-of-function research). Although Australia has a strong legislative framework relating to research into genetically modified organisms, the framework requires the interaction of more than 10 different government departments, universities and funding agencies. Further, there are few guidelines about the responsible use of AI in biological research where existing laws and policies do not apply to research that is conducted "virtually", even where that research may have national security implications. This article explores these under-scrutinised concepts in Australia's biological security frameworks.


Asunto(s)
Inteligencia Artificial , Medidas de Seguridad , Biología Sintética , Biología Sintética/legislación & jurisprudencia , Australia , Humanos , Medidas de Seguridad/legislación & jurisprudencia , Inteligencia Artificial/legislación & jurisprudencia
12.
BMJ Mil Health ; 170(e1): e17-e19, 2024 Jul 19.
Artículo en Inglés | MEDLINE | ID: mdl-38844378

RESUMEN

Since the unanimous passing of United Nations Security Council Resolution 1325, which calls on member states to address gender inequality, many countries and the wider North Atlantic Treaty Organisation community have championed the Women Peace and Security agenda to empower women and reduce violence within fragile states. When women are empowered and actively involved in decision-making, there is less violence, and more peace and stability in that society, which benefits all members.Defence Medical Services are uniquely positioned to progress this agenda, particularly through its Defence Engagement activities. The UK's military medical community has more women in leadership than the wider military community. Our personnel can and should be used to model and empower military healthcare workers in partner nations. This paper forms part of a special issue of BMJ Military Health dedicated to Defence Engagement.


Asunto(s)
Personal Militar , Humanos , Femenino , Reino Unido , Personal Militar/estadística & datos numéricos , Medidas de Seguridad
14.
PLoS One ; 19(6): e0304467, 2024.
Artículo en Inglés | MEDLINE | ID: mdl-38905256

RESUMEN

The security crowd-testing regulatory mechanism is a vital means to promote collaborative vulnerability disclosure. However, existing regulatory mechanisms have not considered multi-agent responsibility boundaries and stakeholders' conflicts of interest, leading to their dysfunction. Distinguishing from previous research on the motivations and constraints of ethical hacks' vulnerability disclosure behaviors from a legal perspective, this paper constructs an evolutionary game model of SRCs, security researchers, and the government from a managerial perspective to propose regulatory mechanisms promoting tripartite collaborative vulnerability disclosure. The results show that the higher the initial willingness of the three parties to choose the collaborative strategy, the faster the system evolves into a stable state. Regarding the government's incentive mechanism, establishing reward and punishment mechanisms based on effective thresholds is essential. However, it is worth noting that the government has an incentive to adopt such mechanisms only if it receives sufficient regulatory benefits. To further facilitate collaborative disclosure, Security Response Centers (SRC) should establish incentive mechanisms including punishment and trust mechanisms. Additionally, publicity and training mechanisms for security researchers should be introduced to reduce their revenue from illegal participation, which promotes the healthy development of security crowd-testing. These findings contribute to improving SRCs' service quality, guiding security researchers' legal participation, enhancing the government's regulatory effectiveness, and ultimately establishing a multi-party collaborative vulnerability disclosure system.


Asunto(s)
Teoría del Juego , Humanos , Revelación , Conducta Cooperativa , Medidas de Seguridad , Castigo/psicología
15.
PLoS One ; 19(6): e0304482, 2024.
Artículo en Inglés | MEDLINE | ID: mdl-38900838

RESUMEN

This study explains how the gap between theory and empirical research hinders scientific progress in the area of international political economy. To demonstrate this point, I use Chen's Extended Dependence Theory, which challenges liberal peace theory but fails to provide supporting empirical evidence. Chen contends that it is not trade dependence between two states that fosters peace but a challenger's trade relations with the defense-pact partners of the target. Although Chen criticizes liberal peace proponents whose primary concern is how to deter war, his empirical analysis is confined to how to decrease (fatal) militarized disputes short of war. I argue that for his theory to succeed, it must be validated against the most severe and intense form of conflict. Using statistical tests and substantive significance, I uncover no peace-building effect, with regards to war, attributable to Extended Dependence. It appears that the Extended Dependence variable exhibits a ceiling effect. Future research should explain why economic ties and security institutions fail to work together to lower the risk of the most destructive form of conflict.


Asunto(s)
Comercio , Humanos , Medidas de Seguridad , Guerra , Política , Modelos Teóricos
17.
Prehosp Disaster Med ; 39(3): 233-235, 2024 06.
Artículo en Inglés | MEDLINE | ID: mdl-38757176

RESUMEN

This Editorial explores organizational travel risk management and advocates for a comprehensive approach to fortify health security for travelers, emphasizing proactive risk management, robust assessments, and strategic planning. Leveraging insights from very important persons (VIP) protocols, organizations can enhance duty of care and ensure personnel safety amidst global travel complexities.


Asunto(s)
Planificación en Desastres , Humanos , Planificación en Desastres/organización & administración , Medidas de Seguridad/organización & administración , Gestión de Riesgos/organización & administración , Medicina del Viajero/organización & administración , Viaje
18.
Workplace Health Saf ; 72(8): 327-336, 2024 Aug.
Artículo en Inglés | MEDLINE | ID: mdl-38813915

RESUMEN

Background: Occupational violence (OV) is a priority issue that significantly affects the safety of nurses, leading to staff burnout and poor retention issues. Security personnel are common in inpatient settings, yet there is limited research on their role, function, and impacts. The study aims to qualitatively evaluate a novel security role to reduce OV in inpatient settings. Methods: This qualitative study was conducted in a tertiary hospital in Brisbane, Queensland. A novel security role (Ambassador) was piloted in three inpatient wards over 6 months in 2020 to mitigate OV risk. Semi-structured in-depth interviews were conducted. All interviews were audio recorded. Interview transcripts were transcribed. Deductive analysis based on the Consolidated Framework for Implementation Research (CFIR) was used to identify the experiences and perceptions of the participants. Findings: 17 participants were interviewed. Five themes were identified including program characteristics, internal drivers, external drivers, individual experience, and implementation process. An Ambassador proactively engages with patients and visitors and employs behavioral strategies to de-escalate or redirect persons of concern. Participants considered Ambassadors to be important members of the health care team who supported the provision of patient and family-centered care. Successful implementation was said to require collaboration between clinical and security services and a small agile project team with authority and autonomy. Conclusion/Application to practice: This study provides many insights into the successful implementation of a novel security role in acute hospital settings. More research is needed on the effectiveness, appropriateness, feasibility, and cost of different security models.


Asunto(s)
Investigación Cualitativa , Violencia Laboral , Humanos , Violencia Laboral/prevención & control , Violencia Laboral/psicología , Queensland , Femenino , Masculino , Medidas de Seguridad , Adulto , Personal de Enfermería en Hospital/psicología , Pacientes Internos/psicología , Entrevistas como Asunto
19.
J Emerg Manag ; 22(2): 169-180, 2024.
Artículo en Inglés | MEDLINE | ID: mdl-38695713

RESUMEN

In a post-9/11 environment with an increased United States (US) federal government emphasis on active shooter preparedness, this study seeks to understand how higher educational institutions have adapted to this changing policy environment. Furthermore, between 2000 and 2017, there were 15 active shooter incidents at US higher education institutions. This study provides data on how public and private higher education campuses are preparing for this increased active shooter threat. Interviews were conducted with higher education employees familiar with campus security policies from 40 higher education institutions across 18 states in the US. These colleges/universities also represented a range of institution type: community colleges (5), public institutions (9), and private institutions (26). Interviews were conducted with 18 Chief/Director of Campus Safety/Security, 14 members of campus police or security, seven Chiefs of Police, and one staff member familiar with campus security policies.


Asunto(s)
Medidas de Seguridad , Universidades , Humanos , Estados Unidos , Armas de Fuego , Violencia con Armas/prevención & control , Entrevistas como Asunto , Heridas por Arma de Fuego , Planificación en Desastres/organización & administración
20.
Appl Ergon ; 119: 104312, 2024 Sep.
Artículo en Inglés | MEDLINE | ID: mdl-38735233

RESUMEN

The increased adoption of digital systems in the maritime domain has led to concerns about cyber resilience, especially in the wake of increasingly disruptive cyber-attacks. This has seen vessel operators increasingly adopt Maritime Security Operation Centers (M-SOCs), an action in line with one of the cyber resilience engineering techniques known as adaptive response, whose purpose is to optimize the ability to respond promptly to attacks. This research sought to investigate the domain-specific human factors that influence the adaptive response capabilities of M-SOC analysts to vessel cyber threats. Through collecting interview data and subsequent thematic analysis informed by grounded theory, cyber awareness of both crew onboard and vessel operators emerged as a pressing domain-specific challenge impacting M-SOC analysts' adaptive response. The key takeaway from this study is that vessel operators remain pivotal in supporting the M-SOC analysts' adaptive response processes through resource allocation towards operational technology (OT) monitoring and cyber personnel staffing onboard the vessels.


Asunto(s)
Seguridad Computacional , Navíos , Humanos , Seguridad Computacional/normas , Masculino , Adulto , Femenino , Ergonomía , Persona de Mediana Edad , Teoría Fundamentada , Investigación Cualitativa , Medidas de Seguridad
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA
...