1
|
Nganga A, Scanlan J, Lützhöft M, Mallam S. Enabling cyber resilient shipping through maritime security operation center adoption: A human factors perspective. APPLIED ERGONOMICS 2024; 119:104312. [PMID: 38735233 DOI: 10.1016/j.apergo.2024.104312] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/04/2023] [Revised: 05/02/2024] [Accepted: 05/07/2024] [Indexed: 05/14/2024]
Abstract
The increased adoption of digital systems in the maritime domain has led to concerns about cyber resilience, especially in the wake of increasingly disruptive cyber-attacks. This has seen vessel operators increasingly adopt Maritime Security Operation Centers (M-SOCs), an action in line with one of the cyber resilience engineering techniques known as adaptive response, whose purpose is to optimize the ability to respond promptly to attacks. This research sought to investigate the domain-specific human factors that influence the adaptive response capabilities of M-SOC analysts to vessel cyber threats. Through collecting interview data and subsequent thematic analysis informed by grounded theory, cyber awareness of both crew onboard and vessel operators emerged as a pressing domain-specific challenge impacting M-SOC analysts' adaptive response. The key takeaway from this study is that vessel operators remain pivotal in supporting the M-SOC analysts' adaptive response processes through resource allocation towards operational technology (OT) monitoring and cyber personnel staffing onboard the vessels.
Collapse
|
2
|
Swann L, Popovic V, Wiredja D. Visual inspection problem-solving strategies at different experience levels. APPLIED ERGONOMICS 2024; 118:104273. [PMID: 38518730 DOI: 10.1016/j.apergo.2024.104273] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/18/2023] [Revised: 03/12/2024] [Accepted: 03/17/2024] [Indexed: 03/24/2024]
Abstract
Airport security screening is a visual inspection task comprising search and decision. Problem solving is used to support decision making. However, it is not well understood. This study investigated how airport security screeners employ problem solving during x-ray screening, and how strategies change with experience. Thirty-nine professional security screeners were observed performing x-ray screening in the field at an Australian International Airport. Video and eye-tracking data were collected and analysed to explore activity phases and problem-solving strategies. Less-experienced screeners performed more problem solving and preferred problem-solving strategies that rely on visual examination without decision support or that defer decision making, compared to more-experienced screeners, who performed efficient and independent strategies. Findings also show that screeners need more time to develop problem-solving skills than visual scanning skills. Screeners would benefit from problem-solving support tools and intensified training and mentorship within the first six months of experience to advance problem-solving competencies.
Collapse
|
3
|
McCall C. Security concerns threaten Papua New Guinea relief efforts. Lancet 2024; 403:2471. [PMID: 38852590 DOI: 10.1016/s0140-6736(24)01181-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 06/11/2024]
|
4
|
Ouedraogo O, Siguré S, Sanou S, Kaboré A, Dahany MM, Diallo S. Landscape analysis of healthcare workforce and resilience actions in the Sahelian context of high security challenge areas: The case of Burkina Faso. Int J Health Plann Manage 2024; 39:933-944. [PMID: 38240163 DOI: 10.1002/hpm.3764] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/27/2023] [Revised: 12/08/2023] [Accepted: 12/28/2023] [Indexed: 05/06/2024] Open
Abstract
INTRODUCTION Access to health services is a major challenge in developing countries in general, particularly those affected by insecurity. The availability of sufficient quantity and quality of equitably distributed healthcare workforce is a major obstacle, yet it is an essential pillar of an effective and efficient national health system. Burkina Faso, similar to other countries in the Sahel, has been affected by an unprecedented security crisis that has severely tested the functionality of health facilities and the availability of healthcare workforce. OBJECTIVE To describe the landscape of healthcare workforce and to analyse the actions taken by the government and other stakeholders to improve the resilience of the system and the retention of healthcare workers in the context of major security challenges. METHODS This is a transversal, descriptive and analytical study carried out in Burkina Faso in 2023 through a documentary review, analyses of databases collected from health districts and regional directorates, focus groups and a national triangulation workshop with key informants. RESULTS The study shows that, with the closure and minimal functioning of certain health facilities in security-challenged areas, healthcare workforceare concentrated in the urban areas of regional and district capitals, to the detriment of rural areas. Some staff become in an irregular situation regarding the administration. To strengthen resilience to the crisis, the main solutions have been implemented: (i) enhancing the community platform with the recruitment of 15,000 community-based health volunteers, (ii) delegating tasks to community health agents, (iii) simplified approaches, (iv) advanced health posts and mobile clinics, (v) redeployment to the most stable structures, (vi) thinking about legislation in crisis situations. CONCLUSION Community resilience through the delegation of tasks to community-based health workers and strengthening of the community health platform has helped ensure the continuity of care in insecure areas. However, the optimization of innovative and attractive strategies will further improve the retention and return of healthcare workers in rural areas affected.
Collapse
|
5
|
Hunter P. Security challenges by AI-assisted protein design : The ability to design proteins in silico could pose a new threat for biosecurity and biosafety. EMBO Rep 2024; 25:2168-2171. [PMID: 38532127 PMCID: PMC11094011 DOI: 10.1038/s44319-024-00124-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/14/2024] [Accepted: 03/15/2024] [Indexed: 03/28/2024] Open
Abstract
Scientists and security experts are concerned that the increasing power of AI-assisted protein design and synthesis could be abused by various actors for terrorist or criminal purposes.
Collapse
|
6
|
Chan L, Hallett M, Zalewski CK, Brewer CC, Zampieri C, Hoa M, Lippa SM, Fitzgibbon E, French LM, Moses AD, van der Merwe AJ, Pierpaoli C, Turtzo LC, Yonter S, Shahim P. Clinical, Biomarker, and Research Tests Among US Government Personnel and Their Family Members Involved in Anomalous Health Incidents. JAMA 2024; 331:1109-1121. [PMID: 38497797 PMCID: PMC10949151 DOI: 10.1001/jama.2024.2413] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 09/01/2023] [Accepted: 02/13/2024] [Indexed: 03/19/2024]
Abstract
Importance Since 2015, US government and related personnel have reported dizziness, pain, visual problems, and cognitive dysfunction after experiencing intrusive sounds and head pressure. The US government has labeled these anomalous health incidents (AHIs). Objective To assess whether participants with AHIs differ significantly from US government control participants with respect to clinical, research, and biomarker assessments. Design, Setting, and Participants Exploratory study conducted between June 2018 and July 2022 at the National Institutes of Health Clinical Center, involving 86 US government staff and family members with AHIs from Cuba, Austria, China, and other locations as well as 30 US government control participants. Exposures AHIs. Main Outcomes and Measures Participants were assessed with extensive clinical, auditory, vestibular, balance, visual, neuropsychological, and blood biomarkers (glial fibrillary acidic protein and neurofilament light) testing. The patients were analyzed based on the risk characteristics of the AHI identifying concerning cases as well as geographic location. Results Eighty-six participants with AHIs (42 women and 44 men; mean [SD] age, 42.1 [9.1] years) and 30 vocationally matched government control participants (11 women and 19 men; mean [SD] age, 43.8 [10.1] years) were included in the analyses. Participants with AHIs were evaluated a median of 76 days (IQR, 30-537) from the most recent incident. In general, there were no significant differences between participants with AHIs and control participants in most tests of auditory, vestibular, cognitive, or visual function as well as levels of the blood biomarkers. Participants with AHIs had significantly increased fatigue, depression, posttraumatic stress, imbalance, and neurobehavioral symptoms compared with the control participants. There were no differences in these findings based on the risk characteristics of the incident or geographic location of the AHIs. Twenty-four patients (28%) with AHI presented with functional neurological disorders. Conclusions and Relevance In this exploratory study, there were no significant differences between individuals reporting AHIs and matched control participants with respect to most clinical, research, and biomarker measures, except for objective and self-reported measures of imbalance and symptoms of fatigue, posttraumatic stress, and depression. This study did not replicate the findings of previous studies, although differences in the populations included and the timing of assessments limit direct comparisons.
Collapse
|
7
|
Pierpaoli C, Nayak A, Hafiz R, Irfanoglu MO, Chen G, Taylor P, Hallett M, Hoa M, Pham D, Chou YY, Moses AD, van der Merwe AJ, Lippa SM, Brewer CC, Zalewski CK, Zampieri C, Turtzo LC, Shahim P, Chan L. Neuroimaging Findings in US Government Personnel and Their Family Members Involved in Anomalous Health Incidents. JAMA 2024; 331:1122-1134. [PMID: 38497822 PMCID: PMC10949155 DOI: 10.1001/jama.2024.2424] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 09/14/2023] [Accepted: 02/13/2024] [Indexed: 03/19/2024]
Abstract
Importance US government personnel stationed internationally have reported anomalous health incidents (AHIs), with some individuals experiencing persistent debilitating symptoms. Objective To assess the potential presence of magnetic resonance imaging (MRI)-detectable brain lesions in participants with AHIs, with respect to a well-matched control group. Design, Setting, and Participants This exploratory study was conducted at the National Institutes of Health (NIH) Clinical Center and the NIH MRI Research Facility between June 2018 and November 2022. Eighty-one participants with AHIs and 48 age- and sex-matched control participants, 29 of whom had similar employment as the AHI group, were assessed with clinical, volumetric, and functional MRI. A high-quality diffusion MRI scan and a second volumetric scan were also acquired during a different session. The structural MRI acquisition protocol was optimized to achieve high reproducibility. Forty-nine participants with AHIs had at least 1 additional imaging session approximately 6 to 12 months from the first visit. Exposure AHIs. Main Outcomes and Measures Group-level quantitative metrics obtained from multiple modalities: (1) volumetric measurement, voxel-wise and region of interest (ROI)-wise; (2) diffusion MRI-derived metrics, voxel-wise and ROI-wise; and (3) ROI-wise within-network resting-state functional connectivity using functional MRI. Exploratory data analyses used both standard, nonparametric tests and bayesian multilevel modeling. Results Among the 81 participants with AHIs, the mean (SD) age was 42 (9) years and 49% were female; among the 48 control participants, the mean (SD) age was 43 (11) years and 42% were female. Imaging scans were performed as early as 14 days after experiencing AHIs with a median delay period of 80 (IQR, 36-544) days. After adjustment for multiple comparisons, no significant differences between participants with AHIs and control participants were found for any MRI modality. At an unadjusted threshold (P < .05), compared with control participants, participants with AHIs had lower intranetwork connectivity in the salience networks, a larger corpus callosum, and diffusion MRI differences in the corpus callosum, superior longitudinal fasciculus, cingulum, inferior cerebellar peduncle, and amygdala. The structural MRI measurements were highly reproducible (median coefficient of variation <1% across all global volumetric ROIs and <1.5% for all white matter ROIs for diffusion metrics). Even individuals with large differences from control participants exhibited stable longitudinal results (typically, <±1% across visits), suggesting the absence of evolving lesions. The relationships between the imaging and clinical variables were weak (median Spearman ρ = 0.10). The study did not replicate the results of a previously published investigation of AHIs. Conclusions and Relevance In this exploratory neuroimaging study, there were no significant differences in imaging measures of brain structure or function between individuals reporting AHIs and matched control participants after adjustment for multiple comparisons.
Collapse
|
8
|
Relman DA. Neurological Illness and National Security: Lessons to Be Learned. JAMA 2024; 331:1093-1095. [PMID: 38497785 DOI: 10.1001/jama.2023.26818] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 03/19/2024]
|
9
|
Walter S, Schmutz JB, Grote G. A Safety Approach for Improving Security - Effective Coordination Strategies at the Airport Security Screening Checkpoint. HUMAN FACTORS 2024; 66:1302-1314. [PMID: 36059249 DOI: 10.1177/00187208221121411] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/15/2023]
Abstract
OBJECTIVE This study aimed to analyze effective teamwork at security checkpoints by investigating how security crews communicate in different (routine and threat) situations. BACKGROUND Working at an airport security screening checkpoint is challenging. Although tasks and processes are highly regulated and standardized due to legal requirements, security screeners must be trained to deal with unforeseen threat situations involving high levels of uncertainty. Therefore, security crews need to engage in flexible and adaptive coordination according to the situation and circumstances. METHOD We conducted a field study with 20 airport security screening crews comprising 100 security screeners. Teamwork in terms of interaction between crew members was measured, differentiating between proactive "push" communication and information on request representing "pull" communication. Furthermore, non-task related communication was assessed. RESULTS While crews showed non-task related communication more in routine situations, both task-related "push" and "pull" communication occurred more in threat situations. In terms of team performance, we could show significant positive effects of proactive "push" communication and non-task related interaction in threat situations. CONCLUSION Our results underscore the specific setting of airport security screening and the challenges that arise for teamwork. This study investigates professional screeners and passengers in the field. In contrast to other high-risk areas, security crews are confronted with a third party that complicates coordination strategies considered effective in previous studies. APPLICATION Our findings recommend situation-specific communication strategies for practical training for airport security screening crews.
Collapse
|
10
|
Hong JS, Kim DH, Peguero AA, Thornberg R, Naveed S. Sex and Racial/Ethnic Differences in School Security Measures, Bullying Victimization, and Perceived School Safety: Implications for Pediatric Health Care. J Pediatr Health Care 2024; 38:148-159. [PMID: 38429027 DOI: 10.1016/j.pedhc.2023.06.009] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 03/28/2023] [Revised: 06/27/2023] [Accepted: 06/29/2023] [Indexed: 03/03/2024]
Abstract
INTRODUCTION Using the 2017 National Crime Victimization Survey dataset, this study examined the association between the types of school security measures and students' bullying victimization and perceived school safety. METHOD Using logistic regression and ordinary least square regression analyses, the study addressed whether these associations vary by sex and race/ethnicity, as most research has treated sex and race/ethnicity as covariates. RESULTS The study found that none of the security measures were associated with bullying victimization among the total sample. However, there were sex and racial differences in the association between security measures and bullying victimization. There were also sex and racial/ethnic variations in the association between security measures and perceived school safety. DISCUSSION Scholars, health care practitioners, and policymakers must reflect and reconsider whether increasing school security and control would contribute to the safety and well-being of racial/ethnic minority students in school.
Collapse
|
11
|
Nowak K, Bear D, Dutta A, Traphagen M, Żmihorski M, Jaroszewicz B. Threats to conservation from national security interests. CONSERVATION BIOLOGY : THE JOURNAL OF THE SOCIETY FOR CONSERVATION BIOLOGY 2024; 38:e14193. [PMID: 37768190 DOI: 10.1111/cobi.14193] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/27/2023] [Revised: 09/17/2023] [Accepted: 09/18/2023] [Indexed: 09/29/2023]
Abstract
There is a growing trend of nation states invoking national security and emergency declarations to build state-sponsored infrastructure projects for border defense, energy production, and transportation. Established laws, regulations, and agreements for the protection of nature and cultural heritage within and between countries are becoming secondary to national security, compromising the function of protected areas, such as national parks, wilderness areas, and biosphere reserves that safeguard biodiversity, climate, and human health. We considered cases where decades-long multinational cross-border endangered species recovery programs have been jeopardized by waivers of environmental protection laws to facilitate rapid construction of border barriers that impede the movement and migration of animals, such as at the US-Mexico and Poland-Belarus borders. Renewable energy megaprojects, such as the Pinacate solar plant in Mexico, coupled with power transmission lines and road networks likewise cast a large footprint on the land and are being carried out with minimal to no environmental compliance under the guise of national security. National sovereignty likewise has been used as justification for bypassing laws to proceed with similar projects, such as Mexico's Dos Bocas refinery and Poland's Vistula Spit canal. Emphasis on security is also apparent in increasing military expenditure by the world's largest economies, which has created a mismatch with improvement in environmental policy stringency. Decisions to prioritize security can undermine democratic principles and environmental review protocols, trivialize humanity's dependence on functioning ecosystems, and contradict the United Nation's resolution on the human right to a healthy environment. Framing infrastructure projects as matters of national security also foments civil and political unrest by the labeling and casting of dissenters, including conservation scientists and environmental defenders, as antinational. World leaders must refrain from misusing extraordinary powers, adhere to laws and international agreements, and consult experts and local people before taking unilateral action on projects that affect ecological and human communities.
Collapse
|
12
|
Li S, Lv Y, Liu X, Li M. Detection of safety helmet and mask wearing using improved YOLOv5s. Sci Rep 2023; 13:21417. [PMID: 38049536 PMCID: PMC10696075 DOI: 10.1038/s41598-023-48943-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/19/2023] [Accepted: 12/01/2023] [Indexed: 12/06/2023] Open
Abstract
With the advancement of society, ensuring the safety of personnel involved in municipal construction projects, particularly in the context of pandemic control measures, has become a matter of utmost importance. This paper introduces a security measure for municipal engineering, combining deep learning with object detection technology. It proposes a lightweight artificial intelligence (AI) detection method capable of simultaneously identifying individuals wearing masks and safety helmets. The method primarily incorporates the ShuffleNetv2 feature extraction mechanism within the framework of the YOLOv5s network to reduce computational overhead. Additionally, it employs the ECA attention mechanism and optimized loss functions to generate feature maps with more comprehensive information, thereby enhancing the precision of target detection. Experimental results indicate that this algorithm improves the mean average precision (mAP) value by 4.3%. Furthermore, it reduces parameter and computational loads by 54.8% and 53.8%, respectively, effectively striking a balance between lightweight operation and precision. This study serves as a valuable reference for research pertaining to lightweight target detection in the realm of municipal construction safety measures.
Collapse
|
13
|
Searby A, James R, Snipe J, Maude P. Locked external doors on inpatient mental health units: A scoping review. Int J Ment Health Nurs 2023; 32:1544-1560. [PMID: 37409776 DOI: 10.1111/inm.13189] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 02/07/2023] [Revised: 06/13/2023] [Accepted: 06/20/2023] [Indexed: 07/07/2023]
Abstract
The principles of least restrictive care and recovery-focused practice are promoted as contemporary practice in the care of individuals with mental ill health, underpinning legislation concerning mental health and illness in many jurisdictions worldwide. Inpatient mental health units with locked doors are incompatible with this style of care and throwback to a time where care for mental illness was primarily custodial. The aim of this scoping review is to determine whether evidence exists for locking mental health unit doors, whether this practice is compatible with recovery-focused care and to determine whether door locking has changed since a review conducted by Van Der Merwe et al. (Journal of Psychiatric and Mental Health Nursing, 16, 2009, 293) found that door locking was not the preferred practice in the management of acute mental health units. We used Arksey and O'Malley's (International Journal of Social Research Methodology: Theory and Practice, 8, 2005, 19) framework for scoping reviews, with our initial search locating 1377 studies, with screening narrowing final papers for inclusion to 20. Methodologies for papers included 12 using quantitative methodology, 5 qualitative and 3 that used mixed methods designs. Poor evidence was found for door locking to mitigate risks such as absconding, aggression or illicit substance importation. Furthermore, locked doors had a detrimental impact on the therapeutic relationship, nurse job satisfaction and intention to leave the profession. This scoping review indicates that research is urgently needed to address a mental healthcare culture where door locking is an entrenched practice. Studies of alternative approaches to risk management are required to ensure inpatient mental health units are truly least-restrictive, therapeutic environments.
Collapse
|
14
|
Vandennieuwenhuysen E, Macq C, Breuls L, De Pau M. When the security measure meets bordered penality: Release procedures for persons who are not criminally responsible without residence rights in Belgium. INTERNATIONAL JOURNAL OF LAW AND PSYCHIATRY 2023; 91:101922. [PMID: 37690359 DOI: 10.1016/j.ijlp.2023.101922] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/23/2023] [Revised: 07/27/2023] [Accepted: 08/26/2023] [Indexed: 09/12/2023]
Abstract
Offenders considered to be persons not criminally responsible (hereafter Persons NCR) in Belgium, are subjected to a security measure. This is executed by means of a forensic care trajectory, often beginning in high-security prison units or forensic psychiatric facilities, and moving through medium and lower security psychiatric facilities, with the intention to ultimately integrate them back into society. Within this group there are 145 persons without residence rights. This article is attentive to how the forensic care trajectories for people without residence rights are currently navigated. Six qualitative interviews were conducted with key decision-makers in the forensic care trajectories of Persons NCR. Moreover, we analyse the legislative framework regarding the security measure and illustrate how features of 'bordered penality' are clearly present. Our results indicate that when working towards a return to the country of origin fails, Persons NCR without residence rights become neglected, either in high-security prison units or forensic facilities. We explore avenues to improve this precarious situation, and consider possibilities to guarantee mental healthcare according to a persons' security needs rather than their residence rights.
Collapse
|
15
|
Kosal M. How COVID-19 is reshaping U.S. national security policy. Politics Life Sci 2023; 43:83-98. [PMID: 38567781 DOI: 10.1017/pls.2023.13] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 04/05/2024]
Abstract
In the wake of the COVID-19 pandemic, the United States is actively reshaping parts of its national security enterprise. This article explores the underlying politics, with a specific interest in the context of biosecurity, biodefense, and bioterrorism strategy, programs, and response, as the United States responds to the most significant outbreak of an emerging infectious disease in over a century. How the implicit or tacit failure to recognize the political will and political decision-making connected to warfare and conflict for biological weapons programs in these trends is explored. Securitization of public health has been a focus of the literature over the past half century. This recent trend may represent something of an inverse: an attempt to treat national security interests as public health problems. A hypothesis is that the most significant underrecognized problem associated with COVID-19 is disinformation and the weakening of confidence in institutions, including governments, and how adversaries may exploit that blind spot.
Collapse
|
16
|
Hasenstab AN, Smith T. Pre-deployment security training in humanitarian aid: a commentary. Med Confl Surviv 2023; 39:172-179. [PMID: 36922024 DOI: 10.1080/13623699.2023.2188568] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/02/2023] [Accepted: 03/05/2023] [Indexed: 03/17/2023]
|
17
|
Roy P, Pal SC, Chakrabortty R, Chowdhuri I, Saha A, Shit M. Climate change and groundwater overdraft impacts on agricultural drought in India: Vulnerability assessment, food security measures and policy recommendation. THE SCIENCE OF THE TOTAL ENVIRONMENT 2022; 849:157850. [PMID: 35934024 DOI: 10.1016/j.scitotenv.2022.157850] [Citation(s) in RCA: 11] [Impact Index Per Article: 5.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/12/2022] [Revised: 08/01/2022] [Accepted: 08/01/2022] [Indexed: 06/15/2023]
Abstract
The problem of drought in India is a major issue in terms of various adverse impacts on livelihood of society. Drought Early Warning System (DEWS), a real-time drought-monitoring tool, has reported that over a fifth of India's geographical area (21.06 %) is suffering drought-like situations. This is 62 % larger than the drought-affected area during the same period last year, which was 7.86 %. Drought affects 21.06 %, with conditions ranging from unusually dry to extremely dry. While 1.63 % and 1.73 % of the area are experiencing 'extreme' or 'exceptional' dry conditions, 2.17 % is experiencing 'severe' dry conditions. Under 'moderate' dry circumstances, up to 8.15 % is possible. In this perspective groundwater vulnerability assessment in the overall country is needed for implementing the sustainable and long-term strategies for escaping from this type of hazardous situation. The main objective of this study is to estimate the drought vulnerability in changing climate which eventually influences the food security of India. The groundwater overdraft is one of the crucial elements in agricultural drought vulnerability. Various related parameters have been selected for estimating the drought vulnerability and its impact to food security in India. Here, MaxEnt (maximum entropy) and ANN (analytical neural network) has been considered in this perspective. The AUC values for the training datasets in the ANN and MaxEnt model are 0.891 and 0.921, respectively. The AUC values in ANN and MaxEnt model for the validation datasets are 0.876 and 0.904, respectively. Here MaxEnt model is most optimal than ANN considering predictive accuracy. From this study analysis it is established that western, south and middle portion of country is very much prone to drought vulnerability. So, special emphases in terms of the regional planning have to be taken into consideration for sustainable planning.
Collapse
|
18
|
Hoffman S. Privacy and Security - Protecting Patients' Health Information. N Engl J Med 2022; 387:1913-1916. [PMID: 36409487 DOI: 10.1056/nejmp2201676] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
19
|
Spießl H. [Hospital Security by Security Officers?]. PSYCHIATRISCHE PRAXIS 2022; 49:342-344. [PMID: 36198320 DOI: 10.1055/a-1875-0106] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/16/2023]
|
20
|
Viriyasaranon T, Chae SH, Choi JH. MFA-net: Object detection for complex X-ray cargo and baggage security imagery. PLoS One 2022; 17:e0272961. [PMID: 36048779 PMCID: PMC9436121 DOI: 10.1371/journal.pone.0272961] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/08/2022] [Accepted: 07/31/2022] [Indexed: 11/24/2022] Open
Abstract
Deep convolutional networks have been developed to detect prohibited items for automated inspection of X-ray screening systems in the transport security system. To our knowledge, the existing frameworks were developed to recognize threats using only baggage security X-ray scans. Therefore, the detection accuracy in other domains of security X-ray scans, such as cargo X-ray scans, cannot be ensured. We propose an object detection method for efficiently detecting contraband items in both cargo and baggage for X-ray security scans. The proposed network, MFA-net, consists of three plug-and-play modules, including the multiscale dilated convolutional module, fusion feature pyramid network, and auxiliary point detection head. First, the multiscale dilated convolutional module converts the standard convolution of the detector backbone to a conditional convolution by aggregating the features from multiple dilated convolutions using dynamic feature selection to overcome the object-scale variant issue. Second, the fusion feature pyramid network combines the proposed attention and fusion modules to enhance multiscale object recognition and alleviate the object and occlusion problem. Third, the auxiliary point detection head adopts an auxiliary head to predict the new keypoints of the bounding box to emphasize the localizability without requiring further ground-truth information. We tested the performance of the MFA-net on two large-scale X-ray security image datasets from different domains: a Security Inspection X-ray (SIXray) dataset in the baggage domain and our dataset, named CargoX, in the cargo domain. Moreover, MFA-net outperformed state-of-the-art object detectors in both domains. Thus, adopting the proposed modules can further increase the detection capability of the current object detectors on X-ray security images.
Collapse
|
21
|
Odusanya OO. Nigeria in the COVID era: Health system strengthening for national security and prosperity. Niger Postgrad Med J 2022; 29:192-197. [PMID: 35900454 DOI: 10.4103/npmj.npmj_106_22] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/15/2023]
Abstract
The coronavirus disease-19 pandemic has spread to all parts of the world. As of 20 May 2022, over 500 million confirmed cases have occurred with over 6 million deaths. In Nigeria, over 255,000 cases have occurred with more than 3000 deaths. The pandemic has adversely affected virtually all aspects of human endeavour, with a severe impact on the health system. The Nigerian health system was ill prepared for the pandemic, and this further weakened it. The impacts of the pandemic on the health system include disruption of health services, low motivation of the health workforce, unresponsive leadership and poor funding. The national response, though initially weak, was ramped up to expand capacity building, testing, public enlightenment, creation of isolation and treatment centres and research. The funding for the national response was from the government, private sector and multilateral donors. Nigeria must comprehensively strengthen its health system through motivating and building the capacity of its human resources for health, improved service delivery and provision of adequate funding, to be better prepared against future pandemics.
Collapse
|
22
|
Cuellar MJ, Fisher BW. Securing Schools? Examining the Longitudinal Relationships Between Student Behavior and Engagement With Security Measures in Urban School Systems. JOURNAL OF INTERPERSONAL VIOLENCE 2022; 37:5857-5886. [PMID: 35311408 DOI: 10.1177/08862605221079275] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
Abstract
The use of school security measures has increased over the last two decades. Yet prior research suggests school security measures have a deterrent effect on student misbehavior. Existing studies often focus on school-level comparisons in security as opposed to examining how students within a given school differ in their interaction with security measures (i.e., within-school differences). To address this gap in the literature, the current study estimates the association between individual students' engagement with security and multiple forms of maladaptive student behavior in school. In particular, this study is guided by two research questions: 1) What is the relationship between students' engagement with school security measures and their engagement in problem behaviors; and, 2) To what extent do the relationships between engagement with security and student behavior problems differ by student race and ethnicity? Longitudinal data were collected from students at two separate time points in one academic year (N=359) across eight schools in one urban school district. Using a series of models to examine how students' engagement with school security measures is related to their perpetration of student behavior, findings highlight negative associations between engagement with school security and non-serious violent and weapons-related crime. While the school security change score and students' engagement in problem behaviors was no different for Black students than it was for students who were non-Black or non-Hispanic, the negative association between engagement with security and behavior indicated a stronger deterrent effect for Hispanic students. Findings suggest that engagement with school security should be examined at the within-school level and with consideration that racial and ethnic differences might vary from student to student within any given school. Moreover, long-term programming goals should be established when developing process for securing schools with emphasis on how security measures might influence individual students differently within the school setting.
Collapse
|
23
|
Riz à Porta R, Sterchi Y, Schwaninger A. How Realistic Is Threat Image Projection for X-ray Baggage Screening? SENSORS 2022; 22:s22062220. [PMID: 35336391 PMCID: PMC8952858 DOI: 10.3390/s22062220] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/09/2021] [Revised: 02/21/2022] [Accepted: 03/03/2022] [Indexed: 01/27/2023]
Abstract
At airports, security officers (screeners) inspect X-ray images of passenger baggage in order to prevent threat items (bombs, guns, knives, etc.) from being brought onto an aircraft. Because threat items rarely occur, many airports use a threat-image-projection (TIP) system, which projects pre-recorded X-ray images of threat items onto some of the X-ray baggage images in order to improve the threat detection of screeners. TIP is regulatorily mandated in many countries and is also used to identify officers with insufficient threat-detection performance. However, TIP images sometimes look unrealistic because of artifacts and unrealistic scenarios, which could reduce the efficacy of TIP. Screeners rated a representative sample of TIP images regarding artifacts identified in a pre-study. We also evaluated whether specific image characteristics affect the occurrence rate of artifacts. 24% of the TIP images were rated to display artifacts and 26% to depict unrealistic scenarios, with 34% showing at least one of the two. With two-thirds of the TIP images having been perceived as realistic, we argue that TIP still serves its purpose, but artifacts and unrealistic scenarios should be reduced. Recommendations on how to improve the efficacy of TIP by considering image characteristics are provided.
Collapse
|
24
|
Bott R, Frantz B, Dietz JE. Active shooter mitigation techniques. JOURNAL OF EMERGENCY MANAGEMENT (WESTON, MASS.) 2022; 20:95-109. [PMID: 35451047 DOI: 10.5055/jem.0639] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
Abstract
This paper looks at current active shooter mitigation techniques employed by schools throughout the country in an attempt to mitigate casualties during an active shooter event. The researchers modified an existing Columbine High School agent-based model created by Jae Lee, MS, to examine if the introduction of a school resource officer (SRO), concealed carry weapon (CCW) holder, or both would change the outcome of the previous research. RUN.HIDE.FIGHT® scenarios were modeled with the same parameters of the previous work, but now included armed first responders during the incident to assess whether their presence decreased casualties through a reduction in response time. The researchers determined that the addition of either an SRO, CCW holder, or both significantly reduced casualty rates during an active shooter scenario.
Collapse
|
25
|
Komasová S. Airport security as translation through division and movement. SOCIAL STUDIES OF SCIENCE 2022; 52:35-52. [PMID: 34524039 DOI: 10.1177/03063127211037733] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
Based on an ethnographic research at Václav Havel Airport Prague, this article explores how contemporary airport security might by studied using an ANT-inspired approach. Security provision can be understood as a set of chains of translation that produces security and threat. Incoming actors, whose statuses are initially indeterminate, are translated into secure or threatening ones. This framing enables the uncovering of division and movement as the logics guide the system performance. The use of this perspective enables us to explicate the system's functioning in practice, including its inherent challenges and social consequences.
Collapse
|