126
|
Frazar SL, Hund GE, Bonheyo GT, Diggans J, Bartholomew RA, Gehrig L, Greaves M. Defining the Synthetic Biology Supply Chain. Health Secur 2017; 15:392-400. [PMID: 28767286 DOI: 10.1089/hs.2016.0083] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/12/2022] Open
Abstract
Several recent articles have described risks posed by synthetic biology and spurred vigorous discussion in the scientific, commercial, and government communities about how to best detect, prevent, regulate, and respond to these risks. The Pacific Northwest National Laboratory's (PNNL) deep experience working with dual-use technologies for the nuclear industry has shown that analysis of supply chains can reveal security vulnerabilities and ways to mitigate security risk without hindering beneficial research and commerce. In this article, a team of experts in synthetic biology, data analytics, and national security describe the overall supply chain surrounding synthetic biology to illustrate new insights about the effectiveness of current regulations, the possible need for different screening approaches, and new technical solutions that could help identify or mitigate risks in the synthetic biology supply chain.
Collapse
|
127
|
Malish RG. The Importance of the Study of Cognitive Performance Enhancement for U.S. National Security. Aerosp Med Hum Perform 2017; 88:773-778. [PMID: 28720188 DOI: 10.3357/amhp.4795.2017] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
Abstract
INTRODUCTION The American military is embarking on the 'Third Offset'-a strategy designed to produce seismic shifts in the future of warfare. Central to the approach is the conjoining of humans, technology, and machines to deliver a decisive advantage on the battlefield. Because technology will spread rapidly and globally, tactical overmatch will occur when American operators possess a competitive edge in cognition. Investigation of cognitive enhancing therapeutics is not widely articulated as an adjunct to the Third Offset, yet failure to study promising agents could represent a strategic vulnerability. Because of its legacy of research into therapeutic agents to enhance human-machine interplay, the aerospace medical community represents a front-running candidate to perform this work. Notably, there are strong signals emanating from gambling, academic, and video-gaming enterprises that already-developed stimulants and other agents provide cognitive benefits. These agents should be studied not only for reasons of national security, but also because cognitive enhancement may be a necessary step in the evolution of humankind. To illustrate these points, this article will assert that: 1) the need to preserve and enhance physical and cognitive health will become more and more important over the next century; 2) aeromedical specialists are in a position to take the lead in the endeavor to enhance cognition; 3) signals of enhancement of the type useful to both military and medical efforts exist aplenty in today's society; and 4) the aeromedical community should approach human enhancement research deliberately but carefully.Malish RG. The importance of the study of cognitive performance enhancement for U.S. national security. Aerosp Med Hum Perform. 2017; 88(8):773-778.
Collapse
|
128
|
Singh SP, Swanson M. How issue frames shape beliefs about the importance of climate change policy across ideological and partisan groups. PLoS One 2017; 12:e0181401. [PMID: 28727842 PMCID: PMC5519075 DOI: 10.1371/journal.pone.0181401] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/24/2017] [Accepted: 07/02/2017] [Indexed: 11/29/2022] Open
Abstract
We use an experiment to examine whether the way in which climate change is framed affects individuals’ beliefs about its importance as a policy issue. We employ frames that emphasize national security, human rights, and environmental importance about the consequences of climate change. We find no evidence that issue frames have an overall effect on opinions about the importance of climate change policy. We do find some evidence that the effect of issue frames varies across ideological and partisan groups. Most notably, issue frames can lead Republicans and those on the political right to view climate change policy as less important. We conclude by discussing our findings relative to extant literature and considering the implications of our findings for those who seek to address the issue of climate change.
Collapse
|
129
|
Dyson MC, Carpenter CB, Colby LA. Institutional Oversight of Occupational Health and Safety for Research Programs Involving Biohazards. Comp Med 2017; 67:192-202. [PMID: 28662748 PMCID: PMC5482511] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/13/2016] [Revised: 11/29/2016] [Accepted: 02/05/2017] [Indexed: 06/07/2023]
Abstract
Research with hazardous biologic materials (biohazards) is essential to the progress of medicine and science. The field of microbiology has rapidly advanced over the years, partially due to the development of new scientific methods such as recombinant DNA technology, synthetic biology, viral vectors, and the use of genetically modified animals. This research poses a potential risk to personnel as well as the public and the environment. Institutions must have appropriate oversight and take appropriate steps to mitigate the risks of working with these biologic hazards. This article will review responsibilities for institutional oversight of occupational health and safety for research involving biologic hazards.
Collapse
|
130
|
Editorial. JOURNAL OF BUSINESS CONTINUITY & EMERGENCY PLANNING 2017; 10:296-297. [PMID: 28610641] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
|
131
|
Rimi NA, Sultana R, Muhsina M, Uddin B, Haider N, Nahar N, Zeidner N, Sturm-Ramirez K, Luby SP. Biosecurity Conditions in Small Commercial Chicken Farms, Bangladesh 2011-2012. ECOHEALTH 2017; 14:244-258. [PMID: 28289988 PMCID: PMC5942227 DOI: 10.1007/s10393-017-1224-2] [Citation(s) in RCA: 18] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/07/2016] [Revised: 01/09/2017] [Accepted: 01/22/2017] [Indexed: 05/25/2023]
Abstract
In Bangladesh, highly pathogenic avian influenza H5N1 is endemic in poultry. This study aimed to understand the biosecurity conditions and farmers' perception of avian influenza biosecurity in Bangladeshi small commercial chicken farms. During 2011-2012, we conducted observations, in-depth interviews and group discussions with poultry farmers in 16 farms and in-depth interviews with seven local feed vendors from two districts. None of the farms were completely segregated from people, backyard poultry, other animals, households, other poultry farms or large trees. Wild birds and rodents accessed the farms for poultry feed. Farmers usually did not allow the buyers to bring egg trays inside their sheds. Spraying disinfectant in the shed and removing feces were the only regular cleaning and disinfection activities observed. All farmers sold or used untreated feces as fish feed or fertilizer. Farmers were more concerned about Newcastle disease and infectious bursal disease than about avian influenza. Farmers' understanding about biosecurity and avian influenza was influenced by local vendors. While we seldom observed flock segregation, some farmers used measures that involved additional cost or effort to protect their flocks. These farmers could be motivated by interventions to protect their investment from diseases they consider harmful. Future interventions could explore the feasibility and effectiveness of low-cost alternative biosecurity measures.
Collapse
|
132
|
Yu RF, Yang LD, Wu X. Risk factors and visual fatigue of baggage X-ray security screeners: a structural equation modelling analysis. ERGONOMICS 2017; 60:680-691. [PMID: 27258596 DOI: 10.1080/00140139.2016.1192226] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
Abstract
This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue using structural equation modelling approach. Two hundred and five X-ray security screeners participated in a questionnaire survey. The result showed that satisfaction with the VDT's physical features and the work environment conditions were negatively correlated with the intensity of visual fatigue, whereas job stress and job burnout had direct positive influences. The path coefficient between the image quality of VDT and visual fatigue was not significant. The total effects of job burnout, job stress, the VDT's physical features and the work environment conditions on visual fatigue were 0.471, 0.469, -0.268 and -0.251 respectively. These findings indicated that both extrinsic factors relating to VDT and workplace environment and psychological factors including job burnout and job stress should be considered in the workplace design and work organisation of security screening tasks to reduce screeners' visual fatigue. Practitioner Summary: This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue. The findings were of great importance to the workplace design and the work organisation of security screening tasks to reduce screeners' visual fatigue.
Collapse
|
133
|
Darnell L. How to: Get Hacked, Get a Virus, Download Malware, Be Spammed and Have Your Identity Stolen. TODAY'S FDA : OFFICIAL MONTHLY JOURNAL OF THE FLORIDA DENTAL ASSOCIATION 2017; 29:15. [PMID: 30549532] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
|
134
|
Sperry BP, Allyse M, Sharp RR. Genetic Fingerprints and National Security. THE AMERICAN JOURNAL OF BIOETHICS : AJOB 2017; 17:1-3. [PMID: 28430071 DOI: 10.1080/15265161.2017.1316627] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
|
135
|
Hu C, Kumar S, Huang J, Ratnavelu K. Disinhibition of negative true self for identity reconstructions in cyberspace: Advancing self-discrepancy theory for virtual setting. PLoS One 2017; 12:e0175623. [PMID: 28399153 PMCID: PMC5388501 DOI: 10.1371/journal.pone.0175623] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/16/2016] [Accepted: 03/09/2017] [Indexed: 11/21/2022] Open
Abstract
In face-to-face communications, to avoid sanctions and disapproval from others, people are more likely to hide negative aspects of their true self (such as socially undesirable personalities, minds, beliefs and consciousness) to avoid conflict with social norms and laws. The anonymity of cyberspace provides people a unique environment to behave more freely and openly with less restraint from the real word. Existing research related to online true self expression has mainly explored true self as an independent aspect of self. Regarding true self as a two-dimensional concept, this study investigates true self from the perspective of individuals’ self-guide and identity reconstruction in both online and offline world. Using qualitative research methods, the current study investigates 57 participants through interviews and questionnaires. Content analysis reveals four factors that motivate people to express more true self (especially negative true self) when reconstructing their online identity and involve true self as a part of their self-guide in anonymous environment. By incorporating true self as an important part of individuals' self-guide and identity online, the current study advances self-discrepancy theory, making it more comprehensive for cyberspace. The results are also interpreted based on self-determination theory. The theoretical contributions of this study are discussed and practical implications are also presented.
Collapse
|
136
|
Adshead G, Pyszora N, Wilson C, Gopie R, Thomas D, Smith J, Glorney E, Moore E, Tapp J. Everything moves on: referral trends to a leavers' group in a high secure hospital and trial leave progress of group graduates. CRIMINAL BEHAVIOUR AND MENTAL HEALTH : CBMH 2017; 27:112-123. [PMID: 27104779 DOI: 10.1002/cbm.2000] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/08/2014] [Revised: 04/21/2015] [Accepted: 03/09/2016] [Indexed: 06/05/2023]
Abstract
BACKGROUND Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. AIMS The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. METHODS A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. RESULTS About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). CONCLUSIONS A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd.
Collapse
|
137
|
Johnson D. Certified Training for Nuclear and Radioactive Source Security Management. RADIATION PROTECTION DOSIMETRY 2017; 173:87-92. [PMID: 27885071 DOI: 10.1093/rpd/ncw313] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
Abstract
Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits.
Collapse
|
138
|
Iqbal U, Wang CH, Atique S, Kuo NW. Promoting Health Security: Potential, Role, and Future Directions of a Medical University. Health Secur 2017; 15:192-193. [PMID: 28418747 PMCID: PMC5404244 DOI: 10.1089/hs.2016.0112] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022] Open
|
139
|
|
140
|
Rubenstein L, Spiegel P. The revised US refugee ban, health, and security. Lancet 2017; 389:1189-1190. [PMID: 28291533 DOI: 10.1016/s0140-6736(17)30715-8] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 03/08/2017] [Accepted: 03/08/2017] [Indexed: 10/20/2022]
|
141
|
Alsaleh M, Alomar N, Alarifi A. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods. PLoS One 2017; 12:e0173284. [PMID: 28297719 PMCID: PMC5352308 DOI: 10.1371/journal.pone.0173284] [Citation(s) in RCA: 30] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/15/2016] [Accepted: 02/04/2017] [Indexed: 11/18/2022] Open
Abstract
Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.
Collapse
|
142
|
Chen CZK, Hsiao H. How to Make Railroad Crossings Safer and Smarter: Smart crossing systems are adopting the latest in CCTV surveillance and image processing technology to visually inspect boom gate conditions, identify trapped objects, and monitor objects' movements in real time. OCCUPATIONAL HEALTH & SAFETY (WACO, TEX.) 2017; 86:42-45. [PMID: 30211976] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
|
143
|
Taking a Stand Against Workplace Violence. Protecting employees and patients is a top priority. HEALTHCARE EXECUTIVE 2017; 32:76-79. [PMID: 29966059] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
|
144
|
Chung R. The securitization of health in the context of the war on terror. National security and global health: the conflict of imperatives. Med Confl Surviv 2017; 33:32-40. [PMID: 28565924 DOI: 10.1080/13623699.2017.1327150] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
Abstract
In this article, I want to show that the securitization of health issues in the name of national interests led to the militarization of health care in the context of the war against terrorism. However, the connection between health and security also gave way to the emergence of the notion of human security, thus, converging with the human right to health approach and the cosmopolitan discourse on global health. These two perspectives on the relation between health and security lead to conflicting imperatives in the current state of counter-terrorism operations. I argue that when the securitization of health concerns in the name of national security conflicts with the provision of health care in the name of universal human rights, the higher moral end must trump the prudential one. Moreover, it is a duty to promote the human right to health when liberal democracies in foreign policies directly violate this moral ideal in the name of national security.
Collapse
|
145
|
Palmer M. Antibiotic Stewardship is a National Security Priority. THE JOURNAL OF THE ARKANSAS MEDICAL SOCIETY 2017; 113:216-217. [PMID: 30383341] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
|
146
|
Bryce J, Foley E, Reeves J. SAFETY AND SECURITY IS EVERYONE'S BUSINESS. AUSTRALIAN NURSING & MIDWIFERY JOURNAL 2017; 24:16. [PMID: 29256579] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
Abstract
Workplace safety and security should be a given but as we all know this is not always the case.
Collapse
|
147
|
|
148
|
Van Till S. Five cloud-based physical security measures for healthcare organizations. JOURNAL OF HEALTHCARE PROTECTION MANAGEMENT : PUBLICATION OF THE INTERNATIONAL ASSOCIATION FOR HOSPITAL SECURITY 2017; 33:15-18. [PMID: 30351543] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
Abstract
New tools such as cloud-based access control have created new opportunities for chang- ing the way that electronic se- curity systems can interact, according to the author He describes how such software has made it easier and less costly for health systems to cope with change and how IT and physical security can work together in this critical area.
Collapse
|
149
|
Shay DF. The HIPAA Security Rule: Are You in Compliance? FAMILY PRACTICE MANAGEMENT 2017; 24:5-9. [PMID: 28291311] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
|
150
|
Morris RJ, Panek J. You can't sell a secret: ways to demonstrate value and influence. JOURNAL OF HEALTHCARE PROTECTION MANAGEMENT : PUBLICATION OF THE INTERNATIONAL ASSOCIATION FOR HOSPITAL SECURITY 2017; 33:118-124. [PMID: 30351557] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
Abstract
How does a security director demon- strate value and influence in an or- ganization? According to the authors, a security director's title or position in an organization's hierar- chy does not guarantee that he or she will demonstrate organizational value or influence. This can only happen as a result ofwhat the director does, how well it is done or in some cases what is not done that should have been done. In this article, they de- scribe some real life achievements ex- perienced at their organization to demonstrate security's value and influence.
Collapse
|