5,367 research outputs found
Effectiveness of anonymised information sharing and use in health service, police, and local government partnership for preventing violence related injury: experimental study and time series analysis
Objective: To evaluate the effectiveness of anonymised information sharing to prevent injury related to violence. Design: Experimental study and time series analysis of a prototype community partnership between the health service, police, and local government partners designed to prevent violence. Setting: Cardiff, Wales, and 14 comparison cities designated "most similar" by the Home Office in England and Wales. Intervention After a 33 month development period, anonymised data relevant to violence prevention (precise violence location, time, days, and weapons) from patients attending emergency departments in Cardiff and reporting injury from violence were shared over 51 months with police and local authority partners and used to target resources for violence prevention. Main outcome measures: Health service records of hospital admissions related to violence and police records of woundings and less serious assaults in Cardiff and other cities after adjustment for potential confounders. Results: Information sharing and use were associated with a substantial and significant reduction in hospital admissions related to violence. In the intervention city (Cardiff) rates fell from seven to five a month per 100 000 population compared with an increase from five to eight in comparison cities (adjusted incidence rate ratio 0.58, 95% confidence interval 0.49 to 0.69). Average rate of woundings recorded by the police changed from 54 to 82 a month per 100 000 population in Cardiff compared with an increase from 54 to 114 in comparison cities (adjusted incidence rate ratio 0.68, 0.61 to 0.75). There was a significant increase in less serious assaults recorded by the police, from 15 to 20 a month per 100 000 population in Cardiff compared with a decrease from 42 to 33 in comparison cities (adjusted incidence rate ratio 1.38, 1.13 to 1.70). Conclusion: An information sharing partnership between health services, police, and local government in Cardiff, Wales, altered policing and other strategies to prevent violence based on information collected from patients treated in emergency departments after injury sustained in violence. This intervention led to a significant reduction in violent injury and was associated with an increase in police recording of minor assaults in Cardiff compared with similar cities in England and Wales where this intervention was not implemented
Variability and polarization in the inner jet of 3C395
We present new results on the parsec-scale jet of the quasar 3C395, derived
from VLBI polarization sensitive observations made in 1995.91 and 1998.50 at
8.4, 15.4 and 22.2 GHz. The observations show a complex one-sided jet extending
up to 20 mas, with a projected magnetic field essentially aligned with the
radio jet. The emission is strongly dominated, in total intensity and
polarization, by the core and the inner jet region (of ~3 mas length). We have
studied the details of this dominant region finding clear structural variations
during this ~2.5 years period, in contrast with the apparent quietness of the
jet structure inferred from lower resolution VLBI observations. We observe the
ejection of a new component from the core and variations in the degree of
polarization of the inner jet components. We estimate a high Faraday Rotation
Measure close to the core, with a strong decrease along the inner jet.Comment: 7 pages, 4 figures, A&A in pres
Bactericidal action of positive and negative ions in air
In recent years there has been renewed interest in the use of air ionisers to control of the spread of airborne infection. One characteristic of air ions which has been widely reported is their apparent biocidal action. However, whilst the body of evidence suggests a biocidal effect in the presence of air ions the physical and biological mechanisms involved remain unclear. In particular, it is not clear which of several possible mechanisms of electrical origin (i.e. the action of the ions, the production of ozone, or the action of the electric field) are responsible for cell death. A study was therefore undertaken to clarify this issue and to determine the physical mechanisms associated with microbial cell death.
In the study seven bacterial species (Staphylococcus aureus, Mycobacterium parafortuitum, Pseudomonas aeruginosa, Acinetobacter baumanii, Burkholderia cenocepacia, Bacillus subtilis and Serratia marcescens) were exposed to both positive and negative ions in the presence of air. In order to distinguish between effects arising from: (i) the action of the air ions; (ii) the action of the electric field, and (iii) the action of ozone, two interventions were made. The first intervention involved placing a thin mica sheet between the ionisation source and the bacteria, directly over the agar plates. This intervention, while leaving the electric field unaltered, prevented the air ions from reaching the microbial samples. In addition, the mica plate prevented ozone produced from reaching the bacteria. The second intervention involved placing an earthed wire mesh directly above the agar plates. This prevented both the electric field and the air ions from impacting on the bacteria, while allowing any ozone present to reach the agar plate. With the exception of Mycobacterium parafortuitum, the principal cause of cell death amongst the bacteria studied was exposure to ozone, with electroporation playing a secondary role. However in the case of Mycobacterium parafortuitum, electroporation resulting from exposure to the electric field appears to have been the principal cause of cell inactivation.
The results of the study suggest that the bactericidal action attributed to negative air ions by previous researchers may have been overestimated
Recommended from our members
Telecommunication Network Security
YesOur global age is practically defined by the ubiquity of the Internet; the worldwide interconnection of
cyber networks that facilitates accessibility to virtually all ICT and other elements of critical
infrastructural facilities, with a click of a button. This is regardless of the user’s location and state of
equilibrium; whether static or mobile. However, such interconnectivity is not without security
consequences.
A telecommunication system is indeed a communication system with the distinguishing key
word, the Greek tele-, which means "at a distance," to imply that the source and sink of the system
are at some distance apart. Its purpose is to transfer information from some source to a distant user;
the key concepts being information, transmission and distance. These would require a means, each,
to send, convey and receive the information with safety and some degree of fidelity that is
acceptable to both the source and the sink.
Chapter K begins with an effort to conceptualise the telecommunication network security
environment, using relevant ITU-T2* recommendations and terminologies for secure telecommunications.
The chapter is primarily concerned with the security aspect of computer-mediated
telecommunications. Telecommunications should not be seen as an isolated phenomenon; it is a critical
resource for the functioning of cross-industrial businesses in connection with IT. Hence, just as
information, data or a computer/local computer-based network must have appropriate level of security,
so also a telecommunication network must have equivalent security measures; these may often be the
same as or similar to those for other ICT resources, e.g., password management.
In view of the forgoing, the chapter provides a brief coverage of the subject matter by first assessing
the context of security and the threat-scape. This is followed by an assessment of telecommunication
network security requirements; identification of threats to the systems, the conceivable counter or
mitigating measures and their implementation techniques. These bring into focus various
cryptographic/crypt analytical concepts, vis a vis social engineering/socio-crypt analytical techniques and
password management.
The chapter noted that the human factor is the most critical factor in the security system for at least
three possible reasons; it is the weakest link, the only factor that exercises initiatives, as well as the factor
that transcends all the other elements of the entire system. This underscores the significance of social
2*International Telecommunications Union - Telecommunication Standardisation Sector
12
engineering in every facet of security arrangement. It is also noted that password security could be
enhanced, if a balance is struck between having enough rules to maintain good security and not having
too many rules that would compel users to take evasive actions which would, in turn, compromise
security. The chapter is of the view that network security is inversely proportional to its complexity. In
addition to the traditional authentication techniques, the chapter gives a reasonable attention to locationbased
authentication. The chapter concludes that security solutions have a technological component, but
security is fundamentally a people problem. This is because a security system is only as strong as its
weakest link, while the weakest link of any security system is the human infrastructure.
A projection for the future of telecommunication network security postulates that, network security
would continue to get worse unless there is a change in the prevailing practice of externality or vicarious
liability in the computer/security industry; where consumers of security products, as opposed to
producers, bear the cost of security ineffectiveness. It is suggested that all transmission devices be made
GPS-compliant, with inherent capabilities for location-based mutual authentication. This could enhance
the future of telecommunication security.Petroleum Technology Development Fun
Resolving the Password Security Purgatory in the Contexts of Technology, Security and Human Factors
YesPasswords are the most popular and constitute the
first line of defence in computer-based security systems; despite
the existence of more attack-resistant authentication schemes. In
order to enhance password security, it is imperative to strike a
balance between having enough rules to maintain good security
and not having too many rules that would compel users to take
evasive actions which would, in turn, compromise security. It is
noted that the human factor is the most critical element in the
security system for at least three possible reasons; it is the
weakest link, the only factor that exercises initiatives, as well as
the factor that transcends all the other elements of the entire
system. This illustrates the significance of social engineering in
security designs, and the fact that security is indeed a function of
both technology and human factors; bearing in mind the fact
that there can be no technical hacking in vacuum. This paper
examines the current divergence among security engineers as
regards the rules governing best practices in the use of
passwords: should they be written down or memorized; changed
frequently or remain permanent? It also attempts to elucidate
the facts surrounding some of the myths associated with
computer security. This paper posits that destitution of requisite
balance between the factors of technology and factors of
humanity is responsible for the purgatory posture of password
security related problems. It is thus recommended that, in the
handling of password security issues, human factors should be
given priority over technological factors. The paper proposes
the use of the (k, n)-Threshold Scheme, such as the Shamir’s
secret-sharing scheme, to enhance the security of the password
repository. This presupposes an inclination towards writing
down the password: after all, Diamond, Platinum, Gold and
Silver are not memorised; they are stored.Petroleum Technology Development Fun
A Versatile and Ubiquitous Secret Sharing: A cloud data repository secure access
NoThe Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret sharing scheme, designed to extend the human trust security perimeter. The system could be adapted to serve as a cloud data repository and secure data communication scheme. A secret sharing scheme is a method by which a dealer distributes shares of a secret data to trustees, such that only authorised subsets of the trustees can reconstruct the secret. This paper gives a brief summary of the layout and functions of a 15-page secure server-based website prototype; the main focus of a PhD research effort titled ‘Cryptography and Computer Communications Security: Extending the Human Security Perimeter through a Web of Trust’. The prototype, which has been successfully tested, has globalised the distribution and reconstruction processes.Petroleum Technology Development Fun
Recommended from our members
Multi-Service Group Key Establishment for Secure Wireless Mobile Multicast Networks
yesRecently there is high demand in distributing multimedia services over the internet to ubiquitous and computational intelligent mobile subscribers by the service providers (SPs). In this instance, provision of those services must be restricted to authorized subscribers via integration of authentication and group key management (GKM). GKM with diverse group services subscribed dynamically by moving subscribers in wireless networks has been omitted in conventional approaches. However it is expected that significant key management overhead will arise in them due to multi-services co-existing in the same network. In this paper, we propose a scalable decentralized multi-service GKM scheme considering host mobility in wireless environment. In the scheme, authentication of mobile subscribers and key management phases are delegated from the trusted domain key distributor (DKD) to the subgroup controllers known as area key distributors (AKD). The trusted intermediate AKDs can then establish and distribute the service group keys to valid subscribers in a distributed manner using identity-based encryption without involving the domain key distributor (DKD). This alleviates unnecessary delays and possible bottlenecks at the DKD. We show by simulation that the proposed scheme has some unique scalability properties over known schemes in terms of optimized rekeying communication and storage overheads. The security performance studies have shown resilience to various attacks
Multi-Service Group Key Management for High Speed Wireless Mobile Multicast Networks
YesRecently there is a high demand from the Internet Service Providers to transmit multimedia services over high speed wireless networks. These networks are characterized by high mobility receivers which perform frequent handoffs across homogenous and heterogeneous access networks while maintaining seamless connectivity to the multimedia services. In order to ensure secure delivery of multimedia services to legitimate group members, the conventional cluster based group key management (GKM) schemes for securing group communication over wireless mobile multicast networks have been proposed. However, they lack efficiency in rekeying the group key in the presence of high mobility users which concurrently subscribe to multiple multicast services that co-exist in the same network. This paper proposes an efficient multi-service group key management scheme (SMGKM) suitable for high mobility users which perform frequent handoffs while participating seamlessly in multiple multicast services. The users are expected to drop subscriptions after multiple cluster visits hence inducing huge key management overhead due to rekeying the previously visited cluster keys. The already proposed multi-service SMGKM system with completely decentralised authentication and key management functions is adopted to meet the demands for high mobility environment with the same level of security. Through comparisons with existing GKM schemes and simulations, SMGKM shows resource economy in terms of reduced communication and less storage overheads in a high speed environment with multiple visits
Towards an autonomous host-based intrusion detection system for android mobile devices
In the 5G era, mobile devices are expected to play a pivotal role in our daily life. They will provide a wide range of appealing features to enable users to access a rich set of high quality personalized services. However, at the same time, mobile devices (e.g., smartphones) will be one of the most attractive targets for future attackers in the upcoming 5G communications systems. Therefore, security mechanisms such as mobile Intrusion Detection Systems (IDSs) are essential to protect mobile devices from a plethora of known and unknown security breaches and to ensure user privacy. However, despite the fact that a lot of research effort has been placed on IDSs for mobile devices during the last decade, autonomous host-based IDS solutions for 5G mobile devices are still required to protect them in a more efficient and effective manner. Towards this direction, we propose an autonomous host-based IDS for Android mobile devices applying Machine Learning (ML) methods to inspect different features representing how the device’s resources (e.g., CPU, memory, etc.) are being used. The simulation results demonstrate a promising detection accuracy of above 85%, reaching up to 99.99%
- …