5,367 research outputs found

    Effectiveness of anonymised information sharing and use in health service, police, and local government partnership for preventing violence related injury: experimental study and time series analysis

    Get PDF
    Objective: To evaluate the effectiveness of anonymised information sharing to prevent injury related to violence. Design: Experimental study and time series analysis of a prototype community partnership between the health service, police, and local government partners designed to prevent violence. Setting: Cardiff, Wales, and 14 comparison cities designated "most similar" by the Home Office in England and Wales. Intervention After a 33 month development period, anonymised data relevant to violence prevention (precise violence location, time, days, and weapons) from patients attending emergency departments in Cardiff and reporting injury from violence were shared over 51 months with police and local authority partners and used to target resources for violence prevention. Main outcome measures: Health service records of hospital admissions related to violence and police records of woundings and less serious assaults in Cardiff and other cities after adjustment for potential confounders. Results: Information sharing and use were associated with a substantial and significant reduction in hospital admissions related to violence. In the intervention city (Cardiff) rates fell from seven to five a month per 100 000 population compared with an increase from five to eight in comparison cities (adjusted incidence rate ratio 0.58, 95% confidence interval 0.49 to 0.69). Average rate of woundings recorded by the police changed from 54 to 82 a month per 100 000 population in Cardiff compared with an increase from 54 to 114 in comparison cities (adjusted incidence rate ratio 0.68, 0.61 to 0.75). There was a significant increase in less serious assaults recorded by the police, from 15 to 20 a month per 100 000 population in Cardiff compared with a decrease from 42 to 33 in comparison cities (adjusted incidence rate ratio 1.38, 1.13 to 1.70). Conclusion: An information sharing partnership between health services, police, and local government in Cardiff, Wales, altered policing and other strategies to prevent violence based on information collected from patients treated in emergency departments after injury sustained in violence. This intervention led to a significant reduction in violent injury and was associated with an increase in police recording of minor assaults in Cardiff compared with similar cities in England and Wales where this intervention was not implemented

    Variability and polarization in the inner jet of 3C395

    Get PDF
    We present new results on the parsec-scale jet of the quasar 3C395, derived from VLBI polarization sensitive observations made in 1995.91 and 1998.50 at 8.4, 15.4 and 22.2 GHz. The observations show a complex one-sided jet extending up to 20 mas, with a projected magnetic field essentially aligned with the radio jet. The emission is strongly dominated, in total intensity and polarization, by the core and the inner jet region (of ~3 mas length). We have studied the details of this dominant region finding clear structural variations during this ~2.5 years period, in contrast with the apparent quietness of the jet structure inferred from lower resolution VLBI observations. We observe the ejection of a new component from the core and variations in the degree of polarization of the inner jet components. We estimate a high Faraday Rotation Measure close to the core, with a strong decrease along the inner jet.Comment: 7 pages, 4 figures, A&A in pres

    Bactericidal action of positive and negative ions in air

    Get PDF
    In recent years there has been renewed interest in the use of air ionisers to control of the spread of airborne infection. One characteristic of air ions which has been widely reported is their apparent biocidal action. However, whilst the body of evidence suggests a biocidal effect in the presence of air ions the physical and biological mechanisms involved remain unclear. In particular, it is not clear which of several possible mechanisms of electrical origin (i.e. the action of the ions, the production of ozone, or the action of the electric field) are responsible for cell death. A study was therefore undertaken to clarify this issue and to determine the physical mechanisms associated with microbial cell death. In the study seven bacterial species (Staphylococcus aureus, Mycobacterium parafortuitum, Pseudomonas aeruginosa, Acinetobacter baumanii, Burkholderia cenocepacia, Bacillus subtilis and Serratia marcescens) were exposed to both positive and negative ions in the presence of air. In order to distinguish between effects arising from: (i) the action of the air ions; (ii) the action of the electric field, and (iii) the action of ozone, two interventions were made. The first intervention involved placing a thin mica sheet between the ionisation source and the bacteria, directly over the agar plates. This intervention, while leaving the electric field unaltered, prevented the air ions from reaching the microbial samples. In addition, the mica plate prevented ozone produced from reaching the bacteria. The second intervention involved placing an earthed wire mesh directly above the agar plates. This prevented both the electric field and the air ions from impacting on the bacteria, while allowing any ozone present to reach the agar plate. With the exception of Mycobacterium parafortuitum, the principal cause of cell death amongst the bacteria studied was exposure to ozone, with electroporation playing a secondary role. However in the case of Mycobacterium parafortuitum, electroporation resulting from exposure to the electric field appears to have been the principal cause of cell inactivation. The results of the study suggest that the bactericidal action attributed to negative air ions by previous researchers may have been overestimated

    Resolving the Password Security Purgatory in the Contexts of Technology, Security and Human Factors

    Get PDF
    YesPasswords are the most popular and constitute the first line of defence in computer-based security systems; despite the existence of more attack-resistant authentication schemes. In order to enhance password security, it is imperative to strike a balance between having enough rules to maintain good security and not having too many rules that would compel users to take evasive actions which would, in turn, compromise security. It is noted that the human factor is the most critical element in the security system for at least three possible reasons; it is the weakest link, the only factor that exercises initiatives, as well as the factor that transcends all the other elements of the entire system. This illustrates the significance of social engineering in security designs, and the fact that security is indeed a function of both technology and human factors; bearing in mind the fact that there can be no technical hacking in vacuum. This paper examines the current divergence among security engineers as regards the rules governing best practices in the use of passwords: should they be written down or memorized; changed frequently or remain permanent? It also attempts to elucidate the facts surrounding some of the myths associated with computer security. This paper posits that destitution of requisite balance between the factors of technology and factors of humanity is responsible for the purgatory posture of password security related problems. It is thus recommended that, in the handling of password security issues, human factors should be given priority over technological factors. The paper proposes the use of the (k, n)-Threshold Scheme, such as the Shamir’s secret-sharing scheme, to enhance the security of the password repository. This presupposes an inclination towards writing down the password: after all, Diamond, Platinum, Gold and Silver are not memorised; they are stored.Petroleum Technology Development Fun

    A Versatile and Ubiquitous Secret Sharing: A cloud data repository secure access

    Get PDF
    NoThe Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret sharing scheme, designed to extend the human trust security perimeter. The system could be adapted to serve as a cloud data repository and secure data communication scheme. A secret sharing scheme is a method by which a dealer distributes shares of a secret data to trustees, such that only authorised subsets of the trustees can reconstruct the secret. This paper gives a brief summary of the layout and functions of a 15-page secure server-based website prototype; the main focus of a PhD research effort titled ‘Cryptography and Computer Communications Security: Extending the Human Security Perimeter through a Web of Trust’. The prototype, which has been successfully tested, has globalised the distribution and reconstruction processes.Petroleum Technology Development Fun

    Multi-Service Group Key Management for High Speed Wireless Mobile Multicast Networks

    Get PDF
    YesRecently there is a high demand from the Internet Service Providers to transmit multimedia services over high speed wireless networks. These networks are characterized by high mobility receivers which perform frequent handoffs across homogenous and heterogeneous access networks while maintaining seamless connectivity to the multimedia services. In order to ensure secure delivery of multimedia services to legitimate group members, the conventional cluster based group key management (GKM) schemes for securing group communication over wireless mobile multicast networks have been proposed. However, they lack efficiency in rekeying the group key in the presence of high mobility users which concurrently subscribe to multiple multicast services that co-exist in the same network. This paper proposes an efficient multi-service group key management scheme (SMGKM) suitable for high mobility users which perform frequent handoffs while participating seamlessly in multiple multicast services. The users are expected to drop subscriptions after multiple cluster visits hence inducing huge key management overhead due to rekeying the previously visited cluster keys. The already proposed multi-service SMGKM system with completely decentralised authentication and key management functions is adopted to meet the demands for high mobility environment with the same level of security. Through comparisons with existing GKM schemes and simulations, SMGKM shows resource economy in terms of reduced communication and less storage overheads in a high speed environment with multiple visits

    Towards an autonomous host-based intrusion detection system for android mobile devices

    Get PDF
    In the 5G era, mobile devices are expected to play a pivotal role in our daily life. They will provide a wide range of appealing features to enable users to access a rich set of high quality personalized services. However, at the same time, mobile devices (e.g., smartphones) will be one of the most attractive targets for future attackers in the upcoming 5G communications systems. Therefore, security mechanisms such as mobile Intrusion Detection Systems (IDSs) are essential to protect mobile devices from a plethora of known and unknown security breaches and to ensure user privacy. However, despite the fact that a lot of research effort has been placed on IDSs for mobile devices during the last decade, autonomous host-based IDS solutions for 5G mobile devices are still required to protect them in a more efficient and effective manner. Towards this direction, we propose an autonomous host-based IDS for Android mobile devices applying Machine Learning (ML) methods to inspect different features representing how the device’s resources (e.g., CPU, memory, etc.) are being used. The simulation results demonstrate a promising detection accuracy of above 85%, reaching up to 99.99%
    • …
    corecore