security policy

  • 文章类型: Journal Article
    萨赫勒地区持续的恐怖袭击要求通过使用人类DNA识别技术来加强安全系统。在这种情况下,在为最具侵入性的监视和特征分析形式之一建立坚实的标准和普遍保障措施时,必须考虑公众舆论。为此,我们在布基纳法索(位于萨赫勒地区的一个国家)收集了互联网用户对使用DNA技术支持刑事调查的意见。结果显示,470名参与者中有91.7%(431)认为该技术目前是布基纳法索刑事司法系统所必需的。然而,受访者对国家法医DNA数据库的保管和管理表示担忧.在这个特定的安全设置中,这项研究的公众意见可能为领导人和政治政策制定者提供考虑遗传指纹和实施国家法医DNA数据库的线索,以支持布基纳法索的刑事调查,同时也考虑伦理影响.
    Ongoing terrorist attacks in the Sahel region call for strengthening the security system by using human DNA identification technology. In this context, public opinion must be considered when establishing solid standards and universal safeguards for one of the most invasive forms of surveillance and profiling. For this purpose, we gathered internet users\' opinions in Burkina Faso (a country located in the Sahel region) on the use of DNA technology to support criminal investigations. The results revealed that 91.7% (431) of the 470 participants believed that this technology is currently necessary for the Burkina Faso\'s criminal justice system. However, the respondents expressed concerns about the custody and management of a national forensic DNA database. In this particular security setting, the public opinion of this study may provide leaders and political policymakers with clues for considering genetic fingerprints and implementing an national forensic DNA database to support criminal investigations in Burkina Faso whilst also considering the ethical implications.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    本文将语言语篇分析与角色理论相结合,为德国安全政策创建了角色理论语篇分析框架。为了说明这一点,我们对有关国际安全援助部队驻阿富汗特派团的议会辩论的30分钟进行了topos分析,由德国议员在2001年至2014年之间进行。我们根据与德国安全政策相关的关键行为规范来解释他们对德国角色的看法。议会的话语,由topoi塑造,为德国在海外的军事行动做出决定奠定了基础。topoi的使用受到主导思维模式的影响,特别是政治精英对德国在安全政策中的作用的看法。政治决策,反过来,反映在这些观点指导下的行为偏好。我们的研究揭示了德国安全政策的变化如何反映在话语中。本文围绕五类topoi进行,以使国外的军事行动合法化或合法化:必要性,义务,自我利益,能力和准备,和解决方案。通过角色理论的镜头对topoi的使用进行评估表明,随着时间的推移,对德国角色的看法已经演变。包括“平民权力”等角色,\"a\"正常状态,与外国军事接触同步的“议程设定角色”。
    This article combines linguistic discourse analysis with role theory to create a role-theoretic discourse analysis framework for German security policy. To illustrate this, we employ topos analysis on 30 plenary minutes of parliamentary debates regarding the International Security Assistance Force mission in Afghanistan, conducted by German Members of Parliament between 2001 and 2014. We interpret their perception of Germany\'s roles in light of key behavioral norms related to German security policy. The parliamentary discourse, shaped by topoi, sets the stage for decisions on German military operations abroad. The use of topoi is influenced by dominant thought patterns, particularly the perspective on Germany\'s role in security policy held by the political elite. Political decisions, in turn, reflect behavioral preferences guided by these viewpoints. Our research reveals how changes in German security policy are mirrored in the discourse. This discourse is structured around five categories of topoi for legitimizing or delegitimizing military operations abroad: necessity, obligation, self-interest, capability and preparedness, and solution. An evaluation of the use of topoi through the lens of role theory indicates that perceptions of Germany\'s role have evolved over time, encompassing roles such as a \"civilian power,\" a \"normal state,\" and an \"agenda-setting role\" in sync with its foreign military engagements.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    科学技术的发展改善了人类的健康和福祉,例如用更好的方法来检测和治疗疾病。然而,一些进展导致了大规模毁灭性武器的发展:化学和生物武器。虽然被国际条约禁止,近年来,化学武器被用于暗杀和叙利亚内战。此外,生物武器成为最近怀疑和指控的主题。虽然不限于这些领域,所谓的双重用途潜力-具有仁慈或恶意意图的应用方面的可能性-在生命科学中尤其明显。这里,我们展示了在会议系列中探索的一些领域SpiezCONVERGENCE,以促进科学之间的交流,军备控制和国际安全。一起,这些社区讨论了生命科学进步对《化学和生物武器公约》的潜在影响。通过数字技术实现,DNA测序和合成为(重新)构建病毒和细胞提供了工具箱,这在COVID-19大流行期间表现出无价,但有滥用风险,允许故意引发疫情。开放的数据库和算法可用于生成新的化学武器。我们认为,防止生命科学研究的意外后果,同时促进其与负责任的科学的好处,需要了解和反思参与研究过程的每个人的意外风险。禁止化学武器和生物武器的力度还取决于科学家与政策制定者互动,评估风险并实施减少风险的措施。
    Developments in science and technology improve health and wellbeing of humankind, for example with better methods to detect and treat diseases. However, some advances have led to the development of weapons of mass destruction: chemical and biological weapons. Although banned by international treaties, chemical weapons have been used in recent years in assassinations and the Syrian civil war. Additionally, biological weapons became the subject of recent suspicions and allegations. While not limited to these fields, the so-called dual-use potential-the possibility to apply aspects both with benevolent or malevolent intentions-is especially pronounced in the life sciences. Here, we showcase some areas explored at the conference series Spiez CONVERGENCE that facilitates an exchange between science, arms control and international security. Together, these communities discuss the potential impact of life scientific advances on the Chemical and Biological Weapons Conventions. Enabled by digital technologies, DNA sequencing and synthesis provide the toolbox to (re)construct viruses and cells, which demonstrated invaluable during the COVID-19 pandemic but bear the misuse risk to allow intentionally triggering an outbreak. Open databases and algorithms could be used to generate new chemical weapons. We argue that preventing unintended consequences of life science research while promoting its benefits with responsible science, requires awareness and reflection about unexpected risks of everyone involved in the research process. The strength of the ban of chemical and biological weapons also depends on scientists interacting with policy makers in evaluating risks and implementing measures to reduce them.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    COVID-19迫使全球许多学校和大学,包括沙特阿拉伯,从传统的面对面学习转向在线学习。大多数在线学习活动都涉及使用视频会议应用程序来促进同步学习会话。虽然一些教职员工不习惯使用视频会议应用程序,他们别无选择,只能不顾他们的准备而跳上船,其中之一涉及安全和隐私意识。另一方面,视频会议应用程序用户面临许多安全和隐私威胁和漏洞,其中许多依靠人为因素来利用。在这项研究中,我们使用了来自43所沙特阿拉伯大学的307名教职员工的调查数据,以确定沙特阿拉伯教职员工对视频会议应用程序的安全性和隐私设置的认知水平,并调查与之相关的因素.我们使用知识-态度-行为(KAB)模型和偏最小二乘结构方程建模(PLS-SEM)方法分析了数据。我们发现,视频会议应用程序的安全和隐私设置的平均意识得分属于“差”类别,这并不奇怪,考虑到许多教职员工只开始每天使用这项新技术,因为大流行。进一步的分析表明,感知的安全性,熟悉的应用程序,教师的数字素养与更高的意识显著相关。隐私问题与STEM教职员工的更高意识显着相关,而对ICT教学和研究的态度与具有10年以上经验的高级教师的这种意识呈负相关。本研究为未来视频会议应用的安全和隐私设置的研究和用户教育奠定了基础。
    COVID-19 has forced many schools and universities worldwide, including Saudi Arabia, to move from traditional face-to-face learning to online learning. Most online learning activities involve the use of video conferencing apps to facilitate synchronous learning sessions. While some faculty members were not accustomed to using video conferencing apps, they had no other choice than to jump on board regardless of their readiness, one of which involved security and privacy awareness. On the other hand, video conferencing apps users face a number of security and privacy threats and vulnerabilities, many of which rely on human factors to be exploited. In this study, we used survey data from 307 faculty members at 43 Saudi Arabian universities to determine the level of awareness among Saudi Arabian faculty regarding security and privacy settings of video conferencing apps and to investigate the factors associated with it. We analyzed the data using the Knowledge-Attitudes-Behaviors (KAB) model and the Partial Least Squares Structural Equation Modeling (PLS-SEM) method. We found that the average awareness score of video conferencing apps\' security and privacy settings falls into the \"Poor\" category, which is not surprising considering that many faculty members only started using this new technology on a daily basis because of the pandemic. Further analysis showed that perceived security, familiarity with the app, and digital literacy of faculty members are significantly associated with higher awareness. Privacy concerns are significantly associated with higher awareness only among STEM faculty members, while attitudes toward ICT for teaching and research are negatively associated with such awareness among senior faculty members with more than 10 years of experience. This study lays the foundation for future research and user education on the security and privacy settings of video conferencing applications.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    The \"Trojan Horse\" scandal laid bare an anxiety at the heart of the British security establishment; an anxiety that brings together questions of identity, values, and security within the demand to manage radicalization. It is an anxiety that, I will argue, reveals a novel conceptualization of threat that has driven the UK\'s security and communities policies within the \"war on terror.\" This conceptualization emerges within Prevent, the UK\'s counter-radicalization strategy. Yet, I argue, the extensive literature on Prevent has failed to adequately articulate this underlying, core logic. To date, the Prevent literature has effectively demonstrated the ways in which Muslim communities in the United Kingdom have been policed through British counter-radicalization policy. Yet, this analysis struggles to explain the expansion of Prevent into a wider range of \"extremist\" spaces. In this article, I contend that it is more useful to situate Prevent as a particular conception of power; a logic and an analysis of threat that demands new forms of government intervention. To do so, this article provides a genealogical reading of Prevent, locating it as a radical extension of state security ambitions to intervene early, making explicit a vision of security in which life as a process of becoming is produced as an object of management. The paper draws out the ramifications of this analysis to think through fundamental shifts in the principles and practices of contemporary security aspirations.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Sci-hub)

  • DOI:
    文章类型: Journal Article
    Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in early age. Diagnosis relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology, and ophthalmology. To support clinicians, researchers, and public health decision makers, we developed an information system dedicated to ASD, called TEDIS. It was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured internet connections. TEDIS will be deployed in nine ASD expert assessment centers in Ile-DeFrance district. We present security policy and infrastructure developed in context of TEDIS to protect patient privacy and clinical information. TEDIS security policy was organized around governance, ethical and organisational chart-agreement, patients consents, controlled user access, patients\' privacy protection, constrained patients\' data access. Security infrastructure was enriched by further technical solutions to reinforce ASD patients\' privacy protection. Solutions were tested on local secured intranet environment and showed fluid functionality with consistent, transparent and safe encrypting-decrypting results.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    BACKGROUND: With the goal of realizing genome-based personalized healthcare, we have developed a biobank that integrates personal health, genome, and omics data along with biospecimens donated by volunteers of 150,000. Such a large-scale of data integration involves obvious risks of privacy violation. The research use of personal genome and health information is a topic of global discussion with regard to the protection of privacy while promoting scientific advancement. The present paper reports on our plans, current attempts, and accomplishments in addressing security problems involved in data sharing to ensure donor privacy while promoting scientific advancement.
    METHODS: Biospecimens and data have been collected in prospective cohort studies with the comprehensive agreement. The sample size of 150,000 participants was required for multiple researches including genome-wide screening of gene by environment interactions, haplotype phasing, and parametric linkage analysis.
    RESULTS: We established the T ohoku M edical M egabank (TMM) data sharing policy: a privacy protection rule that requires physical, personnel, and technological safeguards against privacy violation regarding the use and sharing of data. The proposed policy refers to that of NCBI and that of the Sanger Institute. The proposed policy classifies shared data according to the strength of re-identification risks. Local committees organized by TMM evaluate re-identification risk and assign a security category to a dataset. Every dataset is stored in an assigned segment of a supercomputer in accordance with its security category. A security manager should be designated to handle all security problems at individual data use locations. The proposed policy requires closed networks and IP-VPN remote connections.
    CONCLUSIONS: The mission of the biobank is to distribute biological resources most productively. This mission motivated us to collect biospecimens and health data and simultaneously analyze genome/omics data in-house. The biobank also has the mission of improving the quality and quantity of the contents of the biobank. This motivated us to request users to share the results of their research as feedback to the biobank. The TMM data sharing policy has tackled every security problem originating with the missions. We believe our current implementation to be the best way to protect privacy in data sharing.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • DOI:
    文章类型: Journal Article
    Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in their early age. The diagnosis of ASD relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology and ophthalmology. In order to support clinicians, researchers and public health decision makers, we designed an information system dedicated to ASD, called TEDIS. TEDIS was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured Internet connections. In this paper, we present the security policy and security infrastructure we developed to protect ASD\' patients\' clinical data and patients\' privacy. We tested our system on 359 ASD patient records in a local secured intranet environment and showed that the security system is functional, with a consistent, transparent and safe encrypting-decrypting behavior. It is ready for deployment in the nine ASD expert assessment centers in the Ile de France district.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    We address the problem of bootstrapping security and privacy policies for newly-deployed apps in wireless body area networks (WBAN) composed of smartphones, sensors and other wearable devices. We introduce a framework to model such a WBAN as an undirected graph whose vertices correspond to devices, apps and app resources, while edges model structural relationships among them. This graph is then augmented with attributes capturing the features of each entity together with user-defined tags. We then adapt available graph-based similarity metrics to find the closest app to a new one to be deployed, with the aim of reusing, and possibly adapting, its security policy. We illustrate our approach through a detailed smartphone ecosystem case study. Our results suggest that the scheme can provide users with a reasonably good policy that is consistent with the user\'s security preferences implicitly captured by policies already in place.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Sci-hub)

  • 文章类型: Journal Article
    In 2013, the first gun printed out of plastic by a 3D-printer was successfully fired in the U.S. This event caused a major media hype about the dangers of being able to print a gun. Law enforcement agencies worldwide were concerned about this development and the potentially huge security implications of these functional plastic guns. As a result, politicians called for a ban of these weapons and a control of 3D-printing technology. This paper reviews the security implications of 3D-printing technology and 3D guns. It argues that current arms control and transfer policies are adequate to cover 3D-printed guns as well. However, while this analysis may hold up currently, progress in printing technology needs to be monitored to deal with future dangers pre-emptively.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

公众号