scholarly journals Problems of image recognition systems associated with the possibility of its use in terrorist attacks

2021 ◽  
Vol 4 (1) ◽  
pp. 41-49
Author(s):  
Vladislav Semenyuk ◽  
Ildar Kurmashev ◽  
Vadim Sarsenbaev

Abstract This article discusses systems for recognizing human faces, as well as systems for identifying flying objects. The paper deals with the main security issues related to the recognition of faces and images of objects. Today, automation systems that help to recognize an object, compare it with existing databases, can help prevent terrorist attacks, unauthorized penetrations, as well as the proliferation of biological and nuclear weapons. To date, the study of issues related to the possibility of using these systems is relevant and very much in demand.

Author(s):  
Nooreddine Iskandar ◽  
Tatiana Rahbany ◽  
Ali Shokor

Abstract Background: Due to the common instability caused by political and security issues, Lebanese hospitals have experienced acts of terrorism multiple times. The most recent Beirut Explosion even forced several hospitals to cease operations for the first time in decades—but studies show the preparedness levels for such attacks in similar countries are low. Objective: The aim of this study is to explore the experience of Lebanese hospitals with terrorist attacks. Methods: This qualitative study used semi-structured interviews with various stakeholders to assess their experience with terrorist bombings. Data was analyzed using the thematic analysis method. Results: The researchers found that Lebanese hospitals vary greatly in their structures and procedures. Those differences are a function of 3 contextual factors: location, culture, and accreditation status. Hospitals found near ‘dangerous zones’ were more likely to be aware and to have better response to such events. A severe lack of communication, unity of command, and collaboration between stakeholders has made the process fragmented. Conclusion: The researchers recommend a larger role for the Ministry of Public Health (MOPH) in this process, and the creation of a platform where Lebanese organizations can share their experiences to improve preparedness and resilience of the Lebanese healthcare system in the face of terrorism.


2007 ◽  
Vol 56 (5) ◽  
pp. 622-634 ◽  
Author(s):  
Shorin Kyo ◽  
Shin'ichiro Okazaki ◽  
Tamio Arai

Author(s):  
Joseph Heller

Kennedys presidency marked a new era, but not to the extent of fulfilling Israel’s goals. It stopped treating Jewish emigration to Israel as escalating the conflict with the Arabs, and took Israel’s security issues more seriously. That led to the American decision to supply Israel with the Hawk missiles, although Israel was disappointed because they were defensive missiles, while Egypt had already offensive weapons, such as bombers and missiles. However, US was trying hard to convince Egypt side with the west by launching a new initiative to solve the Arab refugee question. Israel knew the return of the refugees would be the equivalent of the annihilation of the state of Israel. Ben-Gurion met Kennedy but could not convince him that Israel should be treated as an ally. Kennedy did not promise the immediate supply of Hawk missiles, and warned Israel against developing nuclear weapons, which would damage American-Israeli relations, In view of Soviet–Arab alliance Israel was left with no choice but to build the Dimona nuclear facility, thus gaining a powerful bargaining card.


2014 ◽  
Vol 4 (3) ◽  
pp. 11-26
Author(s):  
John S. Hurley ◽  
H. Mark McGibbon ◽  
Roxanne Everetts

Many of the systems that control the critical infrastructure were not originally designed with security in mind. This has left us vulnerable to unwanted attacks in many of the environments. It has become essential that the authors determine if their infrastructures are better prepared for existing and future threats. In this study, the authors will examine the impact of attacks, including terrorist attacks on critical infrastructures, in particular, the Energy sector. The results show that in spite of the warnings of the threats carried out in various sectors and organizations around the world, they have still remain extremely vulnerable because of a number of critical security issues that hamper their ability to better serve and protect our vital information assets. The authors examine some of the most prominent models being used today and how they may be modified to better serve the needs of their user communities and key stakeholders.


2020 ◽  
Vol 6 ◽  
pp. 237802312096717
Author(s):  
Carsten Schwemmer ◽  
Carly Knight ◽  
Emily D. Bello-Pardo ◽  
Stan Oklobdzija ◽  
Martijn Schoonvelde ◽  
...  

Image recognition systems offer the promise to learn from images at scale without requiring expert knowledge. However, past research suggests that machine learning systems often produce biased output. In this article, we evaluate potential gender biases of commercial image recognition platforms using photographs of U.S. members of Congress and a large number of Twitter images posted by these politicians. Our crowdsourced validation shows that commercial image recognition systems can produce labels that are correct and biased at the same time as they selectively report a subset of many possible true labels. We find that images of women received three times more annotations related to physical appearance. Moreover, women in images are recognized at substantially lower rates in comparison with men. We discuss how encoded biases such as these affect the visibility of women, reinforce harmful gender stereotypes, and limit the validity of the insights that can be gathered from such data.


2015 ◽  
Vol 34 (4) ◽  
pp. 431-455 ◽  
Author(s):  
Robert Schub

Scholars have long recognized that imminent shifts in relative power may motivate declining states to initiate conflict. But what conditions exacerbate the risk posed by these anticipated power shifts? Building upon existing bargaining models of war, I show that larger initial power asymmetries increase the probability of preventive conflict. Theoretical extensions that account for certainty effects and variable costs of war, both of which are linked to initial dyadic power balances, drive this relationship. It follows that looming power transitions in which rising states approach and surpass parity, long considered war-prone scenarios, are not particularly problematic. Instead, the risk of conflict is greatest when preponderant powers confront conventionally weak but rising states. I test the theoretical predictions in the context of anticipated power shifts due to rivals pursuing nuclear weapons. Extensive empirical tests that relax assumptions employed in prior analyses of preventive conflict offer strong support for this contention. These results shed light on the underpinnings of many pressing contemporary interstate security issues.


Sign in / Sign up

Export Citation Format

Share Document