Fire Safety and Security Threats Identification and Elimination

2014 ◽  
Vol 1001 ◽  
pp. 306-311
Author(s):  
Vladimír Mózer ◽  
Tomas Loveček ◽  
Andrej Vel'as ◽  
Linda Makovická

This paper deals with the topic of fire safety and security measures and their mutual interaction. A designer or stakeholder may be confronted with conflicting objectives regarding life safety and object security. Often, escape routes pass via areas that are under non-emergency conditions subject to access control, accessible only to members of staff, contractors, etc. When fire alarm is activated, it is necessary to provide fast and unhindered evacuation from the premises, which may involve using restricted-access back-of-house areas. On a case study – section of a shopping centre – the concepts of both fire safety and security are presented. Firstly, the areas are analysed in terms of their importance from life safety and property security points of view and subsequently solutions are proposed to address any issues. In certain cases a balance between safety and security requirements must be found, i.e. it is not possible to fully satisfy both objectives at the same time, whereas in other fire safety and security systems have been found mutually complementary.

2020 ◽  
Vol 2 (1) ◽  
pp. 1-16
Author(s):  
Jeffrey Kurebwa ◽  
Eunice Magumise

This study investigated the effectiveness of Zimbabwe's cyber security frameworks in combating terrorism. Media reports and scholarly evidence have constantly shown that cybercrime has led to loss of life, money, security, damage to property. There is a lot of concern among citizens of African countries such as Zimbabwe, Kenya, and Nigeria that their governments are not equipped with effective cyber security systems to combat these cyber threats. It is on the basis of these concerns that this study was carried out with the hope of helping to close policy and knowledge gaps affecting the effectiveness of the cyber security frameworks of Zimbabwe. The study used qualitative methodology and a case study research design was utilised. The study was conducted in Harare the capital city of Zimbabwe. Key informant interviews and documentary search were used to collect data. Among the findings of the study were that cyber fraud and theft are some of the significant cyber security threats in Zimbabwe; that Zimbabwe lacks established legislation and other regulatory institutions for cyber-security. Among the recommendations are; that the Ministry of Justice, Legal and Parliamentary Affairs enacts cyber security laws in Zimbabwe to combat cyber terrorism.


2021 ◽  
Vol 13 (19) ◽  
pp. 10693
Author(s):  
Young Dae Ko ◽  
Byung Duk Song

The meaning of sustainability is very broad and has many pillars such as the economy, environment and society. In the tourism industry, another important pillar is security. Tourism security affects the satisfaction and pleasure of tourists on a trivial level, and life and injuries on a significant level. Thus, unless security is guaranteed, tourists will not be able to fully enjoy the attractions and will not even consider the travel itself. Such tourist behavior has a significant impact on short-term and long-term tourism sustainability. Therefore, to enhance tourism security, many policies and frameworks have been suggested and announced in recent years. However, without efficient guidelines for the installation and operation of security devices, it may be hard to obtain actual effectiveness. To support real implementation of security systems in the tourism industry, this study quantitatively addresses the installation and operation issue of security devices in an optimal manner. A complementary cooperation of Closed-Circuit Television (CCTV) and Unmanned Aerial Vehicles (UAV) is suggested to efficiently monitor the key locations of tourism destinations and improve the security. Two mathematical models are developed to derive the optimal location of CCTVs, and the optimal operation schedule of UAVs over multiple time periods. Security requirements, service range, and budget are considered as realistic constraints. The validity of the models is demonstrated through a realistic case study of Nice, France.


2020 ◽  
Author(s):  
Dong-won Kim ◽  
Jin-young Choi ◽  
Keun-hee Han

Abstract Background: In this study, the effects of cybersecurity threats on telemedicine were investigated, and methods to evaluate security risks were considered. Many research institutes and investigation agencies have provided information about cybersecurity incidents in the medical field, between 2009 and 2019. Methods: The scenario information about cybersecurity threats was directly collected through a field survey. Potential threats that can occur in telemedicine services were accurately identified, and objective security requirements were derived by threat modeling using attack trees. The attack occurrence probability and attack success probability according to the importance of telemedicine service assets were included as variables. Results: The introduction of telemedicine guarantees accessibility to medical services for vulnerable areas. However, potential security threats and response measures in the telemedicine environment, which includes users and patients, remote medical devices, home networks, gateway devices, the Internet, and the telemedicine system, have not been considered thus far. Conclusion: This study contributes to the improvement of security by introducing methods to identify and evaluate security threats and preparing security measures for the telemedicine environment.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2010 ◽  
Vol 48 (1) ◽  
pp. 27-41 ◽  
Author(s):  
Kecklund Lena ◽  
Andrée Kristin ◽  
Bengtson Staffan ◽  
Willander Sara ◽  
Siré Elena

2012 ◽  
Vol 2 (1) ◽  
Author(s):  
Ritu Punhani ◽  
Alpana Kakkar ◽  
Deepak Jain

Information security has been a global issue and challenge from many years. Protection of vital information of the organization has always been a huge challenge for all as millions of intruders put continuous efforts to get access to this information. The information whether stored in physical form on papers or in electronic form in computers, is the most critical element of any successful business and its high values make it the focused target of intruders. Organizational data face threats from external as well as internal factors of the organizations and there is no surprise that organizations implement security measures for their data assets in their premises and networks. Companies spend huge efforts, time, and money on the security of their crucial data and make best possible efforts to keep their data confidential and private yet face losses at many places due to limitations of their security systems. This white paper highlights some most common practical shortcomings in the security systems of the companies.


2020 ◽  
Vol 5 ◽  
Author(s):  
Anass Rahouti ◽  
Ruggiero Lovreglio ◽  
Phil Jackson ◽  
Sélim Datoussaïd

Assessing the fire safety of buildings is fundamental to reduce the impact of this threat on their occupants. Such an assessment can be done by combining existing models and existing knowledge on how occupants behave during fires. Although many studies have been carried out for several types of built environment, only few of those investigate healthcare facilities and hospitals. In this study, we present a new behavioural data-set for hospital evacuations. The data was collected from the North Shore Hospital in Auckland (NZ) during an unannounced drill carried out in May 2017. This drill was recorded using CCTV and those videos are analysed to generate new evacuation model inputs for hospital scenarios. We collected pre-movement times, exit choices and total evacuation times for each evacuee. Moreover, we estimated pre-movement time distributions for both staff members and patients. Finally, we qualitatively investigated the evacuee actions of patients and staff members to study their interaction during the drill. The results show that participants were often independent from staff actions with a majority able to make their own decision.


Sign in / Sign up

Export Citation Format

Share Document