security agent
Recently Published Documents


TOTAL DOCUMENTS

41
(FIVE YEARS 15)

H-INDEX

5
(FIVE YEARS 3)

2021 ◽  
Vol 19 (3) ◽  
pp. 317-337
Author(s):  
Alana Saulnier ◽  
Diane Sivasubramaniam

The use of surveillance technologies by legal authorities has intensified in recent years. As new data collection technologies expand into law enforcement spaces previously dominated by interpersonal interactions, questions emerge about whether the public will evaluate interpersonal and technologically mediated interactions with legal authorities in the same ways. In an analysis guided by procedural justice theory, we examine whether and how legal authorities’ use of decision-making technology affects public evaluations of an authority-subordinate interaction and its outcome in the context of airport border crossings. Using an experimental vignette design (N = 278), we varied whether an encounter between a traveller and border security “agent” that produced a secondary search was described as interpersonal (conducted by a human agent) or technologically mediated (conducted by a machine agent). We also varied the traveller’s group membership relative to the nation-state, describing the traveller as either born in the country in question and a member of the nation’s most common racial group (in-group) or not born in the country and a racial minority (out-group). Both encounter type and group membership independently affected perceptions of the interaction (procedural justice judgements) and its outcome (distributive justice judgments). Technologically mediated encounters improved perceptions of procedural and distributive justice. Further, procedural justice judgments mediated the relationship between encounter type and distributive justice, demonstrating how perceptions of interactions influence perceptions of the outcomes of those interactions. Out-group members were evaluated as having worse experiences across all measures. The findings underscore the importance of extending tests of procedural justice theory beyond interpersonal interactions to technologically mediated interactions.


2021 ◽  
Vol 13 ◽  
pp. 1148-1153
Author(s):  
Andréia Maciel Campelo ◽  
Marleth Pereira Ferreira ◽  
Valéria Cristina Berrêdo ◽  
Débora Aparecida Santos ◽  
Michele Salles Da Silva ◽  
...  

Objetivo: analisar as condições de saúde física e mental dos agentes de segurança de uma penitenciária no Município de Rondonópolis-MT relacionadas as atividades laborais. Métodos: trata-se de um estudo descritivo de natureza quantitativa realizado em uma penitenciária do Estado do Mato Grosso. Os dados foram coletados nos meses de maio e junho do ano de 2017, por meio de um questionário com perguntas fechadas. A análise dos dados utilizou a estatística com o uso de tabelas. Resultados: neste estudo, obteve-se a participação de 43 informantes, com idade entre 35 a 40 anos. A análise dos dados demonstrou que esses profissionais consideram que as condições insalubres do trabalho cooperam para mudanças físicas, psicológicas e comportamentais, além de proporcionar estresse para esta categoria. Conclusão: os resultados evidenciam que as condições laborais impostas aos trabalhadores pesquisados influenciam no processo saúde-doença, podendo resultar em doenças físicas, mentais e problemas sociais.


Author(s):  
Ore Koren ◽  
Bumba Mukherjee

Abstract Do governments make a strategic choice in deciding what type of security agent to use for repression? Research acknowledges the role of auxiliary groups such as militias in repression, yet surprisingly little attention is given to the state's formal domestic security agents, such as the police. We show that formal security organizations and auxiliary groups enhance the government's ability to repress by acting as strategic complements. As the better-regulated force, formal agents are often employed against violent riots, when regimes worry more about the ability to control the agents and their behavior more than about being visibly linked to the violence. In contrast, auxiliaries are often used to repress nonviolent campaigns, when the government seeks to benefit from agency loss in order not to be associated with the violence, which can be costly in these contexts. We empirically verify these linkages on country-month data for Africa using panel vector-autoregression (pVAR), which accounts for endogeneity, not only between the dependent and independent variables, but also the dependent variables. We complement these statistical results with case-based evidence and descriptive original data from non-African countries.


2020 ◽  
Author(s):  
Anthony Ikechukwu Ezeogamba

This paper sees the security of life as the essence of all security agents in the light of Acts 23:10. This is studied in the context of security agents in Nigeria. Life guarantees growth, success, productivity and development in all its ramifications. Security gives assurance that something highly valuable like life will not be taken away. Any idea that such will happen introduces uneasiness, fearfulness, retardation in development, self-doubt, lack of freedom and vulnerability of all will always be imagined. In the context of Acts 23:10, the government agent and the security agents are highly proactive which means taking the initiative to protect rather than acting afterlife has been extinguished, hence, Paul's life was secured. The spate of kidnappings, killings and maiming going on in Nigeria today have in so many instances introduce hopelessness and fearfulness in the minds of all and sundry. This is to the extent that some people no longer visit their rural villages. These reveal that security agents are not proactive but react to events. This work aims at showing that a security agent has no other business except to save life first and every other discussion will follow after that. To unpack the ideas in Acts 23:10, the author used hermeneutics and textual critical method of exegesis. The work recommends, among other things, that security agents should be made to understand the value of human life, hence a living person can answer any charge, unlike a dead one. Significantly, this work will be relevant to the Nigerian Government and her security agents and indeed all Nigerians.


Author(s):  
Apostolos P. Fournaris ◽  
Charalambos Dimopoulos ◽  
Konstantinos Lampropoulos ◽  
Odysseas Koufopavlou

Critical Infrastructures and associated real time Informational systems need some security protection mechanisms that will be able to detect and respond to possible attacks. For this reason, Anomaly Detection Systems (ADS), as part of a Security Information and Event Management (SIEM) system, are needed for constantly monitoring and identifying potential threats inside an Information Technology (IT) System. Typically, ADS collect information from various sources within a CI system using security sensors or agents and correlate those information so as to identify anomaly events. Such sensors though in a CI setting (factories, power plants, remote locations) may be placed in open areas and left unattended thus becoming targets themselves of security attacks. They can be tampering and malicious manipulated so that they provide false data that may lead an ADS or SIEM system to falsely comprehend the CI current security status. In this paper, we describe existing approaches on security monitoring in critical infrastructures and focus on how to collect security sensor - agent information in a secure and trusted way. We then introduce the concept of hardware assisted security sensor information collection that improve the level if trust (by hardware means) and also increase the responsiveness of the sensor. Thus, we propose a Hardware Security Token (HST) that when connected to a CI Host, it acts as a secure anchor for security agent information collection. We describe the HST functionality, its association with a host device, its expected role and its log monitoring mechanism. We also provide information on how security can be established between the Host device and the HST.Then, we introduce and describe the necessary Host components that need to be established in order to guarantee a high security level and correct HST functionality. We, also provide a realization-implementation of the HST overall concept in a FPGA SoC evaluation board and describe how the HST implementation can controlled. Finally, we provide indicative use case scenarios of how the HST can be used in practice to provide a variety of different security services beyond acting as a secure ADS sensor.


Author(s):  
R. Pyrozhyshyn

The author of the article investigates the merits and remuneration of employees of the regional and city depatments of the NKGB-MSS in the Ternopil region in the 1945-1948 on the basis of a considerable circle of historical sources and monographs. The author identifies the main type of remuneration for NKGB-MSS employees - gratitude announcement. The author of the article indicates the main type of remuneration for NKGB-MSS employees - the announcement of gratitude, and the main merit was the successful participation in the chekist-military operation. It was considered successful if it resulted in the killing or detention of a person or a group of people involved in a particular case. Often during such operations, various trophies were taken, such as assault rifles, guns, pistols, machine guns, grenades and ammunition. However, internal documentation of the OUN or UPA was of the greatest operational value, since the documents served as the basis for the development of new operational cases. The author notes that NKGB-MSS security officers, their families, and agents received compensation. To substantiate this thesis, the author provides two examples. After the death of a security official, the family of the deceased received a lump sum compensation of 3,000 rubles. A security agent received 2,000 rubles for the reconstruction of the house and manor buildings because during the chekist-military operation, the rebels hid in her house and set it on fire, and not only the house but also the manor buildings. The author allocates arms and money as a reward to separate unit. The author emphasizes the receipt of the prize weapon for two reasons: firstly, as a rare event, and secondly, as irresponsible act of the state security officers, since the TT combat weapon was presented to a minor schoolboy who had joined the military unit. The author of the article emphasizes that most of the cash prize was received only by fighters of fighter battalions, recruited agents and cadets of militant squadron. They earned cash prizes for successfully conducted chekist-military operations.The author of the article also notes the amount of cash prizes was from 250 to 500 rubles. The amount of remuneration often varied depending on the rank and significance of each individual operation.


This document describes the design and development of a low-cost security system to detect unauthorized access of people in an office, using Arduino microcontroller technology. It used a passive infrared sensor (PIR) to detect movements of people, a Wi-Fi interface to send security alerts to the cloud platform and a GSM modem, in the same way, to send the detected security events to the frame of Cloud. The latter will be used if it is not possible to establish a link to the cloud platform, via the Wi-Fi interface. In addition, the security system sends an SMS (Short Message Service) directly to the security agent's mobile every time a security event is detected. A dual communication interface is used to guarantee the sending of alerts to the cloud platform and, on the other hand, to ensure the delivery of notifications of the alerts detected to the security agent, through the channels: Notify my device (NMD), email, Twitter and SMS. As a result, it has been obtained that the fastest interface to send the detected security alerts to the cloud platform is Wi-Fi and the channel with less time to notify the security agent is NMD. Therefore, this proposed security system represents an ideal solution for security problems, both level domestic and commercial, since it has characteristics of being pervasive, that is, it can be used anywhere and agnostic in so far as of the wireless interface Communication.


Sign in / Sign up

Export Citation Format

Share Document