Bringing about change: the introduction of secure units. (17/166)

The introduction of regional secure units into the NHS was studied as one example of the diffusion of patient care innovations. As well as the general history of secure units events in four Regions were studied in detail for the period from 1974 up to mid-1983. It is concluded that secure units became gradually more acceptable over time as (i) the need for such units was recognized, (ii) the climate of opinion changed in psychiatric hospitals from seeing secure units as a retrograde step, following the acceptance of more open door policies, to seeing secure units as a prestige development which might safeguard the future of a particular hospital, (iii) government loosened the definitions of what secure units should be and how they should operate so that there was more room for different regions to assess their own needs. Regions which were able to move relatively fast on secure unit development were those where there was already a 'product champion' present to promote the ideas, usually a forensic psychiatrist, and where there was also managerial support and designated responsibility for secure unit development at local and regional level. It is concluded that while public reaction was a hindrance it did not slow down secure unit development as much as might have been expected.  (+info)

Effect of urban closed circuit television on assault injury and violence detection. (18/166)

OBJECTIVE: To evaluate the effect of closed circuit television (CCTV) surveillance on levels of assault injury and violence detection. DESIGN: Intervention versus control study design. SETTING: Five town/cities with CCTV surveillance and five, matched control centres without CCTV surveillance in England. INTERVENTION: CCTV installation and surveillance. METHODS: Assault related emergency department attendances and violent offences recorded by the police in CCTV and control centres in the four years, 1995-99, two years before and two years after CCTV installation, were compared. RESULTS: Assault related emergency department attendances decreased in intervention centres (3% decrease, ratio 0.96; 95% confidence interval (CI) 0.93 to 0.99) and increased in control centres (11% increase, ratio 1.11; 95% CI 1.08 to 1.14). Overall, changes in emergency department assault attendance in CCTV and control centres were significantly different (t test, p<0.05). Police recorded violence increased in CCTV (11% increase, ratio 1.16; 95% CI 1.08 to 1.24) and control centres (5% increase, ratio 1.06; 95% CI 0.99 to 1.13). Overall, changes in police recording in CCTV and control centres were not significantly different (t test, p>0.05). In CCTV centres, decreases in assault related emergency department attendances and increases in police violence detection were not uniform. CONCLUSION: CCTV surveillance was associated with increased police detection of violence and reductions in injury or severity of injury. CCTV centre variation deserves further study.  (+info)

Iris recognition as a biometric method after cataract surgery. (19/166)

BACKGROUND: Biometric methods are security technologies, which use human characteristics for personal identification. Iris recognition systems use iris textures as unique identifiers. This paper presents an analysis of the verification of iris identities after intra-ocular procedures, when individuals were enrolled before the surgery. METHODS: Fifty-five eyes from fifty-five patients had their irises enrolled before a cataract surgery was performed. They had their irises verified three times before and three times after the procedure, and the Hamming (mathematical) distance of each identification trial was determined, in a controlled ideal biometric environment. The mathematical difference between the iris code before and after the surgery was also compared to a subjective evaluation of the iris anatomy alteration by an experienced surgeon. RESULTS: A correlation between visible subjective iris texture alteration and mathematical difference was verified. We found only six cases in which the eye was no more recognizable, but these eyes were later reenrolled. The main anatomical changes that were found in the new impostor eyes are described. CONCLUSIONS: Cataract surgeries change iris textures in such a way that iris recognition systems, which perform mathematical comparisons of textural biometric features, are able to detect these changes and sometimes even discard a pre-enrolled iris considering it an impostor. In our study, re-enrollment proved to be a feasible procedure.  (+info)

Patients' experiences when accessing their on-line electronic patient records in primary care. (20/166)

BACKGROUND: Patient access to on-line primary care electronic patient records is being developed nationally. Knowledge of what happens when patients access their electronic records is poor. AIM: To enable 100 patients to access their electronic records for the first time to elicit patients' views and to understand their requirements. DESIGN OF STUDY: In-depth interviews using semi-structured questionnaires as patients accessed their electronic records, plus a series of focus groups. SETTING: Secure facilities for patients to view their primary care records privately. METHOD: One hundred patients from a randomised group viewed their on-line electronic records for the first time. The questionnaire and focus groups addressed patients' views on the following topics: ease of use; confidentiality and security; consent to access; accuracy; printing records; expectations regarding content; exploitation of electronic records; receiving new information and bad news. RESULTS: Most patients found the computer technology used acceptable. The majority found viewing their record useful and understood most of the content, although medical terms and abbreviations required explanation. Patients were concerned about security and confidentiality, including potential exploitation of records. They wanted the facility to give informed consent regarding access and use of data. Many found errors, although most were not medically significant. Many expected more detail and more information. Patients wanted to add personal information. CONCLUSION: Patients have strong views on what they find acceptable regarding access to electronic records. Working in partnership with patients to develop systems is essential to their success. Further work is required to address legal and ethical issues of electronic records and to evaluate their impact on patients, health professionals and service provision.  (+info)

The use of male or female voices in warnings systems: a question of acoustics. (21/166)

Speech warnings and communication systems are increasingly used in noisy, high workload environments. An important decision in the development of such systems is the choice of a male or a female speaker. There is little objective evidence to support this decision, although there are many misconceptions and misunderstandings on this topic. This paper suggests that both acoustic and non-acoustic differences (such as social attributions towards speakers of different sexes) between male and female speakers is negligible, therefore the choice of speaker should depend on the overlap of noise and speech spectra. Female voices do however appear to have an advantage in that they can portray a greater range of urgencies because of their usually higher pitch and pitch range. An experiment is reported showing that knowledge about the sex of a speaker has no effect on judgements of perceived urgency, with acoustic variables accounting for such differences.  (+info)

Wireless local area network in a prehospital environment. (22/166)

BACKGROUND: Wireless local area networks (WLANs) are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home) using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG) machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. METHODS: We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER). The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. RESULTS: The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. CONCLUSIONS: Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.  (+info)

Development of biometric DNA ink for authentication security. (23/166)

Among the various types of biometric personal identification systems, DNA provides the most reliable personal identification. It is intrinsically digital and unchangeable while the person is alive, and even after his/her death. Increasing the number of DNA loci examined can enhance the power of discrimination. This report describes the development of DNA ink, which contains synthetic DNA mixed with printing inks. Single-stranded DNA fragments encoding a personalized set of short tandem repeats (STR) were synthesized. The sequence was defined as follows. First, a decimal DNA personal identification (DNA-ID) was established based on the number of STRs in the locus. Next, this DNA-ID was encrypted using a binary, 160-bit algorithm, using a hashing function to protect privacy. Since this function is irreversible, no one can recover the original information from the encrypted code. Finally, the bit series generated above is transformed into base sequences, and double-stranded DNA fragments are amplified by the polymerase chain reaction (PCR) to protect against physical attacks. Synthesized DNA was detected successfully after samples printed in DNA ink were subjected to several resistance tests used to assess the stability of printing inks. Endurance test results showed that this DNA ink would be suitable for practical use as a printing ink and was resistant to 40 hours of ultraviolet exposure, performance commensurate with that of photogravure ink.  (+info)

An unaddressed issue of agricultural terrorism: a case study on feed security. (24/166)

In the late winter of 2003, a number of livestock animals in the Midwest were poisoned due the accidental contamination of a popular commercial feed with a lethal additive. Although all the evidence indicates this incident had no malicious or terrorist intent, it is informative as a case study highlighting potential security implications with respect to a terrorist event directed at U.S. agriculture.  (+info)