Publikace UTB
Repozitář publikační činnosti UTB

The software for the security management in the soft targets

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title The software for the security management in the soft targets en
dc.contributor.author Ďuricová, Lucia
dc.contributor.author Hromada, Martin
dc.contributor.author Mrázek, Jan
dc.relation.ispartof 7th International Defense and Homeland Security Simulation Workshop, DHSS 2017, Held at the International Multidisciplinary Modeling and Simulation Multiconference, I3M 2017
dc.identifier.isbn 978-151084764-4
dc.date.issued 2017
dc.citation.spage 61
dc.citation.epage 67
dc.event.title 18 September 2017 through 20 September 2017
dc.event.location Barcelona
utb.event.state-en Spain
utb.event.state-cs Španělsko
dc.event.sdate 2017-09-18
dc.event.edate 2017-09-20
dc.type conferenceObject
dc.language.iso en
dc.publisher 7th International Defense and Homeland Security Simulation Workshop, DHSS 2017
dc.relation.uri http://www.msc-les.org/proceedings/dhss/dhss2017/dhss2017_61.html
dc.relation.uri http://www.msc-les.org/proceedings/dhss/2017/DHSS2017_61.pdf
dc.subject Decision support system en
dc.subject Ergonomics en
dc.subject Work measurement en
dc.subject Workstation design en
dc.description.abstract The soft targets and crowded places are defined as the objects or the places without the integration of the special security measures, which are oriented in opposed to the threats of the violent criminal attacks. These objects have the similar characteristics, which can be identified according to the features of the soft targets. One of the main features is that these objects have a lot of the uncontrolled visitors per day. The purpose of these objects is to provide the function or the services to the whole range of the visitors without monitoring access to these objects. The current system doesn't require the special security options for the soft targets. The recent security state of the objects is caused by different security and safety requirements to the objects. For example: need to buy a ticket to the football match, installed cameras for the monitoring stealing. This paper proposes the software which can evaluate the objects, calculate the current state of the object and defined preventive actions, which have to do with the object. The proposed software can also have the dynamic part, which can use the planned data and simulate the state of the objects. Copyright © 2017 by CAL-TEK S.r.l. All rights reserved. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1007651
utb.identifier.obdid 43877110
utb.identifier.scopus 2-s2.0-85035336871
utb.source d-scopus
dc.date.accessioned 2018-01-15T16:31:36Z
dc.date.available 2018-01-15T16:31:36Z
dc.description.sponsorship This project is realized as the research with a doctoral student, and it is the primary input for next research, which we will develop in next term. It was realized with the support of the university. This work was supported by Internal Grant Agency of Tomas Bata University under the project No. IGA/FAI/2017/017 and by the research project VI20172019073 "Identification and methods of protection of Czech soft targets against violent acts with elaboration of a warning system", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019 and by the research project VI20172019054 "An analytical software module for the real-time resilience evaluation from point of the converged security ", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019. REFERENCES Marquise R.A., 2015. Preventing Soft Target Terrorist Attacks. Kalvach Z., 2016. Basics of Soft Targets Protection – Guidelines. Global Terrorism Index 2016, 2016, Institute for Economics and Peace, pp.26. Europion Union Terrorism Situation and Trend Report 2017, 2017, European Union Agency for Law Enforcement Cooperation 2017, pp. 5-17. Educational Facilities Threat Assessment, 2008, Virginia Fusion Center. Crockett S., et al. Protecting Soft Targets: A Case Study and Evaluation of High School Security, 2005. Alexander F., 2012. Safety and Security Target Levels: Opportunities and Challenges for Risk Management and Risk Communication, In: International Journal of Disaster Risk Reduction 2: pp. 67-76. Chunlin L. et all., 2012. The Security Risk Assessment Methodology, In: Procedia Engineering 43, pp. 600-609. Raspotnig Ch. and Opdahl A., 2013. Comparing Risk Identification Techniques for Safety and Security Requirements, In: Journal of Systems and Software 86 (4): 1124-1151.
utb.contributor.internalauthor Ďuricová, Lucia
utb.contributor.internalauthor Hromada, Martin
utb.contributor.internalauthor Mrázek, Jan
utb.fulltext.affiliation Lucia Duricova(a), Martin Hromada(b), Jan Mrazek(c) (a),(b),(c) Tomas Bata University in Zlin, Faculty of applied informatics (a)duricova@fai.utb.cz, (b)hromada@fai.utb.cz, (c)jmrazek@fai.utb.cz
utb.fulltext.dates -
utb.fulltext.references Marquise R.A., 2015. Preventing Soft Target Terrorist Attacks. Kalvach Z., 2016. Basics of Soft Targets Protection – Guidelines. Global Terrorism Index 2016, 2016, Institute for Economics and Peace, pp.26. Europion Union Terrorism Situation and Trend Report 2017, 2017, European Union Agency for Law Enforcement Cooperation 2017, pp. 5-17. Educational Facilities Threat Assessment, 2008, Virginia Fusion Center. Crockett S., et al. Protecting Soft Targets: A Case Study and Evaluation of High School Security, 2005. Alexander F., 2012. Safety and Security Target Levels: Opportunities and Challenges for Risk Management and Risk Communication, In: International Journal of Disaster Risk Reduction 2: pp. 67-76. Chunlin L. et all., 2012. The Security Risk Assessment Methodology, In: Procedia Engineering 43, pp. 600-609. Raspotnig Ch. and Opdahl A., 2013. Comparing Risk Identification Techniques for Safety and Security Requirements, In: Journal of Systems and Software 86 (4): 1124-1151.
utb.fulltext.sponsorship This project is realized as the research with a doctoral student, and it is the primary input for next research, which we will develop in next term. It was realized with the support of the university. This work was supported by Internal Grant Agency of Tomas Bata University under the project No. IGA/FAI/2017/017 and by the research project VI20172019073 "Identification and methods of protection of Czech soft targets against violent acts with elaboration of a warning system", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019 and by the research project VI20172019054 "An analytical software modulefor the real-time resilience evaluation from point of the converged security ", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019.
utb.scopus.affiliation Tomas Bata University in Zlin, Faculty of applied informatics, Czech Republic
utb.fulltext.projects IGA/FAI/2017/017
utb.fulltext.projects VI20172019073
utb.fulltext.projects VI20172019054
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam