Kontaktujte nás | Jazyk: čeština English
dc.title | The software for the security management in the soft targets | en |
dc.contributor.author | Ďuricová, Lucia | |
dc.contributor.author | Hromada, Martin | |
dc.contributor.author | Mrázek, Jan | |
dc.relation.ispartof | 7th International Defense and Homeland Security Simulation Workshop, DHSS 2017, Held at the International Multidisciplinary Modeling and Simulation Multiconference, I3M 2017 | |
dc.identifier.isbn | 978-151084764-4 | |
dc.date.issued | 2017 | |
dc.citation.spage | 61 | |
dc.citation.epage | 67 | |
dc.event.title | 18 September 2017 through 20 September 2017 | |
dc.event.location | Barcelona | |
utb.event.state-en | Spain | |
utb.event.state-cs | Španělsko | |
dc.event.sdate | 2017-09-18 | |
dc.event.edate | 2017-09-20 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | 7th International Defense and Homeland Security Simulation Workshop, DHSS 2017 | |
dc.relation.uri | http://www.msc-les.org/proceedings/dhss/dhss2017/dhss2017_61.html | |
dc.relation.uri | http://www.msc-les.org/proceedings/dhss/2017/DHSS2017_61.pdf | |
dc.subject | Decision support system | en |
dc.subject | Ergonomics | en |
dc.subject | Work measurement | en |
dc.subject | Workstation design | en |
dc.description.abstract | The soft targets and crowded places are defined as the objects or the places without the integration of the special security measures, which are oriented in opposed to the threats of the violent criminal attacks. These objects have the similar characteristics, which can be identified according to the features of the soft targets. One of the main features is that these objects have a lot of the uncontrolled visitors per day. The purpose of these objects is to provide the function or the services to the whole range of the visitors without monitoring access to these objects. The current system doesn't require the special security options for the soft targets. The recent security state of the objects is caused by different security and safety requirements to the objects. For example: need to buy a ticket to the football match, installed cameras for the monitoring stealing. This paper proposes the software which can evaluate the objects, calculate the current state of the object and defined preventive actions, which have to do with the object. The proposed software can also have the dynamic part, which can use the planned data and simulate the state of the objects. Copyright © 2017 by CAL-TEK S.r.l. All rights reserved. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1007651 | |
utb.identifier.obdid | 43877110 | |
utb.identifier.scopus | 2-s2.0-85035336871 | |
utb.source | d-scopus | |
dc.date.accessioned | 2018-01-15T16:31:36Z | |
dc.date.available | 2018-01-15T16:31:36Z | |
dc.description.sponsorship | This project is realized as the research with a doctoral student, and it is the primary input for next research, which we will develop in next term. It was realized with the support of the university. This work was supported by Internal Grant Agency of Tomas Bata University under the project No. IGA/FAI/2017/017 and by the research project VI20172019073 "Identification and methods of protection of Czech soft targets against violent acts with elaboration of a warning system", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019 and by the research project VI20172019054 "An analytical software module for the real-time resilience evaluation from point of the converged security ", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019. REFERENCES Marquise R.A., 2015. Preventing Soft Target Terrorist Attacks. Kalvach Z., 2016. Basics of Soft Targets Protection – Guidelines. Global Terrorism Index 2016, 2016, Institute for Economics and Peace, pp.26. Europion Union Terrorism Situation and Trend Report 2017, 2017, European Union Agency for Law Enforcement Cooperation 2017, pp. 5-17. Educational Facilities Threat Assessment, 2008, Virginia Fusion Center. Crockett S., et al. Protecting Soft Targets: A Case Study and Evaluation of High School Security, 2005. Alexander F., 2012. Safety and Security Target Levels: Opportunities and Challenges for Risk Management and Risk Communication, In: International Journal of Disaster Risk Reduction 2: pp. 67-76. Chunlin L. et all., 2012. The Security Risk Assessment Methodology, In: Procedia Engineering 43, pp. 600-609. Raspotnig Ch. and Opdahl A., 2013. Comparing Risk Identification Techniques for Safety and Security Requirements, In: Journal of Systems and Software 86 (4): 1124-1151. | |
utb.contributor.internalauthor | Ďuricová, Lucia | |
utb.contributor.internalauthor | Hromada, Martin | |
utb.contributor.internalauthor | Mrázek, Jan | |
utb.fulltext.affiliation | Lucia Duricova(a), Martin Hromada(b), Jan Mrazek(c) (a),(b),(c) Tomas Bata University in Zlin, Faculty of applied informatics (a)duricova@fai.utb.cz, (b)hromada@fai.utb.cz, (c)jmrazek@fai.utb.cz | |
utb.fulltext.dates | - | |
utb.fulltext.references | Marquise R.A., 2015. Preventing Soft Target Terrorist Attacks. Kalvach Z., 2016. Basics of Soft Targets Protection – Guidelines. Global Terrorism Index 2016, 2016, Institute for Economics and Peace, pp.26. Europion Union Terrorism Situation and Trend Report 2017, 2017, European Union Agency for Law Enforcement Cooperation 2017, pp. 5-17. Educational Facilities Threat Assessment, 2008, Virginia Fusion Center. Crockett S., et al. Protecting Soft Targets: A Case Study and Evaluation of High School Security, 2005. Alexander F., 2012. Safety and Security Target Levels: Opportunities and Challenges for Risk Management and Risk Communication, In: International Journal of Disaster Risk Reduction 2: pp. 67-76. Chunlin L. et all., 2012. The Security Risk Assessment Methodology, In: Procedia Engineering 43, pp. 600-609. Raspotnig Ch. and Opdahl A., 2013. Comparing Risk Identification Techniques for Safety and Security Requirements, In: Journal of Systems and Software 86 (4): 1124-1151. | |
utb.fulltext.sponsorship | This project is realized as the research with a doctoral student, and it is the primary input for next research, which we will develop in next term. It was realized with the support of the university. This work was supported by Internal Grant Agency of Tomas Bata University under the project No. IGA/FAI/2017/017 and by the research project VI20172019073 "Identification and methods of protection of Czech soft targets against violent acts with elaboration of a warning system", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019 and by the research project VI20172019054 "An analytical software modulefor the real-time resilience evaluation from point of the converged security ", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019. | |
utb.scopus.affiliation | Tomas Bata University in Zlin, Faculty of applied informatics, Czech Republic | |
utb.fulltext.projects | IGA/FAI/2017/017 | |
utb.fulltext.projects | VI20172019073 | |
utb.fulltext.projects | VI20172019054 |