safety

Roblox announces new safety features for under-13s

The gaming platform has previously been criticised for allowing young users to be exposed to harmful content.




safety

BBC secret filming shows pubs not enforcing safety scheme

The Ask for Angela initiative aims to provide a discreet lifeline for those feeling unsafe.




safety

Food Safety Tips for the Holidays

Highlights: Many individuals are unaware that food safety is the most crucial factor to consider when preparin




safety

Combatting Malaria Transmission Through Blood Safety

Malaria transmission through blood transfusion poses fatal risks, especially for vulnerable populations like medlinkcancer/medlink patients, due to




safety

Post-Clot Removal Blood Pressure Reduction Raises Safety Concerns

Administering medlinkblood pressure/medlink medications to reduce systolic blood pressure readings may not be a safe or effective approach for medlinkacute




safety

Hospira Unveils TheraDoc Anticoagulation Assistant(TM) Knowledge Module to Help Hospitals Comply With Joint Commission Patient Safety Goal

Hospira Unveils TheraDoc Anticoagulation Assistant(TM) Knowledge Module to Help Hospitals Comply With Joint Commission P




safety

Patient Safety, Treatment Advances, Complex Healthcare Issues to Dominate D.C. Nursing Conference, Hosted by the American Association of Critical-Care Nurses

Patient Safety, Treatment Advances, Complex Healthcare Issues to Dominate D.C. Nursing Conference, Hosted by the America




safety

FDA CONSUMER HEALTH INFORMATION - FDA's MedWatch Safety Alerts: April 2010

FDA CONSUMER HEALTH INFORMATION - FDA's MedWatch Safety Alerts: April 2010




safety

AI-powered electronic Tongue Capable of Detecting Food Safety Concerns

A new electronic tongue was found to detect subtle differences and signs of spoilage in liquids (milk, soda products, coffee blends, and fruit juices).




safety

Employees and Companies Have a Shared Responsibility for Ensuring Ground Transport Safety for Business Travel, According to New Report from FREENOW and GBTA

Both corporate travel managers and business travellers in Europe have a shared responsibility as well as opportunities to mitigate risk by making smart choices when it comes to ground transportation for business trips. This is according to a new report, titled Maximising Duty of Care: Choosing the Safest ‘Last Mile’ Option for Your Business Travel from FREENOW, Europe’s multi mobility app with taxi at its core, and the Global Business Travel Association (GBTA), the world’s largest business travel association.




safety

5G Service Rollout Is Delayed Amid Flight Safety Concerns

AT&T and Verizon agreed to delay the rollout of a new 5G wireless service at the request of U.S. transportation officials. The FAA says the service could affect airplane safety systems, a claim the wireless industry refutes. Photo illustration: Jacob Reynolds




safety

Watch: Instagram Head Adam Mosseri Defends Apps’ Online Safety Record

Instagram’s top executive Adam Mosseri pushed back against some lawmakers’ assertions that social-media products are designed to be addictive, during a Senate Commerce subcommittee hearing Wednesday. Photo: Drew Angerer/Getty Images




safety

5G Service Launches Amid Flight-Safety Uncertainty

Airlines canceled some flights before a new 5G wireless service rolled out, even after Verizon and AT&T agreed to limit the signal around U.S. airports. The FAA says the service could affect airplane safety systems, a claim the wireless industry refutes. Photo: Justin Lane/Shutterstock




safety

Understanding Two-Factor Authentication: A Key to Enhanced Digital Safety in India

Safeguarding online accounts is crucial when everything happens online. Two-factor authentication (2FA) offers an extra layer of security beyond passwords. This method ensures that even if your password is compromised, your account remains protected. For tech enthusiasts in India, understanding and




safety

Keep An Eye On Safety This Diwali : Expert Tips To Protect Your Eyes During the Festivities

Everyone is excited to end this month with a whole lot of noise, light and celebrations, bursting firecrackers and lighting diyas this Diwali 2024. And as we gather together to have a gala time with our family and friends there are




safety

Hyundai And Children’s Of Alabama Strengthen Commitment To Child Passenger Safety Through Community Events

Hyundai and Children’s of Alabama continue their partnership to promote child passenger safety, providing resources and inspections for families.




safety

Application of cold-adapted microbial agents in soil contaminate remediation: biodegradation mechanisms, case studies, and safety assessments

RSC Adv., 2024, 14,12720-12734
DOI: 10.1039/D4RA01510J, Review Article
Open Access
Jiaxin Li, Yujuan Wen, Zheng Fang, Wenqi Yang, Xiaoming Song
Analyzed the microorganisms cold-adapted mechanism, and summarized the degradation pathway of nitro-aromatic compounds. Evaluated safety of microbial agents according to the existing application restoration cases under freeze-thaw cycles condition.
The content of this RSS Feed (c) The Royal Society of Chemistry




safety

Back to bamboo and safety on stilts

Assamese villagers opt for traditional housing for protection against floods




safety

Safety concerns dominate chaotic opening day of Chennai night street race

The opening day of the weekend turned out to be a damp squib for the fans as the organisers couldn’t get the circuit ready in time for the action to start




safety

Chances of infection: food safety squad continues aggressive checking in eateries

Nearly 70 shops dealing with food-based business inspected; flash inspections conducted considering the crowd turnout for Kerala State School Kalolsavam




safety

Regulating water decontamination and food safety by a reusable, nano-sized MOF@cotton@chitosan composite through nanomolar detection of the drug nitroxinil and organoarsenic feed additive p-arsanilic acid

Environ. Sci.: Nano, 2024, Advance Article
DOI: 10.1039/D4EN00066H, Paper
Subhrajyoti Ghosh, Debjit Mal, Shyam Biswas
MOF@cotton@chitosan composite for nanomolar fluorescence sensing of nitroxinil drug and p-arsanilic acid in real samples is presented.
To cite this article before page numbers are assigned, use the DOI form of citation above.
The content of this RSS Feed (c) The Royal Society of Chemistry




safety

Treatment for mental health and substance use [electronic resource] : spillovers to police safety / Monica Deza, Thanh Lu, Johanna Catherine Maclean, Alberto Ortega

Cambridge, MA.: National Bureau of Economic Research, 2024




safety

Gujarat introduces stricter safety rules for boating activities




safety

National Task Force files interim report on safety measures for hospital staff

NTF report has suggested short term, medium, and long term measures to protect doctors and medical staff in their workplaces.




safety

Advancing energy safety via stepwise nucleophilic substitution on tetrazine

J. Mater. Chem. A, 2024, 12,30548-30557
DOI: 10.1039/D4TA06039C, Paper
Open Access
  This article is licensed under a Creative Commons Attribution 3.0 Unported Licence.
Jatinder Singh, Richard J. Staples, Jean'ne M. Shreeve
This study presents a feasible approach to synthesizing hydrazine/nitroamine and amino/nitroamine substituted tetrazine derivatives.
The content of this RSS Feed (c) The Royal Society of Chemistry




safety

BE’s 14-Valent Pneumococcal Conjugate Vaccine: Phase III trials prove ‘safety’

Pneubevax14   14 was found to be safe and induced robust and functional serotype specific immune responses to all 14 serotypes




safety

School Education Department issues safety directives ahead of monsoon

School authorities told to stay alert and ensure that children do not go near the ponds or tanks in the area to play; electrical connections to be checked




safety

Gaping holes in the safety net

Insurance, both state-sponsored and private, does not cover everything and certain segments of the population have neither.



  • Policy & Issues

safety

Design for Safety, An Excerpt

Antiracist economist Kim Crayton says that “intention without strategy is chaos.” We’ve discussed how our biases, assumptions, and inattention toward marginalized and vulnerable groups lead to dangerous and unethical tech—but what, specifically, do we need to do to fix it? The intention to make our tech safer is not enough; we need a strategy.

This chapter will equip you with that plan of action. It covers how to integrate safety principles into your design work in order to create tech that’s safe, how to convince your stakeholders that this work is necessary, and how to respond to the critique that what we actually need is more diversity. (Spoiler: we do, but diversity alone is not the antidote to fixing unethical, unsafe tech.)

The process for inclusive safety

When you are designing for safety, your goals are to:

  • identify ways your product can be used for abuse,
  • design ways to prevent the abuse, and
  • provide support for vulnerable users to reclaim power and control.

The Process for Inclusive Safety is a tool to help you reach those goals (Fig 5.1). It’s a methodology I created in 2018 to capture the various techniques I was using when designing products with safety in mind. Whether you are creating an entirely new product or adding to an existing feature, the Process can help you make your product safe and inclusive. The Process includes five general areas of action:

  • Conducting research
  • Creating archetypes
  • Brainstorming problems
  • Designing solutions
  • Testing for safety
Fig 5.1: Each aspect of the Process for Inclusive Safety can be incorporated into your design process where it makes the most sense for you. The times given are estimates to help you incorporate the stages into your design plan.

The Process is meant to be flexible—it won’t make sense for teams to implement every step in some situations. Use the parts that are relevant to your unique work and context; this is meant to be something you can insert into your existing design practice.

And once you use it, if you have an idea for making it better or simply want to provide context of how it helped your team, please get in touch with me. It’s a living document that I hope will continue to be a useful and realistic tool that technologists can use in their day-to-day work.

If you’re working on a product specifically for a vulnerable group or survivors of some form of trauma, such as an app for survivors of domestic violence, sexual assault, or drug addiction, be sure to read Chapter 7, which covers that situation explicitly and should be handled a bit differently. The guidelines here are for prioritizing safety when designing a more general product that will have a wide user base (which, we already know from statistics, will include certain groups that should be protected from harm). Chapter 7 is focused on products that are specifically for vulnerable groups and people who have experienced trauma.

Step 1: Conduct research

Design research should include a broad analysis of how your tech might be weaponized for abuse as well as specific insights into the experiences of survivors and perpetrators of that type of abuse. At this stage, you and your team will investigate issues of interpersonal harm and abuse, and explore any other safety, security, or inclusivity issues that might be a concern for your product or service, like data security, racist algorithms, and harassment.

Broad research

Your project should begin with broad, general research into similar products and issues around safety and ethical concerns that have already been reported. For example, a team building a smart home device would do well to understand the multitude of ways that existing smart home devices have been used as tools of abuse. If your product will involve AI, seek to understand the potentials for racism and other issues that have been reported in existing AI products. Nearly all types of technology have some kind of potential or actual harm that’s been reported on in the news or written about by academics. Google Scholar is a useful tool for finding these studies.

Specific research: Survivors

When possible and appropriate, include direct research (surveys and interviews) with people who are experts in the forms of harm you have uncovered. Ideally, you’ll want to interview advocates working in the space of your research first so that you have a more solid understanding of the topic and are better equipped to not retraumatize survivors. If you’ve uncovered possible domestic violence issues, for example, the experts you’ll want to speak with are survivors themselves, as well as workers at domestic violence hotlines, shelters, other related nonprofits, and lawyers.

Especially when interviewing survivors of any kind of trauma, it is important to pay people for their knowledge and lived experiences. Don’t ask survivors to share their trauma for free, as this is exploitative. While some survivors may not want to be paid, you should always make the offer in the initial ask. An alternative to payment is to donate to an organization working against the type of violence that the interviewee experienced. We’ll talk more about how to appropriately interview survivors in Chapter 6.

Specific research: Abusers

It’s unlikely that teams aiming to design for safety will be able to interview self-proclaimed abusers or people who have broken laws around things like hacking. Don’t make this a goal; rather, try to get at this angle in your general research. Aim to understand how abusers or bad actors weaponize technology to use against others, how they cover their tracks, and how they explain or rationalize the abuse.

Step 2: Create archetypes

Once you’ve finished conducting your research, use your insights to create abuser and survivor archetypes. Archetypes are not personas, as they’re not based on real people that you interviewed and surveyed. Instead, they’re based on your research into likely safety issues, much like when we design for accessibility: we don’t need to have found a group of blind or low-vision users in our interview pool to create a design that’s inclusive of them. Instead, we base those designs on existing research into what this group needs. Personas typically represent real users and include many details, while archetypes are broader and can be more generalized.

The abuser archetype is someone who will look at the product as a tool to perform harm (Fig 5.2). They may be trying to harm someone they don’t know through surveillance or anonymous harassment, or they may be trying to control, monitor, abuse, or torment someone they know personally.

Fig 5.2: Harry Oleson, an abuser archetype for a fitness product, is looking for ways to stalk his ex-girlfriend through the fitness apps she uses.

The survivor archetype is someone who is being abused with the product. There are various situations to consider in terms of the archetype’s understanding of the abuse and how to put an end to it: Do they need proof of abuse they already suspect is happening, or are they unaware they’ve been targeted in the first place and need to be alerted (Fig 5.3)?

Fig 5.3: The survivor archetype Lisa Zwaan suspects her husband is weaponizing their home’s IoT devices against her, but in the face of his insistence that she simply doesn’t understand how to use the products, she’s unsure. She needs some kind of proof of the abuse.

You may want to make multiple survivor archetypes to capture a range of different experiences. They may know that the abuse is happening but not be able to stop it, like when an abuser locks them out of IoT devices; or they know it’s happening but don’t know how, such as when a stalker keeps figuring out their location (Fig 5.4). Include as many of these scenarios as you need to in your survivor archetype. You’ll use these later on when you design solutions to help your survivor archetypes achieve their goals of preventing and ending abuse.

Fig 5.4: The survivor archetype Eric Mitchell knows he’s being stalked by his ex-boyfriend Rob but can’t figure out how Rob is learning his location information.

It may be useful for you to create persona-like artifacts for your archetypes, such as the three examples shown. Instead of focusing on the demographic information we often see in personas, focus on their goals. The goals of the abuser will be to carry out the specific abuse you’ve identified, while the goals of the survivor will be to prevent abuse, understand that abuse is happening, make ongoing abuse stop, or regain control over the technology that’s being used for abuse. Later, you’ll brainstorm how to prevent the abuser’s goals and assist the survivor’s goals.

And while the “abuser/survivor” model fits most cases, it doesn’t fit all, so modify it as you need to. For example, if you uncovered an issue with security, such as the ability for someone to hack into a home camera system and talk to children, the malicious hacker would get the abuser archetype and the child’s parents would get survivor archetype.

Step 3: Brainstorm problems

After creating archetypes, brainstorm novel abuse cases and safety issues. “Novel” means things not found in your research; you’re trying to identify completely new safety issues that are unique to your product or service. The goal with this step is to exhaust every effort of identifying harms your product could cause. You aren’t worrying about how to prevent the harm yet—that comes in the next step.

How could your product be used for any kind of abuse, outside of what you’ve already identified in your research? I recommend setting aside at least a few hours with your team for this process.

If you’re looking for somewhere to start, try doing a Black Mirror brainstorm. This exercise is based on the show Black Mirror, which features stories about the dark possibilities of technology. Try to figure out how your product would be used in an episode of the show—the most wild, awful, out-of-control ways it could be used for harm. When I’ve led Black Mirror brainstorms, participants usually end up having a good deal of fun (which I think is great—it’s okay to have fun when designing for safety!). I recommend time-boxing a Black Mirror brainstorm to half an hour, and then dialing it back and using the rest of the time thinking of more realistic forms of harm.

After you’ve identified as many opportunities for abuse as possible, you may still not feel confident that you’ve uncovered every potential form of harm. A healthy amount of anxiety is normal when you’re doing this kind of work. It’s common for teams designing for safety to worry, “Have we really identified every possible harm? What if we’ve missed something?” If you’ve spent at least four hours coming up with ways your product could be used for harm and have run out of ideas, go to the next step.

It’s impossible to guarantee you’ve thought of everything; instead of aiming for 100 percent assurance, recognize that you’ve taken this time and have done the best you can, and commit to continuing to prioritize safety in the future. Once your product is released, your users may identify new issues that you missed; aim to receive that feedback graciously and course-correct quickly.

Step 4: Design solutions

At this point, you should have a list of ways your product can be used for harm as well as survivor and abuser archetypes describing opposing user goals. The next step is to identify ways to design against the identified abuser’s goals and to support the survivor’s goals. This step is a good one to insert alongside existing parts of your design process where you’re proposing solutions for the various problems your research uncovered.

Some questions to ask yourself to help prevent harm and support your archetypes include:

  • Can you design your product in such a way that the identified harm cannot happen in the first place? If not, what roadblocks can you put up to prevent the harm from happening?
  • How can you make the victim aware that abuse is happening through your product?
  • How can you help the victim understand what they need to do to make the problem stop?
  • Can you identify any types of user activity that would indicate some form of harm or abuse? Could your product help the user access support?

In some products, it’s possible to proactively recognize that harm is happening. For example, a pregnancy app might be modified to allow the user to report that they were the victim of an assault, which could trigger an offer to receive resources for local and national organizations. This sort of proactiveness is not always possible, but it’s worth taking a half hour to discuss if any type of user activity would indicate some form of harm or abuse, and how your product could assist the user in receiving help in a safe manner.

That said, use caution: you don’t want to do anything that could put a user in harm’s way if their devices are being monitored. If you do offer some kind of proactive help, always make it voluntary, and think through other safety issues, such as the need to keep the user in-app in case an abuser is checking their search history. We’ll walk through a good example of this in the next chapter.

Step 5: Test for safety

The final step is to test your prototypes from the point of view of your archetypes: the person who wants to weaponize the product for harm and the victim of the harm who needs to regain control over the technology. Just like any other kind of product testing, at this point you’ll aim to rigorously test out your safety solutions so that you can identify gaps and correct them, validate that your designs will help keep your users safe, and feel more confident releasing your product into the world.

Ideally, safety testing happens along with usability testing. If you’re at a company that doesn’t do usability testing, you might be able to use safety testing to cleverly perform both; a user who goes through your design attempting to weaponize the product against someone else can also be encouraged to point out interactions or other elements of the design that don’t make sense to them.

You’ll want to conduct safety testing on either your final prototype or the actual product if it’s already been released. There’s nothing wrong with testing an existing product that wasn’t designed with safety goals in mind from the onset—“retrofitting” it for safety is a good thing to do.

Remember that testing for safety involves testing from the perspective of both an abuser and a survivor, though it may not make sense for you to do both. Alternatively, if you made multiple survivor archetypes to capture multiple scenarios, you’ll want to test from the perspective of each one.

As with other sorts of usability testing, you as the designer are most likely too close to the product and its design by this point to be a valuable tester; you know the product too well. Instead of doing it yourself, set up testing as you would with other usability testing: find someone who is not familiar with the product and its design, set the scene, give them a task, encourage them to think out loud, and observe how they attempt to complete it.

Abuser testing

The goal of this testing is to understand how easy it is for someone to weaponize your product for harm. Unlike with usability testing, you want to make it impossible, or at least difficult, for them to achieve their goal. Reference the goals in the abuser archetype you created earlier, and use your product in an attempt to achieve them.

For example, for a fitness app with GPS-enabled location features, we can imagine that the abuser archetype would have the goal of figuring out where his ex-girlfriend now lives. With this goal in mind, you’d try everything possible to figure out the location of another user who has their privacy settings enabled. You might try to see her running routes, view any available information on her profile, view anything available about her location (which she has set to private), and investigate the profiles of any other users somehow connected with her account, such as her followers.

If by the end of this you’ve managed to uncover some of her location data, despite her having set her profile to private, you know now that your product enables stalking. Your next step is to go back to step 4 and figure out how to prevent this from happening. You may need to repeat the process of designing solutions and testing them more than once.

Survivor testing

Survivor testing involves identifying how to give information and power to the survivor. It might not always make sense based on the product or context. Thwarting the attempt of an abuser archetype to stalk someone also satisfies the goal of the survivor archetype to not be stalked, so separate testing wouldn’t be needed from the survivor’s perspective.

However, there are cases where it makes sense. For example, for a smart thermostat, a survivor archetype’s goals would be to understand who or what is making the temperature change when they aren’t doing it themselves. You could test this by looking for the thermostat’s history log and checking for usernames, actions, and times; if you couldn’t find that information, you would have more work to do in step 4.

Another goal might be regaining control of the thermostat once the survivor realizes the abuser is remotely changing its settings. Your test would involve attempting to figure out how to do this: are there instructions that explain how to remove another user and change the password, and are they easy to find? This might again reveal that more work is needed to make it clear to the user how they can regain control of the device or account.

Stress testing

To make your product more inclusive and compassionate, consider adding stress testing. This concept comes from Design for Real Life by Eric Meyer and Sara Wachter-Boettcher. The authors pointed out that personas typically center people who are having a good day—but real users are often anxious, stressed out, having a bad day, or even experiencing tragedy. These are called “stress cases,” and testing your products for users in stress-case situations can help you identify places where your design lacks compassion. Design for Real Life has more details about what it looks like to incorporate stress cases into your design as well as many other great tactics for compassionate design.




safety

Blocked stormwater drains continue to cause health and safety concerns in Coimbatore




safety

Concerns grow over safety of conservancy workers following manual scavenging incident in Coimbatore




safety

Distinguishing thermoelectric and photoelectric modes enables intelligent real-time detection of indoor electrical safety hazards

Mater. Horiz., 2024, 11,1679-1688
DOI: 10.1039/D3MH02187D, Communication
Gang Li, Chengzhi Chen, Zijian Liu, Qi Sun, Lirong Liang, Chunyu Du, Guangming Chen
Accurate identification and monitoring of indoor safety hazards can be achieved by integrating a photo-/thermoelectric material that exhibits different nominal Seebeck coefficients in the sensor.
The content of this RSS Feed (c) The Royal Society of Chemistry




safety

Forest dept. to tackle safety concerns of tourists at Kakkayam ecotourism spot

In the first phase, the focus will be on completing power fencing around the most vulnerable areas of the popular tourism destination




safety

Signaling Safety [electronic journal].

National Bureau of Economic Research




safety

The Safety Net as a Springboard [electronic journal].




safety

Gig-Labor: Trading Safety Nets for Steering Wheels [electronic journal].




safety

Flight-to-safety and the Credit Crunch: A new history of the banking crisis in France during the Great Depression [electronic journal].




safety

Elusive Safety : The New Geography of Capital Flows and Risk [electronic journal].

National Bureau of Economic Research




safety

The Dollar During the Great Recession: US Monetary Policy Signaling and The Flight To Safety [electronic journal].




safety

Demand for safety, risky loans: A model of securitization [electronic journal].




safety

DEglobalizaion and Social Safety Nets in Post-Covid-19 Era: Textbook Macroeconomic Analysis [electronic journal].

National Bureau of Economic Research




safety

Medication safety

Patient harm due to unsafe care is a leading cause of death and disability worldwide




safety

ICICI Pru Equity & Debt Fund review: A slight tilt to safety

Broad portfolio of holdings in equity and debt to limit portfolio downside during corrections from the peaks




safety

Road safety class mandatory for driving licence applicants in Ernakulam from Dec. 2

“The sessions will include new road safety guidelines in keeping with advancements in automobiles and road construction and also amendments made to the Motor Vehicles Act in the recent past”




safety

Take the gauntlet: On safety and the Indian Railways

‘Kavach’ implementation is a priority but will not be a silver bullet




safety

Give high priority to fire safety

In majority of high-rise buildings, power supply distribution and meter panels are located in the basement floors making them vulnerable to fire mishaps, writes Avala Buchi Reddy




safety

IAF Mig-29 fighter crashes near Agra, pilot ejects to safety

An enquiry has been ordered by the IAF, to ascertain the cause of the accident




safety

Nilgiris district administration urges people living downstream of Emerald Dam to take adequate safety measures

The Nilgiris district administration said that owing to work on the new Kundah hydro power house in Kattukuppai, water stored in the Emerald Dam will be released




safety

Reflections on Practice : Safety / directed by: Nettie Wild ; production agencies: British Columbia Centre for Disease Control. Street Nurse Program (Vancouver), National Film Board of Canada (Montreal)

Montreal : National Film Board of Canada, 2019




safety

Ensuring a proper social safety net for the gig worker

Defining ‘employment relation’ in gig work is the key