Abstract
The term “biosecurity” has been broadly applied to a variety of industries over several decades, and continues to have various meanings to different audiences. It is generally accepted that the origin of the term can be traced back nearly one hundred years referencing certain agricultural practices in the context of controlling livestock health. Today, the term biosecurity can be widely seen in the laboratory environment, the media, in the context of biodefense, throughout government agencies and ministries worldwide, in discussions of genetically-modified organisms, agriculture, and information technology. Concerns of global health and security could not be more relevant than today, given the paradigm shifts manifested by the SARS-CoV-2 virus and the resulting coronavirus pandemic. This book will focus on the challenges that this and future pandemic events will bring and offer biosecurity as a set of practices to aid in humanity’s combat of devastating emerging infectious diseases. To further add complexity to the definition are the rapid advances in technologies that challenge our understanding of how to apply biosecurity principles and practices. Finally, unlike the well-established field of biological safety (i.e., biosafety), there remains a lack of credentialing programs to define a “biosecurity professional.” Taken together, our modern and technologically-driven world is in need redefining what biosecurity means and how it is practiced.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Allen G, Derr R (2016) Threat assessment and risk analysis: an applied approach. Butterworth-Heinemann, Amsterdam, Oxford
Burnette R (2013) Biosecurity: understanding, assessing, and preventing the threat. John Wiley & Sons, Hoboken, NJ
Meechan P, Potts J (2020) Biosafety in microbiological and biomedical laboratories, 6th edn. U.S. Department of Health and Human Services, Public Health Service, Centers for Disease Control and Prevention, National Institutes of Health, Washington, D.C.
Deisinger G (2008) The handbook for campus threat assessment & management teams, 1st edn. Applied Risk Management, Stoneham, MA
Fein RA, Vossekuil B (2000) Protective intelligence and threat assessment investigations : a guide for state and local law enforcement officials. U.S. Department of Justice, Office of Justice Programs, National Institute of Justice, Washington, DC
Keulartz J, van den Belt H (2016) DIY-Bio - economic, epistemological and ethical implications and ambivalences. Life Sci Soc Policy 12(1):7. https://doi.org/10.1186/s40504-016-0039-1
Meloy JR, Hoffmann J (2014) International handbook of threat assessment. Oxford University Press, Oxford
Meloy JR, Sheridan L, Hoffmann J (2008) Stalking, threatening, and attacking public figures : a psychological and behavioral analysis. Oxford University Press, Oxford, New York
Merkidze AW (2007) Terrorism issues : threat assessment, consequences and prevention. Nova Science Publishers, New York
Salerno RM, Gaudioso J (2015) Laboratory biorisk management: biosafety and biosecurity. CRC Press, Hoboken
Scott-Snyder S (2017) Introduction to forensic psychology : essentials for law enforcement. CRC Press, Taylor & Francis Group, New York
Seyfried G, Pei L, Schmidt M (2014) European do-it-yourself (DIY) biology: beyond the hope, hype and horror. BioEssays 36(6):548–551. https://doi.org/10.1002/bies.201300149
World Health Organization Department of Epidemic and Pandemic Alert and Response (2004) Laboratory biosafety manual, 3rd edn. World Health Organization, Geneva
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Burnette, R.N. (2021). Redefining Biosecurity by Application in Global Health, Biodefense, and Developing Technologies. In: Burnette, R.N. (eds) Applied Biosecurity: Global Health, Biodefense, and Developing Technologies. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-69464-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-69464-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69463-0
Online ISBN: 978-3-030-69464-7
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)