Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jennifer Marie Gaudioso is active.

Publication


Featured researches published by Jennifer Marie Gaudioso.


Archive | 2007

Laboratory Biosecurity Handbook

Reynolds Mathewson Salerno; Jennifer Marie Gaudioso

INTRODUCTION Laboratory Biosecurity and the Risks of Bioterrorism Laboratory Biosecurity and International Obligations Laboratory Biosecurity and National Regulations Approach/Objectives of this Book RISK ASSESSMENT Overview of Biosecurity Risk Assessment Methodology Characterize Assets and Threats Evaluate Scenarios Characterize the Risk Risk Reduction COMPONENTS OF BIOSECURITY Physical Security Personnel Security Material Control and Accountability Transport Security Information Security PROGRAM MANAGEMENT Role and Responsibilities Biosecurity System Design Response Force Performance Testing Documentation Assessments and Audits Training and Exercises SPECIFIC BIOSECURITY RECOMMENDATIONS Low-Risk Facility Moderate-Risk Facility High-Risk Facility Extreme Risk Facility Specific Biosecurity Recommendations - Low-Risk Facility Specific Biosecurity Recommendations - Moderate-Risk Facility Specific Biosecurity Recommendations - High-Risk Facility Specific Biosecurity Recommendations - Extreme High-Rick Facility CONCLUSIONS List of Acronyms Glossary Appendix A-Vulnerability Assessment Questionnaires Appendix B-Example Biosecurity Risk Assessment Methodology Appendix C-Biosecurity Plan Template Appendix D-Example Memorandum of Understanding with Local Law Enforcement Appendix E-SOP for Testing Access Control Systems Appendix F-Biosecurity Guidance and Regulations


Journal of Bioterrorism and Biodefense | 2011

Likelihood of Smallpox Recurrence

Jennifer Marie Gaudioso; Tim Brooks; Katsuhisa Furukawa; Daniel O. Lavanchy; David Friedman; Erik D Heegaard

The 30 year anniversary of the eradication of smallpox was recently celebrated and represents a major achievement in international public health. However, the likelihood of re-introduction of eradicated diseases is expected to evolve with time, and warrants continued assessment. Using influence diagrams to structure the analysis, this paper seeks to systematically examine the various pathways that could lead to accidental or deliberate introduction of a novel or eradicated pathogen using smallpox as an example. The accidental reintroduction of smallpox may occur through three main pathways: Biosafety incident at a known repository, biosafety incident outside of a known repository, and environmental resurrection. The deliberate reintroduction can also be subdivided into three main pathways: Biosecurity incident at a known repository, illicit state biological weapons program, and synthesis using the tools of modern biotechnology. We conclude that the likelihood of recurrence of an eradicated agent, such as smallpox, is small, but ultimately unknown and expectedly increases with time primarily due to the rapid advancement of biotechnology.


The Nonproliferation Review | 2004

A BW risk assessment: Historical and technical perspectives

Reynolds Mathewson Salerno; Jennifer Marie Gaudioso; Rebecca L. Frerichs; Daniel P. Estes

The use of pathogens and toxins as weapons is not new and is certainly not a creation of recent biotechnical advances. Documented use of biological weapons (BW) dates at least as far back as the Middle Ages, when plague-infected cadavers were catapulted over the city walls of Kaffa. However, it was not until the fall 2001 anthrax attacks along the East Coast of the United States that BW use—especially in the form of bioterrorism—was brought to the forefront of the U.S. national security debate. Unfortunately, the risk of BW use or bioterrorism is not well understood, and the rapid advances of and accessibility to biotechnology have only served to increase confusion. This article aims to provide a comprehensive assessment of the risk of the use of biological weapons by combining a historical overview of past BW activities with an analysis of the technical requirements necessary to develop and deploy such weapons.


Applied Biosafety | 2009

A Survey of Bioscience Research and Biosafety and Biosecurity Practices in Asia, Eastern Europe, Latin America, and the Middle East

Lisa M. Astuto-Gribble; Jennifer Marie Gaudioso; Susan Adele Caskey; Tamara Zemlo

In the past decade, the United States (U.S.) has enacted extensive federal legislation to regulate the possession, use, and transfer of dangerous microorganisms and toxins. Yet, few international laboratories have implemented similar safeguards. Limited data are available concerning the types of biological agents researched in non-U.S. laboratories and the biosafety and biosecurity practices employed to maintain those agents. To start addressing these knowledge gaps, an online survey was administered by BioInformatics, LLC in 2005 to 765 life scientists from 81 countries in Asia, Eastern Europe, Latin America, and the Middle East. Survey results revealed that participants are actively engaged in research with a wide variety of biological agents. Moreover, analysis of the biosafety and biosecurity data revealed several interesting findings; these findings are summarized into three major themes: biosafety is more prevalent than biosecurity, simple practices and techniques predominate, and perceptions of risk vary regionally. This survey provided unique insight into the variety of dangerous microorganisms and their toxins studied worldwide and uncovered a consistent weakness in laboratory biosafety and biosecurity. Because many of these facilities are located in volatile areas of the world, these findings indicate a potentially significant risk, and future actions are warranted to improve the safe and secure handling of biological agents internationally.


Applied Biosafety | 2006

Developing a Risk Assessment and Management Approach to Laboratory Biosecurity

Jennifer Marie Gaudioso; Reynolds Mathewson Salerno; Natalie Beth Barnett

A growing awareness in the microbiological research and policy communities centers on the need to increase the protection of dangerous biological agents from theft. However, existing security literature and regulatory requirements do not present a comprehensive approach or clear model for biosecurity, nor do they wholly recognize the operational issues within laboratory environments. The modern laboratory operating environment needs to be defined by both biosafety and biosecurity considerations. In addition to being a component of the operating environment, biosafety can serve as a model for biosecurity. Both of these paradigms should be implemented in a graded manner, with increased protection based on the results of a risk assessment. This article proposes a preliminary framework for assessing biosecurity considerations and provides examples that address specific biological materials. The bio can be divided into several fundamental steps: (1) assessing the materials based on their weaponization potential and potential consequences, (2) assessing the potential adversaries, and (3) analyzing security scenarios. The results of the risk assessment form the foundation for risk management and the design of a biosecurity program. By prioritizing risks, the assessment provides a rational basis for allocating scarce security resources.


Archive | 2004

Historical precedence and technical requirements of biological weapons use : a threat assessment.

Daniel P. Estes; Kathleen Margaret Vogel; Jennifer Marie Gaudioso; Lauren T. Hickok; Danielle F. Jung; Natalie Beth Barnett; Rebecca L. Frerichs; Reynolds Mathewson Salerno

The threat from biological weapons is assessed through both a comparative historical analysis of the patterns of biological weapons use and an assessment of the technological hurdles to proliferation and use that must be overcome. The history of biological weapons is studied to learn how agents have been acquired and what types of states and substate actors have used agents. Substate actors have generally been more willing than states to use pathogens and toxins and they have focused on those agents that are more readily available. There has been an increasing trend of bioterrorism incidents over the past century, but states and substate actors have struggled with one or more of the necessary technological steps. These steps include acquisition of a suitable agent, production of an appropriate quantity and form, and effective deployment. The technological hurdles associated with the steps present a real barrier to producing a high consequence event. However, the ever increasing technological sophistication of society continually lowers the barriers, resulting in a low but increasing probability of a high consequence bioterrorism event.


Archive | 2010

Biosafety Risk Assessment Methodology

Susan Adele Caskey; Jennifer Marie Gaudioso; Reynolds Mathewson Salerno; Stefan M. Wagner; Mika Shigematsu; George Risi; Joe Kozlovac; Vibeke Halkjaer-Knudsen; Esmeralda Prat

Laboratories that work with biological agents need to manage their safety risks to persons working the laboratories and the human and animal community in the surrounding areas. Accepted biosafety best practices and international guidance span a wide variety of biosafety risk mitigation measures, which can be categorized as engineering controls, procedural and administrative controls, and the use of personal protective equipment. The determination of which mitigation measures should be used to address the specific laboratory risks should be dependent upon a risk assessment. Ideally, a risk assessment should be conducted in a manner which is standardized and systematic allowing it to be repeatable and comparable. A risk assessment should clearly define the risk being assessed and avoid over complication.


Journal of Laboratory Automation | 2009

Biosecurity: Progress and Challenges

Jennifer Marie Gaudioso; Lisa Astuto Gribble; Reynolds Mathewson Salerno

Bioscience facilities are essential to the efforts to combat both naturally occurring infectious diseases and bioterrorism. But both the general public and policy makers are questioning how bioscience institutions address the safety and security risks of handling infectious disease causing organisms. As a result, new regulations at the national level in many countries and international initiatives from the United Nations, World Health Organization, and others are having direct consequences for the operation of bioscience. In particular, laboratory biosecurity is a relatively new and evolving paradigm for bioscience facilities, which have an obligation to ensure their facilities operate safely and securely. However, although progress has been made in these areas, numerous challenges remain throughout the world, and much work remains. It is the responsibility of both the scientific community and policy makers to work collaboratively to ensure responsible use of pathogens and toxins, equipment, and expertise.


Applied Biosafety | 2006

Laboratory Biosecurity: A Survey of the U.S. Bioscience Community

Jennifer Marie Gaudioso; Susan B. Rivera; Susan Adele Caskey; Reynolds Mathewson Salerno

Laboratory biosecurity practices, or measures to prevent the theft or sabotage of biological research materials, must coexist with biosafety. Within the United States, laboratory biosecurity, for a list of select agents, has been regulated through several Codes of Federal Regulation. In 2004 and 2005, Sandia National Laboratories conducted a survey of the U.S. bioscience community in conjunction with Reed Research Group, to assess the extent biosecurity is implemented in laboratories and the relationship between biosecurity and biosafety and good laboratory practices in regulated select and non-select agent laboratories. This paper describes the results of this survey.


Archive | 2006

Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

Terry Rae Guilinger; Jennifer Marie Gaudioso; Donato Gonzalo Aceto; Kathleen M. Lowe; Mark D. Tucker; Reynolds Mathewson Salerno; Caroline Ann Souza

As George W. Bush recognized in November 2001, %22Infectious diseases make no distinctions among people and recognize no borders.%22 By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging does not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4

Collaboration


Dive into the Jennifer Marie Gaudioso's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Susan Adele Caskey

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Susan B. Rivera

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Natalie Beth Barnett

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Andrew K. Boal

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Bruce C. Bunker

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Daniel P. Estes

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

George D. Bachand

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Jun Liu

United States Department of Energy

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge