Academic literature on the topic 'Threat'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threat.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Threat"

1

Kiely, P., and C. R. Seed. "Assessing infectious threats - trick or threat?" ISBT Science Series 10, S1 (April 2015): 65–72. http://dx.doi.org/10.1111/voxs.12114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hamad, Mohammad, and Vassilis Prevelakis. "SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study." Information 11, no. 5 (May 19, 2020): 273. http://dx.doi.org/10.3390/info11050273.

Full text
Abstract:
In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environment. While these improvements have increased the safety and incontestability of the automotive system, they have opened the door for new potential security threats which need to be defined, assessed, and mitigated. The SAE J3061 standard has defined threat modeling as a critical step toward the secure development process for vehicle systems, but it did not determine which method could be used to achieve this process. Therefore, many threat modeling approaches were adopted. However, using one individual approach will not identify all the threats which could target the system, and may lead to insufficient mitigation mechanisms. Thus, having complete security requires the usage of a comprehensive threat model which identifies all the potential threats and vulnerabilities. In this work, we tried to revise the existing threat modeling efforts in the vehicular domain. Also, we proposed using a hybrid method called the Software, Asset, Vulnerability, Threat, and Attacker (SAVTA)-centric method to support security analysis for vehicular systems. SAVTA combines different existing threat modeling approaches to create a comprehensive and hybridized threat model. The model is used as an aid to construct general attack trees which illustrate attack vectors that threaten a particular vehicle asset and classify these attacks under different sub-trees.
APA, Harvard, Vancouver, ISO, and other styles
3

Kappenman, Emily S., Raphael Geddert, Jaclyn L. Farrens, John J. McDonald, and Greg Hajcak. "Recoiling From Threat: Anxiety Is Related to Heightened Suppression of Threat, Not Increased Attention to Threat." Clinical Psychological Science 9, no. 3 (March 24, 2021): 434–48. http://dx.doi.org/10.1177/2167702620961074.

Full text
Abstract:
Increased attention to threat is considered a core feature of anxiety. However, there are multiple mechanisms of attention and multiple types of threat, and the relationships among attention, threat, and anxiety are poorly understood. In the present study, we used event-related potentials (ERPs) to separately isolate attentional selection (N2pc) and suppression (PD) of pictorial threats (photos of weapons, snakes, etc.) and conditioned threats (colored shapes paired with electric shock). In a sample of 48 young adults, both threat types were initially selected for increased attention (an N2pc), but only conditioned threats elicited subsequent suppression (a PD) and a reaction time (RT) bias. Levels of trait anxiety were unrelated to N2pc amplitude, but increased anxiety was associated with larger PDs (i.e., greater suppression) and reduced RT bias to conditioned threats. These results suggest that anxious individuals do not pay more attention to threats but rather engage more attentional suppression to overcome threats.
APA, Harvard, Vancouver, ISO, and other styles
4

MUGISHA, ARTHUR R., and SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda." Environmental Conservation 31, no. 3 (September 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.

Full text
Abstract:
Loss of wildlife, encroachment on wild lands and conflicts between protected areas and neighbouring communities continue to threaten the integrity of protected areas (PAs) in Uganda. To increase support from local communities and ensure long-term sustainability for Uganda's PAs, a policy of community-based conservation was introduced in 1988 as a management approach in seven PAs. The effectiveness of the community-based approach for reducing threats was compared to conventional PA management by conducting a threat reduction assessment at 16 PAs, seven with community-based approaches and nine without. Additional data collected using document reviews, interviews with government officials, and surveys of PA wardens were compared with the threat reduction assessments. Twenty-three primary threats were identified at PAs. Local game poaching was the most common threat. The threat reduction assessment indices of community-based PAs (mean=49.0±12) were not significantly different from those of conventional PAs (mean=37.96±21.6). Some specific threats, such as bush burning, logging, encroachment and unclear boundaries, seemed to be better mitigated at community-based PAs. Management approaches at all PAs mitigated fewer than half of the identified threats. Management approaches are needed that directly target PA threats, go beyond PA boundaries by involving additional government departments, link people's livelihoods to conservation efforts and strengthen PA institutions.
APA, Harvard, Vancouver, ISO, and other styles
5

Sandy, Djoko Andoko, Poppy Setiawati Nurisnaeny, and Mira Murniasari. "The Threat of Social Network Games in Indonesia." Borneo Educational Journal (Borju) 5, no. 2 (August 26, 2023): 335–51. http://dx.doi.org/10.24903/bej.v5i2.1393.

Full text
Abstract:
This research examines the potential threat through SNG in Indonesia. The theories of threat, social media, cyber, and network society are used to analyze the research problem through qualitative analysis. Data was obtained through interviews and literature studies. The results of the study show that the potential threat on SNG includes ideological threats in society, growing illegal and pornographic content, theft of personal data, illegal monitoring of user activities, online fraud, cyberbullying, inappropriate content, dependence, and cyber attacks that threaten the activities of social network game users in Indonesia.
APA, Harvard, Vancouver, ISO, and other styles
6

Bedi, Punam, Vandana Gandotra, Archana Singhal, Himanshi Narang, and Sumit Sharma. "Mitigating multi-threats optimally in proactive threat management." ACM SIGSOFT Software Engineering Notes 38, no. 1 (January 23, 2013): 1–7. http://dx.doi.org/10.1145/2413038.2413041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Muhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (October 12, 2021): 11259. http://dx.doi.org/10.3390/su132011259.

Full text
Abstract:
As the human population increases, the landscape is altered to provide housing, food, and industry. Human activity poses a risk to the health of natural habitats that, in turn, affect biodiversity. Biodiversity is necessary for a functioning ecosystem, as species work synergistically to create a livable environment. It is, therefore, important to know how human practices and natural events threaten these habitats and the species living in them. A universal method of modeling habitat threats does not exist. This paper details the use of a literature review to formulate a new framework called Define–Investigate–Estimate–Map (DIEM). This framework is a process of defining threats, investigating an area to discover what threats are present, estimating the severity of those threats, and mapping the threats. Analysis of 62 studies was conducted to determine how different authors define and characterize threats in various contexts. The results of this analysis were then applied to a case study to evaluate the Choctawhatchee River and Bay Watershed. Results suggest that the most abundant threat in the watershed is agricultural development, and the most destructive threat is urban development. These two threats have the greatest impact on the total threat level of the watershed. Applying the DIEM framework demonstrates its helpfulness in regional analysis, watershed modeling, and land development planning.
APA, Harvard, Vancouver, ISO, and other styles
8

Muhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (October 12, 2021): 11259. http://dx.doi.org/10.3390/su132011259.

Full text
Abstract:
As the human population increases, the landscape is altered to provide housing, food, and industry. Human activity poses a risk to the health of natural habitats that, in turn, affect biodiversity. Biodiversity is necessary for a functioning ecosystem, as species work synergistically to create a livable environment. It is, therefore, important to know how human practices and natural events threaten these habitats and the species living in them. A universal method of modeling habitat threats does not exist. This paper details the use of a literature review to formulate a new framework called Define–Investigate–Estimate–Map (DIEM). This framework is a process of defining threats, investigating an area to discover what threats are present, estimating the severity of those threats, and mapping the threats. Analysis of 62 studies was conducted to determine how different authors define and characterize threats in various contexts. The results of this analysis were then applied to a case study to evaluate the Choctawhatchee River and Bay Watershed. Results suggest that the most abundant threat in the watershed is agricultural development, and the most destructive threat is urban development. These two threats have the greatest impact on the total threat level of the watershed. Applying the DIEM framework demonstrates its helpfulness in regional analysis, watershed modeling, and land development planning.
APA, Harvard, Vancouver, ISO, and other styles
9

Riek, Blake M., Eric W. Mania, and Samuel L. Gaertner. "Intergroup Threat and Outgroup Attitudes: A Meta-Analytic Review." Personality and Social Psychology Review 10, no. 4 (November 2006): 336–53. http://dx.doi.org/10.1207/s15327957pspr1004_4.

Full text
Abstract:
This article examines the relationship between intergroup threat and negative outgroup attitudes. We first qualitatively review the intergroup threat literature, describing the shift from competing theories toward more integrated approaches, such as the integrated threat theory (ITT; W. G. Stephan & Stephan, 2000). The types of threats discussed include: realistic threat, symbolic threat, intergroup anxiety, negative stereotypes, group esteem threat, and distinctiveness threat. We then conducted a quantitative meta-analysis examining the relationships between various intergroup threats and outgroup attitudes. The meta-analysis, involving 95 samples, revealed that 5 different threat types had a positive relationship with negative outgroup attitudes. Additionally, outgroup status moderated some of these relationships. Implications and future directions are considered.
APA, Harvard, Vancouver, ISO, and other styles
10

Syomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.

Full text
Abstract:
Introduction. The functioning of agrarian business entities is constantly influenced by external and internal envi-ronmental factors, some of which threaten its organizational and legal security. Given the novelty of investigated security, the issue of determination threats in this area, identifying management tools, methods, and strategies is relevant, as it allows us to consider enterprise security more broadly than in the traditional economic sense. The purpose of the study is to identify the main tools for managing organizational and legal security and to develop a scheme for preventive management. Results. The difference between risks and threats is clarified. The classification of threats into controlled and uncon-trolled has been done. A description of the methodological basis structure of organizational and legal security management is given. The stages of managing threats to the organizational and legal security of agrarian business entities have been determined. In the identification phase, the external environment is analyzed by a variety of factors and the internal envi-ronment by the mental map of stakeholder interests, needs and values, as well as by areas: efficiency of organizational struc-ture, hierarchy of authorities, system of power delegation, motivational system, control of production quality, processes of products sale, the mode of payment of the ward and the provision of annual leave, keeping of all forms of reporting, financial discipline, ecological standards control of activity. The external environment of the agrarian business entities functioning is analyzed in relation to possible threats to organizational and legal security. The development of a threat management plan is considered. The nature of the implicit threats and the ways to manage them are described, which involves allocating a budget to cover unforeseen losses. The description of the stage of quantitative and qualitative analysis in threat management is given. The development description of the threat classification scale is presented. The path of threat priority analysis is determined, which involves the matrix development of threats placement on two parameters: probability of occurrence and degree of impact. The description of quantitative methods of threat assessment is presented. The definition of the budget amount for the implementation of the organizational and legal security management strategy is given. The methodological support for the choice of the organizational and legal security management strategy has been presented using the method of hierarchy analysis based on the criteria of efficiency, cost and effectiveness. The system of preventive management of organi-zational and legal security of agrarian business entities is presented. Key words: threats, risks, organizational and legal security, agrarian subject, threat management strategy, threat identification, quantitative analysis, qualitative analysis, method of hierarchy analysis.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Threat"

1

Eckert, Christine. "Stereotype Threat." Ruprecht-Karls-Universität, 2014. https://ul.qucosa.de/id/qucosa%3A15350.

Full text
Abstract:
Stereotype Threat wird definiert als ein Gefühl der Bedrohung, das Personen in einer Situation erleben, in der sie befürchten, aufgrund eines negativen Stereotyps über ihre Gruppe beurteilt zu werden bzw. durch ihr Verhalten das Stereotyp unbeabsichtigterweise zu bestätigen. Der Begriff geht auf Claude M. Steele und Joshua Aronson zurück. Stereotype Threat kann als ein situatives Dilemma bezeichnet werden, das bei Mitgliedern stigmatisierter Gruppen in Testsituationen kurzfristig zu signifikanten Leistungseinbußen führen kann. Es kann auch bei anderen Wahlentscheidungen auftreten. Empirisch gesicherte Befunde für die längerfristigen Auswirkungen liegen bisher kaum vor. Auch die auslösenden Bedingungen sind nicht abschließend geklärt.
APA, Harvard, Vancouver, ISO, and other styles
2

Eckert, Christine. "Stereotype Threat." Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-219437.

Full text
Abstract:
Stereotype Threat wird definiert als ein Gefühl der Bedrohung, das Personen in einer Situation erleben, in der sie befürchten, aufgrund eines negativen Stereotyps über ihre Gruppe beurteilt zu werden bzw. durch ihr Verhalten das Stereotyp unbeabsichtigterweise zu bestätigen. Der Begriff geht auf Claude M. Steele und Joshua Aronson zurück. Stereotype Threat kann als ein situatives Dilemma bezeichnet werden, das bei Mitgliedern stigmatisierter Gruppen in Testsituationen kurzfristig zu signifikanten Leistungseinbußen führen kann. Es kann auch bei anderen Wahlentscheidungen auftreten. Empirisch gesicherte Befunde für die längerfristigen Auswirkungen liegen bisher kaum vor. Auch die auslösenden Bedingungen sind nicht abschließend geklärt.
APA, Harvard, Vancouver, ISO, and other styles
3

Dunning, John Paul. "Bluetooth Threat Taxonomy." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/76883.

Full text
Abstract:
Since its release in 1999, Bluetooth has become a commonly used technology available on billions of devices through the world. Bluetooth is a wireless technology used for information transfer by devices such as Smartphones, headsets, keyboard/mice, laptops/desktops, video game systems, automobiles, printers, heart monitors, and surveillance cameras. Dozens of threats have been developed by researchers and hackers which targets these Bluetooth enabled devices. The work in this thesis provides insight into past and current Bluetooth threats along with methods of threat mitigation. The main focus of this thesis is the Bluetooth Threat Taxonomy (BTT); it is designed for classifying threats against Bluetooth enabled technology. The BTT incorporates nine distinct classifications to categorize Bluetooth attack tools and methods and a discussion on 42 threats. In addition, several new threats developed by the author will be discussed. This research also provides means to secure Bluetooth enabled devices. The Bluetooth Attack Detection Engine (BLADE) is as a host-based Intrusion Detection System (IDS) presented to detect threats targeted toward a host system. Finally, a threat mitigation schema is provided to act as a guideline for securing Bluetooth enabled devices.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
4

Taylor, Emma. "A veiled threat." Thesis, Taylor, Emma (2011) A veiled threat. Honours thesis, Murdoch University, 2011. https://researchrepository.murdoch.edu.au/id/eprint/41700/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.

Full text
Abstract:
The advent of virtualization technologies has evolved the IT infrastructure and organizations are migrating to virtual platforms. Virtualization is also the foundation for cloud platform services. Virtualization is known to provide more security into the infrastructure apart from agility and flexibility. However security aspects of virtualization are often overlooked. Various attacks to the virtualization hypervisor and its administration component are desirable for adversaries. The threats to virtualization must be rigorously scrutinized to realize common breaches and knowing what is more attractive for attackers. In this thesis a current state of perimeter and operational threats along with taxonomy of virtualization security threats is provided. The common attacks based on vulnerability database are investigated. A distribution of the virtualization software vulnerabilities, mapped to the taxonomy is visualized. The famous industry best practices and standards are introduced and key features of each one are presented for safeguarding the virtualization environments. A discussion of other possible approaches to investigate the severity of threats based on automatic systems is presented.
APA, Harvard, Vancouver, ISO, and other styles
6

Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Full text
Abstract:
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1 standard. A co-operation between the technical solutions and the administrative security is necessary to achieve information security, together with ordinary common sense. True, each of these can help improve security, but none of them is a complete solution. Security is not a product - it is a process. Threat trees form the basis of understanding that process. In this thesis, we have been using a qualitative method. The analysis method is a case study at the Social Department, at the municipality in Ronneby. Through interviews it has come us to hand, that the organisation has not established an information security policy which should give the code of practice for how the work of information security will pursue within the organisation. The organisation does neither use a model for structuring threats nor a method for collecting threats against information today. Through the structure of possible threats, the personnel generates an understanding of the organisation and takes active part finding adequate threats within the Social Department. As users understand the importance of security, how to use it, and where to report suspected violations, they can do a great deal to reduce the risk to loose information. Important to remember is that the education is an ongoing process, new users need training and trained users need reminding, especially when new technologies or processes are introduced. Thus, Threat Tree Analysis is useful for continuing towards developing an information security policy according to SS 62 77 99-1 standard.
För att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
APA, Harvard, Vancouver, ISO, and other styles
7

Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.

Full text
Abstract:
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study is: What is the nature, scope and basis of the post-1994 official external threat perception of South Africa? The research problem generated four subsidiary questions: When does a security issue become a national threat? What types of threat are there? How does the South African government perceive these threats? And whose security is threatened? In responding to the main research questions, the study‟s findings note a change in perceptions during the post-Cold War era as to what constituted threats to security. The focus shifted from traditional to non-traditional threats to national security, because most current threats are non-military and transnational in nature. The analysis of South Africa‟s official external threat perception is informed by the changed views of Government towards what are considered the main threats to national security. The study concludes with key findings in response to the stated problem and with specific recommendations. The study confirmed that the nature of threats and security debates post-1994 have changed constantly with the expansion of the security agenda beyond state and military security. The official viewpoint is that South Africa at present is not faced with any military threats. Emphasis is currently placed on human beings as the main object of security. Most identified threats are transnational in nature and these relate to the illegal flow of immigrants, terrorism, organised crime, climate change (linked to food and water security), regional instability and other socio-economic threats. These threats are being perceived and articulated by Government through policy announcements and public speeches, also validated in the critical analysis of various scholars. The concept of non-traditional threats still lacks a commonly accepted definition; hence the study proposes the need for South Africa to define and outline non-military security threats in a comprehensive manner, preferably through the development of a South African External Threat Perception Framework. Developing such a framework will assist security agencies (such as analysts) and other stakeholders in providing advice and guidance to Government in identifying external security threats. This initiative could eliminate the abuse of power by various stakeholders in securitising any issue as a threat to national security, and instead divert those resources to other Government services. Provision should also be made in the form of policy initiatives on the role of military force and other agencies in addressing non-military security threats. Thus, the development of key elements of an integrated national security strategy in order to address external security issues and threats is essential.
Dissertation (MSecurity Studies)--University of Pretoria, 2013.
gm2015
Political Sciences
MSecurity Studies
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Jong-Eun Roselyn. ""A threat on the net" : stereotype threat in avatar-represented online groups /." May be available electronically:, 2009. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Munshi, Asmaa Mahdi. "A study of insider threat behaviour: developing a holistic insider threat model." Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1668.

Full text
Abstract:
This study investigates the factors that influence the insider threat behaviour. The research aims to develop a holistic view of insider threat behaviour and ways to manage it. This research adopts an Explanatory Mixed Methods approach for the research process. Firstly, the researcher collects the quantitative data and then the qualitative data. In the first phase, the holistic insider threat model is developed; in the second phase, best practices are developed to manage the threat.
APA, Harvard, Vancouver, ISO, and other styles
10

Roberts, Marianne. "Threat processing in fibromyalgia." Thesis, University of Southampton, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617820.

Full text
Abstract:
This thesis considers recent advances in the conceptualisation of pain and in particular, the contribution of Neuromatrix theory (Melzack 1990, 1999,2005), which implicates threat processing biases in the aetiology and maintenance of chronic pain. Fibromyalgia is presented as a condition that can particularly benefit from this understanding. Guided by research into threat processing biases in anxiety, the literature on attentional bias to threat in chronic pain and fibromyalgia is reviewed, with special emphasis on the Stroop and visual probe paradigms. This highlights that a number of chronic pain conditions might be associated with attentional bias to pain. related threat; however the literature is inconsistent and there is a dearth of research using fibromyalgia samples. The limited research that has used pure fibromyalgia sample indicates that fibromyalgia might be associated with a generalised, rather than pain/disorder-specific, threat bias. Thus, an empirical study is also presented, that aims to establish whether fibromyalgia is associated with attentional bias to threat, as a method of gaining insight into possible, broader threat processing abnormalities. Visual probe methodology was used to test selective attention to generalised threat words in a sample of 34 fibromyalgia patients and healthy controls. Results showed a trend towards an interaction between group and the measures of attentional bias, with evidence that this related to hypervigilance to threat in the fibromyalgia group. This trend did not reach statistical significance (p = .090). There was no further evidence of attentional bias. Further research is needed in order to establish the reliability of these findings and address issues of low power, however the potential that results may be meaningful provides great scope for achieving new insight into fibromyalgia.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Threat"

1

Muñoz, Victoria C. Thread threat: Formaldehyde in textiles. New York: Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Copyright Paperback Collection (Library of Congress), ed. Threat warning. New York: Pinnacle Books/Kensington Pub. Corp., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

The threat. New York: St. Martin's Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cantore, Janice. Visible threat. Waterville, Maine: Thorndike Press, a part of Gale, Cengage Learning, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Opper, Richard Henry. Elemental threat. Claremont, CA: Oak Tree Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1952-, Morrisey Tom, ed. Kiloton threat. Nashville, Tenn: B&H Publishing Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

The threat. New York, NY: Simon & Schuster, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rue, Nancy N. The threat. Minneapolis, Minn: Bethany House Publishers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Emerson, Earl. Primal Threat. New York: Random House Publishing Group, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Guest, Jacqueline. Triple threat. Toronto: J. Lorimer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Threat"

1

Wolf, Marilyn, and Dimitrios Serpanos. "Threats and Threat Analysis." In Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems, 35–45. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25808-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Möller, Dietmar P. F. "Threats and Threat Intelligence." In Advances in Information Security, 71–129. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Das, Ravindra. "Threat Modeling/Threat Hunting." In The Zero Trust Framework, 113–37. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003392965-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weik, Martin H. "threat." In Computer Science and Communications Dictionary, 1780. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bruce, Toni. "Threat." In Terra Ludus, 73–78. Rotterdam: SensePublishers, 2016. http://dx.doi.org/10.1007/978-94-6300-770-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Verschelden, Cia, and Kofi Lomotey. "Stereotype Threat and Identity Threat." In Bandwidth Recovery For Schools, 31–35. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003443162-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"From threat to threat." In The Routledge Companion to UK Counter-Terrorism, 280–98. Routledge, 2012. http://dx.doi.org/10.4324/9780203105573-27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"threat." In Dictionary Geotechnical Engineering/Wörterbuch GeoTechnik, 1390. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41714-6_200985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"threat." In Dictionary Geotechnical Engineering/Wörterbuch GeoTechnik, 1390. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41714-6_200986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Threat." In Encyclopedia of Child Behavior and Development, 1486. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-79061-9_5941.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Threat"

1

Languirand, Eric R., Amee Polk, Michael Kauzlarich, Jacob Buchman, and Matthew D. Collins. "Emerging explosive threat analysis for using threat anomaly detection (ThreAD)." In Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) Sensing XXV, edited by Jason A. Guicheteau, Christopher R. Howle, and Tanya L. Myers. SPIE, 2024. http://dx.doi.org/10.1117/12.3016072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Clark, K., C. Lee, S. Tyree, and J. Hale. "Guiding Threat Analysis with Threat Source Models." In 2007 IEEE SMC Information Assurance and Security Workshop. IEEE, 2007. http://dx.doi.org/10.1109/iaw.2007.381942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cain, Curtis C., and Eileen M. Trauth. "Stereotype threat." In the 2013 annual conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2487294.2487305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pramanik, Sarah. "Threat motivation." In 2013 10th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT). IEEE, 2013. http://dx.doi.org/10.1109/cewit.2013.6851346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yskout, Koen, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, and Wouter Joosen. "Threat modeling." In ICSE '20: 42nd International Conference on Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377816.3381741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ho, Shuyuan Mary, Hengyi Fu, Shashanka S. Timmarajus, Cheryl Booth, Jung Hoon Baeg, and Muye Liu. "Insider Threat." In SIGMIS-CPR '15: 2015 Computers and People Research Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751957.2751978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Casey, Timothy, Patrick Koeberl, and Claire Vishik. "Threat agents." In the Sixth Annual Workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1852666.1852728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kohli, Harpreet, Dale Lindskog, Pavol Zavarsky, and Ron Ruhl. "An Enhanced Threat Identification Approach for Collusion Threats." In 2011 Third International Workshop on Security Measurements and Metrics (Metrisec). IEEE, 2011. http://dx.doi.org/10.1109/metrisec.2011.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shrivas, Mahendra Kumar, Thomas Yeboah Dean, and S. Selva Brunda. "The Disruptive Blockchain Security Threats and Threat Categorization." In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chibueze Brendan, Ahuokpeme, and John McCarthy. "Taxonomy of Threat Categorization and Threat Intelligence Platform." In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). IEEE, 2019. http://dx.doi.org/10.1109/icgs3.2019.8688157.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Threat"

1

Woodard, Laura, Cynthia K. Veitch, Sherry Reede Thomas, and David Patrick Duggan. Categorizing threat : building and using a generic threat matrix. Office of Scientific and Technical Information (OSTI), September 2007. http://dx.doi.org/10.2172/921121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Webb, Jeff. Cooperative Threat Reduction. Fort Belvoir, VA: Defense Technical Information Center, April 1997. http://dx.doi.org/10.21236/ada398063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Duggan, David Patrick. Generic threat profiles. Office of Scientific and Technical Information (OSTI), July 2005. http://dx.doi.org/10.2172/882540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kessler, Andrew, Michael Shewfelt, Jennifer Davis, Brian Connett, Jared Chiu-Rourman, Joseph Oravec, Shaunnah Wark, Ling Siew Ng, Seng Chuan Lim, and Cheng Lock Chua. Maritime Threat Response. Fort Belvoir, VA: Defense Technical Information Center, June 2006. http://dx.doi.org/10.21236/ada462563.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Frye, Jason Neal, Cynthia K. Veitch, Mark Elliot Mateski, John T. Michalski, James Mark Harris, Cassandra M. Trevino, and Scott Maruoka. Cyber threat metrics. Office of Scientific and Technical Information (OSTI), March 2012. http://dx.doi.org/10.2172/1039394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

McKinney, Terry L., Timothy E. Moore, Robert E. Bender, Steven I. Case, Cheryl L. Snyder, Karen A. Ulatowski, David P. Goodykoontz, Kevin G. Burrowes, Breon E. Dehoux, and Theresa L. Tameris. Cooperative Threat Reduction: Contracts Awarded by the Defense Threat Reduction Agency in Support of the Cooperative Threat Reduction Program. Fort Belvoir, VA: Defense Technical Information Center, August 2004. http://dx.doi.org/10.21236/ada433189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Characterization. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Threat Definition. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Patrick Treado, Oksana Klueva, and Jeffrey Beckstead. Airborne Particulate Threat Assessment. Office of Scientific and Technical Information (OSTI), December 2008. http://dx.doi.org/10.2172/966354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Young, Byron J. Terrorism: Analyzing the Threat. Fort Belvoir, VA: Defense Technical Information Center, April 1998. http://dx.doi.org/10.21236/ada344982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography