Academic literature on the topic 'Threats'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Threats"

1

Kiely, P., and C. R. Seed. "Assessing infectious threats - trick or threat?" ISBT Science Series 10, S1 (April 2015): 65–72. http://dx.doi.org/10.1111/voxs.12114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Muhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (October 12, 2021): 11259. http://dx.doi.org/10.3390/su132011259.

Full text
Abstract:
As the human population increases, the landscape is altered to provide housing, food, and industry. Human activity poses a risk to the health of natural habitats that, in turn, affect biodiversity. Biodiversity is necessary for a functioning ecosystem, as species work synergistically to create a livable environment. It is, therefore, important to know how human practices and natural events threaten these habitats and the species living in them. A universal method of modeling habitat threats does not exist. This paper details the use of a literature review to formulate a new framework called Define–Investigate–Estimate–Map (DIEM). This framework is a process of defining threats, investigating an area to discover what threats are present, estimating the severity of those threats, and mapping the threats. Analysis of 62 studies was conducted to determine how different authors define and characterize threats in various contexts. The results of this analysis were then applied to a case study to evaluate the Choctawhatchee River and Bay Watershed. Results suggest that the most abundant threat in the watershed is agricultural development, and the most destructive threat is urban development. These two threats have the greatest impact on the total threat level of the watershed. Applying the DIEM framework demonstrates its helpfulness in regional analysis, watershed modeling, and land development planning.
APA, Harvard, Vancouver, ISO, and other styles
3

Muhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (October 12, 2021): 11259. http://dx.doi.org/10.3390/su132011259.

Full text
Abstract:
As the human population increases, the landscape is altered to provide housing, food, and industry. Human activity poses a risk to the health of natural habitats that, in turn, affect biodiversity. Biodiversity is necessary for a functioning ecosystem, as species work synergistically to create a livable environment. It is, therefore, important to know how human practices and natural events threaten these habitats and the species living in them. A universal method of modeling habitat threats does not exist. This paper details the use of a literature review to formulate a new framework called Define–Investigate–Estimate–Map (DIEM). This framework is a process of defining threats, investigating an area to discover what threats are present, estimating the severity of those threats, and mapping the threats. Analysis of 62 studies was conducted to determine how different authors define and characterize threats in various contexts. The results of this analysis were then applied to a case study to evaluate the Choctawhatchee River and Bay Watershed. Results suggest that the most abundant threat in the watershed is agricultural development, and the most destructive threat is urban development. These two threats have the greatest impact on the total threat level of the watershed. Applying the DIEM framework demonstrates its helpfulness in regional analysis, watershed modeling, and land development planning.
APA, Harvard, Vancouver, ISO, and other styles
4

Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.

Full text
Abstract:
The research aims at establishing which activities or situations in maritime domain, which threaten maritime safety and / or maritime security, fall within the concept of international peace and security. Having demonstrated the validity of the international law principles that safeguard international peace and security in maritime area, the research reveals a changing list of the threats to international peace and security, which now encompasses activities and situations at sea, including terrorism, sea piracy and armed robbery against ships, proliferation of weapons of mass destruction, etc. A maritime space safe from such kind of threats generally means maritime security. Thus, a great part of the threats to maritime security are or may constitute threats to international peace and security, subject to their recognition as such threats by the United Nations Security Council in its resolutions. Usually such threats also pose risk to maritime safety (safety at sea, safety of navigation, ships, crew and passengers); however, any threat to maritime safety does not necessarily endanger maritime security or amount to the threat to international peace and security.
APA, Harvard, Vancouver, ISO, and other styles
5

MUGISHA, ARTHUR R., and SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda." Environmental Conservation 31, no. 3 (September 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.

Full text
Abstract:
Loss of wildlife, encroachment on wild lands and conflicts between protected areas and neighbouring communities continue to threaten the integrity of protected areas (PAs) in Uganda. To increase support from local communities and ensure long-term sustainability for Uganda's PAs, a policy of community-based conservation was introduced in 1988 as a management approach in seven PAs. The effectiveness of the community-based approach for reducing threats was compared to conventional PA management by conducting a threat reduction assessment at 16 PAs, seven with community-based approaches and nine without. Additional data collected using document reviews, interviews with government officials, and surveys of PA wardens were compared with the threat reduction assessments. Twenty-three primary threats were identified at PAs. Local game poaching was the most common threat. The threat reduction assessment indices of community-based PAs (mean=49.0±12) were not significantly different from those of conventional PAs (mean=37.96±21.6). Some specific threats, such as bush burning, logging, encroachment and unclear boundaries, seemed to be better mitigated at community-based PAs. Management approaches at all PAs mitigated fewer than half of the identified threats. Management approaches are needed that directly target PA threats, go beyond PA boundaries by involving additional government departments, link people's livelihoods to conservation efforts and strengthen PA institutions.
APA, Harvard, Vancouver, ISO, and other styles
6

Shapiro, Jenessa R. "Different Groups, Different Threats: A Multi-Threat Approach to the Experience of Stereotype Threats." Personality and Social Psychology Bulletin 37, no. 4 (March 24, 2011): 464–80. http://dx.doi.org/10.1177/0146167211398140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hjerm, Mikael, and Kikuko Nagayoshi. "The composition of the minority population as a threat: Can real economic and cultural threats explain xenophobia?" International Sociology 26, no. 6 (May 26, 2011): 815–43. http://dx.doi.org/10.1177/0268580910394004.

Full text
Abstract:
This article sets out to develop a classical theme of empirical research within group threat theory, namely the argument that the size of the minority population threatens the majority population. To be able to clarify the mixed empirical results within this version of group threat theory, the article focuses on the composition of the immigrant population. The article tests both objective sources of cultural threats (linguistic composition and the Muslim population) and economic threats (the proportion of working-class individuals and the unemployed among the immigrant population). The study concludes that, first, the composition of the immigrant population is of utter importance for the size argument to be valid for cultural threats (proportion of Muslim population), whereas for economic threats it does not matter. Second, compositional economic threats matter strongly to the group that genuinely competes for scarce resources – the working class is more xenophobic when the immigrant working class is large. Third, the study brings some clarity with regard to the cultural composition of the immigrant population: it is shown that the relationship between Muslims and European majority populations mirrors the relationship between whites and African-Americans in the US.
APA, Harvard, Vancouver, ISO, and other styles
8

Bezzubov, Dmytro, Ruslan Ihonin, and Ihor Diorditsa. "Cyberthreats as a Component of Threats in the Contemporary World (a Legal Aspect)." Journal of Advanced Research in Law and Economics 8, no. 7 (June 7, 2018): 2086. http://dx.doi.org/10.14505//jarle.v8.7(29).04.

Full text
Abstract:
In their paper, the authors studied legal understanding of cyber threats in the contemporary world. The emphasis was placed on the fact thatthere is no definition of ʽcyber threatsʼ at both the international and domestic levels, which leads to adverse consequences. The authors suggested their own perception of ʽa cyber threatʼ – illegal punishable acts of subjects of information legal relations that create a danger to vital interests of man, society and the state as a whole, fulfillment of which depends on proper operation of information, telecommunication and information telecommunication systems, as well as to relations associated with information production, collection, acquisition, storage, use, dissemination, protection, and security. It is stated that the essence of cyber threatsconsists in their sources, that is, in subjects of information legal relations, while information is their direct target. Information interventions pose a major threat to cybersecurity. It was noted that threats can be both internal and external. To develop an effective mechanism able to counter cyber threatsto Ukraine, it is suggested taking current practices of foreign countries and the international community as a model and bringing them in line with the Ukrainian realities.
APA, Harvard, Vancouver, ISO, and other styles
9

Bezzubov, Dmytro, Ruslan Ihonin, and Ihor Diorditsa. "Cyberthreats as a Component of Threats in the Contemporary World (a Legal Aspect)." Journal of Advanced Research in Law and Economics 8, no. 7 (December 30, 2017): 2086. http://dx.doi.org/10.14505/jarle.v8.7(29).04.

Full text
Abstract:
In their paper, the authors studied legal understanding of cyber threats in the contemporary world. The emphasis was placed on the fact thatthere is no definition of ʽcyber threatsʼ at both the international and domestic levels, which leads to adverse consequences. The authors suggested their own perception of ʽa cyber threatʼ – illegal punishable acts of subjects of information legal relations that create a danger to vital interests of man, society and the state as a whole, fulfillment of which depends on proper operation of information, telecommunication and information telecommunication systems, as well as to relations associated with information production, collection, acquisition, storage, use, dissemination, protection, and security. It is stated that the essence of cyber threatsconsists in their sources, that is, in subjects of information legal relations, while information is their direct target. Information interventions pose a major threat to cybersecurity. It was noted that threats can be both internal and external. To develop an effective mechanism able to counter cyber threatsto Ukraine, it is suggested taking current practices of foreign countries and the international community as a model and bringing them in line with the Ukrainian realities.
APA, Harvard, Vancouver, ISO, and other styles
10

Syomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.

Full text
Abstract:
Introduction. The functioning of agrarian business entities is constantly influenced by external and internal envi-ronmental factors, some of which threaten its organizational and legal security. Given the novelty of investigated security, the issue of determination threats in this area, identifying management tools, methods, and strategies is relevant, as it allows us to consider enterprise security more broadly than in the traditional economic sense. The purpose of the study is to identify the main tools for managing organizational and legal security and to develop a scheme for preventive management. Results. The difference between risks and threats is clarified. The classification of threats into controlled and uncon-trolled has been done. A description of the methodological basis structure of organizational and legal security management is given. The stages of managing threats to the organizational and legal security of agrarian business entities have been determined. In the identification phase, the external environment is analyzed by a variety of factors and the internal envi-ronment by the mental map of stakeholder interests, needs and values, as well as by areas: efficiency of organizational struc-ture, hierarchy of authorities, system of power delegation, motivational system, control of production quality, processes of products sale, the mode of payment of the ward and the provision of annual leave, keeping of all forms of reporting, financial discipline, ecological standards control of activity. The external environment of the agrarian business entities functioning is analyzed in relation to possible threats to organizational and legal security. The development of a threat management plan is considered. The nature of the implicit threats and the ways to manage them are described, which involves allocating a budget to cover unforeseen losses. The description of the stage of quantitative and qualitative analysis in threat management is given. The development description of the threat classification scale is presented. The path of threat priority analysis is determined, which involves the matrix development of threats placement on two parameters: probability of occurrence and degree of impact. The description of quantitative methods of threat assessment is presented. The definition of the budget amount for the implementation of the organizational and legal security management strategy is given. The methodological support for the choice of the organizational and legal security management strategy has been presented using the method of hierarchy analysis based on the criteria of efficiency, cost and effectiveness. The system of preventive management of organi-zational and legal security of agrarian business entities is presented. Key words: threats, risks, organizational and legal security, agrarian subject, threat management strategy, threat identification, quantitative analysis, qualitative analysis, method of hierarchy analysis.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Threats"

1

Chavez, Felicia India. "Sustainability and Spirituality| Common Threads and Common Threats." Thesis, Pacifica Graduate Institute, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10278487.

Full text
Abstract:

Common principles, or threads, are studied that are readily found in both spiritual traditions (including religion) and in the field of sustainability. Oneness, Living Simply, Purity, and Care and Heart are examined at length, while Awakening, Awe and Wonder, and Preservation of Life are covered briefly. Opposite principles—for example, Oneness versus Fracturedness, and Purity versus Pollution—are analyzed as well. Principles and their opposites are found to have both high and low modes. Each polarity has life-supporting and life-degrading forms.

Spiritual and religious traditions are grouped into five broad categories. While three of the categories consist of world religions (traditions of Indian origin, Abrahamic traditions, and East Asian traditions), also included are indigenous traditions, alchemy and Hermeticism, and modern spiritual teachings. Sustainability is organized into three categories: ecological science, activism, and sustainable business.

The common threads between sustainability and spirituality are most reliably found in the segments of world religions that tend toward mysticism, and within teachings that emphasize the cultivation of a greater capacity for just awareness, or presence itself, such as Eckhart Tolle’s works. Indigenous traditions shine as examples of societies that have embodied, and in some cases, continue to embody life-supporting principles far more explicitly and fully than cultures that have lost intimacy with their local ecosystems.

The conclusions drawn based on findings is that wisdom traditions corroborate the idea that the outer world is a reflection of the inner world, and that improving the state of the planet therefore requires personal transformation as a prerequisite to outer improvements. A higher order of intelligence, or nous, referenced in multiple mystical traditions, is indispensable to sustainability work. This and other spiritual principles directly inform sustainability efforts, but to be fully employed they require first-hand, personal experience of spiritual realities. Those who would work toward a genuinely sustainable society are urged to pursue mystical or presence-based spiritual training and experience as a matter of urgency, including direct interaction with nature to facilitate rebuilding intimacy with ecosystems, combined with deepening understanding of ecologically sophisticated indigenous lifeways.

APA, Harvard, Vancouver, ISO, and other styles
2

Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Full text
Abstract:
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1 standard. A co-operation between the technical solutions and the administrative security is necessary to achieve information security, together with ordinary common sense. True, each of these can help improve security, but none of them is a complete solution. Security is not a product - it is a process. Threat trees form the basis of understanding that process. In this thesis, we have been using a qualitative method. The analysis method is a case study at the Social Department, at the municipality in Ronneby. Through interviews it has come us to hand, that the organisation has not established an information security policy which should give the code of practice for how the work of information security will pursue within the organisation. The organisation does neither use a model for structuring threats nor a method for collecting threats against information today. Through the structure of possible threats, the personnel generates an understanding of the organisation and takes active part finding adequate threats within the Social Department. As users understand the importance of security, how to use it, and where to report suspected violations, they can do a great deal to reduce the risk to loose information. Important to remember is that the education is an ongoing process, new users need training and trained users need reminding, especially when new technologies or processes are introduced. Thus, Threat Tree Analysis is useful for continuing towards developing an information security policy according to SS 62 77 99-1 standard.
För att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
APA, Harvard, Vancouver, ISO, and other styles
3

Gobran, Ashraf. "Cyber terrorrism threats." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1588500.

Full text
Abstract:

The purpose of this study is to explore the potential threats that are posed uniquely by cyber terrorism. While traditional terrorism has affected governmental policy, and inflicted physical damage to people and infrastructure across the world, computers and the Internet can allow for attacks as well. As terrorism groups begin to adapt to, and take advantage of - cyber tools and capabilities, the threat they pose will grow accordingly. While a terrorist is not able to directly kill people with cyber tools, the mayhem or social disruption that such attacks can cause, fit well with these organization's objectives. The anonymity of cyber space permits terrorist groups to plan and execute attacks without being identified immediately, if ever. In addition, the targets of cyber terrorists are often under prepared, and fairly vulnerable to various forms of cyber attacks. While these organizations may be aware of the risk posed by failing to adequately address cyber security deficiencies, their solutions are likely not sufficient to truly prevent cyber terrorism attacks. In order to discover technological advancements, efficient cyber security, and generally spread awareness on the subject, this study attempts to highlights existing threats, as well as an overview of what can be done to mitigate them.

Keywords: Intelligence, Cyber security, Professor Albert Orbanati

APA, Harvard, Vancouver, ISO, and other styles
4

Douglas, Michael L. Gray Arlene J. "The Warfighters' Counterspace Threat Analysis (WCTA) : a framework for evaluating counterspace threats /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA384609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Douglas, Michael L., and Arlene J. Gray. "The Warfighters' Counterspace Threat Analysis (WCTA): a framework for evaluating counterspace threats." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/7830.

Full text
Abstract:
Approved for public release; distribution is unlimited
The authors present an evolutionary approach to evaluating the counterspace threat in support of Department of Defense (DoD) decision-makers. The goal is to present a process that decision-makers can readily utilize to accurately assess the level of the counterspace threat originating within their Area of Responsibility (AOR). It is particularly useful as the state of affairs change within the AOR. The authors examine the necessity to utilize space to achieve information dominance, strengths and weaknesses of present Counterspace Threat Models, DoD's increasing dependence on space assets, DoD's reliance on commercial space systems to meet future requirements, and potential adversaries' awareness of the dependence of U.S. forces on space systems. Conclusions stress that the threat is comprised of two essential elements an opponent's willingness to employ a counterspace tactic (their intent) and the opponent's ability to develop the necessary tools to employ a counterspace tactic (their capability). The authors believe that the "intent" component of the threat changes more rapidly than the present models can easily accommodate. Therefore, a process, such as the one presented in this thesis, will enable DoD decision-makers that experience many of the changes of 'intent' first hand to rapidly and accurately assess the threat as the condition changes within the AOR
APA, Harvard, Vancouver, ISO, and other styles
6

Williamson, Harley M. "Veiled Threats: How Do Identity Threats Shape Muslims' Support for Terrorism?" Thesis, Griffith University, 2020. http://hdl.handle.net/10072/397051.

Full text
Abstract:
In recent decades, Islamic-inspired terrorism has worsened intergroup tensions between Muslims and non-Muslims in western democratic countries, including Australia. Muslims and Islam are often linked with terrorism, and the resulting tension between Muslims and non-Muslims has fostered an “us” versus “them” mentality (Blackwood et al., 2013b). Some research suggests that the alienation Muslims feel as a result of the stigma they have faced in recent years can push some Muslims towards radicalisation (Dalgaard-Nielsen, 2010; Dugan & Distler, 2016). In my dissertation, I propose that the disproportionate scrutiny that Muslims face in western democratic countries may lead some Muslims to support terrorism. Drawing on Social Identity Theory (SIT), my dissertation centres on the proposition that Muslims’ support for terrorism may manifest when some Muslims experience identity threats from non-Muslims. I propose that a feedback loop exists whereby non-Muslims’ attitudes and actions towards Muslims, as well as ingroup/ out-group tensions between Muslims and non-Muslims, may lead some Muslims in Australia to experience identity threats. I propose that non-Muslims might come to hold punitive views towards Muslims because they perceive Muslims to be a realistic, symbolic and terroristic threat and that their national identity as Australians can influence this association. I also suggest that Muslims can come to perceive that their identities are threatened by (1) feeling stigmatised and (2) believing that others are punitive towards Muslims (conceptualised in my dissertation as meta-punitiveness). I further argue that the strength of a Muslim’s national and religious identity might influence how susceptible some Muslims are to these identity threats. Existing studies typically focus on how support for terrorism may arise amongst Muslims living in Muslim-majority countries. Yet, few studies consider how Muslims come to support terrorism when they constitute a minority group in a western country. My research takes place in Australia. My dissertation focuses on both Muslims and non-Muslims living in Australia to examine the ingroup/out-group tensions between the two groups. Doing so will result in a more thorough understanding of how and why some Muslims might come to support terrorism. My dissertation presents three interrelated studies. Together, these three studies demonstrate how the attitudes and behaviours of one group (i.e., non-Muslims) have the potential to impact the attitudes and behaviours of another group (i.e., Muslims) and vice versa. Studies 1 and 2 utilise survey data I collected from 1,193 non-Muslim Australians. In the Attitudes to Punishment Survey, I presented participants with information depicting a terrorist event whereby the motivation forthe attack was described as being Islamic-inspired or right-wing-inspired. Study 1 explores if non-Muslims hold more punitive attitudes towards the perpetrator motivated by Islamic-inspired terrorism relative to the perpetrator motivated by right-wing-inspired terrorism. It also explores the extent to which non-Muslims see Muslims as a realistic, symbolic and terroristic threat and believe that Muslims support terrorism. Study 2 draws on SIT to understand how non-Muslims’ attitudes towards Muslims are associated with their support for punitive counter-terrorism policies. Study 2 tests if non-Muslims’ Australian national identity is related to their perceptions of Muslims as a realistic, symbolic and terroristic threat and their support for punitive counter-terrorism policies. Study 3 draws on secondary survey data from 398 Muslim Australians collected in the Sydney Immigrant Survey (SIS). Study 3 investigates if Muslims’ experiences of identity threat (i.e., feeling stigmatised and feeling non-Muslims are punitive towards Muslims) are associated with their support for terrorism. Moreover, Study 3 considers whether or not identity (i.e., both their Australian national identity and their religious identity) plays a role in mitigating or exacerbating the association between identity threats on Muslims’ support for terrorism. Together, the findings from Studies 1 and 2 demonstrate a positive association between perceiving Muslims as a realistic, symbolic and terroristic threat, holding a strong national identity, and supporting punitive counter-terrorism policies. In Study 1, I find that non-Muslim Australian participants on average: (a) held more punitive views of counter-terrorism policies, (b) viewed Muslims as a realistic, symbolic and terroristic threat, and (c) believed that Muslims support terrorism if they received a vignette describing a suspect inspired by Islamic-inspired compared to right-wing-inspired motives. In Study 2 I find that non-Muslims’ Australian national identity was positively associated with their (a) perceptions of Muslims as a realistic, symbolic and terroristic threat, and (b) support for punitive counterterrorism policies. Specifically, those non-Muslims who held a stronger national identity perceived Muslims as a greater threat and were more supportive of punitive counter-terrorism policies. In Study 3, I turned my attention to the perspectives and experiences of the Muslim sample. I tested if non-Muslims’ perceptions of threat towards Muslims and their support for punitive counter-terrorism policies (that often target Muslims more than other groups) translated to experiencing a stronger identity threat amongst my Muslim sample. I considered if Muslims’ feelings that others stigmatised them (e.g., viewed them as a suspect) and perceptions that others were punitive towards Muslims because of their race, ethnicity or religion (i.e., meta-punitiveness) would be associated with Muslims’ heightened support for terrorism. I found that experiencing one type of identity threat (i.e., meta-punitiveness) was associated with Muslims’ increased support for terrorism. I also found that holding a strong national identity (i.e., as an Australian) had a protective role in reducing Muslims’ support for terrorism. In sum, I find support for a possible feedback loop, whereby the attitudes and behaviours of non-Muslims may shape an atmosphere instrumental to increasing Muslims’ support for terrorism via their felt identity threats. I argue that support for punitive counter-terrorism policies by non-Muslims may perpetuate the identity threats experienced by Muslims. I conclude that this reinforces the need to address broader public attitudes towards Muslims to prevent the narrative associating Muslims with terrorism. I suggest it is also essential to create an environment conducive to building a national identity amongst Muslim residents. Ensuring that Muslims feel socially included in society and feel a strong affiliation with the nation they live in is vital as other research suggests that people will act in the best interests of groups they feel a secure attachment to (Stephan et al., 2009; Tajfel & Turner, 1986). Preventing terrorism necessitates a whole-of-community response and requires that counter-terrorism initiatives do not alienate or disproportionately affect Muslim communities. Examining support for terrorism through Muslim and non-Muslim perceptions will help to reframe the divisive “us” versus “them” discourse into a more collective “we.”
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Crim & Crim Justice
Arts, Education and Law
Full Text
APA, Harvard, Vancouver, ISO, and other styles
7

Kateraas, Christian H. "Threats to Bitcoin Software." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27224.

Full text
Abstract:
Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.
APA, Harvard, Vancouver, ISO, and other styles
8

Ibbetson, Paul A. "Changing public threats and police priorities: How police chiefs respond to emerging threats." Diss., Kansas State University, 2011. http://hdl.handle.net/2097/13104.

Full text
Abstract:
Doctor of Philosophy
Department of Sociology, Anthropology, and Social Work
Robert K. Schaeffer
Kansas police chiefs are a unique group of individuals. Because are they located throughout the various sized communities within the state, they have the potential to affect the daily lives of more people on a day-today basis than any other branch of law enforcement. The purpose of this study was to analyze how police chiefs prioritize emerging threats. In this study, using a purposeful sample, 40 semi-structured interviews were conducted with Kansas police chiefs across the state. These police chiefs were asked about their views on the biggest emerging threats they have observed within the last 10 years. They were also asked why certain threats become priorities and why others do not. Police chiefs were split on their thoughts of whether or not they believed resources should be allocated in their communities to defend against terrorism in Kansas. What was discovered during the research process went beyond learning about the process of change for threat prioritization, or what specific threats Kansas police chiefs think their communities are facing today. What was discovered was a deeper understanding of how police chiefs think when it comes to the relationship between police departments, police personnel, and community. As police chiefs addressed the processes by which they go about prioritizing emerging threats, they illuminated a unique strategy hierarchy for success that is centered on maintaining positive departmental perception. To maintain this perception, police chiefs work both officially and covertly within governmental structures and the public sphere to control how people think about their personnel and department. A prominent difference was seen in the physical proximity and accessibility of police chiefs to the community between small, medium, and large towns. In effect, to come to an understanding of the process of prioritization for emerging threats for Kansas police chiefs, it was necessary to understand these police administrators’ unique thought processes that they bring to the table when addressing important issues.
APA, Harvard, Vancouver, ISO, and other styles
9

Moore, Febbie P. "Windows NT threats and vulnerabilities." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341457.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September. 1997.
"September 1997." Thesis advisor(s): Norman Schneidewind, Douglas Brinkley. Includes bibliographical references (p. 47). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
10

Mahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.

Full text
Abstract:
With the emergence of multimedia applications and the upcoming age of Voice over IP (VoIP), Voice setup and resources control protocols such as SIP and H.323 over the Internet are becoming increasingly attractive applications. In the last few years as a real competitor in traditional telephony services (PSTN), SIP has gained much attention when compared with H.323. SIP works at presentation and application layer thus it mainly faces security issue at these layers. The objective of this thesis is to describe the most relevant SIP related security issues and then present security mechanisms that can be deployed to overcome the SIP security related issues. This project work demonstrates the tasks necessary to enhance the SIP security both inside and outside of the network. It is divided into three main parts, where the first part describes the SIP architecture, for example, the SIP rivals, SIP components and how a SIP system works. The second part is about some vulnerability issues of concern to SIP, study of the proposed security mechanism and also analysis on how possible threats to the SIP system such as call hijacking, message tempering and DoS attack, affect the SIP based VoIP system. The third and final part describes different steps that have been taken to avoid SIP attacks, by implementing some of the proposed security mechanisms. In order to test the SIP security, a SIP model is designed, which based on security mechanisms such as firewall, IPSec, DMZ and SIP-TLS. The results are conducted into two different scenarios. In the 1st scenario, the SIP system is tested before implementing the security measurements. In this case, the insecure system was vulnerable to several SIP attacks such as call hijacking, DOS and message tampering. In the 2nd scenario, the system is tested after the implementation of the proposed security mechanisms, where by the system now is only accessible to the authorized users and services. The tested results are also compared and discussed at the end.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Threats"

1

Gray, Amelia. Threats. New York: Farrar, Straus and Giroux, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arduin, Pierre-Emmanuel. Insider Threats. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119419785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Copyright Paperback Collection (Library of Congress), ed. Veiled threats. New York, NY: Dell Pub., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weinrich, Mark. Deadly threats. Camp Hill, PA: Horizon Books, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Scholefield, Alan. Threats & menaces. Anstey: F. A. Thorpe, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Duarte-Davidson, Raquel, Tom Gaulton, Stacey Wyke, and Samuel Collins, eds. Chemical Health Threats. Cambridge: Royal Society of Chemistry, 2018. http://dx.doi.org/10.1039/9781782623687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Vipin, Jaideep Srivastava, and Aleksandar Lazarevic, eds. Managing Cyber Threats. New York: Springer-Verlag, 2005. http://dx.doi.org/10.1007/b104908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tiratsoo, J. N. H. Managing pipeline threats. Houston, TX, USA: Clarion Technical Publishers, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1955-, Scott Jerry, ed. Threats, bribes & videotape. Kansas City, Mo: Andrews McMeel, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Eaton, Jonathan. Threats and promises. Cambridge, MA: National Bureau of Economic Research, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Threats"

1

Wolf, Marilyn, and Dimitrios Serpanos. "Threats and Threat Analysis." In Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems, 35–45. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25808-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Möller, Dietmar P. F. "Threats and Threat Intelligence." In Advances in Information Security, 71–129. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Watters, Paul A. "Threats." In Cybercrime and Cybersecurity, 28–42. New York: CRC Press, 2023. http://dx.doi.org/10.1201/9781003406730-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kabay, M. E. "Threats." In The Expert in the Next Office, 134–39. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003354536-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Morgan, Patrick M. "Security Issues: Old Threats, New Threats, No Threats." In Asia’s New World Order, 76–109. London: Palgrave Macmillan UK, 1997. http://dx.doi.org/10.1007/978-1-349-14137-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bennett, Kevin. "Ancestral Threats vs. Modern Threats." In Encyclopedia of Evolutionary Psychological Science, 1–3. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-16999-6_2997-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Meadows, Catherine. "A representation of protocol attacks for risk assessment." In Network Threats, 1–10. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhou, Dan, and Shiu-Kai Chin. "Verifying privacy enhanced mail functions with higher order logic." In Network Threats, 11–20. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Joye, Marc, and Jean-Jacques Quisquater. "Cryptanalysis of RSA-type cryptosystems: A visit." In Network Threats, 21–31. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Patel, Sarvar. "Information leakage in encrypted key exchange." In Network Threats, 33–40. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Threats"

1

Mathiasen, Niels Raabjerg, and Susanne Bødker. "Threats or threads." In the 5th Nordic conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1463160.1463191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vasenev, Alexandr, and Lorena Montoya. "Analysing non-malicious threats to urban smart grids by interrelating threats and threat taxonomies." In 2016 IEEE International Smart Cities Conference (ISC2). IEEE, 2016. http://dx.doi.org/10.1109/isc2.2016.7580878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kohli, Harpreet, Dale Lindskog, Pavol Zavarsky, and Ron Ruhl. "An Enhanced Threat Identification Approach for Collusion Threats." In 2011 Third International Workshop on Security Measurements and Metrics (Metrisec). IEEE, 2011. http://dx.doi.org/10.1109/metrisec.2011.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shrivas, Mahendra Kumar, Thomas Yeboah Dean, and S. Selva Brunda. "The Disruptive Blockchain Security Threats and Threat Categorization." In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alwaheidi, Mohammed, Shareeful Islam, Spyridon Papastergiou, and Kitty Kioskli. "Integrating Human Factors into Data-driven Threat Management for Overall Security Enhancement." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004778.

Full text
Abstract:
Human and other non-technological issues are often overlooked, which directly and indirectly contributing to many successful cyber attacks, including DoS, social engineering, download-driven attacks, and more. Considering human issues as causes for internal threats and weaknesses, a deeper understanding of these factors is essential for overall security enhancement. Therefore, organizations of all sizes need to ensure a broad range of knowledge, skills, and awareness among all user levels, from individual end-users to security practitioners. However, this task is challenging due to the evolving nature of business, systems, and threat contexts. To address this challenge, our research represents a significant advancement in holistic and comprehensive threat assessments, surpassing existing practices by considering pertinent human factors. Our approach views humans as potential weaknesses or threats, influenced by various factors. Specifically, it incorporates key human elements, such as motivation, knowledge, context, and privilege, into the threat management process to enhance overall security. These factors are systematically classified and interconnected, facilitating the identification of weaknesses and threats posed by humans within the system context. For example, depending on the context, privilege can be categorized into three levels: organizational, departmental, and unprivileged, with end-user privileges falling into these classifications. Knowledge, as a human factor in this approach, is differentiated into technological and security awareness. Our proposed approach extends data-driven threat modeling by integrating human factors to identify and assess threats related to these factors. We present a conceptual model that combines human factors with cybersecurity concepts, including data, assets, threats, weaknesses, and controls, to assess and manage threats associated with human factors and evaluated from both insider weaknesses and threat perspectives. This contributes significantly to overall security enhancement, including improving the accuracy of threat assessments, identifying new threats, and developing more effective threat mitigation strategies.
APA, Harvard, Vancouver, ISO, and other styles
6

Hernacki, Brian. "Emerging threats." In the 2005 ACM workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1103626.1103627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

McGough, Andrew Stephen, David Wall, John Brennan, Georgios Theodoropoulos, Ed Ruck-Keene, Budi Arief, Carl Gamble, John Fitzgerald, Aad van Moorsel, and Sujeewa Alwis. "Insider Threats." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808783.2808785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pawlicka, Aleksandra, Michał Choraś, and Marek Pawlicki. "Cyberspace threats." In ARES 2020: The 15th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3407023.3409181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Greitzer, Frank L. "Insider Threats." In NCS '19: Northwest Cybersecurity Symposium. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3332448.3332458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bowles, John B., and William Hanczaryk. "Threat effects analysis: Applying FMEA to model computer system threats." In 2008 Annual Reliability and Maintainability Symposium. IEEE, 2008. http://dx.doi.org/10.1109/rams.2008.4925840.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Threats"

1

Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), February 2021. http://dx.doi.org/10.19088/k4d.2021.019.

Full text
Abstract:
This literature review finds that the main malicious threats to civilian aviation since 1975 are attacks by terrorist groups, deliberate or accidental damage arising from conflicts, and incidents caused by people who work for airlines or airports. While the sector has responded to hijackings and bombings with increasing security since the 1970s, actors seeking to attack aircraft have modified their tactics, and new threats such as liquid explosives and cyber attacks have emerged. Civilian aviation has seen relatively fewer accidents and deaths over the years, but threats remain. The review focuses on malicious threats to civilian aviation. It, therefore, excludes weather events or accidents. The first section lists major malicious threats to civilian aviation since 1975. It includes both actual and planned events (e.g. hijackings that were prevented) that are recorded in open-source documents. Each threat is listed alongside information on its cause (e.g. terrorism, state actions, crime), the context in which it occurred (broader factors shaping the risk including geography, regime type, technology), and its impact (on passengers, policy, security, economic). The second section discusses some of the trends in threats to aviation. Motives for malicious threats include terrorism, crime, asylum-seeking, and insider attacks by aggrieved or mentally ill airline staff. Hijacking has been the most common form of threat, although bombing or suicide attacks have killed more people. Threats may also take the form of accidental attacks on civilian planes misidentified as threats in conflict zones. Experts suggest that growing threats are cyberattacks and the use of unmanned aerial vehicles, although neither has yet caused a major incident.
APA, Harvard, Vancouver, ISO, and other styles
2

Blank, Stephen J. Rethinking Asymmetric Threats. Fort Belvoir, VA: Defense Technical Information Center, September 2003. http://dx.doi.org/10.21236/ada418033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Eaton, Jonathan, and Maxim Engers. Threats and Promises. Cambridge, MA: National Bureau of Economic Research, September 1994. http://dx.doi.org/10.3386/w4849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hallahan, Jason. Countering Insider Threats - Handling Insider Threats Using Dynamic, Run-Time Forensics. Fort Belvoir, VA: Defense Technical Information Center, October 2007. http://dx.doi.org/10.21236/ada473440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Toledo, Claudio. Chile: Its Conventional Threats. Fort Belvoir, VA: Defense Technical Information Center, March 2005. http://dx.doi.org/10.21236/ada431942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shavell, Steven, and Kathryn Spier. Threats without Binding Commitment. Cambridge, MA: National Bureau of Economic Research, February 1996. http://dx.doi.org/10.3386/w5461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Choffness, Eileen. Forum on Microbial Threats. Fort Belvoir, VA: Defense Technical Information Center, January 2012. http://dx.doi.org/10.21236/ada562454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Blonigen, Bruce, and Chad Bown. Antidumping and Retaliation Threats. Cambridge, MA: National Bureau of Economic Research, November 2001. http://dx.doi.org/10.3386/w8576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Woodruff, Michael. Southern Africa's Transnational Threats. Fort Belvoir, VA: Defense Technical Information Center, April 2013. http://dx.doi.org/10.21236/ada592927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Choffnes, Eileen. Forum of Microbial Threats. Fort Belvoir, VA: Defense Technical Information Center, June 2011. http://dx.doi.org/10.21236/ada549241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography