Academic literature on the topic 'Threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Threats"
Kiely, P., and C. R. Seed. "Assessing infectious threats - trick or threat?" ISBT Science Series 10, S1 (April 2015): 65–72. http://dx.doi.org/10.1111/voxs.12114.
Full textMuhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (October 12, 2021): 11259. http://dx.doi.org/10.3390/su132011259.
Full textMuhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (October 12, 2021): 11259. http://dx.doi.org/10.3390/su132011259.
Full textIsokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Full textMUGISHA, ARTHUR R., and SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda." Environmental Conservation 31, no. 3 (September 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.
Full textShapiro, Jenessa R. "Different Groups, Different Threats: A Multi-Threat Approach to the Experience of Stereotype Threats." Personality and Social Psychology Bulletin 37, no. 4 (March 24, 2011): 464–80. http://dx.doi.org/10.1177/0146167211398140.
Full textHjerm, Mikael, and Kikuko Nagayoshi. "The composition of the minority population as a threat: Can real economic and cultural threats explain xenophobia?" International Sociology 26, no. 6 (May 26, 2011): 815–43. http://dx.doi.org/10.1177/0268580910394004.
Full textBezzubov, Dmytro, Ruslan Ihonin, and Ihor Diorditsa. "Cyberthreats as a Component of Threats in the Contemporary World (a Legal Aspect)." Journal of Advanced Research in Law and Economics 8, no. 7 (June 7, 2018): 2086. http://dx.doi.org/10.14505//jarle.v8.7(29).04.
Full textBezzubov, Dmytro, Ruslan Ihonin, and Ihor Diorditsa. "Cyberthreats as a Component of Threats in the Contemporary World (a Legal Aspect)." Journal of Advanced Research in Law and Economics 8, no. 7 (December 30, 2017): 2086. http://dx.doi.org/10.14505/jarle.v8.7(29).04.
Full textSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Full textDissertations / Theses on the topic "Threats"
Chavez, Felicia India. "Sustainability and Spirituality| Common Threads and Common Threats." Thesis, Pacifica Graduate Institute, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10278487.
Full textCommon principles, or threads, are studied that are readily found in both spiritual traditions (including religion) and in the field of sustainability. Oneness, Living Simply, Purity, and Care and Heart are examined at length, while Awakening, Awe and Wonder, and Preservation of Life are covered briefly. Opposite principles—for example, Oneness versus Fracturedness, and Purity versus Pollution—are analyzed as well. Principles and their opposites are found to have both high and low modes. Each polarity has life-supporting and life-degrading forms.
Spiritual and religious traditions are grouped into five broad categories. While three of the categories consist of world religions (traditions of Indian origin, Abrahamic traditions, and East Asian traditions), also included are indigenous traditions, alchemy and Hermeticism, and modern spiritual teachings. Sustainability is organized into three categories: ecological science, activism, and sustainable business.
The common threads between sustainability and spirituality are most reliably found in the segments of world religions that tend toward mysticism, and within teachings that emphasize the cultivation of a greater capacity for just awareness, or presence itself, such as Eckhart Tolle’s works. Indigenous traditions shine as examples of societies that have embodied, and in some cases, continue to embody life-supporting principles far more explicitly and fully than cultures that have lost intimacy with their local ecosystems.
The conclusions drawn based on findings is that wisdom traditions corroborate the idea that the outer world is a reflection of the inner world, and that improving the state of the planet therefore requires personal transformation as a prerequisite to outer improvements. A higher order of intelligence, or nous, referenced in multiple mystical traditions, is indispensable to sustainability work. This and other spiritual principles directly inform sustainability efforts, but to be fully employed they require first-hand, personal experience of spiritual realities. Those who would work toward a genuinely sustainable society are urged to pursue mystical or presence-based spiritual training and experience as a matter of urgency, including direct interaction with nature to facilitate rebuilding intimacy with ecosystems, combined with deepening understanding of ecologically sophisticated indigenous lifeways.
Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Full textFör att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
Gobran, Ashraf. "Cyber terrorrism threats." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1588500.
Full textThe purpose of this study is to explore the potential threats that are posed uniquely by cyber terrorism. While traditional terrorism has affected governmental policy, and inflicted physical damage to people and infrastructure across the world, computers and the Internet can allow for attacks as well. As terrorism groups begin to adapt to, and take advantage of - cyber tools and capabilities, the threat they pose will grow accordingly. While a terrorist is not able to directly kill people with cyber tools, the mayhem or social disruption that such attacks can cause, fit well with these organization's objectives. The anonymity of cyber space permits terrorist groups to plan and execute attacks without being identified immediately, if ever. In addition, the targets of cyber terrorists are often under prepared, and fairly vulnerable to various forms of cyber attacks. While these organizations may be aware of the risk posed by failing to adequately address cyber security deficiencies, their solutions are likely not sufficient to truly prevent cyber terrorism attacks. In order to discover technological advancements, efficient cyber security, and generally spread awareness on the subject, this study attempts to highlights existing threats, as well as an overview of what can be done to mitigate them.
Keywords: Intelligence, Cyber security, Professor Albert Orbanati
Douglas, Michael L. Gray Arlene J. "The Warfighters' Counterspace Threat Analysis (WCTA) : a framework for evaluating counterspace threats /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA384609.
Full textDouglas, Michael L., and Arlene J. Gray. "The Warfighters' Counterspace Threat Analysis (WCTA): a framework for evaluating counterspace threats." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/7830.
Full textThe authors present an evolutionary approach to evaluating the counterspace threat in support of Department of Defense (DoD) decision-makers. The goal is to present a process that decision-makers can readily utilize to accurately assess the level of the counterspace threat originating within their Area of Responsibility (AOR). It is particularly useful as the state of affairs change within the AOR. The authors examine the necessity to utilize space to achieve information dominance, strengths and weaknesses of present Counterspace Threat Models, DoD's increasing dependence on space assets, DoD's reliance on commercial space systems to meet future requirements, and potential adversaries' awareness of the dependence of U.S. forces on space systems. Conclusions stress that the threat is comprised of two essential elements an opponent's willingness to employ a counterspace tactic (their intent) and the opponent's ability to develop the necessary tools to employ a counterspace tactic (their capability). The authors believe that the "intent" component of the threat changes more rapidly than the present models can easily accommodate. Therefore, a process, such as the one presented in this thesis, will enable DoD decision-makers that experience many of the changes of 'intent' first hand to rapidly and accurately assess the threat as the condition changes within the AOR
Williamson, Harley M. "Veiled Threats: How Do Identity Threats Shape Muslims' Support for Terrorism?" Thesis, Griffith University, 2020. http://hdl.handle.net/10072/397051.
Full textThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Crim & Crim Justice
Arts, Education and Law
Full Text
Kateraas, Christian H. "Threats to Bitcoin Software." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27224.
Full textIbbetson, Paul A. "Changing public threats and police priorities: How police chiefs respond to emerging threats." Diss., Kansas State University, 2011. http://hdl.handle.net/2097/13104.
Full textDepartment of Sociology, Anthropology, and Social Work
Robert K. Schaeffer
Kansas police chiefs are a unique group of individuals. Because are they located throughout the various sized communities within the state, they have the potential to affect the daily lives of more people on a day-today basis than any other branch of law enforcement. The purpose of this study was to analyze how police chiefs prioritize emerging threats. In this study, using a purposeful sample, 40 semi-structured interviews were conducted with Kansas police chiefs across the state. These police chiefs were asked about their views on the biggest emerging threats they have observed within the last 10 years. They were also asked why certain threats become priorities and why others do not. Police chiefs were split on their thoughts of whether or not they believed resources should be allocated in their communities to defend against terrorism in Kansas. What was discovered during the research process went beyond learning about the process of change for threat prioritization, or what specific threats Kansas police chiefs think their communities are facing today. What was discovered was a deeper understanding of how police chiefs think when it comes to the relationship between police departments, police personnel, and community. As police chiefs addressed the processes by which they go about prioritizing emerging threats, they illuminated a unique strategy hierarchy for success that is centered on maintaining positive departmental perception. To maintain this perception, police chiefs work both officially and covertly within governmental structures and the public sphere to control how people think about their personnel and department. A prominent difference was seen in the physical proximity and accessibility of police chiefs to the community between small, medium, and large towns. In effect, to come to an understanding of the process of prioritization for emerging threats for Kansas police chiefs, it was necessary to understand these police administrators’ unique thought processes that they bring to the table when addressing important issues.
Moore, Febbie P. "Windows NT threats and vulnerabilities." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341457.
Full text"September 1997." Thesis advisor(s): Norman Schneidewind, Douglas Brinkley. Includes bibliographical references (p. 47). Also available online.
Mahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.
Full textBooks on the topic "Threats"
Gray, Amelia. Threats. New York: Farrar, Straus and Giroux, 2012.
Find full textArduin, Pierre-Emmanuel. Insider Threats. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119419785.
Full textCopyright Paperback Collection (Library of Congress), ed. Veiled threats. New York, NY: Dell Pub., 2002.
Find full textWeinrich, Mark. Deadly threats. Camp Hill, PA: Horizon Books, 1995.
Find full textScholefield, Alan. Threats & menaces. Anstey: F. A. Thorpe, 1995.
Find full textDuarte-Davidson, Raquel, Tom Gaulton, Stacey Wyke, and Samuel Collins, eds. Chemical Health Threats. Cambridge: Royal Society of Chemistry, 2018. http://dx.doi.org/10.1039/9781782623687.
Full textKumar, Vipin, Jaideep Srivastava, and Aleksandar Lazarevic, eds. Managing Cyber Threats. New York: Springer-Verlag, 2005. http://dx.doi.org/10.1007/b104908.
Full textTiratsoo, J. N. H. Managing pipeline threats. Houston, TX, USA: Clarion Technical Publishers, 2019.
Find full text1955-, Scott Jerry, ed. Threats, bribes & videotape. Kansas City, Mo: Andrews McMeel, 1998.
Find full textEaton, Jonathan. Threats and promises. Cambridge, MA: National Bureau of Economic Research, 1994.
Find full textBook chapters on the topic "Threats"
Wolf, Marilyn, and Dimitrios Serpanos. "Threats and Threat Analysis." In Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems, 35–45. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25808-5_3.
Full textMöller, Dietmar P. F. "Threats and Threat Intelligence." In Advances in Information Security, 71–129. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.
Full textWatters, Paul A. "Threats." In Cybercrime and Cybersecurity, 28–42. New York: CRC Press, 2023. http://dx.doi.org/10.1201/9781003406730-3.
Full textKabay, M. E. "Threats." In The Expert in the Next Office, 134–39. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003354536-8.
Full textMorgan, Patrick M. "Security Issues: Old Threats, New Threats, No Threats." In Asia’s New World Order, 76–109. London: Palgrave Macmillan UK, 1997. http://dx.doi.org/10.1007/978-1-349-14137-1_4.
Full textBennett, Kevin. "Ancestral Threats vs. Modern Threats." In Encyclopedia of Evolutionary Psychological Science, 1–3. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-16999-6_2997-1.
Full textMeadows, Catherine. "A representation of protocol attacks for risk assessment." In Network Threats, 1–10. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/01.
Full textZhou, Dan, and Shiu-Kai Chin. "Verifying privacy enhanced mail functions with higher order logic." In Network Threats, 11–20. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/02.
Full textJoye, Marc, and Jean-Jacques Quisquater. "Cryptanalysis of RSA-type cryptosystems: A visit." In Network Threats, 21–31. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/03.
Full textPatel, Sarvar. "Information leakage in encrypted key exchange." In Network Threats, 33–40. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/04.
Full textConference papers on the topic "Threats"
Mathiasen, Niels Raabjerg, and Susanne Bødker. "Threats or threads." In the 5th Nordic conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1463160.1463191.
Full textVasenev, Alexandr, and Lorena Montoya. "Analysing non-malicious threats to urban smart grids by interrelating threats and threat taxonomies." In 2016 IEEE International Smart Cities Conference (ISC2). IEEE, 2016. http://dx.doi.org/10.1109/isc2.2016.7580878.
Full textKohli, Harpreet, Dale Lindskog, Pavol Zavarsky, and Ron Ruhl. "An Enhanced Threat Identification Approach for Collusion Threats." In 2011 Third International Workshop on Security Measurements and Metrics (Metrisec). IEEE, 2011. http://dx.doi.org/10.1109/metrisec.2011.11.
Full textShrivas, Mahendra Kumar, Thomas Yeboah Dean, and S. Selva Brunda. "The Disruptive Blockchain Security Threats and Threat Categorization." In 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071475.
Full textAlwaheidi, Mohammed, Shareeful Islam, Spyridon Papastergiou, and Kitty Kioskli. "Integrating Human Factors into Data-driven Threat Management for Overall Security Enhancement." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004778.
Full textHernacki, Brian. "Emerging threats." In the 2005 ACM workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1103626.1103627.
Full textMcGough, Andrew Stephen, David Wall, John Brennan, Georgios Theodoropoulos, Ed Ruck-Keene, Budi Arief, Carl Gamble, John Fitzgerald, Aad van Moorsel, and Sujeewa Alwis. "Insider Threats." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808783.2808785.
Full textPawlicka, Aleksandra, Michał Choraś, and Marek Pawlicki. "Cyberspace threats." In ARES 2020: The 15th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3407023.3409181.
Full textGreitzer, Frank L. "Insider Threats." In NCS '19: Northwest Cybersecurity Symposium. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3332448.3332458.
Full textBowles, John B., and William Hanczaryk. "Threat effects analysis: Applying FMEA to model computer system threats." In 2008 Annual Reliability and Maintainability Symposium. IEEE, 2008. http://dx.doi.org/10.1109/rams.2008.4925840.
Full textReports on the topic "Threats"
Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), February 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full textBlank, Stephen J. Rethinking Asymmetric Threats. Fort Belvoir, VA: Defense Technical Information Center, September 2003. http://dx.doi.org/10.21236/ada418033.
Full textEaton, Jonathan, and Maxim Engers. Threats and Promises. Cambridge, MA: National Bureau of Economic Research, September 1994. http://dx.doi.org/10.3386/w4849.
Full textHallahan, Jason. Countering Insider Threats - Handling Insider Threats Using Dynamic, Run-Time Forensics. Fort Belvoir, VA: Defense Technical Information Center, October 2007. http://dx.doi.org/10.21236/ada473440.
Full textToledo, Claudio. Chile: Its Conventional Threats. Fort Belvoir, VA: Defense Technical Information Center, March 2005. http://dx.doi.org/10.21236/ada431942.
Full textShavell, Steven, and Kathryn Spier. Threats without Binding Commitment. Cambridge, MA: National Bureau of Economic Research, February 1996. http://dx.doi.org/10.3386/w5461.
Full textChoffness, Eileen. Forum on Microbial Threats. Fort Belvoir, VA: Defense Technical Information Center, January 2012. http://dx.doi.org/10.21236/ada562454.
Full textBlonigen, Bruce, and Chad Bown. Antidumping and Retaliation Threats. Cambridge, MA: National Bureau of Economic Research, November 2001. http://dx.doi.org/10.3386/w8576.
Full textWoodruff, Michael. Southern Africa's Transnational Threats. Fort Belvoir, VA: Defense Technical Information Center, April 2013. http://dx.doi.org/10.21236/ada592927.
Full textChoffnes, Eileen. Forum of Microbial Threats. Fort Belvoir, VA: Defense Technical Information Center, June 2011. http://dx.doi.org/10.21236/ada549241.
Full text