Dissertations / Theses on the topic 'Threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Chavez, Felicia India. "Sustainability and Spirituality| Common Threads and Common Threats." Thesis, Pacifica Graduate Institute, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10278487.
Full textCommon principles, or threads, are studied that are readily found in both spiritual traditions (including religion) and in the field of sustainability. Oneness, Living Simply, Purity, and Care and Heart are examined at length, while Awakening, Awe and Wonder, and Preservation of Life are covered briefly. Opposite principles—for example, Oneness versus Fracturedness, and Purity versus Pollution—are analyzed as well. Principles and their opposites are found to have both high and low modes. Each polarity has life-supporting and life-degrading forms.
Spiritual and religious traditions are grouped into five broad categories. While three of the categories consist of world religions (traditions of Indian origin, Abrahamic traditions, and East Asian traditions), also included are indigenous traditions, alchemy and Hermeticism, and modern spiritual teachings. Sustainability is organized into three categories: ecological science, activism, and sustainable business.
The common threads between sustainability and spirituality are most reliably found in the segments of world religions that tend toward mysticism, and within teachings that emphasize the cultivation of a greater capacity for just awareness, or presence itself, such as Eckhart Tolle’s works. Indigenous traditions shine as examples of societies that have embodied, and in some cases, continue to embody life-supporting principles far more explicitly and fully than cultures that have lost intimacy with their local ecosystems.
The conclusions drawn based on findings is that wisdom traditions corroborate the idea that the outer world is a reflection of the inner world, and that improving the state of the planet therefore requires personal transformation as a prerequisite to outer improvements. A higher order of intelligence, or nous, referenced in multiple mystical traditions, is indispensable to sustainability work. This and other spiritual principles directly inform sustainability efforts, but to be fully employed they require first-hand, personal experience of spiritual realities. Those who would work toward a genuinely sustainable society are urged to pursue mystical or presence-based spiritual training and experience as a matter of urgency, including direct interaction with nature to facilitate rebuilding intimacy with ecosystems, combined with deepening understanding of ecologically sophisticated indigenous lifeways.
Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Full textFör att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
Gobran, Ashraf. "Cyber terrorrism threats." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1588500.
Full textThe purpose of this study is to explore the potential threats that are posed uniquely by cyber terrorism. While traditional terrorism has affected governmental policy, and inflicted physical damage to people and infrastructure across the world, computers and the Internet can allow for attacks as well. As terrorism groups begin to adapt to, and take advantage of - cyber tools and capabilities, the threat they pose will grow accordingly. While a terrorist is not able to directly kill people with cyber tools, the mayhem or social disruption that such attacks can cause, fit well with these organization's objectives. The anonymity of cyber space permits terrorist groups to plan and execute attacks without being identified immediately, if ever. In addition, the targets of cyber terrorists are often under prepared, and fairly vulnerable to various forms of cyber attacks. While these organizations may be aware of the risk posed by failing to adequately address cyber security deficiencies, their solutions are likely not sufficient to truly prevent cyber terrorism attacks. In order to discover technological advancements, efficient cyber security, and generally spread awareness on the subject, this study attempts to highlights existing threats, as well as an overview of what can be done to mitigate them.
Keywords: Intelligence, Cyber security, Professor Albert Orbanati
Douglas, Michael L. Gray Arlene J. "The Warfighters' Counterspace Threat Analysis (WCTA) : a framework for evaluating counterspace threats /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA384609.
Full textDouglas, Michael L., and Arlene J. Gray. "The Warfighters' Counterspace Threat Analysis (WCTA): a framework for evaluating counterspace threats." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/7830.
Full textThe authors present an evolutionary approach to evaluating the counterspace threat in support of Department of Defense (DoD) decision-makers. The goal is to present a process that decision-makers can readily utilize to accurately assess the level of the counterspace threat originating within their Area of Responsibility (AOR). It is particularly useful as the state of affairs change within the AOR. The authors examine the necessity to utilize space to achieve information dominance, strengths and weaknesses of present Counterspace Threat Models, DoD's increasing dependence on space assets, DoD's reliance on commercial space systems to meet future requirements, and potential adversaries' awareness of the dependence of U.S. forces on space systems. Conclusions stress that the threat is comprised of two essential elements an opponent's willingness to employ a counterspace tactic (their intent) and the opponent's ability to develop the necessary tools to employ a counterspace tactic (their capability). The authors believe that the "intent" component of the threat changes more rapidly than the present models can easily accommodate. Therefore, a process, such as the one presented in this thesis, will enable DoD decision-makers that experience many of the changes of 'intent' first hand to rapidly and accurately assess the threat as the condition changes within the AOR
Williamson, Harley M. "Veiled Threats: How Do Identity Threats Shape Muslims' Support for Terrorism?" Thesis, Griffith University, 2020. http://hdl.handle.net/10072/397051.
Full textThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Crim & Crim Justice
Arts, Education and Law
Full Text
Kateraas, Christian H. "Threats to Bitcoin Software." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27224.
Full textIbbetson, Paul A. "Changing public threats and police priorities: How police chiefs respond to emerging threats." Diss., Kansas State University, 2011. http://hdl.handle.net/2097/13104.
Full textDepartment of Sociology, Anthropology, and Social Work
Robert K. Schaeffer
Kansas police chiefs are a unique group of individuals. Because are they located throughout the various sized communities within the state, they have the potential to affect the daily lives of more people on a day-today basis than any other branch of law enforcement. The purpose of this study was to analyze how police chiefs prioritize emerging threats. In this study, using a purposeful sample, 40 semi-structured interviews were conducted with Kansas police chiefs across the state. These police chiefs were asked about their views on the biggest emerging threats they have observed within the last 10 years. They were also asked why certain threats become priorities and why others do not. Police chiefs were split on their thoughts of whether or not they believed resources should be allocated in their communities to defend against terrorism in Kansas. What was discovered during the research process went beyond learning about the process of change for threat prioritization, or what specific threats Kansas police chiefs think their communities are facing today. What was discovered was a deeper understanding of how police chiefs think when it comes to the relationship between police departments, police personnel, and community. As police chiefs addressed the processes by which they go about prioritizing emerging threats, they illuminated a unique strategy hierarchy for success that is centered on maintaining positive departmental perception. To maintain this perception, police chiefs work both officially and covertly within governmental structures and the public sphere to control how people think about their personnel and department. A prominent difference was seen in the physical proximity and accessibility of police chiefs to the community between small, medium, and large towns. In effect, to come to an understanding of the process of prioritization for emerging threats for Kansas police chiefs, it was necessary to understand these police administrators’ unique thought processes that they bring to the table when addressing important issues.
Moore, Febbie P. "Windows NT threats and vulnerabilities." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341457.
Full text"September 1997." Thesis advisor(s): Norman Schneidewind, Douglas Brinkley. Includes bibliographical references (p. 47). Also available online.
Mahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.
Full textKlein, Rupert G. "Cognitive avoidance of health threats." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102518.
Full textStudy 1 was an exploratory study examining the personality characteristics that predict avoidance of thoughts concerning physical threats, specifically, sexually transmitted infections (STIs). The study found that lower sexual self-efficacy and less assertiveness predicted greater self-reported avoidance of thoughts concerning STIs. The more participants tended to avoid thoughts concerning STIs the less likely they were to discuss safer sex practices with their partner and the less consistent they were in their condom use. The findings suggest that individuals can avoid thoughts of physical threats (i.e., STIs) and that this avoidance can have consequences such as engaging in riskier sexual behaviours (i.e., not consistently using condoms).
In study 2, participants were presented threatening words on a computerized task (the emotional Stroop task) to assess if they would automatically attend to or avoid physically threatening words. Dispositionally avoidant participants (participants low in anxiety and high in repressive defensiveness) avoided physically threatening words but only if they were perceived to be self-relevant, otherwise the avoidance mechanism was not elicited.
Study 3 examined if the avoidance of physical threats may be disrupted when there is a temporary reduction in dopamine, such as when cigarette smokers abstain from smoking. Results showed that non-abstaining smokers with an avoidant disposition superficially processed (avoided) threatening words related to smoking on an emotional Stroop task. Abstainers however did not demonstrate this superficial processing suggesting that the avoidance mechanism was disrupted.
The three studies demonstrate that individuals avoid physical threats if they perceive them to be self-relevant and that this avoidance mechanism can be disrupted by a temporary reduction in dopamine.
Литвиненко, Галина Іванівна, Галина Ивановна Литвиненко, Halyna Ivanivna Lytvynenko, and O. Snytnikova. "Artificial intelligence: threats and promises." Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/16063.
Full textSafdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.
Full textThesis advisor(s): Robert E. Looney, Feroz Hassan Khan. Includes bibliographical references. Also available online.
Xu, Zhang. "Understanding Security Threats in Cloud." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.
Full textWright, Lynn M. "The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44693.
Full textThe domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, a review of the Boston Marathon bombings uncovered that important risk-based information was not shared with local law enforcement. Concerning domestic terrorism, the United States may, once again, be failing to connect the dots. This thesis synthesizes existing studies, reports, and expert testimony concerning domestic terrorism and the roles of domestic intelligence agencies, law enforcement, and the public, and proposes the development and implementation of a formal, national counterterrorism (CT) doctrine. The CT doctrine, in conjunction with a counter-radicalization strategy, should focus on bottom-up intelligence/information-sharing, training to strengthen and focus intelligence collection efforts, and culturally sensitive and engaging messaging on social media and the Internet to counter extremist propaganda.
Frauenstein, Edwin Donald. "A framework to mitigate phishing threats." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.
Full textByman, G. (Gabriel). "Connected devices:security threats vs. implemented security." Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.
Full textTämän opinnäytetyön tavoitteena oli selvittää verkottuneiden laitteiden turvallisuusuhkia ja verrata niitä saatavilla oleviin turvallisuusratkaisuihin. Olemassa olevista kytketyistä laitteista valittiin tarkasteluun yhden valmistajan aktiivisuusmittari, jonka turvallisuusratkaisut tutkittiin ja analysoitiin. Verkottuneet laitteet luokiteltiin vaikuttavan tekijän mukaan, jotta saatiin laajempi näkemys laitteista. Verkottuneiden laitteiden luokittelu jaoteltiin turvallisuusuhkien ja -ratkaisujen näkökulmasta kuluttajien, yritysten ja valtion markkinasektoreihin. Keskeinen tekijä valitun laitteen tietoturvaratkaisuun on laitteen myyntihinta. Tietoturvallisuuden ja tietoturvauhkien määrittelymetodit muodostavat perustan, josta turvallisuusuhkat voidaan määritellä. Tietoturvauhkia voitiin määritellä käyttämällä tietoturvan periaatteita ja uhkien tunnistamisen menetelmiä. Valitusta laitteesta tutkitaan tietoturvaperiaatteet luottamuksellisuuden, todennuksen, eheyden, saatavuuden ja kiistämättömyyden osalta. Uhan tunnistaminen otetaan käyttöön säännöllisessä STRIDEssa (Spoofing = väärentäminen, Tampering = manipulointi, Repudiation = torjuminen, Information Disclosure = tiedon julkistaminen, Denial of Service = palvelun esto ja Elevation of Privilege = käyttöoikeuksien luvaton laajentaminen). Tietoturvaratkaisujen johdanto alkaa luokittelemalla verkottuneiden laitteiden ekosysteemit kattavasti turvallisuuteen liittyviin tekijöihin. Turvallisuuden mahdollistavat suojattu käynnistys, tunnistaminen, todentaminen, suojatut yhteydet, tietoturva, tunkeutumisen esto, turvallisuuden seuranta, turvallisuuspäivitykset sekä suojattu laitteisto. Tutkimus käsittelee aktiivisuusmittarin ja sen ekosysteemin merkityksellisiä tietoturvauhkia. Valitut turvallisuusominaisuudet aktiivisuusmittarin ja älypuhelimen välisestä bluetooth-yhteydestä testattiin. Tulokset osoittavat, että käytetty turvallisuusratkaisu ei usein pysty käsittelemään kaikkia turvallisuusuhkia. Kuitenkin verkottuneiden laitteiden valmistajat voivat tasapainoilla mahdollisten uhkiin liittyvien riskien ja käytetyn turvallisuusratkaisun kustannusten välillä suhteuttamalla uhkan riskit ja vaikutukset
Marchenko, Maksym. "Understanding and analysis of cyber threats." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50999.
Full textA threat could be anything that leads to interruption, meddling or destruction of any valuable service or item existing in the firm’s repertoire. Whether of “human” or “nonhuman” origin, the analysis must scrutinize each element that may bring about conceivable security risk. Cyber threat analysis is a process in which the knowledge of internal and external information vulnerabilities pertinent to a particular organization is matched against real-world cyber attacks.
Загрозою може бути все, що призводить до переривання, втручання або знищення будь-якої цінної послуги чи предмета, що існує в репертуарі фірми. Незалежно від того, чи є вони «людським» чи «нелюдським», аналіз повинен ретельно вивчити кожен елемент, який може спричинити можливий ризик безпеки. Аналіз кіберзагроз - це процес, у якому знання про внутрішні та зовнішні інформаційні вразливості, що стосуються певної організації, поєднуються із реальними кібератаками.
Lysenko, Julia Vladimirovna, and Юлія Володимирівна Лисенко. "5G-technology: social advantaged and threats." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51667.
Full textThe development of information technology in the modern world is one of the most important factors that significantly affects the pace and achievement of scientific and technological progress. All spheres of human activity are considered only depending on the ways of information exchange, whose importance is constantly growing. 5G is the fifth generation of wireless network. It will be based upon the combination of the existing wireless technologies like GSM, Wi-Fi, LTE etc and the new radio access technologies. Most people can do their own works within seconds with new technology.5th generation technology comes with many features that are beneficial for all group of people including, students, professionals (doctors, engineers, teachers, governing bodies, administrative bodies, etc.).
Розвиток інформаційних технологій у сучасному світі є одним із найважливіших факторів, що суттєво впливає на темпи та досягнення науково-технічного прогресу. Всі сфери людської діяльності розглядаються лише залежно від способів обміну інформацією, значення яких постійно зростає. 5G - це п’яте покоління бездротових мереж. Він буде заснований на поєднанні існуючих бездротових технологій, таких як GSM, Wi-Fi, LTE тощо та нових технологій радіодоступу. Більшість людей можуть виконати власні роботи за лічені секунди за допомогою нової технології. Технологія 5-го покоління має безліч функцій, корисних для всієї групи людей, включаючи студентів, професіоналів (лікарів, інженерів, викладачів, керівні органи, адміністративні органи тощо).
BERTOLAJA, LETIZIA. "LOCATION SHARING: PRIVACY THREATS AND PROTECTION." Doctoral thesis, Università degli Studi di Milano, 2015. http://hdl.handle.net/2434/265334.
Full textRucks, Lana Juliette. "Me, women, and math the role of personal and collective threats in the experience of stereotype threat /." Columbus, Ohio : Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1204661976.
Full textLeikvangen, Aleksander. "Empty threats? : A game-theoretic analysis of the credibility of Israel's threat to attack Iran's nuctear facilities." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for sosiologi og statsvitenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-25717.
Full textRucks, Lana J. "Me, women, and math: The role of personal and collective threats in the experience of stereotype threat." The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1204661976.
Full textHartline, Cecil L. Jr. "Examination of Insider Threats| A Growing Concern." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10687276.
Full textThe National Infrastructure Advisory Council (NAIC) reports that "...preventing all insider threats is neither possible nor economically feasible..." because the threat is already behind perimeter defenses and often know exactly where vulnerabilities exist within organizations (Cline, 2016). The purpose of this research was to determine the prevalence of malicious and unintentional insider threats. Statistically, the numbers support the idea that insider threats are increasing and occurring more frequently. The true numbers, which only account for the incidents that were reported, may be higher than originally expected. The statistical numbers are likely to much higher because organizations fear reputational damage and client loss. Organizations give reasons such as not enough evidence for conviction or too hard to prove guilt. The result of the paper indicates that companies focus most of their resources on external threats and not the insider threat that is costlier to remediate and considered the most damaging of all threats. The research focuses on malicious and unintentional insider threats and how they are different. A 2018 Crowd Research Partners report found 90% of organizations believe they are vulnerable to insider attacks, while 53% of businesses confirmed they had experienced an insider threat in the past 12 months (Crowd Research Partners, 2017a). The insider threat is hard to manage because an organization not only need worry about their own employees they also must monitor and manage third-party vendors, partners, and contractors. However, with a combination of technical and nontechnical solutions, including an insider threat program, companies can detect, deter, prevent or at least reduce the impacts of insider threats. Abstract The National Infrastructure Advisory Council (NAIC) reports that "...preventing all insider threats is neither possible nor economically feasible..." because the threat is already behind perimeter defenses and often know exactly where vulnerabilities exist within organizations (Cline, 2016). The purpose of this research was to determine the prevalence of malicious and unintentional insider threats. Statistically, the numbers support the idea that insider threats are increasing and occurring more frequently. The true numbers, which only account for the incidents that were reported, may be higher than originally expected. The statistical numbers are likely to much higher because organizations fear reputational damage and client loss. Organizations give reasons such as not enough evidence for conviction or too hard to prove guilt. The result of the paper indicates that companies focus most of their resources on external threats and not the insider threat that is costlier to remediate and considered the most damaging of all threats. The research focuses on malicious and unintentional insider threats and how they are different. A 2018 Crowd Research Partners report found 90% of organizations believe they are vulnerable to insider attacks, while 53% of businesses confirmed they had experienced an insider threat in the past 12 months (Crowd Research Partners, 2017a). The insider threat is hard to manage because an organization not only need worry about their own employees they also must monitor and manage third-party vendors, partners, and contractors. However, with a combination of technical and nontechnical solutions, including an insider threat program, companies can detect, deter, prevent or at least reduce the impacts of insider threats.
Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.
Full textArenas, Miguel Tames. "Social Engineering and Internal Threats in Organizations." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6075.
Full textLister, Anne-Marie. "Health anxiety and coping with health threats." Thesis, University of Oxford, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.249472.
Full textGrimal, Francis. "Threats of force : International Law and Strategy." Thesis, University of Reading, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.520114.
Full textSaari, Shane C. "Fusion centers securing America's heartland from threats." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5053.
Full textThe attacks of September 11, 2001, were a wakeup call for the United States. In the aftermath, the U.S. government created the Department of Homeland Security to coordinate the efforts of securing the nation's porous borders. One of the many tools developed to secure the nation was the development of a network of state and local fusion centers throughout the country. This thesis examines the effectiveness of fusion centers as a network of information collaboration to counter illegal activity by involving rural residents and local law enforcement as force multipliers in sparsely populated border states. This study incorporates case studies from the states of North Dakota and Washington, as both are northern tier states whose geographical diversities and challenges are representative of problems facing any northern border state. The results of this study suggest that fusion centers, while still in their infancy, are an effective tool to enhance information flow and provide leadership the ability to centralize efforts to leverage resources to counter both natural and manmade events.
McLeish, Christina Rosemary. "Empty threats : reference failure and scientific realism." Thesis, University of Cambridge, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611444.
Full textLattuada, Matteo [Verfasser]. "Threats to the Pontocaspian fauna / Matteo Lattuada." Gießen : Universitätsbibliothek, 2021. http://d-nb.info/1228829004/34.
Full textO'Sullivan, Paul. "Threats to identity and emotional well-being." Thesis, City University London, 2014. http://openaccess.city.ac.uk/6630/.
Full textNobrega, Caroline Correa. "Amazon forest dieback: assessing vulnerabilities and threats." Universidade Federal de Goiás, 2016. http://repositorio.bc.ufg.br/tede/handle/tede/5873.
Full textApproved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2016-08-09T12:01:33Z (GMT) No. of bitstreams: 2 Tese - Caroline Correa Nobrega - 2016.pdf: 4990749 bytes, checksum: 427c1ea06410c4fb5c6092e4e2cc351d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2016-08-09T12:01:33Z (GMT). No. of bitstreams: 2 Tese - Caroline Correa Nobrega - 2016.pdf: 4990749 bytes, checksum: 427c1ea06410c4fb5c6092e4e2cc351d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2016-05-16
In recent years, it is increasing evidences about Amazon vunerability due to land use and climate changes. Because of a positive feedback system, in which impacts intensify other impacts, some models project to the end of the century a replacement of the Amazon forest by savanna formations or semi-arid (forest dieback). Several evidence has indicated a high vulnerability of the Amazon to global climate change and local environmental impacts triggered by human activities (eg conversion to agricultural areas, construction of roads and burns). However, they are still deeply unknown the general mechanisms and standards about how these impacts affect the forest. In this thesis, I developed works that aim contribute to discussions of the subject. In each chapter, I will consider a threat that is contributing to the degradation of the Amazon. Each of the three threats discussed in the following chapters are often cited as important drivers of forest dieback. In the first chapter I evaluated the impact of forest fires at different levels of diversity of trees in a forest area next to the Amazon-Cerrado transition. Our results suggest that communities of trees in burned areas are losing more phylogenetic and functional diversity per unit of species than in unburned areas. My results indicate the existence of selection of species based on phylogenetic and functional characteristics, representing a major force of change and impoverishment (functional and phylogenetically) of these communities. In the second chapter, using high resolution images (LiDAR and hyperspectral), I evaluated the impact of a intense drought in forest areas near Madre de Dios, Peru. Thus, my results support the idea that changes in regional climate may change the structure and function of the forest. In the third chapter, I evaluated how the construction of roads in the Brazilian Amazon has contributed to deforestation in an important group of protected areas of the Amazon: the Indigenous Lands. Based on the analysis of observed impacts, I propose the establishment of buffer zones (buffers) around these reserves to reduce the negative impacts of road construction planned to be built.
Nos últimos anos, tem surgido cada vez mais evidências que a Amazônia pode estar ameaçada em decorrências das mudanças regionais no clima e no uso do solo. Por causa de um sistema de retroalimentação positivo, em que impactos intensificam outros impactos, alguns modelos projetam para o final do século uma substituição da floresta amazônica por formações tipo savana ou semiáridas (forest dieback). Diversas evidências têm indicado uma alta vulnerabilidade da Amazônia às mudanças climáticas globais e aos impactos ambientais locais desencadeados por atividades humanas (e.g. conversão de áreas para agropecuária, construção de estradas e queimadas). Entretanto, são ainda profundamente desconhecidos os mecanismos e padrões gerais de como esses impactos afetam a floresta. Nesta tese, desenvolvi trabalhos que têm como objetivo contribuir para as discussões do tema. Em cada capítulo, abordarei uma ameaça que, de alguma forma, está contribuindo para a degradação da Amazônia. Cada uma das três ameaças discutidas nos próximos capítulos são, frequentemente, apontadas como importantes propulsores de forest dieback. No primeiro capítulo avaliei o impacto de incêndios florestais em diferentes níveis de diversidade de árvores de uma área florestal próxima à transição Amazônia-Cerrado. Nossos resultados sugerem que as comunidades de árvores das áreas queimadas estão perdendo mais diversidade filogenética e funcional por unidade de espécie do que nas áreas não queimadas. Nossos resultados indicam a existência de seleção de espécies com base em características filogenéticas e funcionais, que representam uma importante força de mudança e de empobrecimento (funcional e filogeneticamente) dessas comunidades. No segundo capítulo, usando imagens de alta resolução (LiDAR e hiperespectral), eu avaliei o impacto de um período de seca em áreas florestais próximas a Madre de Dios, Peru. Nossos resultados dão suporte a hipótese de que mudanças no clima regional modificam a estrutura e função da floresta. No terceiro capítulo, eu avaliarei de que forma a construção de estradas na Amazônia brasileira tem contribuído para o desmatamento que incide em um importante grupo de áreas protegidas da Amazônia: as Terras Indígenas. Com base na análise dos impactos observados, nós propomos o estabelecimento de zonas de amortecimento (buffers) em torno dessas reservas para reduzir os impactos negativos da construção de estradas planejadas para serem construídas.
Jones, Andrew. "Threats to information systems and effective countermeasures." Thesis, University of South Wales, 2004. https://pure.southwales.ac.uk/en/studentthesis/threats-to-information-systems-and-effective-countermeasures(2ffda7b3-38d8-48a3-90da-386ee85f10bf).html.
Full textZakharov, I. "Threats to information security of the enterprise." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.
Full textYoshimoto, Iku. "Terrorist Threats, Foreign Aid, and State Capacity." The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1574841729915737.
Full textCostante, Delaney. "Endangered Species Act: Quantifying Threats Impacting Listing." W&M ScholarWorks, 2021. https://scholarworks.wm.edu/etd/1627047881.
Full textVale, Rita Ribeiro de Sousa Lacerda do. "Carnivores and anthropogenic habitats : threats or opportunities?" Master's thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/22662.
Full textO crescimento da população humana tem levado a alterações globais pela transformação de habitats naturais em explorações agrícolas, florestais e áreas urbanizadas. V arias espécies, nomeadamente Carnívoros, encontraram uma forma de se adaptarem a zonas urbanas. Com este estudo pretendemos perceber se os habitats antropogénicos podem ser ameaças ou oportunidades para duas espécies de carnívoros, raposa vermelha (Vulpes vulpes) e gineta comum (Genetta genetta). Para tal, foram recolhidos dados de fatores ambientais dentro de duas áreas circulares de diâmetros fixos, correspondendo á área vital mínima e média de cada espécie e divididos em quatro hipóteses. A influência das variáveis ambientais sobre as duas espécies de carnívoros foi avaliada com base nos dados de abundância relativa e presenç - ausência de raposa e gineta. Os carnívoros foram amostrados com armadilhagem fotográfica. Os resultados mostram que o modelo de perturbação o que melhor explica os padrões de abundância das raposas, e que o modelo híbrido melhor explica a abundância relativa das ginetas. Foram também incluídas variáveis temporais para testar os padrões de atividade das espécies. A nossa hipótese de que a disponibilidade de recursos iria afetar positivamente as espécies foi refutada por não termos considerados os hábitos generalistas destas espécies. A nossa previsão de que zonas de eucalipto e folhosas iriam oferecer refúgio foi contrariada pela escolha de zonas urbanas pela raposa, possivelmente relacionada com a disponibilidade de refúgio e alimento, e a escolha de zonas próximas a eucalipto pela gineta, o que pode ser um falso positivo uma vez que pelo seu comportamento arborícola podem não ser tão facilmente registadas em locais com maior complexidade vegetal. Nós esperávamos que as variáveis antropogénicas tivessem um influência negativa na abundância relativa das espécies. No entanto, os nossos resultados mostram uma associação da raposa a zonas urbanas. A gineta está menos ativa durante o pôr do sol quando há maior atividade humana. A altitude teve um efeito significativo na abundância e presença de ginetas, talvez por estes animais estarem a usar vales, associados a cursos de água. No geral, a raposa parece ser menos afetada por habitats antropogénicos do que a gineta, provavelmente devido a sua capacidade de adaptação. Os habitats antropogénicos podem funcionar como ameaças mas podem ser melhorados para minimizar o seu efeito na vida selvagem e tornarem-se oportunidades. A amostragem de vida selvagem deve ser feita regularmente para a correta implementação de medidas de mitigação, que podem passar por passagens superiores e inferiores nas rodovias, reconfiguração da oresta e educação ambiental.
Human population growth is leading to global changes as natural habitat is transformed into farmlands, industrial forestry stands and urban areas with a negative impact on biodiversity. Several species, including carnivores, found a way to adapt to urban areas. This study aims to understand if anthropogenic habitat are threats or opportunities for two carnivore species: red foxes (Vulpes vulpes) and common genet (Genetta genetta). Data on environmental factor was collected within the average and minimum core area bu er of each species and pertaining to four hypothesis. The in uence of these environmental drivers on the two carnivore species was evaluated using the relative abundance and presence-absence data of red foxes and genets. Carnivores were sampled using camera-trap. Our results show that within both bu ers, the best model in the disturbance category best explains the relative abundance patterns of red foxes, while the the hybrid model (which comprises all best models of all categories) best explained the relative abundance of genets. A category including temporal variables was added to test species activity patterns. This category explained more of the deviance to the null model than spatial variables. We hypothesised that resources availability would have a positive e ect on species but failed to consider red foxes' and genets' generalists feeding behaviour. We predicted that both eucalyptus and broadleaf tree areas would provide refuge for both species. However,red foxes seem to explore urban areas, which can o er food, as genets chose eucalyptus areas as refuge. The latter can be a misleading results as the arboreal behaviour of this species can in uence records. We expected that anthropogenic variables would negatively in uence species' relative abundance and presence. Genets are less active during higher human activity periods, showing higher activity around dawn than around dusk, during most of the year. Altitude had a signi cant e ect on genets' relative abundance and presence. Perhaps because these animals are using river valleys. In general, red foxes seem to be less a ect by anthropogenic habitats then genets, probably because of this species high adaptability. Anthropogenic habitats can work as both threats and opportunities but can be improved in order to minimize its e ect on wildlife. Wildlife surveys should happen frequently in order to implement mitigation measures, such as under or over road passages, forest recon guration and environmental education. With these and other policies, habitats can become opportunities for wildlife.
Schoubye, Harald. "Isaiah's Damascus oracle responding to international threats /." Theological Research Exchange Network (TREN), 1996. http://www.tren.com.
Full textBerthier, Robin G. "Advanced honeypot architecture for network threats quantification." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/9204.
Full textThesis research directed by: Reliability Engineering Program. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Wraith, Jenna L. "Orchid conservation: Assessing threats and conservation priorities." Thesis, Griffith University, 2020. http://hdl.handle.net/10072/392403.
Full textThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Environment and Sc
Science, Environment, Engineering and Technology
Full Text
Inci, Mehmet Sinan. "Micro-architectural Threats to Modern Computing Systems." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/528.
Full textGong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.
Full textMed den snabba utvecklingen av anslutna fordon har bilsäkerhet blivit ett av de viktigaste ämnena. För att studera hur man skyddar säkerheten för fordonskommunikation analyserar vi potentiella hot mot anslutna fordon och diskuterar motåtgärder för att mildra dessa hot. I denna avhandling undersöker vi 25 tjänster som anslutna fordon kan tillhandahålla. Entiteter, anslutningar och meddelandeflöden i dessa tjänster undersöks och syntetiseras i en fordonsnätverksstruktur. De 25 tjänsterna är indelade i sex användarvägar, inklusive: infotainment service, fjärrövervakning, enhetskontroll, Fordon-tillallt (V2X), diagnostikservice och IDS-system (Intrusion Detection System). Vi etablerar kommunikationsmodeller för dessa användningsfall och analyserar de potentiella hot som baseras på CIA-kriterier (Confidentiality, Integrity and Availability). Vi diskuterar eventuella motåtgärder som kan mildra dessa hot baserat på befintliga nätverkssäkerhetstekniker. Varje alternativ motåtgärds fördelar och begränsningar presenteras. För att filtrera eventuella attacker undersöker vi och utformar brandväggar i fyra delar av ett fordon: Dedicated Short-Range Communications (DSRC) -modul, gateway, Telematic Control Unit (TCU) och Human Machine Interface (HMI). Vi simulerar också en brandvägg för en HMI-applikation genom att bygga en kommunikationsmodell i Python.
CARDAIOLI, MATTEO. "Human Interactions in Cybersecurity: Threats and Opportunities." Doctoral thesis, Università degli studi di Padova, 2022. http://hdl.handle.net/11577/3453659.
Full textReichling, Peter, P. G. Pererva, and T. V. Romanchik. "Determination of the essence of the economic security of the country." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/39581.
Full textYilmaz, Hasan. "Turkey and the Middle East : threats and opportunities." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA396581.
Full textBowling, Joshua D. "Future Naval Conflict: Asymmetric Threats and Commerce Raiding." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/478.
Full textBell, Paul Robert. "Securing the future : real threats or surreal illusions?" Thesis, Lancaster University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431474.
Full textYung, Kwok-Wai, and 容國偉. "Emissions trading for Hong Kong opportunities and threats." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30110786.
Full textBailey, Daniel A. "Communicating homeland security threats government and public efforts." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5040.
Full textThe Department of Homeland Security (DHS) is widely criticized for poor performance, and much of its problem stems from its poor performance in public communications. DHS has not been able to earn the respect of the public and local officials, and that means that many Americans are not paying attention to important threat warnings and security based exercises. This ultimately means our homeland security is suffering and American citizens remain vulnerable to future terror attacks. This research project considers the public communication efforts of the Department of Homeland Security (DHS) by analyzing how both the Homeland Security Advisory System (HSAS) and National Exercise Program (NEP) continually fall short of effectively communicating security threats and warnings to the American public. By looking at two of its highest profile projects, HSAS and NEP, we see that the problems are largely the result of DHS taking too much of a top-down, federal approach. This thesis will argue that the highly centralized management and execution of both the HSAS and NEP fail to convey the importance of federal efforts to local levels of government and American citizens. This thesis will be a comparative case study of these two programs. I find that both programs are useful and necessary, but both can be improved by decentralizing the national exercise framework and communication efforts to local level officials who can better tailor information and response efforts pertinent to their communities. As the most important component of disaster relief and response, local level officials, who are typically overshadowed by national level personnel, can more effectively utilize federal exercise money and communicate threats the American public than DHS personnel can.