Journal articles on the topic 'Threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kiely, P., and C. R. Seed. "Assessing infectious threats - trick or threat?" ISBT Science Series 10, S1 (April 2015): 65–72. http://dx.doi.org/10.1111/voxs.12114.
Full textMuhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (October 12, 2021): 11259. http://dx.doi.org/10.3390/su132011259.
Full textMuhammed, Khaleel, Aavudai Anandhi, Gang Chen, and Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats." Sustainability 13, no. 20 (October 12, 2021): 11259. http://dx.doi.org/10.3390/su132011259.
Full textIsokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain." Teisė 122 (March 30, 2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.
Full textMUGISHA, ARTHUR R., and SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda." Environmental Conservation 31, no. 3 (September 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.
Full textShapiro, Jenessa R. "Different Groups, Different Threats: A Multi-Threat Approach to the Experience of Stereotype Threats." Personality and Social Psychology Bulletin 37, no. 4 (March 24, 2011): 464–80. http://dx.doi.org/10.1177/0146167211398140.
Full textHjerm, Mikael, and Kikuko Nagayoshi. "The composition of the minority population as a threat: Can real economic and cultural threats explain xenophobia?" International Sociology 26, no. 6 (May 26, 2011): 815–43. http://dx.doi.org/10.1177/0268580910394004.
Full textBezzubov, Dmytro, Ruslan Ihonin, and Ihor Diorditsa. "Cyberthreats as a Component of Threats in the Contemporary World (a Legal Aspect)." Journal of Advanced Research in Law and Economics 8, no. 7 (June 7, 2018): 2086. http://dx.doi.org/10.14505//jarle.v8.7(29).04.
Full textBezzubov, Dmytro, Ruslan Ihonin, and Ihor Diorditsa. "Cyberthreats as a Component of Threats in the Contemporary World (a Legal Aspect)." Journal of Advanced Research in Law and Economics 8, no. 7 (December 30, 2017): 2086. http://dx.doi.org/10.14505/jarle.v8.7(29).04.
Full textSyomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.
Full textPASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 11, 2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.
Full textBedi, Punam, Vandana Gandotra, Archana Singhal, Himanshi Narang, and Sumit Sharma. "Mitigating multi-threats optimally in proactive threat management." ACM SIGSOFT Software Engineering Notes 38, no. 1 (January 23, 2013): 1–7. http://dx.doi.org/10.1145/2413038.2413041.
Full textKaplan, Sebastian G., and Dewey G. Cornell. "Threats of Violence by Students in Special Education." Behavioral Disorders 31, no. 1 (November 2005): 107–19. http://dx.doi.org/10.1177/019874290503100102.
Full textDervišević, Tarik, Sabina Baraković, and Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows." B&H Electrical Engineering 14, no. 2 (December 1, 2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.
Full textKappenman, Emily S., Raphael Geddert, Jaclyn L. Farrens, John J. McDonald, and Greg Hajcak. "Recoiling From Threat: Anxiety Is Related to Heightened Suppression of Threat, Not Increased Attention to Threat." Clinical Psychological Science 9, no. 3 (March 24, 2021): 434–48. http://dx.doi.org/10.1177/2167702620961074.
Full textJussupow, Ekaterina, Kai Spohrer, and Armin Heinzl. "Identity Threats as a Reason for Resistance to Artificial Intelligence: Survey Study With Medical Students and Professionals." JMIR Formative Research 6, no. 3 (March 23, 2022): e28750. http://dx.doi.org/10.2196/28750.
Full textMohammad, Nur Ameera Natasha, Warusia Mohamed Yassin, Rabiah Ahmad, Aslinda Hassan, and Mohammed Nasser Ahmed Al Mhiqani. "An Insider Threat Categorization Framework for Automated Manufacturing Execution System." International Journal of Innovation in Enterprise System 3, no. 02 (July 31, 2019): 31–41. http://dx.doi.org/10.25124/ijies.v3i02.38.
Full textMullen, Paul E., and Michele Pathé. "Assessing and managing threats to commit a massacre." Australian & New Zealand Journal of Psychiatry 52, no. 8 (May 11, 2018): 732–36. http://dx.doi.org/10.1177/0004867418773183.
Full textRahim, Fiza Abdul, Norziana Jamil, Zaihisma Che Cob, Lariyah Mohd Sidek, and Nur Izz Insyirah Sharizan@Sharizal. "Risk Analysis of Water Grid Systems Using Threat Modeling." Journal of Physics: Conference Series 2261, no. 1 (June 1, 2022): 012015. http://dx.doi.org/10.1088/1742-6596/2261/1/012015.
Full textWhite, Thomas H., Patricia Bickley, Cory Brown, Dave E. Busch, Guy Dutson, Holly Freifeld, Douglas Krofta, Sean Lawlor, Dan Polhemus, and Rachel Rounds. "Quantifying Threats to Biodiversity and Prioritizing Responses: An Example from Papua New Guinea." Diversity 13, no. 6 (June 4, 2021): 248. http://dx.doi.org/10.3390/d13060248.
Full textHamad, Mohammad, and Vassilis Prevelakis. "SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study." Information 11, no. 5 (May 19, 2020): 273. http://dx.doi.org/10.3390/info11050273.
Full textGriffin, Renee. "Searching for Truth in the First Amendment's True Threat Doctrine." Michigan Law Review, no. 120.4 (2022): 721. http://dx.doi.org/10.36644/mlr.120.4.searching.
Full textWang, Guan, Lian Ma, Lili Wang, and Weiguo Pang. "Independence Threat or Interdependence Threat? The Focusing Effect on Social or Physical Threat Modulates Brain Activity." Brain Sciences 14, no. 4 (April 9, 2024): 368. http://dx.doi.org/10.3390/brainsci14040368.
Full textLv, Huiying, Yuan Zhang, and Jie Wang. "Network Threat Identification and Analysis Based on a State Transition Graph." Cybernetics and Information Technologies 13, Special-Issue (December 1, 2013): 51–61. http://dx.doi.org/10.2478/cait-2013-0037.
Full textZeng, Min, Chuanzhou Dian, and Yaoyao Wei. "Risk Assessment of Insider Threats Based on IHFACS-BN." Sustainability 15, no. 1 (December 28, 2022): 491. http://dx.doi.org/10.3390/su15010491.
Full textAdhari, Agus. "PENATAAN ANCAMAN EKONOMI SEBAGAI BAGIAN DARI KEADAAN BAHAYA DI INDONESIA." Dialogia Iuridica: Jurnal Hukum Bisnis dan Investasi 12, no. 1 (November 21, 2020): 031–48. http://dx.doi.org/10.28932/di.v12i1.3019.
Full textMaris, Ladislav, Zuzana Zvakova, Katarina Kampova, and Tomas Lovecek. "The Influence of Threat Development on the Failure of the System’s Symmetry." Systems 9, no. 4 (October 20, 2021): 74. http://dx.doi.org/10.3390/systems9040074.
Full textBÜLBÜL PEHLİVAN, Sibel. "ПОЛИТИКА БЕЗОПАСНОСТИ САУДОВСКОЙ АРАВИИ КАК РЕГИОНАЛЬНОЙ ДЕРЖАВЫ В ОДНОПОЛЯРНОЙ СИСТЕМЕ (2010-2020)." Karadeniz Uluslararası Bilimsel Dergi, no. 60 (December 18, 2023): 140–56. http://dx.doi.org/10.17498/kdeniz.1375733.
Full textUenal, Fatih. "Disentangling Islamophobia: The differential effects of symbolic, realistic, and terroristic threat perceptions as mediators between social dominance orientation and Islamophobia." Journal of Social and Political Psychology 4, no. 1 (April 7, 2016): 66–90. http://dx.doi.org/10.5964/jspp.v4i1.463.
Full textD, KHOBE, AKOSIM C, and KWAGA B.T. "SUSCEPTIBILITY TO THREATS AND THREAT SEVERITY OF ADAMAWA RANGELANDS, NIGERIA." JOURNAL OF ADVANCES IN AGRICULTURE 5, no. 2 (January 8, 2016): 698–705. http://dx.doi.org/10.24297/jaa.v5i2.5084.
Full textAchinger, Christine. "THREATS TO MODERNITY, THREATS OF MODERNITY." European Societies 14, no. 2 (May 2012): 240–58. http://dx.doi.org/10.1080/14616696.2012.676449.
Full textKulović, Jasmina, Sabina Baraković, and Jasmina Baraković Husić. "Analysis of Threats for Web of Things (WoT) System." B&H Electrical Engineering 14, no. 2 (December 1, 2020): 19–27. http://dx.doi.org/10.2478/bhee-2020-0009.
Full textFarooqui, Muhammad Najmul Islam, Junaid Arshad, and Muhammad Mubashir Khan. "A Layered Approach to Threat Modeling for 5G-Based Systems." Electronics 11, no. 12 (June 8, 2022): 1819. http://dx.doi.org/10.3390/electronics11121819.
Full textSaddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim, and Aprina Handayani. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (June 30, 2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Full textRizal, Muhamad, and Yanyan Yani. "Cybersecurity Policy and Its Implementation in Indonesia." JAS (Journal of ASEAN Studies) 4, no. 1 (August 9, 2016): 61. http://dx.doi.org/10.21512/jas.v4i1.967.
Full textMATIICHUK, Liubomyr, Oksana NOVOSAD, Olena PAVLOVA, and Mykhailo KORYTKO. "THREATS TO ENERGY SECURITY OF UKRAINE: IDENTIFICATION OF MEASUREMENT AND DIRECTIONS OF ELIMINATION." Ukrainian Journal of Applied Economics and Technology 7, no. 1 (December 23, 2021): 10–19. http://dx.doi.org/10.36887/2415-8453-2022-1-1.
Full textGause, F. Gregory. "Threats and Threat Perceptions in the Persian Gulf Region." Middle East Policy 14, no. 2 (June 2007): 119–24. http://dx.doi.org/10.1111/j.1475-4967.2007.00302.x.
Full textMARTINEZMARTINEZ, R., and A. DIAZFERNANDEZ. "Threat Perception: New Risks, New Threats and New Missions." Contributions to Conflict Management, Peace Economics and Development 4 (2007): 129–60. http://dx.doi.org/10.1016/s1572-8323(07)04006-4.
Full textBeering, Peter S. "Threats on Tap: Understanding the Terrorist Threat to Water." Journal of Water Resources Planning and Management 128, no. 3 (May 2002): 163–67. http://dx.doi.org/10.1061/(asce)0733-9496(2002)128:3(163).
Full textLi, XiaoHong, Ke He, Zhiyong Feng, and Guangquan Xu. "Unified threat model for analyzing and evaluating software threats." Security and Communication Networks 7, no. 10 (July 5, 2012): 1454–66. http://dx.doi.org/10.1002/sec.599.
Full textKearney, Stephen G., Josie Carwardine, April E. Reside, Diana O. Fisher, Martine Maron, Tim S. Doherty, Sarah Legge, et al. "The threats to Australia’s imperilled species and implications for a national conservation response." Pacific Conservation Biology 25, no. 3 (2019): 231. http://dx.doi.org/10.1071/pc18024.
Full textLaurin, Raphael. "An Investigation of the Roles of Group Identification, Perceived Ability, and Evaluative Conditions in Stereotype Threat Experiences." Psychological Reports 123, no. 5 (October 23, 2019): 1904–18. http://dx.doi.org/10.1177/0033294119884013.
Full textMykhailova, A., S. Chumachenko, Yе Morsch, and A. Partalian. "Мethods of complex operational expert assessment of military-man-made threats in the united forces operation area." Scientific bulletin: Сivil protection and fire safety 1, no. 1 (December 1, 2020): 23–33. http://dx.doi.org/10.33269/nvcz.2020.1.23-33.
Full textGiovacchini, Pietro, Lorenzo Borghi, Davide Tartari, Francesca Cucci, Andrea Caldarelli, Massimo Tassinari, Pietro Melandri, Marco Dinetti, Corrado Battisti, and Letizia Marsili. "Applying threat analysis approach in a small forest urban park (Northern Italy): local expert-based assessment to prioritize the management actions." Folia Oecologica 51, no. 1 (January 1, 2024): 66–74. http://dx.doi.org/10.2478/foecol-2024-0007.
Full textPendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (October 2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.
Full textBattisti, Corrado, Marisa Perchinelli, Sharon Vanadia, Pietro Giovacchini, and Letizia Marsili. "Monitoring Effectiveness of an Operational Project on Two Threatened Landbirds: Applying a Before–After Threat Analysis and Threat Reduction Assessment." Land 12, no. 2 (February 12, 2023): 464. http://dx.doi.org/10.3390/land12020464.
Full textShanee, Sam, Lorena Fernández-Hidalgo, Nestor Allgas, Veronica Vero, Raul Bello-Santa Cruz, Mark Bowler, Mrinalini Erkenswick Watsa, et al. "Threat Analysis of Forest Fragmentation and Degradation for Peruvian Primates." Diversity 15, no. 2 (February 15, 2023): 276. http://dx.doi.org/10.3390/d15020276.
Full textMeland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (April 2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.
Full textKogtev, Aleksey Valerievich. "Automated information system of assessing and predicting cyber threats on sea ships under Russian Federation flag: from subjects of cyber threats to stages of cyber-attack." Vestnik of Astrakhan State Technical University 2021, no. 2 (November 30, 2021): 35–42. http://dx.doi.org/10.24143/1812-9498-2021-2-35-42.
Full textGuay, P.-J., A. Taysom, R. Robinson, and J. P. Tracey. "Hybridization between the Mallard and native dabbling ducks: causes, consequences and management." Pacific Conservation Biology 20, no. 1 (2014): 41. http://dx.doi.org/10.1071/pc140041.
Full text