Literatura académica sobre el tema "Threat"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Threat".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Threat"

1

Kiely, P. y C. R. Seed. "Assessing infectious threats - trick or threat?" ISBT Science Series 10, S1 (abril de 2015): 65–72. http://dx.doi.org/10.1111/voxs.12114.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Hamad, Mohammad y Vassilis Prevelakis. "SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study". Information 11, n.º 5 (19 de mayo de 2020): 273. http://dx.doi.org/10.3390/info11050273.

Texto completo
Resumen
In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environment. While these improvements have increased the safety and incontestability of the automotive system, they have opened the door for new potential security threats which need to be defined, assessed, and mitigated. The SAE J3061 standard has defined threat modeling as a critical step toward the secure development process for vehicle systems, but it did not determine which method could be used to achieve this process. Therefore, many threat modeling approaches were adopted. However, using one individual approach will not identify all the threats which could target the system, and may lead to insufficient mitigation mechanisms. Thus, having complete security requires the usage of a comprehensive threat model which identifies all the potential threats and vulnerabilities. In this work, we tried to revise the existing threat modeling efforts in the vehicular domain. Also, we proposed using a hybrid method called the Software, Asset, Vulnerability, Threat, and Attacker (SAVTA)-centric method to support security analysis for vehicular systems. SAVTA combines different existing threat modeling approaches to create a comprehensive and hybridized threat model. The model is used as an aid to construct general attack trees which illustrate attack vectors that threaten a particular vehicle asset and classify these attacks under different sub-trees.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Kappenman, Emily S., Raphael Geddert, Jaclyn L. Farrens, John J. McDonald y Greg Hajcak. "Recoiling From Threat: Anxiety Is Related to Heightened Suppression of Threat, Not Increased Attention to Threat". Clinical Psychological Science 9, n.º 3 (24 de marzo de 2021): 434–48. http://dx.doi.org/10.1177/2167702620961074.

Texto completo
Resumen
Increased attention to threat is considered a core feature of anxiety. However, there are multiple mechanisms of attention and multiple types of threat, and the relationships among attention, threat, and anxiety are poorly understood. In the present study, we used event-related potentials (ERPs) to separately isolate attentional selection (N2pc) and suppression (PD) of pictorial threats (photos of weapons, snakes, etc.) and conditioned threats (colored shapes paired with electric shock). In a sample of 48 young adults, both threat types were initially selected for increased attention (an N2pc), but only conditioned threats elicited subsequent suppression (a PD) and a reaction time (RT) bias. Levels of trait anxiety were unrelated to N2pc amplitude, but increased anxiety was associated with larger PDs (i.e., greater suppression) and reduced RT bias to conditioned threats. These results suggest that anxious individuals do not pay more attention to threats but rather engage more attentional suppression to overcome threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

MUGISHA, ARTHUR R. y SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda". Environmental Conservation 31, n.º 3 (septiembre de 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.

Texto completo
Resumen
Loss of wildlife, encroachment on wild lands and conflicts between protected areas and neighbouring communities continue to threaten the integrity of protected areas (PAs) in Uganda. To increase support from local communities and ensure long-term sustainability for Uganda's PAs, a policy of community-based conservation was introduced in 1988 as a management approach in seven PAs. The effectiveness of the community-based approach for reducing threats was compared to conventional PA management by conducting a threat reduction assessment at 16 PAs, seven with community-based approaches and nine without. Additional data collected using document reviews, interviews with government officials, and surveys of PA wardens were compared with the threat reduction assessments. Twenty-three primary threats were identified at PAs. Local game poaching was the most common threat. The threat reduction assessment indices of community-based PAs (mean=49.0±12) were not significantly different from those of conventional PAs (mean=37.96±21.6). Some specific threats, such as bush burning, logging, encroachment and unclear boundaries, seemed to be better mitigated at community-based PAs. Management approaches at all PAs mitigated fewer than half of the identified threats. Management approaches are needed that directly target PA threats, go beyond PA boundaries by involving additional government departments, link people's livelihoods to conservation efforts and strengthen PA institutions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Sandy, Djoko Andoko, Poppy Setiawati Nurisnaeny y Mira Murniasari. "The Threat of Social Network Games in Indonesia". Borneo Educational Journal (Borju) 5, n.º 2 (26 de agosto de 2023): 335–51. http://dx.doi.org/10.24903/bej.v5i2.1393.

Texto completo
Resumen
This research examines the potential threat through SNG in Indonesia. The theories of threat, social media, cyber, and network society are used to analyze the research problem through qualitative analysis. Data was obtained through interviews and literature studies. The results of the study show that the potential threat on SNG includes ideological threats in society, growing illegal and pornographic content, theft of personal data, illegal monitoring of user activities, online fraud, cyberbullying, inappropriate content, dependence, and cyber attacks that threaten the activities of social network game users in Indonesia.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Bedi, Punam, Vandana Gandotra, Archana Singhal, Himanshi Narang y Sumit Sharma. "Mitigating multi-threats optimally in proactive threat management". ACM SIGSOFT Software Engineering Notes 38, n.º 1 (23 de enero de 2013): 1–7. http://dx.doi.org/10.1145/2413038.2413041.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Muhammed, Khaleel, Aavudai Anandhi, Gang Chen y Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats". Sustainability 13, n.º 20 (12 de octubre de 2021): 11259. http://dx.doi.org/10.3390/su132011259.

Texto completo
Resumen
As the human population increases, the landscape is altered to provide housing, food, and industry. Human activity poses a risk to the health of natural habitats that, in turn, affect biodiversity. Biodiversity is necessary for a functioning ecosystem, as species work synergistically to create a livable environment. It is, therefore, important to know how human practices and natural events threaten these habitats and the species living in them. A universal method of modeling habitat threats does not exist. This paper details the use of a literature review to formulate a new framework called Define–Investigate–Estimate–Map (DIEM). This framework is a process of defining threats, investigating an area to discover what threats are present, estimating the severity of those threats, and mapping the threats. Analysis of 62 studies was conducted to determine how different authors define and characterize threats in various contexts. The results of this analysis were then applied to a case study to evaluate the Choctawhatchee River and Bay Watershed. Results suggest that the most abundant threat in the watershed is agricultural development, and the most destructive threat is urban development. These two threats have the greatest impact on the total threat level of the watershed. Applying the DIEM framework demonstrates its helpfulness in regional analysis, watershed modeling, and land development planning.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Muhammed, Khaleel, Aavudai Anandhi, Gang Chen y Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats". Sustainability 13, n.º 20 (12 de octubre de 2021): 11259. http://dx.doi.org/10.3390/su132011259.

Texto completo
Resumen
As the human population increases, the landscape is altered to provide housing, food, and industry. Human activity poses a risk to the health of natural habitats that, in turn, affect biodiversity. Biodiversity is necessary for a functioning ecosystem, as species work synergistically to create a livable environment. It is, therefore, important to know how human practices and natural events threaten these habitats and the species living in them. A universal method of modeling habitat threats does not exist. This paper details the use of a literature review to formulate a new framework called Define–Investigate–Estimate–Map (DIEM). This framework is a process of defining threats, investigating an area to discover what threats are present, estimating the severity of those threats, and mapping the threats. Analysis of 62 studies was conducted to determine how different authors define and characterize threats in various contexts. The results of this analysis were then applied to a case study to evaluate the Choctawhatchee River and Bay Watershed. Results suggest that the most abundant threat in the watershed is agricultural development, and the most destructive threat is urban development. These two threats have the greatest impact on the total threat level of the watershed. Applying the DIEM framework demonstrates its helpfulness in regional analysis, watershed modeling, and land development planning.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Riek, Blake M., Eric W. Mania y Samuel L. Gaertner. "Intergroup Threat and Outgroup Attitudes: A Meta-Analytic Review". Personality and Social Psychology Review 10, n.º 4 (noviembre de 2006): 336–53. http://dx.doi.org/10.1207/s15327957pspr1004_4.

Texto completo
Resumen
This article examines the relationship between intergroup threat and negative outgroup attitudes. We first qualitatively review the intergroup threat literature, describing the shift from competing theories toward more integrated approaches, such as the integrated threat theory (ITT; W. G. Stephan & Stephan, 2000). The types of threats discussed include: realistic threat, symbolic threat, intergroup anxiety, negative stereotypes, group esteem threat, and distinctiveness threat. We then conducted a quantitative meta-analysis examining the relationships between various intergroup threats and outgroup attitudes. The meta-analysis, involving 95 samples, revealed that 5 different threat types had a positive relationship with negative outgroup attitudes. Additionally, outgroup status moderated some of these relationships. Implications and future directions are considered.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Syomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities". Actual problems of innovative economy, n.º 3 (30 de mayo de 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.

Texto completo
Resumen
Introduction. The functioning of agrarian business entities is constantly influenced by external and internal envi-ronmental factors, some of which threaten its organizational and legal security. Given the novelty of investigated security, the issue of determination threats in this area, identifying management tools, methods, and strategies is relevant, as it allows us to consider enterprise security more broadly than in the traditional economic sense. The purpose of the study is to identify the main tools for managing organizational and legal security and to develop a scheme for preventive management. Results. The difference between risks and threats is clarified. The classification of threats into controlled and uncon-trolled has been done. A description of the methodological basis structure of organizational and legal security management is given. The stages of managing threats to the organizational and legal security of agrarian business entities have been determined. In the identification phase, the external environment is analyzed by a variety of factors and the internal envi-ronment by the mental map of stakeholder interests, needs and values, as well as by areas: efficiency of organizational struc-ture, hierarchy of authorities, system of power delegation, motivational system, control of production quality, processes of products sale, the mode of payment of the ward and the provision of annual leave, keeping of all forms of reporting, financial discipline, ecological standards control of activity. The external environment of the agrarian business entities functioning is analyzed in relation to possible threats to organizational and legal security. The development of a threat management plan is considered. The nature of the implicit threats and the ways to manage them are described, which involves allocating a budget to cover unforeseen losses. The description of the stage of quantitative and qualitative analysis in threat management is given. The development description of the threat classification scale is presented. The path of threat priority analysis is determined, which involves the matrix development of threats placement on two parameters: probability of occurrence and degree of impact. The description of quantitative methods of threat assessment is presented. The definition of the budget amount for the implementation of the organizational and legal security management strategy is given. The methodological support for the choice of the organizational and legal security management strategy has been presented using the method of hierarchy analysis based on the criteria of efficiency, cost and effectiveness. The system of preventive management of organi-zational and legal security of agrarian business entities is presented. Key words: threats, risks, organizational and legal security, agrarian subject, threat management strategy, threat identification, quantitative analysis, qualitative analysis, method of hierarchy analysis.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "Threat"

1

Eckert, Christine. "Stereotype Threat". Ruprecht-Karls-Universität, 2014. https://ul.qucosa.de/id/qucosa%3A15350.

Texto completo
Resumen
Stereotype Threat wird definiert als ein Gefühl der Bedrohung, das Personen in einer Situation erleben, in der sie befürchten, aufgrund eines negativen Stereotyps über ihre Gruppe beurteilt zu werden bzw. durch ihr Verhalten das Stereotyp unbeabsichtigterweise zu bestätigen. Der Begriff geht auf Claude M. Steele und Joshua Aronson zurück. Stereotype Threat kann als ein situatives Dilemma bezeichnet werden, das bei Mitgliedern stigmatisierter Gruppen in Testsituationen kurzfristig zu signifikanten Leistungseinbußen führen kann. Es kann auch bei anderen Wahlentscheidungen auftreten. Empirisch gesicherte Befunde für die längerfristigen Auswirkungen liegen bisher kaum vor. Auch die auslösenden Bedingungen sind nicht abschließend geklärt.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Eckert, Christine. "Stereotype Threat". Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-219437.

Texto completo
Resumen
Stereotype Threat wird definiert als ein Gefühl der Bedrohung, das Personen in einer Situation erleben, in der sie befürchten, aufgrund eines negativen Stereotyps über ihre Gruppe beurteilt zu werden bzw. durch ihr Verhalten das Stereotyp unbeabsichtigterweise zu bestätigen. Der Begriff geht auf Claude M. Steele und Joshua Aronson zurück. Stereotype Threat kann als ein situatives Dilemma bezeichnet werden, das bei Mitgliedern stigmatisierter Gruppen in Testsituationen kurzfristig zu signifikanten Leistungseinbußen führen kann. Es kann auch bei anderen Wahlentscheidungen auftreten. Empirisch gesicherte Befunde für die längerfristigen Auswirkungen liegen bisher kaum vor. Auch die auslösenden Bedingungen sind nicht abschließend geklärt.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Dunning, John Paul. "Bluetooth Threat Taxonomy". Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/76883.

Texto completo
Resumen
Since its release in 1999, Bluetooth has become a commonly used technology available on billions of devices through the world. Bluetooth is a wireless technology used for information transfer by devices such as Smartphones, headsets, keyboard/mice, laptops/desktops, video game systems, automobiles, printers, heart monitors, and surveillance cameras. Dozens of threats have been developed by researchers and hackers which targets these Bluetooth enabled devices. The work in this thesis provides insight into past and current Bluetooth threats along with methods of threat mitigation. The main focus of this thesis is the Bluetooth Threat Taxonomy (BTT); it is designed for classifying threats against Bluetooth enabled technology. The BTT incorporates nine distinct classifications to categorize Bluetooth attack tools and methods and a discussion on 42 threats. In addition, several new threats developed by the author will be discussed. This research also provides means to secure Bluetooth enabled devices. The Bluetooth Attack Detection Engine (BLADE) is as a host-based Intrusion Detection System (IDS) presented to detect threats targeted toward a host system. Finally, a threat mitigation schema is provided to act as a guideline for securing Bluetooth enabled devices.
Master of Science
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Taylor, Emma. "A veiled threat". Thesis, Taylor, Emma (2011) A veiled threat. Honours thesis, Murdoch University, 2011. https://researchrepository.murdoch.edu.au/id/eprint/41700/.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding". Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.

Texto completo
Resumen
The advent of virtualization technologies has evolved the IT infrastructure and organizations are migrating to virtual platforms. Virtualization is also the foundation for cloud platform services. Virtualization is known to provide more security into the infrastructure apart from agility and flexibility. However security aspects of virtualization are often overlooked. Various attacks to the virtualization hypervisor and its administration component are desirable for adversaries. The threats to virtualization must be rigorously scrutinized to realize common breaches and knowing what is more attractive for attackers. In this thesis a current state of perimeter and operational threats along with taxonomy of virtualization security threats is provided. The common attacks based on vulnerability database are investigated. A distribution of the virtualization software vulnerabilities, mapped to the taxonomy is visualized. The famous industry best practices and standards are introduced and key features of each one are presented for safeguarding the virtualization environments. A discussion of other possible approaches to investigate the severity of threats based on automatic systems is presented.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Olandersson, Sandra y Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Texto completo
Resumen
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1 standard. A co-operation between the technical solutions and the administrative security is necessary to achieve information security, together with ordinary common sense. True, each of these can help improve security, but none of them is a complete solution. Security is not a product - it is a process. Threat trees form the basis of understanding that process. In this thesis, we have been using a qualitative method. The analysis method is a case study at the Social Department, at the municipality in Ronneby. Through interviews it has come us to hand, that the organisation has not established an information security policy which should give the code of practice for how the work of information security will pursue within the organisation. The organisation does neither use a model for structuring threats nor a method for collecting threats against information today. Through the structure of possible threats, the personnel generates an understanding of the organisation and takes active part finding adequate threats within the Social Department. As users understand the importance of security, how to use it, and where to report suspected violations, they can do a great deal to reduce the risk to loose information. Important to remember is that the education is an ongoing process, new users need training and trained users need reminding, especially when new technologies or processes are introduced. Thus, Threat Tree Analysis is useful for continuing towards developing an information security policy according to SS 62 77 99-1 standard.
För att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012". Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.

Texto completo
Resumen
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study is: What is the nature, scope and basis of the post-1994 official external threat perception of South Africa? The research problem generated four subsidiary questions: When does a security issue become a national threat? What types of threat are there? How does the South African government perceive these threats? And whose security is threatened? In responding to the main research questions, the study‟s findings note a change in perceptions during the post-Cold War era as to what constituted threats to security. The focus shifted from traditional to non-traditional threats to national security, because most current threats are non-military and transnational in nature. The analysis of South Africa‟s official external threat perception is informed by the changed views of Government towards what are considered the main threats to national security. The study concludes with key findings in response to the stated problem and with specific recommendations. The study confirmed that the nature of threats and security debates post-1994 have changed constantly with the expansion of the security agenda beyond state and military security. The official viewpoint is that South Africa at present is not faced with any military threats. Emphasis is currently placed on human beings as the main object of security. Most identified threats are transnational in nature and these relate to the illegal flow of immigrants, terrorism, organised crime, climate change (linked to food and water security), regional instability and other socio-economic threats. These threats are being perceived and articulated by Government through policy announcements and public speeches, also validated in the critical analysis of various scholars. The concept of non-traditional threats still lacks a commonly accepted definition; hence the study proposes the need for South Africa to define and outline non-military security threats in a comprehensive manner, preferably through the development of a South African External Threat Perception Framework. Developing such a framework will assist security agencies (such as analysts) and other stakeholders in providing advice and guidance to Government in identifying external security threats. This initiative could eliminate the abuse of power by various stakeholders in securitising any issue as a threat to national security, and instead divert those resources to other Government services. Provision should also be made in the form of policy initiatives on the role of military force and other agencies in addressing non-military security threats. Thus, the development of key elements of an integrated national security strategy in order to address external security issues and threats is essential.
Dissertation (MSecurity Studies)--University of Pretoria, 2013.
gm2015
Political Sciences
MSecurity Studies
Unrestricted
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Lee, Jong-Eun Roselyn. ""A threat on the net" : stereotype threat in avatar-represented online groups /". May be available electronically:, 2009. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Munshi, Asmaa Mahdi. "A study of insider threat behaviour: developing a holistic insider threat model". Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1668.

Texto completo
Resumen
This study investigates the factors that influence the insider threat behaviour. The research aims to develop a holistic view of insider threat behaviour and ways to manage it. This research adopts an Explanatory Mixed Methods approach for the research process. Firstly, the researcher collects the quantitative data and then the qualitative data. In the first phase, the holistic insider threat model is developed; in the second phase, best practices are developed to manage the threat.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Roberts, Marianne. "Threat processing in fibromyalgia". Thesis, University of Southampton, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617820.

Texto completo
Resumen
This thesis considers recent advances in the conceptualisation of pain and in particular, the contribution of Neuromatrix theory (Melzack 1990, 1999,2005), which implicates threat processing biases in the aetiology and maintenance of chronic pain. Fibromyalgia is presented as a condition that can particularly benefit from this understanding. Guided by research into threat processing biases in anxiety, the literature on attentional bias to threat in chronic pain and fibromyalgia is reviewed, with special emphasis on the Stroop and visual probe paradigms. This highlights that a number of chronic pain conditions might be associated with attentional bias to pain. related threat; however the literature is inconsistent and there is a dearth of research using fibromyalgia samples. The limited research that has used pure fibromyalgia sample indicates that fibromyalgia might be associated with a generalised, rather than pain/disorder-specific, threat bias. Thus, an empirical study is also presented, that aims to establish whether fibromyalgia is associated with attentional bias to threat, as a method of gaining insight into possible, broader threat processing abnormalities. Visual probe methodology was used to test selective attention to generalised threat words in a sample of 34 fibromyalgia patients and healthy controls. Results showed a trend towards an interaction between group and the measures of attentional bias, with evidence that this related to hypervigilance to threat in the fibromyalgia group. This trend did not reach statistical significance (p = .090). There was no further evidence of attentional bias. Further research is needed in order to establish the reliability of these findings and address issues of low power, however the potential that results may be meaningful provides great scope for achieving new insight into fibromyalgia.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Threat"

1

Muñoz, Victoria C. Thread threat: Formaldehyde in textiles. New York: Nova Science Publishers, 2011.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Copyright Paperback Collection (Library of Congress), ed. Threat warning. New York: Pinnacle Books/Kensington Pub. Corp., 2011.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

The threat. New York: St. Martin's Press, 2006.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Cantore, Janice. Visible threat. Waterville, Maine: Thorndike Press, a part of Gale, Cengage Learning, 2014.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Opper, Richard Henry. Elemental threat. Claremont, CA: Oak Tree Press, 2002.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

1952-, Morrisey Tom, ed. Kiloton threat. Nashville, Tenn: B&H Publishing Group, 2011.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

The threat. New York, NY: Simon & Schuster, 1998.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Rue, Nancy N. The threat. Minneapolis, Minn: Bethany House Publishers, 1998.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Emerson, Earl. Primal Threat. New York: Random House Publishing Group, 2008.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Guest, Jacqueline. Triple threat. Toronto: J. Lorimer, 2011.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Threat"

1

Wolf, Marilyn y Dimitrios Serpanos. "Threats and Threat Analysis". En Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems, 35–45. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25808-5_3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Möller, Dietmar P. F. "Threats and Threat Intelligence". En Advances in Information Security, 71–129. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Das, Ravindra. "Threat Modeling/Threat Hunting". En The Zero Trust Framework, 113–37. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003392965-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Weik, Martin H. "threat". En Computer Science and Communications Dictionary, 1780. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19544.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Bruce, Toni. "Threat". En Terra Ludus, 73–78. Rotterdam: SensePublishers, 2016. http://dx.doi.org/10.1007/978-94-6300-770-2_9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Verschelden, Cia y Kofi Lomotey. "Stereotype Threat and Identity Threat". En Bandwidth Recovery For Schools, 31–35. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003443162-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

"From threat to threat". En The Routledge Companion to UK Counter-Terrorism, 280–98. Routledge, 2012. http://dx.doi.org/10.4324/9780203105573-27.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

"threat". En Dictionary Geotechnical Engineering/Wörterbuch GeoTechnik, 1390. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41714-6_200985.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

"threat". En Dictionary Geotechnical Engineering/Wörterbuch GeoTechnik, 1390. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41714-6_200986.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

"Threat". En Encyclopedia of Child Behavior and Development, 1486. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-79061-9_5941.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Threat"

1

Languirand, Eric R., Amee Polk, Michael Kauzlarich, Jacob Buchman y Matthew D. Collins. "Emerging explosive threat analysis for using threat anomaly detection (ThreAD)". En Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) Sensing XXV, editado por Jason A. Guicheteau, Christopher R. Howle y Tanya L. Myers. SPIE, 2024. http://dx.doi.org/10.1117/12.3016072.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Clark, K., C. Lee, S. Tyree y J. Hale. "Guiding Threat Analysis with Threat Source Models". En 2007 IEEE SMC Information Assurance and Security Workshop. IEEE, 2007. http://dx.doi.org/10.1109/iaw.2007.381942.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Cain, Curtis C. y Eileen M. Trauth. "Stereotype threat". En the 2013 annual conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2487294.2487305.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Pramanik, Sarah. "Threat motivation". En 2013 10th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT). IEEE, 2013. http://dx.doi.org/10.1109/cewit.2013.6851346.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Yskout, Koen, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts y Wouter Joosen. "Threat modeling". En ICSE '20: 42nd International Conference on Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377816.3381741.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Ho, Shuyuan Mary, Hengyi Fu, Shashanka S. Timmarajus, Cheryl Booth, Jung Hoon Baeg y Muye Liu. "Insider Threat". En SIGMIS-CPR '15: 2015 Computers and People Research Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751957.2751978.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Casey, Timothy, Patrick Koeberl y Claire Vishik. "Threat agents". En the Sixth Annual Workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1852666.1852728.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Kohli, Harpreet, Dale Lindskog, Pavol Zavarsky y Ron Ruhl. "An Enhanced Threat Identification Approach for Collusion Threats". En 2011 Third International Workshop on Security Measurements and Metrics (Metrisec). IEEE, 2011. http://dx.doi.org/10.1109/metrisec.2011.11.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Shrivas, Mahendra Kumar, Thomas Yeboah Dean y S. Selva Brunda. "The Disruptive Blockchain Security Threats and Threat Categorization". En 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071475.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Chibueze Brendan, Ahuokpeme y John McCarthy. "Taxonomy of Threat Categorization and Threat Intelligence Platform". En 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). IEEE, 2019. http://dx.doi.org/10.1109/icgs3.2019.8688157.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Threat"

1

Woodard, Laura, Cynthia K. Veitch, Sherry Reede Thomas y David Patrick Duggan. Categorizing threat : building and using a generic threat matrix. Office of Scientific and Technical Information (OSTI), septiembre de 2007. http://dx.doi.org/10.2172/921121.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Webb, Jeff. Cooperative Threat Reduction. Fort Belvoir, VA: Defense Technical Information Center, abril de 1997. http://dx.doi.org/10.21236/ada398063.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Duggan, David Patrick. Generic threat profiles. Office of Scientific and Technical Information (OSTI), julio de 2005. http://dx.doi.org/10.2172/882540.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kessler, Andrew, Michael Shewfelt, Jennifer Davis, Brian Connett, Jared Chiu-Rourman, Joseph Oravec, Shaunnah Wark, Ling Siew Ng, Seng Chuan Lim y Cheng Lock Chua. Maritime Threat Response. Fort Belvoir, VA: Defense Technical Information Center, junio de 2006. http://dx.doi.org/10.21236/ada462563.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Frye, Jason Neal, Cynthia K. Veitch, Mark Elliot Mateski, John T. Michalski, James Mark Harris, Cassandra M. Trevino y Scott Maruoka. Cyber threat metrics. Office of Scientific and Technical Information (OSTI), marzo de 2012. http://dx.doi.org/10.2172/1039394.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

McKinney, Terry L., Timothy E. Moore, Robert E. Bender, Steven I. Case, Cheryl L. Snyder, Karen A. Ulatowski, David P. Goodykoontz, Kevin G. Burrowes, Breon E. Dehoux y Theresa L. Tameris. Cooperative Threat Reduction: Contracts Awarded by the Defense Threat Reduction Agency in Support of the Cooperative Threat Reduction Program. Fort Belvoir, VA: Defense Technical Information Center, agosto de 2004. http://dx.doi.org/10.21236/ada433189.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Singh, Surinder Paul, Philip W. Gibbs y Garl A. Bultz. Nuclear Security: Threat Characterization. Office of Scientific and Technical Information (OSTI), marzo de 2014. http://dx.doi.org/10.2172/1126557.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Singh, Surinder Paul, Philip W. Gibbs y Garl A. Bultz. Nuclear Security: Threat Definition. Office of Scientific and Technical Information (OSTI), marzo de 2014. http://dx.doi.org/10.2172/1126558.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Patrick Treado, Oksana Klueva y Jeffrey Beckstead. Airborne Particulate Threat Assessment. Office of Scientific and Technical Information (OSTI), diciembre de 2008. http://dx.doi.org/10.2172/966354.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Young, Byron J. Terrorism: Analyzing the Threat. Fort Belvoir, VA: Defense Technical Information Center, abril de 1998. http://dx.doi.org/10.21236/ada344982.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía