Gotowa bibliografia na temat „Threat”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Threat”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Threat"

1

Kiely, P., i C. R. Seed. "Assessing infectious threats - trick or threat?" ISBT Science Series 10, S1 (kwiecień 2015): 65–72. http://dx.doi.org/10.1111/voxs.12114.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Hamad, Mohammad, i Vassilis Prevelakis. "SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study". Information 11, nr 5 (19.05.2020): 273. http://dx.doi.org/10.3390/info11050273.

Pełny tekst źródła
Streszczenie:
In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environment. While these improvements have increased the safety and incontestability of the automotive system, they have opened the door for new potential security threats which need to be defined, assessed, and mitigated. The SAE J3061 standard has defined threat modeling as a critical step toward the secure development process for vehicle systems, but it did not determine which method could be used to achieve this process. Therefore, many threat modeling approaches were adopted. However, using one individual approach will not identify all the threats which could target the system, and may lead to insufficient mitigation mechanisms. Thus, having complete security requires the usage of a comprehensive threat model which identifies all the potential threats and vulnerabilities. In this work, we tried to revise the existing threat modeling efforts in the vehicular domain. Also, we proposed using a hybrid method called the Software, Asset, Vulnerability, Threat, and Attacker (SAVTA)-centric method to support security analysis for vehicular systems. SAVTA combines different existing threat modeling approaches to create a comprehensive and hybridized threat model. The model is used as an aid to construct general attack trees which illustrate attack vectors that threaten a particular vehicle asset and classify these attacks under different sub-trees.
Style APA, Harvard, Vancouver, ISO itp.
3

Kappenman, Emily S., Raphael Geddert, Jaclyn L. Farrens, John J. McDonald i Greg Hajcak. "Recoiling From Threat: Anxiety Is Related to Heightened Suppression of Threat, Not Increased Attention to Threat". Clinical Psychological Science 9, nr 3 (24.03.2021): 434–48. http://dx.doi.org/10.1177/2167702620961074.

Pełny tekst źródła
Streszczenie:
Increased attention to threat is considered a core feature of anxiety. However, there are multiple mechanisms of attention and multiple types of threat, and the relationships among attention, threat, and anxiety are poorly understood. In the present study, we used event-related potentials (ERPs) to separately isolate attentional selection (N2pc) and suppression (PD) of pictorial threats (photos of weapons, snakes, etc.) and conditioned threats (colored shapes paired with electric shock). In a sample of 48 young adults, both threat types were initially selected for increased attention (an N2pc), but only conditioned threats elicited subsequent suppression (a PD) and a reaction time (RT) bias. Levels of trait anxiety were unrelated to N2pc amplitude, but increased anxiety was associated with larger PDs (i.e., greater suppression) and reduced RT bias to conditioned threats. These results suggest that anxious individuals do not pay more attention to threats but rather engage more attentional suppression to overcome threats.
Style APA, Harvard, Vancouver, ISO itp.
4

MUGISHA, ARTHUR R., i SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda". Environmental Conservation 31, nr 3 (wrzesień 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.

Pełny tekst źródła
Streszczenie:
Loss of wildlife, encroachment on wild lands and conflicts between protected areas and neighbouring communities continue to threaten the integrity of protected areas (PAs) in Uganda. To increase support from local communities and ensure long-term sustainability for Uganda's PAs, a policy of community-based conservation was introduced in 1988 as a management approach in seven PAs. The effectiveness of the community-based approach for reducing threats was compared to conventional PA management by conducting a threat reduction assessment at 16 PAs, seven with community-based approaches and nine without. Additional data collected using document reviews, interviews with government officials, and surveys of PA wardens were compared with the threat reduction assessments. Twenty-three primary threats were identified at PAs. Local game poaching was the most common threat. The threat reduction assessment indices of community-based PAs (mean=49.0±12) were not significantly different from those of conventional PAs (mean=37.96±21.6). Some specific threats, such as bush burning, logging, encroachment and unclear boundaries, seemed to be better mitigated at community-based PAs. Management approaches at all PAs mitigated fewer than half of the identified threats. Management approaches are needed that directly target PA threats, go beyond PA boundaries by involving additional government departments, link people's livelihoods to conservation efforts and strengthen PA institutions.
Style APA, Harvard, Vancouver, ISO itp.
5

Sandy, Djoko Andoko, Poppy Setiawati Nurisnaeny i Mira Murniasari. "The Threat of Social Network Games in Indonesia". Borneo Educational Journal (Borju) 5, nr 2 (26.08.2023): 335–51. http://dx.doi.org/10.24903/bej.v5i2.1393.

Pełny tekst źródła
Streszczenie:
This research examines the potential threat through SNG in Indonesia. The theories of threat, social media, cyber, and network society are used to analyze the research problem through qualitative analysis. Data was obtained through interviews and literature studies. The results of the study show that the potential threat on SNG includes ideological threats in society, growing illegal and pornographic content, theft of personal data, illegal monitoring of user activities, online fraud, cyberbullying, inappropriate content, dependence, and cyber attacks that threaten the activities of social network game users in Indonesia.
Style APA, Harvard, Vancouver, ISO itp.
6

Bedi, Punam, Vandana Gandotra, Archana Singhal, Himanshi Narang i Sumit Sharma. "Mitigating multi-threats optimally in proactive threat management". ACM SIGSOFT Software Engineering Notes 38, nr 1 (23.01.2013): 1–7. http://dx.doi.org/10.1145/2413038.2413041.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Muhammed, Khaleel, Aavudai Anandhi, Gang Chen i Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats". Sustainability 13, nr 20 (12.10.2021): 11259. http://dx.doi.org/10.3390/su132011259.

Pełny tekst źródła
Streszczenie:
As the human population increases, the landscape is altered to provide housing, food, and industry. Human activity poses a risk to the health of natural habitats that, in turn, affect biodiversity. Biodiversity is necessary for a functioning ecosystem, as species work synergistically to create a livable environment. It is, therefore, important to know how human practices and natural events threaten these habitats and the species living in them. A universal method of modeling habitat threats does not exist. This paper details the use of a literature review to formulate a new framework called Define–Investigate–Estimate–Map (DIEM). This framework is a process of defining threats, investigating an area to discover what threats are present, estimating the severity of those threats, and mapping the threats. Analysis of 62 studies was conducted to determine how different authors define and characterize threats in various contexts. The results of this analysis were then applied to a case study to evaluate the Choctawhatchee River and Bay Watershed. Results suggest that the most abundant threat in the watershed is agricultural development, and the most destructive threat is urban development. These two threats have the greatest impact on the total threat level of the watershed. Applying the DIEM framework demonstrates its helpfulness in regional analysis, watershed modeling, and land development planning.
Style APA, Harvard, Vancouver, ISO itp.
8

Muhammed, Khaleel, Aavudai Anandhi, Gang Chen i Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats". Sustainability 13, nr 20 (12.10.2021): 11259. http://dx.doi.org/10.3390/su132011259.

Pełny tekst źródła
Streszczenie:
As the human population increases, the landscape is altered to provide housing, food, and industry. Human activity poses a risk to the health of natural habitats that, in turn, affect biodiversity. Biodiversity is necessary for a functioning ecosystem, as species work synergistically to create a livable environment. It is, therefore, important to know how human practices and natural events threaten these habitats and the species living in them. A universal method of modeling habitat threats does not exist. This paper details the use of a literature review to formulate a new framework called Define–Investigate–Estimate–Map (DIEM). This framework is a process of defining threats, investigating an area to discover what threats are present, estimating the severity of those threats, and mapping the threats. Analysis of 62 studies was conducted to determine how different authors define and characterize threats in various contexts. The results of this analysis were then applied to a case study to evaluate the Choctawhatchee River and Bay Watershed. Results suggest that the most abundant threat in the watershed is agricultural development, and the most destructive threat is urban development. These two threats have the greatest impact on the total threat level of the watershed. Applying the DIEM framework demonstrates its helpfulness in regional analysis, watershed modeling, and land development planning.
Style APA, Harvard, Vancouver, ISO itp.
9

Riek, Blake M., Eric W. Mania i Samuel L. Gaertner. "Intergroup Threat and Outgroup Attitudes: A Meta-Analytic Review". Personality and Social Psychology Review 10, nr 4 (listopad 2006): 336–53. http://dx.doi.org/10.1207/s15327957pspr1004_4.

Pełny tekst źródła
Streszczenie:
This article examines the relationship between intergroup threat and negative outgroup attitudes. We first qualitatively review the intergroup threat literature, describing the shift from competing theories toward more integrated approaches, such as the integrated threat theory (ITT; W. G. Stephan & Stephan, 2000). The types of threats discussed include: realistic threat, symbolic threat, intergroup anxiety, negative stereotypes, group esteem threat, and distinctiveness threat. We then conducted a quantitative meta-analysis examining the relationships between various intergroup threats and outgroup attitudes. The meta-analysis, involving 95 samples, revealed that 5 different threat types had a positive relationship with negative outgroup attitudes. Additionally, outgroup status moderated some of these relationships. Implications and future directions are considered.
Style APA, Harvard, Vancouver, ISO itp.
10

Syomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities". Actual problems of innovative economy, nr 3 (30.05.2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.

Pełny tekst źródła
Streszczenie:
Introduction. The functioning of agrarian business entities is constantly influenced by external and internal envi-ronmental factors, some of which threaten its organizational and legal security. Given the novelty of investigated security, the issue of determination threats in this area, identifying management tools, methods, and strategies is relevant, as it allows us to consider enterprise security more broadly than in the traditional economic sense. The purpose of the study is to identify the main tools for managing organizational and legal security and to develop a scheme for preventive management. Results. The difference between risks and threats is clarified. The classification of threats into controlled and uncon-trolled has been done. A description of the methodological basis structure of organizational and legal security management is given. The stages of managing threats to the organizational and legal security of agrarian business entities have been determined. In the identification phase, the external environment is analyzed by a variety of factors and the internal envi-ronment by the mental map of stakeholder interests, needs and values, as well as by areas: efficiency of organizational struc-ture, hierarchy of authorities, system of power delegation, motivational system, control of production quality, processes of products sale, the mode of payment of the ward and the provision of annual leave, keeping of all forms of reporting, financial discipline, ecological standards control of activity. The external environment of the agrarian business entities functioning is analyzed in relation to possible threats to organizational and legal security. The development of a threat management plan is considered. The nature of the implicit threats and the ways to manage them are described, which involves allocating a budget to cover unforeseen losses. The description of the stage of quantitative and qualitative analysis in threat management is given. The development description of the threat classification scale is presented. The path of threat priority analysis is determined, which involves the matrix development of threats placement on two parameters: probability of occurrence and degree of impact. The description of quantitative methods of threat assessment is presented. The definition of the budget amount for the implementation of the organizational and legal security management strategy is given. The methodological support for the choice of the organizational and legal security management strategy has been presented using the method of hierarchy analysis based on the criteria of efficiency, cost and effectiveness. The system of preventive management of organi-zational and legal security of agrarian business entities is presented. Key words: threats, risks, organizational and legal security, agrarian subject, threat management strategy, threat identification, quantitative analysis, qualitative analysis, method of hierarchy analysis.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Threat"

1

Eckert, Christine. "Stereotype Threat". Ruprecht-Karls-Universität, 2014. https://ul.qucosa.de/id/qucosa%3A15350.

Pełny tekst źródła
Streszczenie:
Stereotype Threat wird definiert als ein Gefühl der Bedrohung, das Personen in einer Situation erleben, in der sie befürchten, aufgrund eines negativen Stereotyps über ihre Gruppe beurteilt zu werden bzw. durch ihr Verhalten das Stereotyp unbeabsichtigterweise zu bestätigen. Der Begriff geht auf Claude M. Steele und Joshua Aronson zurück. Stereotype Threat kann als ein situatives Dilemma bezeichnet werden, das bei Mitgliedern stigmatisierter Gruppen in Testsituationen kurzfristig zu signifikanten Leistungseinbußen führen kann. Es kann auch bei anderen Wahlentscheidungen auftreten. Empirisch gesicherte Befunde für die längerfristigen Auswirkungen liegen bisher kaum vor. Auch die auslösenden Bedingungen sind nicht abschließend geklärt.
Style APA, Harvard, Vancouver, ISO itp.
2

Eckert, Christine. "Stereotype Threat". Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-219437.

Pełny tekst źródła
Streszczenie:
Stereotype Threat wird definiert als ein Gefühl der Bedrohung, das Personen in einer Situation erleben, in der sie befürchten, aufgrund eines negativen Stereotyps über ihre Gruppe beurteilt zu werden bzw. durch ihr Verhalten das Stereotyp unbeabsichtigterweise zu bestätigen. Der Begriff geht auf Claude M. Steele und Joshua Aronson zurück. Stereotype Threat kann als ein situatives Dilemma bezeichnet werden, das bei Mitgliedern stigmatisierter Gruppen in Testsituationen kurzfristig zu signifikanten Leistungseinbußen führen kann. Es kann auch bei anderen Wahlentscheidungen auftreten. Empirisch gesicherte Befunde für die längerfristigen Auswirkungen liegen bisher kaum vor. Auch die auslösenden Bedingungen sind nicht abschließend geklärt.
Style APA, Harvard, Vancouver, ISO itp.
3

Dunning, John Paul. "Bluetooth Threat Taxonomy". Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/76883.

Pełny tekst źródła
Streszczenie:
Since its release in 1999, Bluetooth has become a commonly used technology available on billions of devices through the world. Bluetooth is a wireless technology used for information transfer by devices such as Smartphones, headsets, keyboard/mice, laptops/desktops, video game systems, automobiles, printers, heart monitors, and surveillance cameras. Dozens of threats have been developed by researchers and hackers which targets these Bluetooth enabled devices. The work in this thesis provides insight into past and current Bluetooth threats along with methods of threat mitigation. The main focus of this thesis is the Bluetooth Threat Taxonomy (BTT); it is designed for classifying threats against Bluetooth enabled technology. The BTT incorporates nine distinct classifications to categorize Bluetooth attack tools and methods and a discussion on 42 threats. In addition, several new threats developed by the author will be discussed. This research also provides means to secure Bluetooth enabled devices. The Bluetooth Attack Detection Engine (BLADE) is as a host-based Intrusion Detection System (IDS) presented to detect threats targeted toward a host system. Finally, a threat mitigation schema is provided to act as a guideline for securing Bluetooth enabled devices.
Master of Science
Style APA, Harvard, Vancouver, ISO itp.
4

Taylor, Emma. "A veiled threat". Thesis, Taylor, Emma (2011) A veiled threat. Honours thesis, Murdoch University, 2011. https://researchrepository.murdoch.edu.au/id/eprint/41700/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding". Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.

Pełny tekst źródła
Streszczenie:
The advent of virtualization technologies has evolved the IT infrastructure and organizations are migrating to virtual platforms. Virtualization is also the foundation for cloud platform services. Virtualization is known to provide more security into the infrastructure apart from agility and flexibility. However security aspects of virtualization are often overlooked. Various attacks to the virtualization hypervisor and its administration component are desirable for adversaries. The threats to virtualization must be rigorously scrutinized to realize common breaches and knowing what is more attractive for attackers. In this thesis a current state of perimeter and operational threats along with taxonomy of virtualization security threats is provided. The common attacks based on vulnerability database are investigated. A distribution of the virtualization software vulnerabilities, mapped to the taxonomy is visualized. The famous industry best practices and standards are introduced and key features of each one are presented for safeguarding the virtualization environments. A discussion of other possible approaches to investigate the severity of threats based on automatic systems is presented.
Style APA, Harvard, Vancouver, ISO itp.
6

Olandersson, Sandra, i Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Pełny tekst źródła
Streszczenie:
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1 standard. A co-operation between the technical solutions and the administrative security is necessary to achieve information security, together with ordinary common sense. True, each of these can help improve security, but none of them is a complete solution. Security is not a product - it is a process. Threat trees form the basis of understanding that process. In this thesis, we have been using a qualitative method. The analysis method is a case study at the Social Department, at the municipality in Ronneby. Through interviews it has come us to hand, that the organisation has not established an information security policy which should give the code of practice for how the work of information security will pursue within the organisation. The organisation does neither use a model for structuring threats nor a method for collecting threats against information today. Through the structure of possible threats, the personnel generates an understanding of the organisation and takes active part finding adequate threats within the Social Department. As users understand the importance of security, how to use it, and where to report suspected violations, they can do a great deal to reduce the risk to loose information. Important to remember is that the education is an ongoing process, new users need training and trained users need reminding, especially when new technologies or processes are introduced. Thus, Threat Tree Analysis is useful for continuing towards developing an information security policy according to SS 62 77 99-1 standard.
För att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
Style APA, Harvard, Vancouver, ISO itp.
7

Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012". Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.

Pełny tekst źródła
Streszczenie:
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study is: What is the nature, scope and basis of the post-1994 official external threat perception of South Africa? The research problem generated four subsidiary questions: When does a security issue become a national threat? What types of threat are there? How does the South African government perceive these threats? And whose security is threatened? In responding to the main research questions, the study‟s findings note a change in perceptions during the post-Cold War era as to what constituted threats to security. The focus shifted from traditional to non-traditional threats to national security, because most current threats are non-military and transnational in nature. The analysis of South Africa‟s official external threat perception is informed by the changed views of Government towards what are considered the main threats to national security. The study concludes with key findings in response to the stated problem and with specific recommendations. The study confirmed that the nature of threats and security debates post-1994 have changed constantly with the expansion of the security agenda beyond state and military security. The official viewpoint is that South Africa at present is not faced with any military threats. Emphasis is currently placed on human beings as the main object of security. Most identified threats are transnational in nature and these relate to the illegal flow of immigrants, terrorism, organised crime, climate change (linked to food and water security), regional instability and other socio-economic threats. These threats are being perceived and articulated by Government through policy announcements and public speeches, also validated in the critical analysis of various scholars. The concept of non-traditional threats still lacks a commonly accepted definition; hence the study proposes the need for South Africa to define and outline non-military security threats in a comprehensive manner, preferably through the development of a South African External Threat Perception Framework. Developing such a framework will assist security agencies (such as analysts) and other stakeholders in providing advice and guidance to Government in identifying external security threats. This initiative could eliminate the abuse of power by various stakeholders in securitising any issue as a threat to national security, and instead divert those resources to other Government services. Provision should also be made in the form of policy initiatives on the role of military force and other agencies in addressing non-military security threats. Thus, the development of key elements of an integrated national security strategy in order to address external security issues and threats is essential.
Dissertation (MSecurity Studies)--University of Pretoria, 2013.
gm2015
Political Sciences
MSecurity Studies
Unrestricted
Style APA, Harvard, Vancouver, ISO itp.
8

Lee, Jong-Eun Roselyn. ""A threat on the net" : stereotype threat in avatar-represented online groups /". May be available electronically:, 2009. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Munshi, Asmaa Mahdi. "A study of insider threat behaviour: developing a holistic insider threat model". Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1668.

Pełny tekst źródła
Streszczenie:
This study investigates the factors that influence the insider threat behaviour. The research aims to develop a holistic view of insider threat behaviour and ways to manage it. This research adopts an Explanatory Mixed Methods approach for the research process. Firstly, the researcher collects the quantitative data and then the qualitative data. In the first phase, the holistic insider threat model is developed; in the second phase, best practices are developed to manage the threat.
Style APA, Harvard, Vancouver, ISO itp.
10

Roberts, Marianne. "Threat processing in fibromyalgia". Thesis, University of Southampton, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617820.

Pełny tekst źródła
Streszczenie:
This thesis considers recent advances in the conceptualisation of pain and in particular, the contribution of Neuromatrix theory (Melzack 1990, 1999,2005), which implicates threat processing biases in the aetiology and maintenance of chronic pain. Fibromyalgia is presented as a condition that can particularly benefit from this understanding. Guided by research into threat processing biases in anxiety, the literature on attentional bias to threat in chronic pain and fibromyalgia is reviewed, with special emphasis on the Stroop and visual probe paradigms. This highlights that a number of chronic pain conditions might be associated with attentional bias to pain. related threat; however the literature is inconsistent and there is a dearth of research using fibromyalgia samples. The limited research that has used pure fibromyalgia sample indicates that fibromyalgia might be associated with a generalised, rather than pain/disorder-specific, threat bias. Thus, an empirical study is also presented, that aims to establish whether fibromyalgia is associated with attentional bias to threat, as a method of gaining insight into possible, broader threat processing abnormalities. Visual probe methodology was used to test selective attention to generalised threat words in a sample of 34 fibromyalgia patients and healthy controls. Results showed a trend towards an interaction between group and the measures of attentional bias, with evidence that this related to hypervigilance to threat in the fibromyalgia group. This trend did not reach statistical significance (p = .090). There was no further evidence of attentional bias. Further research is needed in order to establish the reliability of these findings and address issues of low power, however the potential that results may be meaningful provides great scope for achieving new insight into fibromyalgia.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Threat"

1

Muñoz, Victoria C. Thread threat: Formaldehyde in textiles. New York: Nova Science Publishers, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Copyright Paperback Collection (Library of Congress), red. Threat warning. New York: Pinnacle Books/Kensington Pub. Corp., 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

The threat. New York: St. Martin's Press, 2006.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Cantore, Janice. Visible threat. Waterville, Maine: Thorndike Press, a part of Gale, Cengage Learning, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Opper, Richard Henry. Elemental threat. Claremont, CA: Oak Tree Press, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

1952-, Morrisey Tom, red. Kiloton threat. Nashville, Tenn: B&H Publishing Group, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

The threat. New York, NY: Simon & Schuster, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Rue, Nancy N. The threat. Minneapolis, Minn: Bethany House Publishers, 1998.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Emerson, Earl. Primal Threat. New York: Random House Publishing Group, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Guest, Jacqueline. Triple threat. Toronto: J. Lorimer, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Threat"

1

Wolf, Marilyn, i Dimitrios Serpanos. "Threats and Threat Analysis". W Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems, 35–45. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25808-5_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Möller, Dietmar P. F. "Threats and Threat Intelligence". W Advances in Information Security, 71–129. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Das, Ravindra. "Threat Modeling/Threat Hunting". W The Zero Trust Framework, 113–37. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003392965-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Weik, Martin H. "threat". W Computer Science and Communications Dictionary, 1780. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_19544.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bruce, Toni. "Threat". W Terra Ludus, 73–78. Rotterdam: SensePublishers, 2016. http://dx.doi.org/10.1007/978-94-6300-770-2_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Verschelden, Cia, i Kofi Lomotey. "Stereotype Threat and Identity Threat". W Bandwidth Recovery For Schools, 31–35. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003443162-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

"From threat to threat". W The Routledge Companion to UK Counter-Terrorism, 280–98. Routledge, 2012. http://dx.doi.org/10.4324/9780203105573-27.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

"threat". W Dictionary Geotechnical Engineering/Wörterbuch GeoTechnik, 1390. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41714-6_200985.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

"threat". W Dictionary Geotechnical Engineering/Wörterbuch GeoTechnik, 1390. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-41714-6_200986.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

"Threat". W Encyclopedia of Child Behavior and Development, 1486. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-79061-9_5941.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Threat"

1

Languirand, Eric R., Amee Polk, Michael Kauzlarich, Jacob Buchman i Matthew D. Collins. "Emerging explosive threat analysis for using threat anomaly detection (ThreAD)". W Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) Sensing XXV, redaktorzy Jason A. Guicheteau, Christopher R. Howle i Tanya L. Myers. SPIE, 2024. http://dx.doi.org/10.1117/12.3016072.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Clark, K., C. Lee, S. Tyree i J. Hale. "Guiding Threat Analysis with Threat Source Models". W 2007 IEEE SMC Information Assurance and Security Workshop. IEEE, 2007. http://dx.doi.org/10.1109/iaw.2007.381942.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Cain, Curtis C., i Eileen M. Trauth. "Stereotype threat". W the 2013 annual conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2487294.2487305.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Pramanik, Sarah. "Threat motivation". W 2013 10th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT). IEEE, 2013. http://dx.doi.org/10.1109/cewit.2013.6851346.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Yskout, Koen, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts i Wouter Joosen. "Threat modeling". W ICSE '20: 42nd International Conference on Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377816.3381741.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Ho, Shuyuan Mary, Hengyi Fu, Shashanka S. Timmarajus, Cheryl Booth, Jung Hoon Baeg i Muye Liu. "Insider Threat". W SIGMIS-CPR '15: 2015 Computers and People Research Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2751957.2751978.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Casey, Timothy, Patrick Koeberl i Claire Vishik. "Threat agents". W the Sixth Annual Workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1852666.1852728.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Kohli, Harpreet, Dale Lindskog, Pavol Zavarsky i Ron Ruhl. "An Enhanced Threat Identification Approach for Collusion Threats". W 2011 Third International Workshop on Security Measurements and Metrics (Metrisec). IEEE, 2011. http://dx.doi.org/10.1109/metrisec.2011.11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Shrivas, Mahendra Kumar, Thomas Yeboah Dean i S. Selva Brunda. "The Disruptive Blockchain Security Threats and Threat Categorization". W 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2020. http://dx.doi.org/10.1109/icpc2t48082.2020.9071475.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Chibueze Brendan, Ahuokpeme, i John McCarthy. "Taxonomy of Threat Categorization and Threat Intelligence Platform". W 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3). IEEE, 2019. http://dx.doi.org/10.1109/icgs3.2019.8688157.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Threat"

1

Woodard, Laura, Cynthia K. Veitch, Sherry Reede Thomas i David Patrick Duggan. Categorizing threat : building and using a generic threat matrix. Office of Scientific and Technical Information (OSTI), wrzesień 2007. http://dx.doi.org/10.2172/921121.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Webb, Jeff. Cooperative Threat Reduction. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1997. http://dx.doi.org/10.21236/ada398063.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Duggan, David Patrick. Generic threat profiles. Office of Scientific and Technical Information (OSTI), lipiec 2005. http://dx.doi.org/10.2172/882540.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kessler, Andrew, Michael Shewfelt, Jennifer Davis, Brian Connett, Jared Chiu-Rourman, Joseph Oravec, Shaunnah Wark, Ling Siew Ng, Seng Chuan Lim i Cheng Lock Chua. Maritime Threat Response. Fort Belvoir, VA: Defense Technical Information Center, czerwiec 2006. http://dx.doi.org/10.21236/ada462563.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Frye, Jason Neal, Cynthia K. Veitch, Mark Elliot Mateski, John T. Michalski, James Mark Harris, Cassandra M. Trevino i Scott Maruoka. Cyber threat metrics. Office of Scientific and Technical Information (OSTI), marzec 2012. http://dx.doi.org/10.2172/1039394.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

McKinney, Terry L., Timothy E. Moore, Robert E. Bender, Steven I. Case, Cheryl L. Snyder, Karen A. Ulatowski, David P. Goodykoontz, Kevin G. Burrowes, Breon E. Dehoux i Theresa L. Tameris. Cooperative Threat Reduction: Contracts Awarded by the Defense Threat Reduction Agency in Support of the Cooperative Threat Reduction Program. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2004. http://dx.doi.org/10.21236/ada433189.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Singh, Surinder Paul, Philip W. Gibbs i Garl A. Bultz. Nuclear Security: Threat Characterization. Office of Scientific and Technical Information (OSTI), marzec 2014. http://dx.doi.org/10.2172/1126557.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Singh, Surinder Paul, Philip W. Gibbs i Garl A. Bultz. Nuclear Security: Threat Definition. Office of Scientific and Technical Information (OSTI), marzec 2014. http://dx.doi.org/10.2172/1126558.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Patrick Treado, Oksana Klueva i Jeffrey Beckstead. Airborne Particulate Threat Assessment. Office of Scientific and Technical Information (OSTI), grudzień 2008. http://dx.doi.org/10.2172/966354.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Young, Byron J. Terrorism: Analyzing the Threat. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1998. http://dx.doi.org/10.21236/ada344982.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii