Rozprawy doktorskie na temat „Threat”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Threat.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Threat”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Eckert, Christine. "Stereotype Threat". Ruprecht-Karls-Universität, 2014. https://ul.qucosa.de/id/qucosa%3A15350.

Pełny tekst źródła
Streszczenie:
Stereotype Threat wird definiert als ein Gefühl der Bedrohung, das Personen in einer Situation erleben, in der sie befürchten, aufgrund eines negativen Stereotyps über ihre Gruppe beurteilt zu werden bzw. durch ihr Verhalten das Stereotyp unbeabsichtigterweise zu bestätigen. Der Begriff geht auf Claude M. Steele und Joshua Aronson zurück. Stereotype Threat kann als ein situatives Dilemma bezeichnet werden, das bei Mitgliedern stigmatisierter Gruppen in Testsituationen kurzfristig zu signifikanten Leistungseinbußen führen kann. Es kann auch bei anderen Wahlentscheidungen auftreten. Empirisch gesicherte Befunde für die längerfristigen Auswirkungen liegen bisher kaum vor. Auch die auslösenden Bedingungen sind nicht abschließend geklärt.
Style APA, Harvard, Vancouver, ISO itp.
2

Eckert, Christine. "Stereotype Threat". Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-219437.

Pełny tekst źródła
Streszczenie:
Stereotype Threat wird definiert als ein Gefühl der Bedrohung, das Personen in einer Situation erleben, in der sie befürchten, aufgrund eines negativen Stereotyps über ihre Gruppe beurteilt zu werden bzw. durch ihr Verhalten das Stereotyp unbeabsichtigterweise zu bestätigen. Der Begriff geht auf Claude M. Steele und Joshua Aronson zurück. Stereotype Threat kann als ein situatives Dilemma bezeichnet werden, das bei Mitgliedern stigmatisierter Gruppen in Testsituationen kurzfristig zu signifikanten Leistungseinbußen führen kann. Es kann auch bei anderen Wahlentscheidungen auftreten. Empirisch gesicherte Befunde für die längerfristigen Auswirkungen liegen bisher kaum vor. Auch die auslösenden Bedingungen sind nicht abschließend geklärt.
Style APA, Harvard, Vancouver, ISO itp.
3

Dunning, John Paul. "Bluetooth Threat Taxonomy". Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/76883.

Pełny tekst źródła
Streszczenie:
Since its release in 1999, Bluetooth has become a commonly used technology available on billions of devices through the world. Bluetooth is a wireless technology used for information transfer by devices such as Smartphones, headsets, keyboard/mice, laptops/desktops, video game systems, automobiles, printers, heart monitors, and surveillance cameras. Dozens of threats have been developed by researchers and hackers which targets these Bluetooth enabled devices. The work in this thesis provides insight into past and current Bluetooth threats along with methods of threat mitigation. The main focus of this thesis is the Bluetooth Threat Taxonomy (BTT); it is designed for classifying threats against Bluetooth enabled technology. The BTT incorporates nine distinct classifications to categorize Bluetooth attack tools and methods and a discussion on 42 threats. In addition, several new threats developed by the author will be discussed. This research also provides means to secure Bluetooth enabled devices. The Bluetooth Attack Detection Engine (BLADE) is as a host-based Intrusion Detection System (IDS) presented to detect threats targeted toward a host system. Finally, a threat mitigation schema is provided to act as a guideline for securing Bluetooth enabled devices.
Master of Science
Style APA, Harvard, Vancouver, ISO itp.
4

Taylor, Emma. "A veiled threat". Thesis, Taylor, Emma (2011) A veiled threat. Honours thesis, Murdoch University, 2011. https://researchrepository.murdoch.edu.au/id/eprint/41700/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding". Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.

Pełny tekst źródła
Streszczenie:
The advent of virtualization technologies has evolved the IT infrastructure and organizations are migrating to virtual platforms. Virtualization is also the foundation for cloud platform services. Virtualization is known to provide more security into the infrastructure apart from agility and flexibility. However security aspects of virtualization are often overlooked. Various attacks to the virtualization hypervisor and its administration component are desirable for adversaries. The threats to virtualization must be rigorously scrutinized to realize common breaches and knowing what is more attractive for attackers. In this thesis a current state of perimeter and operational threats along with taxonomy of virtualization security threats is provided. The common attacks based on vulnerability database are investigated. A distribution of the virtualization software vulnerabilities, mapped to the taxonomy is visualized. The famous industry best practices and standards are introduced and key features of each one are presented for safeguarding the virtualization environments. A discussion of other possible approaches to investigate the severity of threats based on automatic systems is presented.
Style APA, Harvard, Vancouver, ISO itp.
6

Olandersson, Sandra, i Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.

Pełny tekst źródła
Streszczenie:
To be able to protect an organisation's resources, it is important to understand what there is to protect and what to protect it from. The first step is to try to analyse the security threats that exist against an organisation's resources to explore the risks. Threats have to be identified, for the organisation to protect its resources and find where the optimal placement against threats is. This thesis analysis whether it is possible to obtain a Threat Tree Analysis that is useful for developing an information security policy for the municipality in Ronneby, using the SS 62 77 99-1 standard. A co-operation between the technical solutions and the administrative security is necessary to achieve information security, together with ordinary common sense. True, each of these can help improve security, but none of them is a complete solution. Security is not a product - it is a process. Threat trees form the basis of understanding that process. In this thesis, we have been using a qualitative method. The analysis method is a case study at the Social Department, at the municipality in Ronneby. Through interviews it has come us to hand, that the organisation has not established an information security policy which should give the code of practice for how the work of information security will pursue within the organisation. The organisation does neither use a model for structuring threats nor a method for collecting threats against information today. Through the structure of possible threats, the personnel generates an understanding of the organisation and takes active part finding adequate threats within the Social Department. As users understand the importance of security, how to use it, and where to report suspected violations, they can do a great deal to reduce the risk to loose information. Important to remember is that the education is an ongoing process, new users need training and trained users need reminding, especially when new technologies or processes are introduced. Thus, Threat Tree Analysis is useful for continuing towards developing an information security policy according to SS 62 77 99-1 standard.
För att kunna skydda en organisations resurser är det viktigt att förstå vad organisationen behöver skydda och vad den ska skydda det ifrån. Det första steget är att analysera hot mot organisationens resurser för att uppskatta riskerna. Hot måste identifieras för att organisationen ska kunna skydda sina resurser och hitta den optimala placeringen av åtgärder mot hot. Denna uppsatsen undersöker om det är möjligt att skapa en hotträdsanalys som är användbar för skapandet av en informationssäkerhetspolicy för Ronneby kommun, genom att använda standarden SS 62 77 99-1. Vi betonar i uppsatsen att ett samarbete mellan existerande tekniska lösningar och administrativ säkerhet är nödvändigt för att uppnå informationssäkerhet. Visst kan var och en av dessa hjälpa till att förbättra säkerheten, men ingen av dem är ensam den kompletta lösningen. Säkerhet är inte en produkt - det är en process. Hotträd formar grunden för en förståelse av den processen. I denna uppsats har vi använt en kvalitativ metod. Analysmetoden är en fallstudie på Socialförvaltningen i Ronneby kommun. Genom intervjuer har vi fått fram att organisationen inte har etablerat en informationssäkerhetspolicy, vilken ska ge riktlinjer för hur säkerhetsarbetet ska fullföljas inom organisationen. Organisationen använder varken en modell för att identifiera hot mot information eller en metod för att strukturera hoten. Genom strukturen av möjliga hot, genererar personalen en förståelse för organisationen och tar aktivt del i att identifiera hot mot Socialförvaltningen. Detta medför att alla användare förstår hur viktigt det är med säkerhet, vart de ska rapportera misstänkta händelser och de kan göra mycket för att minska risken att förlora information. Det är viktigt att komma ihåg att utbildning är en pågående process, nya användare behöver utbildning och utbildade användare behöver vidareutbildning, speciellt när nya tekniker eller processer introduceras. Därför är hotträdsanalysen en användbar modell för arbetet mot att skapa en informationssäkerhetspolicy enligt standarden SS 62 77 99-1.
Sandra Olandersson Blåbärsvägen 27 372 38 RONNEBY 0457 / 12084 Jeanette Fredsson Villa Viola 372 36 RONNEBY 0457 / 26616
Style APA, Harvard, Vancouver, ISO itp.
7

Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012". Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.

Pełny tekst źródła
Streszczenie:
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study is: What is the nature, scope and basis of the post-1994 official external threat perception of South Africa? The research problem generated four subsidiary questions: When does a security issue become a national threat? What types of threat are there? How does the South African government perceive these threats? And whose security is threatened? In responding to the main research questions, the study‟s findings note a change in perceptions during the post-Cold War era as to what constituted threats to security. The focus shifted from traditional to non-traditional threats to national security, because most current threats are non-military and transnational in nature. The analysis of South Africa‟s official external threat perception is informed by the changed views of Government towards what are considered the main threats to national security. The study concludes with key findings in response to the stated problem and with specific recommendations. The study confirmed that the nature of threats and security debates post-1994 have changed constantly with the expansion of the security agenda beyond state and military security. The official viewpoint is that South Africa at present is not faced with any military threats. Emphasis is currently placed on human beings as the main object of security. Most identified threats are transnational in nature and these relate to the illegal flow of immigrants, terrorism, organised crime, climate change (linked to food and water security), regional instability and other socio-economic threats. These threats are being perceived and articulated by Government through policy announcements and public speeches, also validated in the critical analysis of various scholars. The concept of non-traditional threats still lacks a commonly accepted definition; hence the study proposes the need for South Africa to define and outline non-military security threats in a comprehensive manner, preferably through the development of a South African External Threat Perception Framework. Developing such a framework will assist security agencies (such as analysts) and other stakeholders in providing advice and guidance to Government in identifying external security threats. This initiative could eliminate the abuse of power by various stakeholders in securitising any issue as a threat to national security, and instead divert those resources to other Government services. Provision should also be made in the form of policy initiatives on the role of military force and other agencies in addressing non-military security threats. Thus, the development of key elements of an integrated national security strategy in order to address external security issues and threats is essential.
Dissertation (MSecurity Studies)--University of Pretoria, 2013.
gm2015
Political Sciences
MSecurity Studies
Unrestricted
Style APA, Harvard, Vancouver, ISO itp.
8

Lee, Jong-Eun Roselyn. ""A threat on the net" : stereotype threat in avatar-represented online groups /". May be available electronically:, 2009. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Munshi, Asmaa Mahdi. "A study of insider threat behaviour: developing a holistic insider threat model". Thesis, Curtin University, 2013. http://hdl.handle.net/20.500.11937/1668.

Pełny tekst źródła
Streszczenie:
This study investigates the factors that influence the insider threat behaviour. The research aims to develop a holistic view of insider threat behaviour and ways to manage it. This research adopts an Explanatory Mixed Methods approach for the research process. Firstly, the researcher collects the quantitative data and then the qualitative data. In the first phase, the holistic insider threat model is developed; in the second phase, best practices are developed to manage the threat.
Style APA, Harvard, Vancouver, ISO itp.
10

Roberts, Marianne. "Threat processing in fibromyalgia". Thesis, University of Southampton, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617820.

Pełny tekst źródła
Streszczenie:
This thesis considers recent advances in the conceptualisation of pain and in particular, the contribution of Neuromatrix theory (Melzack 1990, 1999,2005), which implicates threat processing biases in the aetiology and maintenance of chronic pain. Fibromyalgia is presented as a condition that can particularly benefit from this understanding. Guided by research into threat processing biases in anxiety, the literature on attentional bias to threat in chronic pain and fibromyalgia is reviewed, with special emphasis on the Stroop and visual probe paradigms. This highlights that a number of chronic pain conditions might be associated with attentional bias to pain. related threat; however the literature is inconsistent and there is a dearth of research using fibromyalgia samples. The limited research that has used pure fibromyalgia sample indicates that fibromyalgia might be associated with a generalised, rather than pain/disorder-specific, threat bias. Thus, an empirical study is also presented, that aims to establish whether fibromyalgia is associated with attentional bias to threat, as a method of gaining insight into possible, broader threat processing abnormalities. Visual probe methodology was used to test selective attention to generalised threat words in a sample of 34 fibromyalgia patients and healthy controls. Results showed a trend towards an interaction between group and the measures of attentional bias, with evidence that this related to hypervigilance to threat in the fibromyalgia group. This trend did not reach statistical significance (p = .090). There was no further evidence of attentional bias. Further research is needed in order to establish the reliability of these findings and address issues of low power, however the potential that results may be meaningful provides great scope for achieving new insight into fibromyalgia.
Style APA, Harvard, Vancouver, ISO itp.
11

Lorinczi, L. "Globalization progress or threat". Thesis, Видавництво СумДУ, 2004. http://essuir.sumdu.edu.ua/handle/123456789/23032.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Lorinczi, L. "Globalization progress or threat". Thesis, Видавництво СумДУ, 2004. http://essuir.sumdu.edu.ua/handle/123456789/23035.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Vestlund, Christian. "Threat Analysis on Vehicle Computer Systems". Thesis, Linköping University, Department of Computer and Information Science, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661.

Pełny tekst źródła
Streszczenie:

Vehicles have been around in our society for over a century, until recently they have been standalone systems. With increased amounts of initiatives to inter-network vehicles to avoid accidents and reduce environmental impact the view of a vehicle as a standalone system needs to be reconsidered. Networking and cooperation between vehicles requires that all systems and the information therein are trustworthy. Faulty or malicious vehicle systems are thus not limited to only affecting a single vehicle but also the entire network. The detection of anomalous behavior in a vehicle computer system is therefore of importance. To improve the vehicle systems we strive to achieve security awareness within the vehicle computer system. As a first step we will identify threats toward the vehicle computer system and what has been done to address them.

We perform a threat analysis consisting of fault trees and misuse cases to identify the threats. The fault trees provide away to connect the threats found with vehicle stakeholders' goals. The connection between stakeholder goals and threat highlights the need for threat mitigation.

Several research initiatives are discussed to find out what has been done to address the identified threats and to find the state of the research for security in vehicle computer system.

Lastly, an error model for the Controller Area Network (CAN) is proposed to model the consequences of threats applied to the CAN bus.

Style APA, Harvard, Vancouver, ISO itp.
14

Gupta, Shikha, Shijo Joseph i Deepu Sasidharan. "The Challenges in Leveraging Cyber Threat Intelligence". Thesis, Högskolan i Halmstad, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44800.

Pełny tekst źródła
Streszczenie:
Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as sophisticated attackers continuously break through conventional safeguards each day. Whether strategic, operational, or tactical, threat intelligence can be defined as aggregated information and analytics that feed the different pillars of any given company’s cybersecurity infrastructure. It provides numerous benefits, enabling improved prediction and detection of threats, empowering and informing organizations to make better decisions during as well as following any cyber attack and aiding them to develop a proactive cyber security posture. It helps provide actionable intelligence, which equips senior management to make timely actions and decisions that might otherwise have an impact on the company’s ability to keep ahead and defend against this growing sea of threats. Driving momentum in this area also helps reduce their reaction times, enabling a shift for organizations to become more proactive than reactive. Perimeter defenses seem to no longer suffice as threats are becoming more complex and escalating with no best practices and guidelines available for companies to follow after, during, or before the time of the threat and risk due to the multiple components involved, including the various standards and platforms. Sharing and analyzing threat data effectively requires standard formats, protocols, shared understanding of the relevant terminology, purpose, and representation. Threat intelligence and its analysis are seen as a vital component of cyber security and a tool that many companies cannot leverage and utilize fully. Securing today's organizations and businesses, therefore, will require a new approach. In our study with security executives working across multiple industries, we have identified the various challenges that prevent the successful adoption of threat intelligence and with the rising adoption of the multiple platforms, including issues related to data quality, absence of universal standard format and protocol, challenge enforcing data sharing based on CTI data attribute, lack of authentication and confidentiality preventing data sharing, missing API integration capability in conjunction with multi-vendor tools, lack of identification of tacticalIOCs, failure to define TTL value(s), lack of deep automation, analytical and visualization capabilities. Ensuring the right expertise and capabilities in these identified areas will help leverage threat intelligence effectively, help to sharpen the focus, and provide the needed competitive edge.
Style APA, Harvard, Vancouver, ISO itp.
15

Douglas, Michael L. Gray Arlene J. "The Warfighters' Counterspace Threat Analysis (WCTA) : a framework for evaluating counterspace threats /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA384609.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Douglas, Michael L., i Arlene J. Gray. "The Warfighters' Counterspace Threat Analysis (WCTA): a framework for evaluating counterspace threats". Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/7830.

Pełny tekst źródła
Streszczenie:
Approved for public release; distribution is unlimited
The authors present an evolutionary approach to evaluating the counterspace threat in support of Department of Defense (DoD) decision-makers. The goal is to present a process that decision-makers can readily utilize to accurately assess the level of the counterspace threat originating within their Area of Responsibility (AOR). It is particularly useful as the state of affairs change within the AOR. The authors examine the necessity to utilize space to achieve information dominance, strengths and weaknesses of present Counterspace Threat Models, DoD's increasing dependence on space assets, DoD's reliance on commercial space systems to meet future requirements, and potential adversaries' awareness of the dependence of U.S. forces on space systems. Conclusions stress that the threat is comprised of two essential elements an opponent's willingness to employ a counterspace tactic (their intent) and the opponent's ability to develop the necessary tools to employ a counterspace tactic (their capability). The authors believe that the "intent" component of the threat changes more rapidly than the present models can easily accommodate. Therefore, a process, such as the one presented in this thesis, will enable DoD decision-makers that experience many of the changes of 'intent' first hand to rapidly and accurately assess the threat as the condition changes within the AOR
Style APA, Harvard, Vancouver, ISO itp.
17

Mitchell, Melanie. "No idle threat: Precursors to action in threateners with mental illness". Thesis, Queensland University of Technology, 2020. https://eprints.qut.edu.au/180839/1/Melanie_Mitchell_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
This thesis examined threats of violence made by persons with mental illness and in particular, who acts on violent threats and who does not. Threats were common occurrences and 55% per cent of threateners went on to be violent. Several predictors of violence were identified, including younger age, intellectual impairment and active mood and/or psychotic symptoms. Methods for preventing, identifying and managing threat-related violence were explored. This research has practical implications for those working in mental health settings and those supporting people who have a mental illness and make threats of violence.
Style APA, Harvard, Vancouver, ISO itp.
18

Kinkela, Jessica H. "Diagnosis Threat in Mild Traumatic Brain Injury". Ohio University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1223597555.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Elizaga, Ronald A. "ELICITING STEREOTYPE CHALLENGE AND STEREOTYPE THREAT EFFECTS WITHIN THE CONTEXT OF WOMEN’S MATH PERFORMANCE". Ohio University / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1132057268.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Liliengren, Theodor, i Paul Löwenadler. "Threat hunting, definition and framework". Thesis, Högskolan i Halmstad, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-36759.

Pełny tekst źródła
Streszczenie:
Being pioneers comes with advantages and responsibility. The concept of threathunting is currently being subsidized by businesses promoting their products. Additionally,there is little or no information regarding the implementation and theeffects, which vary depending on the organization. Threat hunting needed an unbiaseddefinition in accordance with employees in IT security. Consequently, theframeworks used when assessing threat hunting had to be objective. This thesispresents a definition of threat hunting, composed using impartial opinions. Furthermore,the thesis provides unique frameworks to assist when implementing andassessing threat hunting at an organization. This thesis has several areas of application:as a knowledge base for threat hunting, as the recommended practice forimplementing threat hunting and as groundwork for a more comprehensive evaluationof threat hunting capabilities. Ultimately, the thesis offers unprecedentednonpartisan information and recommendations on threat hunting.
Style APA, Harvard, Vancouver, ISO itp.
21

Gopisetty, Yugandhar. "A study of online users' cyber threat awareness and their use of threat countermeasures". Thesis, Umeå universitet, Institutionen för informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-115918.

Pełny tekst źródła
Streszczenie:
The internet has permeated the lives of the modern men in more respects than can be tabulated simply. The ease of access to online shopping, social networking, simplified communication, etc. make the internet a modern panacea for a number of problems. However, the internet also opens up avenues that expose the user to vulnerabilities at the hand of hackers and malicious software coders. The use of the internet to exchange personal and fiscal information makes attacks all the more inviting. This is compounded by the fact that most online users are unaware of threats that affect them on a daily basis and how to protect themselves against such threats. Despite the fact that the level of awareness of the contemporary cyber threats, has significantly increased among online users within the last few years, there is a growing need to improve the efficiency and effectiveness of the countermeasures currently being used. Fortunately, there are a number of Human Computer Interaction (HCI) principles that can effectively be used to enhance online user interaction and reduce internet security threats.
Style APA, Harvard, Vancouver, ISO itp.
22

Yeung, Nai Chi Psychology Faculty of Science UNSW. "Stereotype threat behind the wheel". Awarded by:University of New South Wales. School of Psychology, 2006. http://handle.unsw.edu.au/1959.4/26242.

Pełny tekst źródła
Streszczenie:
Stereotype threat refers to the pressure that individuals feel when they are at risk of confirming a demeaning stereotype about themselves. Research has found that stereotype threat impairs performance on cognitive-based tasks by inducing mental interference (e.g., Schmader & Johns, 2003). This thesis hypothesised that this finding would generalise to driving and that drivers who are better able to inhibit cognitive interference (i.e., with better inhibitory ability) would be less susceptible to the disruptive effect of stereotype threat than drivers who are less able (i.e., with poorer inhibitory ability). A series of three experiments conducted in a driving simulator tested the predictions using the gender stereotype of driving skills and investigated the interpretation of the results. The experiments revealed that stereotype threat exerted both a facilitative and debilitative influence on driving performance, as indicated by different performance measures. The facilitative effect diminished when drivers experienced increased mental demands or when they were assessed by an unexpected performance measure, while the debilitative effect was more likely observed among drivers who received negative feedback than drivers who received positive feedback. Moreover, the results supported the prediction that inhibitory ability would moderate the detrimental impact of stereotype threat as the performance of drivers with poorer inhibitory ability was impeded more than that of drivers with better inhibitory ability. Regarding the processes underlying the present findings, the experiments provided suggestive evidence that stereotype threat elicits cognitive interference and simultaneously motivates drivers to concentrate on particular performance areas in an attempt to refute the stereotype. In combination, these processes appear to be at least partly responsible for the performance deficits and boosts observed.
Style APA, Harvard, Vancouver, ISO itp.
23

Raymont, Paul David. "An idle threat, epiphenomenalism exposed". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0005/NQ41289.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Black, Alan. "Managing the aviation insider threat". Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5039.

Pełny tekst źródła
Streszczenie:
CHDS State/Local
Approved for public release; distribution is unlimited
Despite enhancements to aviation security since September 11, 2001, there remain vulnerabilities from employees at airports. This threat results from airline/airport employees that have access to sensitive and restricted areas during the normal course of their required duties. This thesis evaluates the threat and the measures in place to prevent attacks from aviation insiders. In addition, it evaluates a measure commonly referred to as 100 percent employee screening. Finally, the thesis derives recommendations to enhance the current methods to reduce the vulnerability, as well as proposes additional measures to further reduce the threat from aviation insiders.
Style APA, Harvard, Vancouver, ISO itp.
25

Woods, Matthew E. "The threat of radiological terrorism". Thesis, Monterey, California. Naval Postgraduate School, 1996. http://hdl.handle.net/10945/9072.

Pełny tekst źródła
Streszczenie:
Approved for public release; distribution in unlimited.
WMD terrorism is a new concern. The United States is preparing for the possibility of terrorist attacks involving chemical, biological, and nuclear weapons, but the scope of these preparations is too narrow. This thesis argues that radiological devices are also viable weapons of mass destruction for terrorism. Radiological weapons are not nuclear explosives, they are designed to disperse radioactive material over an area by mechanical means or conventional explosives. The potential for radiological terrorism depends upon access to the required nuclear materials and the motivations for terrorists to use radiological weapons. Rasiological weapons can use non-lethal grade nuclear material which is widely accessible throughout the world. The materials is under a spectrum of physical security systems with little accountability and verification. Radiological weapons can further terrorist objectives because they can be used to contaminate individuals without producing the immediate and catastrophic damage normally associated with WMD. This prospect of contamination is enough to incite the public's fear of the nuclear unknown or nuclear phobia. To counter radiological terrorism, the U.S. government should expand indication and warning through efforts to maximize the intelligence community's human intelligence assets and exploit open source collection
Style APA, Harvard, Vancouver, ISO itp.
26

Inglis, Sheila M. C. "Inabstinent women : the drunken threat". Thesis, University of Glasgow, 1993. http://theses.gla.ac.uk/3196/.

Pełny tekst źródła
Streszczenie:
My thesis is that femininity is constructed as abstinent, in particular, as abstinent from public, productive labour and from the active expression of desire/pleasure. Further, that the enforcement of women's abstinence through psychiatric, psychological and sociological discourses on femininity ensures the means of patriarchal expression. Women's inabstinence, therefore, poses a threat to patriarchal expression, and insofar as patriarchy is realised through patriarchal expression, to the stability of patriarchal society. Women's drunken inabstinence, however, provides only a temporary, individualised and often self-destructive omen of the threat. My fieldwork focuses on the processes and experiences through which women come to be administered as `alcoholic'/`problem drinkers'. My meetings and discussions with alcohol and drug agency workers and with women administratively defined as `alcoholic'/`problem drinkers' explicated the processes of the social control of all women in terms of the containment and privatisation of their active collective pursuit of pleasure. Drunken women's struggle against the strictures of femininity expresses the beginnings of a threat to patriarchy; however, insofar as the characteristics of femininity itself are `drunken' in their demands for dependency, patriarchal accessibility and a dislocation from public/productive activity, drunkenness as a critique of patriarchy is self-defeating. The challenge to patriarchy comes only in women's sober, collective refusal to abstain from passion.
Style APA, Harvard, Vancouver, ISO itp.
27

Davidson, Madeiene E. "Alzheimer's Disease: The Triple Threat". Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1287.

Pełny tekst źródła
Streszczenie:
Many Americans know Alzheimer’s disease for its devastating physical, emotional, and financial impact on patients as well as their family members and friends. According to the Alzheimer’s Association’s recent national survey, 73 million voters have had a family member or friend with the disease, indicating that the nation is aware of the disease’s affect on patients, their relatives, friends, and caretakers. Many are unaware, however, that Alzheimer’s could impose an enormous economic burden on the nation. Harry Johns, the president and CEO of the Alzheimer’s Association, calls Alzheimer’s “a triple threat unlike any other disease with its soaring prevalence, lack of treatment and enormous cost.” Nearly 5.3 million Americans are currently diagnosed with this untreatable disease. As the elderly continue to age, the demand for government aid in the form of Medicare and Medicaid will increase. This increasing demand, along with the decline in the labor force participation rate, will increase costs to all those affected by Alzheimer’s in the coming decades. The federal government has assumed leadership in the fight against Alzheimer’s by passing legislation to secure funding and establish a timeline for research, engage stakeholders, and provide support for Alzheimer’s patients, families, and caregivers. This thesis offers a holistic view of the current challenges facing the Alzheimer’s community, including costs of the disease to patients, families, and to society. It also includes an overview of Alzheimer’s legislation that addresses these challenges and provides a budget for scientific research for a treatment or a cure in the next decade to prevent the impending national fiscal catastrophe. This thesis will provide recommendations for how policy makers can decrease the likelihood that the federal government will be forced to pay the projected cumulative $20 trillion total cost of Alzheimer’s disease and other dementias by 2050. This thesis also recommends ways to provide immediate support the growing number of caregivers to Alzheimer’s patients.
Style APA, Harvard, Vancouver, ISO itp.
28

Crassa, Marina. "Conceptualising the threat of cancer". Thesis, University of Surrey, 1989. http://epubs.surrey.ac.uk/843869/.

Pełny tekst źródła
Streszczenie:
Studies were carried out with Doctors, Nurses, members of the public and cancer patients. In the first set of studies it was discovered that there is very little difference between doctors and nurses in the way they conceptualize disease, and in their classification "schema" of illnesses. Using an open-ended multiple sorting procedure with two groups of doctors and three groups of nurses it was found that categorizations were mostly based on the criterion of prognosis and expected outcome for the different illnesses. Results showed a common pattern, revealing a general order across professionals' conceptions of different diseases, from the least serious to the most serious. All five groups of professionals were found to differentiate cancerous diseases from other illnesses. Also nurses and doctors perceive every single cancer as being very serious with very bad prognosis and with an expected outcome of death. The results from this investigation support the idea that cancerous disease has maintained some unique associations which differentiate it from other diseases of equal seriousness and uncertainty (e.g. - multiple sclerosis which is untreatable and lethal, and myocardial infraction which is quite uncertain in terms of prognosis). Thus cancer as a concept per se is treated by the experts in a totally different way from other illnesses and the existing attitudes towards this "concept" are thought to be almost the same as those that would be towards a "doomed", and "cursed" case. Based on the fact that the information passed on to the lay population relies mostly on the professionals who establish a general framework on which the non-experts organise their general conceptual schema, it was hypothesised that lay perceptions would probably emerge as being in line with the experts attitudes and beliefs. Also the relative weights of the criteria used by the medical staff for differentiating diseases into groups could have a strong relationship to the way people think and classify different illnesses within their own "conceptual schemata". The objective of the second phase of research was to identify the role and the power assigned to different aspects of disease by laymen. The construction of the scenaria which then served as the main tool for this investigation was based on the idea of facet approach. Five facets were chosen from the ones used by the experts to classify diseases (criteria) considered as the most representative and complete set to describe the universe of content being described. The structuples of these five facets were used to construct a questionnaire which was then administered to a random sample of the lay population of Athens. The facets were (A) Disease specification which had the elements of being or not a cancerous disease (B) Seriousness, the elements of which were, "being" or "not" serious. The same elements were used for facet (C) Treatability and (E) Pain. There was also facet (D) "Quality of life" which had an element of good quality and an element of bad quality. The structuples were in the form of short "cases" of different patients and the respondents had to rate each of these "cases" on five different scales. The results of this study shed light on the research question as to whether different aspects of the concept of disease have different "weight" and value in the minds of the nonexperts and consequently to the formation of their attitudes and beliefs towards the different illnesses. The results revealed that facet (A) which was the specification of disease as being cancer or not cancer had the greatest power of all, followed by facet (C) treatability, which proved to be the second most important aspect of the illness in the minds of the people. A subsequent study explored the concept of disease and medicine in general from another point of view, the focus being on words and the associations that different words, like names of diseases have for people. The respondents were asked to write next to each word appearing in the questionnaire administered to them anything that came into their minds when they saw or heard that word. Surprisingly enough the results revealed that the word "cancer" and the words "cancer patient" had similar associations. On the other hand the words that laymen associated with other illnesses and patients included in the questionnaire were distinct. This confirmed again the general hypothesis that cancer is a concept that elicits an immediate emotional response which differentiates it from all other diseases, extending this perception to the patients who suffer from it.
Style APA, Harvard, Vancouver, ISO itp.
29

Hinsenkamp, Lucas Daniel. "Compensatory Bolstering: Uncertainty or Threat?" The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1433501651.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Crawford, Bonni. "Social reward and threat processing". Thesis, Cardiff University, 2015. http://orca.cf.ac.uk/90984/.

Pełny tekst źródła
Streszczenie:
The aim of this project was to investigate the relationships between individual differences in social expectancies and motivation, and how these relate to broader personality traits and to social integration outcomes such as individuals’ sense of belonging. A cognitive model of social motivation and reactivity to social feedback was proposed. In this model, generalised expectancies are considered to play a pivotal role in motivating human social behaviour. Two novel measures were developed: the levels of dispositional expectancies of social threat and reward scale (the LODESTARS) and a task-based measure of social motivation and reactivity to social reward and punishment (the social and monetary incentive delay (SMID) task). Rigorous validation studies were employed to ensure the validity and utility of these measures. The research reported in this thesis employed multiple methods: self-report, task-based measures, and structural and functional (blood oxygenation-level-dependent; BOLD) neuroimaging. The findings of all studies conducted supported the key proposal that dispositional biases in expectancies of social reward and punishment are critical for understanding individual differences in reactivity to social feedback and social outcomes such as loneliness. In the proposed model, expectancies exert their effects both by informing social approach and avoidance motivations and by directly influencing perceptions of and reactions to social cues. Convergent findings from the multiple modalities employed were consistent with both these proposed mechanisms.
Style APA, Harvard, Vancouver, ISO itp.
31

Cicero, David. "Does ego threat increase paranoia?" Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/5019.

Pełny tekst źródła
Streszczenie:
Thesis (M.A.)--University of Missouri-Columbia, 2007.
The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on May 11, 2009) Includes bibliographical references.
Style APA, Harvard, Vancouver, ISO itp.
32

Connor, Robert J. "Defeating the modern asymmetric threat". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FConnor.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Carroll, Kevin Sean. "Language Maintenance in Aruba and Puerto Rico: Understanding Perceptions of Language Threat". Diss., The University of Arizona, 2009. http://hdl.handle.net/10150/195400.

Pełny tekst źródła
Streszczenie:
This dissertation uses qualitative research methods to describe the history of language use and maintenance on the islands of Aruba and Puerto Rico. More specifically, it examines how the islands' unique colonial circumstances have affected the maintenance of the local language. The multidisciplinary field of language planning and policy (LPP) has historically focused on documenting, categorizing and revitalizing languages that have undergone significant language shift. As a result, the majority of the discourse regarding threatened languages also implies that a threatened language will soon be endangered. The language contexts on the islands of Aruba and Puerto Rico do not conform to this often assumed linear progression. The use of document analysis, interviews with key players in LPP and observations on both islands provide the data for the position that there are unique contexts where language threat can be discussed, not in terms of language shift, but in terms of perceptions of threat. In addition to providing a detailed historical account of language situations on both islands, this dissertation frames the findings within a larger framework of redefining language threat. Special attention is paid to how social agents have influenced perceptions through the social amplification of risk framework. The work concludes with an argument for a framework that incorporates not only languages that have witnessed language shift, but also language contexts where languages are perceived to be threatened, with the understanding that such a distinction could potentially move the field of LPP toward a better understanding of language maintenance.
Style APA, Harvard, Vancouver, ISO itp.
34

Musumeci, Maria D. "COVID-19 Threat Perceptions and Voting in the 2020 Presidential Election". University of Dayton / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1628025640916147.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Wessman, Love, i Niklas Wessman. "Threat modeling of large-scale computer systems : Implementing and evaluating threat modeling at Company X". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280099.

Pełny tekst źródła
Streszczenie:
Threat modeling is a growing field in cyber security. As computer systems grow larger and more complicated, the understanding of how to model and protect these systems becomes ever more important. Threat modeling is a method well suited for this task. The two primary motivations behind this research is to strengthen the cyber security at Company X and help the development of threat modeling, which in turn can help strengthen the field of cyber security. The main question that is investigated is what results can be achieved from the KTH Threat Modeling Method applied to specific systems used by Company X. This question is answered by implementing the method on the specified systems. The experience and the result of the implementation of the model are then used to evaluate the threat model method. The produced model implies that the biggest risk in the investigated systems are the Connected Smoke Sensor and the Smart Meter which measures water and electricity usage. Some of the given recommendations are to create protections against SQL-injection by keeping the systems up to date and to validate input. The main impression from implementing the threat model method on Company X is that the method is easy to use, learn and to understand. Another result was that the more information one has about the systems used in the IT-infrastructure being investigated, the more precise the threat model can become. The method is ideally used with focus on pure, interconnected software implementations, rather than modeling several non-connected systems in a single iteration of the method, which is what this report does. In order to teach and spread the method easier, a comprehensive written source such as a book could be utilized. To improve the method itself, the inclusion of automated attack simulation and modeling tools is suggested. Lastly, the KTH Threat Modeling Method is an iterative process, which can and should be improved by continuously iterating over the model going more in depth by every step. The body of work presented in this report is a first iteration of this ongoing process. The findings of this report point to the fact that while the KTH threat modeling method is already a mature method fully able to produce meaningful threat modeling results, there are still aspects that could be improved or added which would increase the overall strength of the method.
Hotmodellering är ett växande område inom cybersäkerhet. När datorsystem växer och blir mer komplicerade, så blir kunskapen om hur man modellerar och skyddar systemen allt viktigare. Hotmodellering är ett verktyg väl anpassat till denna uppgift. I den här rapporten ligger fokuset på att höja cybersäkerheten på Företag X och att bidra till utvecklingen av hotmodellering, vilket i sig bidrar till att stärka forskningen kring cybersäkerhet. Den huvudsakliga frågan som undersöks är vilka resultat som kan uppnås med en implementation av KTH Threat Modeling Method på specifika system hos Företag X. Frågan besvaras genom att implementera metoden på de specificerade systemen. Därefter används erfarenheten av utvecklingen och det framtagna resultatet till att evaluera hotmodellerings metoden. Den framtagna modellen pekar på att den största risken i de undersökta systemen hos Företag X är deras internetanslutna rökdetektorer och smarta mätare som mäter vatten- och elförbrukning. De rekommendationer som ges är bland annat att skydda sig mot SQL-injektionerna genom att hålla systemen uppdaterade och att validera indata. De huvudsakliga intrycken som erhölls från att implementera hotmodelleringsmetoden på Företag X är att metoden är lätt att använda, lära sig, och förstå. Ett annat resultat är att ju mer information hotmodelleraren har kring systemen som utforskas, desto mer exakt kan hotmodellen bli. Metoden är idealiskt lämpad för renodlad, sammansluten mjukvara, snarare än att modellera flera icke-sammanslutna system i en och samma iteration av metoden, vilket är vad denna rapport gör. För att förenkla utlärningsprocessen av metoden så kan en omfattande skriven resurs som exempelvis en bok vara till god hjälp. För att förbättra själva metoden föreslås integration av automatiserade attacksimulerings- och modelleringsverktyg. The KTH Threat Modeling Method är en iterativ process. Modellen kan och bör göras bättre genom att kontinuerligt iterera över arbetet flera gånger, där modellens detaljrikhet ökas för varje iteration. Det som presenteras i denna rapport är första iterationen av denna process. Innebörden av resultaten från denna rapport visar att även om hotmodelleringsmetoden redan är en mogen metod som kan producera meningsfulla hotmodelleringsresultat, finns det fortfarande vissa bitar som kan förbättras eller läggas till, vilket enligt författarna skulle öka metodens styrka i allmänhet.
Style APA, Harvard, Vancouver, ISO itp.
36

Liekweg, Joseph R. "An Analysis of Competing Stereotype Threat Theories". Scholarship @ Claremont, 2013. http://scholarship.claremont.edu/cmc_theses/787.

Pełny tekst źródła
Streszczenie:
This paper investigates the literature on stereotype threat theory. Looking for an explanation for achievement gaps in standardized testing and mathematics, Claude Steele and Elliot Aronson conducted a study in 1995 which introduced the term “stereotype threat” to the psychological community. It was hypothesized by Steele and Aronson that stereotype threat is cause by the anxiety that results from a fear of conforming to a negative stereotype that directly affects an individual in a domain with which they identify. Stereotype threat can have extremely detrimental effects on individuals. Since the original study in 1995, numerous studies have been conducted to further address gender and racial achievement gaps. Some of the studies have yielded results in support of Steele’s theory, and some have called into questions certain aspects of Steele’s theory. This paper specifically analyses Steele’s theory and its ability to stand up against specific criticisms.
Style APA, Harvard, Vancouver, ISO itp.
37

Isgrigg, Adrienne L. "Diagnosis Threat and Cognitive Performance During Pregnancy". Ohio University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1282334665.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Sandén, Oscar. "Threat Management in Agile Organisations : Using the Results of a Threat Analysis in Agile Software Development". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-364635.

Pełny tekst źródła
Streszczenie:
A threat analysis of a computer system identifies and analyses threats to the systems and its assets. The process of handling the identified threats, verify the mitigations and to continuously discover new threats during agile development is difficult. By making use of the backlog to track threats and security-related tasks a transparent connection between the threats and their security controls is established.  In combination with other tools, a method of integrating the threat analysis into an agiledevelopment method is created. The method proposed in this thesis is a solution to the problem of integrating a threat analysis into a agile organisation and presents tools that can aid in a continuous threat-driven security work.
Style APA, Harvard, Vancouver, ISO itp.
39

Nadler, Joel T. "Positive stereotype threat in social groups /". Available to subscribers only, 2006. http://proquest.umi.com/pqdweb?did=1240700731&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Nagaraj, Rajeev. "Threat modeling of para-virtualized environments". Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5192.

Pełny tekst źródła
Streszczenie:
Organizations are looking at various cost effective methods to reduce the overall cost of data storage systems. This measure is taken essentially to reduce the hardware that is currently being used for hosting servers. In recent years, the organizations around the world have looked at various options such as parallel computing and grid computing. However, these techniques have not been implemented in organizations due to their limitations. Virtualization is a new technique that is being adopted by system administrators to overcome the hardware issues within a computer network. Virtualization has the main advantages such as secure logging and terra architecture which enhances overall performance of the server and effectively reduces the cost. Virtualization can be broadly classified into 2 types: Full Virtualization and Para-Virtualization. As, with every new technology that comes into existence, there arise the security concerns associated with it. This thesis addresses the growing security concerns associated with Virtual Machines (VM's) in a Para-virtualized environment. Some of the most common threats are Denial of Resource Attack, Sniffing Attack, and Authentication and Authorization issues. Thus, it becomes essential to derive a threat model so that these issues are identified based on their severities and addressed more effectively with appropriate security algorithms. This thesis provides the readers an insight to modeling threats, analyzing threat parameters, deriving risk equations, and validating the results.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering.
Style APA, Harvard, Vancouver, ISO itp.
41

Young, Pectro Paula L. "Complacency: a threat to homeland security?" Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42760.

Pełny tekst źródła
Streszczenie:
CHDS State/Local
This thesis presents an unconventional approach to addressing a threat to homeland security by focusing on complacency through the lens of human factors and complexity. This approach requires a paradigm shift. In addition to focusing on external threats from enemies who wish to do this nation harm, and building capabilities to prepare for disasters, it is also necessary to look internally to the behaviors, attitudes, and states of mind of people within homeland security organizations to optimize the success of this country’s efforts. This thesis draws from human factors science, folk science and folk psychology, complexity theory, homeland security doctrine, psychology and biology reference works, and applied research to develop a concept of complacency for the homeland security discipline. The hypothesis is that a clear definition may lead to actionable, observable measures to mitigate it. The research concludes that complacency is more commonly used as a proverbial threat than an actionable threat, but reveals a plethora of future research opportunities for a human-factors approach to addressing threats of this nature.
Style APA, Harvard, Vancouver, ISO itp.
42

Schluderberg, Larry E. "Addressing the cybersecurity Malicious Insider threat". Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.

Pełny tekst źródła
Streszczenie:

Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's critical information and have intentionally misused that access in a manner that compromised the organization. Although incidents initiated by malicious insiders are fewer in number than those initiated by external threats, insider incidents are more costly on average because the threat is already trusted by the organization and often has privileged access to the organization's most sensitive information. In spite of the damage they cause there are indications that the seriousness of insider incidents are underappreciated as threats by management. The purpose of this research was to investigate who constitutes MI threats, why and how they initiate attacks, the extent to which MI activity can be modeled or predicted, and to suggest some risk mitigation strategies. The results reveal that addressing the Malicious Insider threat is much more than just a technical issue. Dealing effectively with the threat involves managing the dynamic interaction between employees, their work environment and work associates, the systems with which they interact, and organizational policies and procedures. Techniques for detecting and mitigating the threat are available and can be effectively applied. Some of the procedural and technical methods include definition of, follow through, and consistent application of corporate, and dealing with adverse events indigenous to the business environment. Other methods include conduct of a comprehensive Malicious Insider risk assessment, selective monitoring of employees in response to behavioral precursors, minimizing unknown access paths, control of the organization's production software baseline, and effective use of peer reporting.

Keywords: Cybersecurity, Professor Paul Pantani, CERT, insider, threat, IDS, SIEMS. FIM, RBAC, ABAC, behavioral, peer, precursors, access, authentication, predictive, analytics, system, dynamics, demographics.

Style APA, Harvard, Vancouver, ISO itp.
43

Ueki, Chikako. "The rise of "china threat" arguments". Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/37435.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 2006.
Vita.
Includes bibliographical references (v. 2, p. 483-517).
The study seeks to explain the rise of "China threat" arguments in the United States and Japan in the 1990s by using three theories of states behavior- realism, organization theory, and democratic peace theory. The rise of "China threat" arguments occurred in the United States and Japan because of a convergence of several factors, the most important of which was the increase of China's relative power after the Cold War. The distribution of power among states strongly affects their intentions and military capabilities. The study introduces and suggests the importance of the strategic safety-net in shaping threat perception. A strategic safety-net emerges when state's survival depends on cooperation with another state. When the strategic safety-net exists, states suppress self-interested behavior and the ally's intentions are perceived as benign. Interviews with former government officials in the United States and Japan confirmed that strategic necessity restrained U.S. and Japanese behavior towards China during the Cold War and limited suspicion of China. The fraying of the strategic safety-net led to the advent of "China threat" arguments.
(cont.) The main difference between the United States and Japan was that whereas in the U.S. case threat perception was shaped by a primacy strategy, Japan had to face a preponderant United States and a rising China at the same time. "China threat" arguments were suppressed in Japan while Japan was unsure about its relationship with the United States. The consolidation of Japan's relationship with the United States led to a surge of"China threat" arguments in Japan in 2000. The interests of domestic organizations were not the major cause of the initial rise of "China threat" arguments. The relevant organizations, including the military services, made "China threat" arguments only after they gained currency within the society. The study also finds that China's undemocratic nature did not independently cause the perception of threat.
by Chikako Kawakatsu Ueki.
Ph.D.
Style APA, Harvard, Vancouver, ISO itp.
44

Aljazairi, Sena. "ROBOT JOURNALISM: : THREAT OR AN OPPORTUNITY". Thesis, Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-50892.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Bates, Tyler Alexander. "Usutu Virus: An Emerging Arbovirus Threat". Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/102268.

Pełny tekst źródła
Streszczenie:
Mosquito-borne viruses, such as dengue virus (DENV), Zika virus (ZIKV), chikungunya virus (CHIKV), yellow fever virus (YFV), Japanese encephalitis virus (JEV), and West Nile virus (WNV) are major threats to global public health resulting in millions of infections and hundreds of thousands of deaths annually. The presence of these viruses and their increasing emergence/spread continues to escalate. Notably, Usutu virus (USUV; Genus: Flavivirus; Family: Flaviviridae) is one such pathogen currently causing mass die-offs of avian hosts throughout Europe. USUV is categorized in the Japanese Encephalitis virus (JEV) antigenic complex and thus shares many antigenic and pathologic characteristics with fellow members, such as JEV and WNV. Respective to human infections, USUV cases are generally asymptomatic; nonetheless, acute cases have been reported. These acute cases typically cause mild symptoms, such as fevers and rashes; however, more severe cases can result in neurologic diseases, such as encephalitis and/or meningoencephalitis. In addition to these pathologic similarities, USUV shares several ecological and geographical traits with WNV, a pathogen responsible for several outbreaks during its spread from Africa, to Europe, and eventually the United States. Currently, WNV is considered endemic in areas across the United States due to its transmission via Culex spp.; mosquitoes that are ubiquitous in the United States. These parallels suggest the possible emergence of USUV into the United States and therefore, it is imperative to broaden our knowledge of USUV and assess its potential to become a major global health concern. The overall goal of this thesis was to characterize USUV and evaluate its emergence potential in the United States by: (1) developing infectious clones of recent European and African USUV isolates as tools for characterization and analysis of USUV and (2) assessing the transmission potential of several species of North American mosquitoes. In Aim 1, we show that the aforementioned infectious clones infect and replicate similarly to their parental strains in vitro in both vertebrate and invertebrate models, as well as in transiently immunocompromised CD-1 and IFNAR-/- murine models, and thus serve as useful tools for future molecular studies focusing on USUV. Furthermore, in Aim 2, we describe the ability of field-caught (Southwest Virginia, USA) Culex spp. and Aedes spp. mosquitoes to become infected with a recent European isolate of USUV; although, we report an overall limited potential for these species to transmit this virus. Altogether, these studies form a foundation for understanding the potential emergence of USUV in the United States as well as provide necessary tools needed to aid future research on USUV emergence, transmission, and pathogenesis.
Master of Science
Usutu virus (USUV) is an emerging mosquito-borne virus that was first isolated from a mosquito in 1959 in South Africa, and since then, has become a major problem throughout Africa and Europe causing acute to severe infection in dozens of patients. Additionally, this virus is causing massive die-offs in Eurasian blackbird populations. This is particularly problematic because birds play a critical role in ecosystems as they act as forms of pest control, pollinators, and seed dispersers. Depletion of these species could lead to an imbalance and, eventually, collapse of our natural ecosystem. Additionally, there is a growing concern of USUV making its way into the United States, following a similar track of emergence to WNV's introduction in New York in 1999 and its subsequent spread throughout the states. WNV's introduction to the United States was detrimental to native bird populations and humans, and has caused tens of thousands of infections and thousands of deaths since this introduction. Research has shown USUV causes similar disease symptoms to WNV. The self-limiting illness from these viruses typically includes fever and rashes but some infections can result in more severe cases causing inflammation of the brain and surrounding areas. Like many other prominent mosquito-borne viruses, there is no specific treatment or vaccine for WNV or USUV. Because USUV is so closely related to WNV, and their similar characteristics may point towards similar emergence in the United States, it is essential to garner more information on USUV. The overall goal of this thesis was to establish a reliable tool(s) for further characterization of USUV and demonstrate the potential for USUV emergence in the United States. We first developed molecular tools, known as viral clones, that are valuable to the scientific community which allows the manipulation of USUV genetic material to perform further downstream studies. Our objective for this initial study was to create a molecular tool that would behave similarly to their natural, or "parental", virus. The results from this study suggest we have successfully produced these tools. Furthermore, we sought to determine the potential for field-caught mosquitoes from Southwest Virginia, USA to transmit a recently isolated strain of USUV. These data suggest that while these mosquitoes do have the ability to become infected with USUV, they have a limited potential to transmit this virus to animal hosts. Altogether, these studies have allowed us to expand our knowledge on USUV's potential emergence in the United States and develop powerful tools to continue this essential research.
Style APA, Harvard, Vancouver, ISO itp.
46

Білопільська, Олександра Олександрівна, Александра Александровна Белопольская i Oleksandra Oleksandrivna Bilopilska. "Genetic modified products: salvation or threat". Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/8124.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

King, Kenya Latonya. "Stereotype Threat and Survey Response Bias". Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/50814.

Pełny tekst źródła
Streszczenie:
Stereotype threat is the threat of confirming a negative stereotype about a group with which a person identifies. Researchers have found that stereotype threat can result in underperformance in multiple domains, shifts in social behavior, and shifts in assessed implicit attitudes, the likelihood of which increases as an individual's concern about the domain of interest increases. According to theory, this threat can be "alleviated",thereby diminishing or eliminating its impact. In this project, over the course of two experiments, the impact of stereotype threat and stereotype threat-alleviation on explicit self-report measures are examined. In experiment one, white college student participants were exposed (or not) to an on-line task intended to elicit race-based stereotype threat. Differences in reporting style (i.e., bias) between the two groups on self-reported measures of race-related attitudes were examined. It was hypothesized that the group exposed to stereotype threat would endorse lower racism and lower stereotypicality (i.e., stereotypic "White" behaviors, attitudes, adjectives, and beliefs). The data provided only partial support for the hypothesis - the threat group reported significantly less stereotypicality than the non threat group. However, the groups were not statistically different on measures of racism or race and social policy. In experiment two, again examining white college students who participated on-line, a stereotype threat-alleviation task was added, and whether this diminished or removed bias was examined. It was hypothesized the threat group would endorse lower stereotypicality and racism than the non threat group and the group receiving the threat alleviation task. The findings from study one did not replicate in study two. Instead, contrary to predictions, across measures of racism and stereotypicality, it was the non threat group that consistently showed the lowest scores. Potential explanations for these findings are offered, including the possibility of having eliciting stereotype threat, cognitive dissonance, or both for the threat and non threat groups via their filler task. Finally, implications for assessing, broaching, and reducing stereotype threat in clinical and research applications are also discussed.
Ph. D.
Style APA, Harvard, Vancouver, ISO itp.
48

McCormick, Regina Ann. "Stereotype Threat and Racial Identity Attitudes". Miami University / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=miami1123618206.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Kim, Dae Wook. "Data-Driven Network-Centric Threat Assessment". Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1495191891086814.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Chudoba, Lubomír. "Generic Substitution: From Threat To Opportunity". Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-142296.

Pełny tekst źródła
Streszczenie:
The objective of this thesis is to identify factors, which are influencing pharmacists` choice of a particular drug in a situation when generic substitution can be offered to a patient, and to analyse the relative importance of these factors for the pharmacists. This study investigates such behavioural patterns of pharmacists operating within chain of pharmacies called Alphega. The research consists of 2 consecutive parts; Firstly, qualitative inquiry through depth-in interviews has been carried out in order to identify variables, which may shape pharmacist's choice. And subsequently, quantitative investigation has been performed for the purpose of assessing importance of each variable. The results of the research have finally been used to evaluate the strategy of antibiotic Augmentin produced by company GlaxoSmithKline.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii