Artykuły w czasopismach na temat „Threat”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Threat.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Threat”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Kiely, P., i C. R. Seed. "Assessing infectious threats - trick or threat?" ISBT Science Series 10, S1 (kwiecień 2015): 65–72. http://dx.doi.org/10.1111/voxs.12114.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Hamad, Mohammad, i Vassilis Prevelakis. "SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study". Information 11, nr 5 (19.05.2020): 273. http://dx.doi.org/10.3390/info11050273.

Pełny tekst źródła
Streszczenie:
In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environment. While these improvements have increased the safety and incontestability of the automotive system, they have opened the door for new potential security threats which need to be defined, assessed, and mitigated. The SAE J3061 standard has defined threat modeling as a critical step toward the secure development process for vehicle systems, but it did not determine which method could be used to achieve this process. Therefore, many threat modeling approaches were adopted. However, using one individual approach will not identify all the threats which could target the system, and may lead to insufficient mitigation mechanisms. Thus, having complete security requires the usage of a comprehensive threat model which identifies all the potential threats and vulnerabilities. In this work, we tried to revise the existing threat modeling efforts in the vehicular domain. Also, we proposed using a hybrid method called the Software, Asset, Vulnerability, Threat, and Attacker (SAVTA)-centric method to support security analysis for vehicular systems. SAVTA combines different existing threat modeling approaches to create a comprehensive and hybridized threat model. The model is used as an aid to construct general attack trees which illustrate attack vectors that threaten a particular vehicle asset and classify these attacks under different sub-trees.
Style APA, Harvard, Vancouver, ISO itp.
3

Kappenman, Emily S., Raphael Geddert, Jaclyn L. Farrens, John J. McDonald i Greg Hajcak. "Recoiling From Threat: Anxiety Is Related to Heightened Suppression of Threat, Not Increased Attention to Threat". Clinical Psychological Science 9, nr 3 (24.03.2021): 434–48. http://dx.doi.org/10.1177/2167702620961074.

Pełny tekst źródła
Streszczenie:
Increased attention to threat is considered a core feature of anxiety. However, there are multiple mechanisms of attention and multiple types of threat, and the relationships among attention, threat, and anxiety are poorly understood. In the present study, we used event-related potentials (ERPs) to separately isolate attentional selection (N2pc) and suppression (PD) of pictorial threats (photos of weapons, snakes, etc.) and conditioned threats (colored shapes paired with electric shock). In a sample of 48 young adults, both threat types were initially selected for increased attention (an N2pc), but only conditioned threats elicited subsequent suppression (a PD) and a reaction time (RT) bias. Levels of trait anxiety were unrelated to N2pc amplitude, but increased anxiety was associated with larger PDs (i.e., greater suppression) and reduced RT bias to conditioned threats. These results suggest that anxious individuals do not pay more attention to threats but rather engage more attentional suppression to overcome threats.
Style APA, Harvard, Vancouver, ISO itp.
4

MUGISHA, ARTHUR R., i SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda". Environmental Conservation 31, nr 3 (wrzesień 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.

Pełny tekst źródła
Streszczenie:
Loss of wildlife, encroachment on wild lands and conflicts between protected areas and neighbouring communities continue to threaten the integrity of protected areas (PAs) in Uganda. To increase support from local communities and ensure long-term sustainability for Uganda's PAs, a policy of community-based conservation was introduced in 1988 as a management approach in seven PAs. The effectiveness of the community-based approach for reducing threats was compared to conventional PA management by conducting a threat reduction assessment at 16 PAs, seven with community-based approaches and nine without. Additional data collected using document reviews, interviews with government officials, and surveys of PA wardens were compared with the threat reduction assessments. Twenty-three primary threats were identified at PAs. Local game poaching was the most common threat. The threat reduction assessment indices of community-based PAs (mean=49.0±12) were not significantly different from those of conventional PAs (mean=37.96±21.6). Some specific threats, such as bush burning, logging, encroachment and unclear boundaries, seemed to be better mitigated at community-based PAs. Management approaches at all PAs mitigated fewer than half of the identified threats. Management approaches are needed that directly target PA threats, go beyond PA boundaries by involving additional government departments, link people's livelihoods to conservation efforts and strengthen PA institutions.
Style APA, Harvard, Vancouver, ISO itp.
5

Sandy, Djoko Andoko, Poppy Setiawati Nurisnaeny i Mira Murniasari. "The Threat of Social Network Games in Indonesia". Borneo Educational Journal (Borju) 5, nr 2 (26.08.2023): 335–51. http://dx.doi.org/10.24903/bej.v5i2.1393.

Pełny tekst źródła
Streszczenie:
This research examines the potential threat through SNG in Indonesia. The theories of threat, social media, cyber, and network society are used to analyze the research problem through qualitative analysis. Data was obtained through interviews and literature studies. The results of the study show that the potential threat on SNG includes ideological threats in society, growing illegal and pornographic content, theft of personal data, illegal monitoring of user activities, online fraud, cyberbullying, inappropriate content, dependence, and cyber attacks that threaten the activities of social network game users in Indonesia.
Style APA, Harvard, Vancouver, ISO itp.
6

Bedi, Punam, Vandana Gandotra, Archana Singhal, Himanshi Narang i Sumit Sharma. "Mitigating multi-threats optimally in proactive threat management". ACM SIGSOFT Software Engineering Notes 38, nr 1 (23.01.2013): 1–7. http://dx.doi.org/10.1145/2413038.2413041.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Muhammed, Khaleel, Aavudai Anandhi, Gang Chen i Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats". Sustainability 13, nr 20 (12.10.2021): 11259. http://dx.doi.org/10.3390/su132011259.

Pełny tekst źródła
Streszczenie:
As the human population increases, the landscape is altered to provide housing, food, and industry. Human activity poses a risk to the health of natural habitats that, in turn, affect biodiversity. Biodiversity is necessary for a functioning ecosystem, as species work synergistically to create a livable environment. It is, therefore, important to know how human practices and natural events threaten these habitats and the species living in them. A universal method of modeling habitat threats does not exist. This paper details the use of a literature review to formulate a new framework called Define–Investigate–Estimate–Map (DIEM). This framework is a process of defining threats, investigating an area to discover what threats are present, estimating the severity of those threats, and mapping the threats. Analysis of 62 studies was conducted to determine how different authors define and characterize threats in various contexts. The results of this analysis were then applied to a case study to evaluate the Choctawhatchee River and Bay Watershed. Results suggest that the most abundant threat in the watershed is agricultural development, and the most destructive threat is urban development. These two threats have the greatest impact on the total threat level of the watershed. Applying the DIEM framework demonstrates its helpfulness in regional analysis, watershed modeling, and land development planning.
Style APA, Harvard, Vancouver, ISO itp.
8

Muhammed, Khaleel, Aavudai Anandhi, Gang Chen i Kevin Poole. "Define–Investigate–Estimate–Map (DIEM) Framework for Modeling Habitat Threats". Sustainability 13, nr 20 (12.10.2021): 11259. http://dx.doi.org/10.3390/su132011259.

Pełny tekst źródła
Streszczenie:
As the human population increases, the landscape is altered to provide housing, food, and industry. Human activity poses a risk to the health of natural habitats that, in turn, affect biodiversity. Biodiversity is necessary for a functioning ecosystem, as species work synergistically to create a livable environment. It is, therefore, important to know how human practices and natural events threaten these habitats and the species living in them. A universal method of modeling habitat threats does not exist. This paper details the use of a literature review to formulate a new framework called Define–Investigate–Estimate–Map (DIEM). This framework is a process of defining threats, investigating an area to discover what threats are present, estimating the severity of those threats, and mapping the threats. Analysis of 62 studies was conducted to determine how different authors define and characterize threats in various contexts. The results of this analysis were then applied to a case study to evaluate the Choctawhatchee River and Bay Watershed. Results suggest that the most abundant threat in the watershed is agricultural development, and the most destructive threat is urban development. These two threats have the greatest impact on the total threat level of the watershed. Applying the DIEM framework demonstrates its helpfulness in regional analysis, watershed modeling, and land development planning.
Style APA, Harvard, Vancouver, ISO itp.
9

Riek, Blake M., Eric W. Mania i Samuel L. Gaertner. "Intergroup Threat and Outgroup Attitudes: A Meta-Analytic Review". Personality and Social Psychology Review 10, nr 4 (listopad 2006): 336–53. http://dx.doi.org/10.1207/s15327957pspr1004_4.

Pełny tekst źródła
Streszczenie:
This article examines the relationship between intergroup threat and negative outgroup attitudes. We first qualitatively review the intergroup threat literature, describing the shift from competing theories toward more integrated approaches, such as the integrated threat theory (ITT; W. G. Stephan & Stephan, 2000). The types of threats discussed include: realistic threat, symbolic threat, intergroup anxiety, negative stereotypes, group esteem threat, and distinctiveness threat. We then conducted a quantitative meta-analysis examining the relationships between various intergroup threats and outgroup attitudes. The meta-analysis, involving 95 samples, revealed that 5 different threat types had a positive relationship with negative outgroup attitudes. Additionally, outgroup status moderated some of these relationships. Implications and future directions are considered.
Style APA, Harvard, Vancouver, ISO itp.
10

Syomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities". Actual problems of innovative economy, nr 3 (30.05.2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.

Pełny tekst źródła
Streszczenie:
Introduction. The functioning of agrarian business entities is constantly influenced by external and internal envi-ronmental factors, some of which threaten its organizational and legal security. Given the novelty of investigated security, the issue of determination threats in this area, identifying management tools, methods, and strategies is relevant, as it allows us to consider enterprise security more broadly than in the traditional economic sense. The purpose of the study is to identify the main tools for managing organizational and legal security and to develop a scheme for preventive management. Results. The difference between risks and threats is clarified. The classification of threats into controlled and uncon-trolled has been done. A description of the methodological basis structure of organizational and legal security management is given. The stages of managing threats to the organizational and legal security of agrarian business entities have been determined. In the identification phase, the external environment is analyzed by a variety of factors and the internal envi-ronment by the mental map of stakeholder interests, needs and values, as well as by areas: efficiency of organizational struc-ture, hierarchy of authorities, system of power delegation, motivational system, control of production quality, processes of products sale, the mode of payment of the ward and the provision of annual leave, keeping of all forms of reporting, financial discipline, ecological standards control of activity. The external environment of the agrarian business entities functioning is analyzed in relation to possible threats to organizational and legal security. The development of a threat management plan is considered. The nature of the implicit threats and the ways to manage them are described, which involves allocating a budget to cover unforeseen losses. The description of the stage of quantitative and qualitative analysis in threat management is given. The development description of the threat classification scale is presented. The path of threat priority analysis is determined, which involves the matrix development of threats placement on two parameters: probability of occurrence and degree of impact. The description of quantitative methods of threat assessment is presented. The definition of the budget amount for the implementation of the organizational and legal security management strategy is given. The methodological support for the choice of the organizational and legal security management strategy has been presented using the method of hierarchy analysis based on the criteria of efficiency, cost and effectiveness. The system of preventive management of organi-zational and legal security of agrarian business entities is presented. Key words: threats, risks, organizational and legal security, agrarian subject, threat management strategy, threat identification, quantitative analysis, qualitative analysis, method of hierarchy analysis.
Style APA, Harvard, Vancouver, ISO itp.
11

Stephan, Cookie White, Walter G. Stephan, Katherine M. Demitrakis, Ann Marie Yamada i Dennis L. Clason. "Women's Attitudes Toward Men: an Integrated Threat Theory Approach". Psychology of Women Quarterly 24, nr 1 (marzec 2000): 63–73. http://dx.doi.org/10.1111/j.1471-6402.2000.tb01022.x.

Pełny tekst źródła
Streszczenie:
Three studies were conducted to measure the antecedents of women's attitudes toward men using the integrated threat model. Four types of threats were hypothesized to produce negative attitudes toward men: (1) realistic threat based on threats to women's political and economic power, (2) symbolic threat based on value differences, (3) intergroup anxiety experienced during social interaction with outgroup members, and (4) negative stereotypes of men. Negative contact was hypothesized to increase the perception of all four threats as well as to affect attitudes directly. The findings suggest that symbolic threat, intergroup anxiety, and negative contact are the strongest predictors of negative attitudes toward men. Contrary to expectation, realistic threat may not be important to women's attitudes toward men.
Style APA, Harvard, Vancouver, ISO itp.
12

Wang, Guan, Lian Ma, Lili Wang i Weiguo Pang. "Independence Threat or Interdependence Threat? The Focusing Effect on Social or Physical Threat Modulates Brain Activity". Brain Sciences 14, nr 4 (9.04.2024): 368. http://dx.doi.org/10.3390/brainsci14040368.

Pełny tekst źródła
Streszczenie:
Objective: The neural basis of threat perception has mostly been examined separately for social or physical threats. However, most of the threats encountered in everyday life are complex. The features of interactions between social and physiological threats under different attentional conditions are unclear. Method: The present study explores this issue using an attention-guided paradigm based on ERP techniques. The screen displays social threats (face threats) and physical threats (action threats), instructing participants to concentrate on only one type of threat, thereby exploring brain activation characteristics. Results: It was found that action threats did not affect the processing of face threats in the face-attention condition, and electrophysiological evidence from the brain suggests a comparable situation to that when processing face threats alone, with higher amplitudes of the N170 and EPN (Early Posterior Negativity) components of anger than neutral emotions. However, when focusing on the action-attention condition, the brain was affected by face threats, as evidenced by a greater N190 elicited by stimuli containing threatening emotions, regardless of whether the action was threatening or not. This trend was also reflected in EPN. Conclusions: The current study reveals important similarities and differences between physical and social threats, suggesting that the brain has a greater processing advantage for social threats.
Style APA, Harvard, Vancouver, ISO itp.
13

Delgado, Ana R., i Gerardo Prieto. "Stereotype threat as validity threat: The anxiety–sex–threat interaction". Intelligence 36, nr 6 (listopad 2008): 635–40. http://dx.doi.org/10.1016/j.intell.2008.01.008.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Lamarche, Larkin, Brianne Ozimok, Kimberley L. Gammage i Cameron Muir. "Men Respond Too: The Effects of a Social-Evaluative Body Image Threat on Shame and Cortisol in University Men". American Journal of Men's Health 11, nr 6 (11.09.2017): 1791–803. http://dx.doi.org/10.1177/1557988317723406.

Pełny tekst źródła
Streszczenie:
Framed within social self-preservation theory, the present study investigated men’s psychobiological responses to social-evaluative body image threats. University men ( n = 66) were randomly assigned to either a high or low social-evaluative body image threat condition. Participants provided saliva samples (to assess cortisol) and completed measures of state body shame prior to and following their condition, during which anthropometric and strength measures were assessed. Baseline corrected values indicated men in the high social-evaluative body image threat condition had higher body shame and cortisol than men in the low social-evaluative body image threat condition. These findings suggest that social evaluation in the context of situations that threaten body image leads to potentially negative psychobiological responses in college men.
Style APA, Harvard, Vancouver, ISO itp.
15

D, KHOBE, AKOSIM C i KWAGA B.T. "SUSCEPTIBILITY TO THREATS AND THREAT SEVERITY OF ADAMAWA RANGELANDS, NIGERIA". JOURNAL OF ADVANCES IN AGRICULTURE 5, nr 2 (8.01.2016): 698–705. http://dx.doi.org/10.24297/jaa.v5i2.5084.

Pełny tekst źródła
Streszczenie:
This study was undertaken to assess threats, rangeland susceptibility to threats and their severity in Adamawa rangelands, Northeast Nigeria. Structured questionnaires were used to elicit information from both pastoralists and the management of the range sites. Data on threats factors was analysed using the following indices: prevalent threat, range sites susceptibility, the mean score of threat factors and the relative threat factor severity. Threats to biodiversity, their prevalence and the number of range sites they occurred showed that invasion by undesirable plants, over-exploitation of forage resources, and bush fires occurred in the three range sites with 100% prevalent threat indices. Diseases and pests, conflicts and settlement policy problems occurred in two of the range sites with 66.7% prevalent threat indices. While farmer encroachment, erosion drought, population increase, poaching and problems associated with rangeland policies occurred in one of the range sites with prevalent threat indices of 33.3%. The threats with the highest severity indices include over-exploitation of forage resources, conflicts, invasion by undesirable plant species, drought, diseases and pests. Others are settlement policy, population increase, bush fire and rangeland policy. Planned burning combined with reseeding of the range sites should be carried out to improve on the composition and abundance of forage resources of the rangelands.
Style APA, Harvard, Vancouver, ISO itp.
16

Farooqui, Muhammad Najmul Islam, Junaid Arshad i Muhammad Mubashir Khan. "A Layered Approach to Threat Modeling for 5G-Based Systems". Electronics 11, nr 12 (8.06.2022): 1819. http://dx.doi.org/10.3390/electronics11121819.

Pełny tekst źródła
Streszczenie:
The rise of 5G networks promises a wide range of cutting-edge services with the aim of achieving high performance and reliability. Cutting-edge applications facilitated by 5G architecture make use of various enabling technologies, which introduce various new and emerging security threats and attacks. Threat modeling is a proactive approach to identify security requirements, as well as potential threats and vulnerabilities, and prioritize remediation methods. In addition, 5G networks are complex and are usually divided into separate layers to foster the understanding and management of different functionalities. The open nature of 5G envisages that multiple vendors and service providers might be working on network deployment and service provisioning; it is therefore necessary to address and categorize the threats at each layer distinctly. This paper presents a threat model for 5G-based systems. It leverages the layered 5G architecture, identifying threat categories and mapping these to corresponding layers. It also analyzes enabling technologies affected by identified threats along with threat actors, entry points, and the impact of threat categories. Through the development of this threat model, we envisage facilitating further research into specific threats and mechanisms to protect against them.
Style APA, Harvard, Vancouver, ISO itp.
17

Dyer, Rebecca L., Nicklaus R. Herbst, Whitney A. Hintz i Keelah E. G. Williams. "Personal relevance affects the perceived immorality of politically-charged threats". PLOS ONE 18, nr 12 (29.12.2023): e0296177. http://dx.doi.org/10.1371/journal.pone.0296177.

Pełny tekst źródła
Streszczenie:
Personal similarities to a transgressor makes one view the transgression as less immoral. We investigated whether personal relevance might also affect the perceived immorality of politically-charged threats. We hypothesized that increasing the personal relevance of a threat would lead participants to report the threat as more immoral, even for threats the participant might otherwise view indifferently. U.S. participants recruited online (N = 488) were randomly assigned to write about the personal relevance of either a liberal threat (pollution), conservative threat (disrespecting an elder), neutral threat (romantic infidelity), or given a control filler task. Participants then rated how immoral and personally relevant each political threat was, as well as reported their political ideology. Partial support for our hypothesis emerged: when primed with conservative writing prompts, liberal-leaning participants rated the conservative threat as more immoral, compared with the same threat after a liberal writing prompt. We did not find these results for conservative-leaning participants, perhaps because all participants cared relatively equally about the liberal threat.
Style APA, Harvard, Vancouver, ISO itp.
18

Griffin, Renee. "Searching for Truth in the First Amendment's True Threat Doctrine". Michigan Law Review, nr 120.4 (2022): 721. http://dx.doi.org/10.36644/mlr.120.4.searching.

Pełny tekst źródła
Streszczenie:
Threats of violence, even when not actually carried out, can inflict real damage. As such, state and federal laws criminalize threats in a wide range of circumstances. But threats are also speech, and free speech is broadly protected by the First Amendment. The criminalization of threats is nonetheless possible because of Supreme Court precedents denying First Amendment protection to “true threats.” Yet a crucial question remains unanswered: What counts as a true threat? This Note examines courts’ attempts to answer this question and identifies the many ambiguities that have resulted from those attempts. In particular, this piece highlights three frontiers of judicial confusion that are likely to arise in a true threat case: (1) what type of intent the First Amendment requires, (2) the proper standard of review on appeals of true threat convictions, and (3) the contextual analyses in which courts engage to assess whether a threat is “true” (and, by extension, whether a threat conviction was constitutional). This third frontier is discussed most extensively, as it has the greatest impact on a case’s ultimate outcome. This Note also proposes a new framework for inquiries into the context of true threats, adapted from defamation law, in order to increase consistency and ensure adequate protection of speech rights within the chaotic true threat doctrine.
Style APA, Harvard, Vancouver, ISO itp.
19

Sylvester, F. Ley. "Mobile Device Users’ Susceptibility to Phishing Attacks". International Journal of Computer Science and Information Technology 14, nr 1 (28.02.2022): 1–18. http://dx.doi.org/10.5121/ijcsit.2022.14101.

Pełny tekst źródła
Streszczenie:
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector. Mobile devices are used for everyday life, such as personal information exchange – chatting, email, shopping, and mobile banking, contributing to information security threats. Users' behavior can influence information security threats. More research is needed to understand users' threat avoidance behavior and motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks. From the data collected from 137 mobile device users using a questionnaire, the findings indicate that (1) mobile device users' perceived susceptibility and severity of phishing attacks have a significant correlation with a users' perception of the threat; (2) mobile device users' motivation to avoid a threat is correlated to a users' behavior in avoiding threat; and (3) a mobile device user's susceptibility to phishing attacks can be reduced by their perception of the threat. These findings reveal that a user's perception of threat increases if they perceive that the consequence of such threat to their mobile devices will be severe, thereby increasing a user's motivation and behavior to avoid phishing attack threats. This study is beneficial to mobile device users in personal and organizational settings.
Style APA, Harvard, Vancouver, ISO itp.
20

Sinclair, Samantha, Artur Nilsson i Jens Agerström. "Tolerating the intolerant: Does realistic threat lead to increased tolerance of right-wing extremists?" Journal of Social and Political Psychology 10, nr 1 (16.03.2022): 35–47. http://dx.doi.org/10.5964/jspp.8017.

Pełny tekst źródła
Streszczenie:
Previous research suggests that threat can bolster anti-immigration attitudes, but less is known about the effects of threat on ideological tolerance. We tested the hypothesis that realistic threats — tangible threats to e.g., the safety or financial well-being of one’s group — bolster support for right-wing extremists. In Experiment 1, participants (N = 200) learned that crime and unemployment rates were either increasing (high threat condition) or remaining the same (low threat condition). Consistent with our hypothesis, higher threat lead to a significant increase in tolerance for right-wing, but not left-wing, extremists. In a second, pre-registered extended replication experiment (N = 385), we added a baseline (no threat) condition. Additionally, attitudes to immigrants were examined as a mediator. This experiment produced non-significant threat effects on tolerance of right-wing extremists. Overall, the current research provides weak support for the hypothesis that realistic threats have asymmetric effects on tolerance of political extremists. However, consistent with previous research, people were more tolerant of extremists within their own ideological camp.
Style APA, Harvard, Vancouver, ISO itp.
21

Dervišević, Tarik, Sabina Baraković i Jasmina Baraković Husić. "Case Study: Security of System for Remote Management of Windows". B&H Electrical Engineering 14, nr 2 (1.12.2020): 4–12. http://dx.doi.org/10.2478/bhee-2020-0007.

Pełny tekst źródła
Streszczenie:
Abstract In the process of designing and forming each system, it is necessary to identify potential vulnerabilities and threats to that system and to include appropriate countermeasures. The process that helps to find the problem in the first phase of design is called threat modeling. Threat modeling is based on the idea that every system has valuable resources that need to be protected. These resources have certain weak points that internal or external threats can use to harm them, while there are as well countermeasures used to mitigate them. Therefore, this paper analyses the security of a Web of Things (WoT)-based system for remote management of windows, which is in the design stage by using a threat modeling approach based on STRIDE and DREAD. The results obtained through Microsoft Threat Modeling Tool (MTMT) justified the use of threat modeling in the design phase given that we have identified in total 118 threats, with Elevation of privilege class of threats being the most prominent ones. The Information disclosure threats are found to be the ones characterized as medium and low risk ones, while the most represented high-risk threats again come from the Elevation of privilege class of threats.
Style APA, Harvard, Vancouver, ISO itp.
22

Gause, F. Gregory. "Threats and Threat Perceptions in the Persian Gulf Region". Middle East Policy 14, nr 2 (czerwiec 2007): 119–24. http://dx.doi.org/10.1111/j.1475-4967.2007.00302.x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

MARTINEZMARTINEZ, R., i A. DIAZFERNANDEZ. "Threat Perception: New Risks, New Threats and New Missions". Contributions to Conflict Management, Peace Economics and Development 4 (2007): 129–60. http://dx.doi.org/10.1016/s1572-8323(07)04006-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Beering, Peter S. "Threats on Tap: Understanding the Terrorist Threat to Water". Journal of Water Resources Planning and Management 128, nr 3 (maj 2002): 163–67. http://dx.doi.org/10.1061/(asce)0733-9496(2002)128:3(163).

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Li, XiaoHong, Ke He, Zhiyong Feng i Guangquan Xu. "Unified threat model for analyzing and evaluating software threats". Security and Communication Networks 7, nr 10 (5.07.2012): 1454–66. http://dx.doi.org/10.1002/sec.599.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Smyth, Aidan P. J., Kimberley L. Gammage, Larkin Lamarche i Cameron Muir. "Examining University Men’s Psychobiological and Behavioral Response-Recovery Profile From a Social-Evaluative Body Image Threat". American Journal of Men's Health 14, nr 2 (marzec 2020): 155798832091083. http://dx.doi.org/10.1177/1557988320910831.

Pełny tekst źródła
Streszczenie:
Negative body image, which often results from social-evaluative body image threats, is common in young men and related to many harmful outcomes. Using social self-preservation theory (SSPT), the present study investigated the psychobiological (i.e., shame and cortisol) and behavioral (e.g., submission) response-recovery profile to a social-evaluative body image threat in university men. Participants ( N = 69; Mage = 20.80 years, SD = 1.84) were randomly assigned to a high-threat ( n = 34) or low-threat condition ( n = 35). Men in the high-threat condition reported greater post-threat body shame, had greater post-threat cortisol levels, and exhibited more shame-relevant behaviors than men in the low-threat condition. There were no significant differences between conditions for body shame or cortisol at the final post-threat time point (after resting for 30 min). These findings are consistent with SSPT and suggest that men respond to, and recover from, body image threats relatively efficiently.
Style APA, Harvard, Vancouver, ISO itp.
27

Guérin, Bastien. "Threat". Pleiades: Literature in Context 44, nr 1 (marzec 2024): 119. http://dx.doi.org/10.1353/plc.2024.a926506.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Semenenko, O., Y. Dobrovolsky, I. Tselishchev, V. Ivanov, Т. Akinina i V. Dubovyi. "ON DETERMINATION OF THREATS TO THE NATIONAL SECURITY OF UKRAINE FROM THE UNDERWATER SPACE". Collection of scientific works of Odesa Military Academy 2, nr 14 (25.01.2021): 187–92. http://dx.doi.org/10.37129/2313-7509.2020.14.2.187-192.

Pełny tekst źródła
Streszczenie:
The main factors determining the threats to Ukraine’s national security from the maritime direction in the part concerning the underwater space within the territorial sea of Ukraine are: increase of naval forces and their armament by other countries of the Black Sea region; presence of territorial claims; unresolved issues regarding the borders of economic maritime zones and the distribution of the continental shelf; economic interests of Ukraine and encroachment on its natural resources; conducting intelligence activities in national waters; terrorism at sea. Comprehensive consideration of threats to the national security of Ukraine provides for the definition of each threat as large as possible its characteristics, which are subject to assessment (measurement) in quantitative or qualitative form. The threat description obtained in this way will be the so-called «Threat Passport». The threat passport is a document in which various data are entered, which comprehensively characterize this or that threat to national security in order to achieve the most complete picture of it. The description of threats to Ukraine’s national security from the maritime direction is proposed to be carried out according to the following characteristics: the formation of the threat (real, potential). Potential threats are understood as such threats, the probability of their practical realization of which is low in the medium term, and real threats are those that already have examples of manifestation, and the probability of their actions is quite high in real time; the nature of the consequences (threat to the vital interests of the state, threat to the important interests of the state, threat to the peripheral interests of the state); scale of consequences (significant, moderate, insignificant, small); sources of origin (international relations, environmental problems, man-made problems); threat orientation (political sphere, military security, state border security, economic sphere, ecological sphere, information sphere); location (external, internal); form of manifestation (overt, covert); types of possible measures to counter the threat (political, diplomatic, economic, legal, military, information and psychological); required types of resources to counter (internal, external). The main tool for comprehensive consideration of threats to Ukraine’s national security from the maritime direction in peacetime in the part concerning the underwater space within the territorial sea of Ukraine is the monitoring of the underwater situation. Keywords: anti-ship defense, grouping of ships, naval forces.
Style APA, Harvard, Vancouver, ISO itp.
29

Michalak, Nicholas M., Oliver Sng, Iris M. Wang i Joshua Ackerman. "Sounds of sickness: can people identify infectious disease using sounds of coughs and sneezes?" Proceedings of the Royal Society B: Biological Sciences 287, nr 1928 (10.06.2020): 20200944. http://dx.doi.org/10.1098/rspb.2020.0944.

Pełny tekst źródła
Streszczenie:
Cough, cough. Is that person sick, or do they just have a throat tickle? A growing body of research suggests pathogen threats shape key aspects of human sociality. However, less research has investigated specific processes involved in pathogen threat detection. Here, we examine whether perceivers can accurately detect pathogen threats using an understudied sensory modality—sound. Participants in four studies judged whether cough and sneeze sounds were produced by people infected with a communicable disease or not. We found no evidence that participants could accurately identify the origins of these sounds. Instead, the more disgusting they perceived a sound to be, the more likely they were to judge that it came from an infected person (regardless of whether it did). Thus, unlike research indicating perceivers can accurately diagnose infection using other sensory modalities (e.g. sight, smell), we find people overperceive pathogen threat in subjectively disgusting sounds.
Style APA, Harvard, Vancouver, ISO itp.
30

Vorobieva, O. V., i F. V. Nikolai. "Sociocultural Threats in the State Discourse of Imperial, Soviet, and Post-Soviet Russia: Strategies of Representation". Uchenye Zapiski Kazanskogo Universiteta. Seriya Gumanitarnye Nauki 163, nr 6 (2021): 86–99. http://dx.doi.org/10.26907/2541-7738.2021.6.86-99.

Pełny tekst źródła
Streszczenie:
This article provides a comparative analysis of ideas about sociocultural threats in the official state documents dating back to the Imperial, Soviet, and post-Soviet periods of Russian history. The rhetorical construction of threats as part of the security discourse was considered. It was proved that the concept of threat is structured by the appropriate frame and includes figures of the bearer of the threat (agent), the object of the threat (patient), and a certain vision of the strategy of countering the threat (counteragent). The conclusion was made about the cyclical alternation of internal and external threats in the social and political thought of Russia. The priority of internal and external state threats over personal ones, the recognition of the state as a key historical agent was a stable trend of the Soviet and post-Soviet periods. In the first place throughout all the three periods was the threat to national security and territorial integrity, which is closely linked with the threat of lagging behind the West. The third place on this list was occupied by the threat of social and sociocultural split. The differences in the rhetoric of each period can be attributed to the changes in the macro-political situation. However, the general continuity of the structure of representation of threats, the unity of the thesaurus, and the priority of the state as a political actor remained with minimal changes.
Style APA, Harvard, Vancouver, ISO itp.
31

Suhas, Kelkar Siddhi. "Evaluation of Threat Models". International Journal for Research in Applied Science and Engineering Technology 11, nr 3 (31.03.2023): 809–13. http://dx.doi.org/10.22214/ijraset.2023.49311.

Pełny tekst źródła
Streszczenie:
Abstract: Information system security is the integrity and safety of its resources and activities. In the cyber world, it can be almost impossible to trace sophisticated attacks to their true source. The anonymity enjoyed by the malicious user or cyber attackers pose a grave threat to the global information society. Cyber threat modelling is an analytical process that is used to identify the potential threats against a system or an organization. It is a core activity and a fundamental practice in the process of building trusted technology. Threat modelling has been identified as one of the best "return on investment" activities in order to identify and address design flaws. Some threat model methods focus on identifying threats and security issues while some methods also perform assessment of the resulting risk.
Style APA, Harvard, Vancouver, ISO itp.
32

Wąsowicz, Grażyna. "COVID-19 pandemic and pollution of the environment – threat perception, willingness to incur economic costs, psychological resources, and behaviors". Przegląd Psychologiczny 66, nr 2 (17.12.2023): 171–88. http://dx.doi.org/10.31648/przegldpsychologiczny.9807.

Pełny tekst źródła
Streszczenie:
Objectives: 1. Comparison of COVID-19 and environmental pollution threats perception, willingness to incur costs to protect against these threats, and perceptions of competence to counteract these threats. 2. Comparison of the pattern of relationships in the context of each of the threats between (a) threat perception and willingness to incur economic costs versus protective/preventive behaviors against the threat; (b) threat perception and willingness to incur costs versus protective/preventive behaviors; (c) psychological resources (life aspirations, perceived competence, and stress coping strategies) versus the willingness to incur costs and adopt protective/preventive behaviors. Method: Three hundred people, 50% women and 50% men aged from 19 to 59 years (M = 39,79, SD = 11) participated in the online study. The following scales were used: COVID-19 threat perception (Cypryańska & Nezlek, 2020) and willingness to incur costs of acting against COVID-19 (Cypryańska & Nezlek, 2020), both applied also in the context of environmental pollution threat; Coping strategies inventory (Addison et al., 2007); Life aspirations index-23 (Grouzet et al., 2005), and scales of perceived competence of protection against COVID-19 and changing consumption behavior (inspired by Williams et al., 1998). The predicted variables were protective behaviors against COVID-19 and preventive behaviors that reduce environmental pollution. Results: The perceived threat of environmental pollution, willingness to incur economic costs, and competence were all rated higher than the COVID-19 threat. The relationship patterns in models of threats showed similarities as well as differences. The perception of threats to the individual and the world, community contributions as a life goal, perceived competence, and stress-coping strategies were associated with behavior change. Conclusion: Each threat has its specificity that should be considered when searching for predictors of various aspects of individuals' functioning and developing communication strategies to change behaviors.
Style APA, Harvard, Vancouver, ISO itp.
33

Lv, Huiying, Yuan Zhang i Jie Wang. "Network Threat Identification and Analysis Based on a State Transition Graph". Cybernetics and Information Technologies 13, Special-Issue (1.12.2013): 51–61. http://dx.doi.org/10.2478/cait-2013-0037.

Pełny tekst źródła
Streszczenie:
Abstract With the rapid popularity of Internet and information technology, local area network is becoming insecure. Along with the improving advantages, security threats are emerging continually and bringing great pressure and challenges. An identification and analysis method for network real-time threats is proposed to accurately assess and master the current network security situation, and thereby preferably guide a dynamic defense. This method recognizes the current threats and predicts the subsequent threats by modeling attack scenarios and simulating attack state transferring. The threat identification model is called Attack State Transition Graph and Real-Time Attack State Graph, which is constructed by an Expanded Finite-State Automata. Based on the former possible threat paths, the state transitions can be illustrated and based on the latter, actually successful threats and threat paths are described. Then a threat identification algorithm is presented based on the above model. With this algorithm, various invalid threats are filtered; current valid threats are obtained by correlating the dynamic alarms with a static attack scenario. Further on, combining the Attack State Transition Graph with a Real-Time Attack State Graph, a possible next threat and a threat path can be identified and an attack target can also be predicted. Finally, the simulated results in an experimental network verify the feasibility and validity of the model and algorithm. This method provides a novel solution to evaluate and analyze the network security situation.
Style APA, Harvard, Vancouver, ISO itp.
34

Isokaitė-Valužė, Indrė. "International Peace and Security in Maritime Domain". Teisė 122 (30.03.2022): 8–21. http://dx.doi.org/10.15388/teise.2022.122.1.

Pełny tekst źródła
Streszczenie:
The research aims at establishing which activities or situations in maritime domain, which threaten maritime safety and / or maritime security, fall within the concept of international peace and security. Having demonstrated the validity of the international law principles that safeguard international peace and security in maritime area, the research reveals a changing list of the threats to international peace and security, which now encompasses activities and situations at sea, including terrorism, sea piracy and armed robbery against ships, proliferation of weapons of mass destruction, etc. A maritime space safe from such kind of threats generally means maritime security. Thus, a great part of the threats to maritime security are or may constitute threats to international peace and security, subject to their recognition as such threats by the United Nations Security Council in its resolutions. Usually such threats also pose risk to maritime safety (safety at sea, safety of navigation, ships, crew and passengers); however, any threat to maritime safety does not necessarily endanger maritime security or amount to the threat to international peace and security.
Style APA, Harvard, Vancouver, ISO itp.
35

Naaz, Farah, Lindsay K. Knight i Brendan E. Depue. "Explicit and Ambiguous Threat Processing: Functionally Dissociable Roles of the Amygdala and Bed Nucleus of the Stria Terminalis". Journal of Cognitive Neuroscience 31, nr 4 (kwiecień 2019): 543–59. http://dx.doi.org/10.1162/jocn_a_01369.

Pełny tekst źródła
Streszczenie:
Highly influential models have proposed that responses to different types of threat are mediated by partially segregated neural systems, with the amygdala underlying phasic responses to explicit threat (fear) and the bed nucleus of the stria terminalis (BNST) mediating sustained responses to ambiguous threat (anxiety). However, newer models have suggested similar recruitment of both regions across a wide spectrum of threat. Therefore, to empirically test these models and further elucidate the activation profiles and connectivity patterns of the amygdala and the BNST during threat processing, 20 participants were scanned using high-resolution fMRI (1.5 mm3). Using fearful faces and human screams as aversive stimuli, two threat conditions were created: Explicit Threat in which threats were certain and predictable (fear) and Ambiguous Threat in which threats were uncertain and unpredictable (anxiety). Results indicated that, although the amygdala and the BNST both showed heightened engagement across both threat conditions, the amygdala showed preferential engagement during Explicit Threat and displayed functional connectivity with regions involved in stimulus processing and motor response. By contrast, the BNST preferentially responded during Ambiguous Threat and exhibited functional connectivity with prefrontal regions underlying interoception and rumination. Furthermore, correlations with questionnaires measuring trait anxiety, worry, and rumination suggested that individual differences in affective style play a modulatory role in regional recruitment and network connectivity during threat processing.
Style APA, Harvard, Vancouver, ISO itp.
36

Sharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand i Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment". Electronics 10, nr 15 (31.07.2021): 1849. http://dx.doi.org/10.3390/electronics10151849.

Pełny tekst źródła
Streszczenie:
Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an organisation and company’s business seem to need that information security exercise to unambiguously and effectively handle the threat agent’s attacks. How is this unambiguous and effective way in the present-day state of information security practice working? Given the prevalence of threats in the modern information environment, it is essential to guarantee the security of national information infrastructure. However, the existing models and methodology are not addressing the attributes of threats like motivation, opportunity, and capability (C, M, O), and the critical threat intelligence (CTI) feed to the threat agents during the penetration process is ineffective, due to which security assurance arises for an organisation and the business of companies. This paper proposes a semi-automatic information security model, which can deal with situational awareness data, strategies prevailing information security activities, and protocols monitoring specific types of the network next to the real-time information environment. This paper looks over analyses and implements the threat assessment of network traffic in one particular real-time informational environment. To achieve this, we determined various unique attributes of threat agents from the Packet Capture Application Programming Interface (PCAP files/DataStream) collected from the network between the years 2012 and 2019. We used hypothetical and real-world examples of a threat agent to evaluate the three different factors of threat agents, i.e., Motivation, Opportunity, and Capability (M, O, C). Based on this, we also designed and determined the threat profiles, critical threat intelligence (CTI), and complexity of threat agents that are not addressed or covered in the existing threat agent taxonomies models and methodologies.
Style APA, Harvard, Vancouver, ISO itp.
37

Koper-Staszowska, Wioletta. "Security versus Threat – Interrelations". ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, nr 3 (30.10.2018): 22–25. http://dx.doi.org/10.5604/01.3001.0012.7517.

Pełny tekst źródła
Streszczenie:
The issue of interrelations between security and threat has a history as long as the history of mankind. Human beings since the beginning of times have always had needs of higher and lower importance, these needs sometimes collide with the needs and interests of others, thus creating a threat. Originally, the meaning of the term ‘security’ was limited only to the armed protection of territories against the enemies from neighboring countries. With time other layers of threat were recognized and determined. Nowadays, protection against external aggression is just one of many threats which must be dealt with to provide security to a state, other threats are related to economic, ecological, social or cultural aspects.
Style APA, Harvard, Vancouver, ISO itp.
38

Saddam RA, Angga Pranata, Sugiono, Rizki Zulanggara, Nur Halimah, Sri Nur H, Rosdiana SM, Nurhalim i Aprina Handayani. "Sniffing and Spoofing in Computer Security". International Journal of Integrative Sciences 2, nr 6 (30.06.2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.

Pełny tekst źródła
Streszczenie:
The development of Information Technology (IT) has changed people's mindset. The presence of the Internet as the main platform for online activity is vulnerable to criminal acts by irresponsible parties. Criminal acts in cyberspace, of course, pose a major threat to the governance of online activities. One of these major threats is the threat of network security. Networks connected to the internet are basically insecure and can always be exploited by hackers, both LAN and wireless networks. The internet network has two data transmission media, namely wired and wireless. what happens is open. Examples of network security threats that often occur are sniffing of activities on the network (sniffing) and also impersonation by other people (spoofing). This resume article aims to identify criminal acts that threaten computer security, namely Sniffing and Spoofing
Style APA, Harvard, Vancouver, ISO itp.
39

Battisti, Corrado, Marisa Perchinelli, Sharon Vanadia, Pietro Giovacchini i Letizia Marsili. "Monitoring Effectiveness of an Operational Project on Two Threatened Landbirds: Applying a Before–After Threat Analysis and Threat Reduction Assessment". Land 12, nr 2 (12.02.2023): 464. http://dx.doi.org/10.3390/land12020464.

Pełny tekst źródła
Streszczenie:
Human activities are at the origin of anthropogenic threats altering ecosystems at any hierarchical level. To mitigate them, environmental managers develop projects to obtain effective outcomes on biological targets of conservation concern. Here, we carried out two new approaches (TAN = Threat Analysis and TRA = Threat Reduction Assessment) aimed at assessing the effectiveness of conservation actions on two threatened beach-nesting landbird species, the Kentish Plover (Charadrius alexandrinus) and the Little Ringed Plover (C. dubius), breeding along a coastal beach of central Italy. Using a score-based evaluation (TAN approach), a panel of experts assessed the extent, intensity, and magnitude of a set of species-specific threats, ranking them from more to less impacting. Domestic dogs, dune trampling, and synanthropic predators appeared as the threats with the most significant magnitudes. Using the TRA approach, experts obtained a rank of threats that were more urgent to solve: i.e., domestic dogs and dune trampling. To contrast with these threats, in 2021, we carried out a conservation project with specific measures that were aimed at reducing the threat magnitude on birds. They included: dune borders demarcation, anti-predatory cages on plover nests, the removal of beach-stranded fishing lines and hooks, field surveillance by volunteers, dog control, social- and mass-media communication, and alliances with stakeholders and institutions. After the project, mechanical beach grooming (>80%), dune trampling, and synanthropic predators (both >60%) showed the highest percentage of impact reduction. The project showed a medium–high level of effectiveness in reducing the total threat magnitude (TRA-I index = 63.08%). The Threat Analysis should be routinely used to arrange a causal chain that is useful for defining the relationships among human-induced threats and ecological targets, selecting the threats with the highest magnitudes. After the projects, the Threat Reduction Assessment may assess the level of threat reduction, suggesting measures for adaptive management.
Style APA, Harvard, Vancouver, ISO itp.
40

Peterson, Jordan B., i Colin G. DeYoung. "Metaphoric threat is more real than real threat". Behavioral and Brain Sciences 23, nr 6 (grudzień 2000): 992–93. http://dx.doi.org/10.1017/s0140525x00784020.

Pełny tekst źródła
Streszczenie:
Dreams represent threat, but appear to do so metaphorically more often than realistically. The metaphoric representation of threat allows it to be conceptualized in a manner that is constant across situations (as what is common to all threats begins to be understood and portrayed). This also means that response to threat can come to be represented in some way that works across situations. Conscious access to dream imagery, and subsequent social communication of that imagery, can facilitate this generalized adaptive process, by allowing the communicative dreamer access to the problem solving resources of the community.[Revonsuo; Solms]
Style APA, Harvard, Vancouver, ISO itp.
41

Eluwa, Jumoke, Patrick Omorovan, Dipo Adewumi i Oluwafunmilayo Ogbeide. "The Evolving Threat Landscape: How Cyber Threat Intelligence Empowers Proactive Defenses against WannaCry Ransomware". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, nr 2 (3.04.2024): 403–11. http://dx.doi.org/10.32628/cseit243648.

Pełny tekst źródła
Streszczenie:
Cyber threat intelligence (CTI) is a rapidly growing field that plays an essential role in ensuring the security of online systems. CTI refers to the intelligence that is gathered, analyzed, and disseminated to help organizations understand and respond to cyber threats. This information can be used to identify vulnerabilities, detect potential attacks, and develop strategies to mitigate risks. The field of CTI is constantly evolving, as cyber threats become more sophisticated and complex. Legacy security measures like firewalls and anti-virus software are no longer enough to protect organizations from the many threats they face. CTI provides a proactive approach to cybersecurity, by enabling organizations to anticipate and prepare for threats before they occur. CTI relies on the collection and analysis of data from multiple sources, such as open-source intelligence (OSINT), dark web forums, social media, and other threat intelligence streams. The data is analyzed using a wide range of tools and techniques, including machine learning and artificial intelligence, to identify patterns and trends that may indicate a potential threat. One of the key benefits of CTI is its ability to help organizations understand the tactics, techniques, and procedures of attackers. By analyzing the behaviors, strategies, tactics, and actions of threat actors, organizations can develop a more comprehensive understanding of the threats they face and can better prepare for potential attacks.
Style APA, Harvard, Vancouver, ISO itp.
42

Popaja, Nejla, Sabina Baraković i Jasmina Baraković Husić. "Analysis of Threats for Ambient Assisted Living (AAL) Wireless Sensor Network (WSN)-Based System". B&H Electrical Engineering 15, nr 2 (1.12.2021): 31–39. http://dx.doi.org/10.2478/bhee-2021-0015.

Pełny tekst źródła
Streszczenie:
Abstract In the process of designing a system, it is necessary to identify potential threats to that system and to include appropriate countermeasures. The process that helps in finding problems in the initial phase of the system design is the threat modeling. Creating a threat model consists of several steps and there are many tools that can help in automating the procedure. This article deals with the threat analysis for an Ambient Assisted Living (AAL) system based on Wireless Sensor Network (WSN), whose main function is to provide information for carers in order to provide the best possible help to the elderly and disabled. We have identified and analysed 99 potential threats to the considered system, where Denial of Service (DoS) resulted in being the most represented class of threats. After conducting the threat assessment, the obtained results showed that the majority of threats are high-risk and justified the use of threat modeling in the design phase, since they can be utilized in further system development stages.
Style APA, Harvard, Vancouver, ISO itp.
43

Holmes IV, Oscar, Marilyn V. Whitman, Kim S. Campbell i Diane E. Johnson. "Exploring the social identity threat response framework". Equality, Diversity and Inclusion: An International Journal 35, nr 3 (18.04.2016): 205–20. http://dx.doi.org/10.1108/edi-08-2015-0068.

Pełny tekst źródła
Streszczenie:
Purpose – The purpose of this paper is to explore what individuals perceive as social identity threats, the sources of the threat, individuals’ responses, and the consequences of the threat. Design/methodology/approach – Narratives from 224 individuals were collected. A sample of 84 narratives were analyzed in depth using a qualitative content analysis approach. Findings – Initial support for identity threat response theory was found. Three new distinct threat responses – constructive action, ignore, and seek assistance – were uncovered. Additionally, harm/loss appraisals were found to be perceived and reacted to similarly to Petriglieri-defined identity threats. Originality/value – This study contributes to identity scholarship by shedding further light on the “theoretical black box” associated with identity threat. Such insight is necessary in further enhancing our understanding of the impact that identity threat has at the individual and organizational level.
Style APA, Harvard, Vancouver, ISO itp.
44

Aththaariq Rizki. "UTILIZATION OF THE SEMESTA DEFENSE CONCEPT IN FACING SIBER ATTACKS DURING THE COVID-19 PANDEMIC IN INDONESIA". Edukasi IPS 5, nr 2 (30.08.2021): 18–26. http://dx.doi.org/10.21009/eips.005.02.03.

Pełny tekst źródła
Streszczenie:
This study argues that currently the threat of cyber attacks has become a real threat that has the potential to grow during the Covid-19 pandemic. The concept of a universal defense system can be used as strategy to deal with cyber threats. This research using a qualitative method with a literature review approach that focuses on the threat of cyber attacks in Indonesia during the Covid-19 pandemic. The purpose of this study is to find out how the threat of cyber attacks in Indonesia during the Covid-19 pandemic is, and how the concept of a universal defense system can handle it. The theory used is concept of threats, cyber attacks, and universal defense systems as a literature review. This study, was found that the threat of cyber attacks during the Covid-19 pandemic has increased and is growing, besides that the use of the universal defense concept is considered capable of dealing with the escalation of existing cyber threats. So it can be concluded from this study that the threat of cyber attacks in Indonesia during the Covid-19 pandemic is increasing and the use of the concept of a universal defense system is considered capable of tackling these cyber threats.
Style APA, Harvard, Vancouver, ISO itp.
45

Uenal, Fatih. "Disentangling Islamophobia: The differential effects of symbolic, realistic, and terroristic threat perceptions as mediators between social dominance orientation and Islamophobia". Journal of Social and Political Psychology 4, nr 1 (7.04.2016): 66–90. http://dx.doi.org/10.5964/jspp.v4i1.463.

Pełny tekst źródła
Streszczenie:
The aim of this paper is threefold. First, based on ongoing theoretical discussions on the dimensionality of Islamophobia, this study analyzes whether Islamophobia empirically constitutes a one-dimensional construct or rather a multidimensional construct consisting of anti-Muslim prejudice and anti-Islam sentiment. Second, the effects of symbolic, realistic, and terroristic (safety) threats on Islamophobia were analyzed concurrently. Finally, within the framework of the revised Integrated Threat Theory (Stephan & Renfro, 2002), and in order to test the mediating effect of threats, SDO is tested as an antecedent of perceived threat and Islamophobia. Respondents from Berlin (N = 355) participated in an online survey. The results indicate that Islamophobia empirically constitutes a two-dimensional phenomenon, consisting of anti-Muslim and anti-Islam sentiment. Whereas symbolic threat is related to both types of Islamophobia, realistic threat is associated only with anti-Muslim prejudice, and terroristic threat is associated only with anti-Islam sentiment. Finally, the results indicate that the relationship between SDO and both dimensions of Islamophobia is mediated by threats. Symbolic threats mediate the relationships between SDO and both dimensions of Islamophobia. Realistic threats mediate the relationship between SDO and anti-Muslim prejudice and terroristic threats between SDO and anti-Islam sentiment.
Style APA, Harvard, Vancouver, ISO itp.
46

Van Severen, Ruben, Arne Roets, Delphine Van Muylem, Tessa Haesevoets, Alain Van Hiel i Bram Wauters. "Democratic and Authoritarian Government Preferences in Times of Crisis". Social Psychology 55, nr 1 (styczeń 2024): 37–50. http://dx.doi.org/10.1027/1864-9335/a000538.

Pełny tekst źródła
Streszczenie:
Abstract: Prior studies have linked societal threats to a surge in conservative attitudes. We conducted three studies ( N = 1,021) to investigate whether hypothetical threat situations impact peoples’ attitudes toward democracy or alternative systems. Study 1 shows that individuals under threat devaluate representative and participatory government types and show relatively stronger endorsement of less democratic alternatives. Study 2 clarifies that extranational threats elicit a greater shift toward nondemocratic ‘solutions’ than intranational threats and that citizens generally find a just process less important in times of crisis. Study 3 shows that the effect of threat on support for technocracy can be explained by heightened anticipated anxiety. We find no evidence that anticipated emotions consistently account for the observed shifts in government preferences under threat.
Style APA, Harvard, Vancouver, ISO itp.
47

Rahmat, Wahyudi. "BAHASA ANCAMAN DALAM TEKS KABA SABAI NAN ALUIH BERBASIS PENDEKATAN LINGUISTIK FORENSIK". JURNAL ARBITRER 2, nr 1 (29.04.2015): 81. http://dx.doi.org/10.25077/ar.2.1.81-97.2015.

Pełny tekst źródła
Streszczenie:
This thesis is focused on the analysis threat language in Kaba Sabai Nan Aluih text. The aims of this thesis are to explain the form, meaning and motive of threaten language by employing several theory, including Searle (1969) and Wijana (1996), Aminuddin (2008) to figure out the meaning, while the motive form used the theory stated by Maslow (1943). The research is conducted by using observational method along with the techniques. In analyzing the data use distributional and identity method. Identity method that employs including reference and pragmatic identity method while in distributional method employs marker identification techniques. The result of analysis is presented in informal method. These method and techniques are identical with proposed by Sudaryanto (1993) and Mastoyo (2007). The result of the analysis shows that there are four types of language threat form; (1) direct speech act, (2) indirect speech act, (3) literal speech act, and (4) non literal speech act. The meaning of threaten language in KSNA are (1) think in every act, because if it is not doing so would cause harm to themselves; (2) pride and arrogance will lead to the destruction of those who have the attitude; (3) every person should have a sense of caring so that the people closest to us are not wrong in its attitude and decisions; (4) a form of error should be fixed even if the truth is painful; (5) is a self-esteem is everything, (6) to save themselves with a threats speech can be used if someone was in danger of being defeated; (7) not all forms of threat is a detrimental thing; (8) awaken the nearest fault has been done is a form of responsibility; (9) threatening to a motivation not an adverse thing; (10) awaken people closest guilt is a form of right action; (11) fixed price for an appropriate fee for the self-esteem that has been tarnished, and (12) very uncontrolled emotion can cause harm.The motive of threat language in KSNA are (1) dissatisfaction, (2) test of the intelligence, (3) pain, (4) displeasure of the attitude of a person, (5) self-esteem, (6) revenge, (7) self defended mechanism by using threat, (8) motivation, (9) mocking in order to direct people to do something, (10) sarcasme to boost spirit, (11) revenged, (12) motif of self defended, (13) grief. Keywords: KSNA , threats form, threats meaning, threats motive
Style APA, Harvard, Vancouver, ISO itp.
48

Khan, Muhammad Salman, Rene Richard, Heather Molyneaux, Danick Cote-Martel, Henry Jackson Kamalanathan Elango, Steve Livingstone, Manon Gaudet i Dave Trask. "Cyber Threat Hunting". International Journal of Cognitive Informatics and Natural Intelligence 15, nr 4 (1.10.2021): 1–23. http://dx.doi.org/10.4018/ijcini.20211001.oa9.

Pełny tekst źródła
Streszczenie:
Security and Information Event Management (SIEM) systems require significant manual input; SIEM tools with machine learning minimizes this effort but are reactive and only effective if known attack patterns are captured by the configured rules and queries. Cyber threat hunting, a proactive method of detecting cyber threats without necessarily knowing the rules or pre-defined knowledge of threats, still requires significant manual effort and is largely missing the required machine intelligence to deploy autonomous analysis. This paper proposes a novel and interactive cognitive and predictive threat-hunting prototype tool to minimize manual configuration tasks by using machine intelligence and autonomous analytical capabilities. This tool adds proactive threat-hunting capabilities by extracting unique network communication behaviors from multiple endpoints autonomously while also providing an interactive UI with minimal configuration requirements and various cognitive visualization techniques to help cyber experts quickly spot events of cyber significance from high-dimensional data.
Style APA, Harvard, Vancouver, ISO itp.
49

Martins, Cláudio, i Ibéria Medeiros. "Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy". ACM Transactions on Privacy and Security 25, nr 3 (31.08.2022): 1–39. http://dx.doi.org/10.1145/3530977.

Pełny tekst źródła
Streszczenie:
Today’s threats use multiple means of propagation, such as social engineering, email, and application vulnerabilities, and often operate in different phases, such as single device compromise, lateral network movement, and data exfiltration. These complex threats rely on advanced persistent threats supported by well-advanced tactics for appearing unknown to traditional security defenses. As organizations realize that attacks are increasing in size and complexity, cyber threat intelligence (TI) is growing in popularity and use. This trend followed the evolution of advanced persistent threats, as they require a different level of response that is more specific to the organization. TI can be obtained via many formats, with open-source intelligence one of the most common, and using threat intelligence platforms (TIPs) that aid organizations to consume, produce, and share TI. TIPs have multiple advantages that enable organizations to quickly bootstrap the core processes of collecting, analyzing, and sharing threat-related information. However, current TIPs have some limitations that prevent their mass adoption. This article proposes AECCP, a platform that addresses some of the TIPs limitations. AECCP improves quality TI by classifying it accordingly a single unified taxonomy , removing the information with low value, enriching it with valuable information from open-source intelligence sources, and aggregating it for complementing information associated with the same threat. AECCP was validated and evaluated with three datasets of events and compared with two other platforms, showing that it can generate quality TI automatically and help security analysts analyze security incidents in less time.
Style APA, Harvard, Vancouver, ISO itp.
50

Maris, Ladislav, Zuzana Zvakova, Katarina Kampova i Tomas Lovecek. "The Influence of Threat Development on the Failure of the System’s Symmetry". Systems 9, nr 4 (20.10.2021): 74. http://dx.doi.org/10.3390/systems9040074.

Pełny tekst źródła
Streszczenie:
The existence or non-existence of a threat to a system is essential for its existence or essential for the functionality of the system. Even more crucial is the potential of the threat and its development, which leads to the failure of the symmetry of the system. What influences the development of such threats? What contexts influence the evolution of system threats? The development of threats is linked to the changing values of indicators that affect the state of the threat at a certain point in time. This development takes place in a constantly changing environment, therefore it is dynamically and causally linked. The system aims to maintain its order, however, the influence of the development of threats deflects it towards the entropy of the system. The paper is focused on the identification of the phases of the development of threats and their impact on the symmetry of a system. The paper presents a theoretical view of the impact of threat development on system symmetry failure.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii