Search results for " THREAT"

showing 10 items of 113 documents

Bezpieczeństwo państwa a mniejszości narodowe

2017

National minorities, either today and in the past, certainly can be considered as a potential source of various types of threats to the security of State. States as the organizational form of different nations, not always peacefully co-exist, therefore a situation in which people of different nationalities residing in the territory of one country is inevitably more complex and raises many problems. Needs of State in terms of security, differ from those of groups and individual members of society. Threats may vary in nature and intensity and come from different directions, which depends on a wide variety of factors. This relation is not so simple because the State (and the members of the maj…

state security threatsstate securitynational minority politicsnational minoritynational minority discrimination
researchProduct

Cuffaro, Pirandello e Schillaci: forse i siciliani non sono tutti uguali. L’effetto dell’entitatività percepita sulla minaccia indotta dallo stereoti…

2008

The goal of this study was to test the role of perceived entitativity as a potential moderator of underperformance typically associated with stereotype threat. The results of two experiments confirmed our hypotheses: Study 1 showed a lesser decrease in performance in a task of syllogistic abilities when the threat was directed to Sicilians (social category, low entitativity) rather than to their family (intimate group, high entitativity). Study 2 confirmed and extended these results through a direct measure of entitativity. Theoretical implications of these results are discussed.

stereotype threat entitativity test performanceSettore M-PSI/05 - Psicologia Sociale
researchProduct

A Network-Based Framework for Mobile Threat Detection

2018

Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…

ta113Computer scienceintrusion detectionmobile threatsFeature extractionEvasion (network security)concept-driftAdversaryComputer securitycomputer.software_genreFlow networkMobile malwareanomaly detectionVariety (cybernetics)haittaohjelmatmachine learningkoneoppiminenmobiililaitteetMalwaretietoturvacomputerHumanoid robot
researchProduct

A Novel Model for Cybersecurity Economics and Analysis

2017

In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…

ta113Value (ethics)Computer sciencemedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTING020207 software engineering02 engineering and technologyBusiness activitiesComputer securitycomputer.software_genrecybersecurity economicscyber fraudadvanced cyber threatstaloudelliset vaikutuksetcost-benefit model020204 information systemsCyber-security regulation0202 electrical engineering electronic engineering information engineeringResearch developmentkyberturvallisuuscomputercybersecurity impactReputationmedia_common2017 IEEE International Conference on Computer and Information Technology (CIT)
researchProduct

Health care and cyber threats

2019

ta113critical infrastructurecyber threatkyberuhkaterveydenhuoltocyber securitykyberturvallisuushealth carekriittinen infrastruktuuriFinnish Journal of eHealth and eWelfare
researchProduct

Face-work in intimate public conversation : men and women's talk in Ricki Lake show

2000

talk showface threatening actpolitenessfacegenderembarrassmentface-maintenance
researchProduct

Perceived threat and prejudice towards immigrants and Russian minorities living in Finland

2017

This study is an attempt to better understand the relationship between Finns and Russian minorities living in Finland. This study considers the role of perceived threats to the attitudes of Finnish adolescents towards Russian minorities. The theoretical framework for this study was the integrated threat theory (ITT). Even though ITT has been revised and threats have been reduced to two major threats (realistic and symbolic threats) (Stephan et al., 2015), this study utilized the original conceptualization of ITT which stipulates that prejudice and negative attitudes towards minorities can be explained by four types of threats that are: realistic threats, symbolic threats, negative stereotyp…

teini-ikäisetRussiansvähemmistötuhatikäryhmätasenteetvarhaisnuoretintegrated threatprejudicemaahanmuuttajatryhmien väliset suhteetvenäläisetennakkoluulotnuoretmaahanmuuttoSuomiadolescentsstereotypiatuhkakuvatFinland
researchProduct

FRIGHTENING OF CHILDREN BY PARENTS AND ITS CONSEQUENCES

2018

The article attempts to generalize data on such a complex pedagogical and psychological phenomenon as the deliberate frightening of children by adults. Despite an obvious or apparent harm, it is still included in the established set of methods of family education. In our study, we studied the origins of this phenomenon, the degree of its prevalence in the practice of family education at the present time, and the consequences of using threats in the process of education in the assessments of the adults who were brought up in this way.To achieve the research objectives, a number of former children who were frightened in childhood by their parents, the content of adults’ threats, the motives f…

the image of the world; the frightening of children in the process of education; the content of adults’ threats to children in the process of educationHarmFamily educationPhenomenonPsychologySet (psychology)Research objectivesDevelopmental psychologyEducation Reform in Comprehensive School: Education Content Research and Implementation Problems
researchProduct

Red list of threatened vascular plants in Italy

2021

Italy has a rich natural heritage, which is dangerously under pressure. In recent years, there is an increased awareness of the crucial role of plants in ecosystem functioning and in providing ecosystem services. Consequently, an updated Red List of the Italian vascular flora was compiled in this work, at the request of the Ministry for Environment, Land and Sea Protection, with the scientific support of the Italian Botanical Society. The IUCN Red List criteria were applied to 2,430 Italian native vascular plant taxa to assess their current extinction risk and to highlight the major threats affecting the Italian flora. Our results revealed that 54 taxa (2.2% of the assessed taxa) are extinc…

threatened plant0106 biological sciencesAgroforestrybiodiversity conservation; IUCN Red Lists; Mediterranean Basin; prioritization; threatened plantsSettore BIO/02 - Botanica SistematicaPlant ScienceprioritizationIUCN Red ListBiodiversity conservation010603 evolutionary biology01 natural sciencesfloraGeographythreatened plantsThreatened speciesNatural heritageSettore BIO/03 - Botanica Ambientale E ApplicataIUCN Red ListBiodiversity conservation; IUCN Red Lists; Mediterranean Basin; prioritization; threatened plants; flora;EcosystemMediterranean BasinEcology Evolution Behavior and SystematicsBiodiversity conservation; threatened plants; IUCN Red Lists; Mediterranean Basin; prioritization010606 plant biology & botanyIUCN Red Lists
researchProduct

IDPlanT: the Italian database of plant translocation

2021

IDPlanT is the Italian Database of Plant Translocation, an initiative of the Nature Conservation Working Group of the Italian Botanical Society. IDPlanT currently includes 185 plant translocations. The establishment of a national database on plant translocation is a key step forward in data sharing and techniques improvement in this field of plant conservation. Supplemental data for this article is available online at https://doi.org/10.1080/11263504.2021.1985004.

threatened plantAssisted colonisation; data-sharing; plant conservation; plant reintroduction; population reinforcement; threatened plantspopulation reinforcementplant reintroductionAmbientaleplant conservationChromosomal translocationPlant ScienceComputational biologyData sharingGeographyAssisted colonisationassisted colonisation data-sharing plant conservation plant reintroduction population reinforcement threatened plantsthreatened plantsdata-sharingEcology Evolution Behavior and Systematics
researchProduct