Search results for " THREAT"
showing 10 items of 113 documents
Bezpieczeństwo państwa a mniejszości narodowe
2017
National minorities, either today and in the past, certainly can be considered as a potential source of various types of threats to the security of State. States as the organizational form of different nations, not always peacefully co-exist, therefore a situation in which people of different nationalities residing in the territory of one country is inevitably more complex and raises many problems. Needs of State in terms of security, differ from those of groups and individual members of society. Threats may vary in nature and intensity and come from different directions, which depends on a wide variety of factors. This relation is not so simple because the State (and the members of the maj…
Cuffaro, Pirandello e Schillaci: forse i siciliani non sono tutti uguali. L’effetto dell’entitatività percepita sulla minaccia indotta dallo stereoti…
2008
The goal of this study was to test the role of perceived entitativity as a potential moderator of underperformance typically associated with stereotype threat. The results of two experiments confirmed our hypotheses: Study 1 showed a lesser decrease in performance in a task of syllogistic abilities when the threat was directed to Sicilians (social category, low entitativity) rather than to their family (intimate group, high entitativity). Study 2 confirmed and extended these results through a direct measure of entitativity. Theoretical implications of these results are discussed.
A Network-Based Framework for Mobile Threat Detection
2018
Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…
A Novel Model for Cybersecurity Economics and Analysis
2017
In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…
Health care and cyber threats
2019
Face-work in intimate public conversation : men and women's talk in Ricki Lake show
2000
Perceived threat and prejudice towards immigrants and Russian minorities living in Finland
2017
This study is an attempt to better understand the relationship between Finns and Russian minorities living in Finland. This study considers the role of perceived threats to the attitudes of Finnish adolescents towards Russian minorities. The theoretical framework for this study was the integrated threat theory (ITT). Even though ITT has been revised and threats have been reduced to two major threats (realistic and symbolic threats) (Stephan et al., 2015), this study utilized the original conceptualization of ITT which stipulates that prejudice and negative attitudes towards minorities can be explained by four types of threats that are: realistic threats, symbolic threats, negative stereotyp…
FRIGHTENING OF CHILDREN BY PARENTS AND ITS CONSEQUENCES
2018
The article attempts to generalize data on such a complex pedagogical and psychological phenomenon as the deliberate frightening of children by adults. Despite an obvious or apparent harm, it is still included in the established set of methods of family education. In our study, we studied the origins of this phenomenon, the degree of its prevalence in the practice of family education at the present time, and the consequences of using threats in the process of education in the assessments of the adults who were brought up in this way.To achieve the research objectives, a number of former children who were frightened in childhood by their parents, the content of adults’ threats, the motives f…
Red list of threatened vascular plants in Italy
2021
Italy has a rich natural heritage, which is dangerously under pressure. In recent years, there is an increased awareness of the crucial role of plants in ecosystem functioning and in providing ecosystem services. Consequently, an updated Red List of the Italian vascular flora was compiled in this work, at the request of the Ministry for Environment, Land and Sea Protection, with the scientific support of the Italian Botanical Society. The IUCN Red List criteria were applied to 2,430 Italian native vascular plant taxa to assess their current extinction risk and to highlight the major threats affecting the Italian flora. Our results revealed that 54 taxa (2.2% of the assessed taxa) are extinc…
IDPlanT: the Italian database of plant translocation
2021
IDPlanT is the Italian Database of Plant Translocation, an initiative of the Nature Conservation Working Group of the Italian Botanical Society. IDPlanT currently includes 185 plant translocations. The establishment of a national database on plant translocation is a key step forward in data sharing and techniques improvement in this field of plant conservation. Supplemental data for this article is available online at https://doi.org/10.1080/11263504.2021.1985004.