Search results for "Threat"
showing 10 items of 318 documents
Réalités (ou apparences ?) de l'hyperréalité : une application au cas du tourisme de loisirs
2005
Although hyperreality is not a subject commonly studied in marketing, it characterizes an increasing number of leisure and tourist places. In this article, we build a theoretical model to have a better understanding of this phenomenon in order to define it. This model as well as a study of leisure tourist universes help us to identify the attributes and commercial strategies that are used to create a hyperreal environment. We also explore the strategic opportunities and threats associated with developing hyperreality on commercial grounds.
Reducing the Time to Detect Cyber Attacks : Combining Attack Simulation With Detection Logic
2021
Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are becoming more sophisticated and targeted, leaving unprepared environments easy prey for the attackers. Organizations with working antivirus systems and firewalls may be surprised when they discover their network has been encrypted by a ransomware operator. This raises a serious question, how did the attacks go undetected? The conducted research focuses on the most common pitfalls regarding late or even non-existent detection by defining the root cause behind the failed detec…
Red list of threatened vascular plants in Italy
2021
Italy has a rich natural heritage, which is dangerously under pressure. In recent years, there is an increased awareness of the crucial role of plants in ecosystem functioning and in providing ecosystem services. Consequently, an updated Red List of the Italian vascular flora was compiled in this work, at the request of the Ministry for Environment, Land and Sea Protection, with the scientific support of the Italian Botanical Society. The IUCN Red List criteria were applied to 2,430 Italian native vascular plant taxa to assess their current extinction risk and to highlight the major threats affecting the Italian flora. Our results revealed that 54 taxa (2.2% of the assessed taxa) are extinc…
IDPlanT: the Italian database of plant translocation
2021
IDPlanT is the Italian Database of Plant Translocation, an initiative of the Nature Conservation Working Group of the Italian Botanical Society. IDPlanT currently includes 185 plant translocations. The establishment of a national database on plant translocation is a key step forward in data sharing and techniques improvement in this field of plant conservation. Supplemental data for this article is available online at https://doi.org/10.1080/11263504.2021.1985004.
Taxa a rischio nella flora vascolare della Sicilia
2011
Biogeographia vol. XgO( - 2011 (Pubblicato il 23 dicembre 2011) La Biogeografia de/Ia Sicilia Taxa a rischio nella flora vascolare della Sicilia FRANCESCO MARIA RAIMONDO, GIUSEPPE BAZAN, ANGELO TROIA Dzjzartimento di Biologia Ambientale e Biodiversitd, Universird di Palermo via Arc/aimfi 38, 90123 Palermo (Italy) Key words: threatened species, vascular flora, red list, Sicily. SUMMARY An analysis was made to update the regional red list of endangered vascular plants in Sicily which, with 3,252 taxa (including a noteworthy number of endemic species), is one of the richest areas in the Mediterranean region. Considering previous regional and national red lists, recent taxonomic and floristic lite…
Verifying the predicted risk of extinction based on ecological characteristics
2021
Red List status of species should reflect species extinction risk. Because data are limited and species response has a time lag, species may be threatened by extinction even if they are not Red‐Listed. The ability to predict species risk of extinction from ecological characteristics holds promises for proactively targeting conservation measures to species at high risk. In 2005, the risk of extinction from ecological characteristics was predicted for 81 species of Finnish butterflies. Now, after 15 years and two additional national Red List assessments, these predictions are verified. Species with a higher risk of extinction according to the original ecological extinction risk rank (EERR) ha…
A project for an Italian Red List of bryophytes
2012
Generations of Stateless People: Many Years of The Rohingya’s Personal Security at Risk and the Support of the EU
2021
The Rohingya is an ethnic-religious Muslim minority that has struggled with serious human rights violations for decades. Indian migration to Burma, stimulated by British colonial rule, is pointed to as the main cause of the Muslim-Buddhist conflict. Although Indians in Burma currently constitute a fraction of the population (2.3%), resentment remained. The aim of the article is to analyze the threats to many aspects of the personal security of the Rohingya population. It is one of the most populous groups of stateless persons in the world; moreover, since the 1960s, this ethnic group has experienced oppression on a huge scale: from restrictions related to work and movement as well as diffic…
Implementation of IUCN criteria for the definition of the Red List of Ecosystems in Italy, Plant Biosystems.
2020
The present work is aimed at presenting the data, methods and criteria that are being used for the assessment of ecosystem collapse risk in Italy.
Cyber Threat Analysis in Smart Terminal Systems
2023
Cyber threats create significant factors that challenge traditional threat prevention mechanisms in harbor areas and port terminals. It has been recognized that understanding security functionalities in the harbor area is based on a more traditional experience of what it requires. It is not enough that the maritime and harbor ecosystem repeats only physical security service routines regarding random checks of passengers and vehicles and customs functions on cargo and passenger transportation. Smart environments and infrastructures are widely expanded in urban areas and create more challenges if old practices are combined with new technologies and functionalities. Traditional threats have ch…