Search results for "threats"

showing 10 items of 55 documents

Zagrożenie terroryzmem oraz aspekt militarny w jego zwalczaniu

2015

security threatsinternational securitysecurity environmentspecial forcesterrorismNorth Atlantic Treaty OrganizationStudia nad Autorytaryzmem i Totalitaryzmem
researchProduct

Bezpieczeństwo państwa a mniejszości narodowe

2017

National minorities, either today and in the past, certainly can be considered as a potential source of various types of threats to the security of State. States as the organizational form of different nations, not always peacefully co-exist, therefore a situation in which people of different nationalities residing in the territory of one country is inevitably more complex and raises many problems. Needs of State in terms of security, differ from those of groups and individual members of society. Threats may vary in nature and intensity and come from different directions, which depends on a wide variety of factors. This relation is not so simple because the State (and the members of the maj…

state security threatsstate securitynational minority politicsnational minoritynational minority discrimination
researchProduct

A Network-Based Framework for Mobile Threat Detection

2018

Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…

ta113Computer scienceintrusion detectionmobile threatsFeature extractionEvasion (network security)concept-driftAdversaryComputer securitycomputer.software_genreFlow networkMobile malwareanomaly detectionVariety (cybernetics)haittaohjelmatmachine learningkoneoppiminenmobiililaitteetMalwaretietoturvacomputerHumanoid robot
researchProduct

A Novel Model for Cybersecurity Economics and Analysis

2017

In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…

ta113Value (ethics)Computer sciencemedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTING020207 software engineering02 engineering and technologyBusiness activitiesComputer securitycomputer.software_genrecybersecurity economicscyber fraudadvanced cyber threatstaloudelliset vaikutuksetcost-benefit model020204 information systemsCyber-security regulation0202 electrical engineering electronic engineering information engineeringResearch developmentkyberturvallisuuscomputercybersecurity impactReputationmedia_common2017 IEEE International Conference on Computer and Information Technology (CIT)
researchProduct

FRIGHTENING OF CHILDREN BY PARENTS AND ITS CONSEQUENCES

2018

The article attempts to generalize data on such a complex pedagogical and psychological phenomenon as the deliberate frightening of children by adults. Despite an obvious or apparent harm, it is still included in the established set of methods of family education. In our study, we studied the origins of this phenomenon, the degree of its prevalence in the practice of family education at the present time, and the consequences of using threats in the process of education in the assessments of the adults who were brought up in this way.To achieve the research objectives, a number of former children who were frightened in childhood by their parents, the content of adults’ threats, the motives f…

the image of the world; the frightening of children in the process of education; the content of adults’ threats to children in the process of educationHarmFamily educationPhenomenonPsychologySet (psychology)Research objectivesDevelopmental psychologyEducation Reform in Comprehensive School: Education Content Research and Implementation Problems
researchProduct

Réalités (ou apparences ?) de l'hyperréalité : une application au cas du tourisme de loisirs

2005

Although hyperreality is not a subject commonly studied in marketing, it characterizes an increasing number of leisure and tourist places. In this article, we build a theoretical model to have a better understanding of this phenomenon in order to define it. This model as well as a study of leisure tourist universes help us to identify the attributes and commercial strategies that are used to create a hyperreal environment. We also explore the strategic opportunities and threats associated with developing hyperreality on commercial grounds.

themed environmentthreatsGeneral Computer Science05 social sciencesthèmes d'un environnementstratégieshyperreality[SHS.ECO]Humanities and Social Sciences/Economics and Financesimulationopportunitésloisirstourismecommercial strategiesopportunitiesmenacesPolitical science0502 economics and businessleisuretourism[ SHS.ECO ] Humanities and Social Sciences/Economies and finances050211 marketing[SHS.ECO] Humanities and Social Sciences/Economics and FinanceHumanities050203 business & managementhyperréalité
researchProduct

Generations of Stateless People: Many Years of The Rohingya’s Personal Security at Risk and the Support of the EU

2021

The Rohingya is an ethnic-religious Muslim minority that has struggled with serious human rights violations for decades. Indian migration to Burma, stimulated by British colonial rule, is pointed to as the main cause of the Muslim-Buddhist conflict. Although Indians in Burma currently constitute a fraction of the population (2.3%), resentment remained. The aim of the article is to analyze the threats to many aspects of the personal security of the Rohingya population. It is one of the most populous groups of stateless persons in the world; moreover, since the 1960s, this ethnic group has experienced oppression on a huge scale: from restrictions related to work and movement as well as diffic…

threats to personal securityRohingyaStateless protocolhumanitarian crisisbusiness.industryPolitical scienceInternet privacyPersonal securitybusinessBurmadiscriminationSecurity Dimensions
researchProduct

Implementation of IUCN criteria for the definition of the Red List of Ecosystems in Italy, Plant Biosystems.

2020

The present work is aimed at presenting the data, methods and criteria that are being used for the assessment of ecosystem collapse risk in Italy.

threatsSettore BIO/03 - Botanica Ambientale E Applicataecosystem risk assessmentpotential natural vegetationmapping and assessment ecosystems and their serviceBiodiversity conservation strategieecoregion
researchProduct

Cyber Threat Analysis in Smart Terminal Systems

2023

Cyber threats create significant factors that challenge traditional threat prevention mechanisms in harbor areas and port terminals. It has been recognized that understanding security functionalities in the harbor area is based on a more traditional experience of what it requires. It is not enough that the maritime and harbor ecosystem repeats only physical security service routines regarding random checks of passengers and vehicles and customs functions on cargo and passenger transportation. Smart environments and infrastructures are widely expanded in urban areas and create more challenges if old practices are combined with new technologies and functionalities. Traditional threats have ch…

threatssmart terminal processcyber security analysisuhatlogistiikkamaritime logisticsälytekniikkamerenkulkusatamatkyberturvallisuusterminaalitInternational Conference on Cyber Warfare and Security
researchProduct

Zagrożenia bezpieczeństwa wewnętrznego Niemiec jako konsekwencja procesów imigracyjnych

2017

In the Federal Republic of Germany there is a visible growth of the importance of immigration policy, of the weight of the problem of integration/lack of integration of mi- grants with the German society is visible, and of the need for permanent monitoring of internal security threats and difficulties with their prevention and fighting them. Many researchers working on the internal security of Germany admit that the current threats are linked, by the majority of Germans, with the influx of immigrants to this country. The migrants are seen as a source of potential risks, dangers and internal conflicts. It might be argued that there is an undeniable correlation between migra tion and security…

threatsterrorismrefugeesinternal securityimmigrationBezpieczeństwo.Teoria i Praktyka
researchProduct