Academic literature on the topic 'Dangers and threats'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dangers and threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Dangers and threats"

1

Sorokoumova, Elena, Marina Kudaka, and Sergey Nevenchanny. "PSYCHOLOGICAL FEATURES OF THE ATTITUDE TO DANGER AMONG MILITARY UNIVERSITY CADETS AND CONTRACT SERVICEMEN." Man: crime and punishment 33, no. 1 (2025): 105–20. https://doi.org/10.33463/2687-1238.2025.33(1-4).1.105-120.

Full text
Abstract:
The article is devoted to the study of the issue of attitude to danger among military university cadets and military personnel under contract. Military personnel under contract have a high level of sensitivity to threats and an adequate type of response to dangers. The cadets of the military university revealed a low level of sensitivity to threats and an alarming type of response to dangers. Contract servicemen feel danger better, they clearly define for themselves and know what can be a threat to their lives, health, psychological and social well-being, what can damage their environment and what not. Cadets of a military university have difficulty determining the danger, face difficulties in identifying from the multitude of external (or internal) factors affecting them those that are unfavorable or dangerous for them.
APA, Harvard, Vancouver, ISO, and other styles
2

Tkachuk, Anna, and Andriy Dankevich. "Theoretical essence of risks, hazards and threats in the context of enterprise economic safety provision." University Economic Bulletin, no. 38 (July 3, 2018): 118–25. http://dx.doi.org/10.31470/2306-546x-2018-38-118-125.

Full text
Abstract:
Subject, purpose of work. In the article it was conducted a theoretical generalization of the essence of concepts such as: risk, danger and threat of economic activity, as well as it was revealed their nature and interconnection was established. It is proved the possibility of ensuring the economic security of the enterprise on the basis of realization of the essence of risks, dangers and threats of enterprise economic activity. Method or methodology of work. In the course of the research there were used the following general scientific and specific methods and techniques of cognition such as induction and deduction, analysis and synthesis, and scientific abstraction. The result of work. It has been established that the competitive environment hides some uncertainty, which requires the enterprise to make economic decisions. Each economic decision, in its turn, is likely to endanger the risks which can lead to dangerous situations in the absence of influence on them. The risk may be justified, which ultimately gives the company new opportunities for development, and may be unjustifiable, which will contain a number of hazards that can threaten the enterprise. Thus, the provision of economic security is seen to mitigate the negative effects of factors that directly or indirectly influence the adoption of risky decisions in order to prevent the threats of the enterprise. Therefore, the threat is a form of danger that arises as a result of a risky economic decision. The approaches to the classification of threats of enterprise activity are summarized, which give an expanded view of the causes of their occurrence and management tools in order to avoid or mitigate negative consequences. The field of results application. The obtained results can be applied at formation, maintenance and increase of economic safety of the enterprise. Conclusions. The combination of approaches to understanding the essence of risks, threats and dangers underline once again the lack of consensus on the nature of these concepts. However, despite this fact, the following can be noted: the presence of risks, threats and dangers compels the enterprise to develop, learn, refine and sharpen its protective mechanisms in order to minimize the influence of these factors on economic activity. Classification of threats enables to identify the tools for managing them in the process of ensuring the economic security of the enterprise.
APA, Harvard, Vancouver, ISO, and other styles
3

Azarenko, O., Yu Honcharenko, M. Divizinyuk, R. Shevchenko, and O. Shevchenko. "THREATS AND RISKS RESEARCH METHODS." Municipal economy of cities 4, no. 178 (2023): 269–79. http://dx.doi.org/10.33042/2522-1809-2023-4-178-269-279.

Full text
Abstract:
The work systematizes knowledge in the field of threat and risk research when solving applied problems. To achieve the set goal, the following scientific tasks must be solved: analyze the main concepts of threat and risk research; give a description of the tasks to be solved regarding threats and risks; consider the main methods of threat and risk analysis from the standpoint of the technocratic concept; from the standpoint of the technocratic concept, consider the main methods of risk assessment, their advantages and disadvantages. A threat is understood as a potentially possible event that can lead to harm (catastrophic event), and risk - determines the degree of danger of occurrence or impact of a threat (or a set of threats - a set of catastrophic events) on a specific object (resource, process or system). At the same time, for a specific dangerous (for example, a nuclear) object, the concepts of a certain type of threat and the risk of its occurrence are interconnected. This strict triangular dependence requires a unified (inseparable, interrelated) consideration of these concepts in relation to solving various applied problems. A systematic approach to ensuring their safety is applied to all complex man-made objects, which includes the identification of objective dangers, the definition and ranking of threats, the assessment of the risk of their manifestation and the preparation of a forecast, which is done in favor of preventing catastrophic events caused by objective dangers. The most effective methods of threat and risk assessment are methods integrated into monitoring systems, decision support systems, and other automated management systems. The events of recent years in Ukraine require the definition of a terrorist threat as the primary and most important one, because in relation to nuclear facilities, under a positive man-made environment, it creates an avalanche-like emergency situation caused by nuclear, radiation, environmental and other catastrophic events. In turn, this will require the systematization of existing and the development of new methods, algorithms and protocols for assessing and countering terrorist threats at man-made objects. Keywords: emergency situation, catastrophic event, man-made object, danger, threat, risk.
APA, Harvard, Vancouver, ISO, and other styles
4

Zotov, Vitaly Vladimirovich, and Anatoly Anatolyevich Krivoukhov. "Risk-minimizing social practices in ensuring information security." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 11 (November 7, 2023): 706–12. http://dx.doi.org/10.33920/pol-01-2311-02.

Full text
Abstract:
Modern society qualifies not only as a society of knowledge and information, but also as a society of risk, threats, danger. The digital society is in a state of turbulence, which is interpreted by the individual as an increase in risks. Risk and digital reality are two markers of the society of the XXI century. In the context of the formation of a digital «risk society» within the framework of socio-humanitarian discourse, the task of developing an approach to information security capable of adapting a person to avalanche-like increasing risks is actualized. Turning to risk-minimizing practices helps to organize the process of ensuring information security, taking into account the real significance of emerging dangers and threats in the information and communication environment. The article defines and systematizes a cluster of concepts describing the phenomenon of digital risk and information security as part of such concepts: object (object) — danger (threat) — damage (harm) — risk — security. This makes it possible to define risk-minimizing practices in the information and communication environment as social practices that, due to unusual actions to reduce, weaken, eliminate and prevent dangers and threats, reduce the level of expectation of their occurrence and form a sense of freedom from the danger of loss; from doubt, anxiety or fear. It is concluded that risk-minimizing practices in the information and communication environment are social practices that, due to unusual actions to reduce, weaken, eliminate and prevent dangers and threats, reduce the level of expectation of their occurrence and form a sense of freedom from the danger (risk) of loss; freedom from doubt, anxiety or fear.
APA, Harvard, Vancouver, ISO, and other styles
5

Smolianiuk, Volodymyr, and Mykola Balan. "Ukraine as a Society of Risk (Proof Based on the Theory of National Security)." Scientific Journal the Academy of National Security, no. 1(29) (April 24, 2021): 26–52. http://dx.doi.org/10.53305/2523-4927.2021.29.02.

Full text
Abstract:
The purpose of the article. Identify the nature of challenges, threats, dangers and risks as destructive factors of social, man-made and natural origin; to prove the priority of the category “threat” as a kind of risk in the domestic legislation on national security; to argue the thesis about Ukraine’s belonging to “risk societies”; point to the further complication of the process of producing various threats and challenges against the state and society. Scientific novelty. Based on the use of the current legal framework of Ukraine on national security, the existence of a process of continuous accumulation of risks in key areas of the state and the transformation of Ukrainian society on this basis into a “society of risk” is proved. Emphasis is placed on accelerating this process in the context of the hybrid war launched by Russia against Ukraine in 2014. Social development dictates the need for a clear verbal designation of destructive factors against the interests of the majority (national interests). The terms describing their likely or real impact on society were “challenges”, “threats”, “dangers” and “risks”. The natural step of their substantive definition and meaningful filling was their implementation in the conceptual and categorical apparatus of national security theory. In a broad sense, national security is proposed to be considered a state of protection of national interests and values, both from challenges, threats and dangers, and risks. The most widely used term in Ukraine’s socio-political realities is the “threat” that is widely represented in national legislation on national security. The total number of threats in modern Ukraine is steadily increasing. According to Western analytical developments, the excessive spread of threats in basic social spheres (economic, political, social, spiritual, cultural, etc.) gives reason to qualify Ukraine as a “risk society”. The situation is complicated by the hybrid war being waged by the Russian Federation against Ukraine and other democratic countries. It is advisable to present the modern hostilities initiated by Russia as a process of continuous production of threats (risks), the total effect of which should be the destruction of the Ukrainian statehood. In such circumstances, Ukraine should accelerate the process of development (updating) and practical implementation of key strategic documents – the National Security Strategy, the Military Security Strategy, the Cyber Security Strategy, the Public Security and Civil Defense Strategy, the Strategy for the Development of the Defense Industrial Complex. But for the time being, such documents are either substantially outdated or missing at all. Conclusions. Society, based on its complex nature, built on unity and the struggle of opposites, feels the constant impact of challenges, threats and dangers (risks), which it generates. There are no unified and generally accepted interpretations of challenges, threats, dangers and risks. Each country offers its own formats of their interaction and mutual transformation. The most widely used of these are “threats” (Ukraine) and “risks” (Western countries). The total number of risks in which Ukraine is directly or indirectly involved is steadily progressing. Accordingly, modern Ukraine is a clearly defined “society of risks.” Under the pressure of numerous challenges, threats and dangers, Ukraine as a “society of risks” abandons the unambiguous (linear) formulation of threats to national security inherent in specific public spheres, and their legislative consolidation. The state provides for the preparation and periodic updating of a number of strategies (national security, military security, cybersecurity, other documents), which should contain a list of major threats that currently exist in state and social development. Key words: challenge, threat, danger, risk, national security, hybridization of threats, risk society.
APA, Harvard, Vancouver, ISO, and other styles
6

Margulyan, Yakov. "The Sources and Causes of Social Threats to Personality, Society and State." Journal of Sociology: Bulletin of Yerevan University 3, no. 1 (2012): 20–28. https://doi.org/10.46991/bysu:f/2013.3.1.020.

Full text
Abstract:
In the article the author marks the need of sociological research for problems of the social safety, arising social dangers and threats to the population of the country. Then Professor Margulyan considers such terms as "danger" and "threat" in the context of researching terms "cause" and "risk". The author focuses on the idea that only democratic transformations of our society can eliminate revolts and other conflicts.
APA, Harvard, Vancouver, ISO, and other styles
7

Płonka, Bogusław. "The Primal Sources of Threats: the Classification Model of Causes of Danger." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 36, no. 36 (2019): 100–120. http://dx.doi.org/10.5604/01.3001.0014.1294.

Full text
Abstract:
The concept of threat is a central point of reflection on security. Numerous publications have already attempted to identify and classify known hazards. The fundamental problem that arises in the course of this task is a large number of dangers potentially threatening to a person. It is therefore justified to ask why such a large number of threats are posed and whether their main sources can be identified. In the text, the author analyzes the relationship between terms of threat and risk and discusses various ways of defining them. Adopting various perspectives for analyzing, considering and classifying dangers allows observe elements which constitute their primary source. The model for classifying primary causes of threats includes three basic sources of dangers: dependence, coexistence and change. The presented approach may be a basis for configuring and deploying tools for security subject diagnosis.
APA, Harvard, Vancouver, ISO, and other styles
8

SIWACH, CHETNA. "Evaluating Potential Dangers in the Banking Industry." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50655.

Full text
Abstract:
Abstract- The paper is called “Assessment of the Risks in the Banking Sector” and researches the topic of the multidimensional threats faced by banks in the modern complicated financial environment. With the support of the descriptive research design and the collection of quantitative data pursued among 60 banking professionals via structured questionnaires, the research unveils the most essential threats such as cybersecurity risks, credit risk, operational risk, and regulatory compliance issues. The results indicate cybersecurity as an most serious and urgent threat which is aggravated by the accelerated digital banking and dynamic technological threats. All the banks have done well in the operational risk management, but still there are gaps in technology infrastructure and trained staff. Another challenge to risk mitigation is presented by regulatory changes, especially in environmental, social and governance (ESG) compliance. The paper supports the idea of combined and adaptive risk management systems, human capital investment, and the improved cooperation of regulators as the means of enhancing the resilience of banking. These lessons are of great help to banking institutions, policy makers and academicians in their quest to ensure financial stability in a period of unparalleled complexity of risks. Keywords- Banking industry, risk management, cybersecurity, credit risk, operational risk, regulatory compliance, digital banking, ESG compliance.
APA, Harvard, Vancouver, ISO, and other styles
9

Krotenko, T. Yu. "RISKS, DANGERS, THREATS OF “CONTINUOUS” E-EDUCATION." Vestnik Universiteta, no. 2 (April 23, 2020): 58–62. http://dx.doi.org/10.26425/1816-4277-2020-2-58-62.

Full text
Abstract:
The term “digitalization” for a long time settled in the agenda of significant events dedicated to education. The education system, fulfilling the adopted program, should prepare a huge number of schoolchildren, students and workers for life with the indispensable use of information and communication technologies. However, often the actual digitalization is reduced either to the digitization of educational materials and documents in educational structures, or to unhindered access to the Internet. If the request for digitalization is addressed to education, then, being in the pedagogical space, it would be reasonable to first determine what and how to teach. The problem of the lack of a reasonable psychological and pedagogical concept of digital learning, which could be used by the subjects of the educational process as a basic one, is raised in the article.
APA, Harvard, Vancouver, ISO, and other styles
10

Корягина, Ирина Ивановна, Владимир Георгиевич Маралов, Елизавета Александровна Пилеко, and Егор Павлович Блатов. "ATTITUDES TO THE DANGERS OF STUDENTS - FUTURE MEDICAL WORKERS." Вестник Тверского государственного университета. Серия: Педагогика и психология, no. 1(54) (March 31, 2021): 14–22. http://dx.doi.org/10.26456/vtpsyped/2021.1.014.

Full text
Abstract:
Изучается отношение к опасности у студентов медицинского вуза в зависимости от курса обучения и пола. Рассматривались показатели отношения к опасностям: чувствительность (сензитивность) к угрозам и выбор способов реагирования в ситуациях опасности: адекватного, тревожного, игнорирующего. В качестве диагностического инструментария использовались авторские опросники на выявление чувствительности (сензитивности) к угрозам и способов реагирования в ситуациях опасности. Обработка результатов осуществлялась с применением методов математической статистики. Полученные результаты могут быть использованы в процессе профессиональной подготовки студентов - будущих медицинских работников, а также в процессе деятельности психологической службы медицинского вуза. The attitude to danger which depends the course of study and the gender of the medical students is being studied. The indicators of the attitude to dangers were considered: sensibility (sensitivity) to threats and the choice of response methods in dangerous situations: adequate, worrying, ignoring. As the diagnostic tools the author's questionnaires were used to identify sensibility (sensitivity) to threats and the ways of responding to the situations of danger. The results were processed with the help of the methods of mathematical statistics. The results can be used in the process of professional training of the students who are future medical workers, as well as in the process of the psychological service of a medical university.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Dangers and threats"

1

Verhun, A. M., Julia Bondarchuk, and A. S. Linichenko. "Influence of risks, dangers and threats on the enterprise financial security." Thesis, ЦФЕНД, 2018. https://er.knutd.edu.ua/handle/123456789/10530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hamburger, Heidi. "Southwest Border Patrol Agent Perceptions of Job-Related Threats and Dangers." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5874.

Full text
Abstract:
The U.S. Southwest Border is associated with highly politicized topics, yet the lived experience of Border Patrol agents is not one of them. Border Patrol agents face risks to their personal safety and security as they attempt to safeguard the national security of the United States while implementing the policies of their organization, which are sometimes at odds with the beliefs and expectations of agents in the field. The purpose of this phenomenological study was to explore perceptions and lived experiences related to the threats and dangers that Border Patrol agents face as they protect the U.S. Southwest Border. The theoretical framework for this study involved McGregor's organizational behavior theory, Janis's groupthink theory, and the bureaucratic dissonance phenomenon. Data collected through semistructured interviews of 11 former Border Patrol agents with direct experience working along the U.S. Southwest Border were inductively coded and subjected to a thematic analysis procedure. On-duty risks, emotional toll, lack of community support, and separation from family are among the stressors for members of this profession. The key findings regarding threats and dangers included: perceived manpower shortage, fear of assaults, the very nature of the job, political and presidential administration conflicts, and lack of mobility (location and career advancements). The recommendations call for greater policy-and decision-maker understanding of the stresses and conflicts facing Border Patrol agents, which could effect positive social change by encouraging policies and regulations to improve job safety and security, and to inform training programs. The promulgation of the findings may contribute to improvements of the morale and safety of Border Patrol agents and enhance security of the United States.
APA, Harvard, Vancouver, ISO, and other styles
3

Larsson, Victor. "IoT - an internet of threats? : Identifying the dangers of an IoT-connection." Thesis, Blekinge Tekniska Högskola, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-15351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hernando, Nieto Eduardo. "Constitutionalize the law or politicize the Constitution? Threats, risks and dangers in contemporary constitutionalism." Pontificia Universidad Católica del Perú, 2013. http://repositorio.pucp.edu.pe/index/handle/123456789/116349.

Full text
Abstract:
Since the beginning of modernity, the use of rhetoric have prevailed; that is, the technique of perverting the language giving concepts different meanings presuming nothing have changed when in fact, it has occurred. The same thing happens with the concept of Constitution, it has been completelymodified its sense from the progress of individual rights moral. In this article the intention is to demonstrate the nature of this change and at the same time claim on the «old constitutionalism» validity and also the rule of law and political will beginning on a critical reading of contemporary constitutionalism and considering its tendency to constitutionalize or materialize the law, ironically risking the same values intended to defend.<br>Desde inicios de la modernidad se ha venido imponiendo el empleo de la retórica, es decir, la técnica de pervertir el lenguaje dotando a los conceptos de distintos significados para presumir que nada ha cambiado cuando en realidad sí se ha dado el cambio. Esto mismo acontece con el concepto de Constitución, que ha modificado completamente su sentido apartir del avance de la moral de los derechos individuales. Este texto pretende mostrar la naturaleza de este cambio y reivindicar a su vez la vigencia del «viejo constitucionalismo» y el imperio de la ley y la decisión política a partir de una lectura crítica del constitucionalismo contemporáneo y su tendencia a constitucionalizar o materializar el derecho, contribuyendo paradójicamente a poner en riesgo los valores que pretende defender.
APA, Harvard, Vancouver, ISO, and other styles
5

Van, Wyck Peter C. "Signs of danger/dangerous signs, responding to nuclear threat." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ44615.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Домітряк, Діана Ігорівна, та Diana Domitryak. "Формування стратегії забезпечення економічної безпеки підприємства ресторанного господарства в умовах сучасних викликів (на прикладі ТОВ «Україна» ресторан)". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36526.

Full text
Abstract:
Кваліфікаційна робота магістра (106 с., 6 рис., 28 табл., 96 літ. джерел) за спеціальністю 241 «Готельно-ресторанна справа». Тернопільський національний технічний університет імені Івана Пулюя. Факультет економіки та менеджменту. Тернопіль, 2021.<br>У даній кваліфікаційній роботі магістра розглядаються питання економічної безпеки підприємств ресторанного господарства в сучасних умовах. У контексті цього досліджено теоретико-концептуальні основи та основні показники виробничо-господарської та фінансової діяльності досліджуваного підприємства галузі – ТОВ «Україна» ресторан, обґрунтовано основні напрями формування стратегії забезпечення його економічної безпеки. Практична значимість роботи. Результати проведеного дослідження створюють основу для подальших досліджень й практичного вирішення проблеми економічної безпеки підприємств ресторанного бізнесу у т. ч. й ТОВ «Україна» ресторан в умовах сучасних викликів і загроз і можуть бути використані ним у процесі покращення його виробничо-господарської та фінансової діяльності на майбутній період.<br>Qualification work of the master (106 p., 6 fig., 28 tabl., 60 lit. sources) on a specialty 241 "Hotel and restaurant business". Ternopil Ivan Pul'uj National Technical University. Faculty of Economics and Management. Ternopil, 2021.<br>In this qualification work of the master questions of economic safety of the enterprises of restaurant economy in modern conditions are considered. In this context, the theoretical and conceptual foundations and main indicators of production, economic and financial activities of the studied enterprise in the industry – LLC "Ukraine" restaurant, the main directions of forming a strategy to ensure its economic security. Thepracticalsignificanceof the work. The results of the study provide a basis for further research and practical solutions to the problem of economic security of restaurant businesses, including LLC "Ukraine" restaurant in the face of modern challenges and threats and can be used by him in improving its production, economic and financial activitiesforthefuture.
APA, Harvard, Vancouver, ISO, and other styles
7

Дехтяр, Надія Анатоліївна, Надежда Анатольевна Дехтярь та Nadiia Anatoliivna Dekhtiar. "Концептуальні засади забезпечення фінансової безпеки підприємства". Thesis, Українська академія банківської справи Національного банку України, 2011. http://essuir.sumdu.edu.ua/handle/123456789/62955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Landau-Wells, Marika. "Dealing with danger : threat perception and policy preferences." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118222.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Political Science, 2018.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 193-216).<br>This dissertation develops and tests a new individual-level theory specifying the relationship between threat perception and policy preferences. The project takes a unified approach to studying the space of danger-mitigating political behaviors. It is designed to demonstrate that a single psychological model can apply to both citizens and elites and in both domestic and foreign policy issue areas. The first paper develops Threat-Heuristic Theory, a new individual-level model of the psychological processes linking the detection of danger to specific policy preferences for mitigating it. The paper presents a review of the literature in biology and cognitive science regarding evolved systems of threat perception and response, on which the theory draws. The paper demonstrates that the theory's core explanatory variable, threat classification, is not a proxy for other constructs already incorporated into political science. The paper also illustrates that the domain of complex dangers, characterized by low levels of agreement in threat classification, contains issues of interest to political science. The second paper applies the theory to explain variation in preferences for specific forms of immigration restriction in the U.S. The paper highlights the importance of understanding threat classification in order to move beyond explanations of pro/anti-immigrant sentiment towards a model that captures preferences for real-world policy options. The third paper applies the theory to a small number of elite policy-makers in order to explain their support for particular measures included in U.S. national security strategies of the early Cold War and of the first George W. Bush Administration. The paper demonstrates how "bad strategy' and problematic policy preferences can arise systematically through the operation of Threat-Heuristic Theory's psychological model and need not be solely explained by bureaucratic politics or error.<br>by Marika Landau-Wells.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
9

Kippe, Gregory R. "Jemaah Islamiyah : reevaluating the most dangerous terrorist threat in Southeast Asia." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5060.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>This thesis examines Jemaah Islamiyah (JI), Southeast Asia's most dangerous terrorist threat. Since the group manifested its presence with its suicide bombings in Bali, Indonesia on October 12, 2002, considerable efforts have been devoted to describing the group responsible for the most damaging terrorist attacks in Southeast Asia and interpreting how it has changed over time. Over the course of the last decade, two competing interpretations of JI emerged. One view held that JI was divided between a large group of traditionalists and a smaller group of pro-violence militants. This became the conventional wisdom and served as the foundation for most countries' counterterrorism policies. The other held that the two factions worked closely together. By reconsidering JI's evolution in light of recently available evidence, this thesis shows that the second view more accurately describes JI. In particular, this thesis suggests that the two factions should be viewed as mutually supportive "administrative" and "operational" components of a single, adaptable terrorist group. To be successful over the long term, counterterrorism policies will need to pay greater attention to the administrative faction and its relationship to the operational wing, which conducts actual terrorist attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Correll, Joshua. "Context, race and danger: The relationship between threat perception and the decision to shoot." Diss., Connect to online resource, 2005. http://wwwlib.umi.com/dissertations/fullcit/3178352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Dangers and threats"

1

Beckham, Andrew. Hidden dangers: Combating threats to healthy relationships. Leafwood, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kałdon, Barbara Małgorzata. Wybrane obszary niebezpieczeństw XXI wieku w ujęciu interdyscyplinarnym: Chosen areas of dangers of the 21st century in the interdisciplinary presentation. Wydawnictwo Uniwersytetu Kardynała Stefana Wyszyńskiego, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

White, Jerry E. Dangers men face: Overcoming the five greatest threats to living life well. NavPress, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

H, Johnson Robert. Improbable dangers: U.S. conceptions of threat in the Cold War and after. St. Martin's Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Preble, Christopher A., and John Mueller. A dangerous world?: Threat perception and U.S. national security. Cato Institute, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Angelo Roberto Ilha da Silva. Dos crimes de perigo abstrato em face da constituição. Editora Revista dos Tribunais, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Carranza, Hans Roberto Leandro. Delitos de peligro abstracto: Nuevos desafíos para la teoría del delito. IJSA, Investigaciones Jurídicas S.A., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brewer, James D. The danger from strangers: Confronting the threat of assault. Insight Books, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Grote, JoAnn A. Danger in the harbor: Grain riots threaten Boston. Chelsea House, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dalby, Andrew. Language in danger: How language loss threatens our future. Allen Lane, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Dangers and threats"

1

Dunmire, Patricia L. "“Emerging threats” and “coming dangers”." In Discourse, War and Terrorism. John Benjamins Publishing Company, 2007. http://dx.doi.org/10.1075/dapsac.24.05dun.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Morozova, Nelli I., Olga S. Buryakova, and Natalia Z. Aliyeva. "Dangers and Threats of the Global Digital Space: A Non-linear Approach." In Artificial Intelligence: Anthropogenic Nature vs. Social Origin. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39319-9_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alade, Moyosore Omowonuola, and Bernice Oluwalanu Sanusi. "Endangered Voices: Nigerian Journalists’ Safety amid the COVID-19 Pandemic." In Health Crises and Media Discourses in Sub-Saharan Africa. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95100-9_7.

Full text
Abstract:
AbstractThis chapter examines the difficult conditions Nigerian journalists faced while reporting during the COVID-19 pandemic, focusing on the threats and dangers faced by Nigerian broadcast journalists and its implication for journalism practice amid a pandemic. Using a qualitative approach, we conducted nine in-depth interviews (online) with broadcast journalists in 2020 and employed thematic analysis to address the study’s findings. The study found that the safety threats encountered by journalists during the COVID-19 outbreak include the risk of contracting the virus, financial insecurity, and emotional trauma, among others. To combat these safety threats, journalists were responsible for their safety; hence, they ensured adherence to safety protocols with little or no support from the media houses they worked for. The implication of these safety threats to journalism practice includes reduced work output, reduced dissemination of factual reports, low-quality stories, and the lack of in-depth and investigative news reports during the COVID-19 pandemic in Nigeria.
APA, Harvard, Vancouver, ISO, and other styles
4

Alieva, Natalia Z., Elena B. Ivushkina, Irina B. Kushnir, and Olga S. Buryakova. "The Global Information Space as a Source of Formation of Threats and Dangers." In The Future of the Global Financial System: Downfall or Harmony. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00102-5_108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Salehin, Mohammad Musfequs. "Gendered and Racialised Vulnerabilities and Violence Against the Rohingya in Myanmar." In Gendered Vulnerabilities and Violence in Forced Migration. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62435-3_4.

Full text
Abstract:
AbstractThis chapter presents gender differentiated forms of direct, structural, cultural and symbolic violence experienced by the Rohingya while they were in Myanmar. The documented atrocities, committed mainly by the Myanmar military, have placed the Rohingya in a state of ongoing discrimination and oppression. Within Myanmar, Rohingya women face a dual burden: enduring physical violence and mental anguish from military and societal forces, compounded by the patriarchal structure within their own community. Structural violence, such as educational discrimination, pervasive poverty, and lack of access to social and community life have affected Rohingya women, men, and children differently. A gendered narrative of threat portrays Rohingya women as ugly and reproductive dangers to Buddhism, while Rohingya men are framed as threats to nationalism and Buddhism. These religious and cultural narratives have served to justify ‘othering’ and various forms of violence by the Myanmar military.
APA, Harvard, Vancouver, ISO, and other styles
6

Mohan, Pulkit, Cliff Glantz, Guy Landine, Sri Nikhil Gourisetti, and Radha Kishan Motkuri. "Cybersecurity and Nuclear Facilities." In The Challenges of Nuclear Security. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-56814-5_7.

Full text
Abstract:
AbstractThis chapter covers cyber threats to the nuclear enterprise and suggests ways that India and the United States can mitigate such dangers. Indian author Pulkit Mohan describes the Indian government’s evolving regulatory approach to the problem. Mohan argues for measures including the creation of an effective security culture, addressing supply-chain vulnerabilities, and strengthening cybersecurity agreements with like-minded countries. U.S. authors Clifford Glantz et al. explain the importance of cybersecurity to the protection of the U.S. nuclear enterprise. They discuss the evolving U.S. regulatory environment, U.S. approaches to cyber defense and supply-chain security, and the challenge of assessing cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Tkhayneh, Khawlah M., and Sanaa Ashour. "Exploring the Impact and Prevention of Digital Drugs: Insights from the Emirati Youth Perspective." In Gulf Studies. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-3412-5_12.

Full text
Abstract:
Abstract This chapter explores the threats of digital drugs (binaural beats) among Emirati youth. To this end, a survey was conducted among 202 university students aged 18–22 years old. Key findings revealed that excessive use of digital drugs could exacerbate mental health issues (e.g., depression), lead to physical health problems (e.g., memory impairment), and have adverse social implications (e.g., social deviance). The chapter concludes with a discussion of solutions, such as implementing appropriate educational programs and enhancing parental engagement, raising awareness about the negative effects of digital drugs, and fostering open public and family discussions about their dangers.
APA, Harvard, Vancouver, ISO, and other styles
8

Instone, Lesley. "Risking Attachment in the Anthropocene." In Manifesto for Living in the Anthropocene. punctum books, 2015. https://doi.org/10.21983/p3.0100.1.08.

Full text
Abstract:
The notion of risk is now commonplace. For Ulrich Beck(1992) who introduced the term “risk society” in the early 1990s, contemporary ecological crises are not questions about the destruction of nature, but rather ones of how mod-ern society deals with self-generated uncertainties that are no longer limited by time or space. These are dangers that es-cape and elide risk, calculation and insurability. In the face of permanent material threats, Beck argues that modern indus-trial society normalizes risk, and we become blind to side effects and consequences. Most of the time those of us in de-veloped countries carry on our daily lives as if everything is insurable, as if we’re neither causing environmental damage nor being affected by it, a sort of amnesia to the wider impli-cations of ordinary action. For example, where I live, the mining and export of coal is a commonplace and everyday activity. Despite the challenges of climate change, coal trains deposit their loads, in ever increasing quantities, to the port of Newcastle (Australia) to be exported to power stations in China and elsewhere. The ethics of “deplete, destroy, depart” (Grinde and Johansen 1995 in Weir 2009, 119) go on in a way that becomes ordinary, everyday and unremarkable, and the dangers of dust, environmental degradation and climate change, are in Beck’s terms, normalized.
APA, Harvard, Vancouver, ISO, and other styles
9

Kapur, S. Paul, Rajeswari Pillai Rajagopalan, and Diana Wueger. "Introduction." In The Challenges of Nuclear Security. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-56814-5_1.

Full text
Abstract:
AbstractEditors S. Paul Kapur, Rajeswari Pillai Rajagopalan, and Diana Wueger outline the volume, in which experts from the United States and India produced seven chapters on subjects central to nuclear safety and security: insider threats, organizational culture, emergency response and crisis communications, physical protection of nuclear facilities and materials, control of radioactive sources, and cybersecurity. The editors note common themes in the chapters, including the pitfalls of complex security systems; the advantages of eliminating rather than mitigating risk; the importance of political, social, and economic context to nuclear safety and security; the dangers of new technology; the difficulty of assessing safety and security; and the shortcomings of universal safety and security “best practices.” In addition, the editors highlight opportunities for further U.S.-India cooperation on issues such as cyber vulnerabilities, transportation security, organizational culture, evaluation of past safety and security failures, and secure supply chains.
APA, Harvard, Vancouver, ISO, and other styles
10

Matusevych, Tetiana, Margarida Romero, and Oksana Strutynska. "Citizenship, Censorship, and Democracy in the Age of Artificial Intelligence." In Palgrave Studies in Creativity and Culture. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-55272-4_5.

Full text
Abstract:
AbstractThis chapter delves into the ethical dilemmas that arise from the incorporation of artificial intelligence (AI) into the field of education. It emphasises the importance of media literacy, AI literacy, and critical use of digital technologies in order to combat information conflicts, political manipulation, and AI inequality, among other issues. Potential threats to citizenship, such as AI censorship and disinformation, are examined in this chapter. Discourse is devoted to the dangers of deepfake technology as it pertains to the dissemination of false information and the manipulation of public sentiment; the significance of comprehending AI fundamentals and enforcing ethical standards is underscored. Notwithstanding the potential hazards, this chapter acknowledges the prospective advantages of AI in the field of education, which encompass gamification and adaptive learning paths. The text culminates by emphasising the significance of AI acculturation in enabling individuals to comprehend the ethical intricacies and arrive at well-informed judgements regarding the impact of AI on democracy, education, and citizenship.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Dangers and threats"

1

von der Assen, Jan, Jasmin Hochuli, Thomas Grübl, and Burkhard Stiller. "The Danger Within: Insider Threat Modeling Using Business Process Models." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Prafull, Freddie Talbot, and Phil Yule. "Corrosion Under Insulation (CUI) Remote Monitoring - Case Study and Experiences from Saudi Arabia." In CONFERENCE 2025. AMPP, 2025. https://doi.org/10.5006/c2025-00282.

Full text
Abstract:
This paper explores the effective management of CUI risk through the deployment and assessment of remote monitoring technology in Saudi Arabia. It highlights Corrosion Under Insulation (CUI), a concealed danger that can jeopardize asset integrity, especially in the region's harsh climatic conditions. By utilizing remote monitoring, a predictive strategy is developed—one that improves safety and optimizes costs. Envision using digital data and predictive tools to address hard-to-detect corrosion like CUI. The approach described combines this data to enable asset owners to prioritize inspections and maintenance effectively. As new methods for CUI monitoring in Saudi Arabia are introduced, this presentation offers valuable insights from local deployments, helping to mitigate CUI threats and enhance overall asset integrity.
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Viviane C. M., John W. Martin, Gareth Hinds, et al. "HIC Resistance of Heritage Pipelines Exposed to Mildly Sour Environments." In CORROSION 2013. NACE International, 2013. https://doi.org/10.5006/c2013-02630.

Full text
Abstract:
Abstract Carbon and low alloy steel notionally sweet pipelines could be in danger of sudden and/or severe cracking and, consequently, loss of containment if H2S is introduced into the media, even for a short time and/or at very low partial pressures. For ‘mildly sour’ conditions i.e. Region 0 as defined in NACE MR0175/ISO 15156, the main threat is hydrogen induced cracking (HIC) and this needs to be considered even for trace amounts of H2S. The effect of long-term exposure at such low levels of H2S is not well defined and the window of safe operation for HIC resistance is yet to be established. Recent work carried out by the European Pipeline Research Group suggested that there is a threshold below which HIC may not be a credible threat. This work however used modern seam-welded linepipe, which is inherently cleaner and thus potentially less susceptible to HIC than heritage materials manufactured decades ago. The present paper is aimed at defining a threshold and assessing the applicability of the standard test methodology for the HIC resistance of heritage pipelines (i.e. manufactured decades ago).
APA, Harvard, Vancouver, ISO, and other styles
4

Costovici (Mema), Denisa-Atena. "Ethics in Cyberspace – Dangers and Threats." In 2nd International Conference Global Ethics - Key of Sustainability (GEKoS). LUMEN Publishing House, 2021. http://dx.doi.org/10.18662/lumproc/gekos2021/6.

Full text
Abstract:
Rapid technology development and easy access to virtual space was directly proportional to the proliferation of multiple categories of network users and consumers. This contemporary reality has contributed to the emergence of the illusion of unrestricted accessibility of the online environment and the permissiveness of expression “no matter what”. The cyberspace draws a thin line between freedom of expression and violation of behavioural norms toward others. In order to mitigate the behaviours that transcend ethical boundaries, a series of basic conditions of use and restrictions have been legislated (mainly crimes related to threats and illegal content shared in the virtual world) which do not include all the situations encountered in practice. Given the cyberspace dimension, prevalent in most civilized areas of the planet, as a means and method of intercultural communication, ethical standards should be standardized and applied uniformly. This research paper is an attempt to objectively address the issues of standards and ethical values on the Web, with reference to cyber terrorism, groups of organized crime, hacktivism and states’ implication and responsibility. The main hypothesis of the research emphasizes that the information society requires the creation and enforcement of new laws, because it coexists in a completely new environment - the Network. Referring to the Network links, it is a fact that it cannot be kept safer against unauthorized access, without the application of adequate security measures and techniques. This research paper aims to shed the light on the dangers and threats that challenges the information society thought cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
5

Kovacevic, Nenad, Antonio Mak, and Zoran Karavidic. "ONE APPROACH TO DETERMINING THE DANGERS TO THE SECURITY-INTELLIGENCE SYSTEM OF THE REPUBLIC OF SERBIA." In SECURITY AND CRISIS MANAGEMENT - THEORY AND PRACTICE. RASEC, 2023. https://doi.org/10.70995/zvuk9887.

Full text
Abstract:
Contemporary challenges, risks and threats to the security of the Republic of Serbia are defined in strategic documents. Challenges, risks and threats are a manifestation of danger. The security-intelligence system of the Republic of Serbia is intended to protect national security from the perpetrators of illegal activities aimed at undermining or destroying the social order established by the Constitution. The aim of the paper is to determine the danger of the security-intelligence system of the Republic of Serbia from the point of view of the risk level. The list of dangers has been made based on the results of the research. Due to the length of the paper, only a brief overview of the methodology and results of the research is given.
APA, Harvard, Vancouver, ISO, and other styles
6

Raffik, R., A. Hemanath, S. Hareesh Chandran, V. P. Harshini, and R. Raashika. "Sensing Dangers and Threats in Railway Track with Intimation using IoT." In 2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA). IEEE, 2021. http://dx.doi.org/10.1109/icaeca52838.2021.9675719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kovacevic, Nenad, Antonio Mak, and Branko Teodorovic. "CHALLENGES, RISKS AND THREATS TO THE SECURITY OF THE REPUBLIC OF SERBIA." In 8th INTERNATIONAL FORUM “SAFETY FOR THE FUTURE”. RASEC, 2022. https://doi.org/10.70995/tfzr6272.

Full text
Abstract:
Security is a function of the development of society, and observed from the aspect of modern international relations, it is one of the most important, because every day the conditions for preserving human existence become more complex, and thus the fear of uncertainty and uninterrupted functioning of the constituents of society increases. Depending on the severity of the consequences for the values of the society, certain dangers to the security of the constituents of the society can be determined as a challenge, risk or threat. The paper presents a conceptual and categorical distinction between security challenges, risks and threats. The aim of this paper is to determine the list of challenges, risks and threats to the security of the Republic of Serbia, as well as to define the most dominant ones. The list has been made based on the results of the research. Due to the length of the paper, only a brief overview of the methodology and results of the research is given.
APA, Harvard, Vancouver, ISO, and other styles
8

Berisa, Hatidza, Tamara Gajic, and Jovan Prelic. "CHALLENGE RISKS AND THREATS TO INFORMATION SECURITY." In 8th INTERNATIONAL FORUM “SAFETY FOR THE FUTURE”. RASEC, 2022. https://doi.org/10.70995/gbkf7761.

Full text
Abstract:
Extremely rapid scientific and technological development, the diffusion of modern scientific achievements and technology and their growing impact on all areas of social life in countries around the world increase the complexity of the strategic environment. In this context, there will be greater potential for achieving a positive impact on the economic development of countries, through the application of innovative technological solutions that will contribute to improving the use of resources and accelerated productivity growth. Systems based on information and communication technologies are another subsystem of the strategic environment whose task is to manage information or uncertainty and thus improve and accelerate the decision-making process. However, they also significantly affect other characteristics of the strategic environment, making it more dynamic, complex, unstable, nonlinear, and especially uncertain. The authors start from the rapid scientific and technological progress, which causes various dangers, so the focus is on possible challenges and risks, which are manifested through the threat to information security.
APA, Harvard, Vancouver, ISO, and other styles
9

Kupavyh, A., and S. Rabeeah. "FINANCIAL STABILITY IN THE MODERN GLOBALIZED WORLD." In MANAGER OF THE YEAR – 2024. FSBE Institution of Higher Education Voronezh State University of Forestry and Technologies named after G.F. Morozov, 2024. https://doi.org/10.58168/moty_156-159.

Full text
Abstract:
The notion of economic security is covered throughout the article. In the context of globalization, risks, problems, and dangers are recognized. Proposed solutions for removing financial and economic threats and their bearers are also included. In the context of worldwide difficulties, economic security concerns are frequently raised.
APA, Harvard, Vancouver, ISO, and other styles
10

TIMERCAN, Fiodor. "Studiul ameninţărilor cibernetice în domeniul militar." In Inter/transdisciplinary approaches in the teaching of the real sciences, (STEAM concept) = Abordări inter/transdisciplinare în predarea ştiinţelor reale, (concept STEAM). Ion Creangă Pedagogical State University, 2023. http://dx.doi.org/10.46727/c.steam-2023.p349-356.

Full text
Abstract:
Starting from the general acceptance, the definition of the threat of politico-military origin requires some clarification. Whether it refers to the infringement of the fundamental rights of the states or the security systems of the perception of the transposition of the objectives of the remaining threat into facts, falling among the virtual dangers. They always trigger the reactions necessary to counteract the effects of the threat. The situation becomes serious when they are oversized. It can be initiated or a chain reaction, difficult to control, in which the Newtonian binomial "action-reaction" can multiply until the destruction of the system that generated it. This attitude can be more often generated by asymmetric threats, a concept that is used quite often in the current specialized literature. It signifies "the threat resulting from the possibility of using means or different methods to strike or neutralize the strengths of an adversary by exploiting his weaknesses in order to obtain a disproportionate result.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Dangers and threats"

1

Lohn, Andrew. Hacking AI: A Primer for Policymakers on Machine Learning Cybersecurity. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca006.

Full text
Abstract:
Machine learning systems’ vulnerabilities are pervasive. Hackers and adversaries can easily exploit them. As such, managing the risks is too large a task for the technology community to handle alone. In this primer, Andrew Lohn writes that policymakers must understand the threats well enough to assess the dangers that the United States, its military and intelligence services, and its civilians face when they use machine learning.
APA, Harvard, Vancouver, ISO, and other styles
2

Islam, Saniyat, and Pia Interlandi. Toxic threads? The hidden dangers of ultra-fast fashion. Edited by Grace Jennings-Edquist. Monash University, 2024. http://dx.doi.org/10.54377/cf05-7881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sim, Sokcheng, Socheat Keo, and Molideth Sarom. Pesticide Use Practices in Cambodia’s Vegetable Farming. Cambodia Development Resource Institute, 2021. https://doi.org/10.64202/wp.128.202108.

Full text
Abstract:
Pesticides are agricultural technologies that farmers use to control pests and weeds and remain an important modern input for crop production including vegetable farming. There are many types of pesticides, such as insecticides, fungicides, rodenticides and herbicides, that target different threats to crops. While the potential production benefits of chemical pesticides are undeniable, people are becoming more aware of their risks. There is an array of dangers associated with inappropriate pesticide use. As pesticides are a poison, they pose inherent health risks to the farmers exposed to them. Inappropriate pesticide use has been linked with pesticide residues in or on food above maximum residue levels (MRLs), the safe amount of residue allowed, which can cause a number of health effects in those who consume the products. Our survey data reveals that pests and diseases are the biggest challenge Cambodian vegetable farmers face. Pesticides/herbicides account for the largest share in vegetable production costs in our study areas, suggesting that chemical pesticides are commonly used in vegetable farming in Cambodia, particularly our study areas which are the main producers of vegetables in the country. Additionally, it is common that farmers mix various types of pesticides per spray which is not good practice. Applying ordinary least squares regression and probit model, we investigated the factors that facilitate or impede pesticide use practices. The results show that lower use of pesticide is associated with age of farmers in charge of pesticide spraying, educational attainment, female farmer, and varied by locations. At the same time, there is a significant link between the use of large quantities of pesticide and farmers’ misperception of pesticide use practices and the proportion of pesticide spending in total input costs. Apart from this, knowledge/advice about pest management/control farmers receive from their peers and pesticide stores, household participation in social groups such as agricultural cooperatives, and farm size are positively correlated with the probability that a farmer will comply with recommended pesticide doses. These results imply that modifying farmers’ attitudes towards pesticide use and promoting the role of women in vegetable pest management are among the important interventions to reduce pesticide dependence.
APA, Harvard, Vancouver, ISO, and other styles
4

Vantassel, Stephen M., and Brenda K. Osthus. Safety. U.S. Department of Agriculture, Animal and Plant Health Inspection Service, 2018. http://dx.doi.org/10.32747/2018.7208746.ws.

Full text
Abstract:
Wildlife damage management (WDM) is an exciting field with many opportunities to provide solutions to the complex issues involved in human-wildlife interactions. In addition, WDM wildlife control operators (WCO) face a variety of threats to their physical well-being. Injuries can result from misused, faulty, or poorly maintained equipment, inexperience, mishandled wildlife, harsh weather, and dangerous situations, such as electrical lines. The goals of this publication are to: Develop an awareness of safety issues and adopt a mindset of “Safety First”, Review the major safety threats that WCOs face, Provide basic information for WCOs to protect themselves, and List resources for further information and training. Work in WDM poses many safety risks to those involved. Awareness, planning, and deliberate action can eliminate or reduce many threats. As the industry continues to develop, WCOs must keep up with new threats and safety practices to maintain their well-being. Following safe work practices helps to ensure WCOs remain on-the-job and injury free.
APA, Harvard, Vancouver, ISO, and other styles
5

Drury, J., S. Arias, T. Au-Yeung, et al. Public behaviour in response to perceived hostile threats: an evidence base and guide for practitioners and policymakers. University of Sussex, 2023. http://dx.doi.org/10.20919/vjvt7448.

Full text
Abstract:
Background: Public behaviour and the new hostile threats • Civil contingencies planning and preparedness for hostile threats requires accurate and up to date knowledge about how the public might behave in relation to such incidents. Inaccurate understandings of public behaviour can lead to dangerous and counterproductive practices and policies. • There is consistent evidence across both hostile threats and other kinds of emergencies and disasters that significant numbers of those affected give each other support, cooperate, and otherwise interact socially within the incident itself. • In emergency incidents, competition among those affected occurs in only limited situations, and loss of behavioural control is rare. • Spontaneous cooperation among the public in emergency incidents, based on either social capital or emergent social identity, is a crucial part of civil contingencies planning. • There has been relatively little research on public behaviour in response to the new hostile threats of the past ten years, however. • The programme of work summarized in this briefing document came about in response to a wave of false alarm flight incidents in the 2010s, linked to the new hostile threats (i.e., marauding terrorist attacks). • By using a combination of archive data for incidents in Great Britain 2010-2019, interviews, video data analysis, and controlled experiments using virtual reality technology, we were able to examine experiences, measure behaviour, and test hypotheses about underlying psychological mechanisms in both false alarms and public interventions against a hostile threat. Re-visiting the relationship between false alarms and crowd disasters • The Bethnal Green tube disaster of 1943, in which 173 people died, has historically been used to suggest that (mis)perceived hostile threats can lead to uncontrolled ‘stampedes’. • Re-analysis of witness statements suggests that public fears of Germany bombs were realistic rather than unreasonable, and that flight behaviour was socially structured rather than uncontrolled. • Evidence for a causal link between the flight of the crowd and the fatal crowd collapse is weak at best. • Altogether, the analysis suggests the importance of examining people’s beliefs about context to understand when they might interpret ambiguous signals as a hostile threat, and that. Tthe concepts of norms and relationships offer better ways to explain such incidents than ‘mass panic’. Why false alarms occur • The wider context of terrorist threat provides a framing for the public’s perception of signals as evidence of hostile threats. In particular, the magnitude of recent psychologically relevant terrorist attacks predicts likelihood of false alarm flight incidents. • False alarms in Great Britain are more likely to occur in those towns and cities that have seen genuine terrorist incidents. • False alarms in Great Britain are more likely to occur in the types of location where terrorist attacks happen, such as shopping areass, transport hubs, and other crowded places. • The urgent or flight behaviour of other people (including the emergency services) influences public perceptions that there is a hostile threat, particularly in situations of greater ambiguity, and particularly when these other people are ingroup. • High profile tweets suggesting a hostile threat, including from the police, have been associated with the size and scale of false alarm responses. • In most cases, it is a combination of factors – context, others’ behaviour, communications – that leads people to flee. A false alarm tends not to be sudden or impulsive, and often follows an initial phase of discounting threat – as with many genuine emergencies. 2.4 How the public behave in false alarm flight incidents • Even in those false alarm incidents where there is urgent flight, there are also other behaviours than running, including ignoring the ‘threat’, and walking away. • Injuries occur but recorded injuries are relatively uncommon. • Hiding is a common behaviour. In our evidence, this was facilitated by orders from police and offers from people staff in shops and other premises. • Supportive behaviours are common, including informational and emotional support. • Members of the public often cooperate with the emergency services and comply with their orders but also question instructions when the rationale is unclear. • Pushing, trampling and other competitive behaviour can occur,s but only in restricted situations and briefly. • At the Oxford Street Black Friday 2017 false alarm, rather than an overall sense of unity across the crowd, camaraderie existed only in pockets. This was likely due to the lack of a sense of common fate or reference point across the incident; the fragmented experience would have hindered the development of a shared social identity across the crowd. • Large and high profile false alarm incidents may be associated with significant levels of distress and even humiliation among those members of the public affected, both at the time and in the aftermath, as the rest of society reflects and comments on the incident. Public behaviour in response to visible marauding attackers • Spontaneous, coordinated public responses to marauding bladed attacks have been observed on a number of occasions. • Close examination of marauding bladed attacks suggests that members of the public engage in a wide variety of behaviours, not just flight. • Members of the public responding to marauding bladed attacks adopt a variety of complementary roles. These, that may include defending, communicating, first aid, recruiting others, marshalling, negotiating, risk assessment, and evidence gathering. Recommendations for practitioners and policymakers • Embed the psychology of public behaviour in emergencies in your training and guidance. • Continue to inform the public and promote public awareness where there is an increased threat. • Build long-term relations with the public to achieve trust and influence in emergency preparedness. • Use a unifying language and supportive forms of communication to enhance unity both within the crowd and between the crowd and the authorities. • Authorities and responders should take a reflexive approach to their responses to possible hostile threats, by reflecting upon how their actions might be perceived by the public and impact (positively and negatively) upon public behaviour. • To give emotional support, prioritize informative and actionable risk and crisis communication over emotional reassurances. • Provide first aid kits in transport infrastructures to enable some members of the public more effectively to act as zero responders.
APA, Harvard, Vancouver, ISO, and other styles
6

Kesler, Dylan, Conor McGowan, and Mark Ryan. Endangered Species Management (Ukrainian). American Museum of Natural History, 2015. http://dx.doi.org/10.5531/cbc.ncep.0112.

Full text
Abstract:
Individual species are intricate parts of complex ecosystems; when one is threatened, others may be put in danger as well. While many countries have basic laws that aim to protect threatened species, endangered species management attempts to work with various groups to preserve biodiversity and maintain viable ecosystems. There are numerous approaches to endangered species management that differ by species and by country. This module explores the basic steps—identifying status, examining threats and planning recovery—with examples covering varied ecosystems and challenges. Through a case study and accompanying modeling exercise, students apply endangered species management techniques to the case of California condors.
APA, Harvard, Vancouver, ISO, and other styles
7

Varga, Mihai, Volodymyr Ishchenko, Ignacio Sar Chávez, Tarik Basbugoglu, Nelli Ferenczi, and Nachita Rosun. Toolkit 7.3: Using Dual Perspectives to Explore Concepts of Radicalization, Methods of Enhancing Social Support and Cohesion, and Uncover the Impact of Online Harms. Glasgow Caledonian University, 2025. https://doi.org/10.59019/9nkkg551.

Full text
Abstract:
This toolkit uses a holistic approach to investigate the concepts of extremism and radicalisation, and to examine the barriers to social cohesion, particularly in the context of digital spaces. To this end, we interviewed 30 young people across 15 countries in our consortium and 13 practitioners engaged in deradicalisation work in Germany, France, Israel, and the UK. The aim of the interviews with young people was threefold. First, we sought to investigate experiences of marginalisation, perceived injustices, and social identity as contributing to radicalisation. We also explored how young people make sense of these mundane interactions. Third, we explored lay-beliefs in youth around radicalisation, extremism, and political violence. Six themes emerged from our interviews. First, young people saw radicalisation differently to official state, political, and academic definitions, defining it as an attitudinal phenomenon. Young people reported many negative experiences with extremist content in digital spaces, perceiving these spaces as amplifiers of minoritising processes and as inevitable places of online harms (e.g., racism, hate speech). We also found that for some participants, LGBTQIA+ and feminist movements were experienced as threats. Finally, young people elevated education as a means of countering radicalisation and the dangers of online harms. We adapted a visualisation task to explore metaphors of marginalisation by asking young people to depict how they place themselves within society; our findings illustrate shared themes of exclusion and injustices. In our interviews with practitioners, we sought to explore how social workers involved in deradicalization programs for youth understand and use in their work the key concepts in the field: radicalization and extremism. We found that practitioners understand radicalization as a process that has relatively little to do with how authorities - both national and EU - understand it. Rather than a process that occurs mainly because of the spread of threatening religious beliefs and political ideologies, practitioners saw radicalization as the result of structural factors, the neglect of social policies and social issues in societies experiencing growing inequalities, decreasing political opportunities, increasing perceptions of minorities as cultural others, and the spread of conspiracy theories due to the deterioration of public education. However, while stressing structural factors, practitioners also underlined that these are beyond their control and expressed frustration over the lack of means at their disposal. Extremism as a concept was seen as particularly unhelpful because of its inherent normativity and adoption by law enforcement agencies, making it impossible to use in their day-to-day work with young people. Practitioners stated that rather than using "official language" in their daily interactions, they prefer to talk about hate and violence, racism, right-wing extremism, and other similar concepts that are clearer to their clients while still indicating problematic behaviour. Finally, best practices for deradicalization have most often meant for our practitioners building the alternative networks and especially the trusting relationships with young people that are typical of social work in general
APA, Harvard, Vancouver, ISO, and other styles
8

Brzoska, Michael, Wuyi Omitoogun, and Elisabeth Sköns. The Human Security Case for Military Expenditure Reductions. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/tmrz9944.

Full text
Abstract:
Global military expenditure has reached record levels. At the same time, hundreds of millions of people face non-traditional ‘vital’ risks and threats to their security—threats to their lives, livelihoods and dignity. Accelerating climate change and growing loss of biodiversity add unprecedented urgency to investing in people’s security. The concept of human security, as explained in this paper, emphasizes the security of people without neglecting the security of states and state order. The human security approach stresses the necessity to balance the financial needs from all vital risks and threats, regardless of their cause. It logically leads to a reassessment of spending on the military. It also seriously considers the fear that reducing military expenditure will reduce the security of states, a major barrier to past international initiatives to reduce military expenditure. As a first step to initiate the rebalancing, this paper proposes three priority fields of activity to free resources from military spending: (a) arms control and disarmament negotiations and agreements; (b) sector-wide security sector reform for conflict prevention; and (c) financial responsibility in military expenditure and arms procurement. These can be taken without impairing the security of states and state order. If successful, these steps would remove barriers to further military expenditure reductions to improve the human condition in an increasingly dangerous Anthropocene.
APA, Harvard, Vancouver, ISO, and other styles
9

Grand-Clément, Sarah. Webinar series summary: Armed and dangerous? A brief overview of uncrewed aerial systems – risks, impacts and avenues for action. UNIDIR, 2024. http://dx.doi.org/10.37559/caap/24/erc/11.

Full text
Abstract:
Uncrewed systems – which include uncrewed aerial, ground and maritime systems – are increasingly being developed and used by a range of actors both within and outside situations of armed conflict. Uncrewed aerial systems (UAS, commonly known as drones) are viewed with particular concern as regards the implications of the growing proliferation and use to international peace and security. Between 2 July and 5 September 2024, UNIDIR and the United Nations Office for Disarmament Affairs co-organized a series of three webinars on UAS. This summary highlights the key points made by the speakers on issues pertaining to terms and classifications of UAS, benefits and risks of (mis)use, and possible actions to address the identified threats.
APA, Harvard, Vancouver, ISO, and other styles
10

White, William. What Next for the Post Covid Global Economy: Could Negative Supply Shocks Disrupt Other Fragile Systems? Institute for New Economic Thinking Working Paper Series, 2023. http://dx.doi.org/10.36687/inetwp199.

Full text
Abstract:
There is a reasonable likelihood that that the next global economic crisis could threaten the future of democracy. The economic system is a complex, adaptive system (CAS) subject to “tipping points” when underlying stresses lead to crisis. Moreover, the economic system is nested within a number of other CAS; political, environmental and public health among others. Looking forward, recurrent negative supply shocks imply a dangerous future of higher real interest rates and debt distress leading to either deflation (private debt distress) or higher inflation (sovereign debt distress). Such problems could threaten democratic political systems that are already showing signs of significant stress themselves. The paper finishes with some reflections on policy alternatives.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!