To see the other types of publications on this topic, follow the link: Threat Assessment.

Journal articles on the topic 'Threat Assessment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Threat Assessment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chandler, Gena E., and Jennifer Sano-Franchini. "Threat Assessment." Pedagogy 20, no. 1 (January 1, 2020): 87–100. http://dx.doi.org/10.1215/15314200-7879069.

Full text
Abstract:
While the term neoliberalism is commonly used to explain libertarian and conservative economic perspectives, its rapidly expanding contexts influence every aspect of our cultural environment, even the contexts of higher education. This article explores how neoliberal ideology affects the contemporary teaching environment for women of color teaching ideological critique.
APA, Harvard, Vancouver, ISO, and other styles
2

Gelles, Michael G., Kim Sasaki-Swindle, and Russell E. Palarea. "Threat Assessment." Journal of Threat Assessment 2, no. 1 (January 2002): 55–66. http://dx.doi.org/10.1300/j177v02n01_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

KRASIŃSKI, MSc, Wojciech. "THREAT ASSESSMENT IN THE NATIONAL CRISIS MANAGEMENT PLANS IN POLAND AFTER 2010." Zeszyty Naukowe Akademii Sztuki Wojennej 117, no. 4 (July 29, 2020): 58–68. http://dx.doi.org/10.5604/01.3001.0014.3424.

Full text
Abstract:
The article discusses threat assessment in consecutive National Crisis Management Plans in Poland after 2010. The scope of the article is limited to the assessment of those threats that may have an impact at the state level and which are included in the National Crisis Management Plan. A general approach to threat assessment for the purposes of national crisis management plans has been taken. A reference to the accuracy of consecutive threat assessments in the context of the occurrence of real crises is included later in the article. In the final part of the article, the perspectives for threat assessment are discussed. Due attention is paid to threats which have an increased likelihood of occurring and the severest consequences.
APA, Harvard, Vancouver, ISO, and other styles
4

MUGISHA, ARTHUR R., and SUSAN K. JACOBSON. "Threat reduction assessment of conventional and community-based conservation approaches to managing protected areas in Uganda." Environmental Conservation 31, no. 3 (September 2004): 233–41. http://dx.doi.org/10.1017/s0376892904001432.

Full text
Abstract:
Loss of wildlife, encroachment on wild lands and conflicts between protected areas and neighbouring communities continue to threaten the integrity of protected areas (PAs) in Uganda. To increase support from local communities and ensure long-term sustainability for Uganda's PAs, a policy of community-based conservation was introduced in 1988 as a management approach in seven PAs. The effectiveness of the community-based approach for reducing threats was compared to conventional PA management by conducting a threat reduction assessment at 16 PAs, seven with community-based approaches and nine without. Additional data collected using document reviews, interviews with government officials, and surveys of PA wardens were compared with the threat reduction assessments. Twenty-three primary threats were identified at PAs. Local game poaching was the most common threat. The threat reduction assessment indices of community-based PAs (mean=49.0±12) were not significantly different from those of conventional PAs (mean=37.96±21.6). Some specific threats, such as bush burning, logging, encroachment and unclear boundaries, seemed to be better mitigated at community-based PAs. Management approaches at all PAs mitigated fewer than half of the identified threats. Management approaches are needed that directly target PA threats, go beyond PA boundaries by involving additional government departments, link people's livelihoods to conservation efforts and strengthen PA institutions.
APA, Harvard, Vancouver, ISO, and other styles
5

Pardue, Harold, Jeffrey P. Landry, and Alec Yasinsac. "E-Voting Risk Assessment." International Journal of Information Security and Privacy 5, no. 3 (July 2011): 19–35. http://dx.doi.org/10.4018/jisp.2011070102.

Full text
Abstract:
Approximately 25% (according to http://verifiedvoting.com/) of voting jurisdictions use direct recording electronic systems to record votes. Accurate tabulation of voter intent is critical to safeguard this fundamental act of democracy: voting. Electronic voting systems are known to be vulnerable to attack. Assessing risk to these systems requires a systematic treatment and cataloging of threats, vulnerabilities, technologies, controls, and operational environments. This paper presents a threat tree for direct recording electronic (DRE) voting systems. The threat tree is organized as a hierarchy of threat actions, the goal of which is to exploit a system vulnerability in the context of specific technologies, controls, and operational environment. As an abstraction, the threat tree allows the analyst to reason comparatively about threats. A panel of elections officials, security experts, academics, election law attorneys, representatives from governmental agencies, voting equipment vendors, and voting equipment testing labs vetted the DRE threat tree. The authors submit that the DRE threat tree supports both individual and group risk assessment processes and techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Deng, Fang, Xinan Liu, Zhihong Peng, and Jie Chen. "A Threat Assessment Method Based on Hierarchies and Modules." Journal of Advanced Computational Intelligence and Intelligent Informatics 18, no. 1 (January 20, 2014): 93–99. http://dx.doi.org/10.20965/jaciii.2014.p0093.

Full text
Abstract:
With the development of low-level data fusion technology, threat assessment, which is a part of high-level data fusion, is recognized by an increasing numbers of people. However, the method to solve the problem of threat assessment for various kinds of targets and attacks is unknown. Hence, a threat assessment method is proposed in this paper to solve this problem. This method includes tertiary assessments: information classification, reorganization, and summary. In the tertiary assessments model, various threats with multi-class targets and attacks can be comprehensively assessed. A case study with specific algorithms and scenarios is shown to prove the validity and rationality of this method.
APA, Harvard, Vancouver, ISO, and other styles
7

Nostro, Nicola, Andrea Ceccarelli, Andrea Bondavalli, and Francesco Brancati. "Insider Threat Assessment." ACM SIGOPS Operating Systems Review 48, no. 2 (December 5, 2014): 3–12. http://dx.doi.org/10.1145/2694737.2694740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Smirnov, R. A., and S. N. Novikov. "Research on Information Security Risk Assessment Techniques." Interexpo GEO-Siberia 6 (May 18, 2022): 250–57. http://dx.doi.org/10.33764/2618-981x-2022-6-250-257.

Full text
Abstract:
The emergence of new technologies not only generates new methods of attacks, but also expands the existing list of threats, and, as you know, each threat can be carried out by a large number of different attacks. To date, there are methods based on various approaches to the study of information security threats, such as: assessment of the relevance of information security threats according to the FSTEC methodology of Russia, ATT&CK Matrix for Enterprise, Howard-Longstaff incident taxonomy, information security threat assessment study based on a security model. All of the above methods can be divided into two groups of threat assessment: quantitative and qualitative. In this connection, there is a need to conduct their research. The article presents a study of methods for assessing information security threats, conducted in various ways.
APA, Harvard, Vancouver, ISO, and other styles
9

Strong, Ken, and Dewey Cornell. "Student Threat Assessment in Memphis City Schools: A Descriptive Report." Behavioral Disorders 34, no. 1 (November 2008): 42–54. http://dx.doi.org/10.1177/019874290803400104.

Full text
Abstract:
Threat assessment has been widely recommended as a violence prevention approach for schools, but there are few reports of its implementation. Memphis City Schools adapted the Virginia threat assessment guidelines (Cornell & Sheras, 2006) for use by a centralized team serving 194 schools and a student population of 118,000. This article describes 209 student threats referred for assessment during a single school year and the resulting educational placements and disciplinary consequences. There were no reports of students carrying out any of the violent threats. These results support further examination of student threat assessment as a promising approach to dealing with student threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Huddleston, S. H., and D. E. Brown. "A Statistical Threat Assessment." IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 39, no. 6 (November 2009): 1307–15. http://dx.doi.org/10.1109/tsmca.2009.2027611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Dvorkin, Vladimir. "COMPROMISE IN THREAT ASSESSMENT." Security Index: A Russian Journal on International Security 16, no. 2 (April 2010): 99–101. http://dx.doi.org/10.1080/19934271003595210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ewing, Charles Patrick. "Introduction to threat assessment." Behavioral Sciences & the Law 17, no. 3 (July 1999): 251–52. http://dx.doi.org/10.1002/(sici)1099-0798(199907/09)17:3<251::aid-bsl353>3.0.co;2-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zeng, Min, Chuanzhou Dian, and Yaoyao Wei. "Risk Assessment of Insider Threats Based on IHFACS-BN." Sustainability 15, no. 1 (December 28, 2022): 491. http://dx.doi.org/10.3390/su15010491.

Full text
Abstract:
Insider threats, as one of the pressing challenges that threaten an organization’s information assets, usually result in considerable losses to the business. It is necessary to explore the key human factors that enterprise information security management should focus on preventing to reduce the probability of insider threats effectively. This paper first puts forward the improved Human Factors Analysis and Classification System (IHFACS) based on actual enterprise management. Then, the enterprise internal threat risk assessment model is constructed using the Bayesian network, expert evaluation, and fuzzy set theory. Forty-three classic insider threat cases from China, the United States, and Israel during 2009–2021 are selected as samples. Then, reasoning and sensitivity analysis recognizes the top 10 most critical human factors of the accident and the most likely causal chain of unsafe acts. The result shows that the most unsafe behavior was not assessing employees’ familiarity with the company’s internal security policies. In addition, improving the organizational impact of information security can effectively reduce internal threats and promote the sustainable development of enterprises.
APA, Harvard, Vancouver, ISO, and other styles
14

Ali, Nida, Cory Cooperman, Jonas P. Nitschke, Mark W. Baldwin, and Jens C. Pruessner. "The effects of suppressing the biological stress systems on social threat-assessment following acute stress." Psychopharmacology 237, no. 10 (June 29, 2020): 3047–56. http://dx.doi.org/10.1007/s00213-020-05591-z.

Full text
Abstract:
Abstract Rationale Stress is associated with increased sensitivity to threat. Previous investigations examining how stress affects threat processing have largely focused on biomarker responses associated with either the sympathetic-nervous-system (SNS) or the hypothalamus-pituitary-adrenal (HPA) axis. Objectives We pharmacologically suppressed activations of SNS, HPA, or both, prior to stress and investigated how each stress system modulates social threat assessment. Methods One hundred sixty-one healthy men and women were randomized in a between-subject design, to one of four pharmacological or placebo conditions: dexamethasone–placebo, placebo–propranolol, dexamethasone–propranolol, or placebo–placebo. Participants provided threat assessments for angry and neutral human faces on a baseline day, and immediately after stress induction on a testing day. Results With both systems responding normally to stress (placebo–placebo), threat assessment was higher for neutral faces compared with angry. Compared with placebo, SNS suppression resulted in increased threat assessment for angry faces. HPA suppression resulted in decreased threat assessment for neutral and angry faces. When both systems were suppressed, there was an increase in threat assessment for angry faces, and no difference from placebo for neutral. Conclusion Our findings demonstrated that when intact, the biological stress systems adaptively support organisms during stress by focusing attention towards specific stimuli that are relevant to the threat. Dysregulations of the stress systems result in important system specific consequences on threat evaluation, such that suppression of either stress system alone resulted in reduced threat assessment for contextually relevant threatening stimuli, whereas when both systems were suppressed, individuals appear indiscriminately attentive to all potential threats in the environment, resulting in increased threat processing of both contextually relevant and irrelevant stimuli. Given that stress-related psychopathologies have been associated with dysregulations of the stress systems and biased responses to social threat, a systematic understanding of the mechanisms that underlie how stress systems modulate social threat assessment is needed, and can provide important insights into the cognitive processes that are involved in the development and maintenance of stress-related psychopathologies.
APA, Harvard, Vancouver, ISO, and other styles
15

Pendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (October 2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.

Full text
Abstract:
Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threats pertaining to telemedicine applications. The concept and its usefulness are illustrated using a case study. This case study focuses on the capture and representation of salient security threats in telemedicine. To analyze the security threats to an application, it presents a threat modeling framework utilizing a table driven approach. The study reveals that even in a highly controlled environment with static locations, the security risks posed by telemedicine applications are significant, and that using a threat table approach provides an easy-to-use and effective method for managing these threats.
APA, Harvard, Vancouver, ISO, and other styles
16

Yang, Hongyu, Renyun Zeng, Fengyan Wang, Guangquan Xu, and Jiyong Zhang. "An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things." Security and Communication Networks 2020 (November 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/6656066.

Full text
Abstract:
With the wide application of network technology, the Internet of Things (IoT) systems are facing the increasingly serious situation of network threats; the network threat situation assessment becomes an important approach to solve these problems. Aiming at the traditional methods based on data category tag that has high modeling cost and low efficiency in the network threat situation assessment, this paper proposes a network threat situation assessment model based on unsupervised learning for IoT. Firstly, we combine the encoder of variational autoencoder (VAE) and the discriminator of generative adversarial networks (GAN) to form the V-G network. Then, we obtain the reconstruction error of each layer network by training the network collection layer of the V-G network with normal network traffic. Besides, we conduct the reconstruction error learning by the 3-layer variational autoencoder of the output layer and calculate the abnormal threshold of the training. Moreover, we carry out the group threat testing with the test dataset containing abnormal network traffic and calculate the threat probability of each test group. Finally, we obtain the threat situation value (TSV) according to the threat probability and the threat impact. The simulation results show that, compared with the other methods, this proposed method can evaluate the overall situation of network security threat more intuitively and has a stronger characterization ability for network threats.
APA, Harvard, Vancouver, ISO, and other styles
17

Wu, Ke He, Shi Chao Ye, and Yu Guang Niu. "An Evaluation Method for Information Security Level Based on OWA Operator and Bayesian Network." Applied Mechanics and Materials 411-414 (September 2013): 72–75. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.72.

Full text
Abstract:
Analysis of information security threats in the system elements and assessment process, the decision-maker's subjective judgment threat level information and to obtain an objective evaluation by testing different forms of information and data, it is difficult for a direct threat assessment, proposed based on Bayesian network and OWA operator information security threat assessment model. First, combined with expert knowledge Bayesian network inference rules introduced conditional probability matrix, in order to build an information security threat assessment model. Secondly, based on OWA operator build the expert group decision making information system threat level of the target's subjective judgment information, and as a Bayesian network model of the target information system threat level of a priori information, and objective evaluation of information as a shell Julius observation node network model, which integrates the subjective and objective information security threat level. Finally, a simulation example shows that the model is reasonable and effective.
APA, Harvard, Vancouver, ISO, and other styles
18

XIE, Li-xia, Dian-sheng JIANG, Li ZHANG, and Hong-yu YANG. "Vulnerability threat correlation assessment method." Journal of Computer Applications 32, no. 3 (April 1, 2013): 679–82. http://dx.doi.org/10.3724/sp.j.1087.2012.00679.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Chunlin, Liu, and Rohan Gunaratna. "The Terrorist Threat Assessment 2020." UNISCI Journal 18, no. 52 (January 2020): 125–29. http://dx.doi.org/10.31439/unisci-79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Teichmann, Clemens, Stephan Renatus, and Jörn Eichler. "Agile Threat Assessment and Mitigation." International Journal of Secure Software Engineering 7, no. 1 (January 2016): 1–16. http://dx.doi.org/10.4018/ijsse.2016010101.

Full text
Abstract:
Security engineering and agile development are often perceived as a clash of cultures. To address this clash, several approaches have been proposed that allow for agile security engineering. Unfortunately, agile development organizations differ in their actual procedures and environmental properties resulting in varying requirements. The authors propose an approach to compare and select methods for agile security engineering. Furthermore, their approach addresses adaptation or construction of a tailored method taking the existing development culture into account. The authors demonstrate the feasibility of their proposal and report early experiences from its application within a small development organization for digital solutions in the automotive domain.
APA, Harvard, Vancouver, ISO, and other styles
21

Cornell, Dewey. "Threat Assessment in College Settings." Change: The Magazine of Higher Learning 42, no. 1 (January 2010): 8–15. http://dx.doi.org/10.1080/00091380903448997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bolante, Rebecca, and Cass Dykeman. "Threat assessment in community colleges." Journal of Threat Assessment and Management 2, no. 1 (March 2015): 23–32. http://dx.doi.org/10.1037/tam0000033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Smith, Martin. "Threat assessment and risk analysis." Computer Fraud & Security Bulletin 1991, no. 11 (November 1991): 6–13. http://dx.doi.org/10.1016/0142-0496(91)90176-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Zaiss, Jim, Razieh Nokhbeh Zaeem, and K. Suzanne Barber. "Identity Threat Assessment and Prediction." Journal of Consumer Affairs 53, no. 1 (May 17, 2018): 58–70. http://dx.doi.org/10.1111/joca.12191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

du Preez, Gert T., and Carl W. I. Pistorius. "Technological Threat and Opportunity Assessment." Technological Forecasting and Social Change 61, no. 3 (July 1999): 215–34. http://dx.doi.org/10.1016/s0040-1625(99)00037-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kaplan, Sebastian G., and Dewey G. Cornell. "Threats of Violence by Students in Special Education." Behavioral Disorders 31, no. 1 (November 2005): 107–19. http://dx.doi.org/10.1177/019874290503100102.

Full text
Abstract:
We compared threats of violence made by K–12 students in special education (120 cases) or general education (136 cases) in schools that were implementing threat assessment guidelines for managing student threats of violence (Cornell, Sheras, Kaplan, McConville, Posey, Levy-Elkon, et al., 2004; Cornell & Sheras, in press). Students in special education made disproportionately more threats, as well as more severe threats, than peers in general education. Students classified as emotionally disturbed (ED) exhibited the highest threat rates. Nevertheless, use of school suspension as a disciplinary consequence for threats was consistent for students in special and general education, and few students were expelled. Our findings support the use of threat assessment to manage threats of violence by students in special education.
APA, Harvard, Vancouver, ISO, and other styles
27

Mykhailova, A., S. Chumachenko, Yе Morsch, and A. Partalian. "Мethods of complex operational expert assessment of military-man-made threats in the united forces operation area." Scientific bulletin: Сivil protection and fire safety 1, no. 1 (December 1, 2020): 23–33. http://dx.doi.org/10.33269/nvcz.2020.1.23-33.

Full text
Abstract:
The article describes the techniques and methods of application of the method of complex operational expert assessment of military- man-made threats in the United forces operation area during hostilities. As a result of the analysis of scientific sources, the key features of effective approaches and methods of assessing heterogeneous threats that are associated with man-made impacts and can lead to emergencies. The selection of criteria for a complex threat assessment is made, the procedure and factors used in the operational threat assessment are described. The main factors of negative impact of military-man-made threats on socio-ecological-economic systems, which are key in the formation of military-man-made threats, are presented. A hierarchical classification of factors of integrated operational threat assessment for the United forces operation area has been developed. A system of equations is obtained that will allow modeling the change of threats depending on the change of factors and evaluation criteria. This will allow for the rapid ranking of military-man-made threats to the United forces operation area.
APA, Harvard, Vancouver, ISO, and other styles
28

Zhang, Shuqin, Peng Chen, Guangyao Bai, Shijie Wang, Minzhi Zhang, Shuhan Li, and Chunxia Zhao. "An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix." Wireless Communications and Mobile Computing 2022 (August 8, 2022): 1–12. http://dx.doi.org/10.1155/2022/7875910.

Full text
Abstract:
With the occurrence of cyber security incidents, the value of threat intelligence is coming to the fore. Timely extracting Indicator of Compromise (IOC) from cyber threat intelligence can quickly respond to threats. However, the sparse text in public threat intelligence scatters useful information, which makes it challenging to assess unstructured threat intelligence. In this paper, we proposed Cyber Threat Intelligence Automated Assessment Model (TIAM), a method to automatically assess highly sparse threat intelligence from multiple dimensions. TIAM implemented automatic classification of threat intelligence based on feature extraction, defined assessment criteria to quantify the value of threat intelligence, and combined ATT&CK to identify attack techniques related to IOC. Finally, we associated the identified IOCs, ATT&CK techniques, and intelligence quantification results. The experimental results shown that TIAM could better assess threat intelligence and help security managers to obtain valuable cyber threat intelligence.
APA, Harvard, Vancouver, ISO, and other styles
29

РАNСНENKO, O. "Current issues of cyber threat risk assessment: analysis of foreign experience." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 106–12. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248824.

Full text
Abstract:
The article considers topical issues of cyber threat risk assessment. It contains an analysis of the Law “On Basic Principles for providing of Cyber Security of Ukraine”, the Cyber Security Strategy of Ukraine and other legislative acts for providing on cyber security. The main approaches to determining the assessment of cyber threats are considered. The best examples of foreign practice of cyber threat risk assessment are analyzed, the most effective national systems of their assessment are revealed. It is concluded that multi-level risk and threat assessment systems are most effective when the relevant analysis is conducted at both the national and regional and/or local levels.
APA, Harvard, Vancouver, ISO, and other styles
30

Emrich, Christopher T., Yao Zhou, Sanam K. Aksha, and Herbert E. Longenecker. "Creating a Nationwide Composite Hazard Index Using Empirically Based Threat Assessment Approaches Applied to Open Geospatial Data." Sustainability 14, no. 5 (February 25, 2022): 2685. http://dx.doi.org/10.3390/su14052685.

Full text
Abstract:
The US is exposed to myriad natural hazards causing USD billions in damages and thousands of fatalities each year. Significant population and economic growth during the last several decades have resulted in more people residing in hazardous places. However, consistent national-scale hazard threat assessment techniques reflecting the state of hazard knowledge are not readily available for application in risk and vulnerability assessments. Mapping natural hazard threats is the crucial first step in identifying and implementing threat reduction or mitigation strategies. In this study, we demonstrate applied GIS approaches for creating and synthesizing US hazard threat extents using publicly available data for 15 natural hazards. Individually mapping each threat enables empirically supported intervention development and the building of a Composite Hazard Index (CHI). Summarizing the hazard frequencies provides a novel representation of US hazardousness. Implementing cluster analysis to regionalize US counties based on their underlying hazard characteristics offers insight into hazard threats’ spatial (non-political) natures. The results indicate that the southeast, central plains, and coastal regions of the northeast had high hazard occurrence scores, whereas more moderate hazard scores were observed west of the continental divide. Furthermore, while no place is safe from hazard occurrence, identifying each region’s distinct “hazardousness” can support individualized risk assessments and mitigation intervention development.
APA, Harvard, Vancouver, ISO, and other styles
31

Wald, I., G. Lubin, Y. Holoshitz, D. Muller, E. Fruchter, D. S. Pine, D. S. Charney, and Y. Bar-Haim. "Battlefield-like stress following simulated combat and suppression of attention bias to threat." Psychological Medicine 41, no. 4 (November 26, 2010): 699–707. http://dx.doi.org/10.1017/s0033291710002308.

Full text
Abstract:
BackgroundAcute stress disorder involves prominent symptoms of threat avoidance. Preliminary cross-sectional data suggest that such threat-avoidance symptoms may also manifest cognitively, as attentional threat avoidance. Confirming these findings in a longitudinal study might provide insights on risk prediction and anxiety prevention in traumatic exposures.MethodAttention-threat bias and post-traumatic symptoms were assessed in soldiers at two points in time: early in basic training and 23 weeks later, during advanced combat training. Based on random assignment, the timing of the repeat assessment occurred in one of two schedules: for a combat simulation group, the repeat assessment occurred immediately following a battlefield simulation exercise, and for a control group, the assessment occurred shortly before this exercise.ResultsBoth groups showed no threat-related attention bias at initial assessments. Following acute stress, the combat simulation group exhibited a shift in attention away from threat whereas the control group showed no change in attention bias. Stronger threat avoidance in the combat simulation group correlated with severity of post-traumatic symptoms. Such an association was not found in the control group.ConclusionsAcute stress may lead some individuals to shift their attention away from threats, perhaps to minimize stress exposure. This acute attention response may come at a psychological cost, given that it correlates with post-traumatic stress disorder (PTSD) symptoms. Further research is needed to determine how these associations relate to full-blown PTSD in soldier and civilian populations.
APA, Harvard, Vancouver, ISO, and other styles
32

Battisti, Corrado, Marisa Perchinelli, Sharon Vanadia, Pietro Giovacchini, and Letizia Marsili. "Monitoring Effectiveness of an Operational Project on Two Threatened Landbirds: Applying a Before–After Threat Analysis and Threat Reduction Assessment." Land 12, no. 2 (February 12, 2023): 464. http://dx.doi.org/10.3390/land12020464.

Full text
Abstract:
Human activities are at the origin of anthropogenic threats altering ecosystems at any hierarchical level. To mitigate them, environmental managers develop projects to obtain effective outcomes on biological targets of conservation concern. Here, we carried out two new approaches (TAN = Threat Analysis and TRA = Threat Reduction Assessment) aimed at assessing the effectiveness of conservation actions on two threatened beach-nesting landbird species, the Kentish Plover (Charadrius alexandrinus) and the Little Ringed Plover (C. dubius), breeding along a coastal beach of central Italy. Using a score-based evaluation (TAN approach), a panel of experts assessed the extent, intensity, and magnitude of a set of species-specific threats, ranking them from more to less impacting. Domestic dogs, dune trampling, and synanthropic predators appeared as the threats with the most significant magnitudes. Using the TRA approach, experts obtained a rank of threats that were more urgent to solve: i.e., domestic dogs and dune trampling. To contrast with these threats, in 2021, we carried out a conservation project with specific measures that were aimed at reducing the threat magnitude on birds. They included: dune borders demarcation, anti-predatory cages on plover nests, the removal of beach-stranded fishing lines and hooks, field surveillance by volunteers, dog control, social- and mass-media communication, and alliances with stakeholders and institutions. After the project, mechanical beach grooming (>80%), dune trampling, and synanthropic predators (both >60%) showed the highest percentage of impact reduction. The project showed a medium–high level of effectiveness in reducing the total threat magnitude (TRA-I index = 63.08%). The Threat Analysis should be routinely used to arrange a causal chain that is useful for defining the relationships among human-induced threats and ecological targets, selecting the threats with the highest magnitudes. After the projects, the Threat Reduction Assessment may assess the level of threat reduction, suggesting measures for adaptive management.
APA, Harvard, Vancouver, ISO, and other styles
33

Cao, Yuan, Ying-Xin Kou, An Xu, and Zhi-Fei Xi. "Target Threat Assessment in Air Combat Based on Improved Glowworm Swarm Optimization and ELM Neural Network." International Journal of Aerospace Engineering 2021 (October 6, 2021): 1–19. http://dx.doi.org/10.1155/2021/4687167.

Full text
Abstract:
Target threat assessment technology is one of the key technologies of intelligent tactical aid decision-making system. Aiming at the problem that traditional beyond-visual-range air combat threat assessment algorithms are susceptible to complex factors, there are correlations between assessment indicators, and accurate and objective assessment results cannot be obtained. A target threat assessment algorithm based on linear discriminant analysis (LDA) and improved glowworm swarm optimization (IGSO) algorithm to optimize extreme learning machine (ELM) is proposed in this paper. Firstly, the linear discriminant analysis method is used to classify the threat assessment indicators, eliminate the correlation between the assessment indicators, and achieve dimensionality reduction of the assessment indicators. Secondly, a prediction model with multiple parallel extreme learning machines as the core is constructed, and the input weights and thresholds of extreme learning machines are optimized by the improved glowworm swarm optimization algorithm, and the weighted integration is carried out according to the training level of the kernel. Then, the threat assessment index functions of angle, speed, distance, altitude, and air combat capability are constructed, respectively, and the sample data of air combat target threat assessment are obtained by combining the structure entropy weight method. Finally, the air combat data is selected from the air combat maneuvering instrument (ACMI), and the accuracy and real-time performance of the LDA-IGSO-ELM algorithm are verified through simulation. The results show that the algorithm can quickly and accurately assess target threats.
APA, Harvard, Vancouver, ISO, and other styles
34

Cao, YanYan, Jingzhen Yang, Marizen Ramirez, and Corinne Peek-Asa. "Characteristics of Workplace Threats Requiring Response From a University Threat Assessment Team." Journal of Occupational and Environmental Medicine 55, no. 1 (January 2013): 45–51. http://dx.doi.org/10.1097/jom.0b013e31826bb66a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Pavlík, Lukáš, Martin Ficek, and Jakub Rak. "Dynamic Assessment of Cyber Threats in the Field of Insurance." Risks 10, no. 12 (November 22, 2022): 222. http://dx.doi.org/10.3390/risks10120222.

Full text
Abstract:
The area of digital technologies is currently the subject of many cyber threats, the frequency of which is increasing. One of the areas of cyber security is also the creation of models and estimates of the process of cyber threats and their possible financial impacts. However, some studies show that cyber-threat assessment to identify potential financial impacts for organizations is a very challenging process. A relatively large problem here is the detection of scenarios of cyber threats and their expression in time. This paper focuses on the design of an algorithm that can be applied to the field of cyber-threat assessment in order to express the financial impacts. The study is based on an in-depth analysis of the insurance industry. The results obtained in our research show the importance of the time perspective for determining the potential financial impacts of cyber threats for the field of insurance.
APA, Harvard, Vancouver, ISO, and other styles
36

Schaad, N. W., J. Abrams, L. V. Madden, R. D. Frederick, D. G. Luster, V. D. Damsteegt, and A. K. Vidaver. "An Assessment Model for Rating High-Threat Crop Pathogens." Phytopathology® 96, no. 6 (June 2006): 616–21. http://dx.doi.org/10.1094/phyto-96-0616.

Full text
Abstract:
Natural, accidental, and deliberate introductions of nonindigenous crop pathogens have become increasingly recognized as threats to the U.S. economy. Given the large number of pathogens that could be introduced, development of rapid detection methods and control strategies for every potential agent would be extremely difficult and costly. Thus, to ensure the most effective direction of resources a list of high-threat pathogens is needed. We address development of a pathogen threat assessment model based on the analytic hierarchy process (AHP) that can be applied world-wide, using the United States as an illustrative example. Previously, the AHP has been shown to work well for strategic planning and risk assessment. Using the collective knowledge of subject matter expert panels incorporated into commercial decision-making software, 17 biological and economic criteria were determined and given weights for assessing the threat of accidental or deliberately introduced pathogens. The rating model can be applied by experts on particular crops to develop threat lists, especially those of high priority, based on the current knowledge of individual diseases.
APA, Harvard, Vancouver, ISO, and other styles
37

Graney, Daniel. "Behavioral Intervention Teams Using Threat Assessment." Journal of Campus Behavioral Intervention 2 (November 1, 2014): 48–63. http://dx.doi.org/10.17732/jbit2014/4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

LI Jiang, 李姜, and 郭立红 GUO Li-hong. "Target threat assessment using improved SVM." Optics and Precision Engineering 22, no. 5 (2014): 1354–62. http://dx.doi.org/10.3788/ope.20142205.1354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Satpute, Sanjay V. "Biodiversity Threat Assessment of Ethnomedicinal Plants." International Journal of Scientific and Research Publications (IJSRP) 10, no. 2 (February 24, 2020): p9868. http://dx.doi.org/10.29322/ijsrp.10.02.2020.p9868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Badey, T. J. "Nuclear Terrorism: Actor-based Threat Assessment." Intelligence and National Security 16, no. 2 (June 2001): 39–54. http://dx.doi.org/10.1080/714002889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Harris, Andrew J., and Arthur J. Lurigio. "Threat Assessment and Law Enforcement Practice." Journal of Police Crisis Negotiations 12, no. 1 (May 2012): 51–68. http://dx.doi.org/10.1080/15332586.2012.645375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Lele, A. V. "Biological terrorism: Threat and risk assessment." Strategic Analysis 26, no. 3 (July 2002): 341–55. http://dx.doi.org/10.1080/09700160208450051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hoquante, Marine, Morgane Sanselme, Ivo B. Rietveld, and Gérard Coquerel. "Disappearing Conglomerates, Assessment of the Threat." Crystal Growth & Design 19, no. 12 (October 25, 2019): 7396–401. http://dx.doi.org/10.1021/acs.cgd.9b01316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Louvar Reeves, Melissa A., and Stephen E. Brock. "School Behavioral Threat Assessment and Management." Contemporary School Psychology 22, no. 2 (October 4, 2017): 148–62. http://dx.doi.org/10.1007/s40688-017-0158-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

McCarthy, Claudine. "Improve behavioral intervention, threat assessment efforts." Campus Security Report 11, no. 10 (January 21, 2015): 1–6. http://dx.doi.org/10.1002/casr.30020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Kirenko, Serhii. "Problems of criminal-legal assessment of mental violence." Slovo of the National School of Judges of Ukraine, no. 1(34) (July 5, 2021): 128–39. http://dx.doi.org/10.37566/2707-6849-2021-1(34)-11.

Full text
Abstract:
The article examines the problems of criminal law assessment of mental violence. The author draws attention to the fact that the current criminal legislation in some cases does not contain an adequate criminal law assessment of socially dangerous encroachment on the human psyche, limited to indications of threats, deception or abuse of trust, humiliation and dignity, which do not exhaust the meaning of «mental violence». At the same time, Articles 129 and 185 of the Criminal Code leave out a number of important points outside the legislative attention. For example, Art. 129 of the Criminal Code of Ukraine provides for liability for the threat of murder, but does not provide for liability for the threat of harm to the health of a person, if there were grounds to fear the threat, which is unlikely because the threat caused serious suffering to a person who fears not only for his life, but also for health. Article 189 of the Criminal Code of Ukraine limits the range of addressees of relevant threats only to the victim and his close relatives and leaves out of the sphere of protection of other persons who are close to the victim, but are not his close relatives (brides, friends). Also, the current Criminal Code does not address at the regulatory level such types of mental violence as hypnosis, suggestion, etc. methods of human manipulation (including the use of technical means), which are used to inflict various harm to the person and his interests. The author proposes to make changes and additions to the Criminal Code, which will eliminate the above gaps in the legislation. In particular, it is proposed to supplement Art. 129 of the Criminal code of Ukraine by the instruction on threat of harm to health of the person, in Art. 189 the words «close relatives» should be replaced by «close persons», and it is also proposed to supplement the Criminal Code of Ukraine with a new article, which will establish responsibility for manipulating the human psyche. Keywords: human psyche, manipulation, criminal-legal assessment.
APA, Harvard, Vancouver, ISO, and other styles
47

Sadono, Mahardi, Saphira Alifa Harahap, Dani Yulianto Putra, Randhy Randhy, and Muhamad Luthfi Imam Nurhakim. "Risk Assessment Approach in Airport Security." INSIST 2, no. 2 (January 25, 2019): 84. http://dx.doi.org/10.23960/ins.v2i2.86.

Full text
Abstract:
Naturally, the threat to flight is generated from all activities at the airport by passenger or freight. With the growth of air transport, the level of threat to flight activity will also increase. Due to ensure the security of passengers, staff, and all elements of the airport, the airport as a place of the flight operations need a reliable protection system. The purpose of this study is to develop a methodology for assessing the risk level at the airport in order to improve the level of protection at the airport. The level of threats that could jeopardize airport security is categorized into several levels, then analyzed to what extent the risk level can be tolerated as a reference to the formulation of standard protection systems at the airport. The results of this study can be used to deal with threats that occur in the airport through preventive action by setting up a reliable protection system. The risk assessment approach also able to evaluate the airport's existing protection system whether it is tolerable to deal with threats or not, so action can be taken to improve the protection system if the failure rate is still high and have massive consequences to the all airport elements.Keywords— airport security, failure rate, protection system, risk assessment, tolerable risk level.
APA, Harvard, Vancouver, ISO, and other styles
48

Giovacchini, Pietro, Corrado Battisti, and Letizia Marsili. "Evaluating the Effectiveness of a Conservation Project on Two Threatened Birds: Applying Expert-Based Threat Analysis and Threat Reduction Assessment in a Mediterranean Wetland." Diversity 14, no. 2 (January 28, 2022): 94. http://dx.doi.org/10.3390/d14020094.

Full text
Abstract:
We applied two recent approaches largely used in biological conservation: Threat Analysis (TAN) and Threat Reduction Assessments (TRAs), assessing the effectiveness of a project focused on two water-related bird species (common tern, Sterna hirundo and little tern, Sternula albifrons), commonly breeding in some wetlands of Italy. We used the IUCN standardized lexicon for the classification of threats, utilizing a panel of experts to assess a set of regime attributes (extent, severity and magnitude) of each human-induced disturbance. Our aims were: (i) through the TAN approach, to carry out an arrangement and quantification of the main threats acting on our focal species and select the priority ones; (ii) through the TRA approach, to test the effectiveness of an operational project focused on mitigating the threats and improving the breeding success of species (i.e., building rafts and floating islands to encourage their nesting). Using the TAN approach, experts identified the following human-induced threats (IUCN code): 6.1—Generic disturbance; 7.2—Water stress; 7.3—Salinization; 8.8—Vagrant dogs; 8.8—Mediterranean gulls; 8.8—Wild boars, all significantly different in their magnitude. Among them, wild boars and Mediterranean gulls appeared the priority threats with the greatest extent, intensity and magnitude. Using the TRA approach, after the project, we assessed an overall decrease in the threat magnitude of 23.08% (21.42% when considering only the threats directly affected by our project). These data suggest that further efforts should be devoted to achieving greater effectiveness of conservation actions focused on our target species. With limited time and resources to quantify threats, expert-based approaches could be useful for rapidly assessing the effectiveness of small conservation projects by providing a range of scores obtained following an analytical procedure. In this regard, Threat Analysis and Threat Reduction Assessment could be considered useful tools to support adaptive management in project management cycles.
APA, Harvard, Vancouver, ISO, and other styles
49

Sharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand, and Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment." Electronics 10, no. 15 (July 31, 2021): 1849. http://dx.doi.org/10.3390/electronics10151849.

Full text
Abstract:
Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an organisation and company’s business seem to need that information security exercise to unambiguously and effectively handle the threat agent’s attacks. How is this unambiguous and effective way in the present-day state of information security practice working? Given the prevalence of threats in the modern information environment, it is essential to guarantee the security of national information infrastructure. However, the existing models and methodology are not addressing the attributes of threats like motivation, opportunity, and capability (C, M, O), and the critical threat intelligence (CTI) feed to the threat agents during the penetration process is ineffective, due to which security assurance arises for an organisation and the business of companies. This paper proposes a semi-automatic information security model, which can deal with situational awareness data, strategies prevailing information security activities, and protocols monitoring specific types of the network next to the real-time information environment. This paper looks over analyses and implements the threat assessment of network traffic in one particular real-time informational environment. To achieve this, we determined various unique attributes of threat agents from the Packet Capture Application Programming Interface (PCAP files/DataStream) collected from the network between the years 2012 and 2019. We used hypothetical and real-world examples of a threat agent to evaluate the three different factors of threat agents, i.e., Motivation, Opportunity, and Capability (M, O, C). Based on this, we also designed and determined the threat profiles, critical threat intelligence (CTI), and complexity of threat agents that are not addressed or covered in the existing threat agent taxonomies models and methodologies.
APA, Harvard, Vancouver, ISO, and other styles
50

Kurzman, Charles, Ahsan Kamal, and Hajar Yazdiha. "Ideology and Threat Assessment: Law Enforcement Evaluation of Muslim and Right-Wing Extremism." Socius: Sociological Research for a Dynamic World 3 (January 1, 2017): 237802311770477. http://dx.doi.org/10.1177/2378023117704771.

Full text
Abstract:
Does ideology affect assessment of the threat of violent extremism? A survey of law enforcement agencies in the United States in 2014 offers a comparison suggesting a small but statistically significant effect: Political attitudes were correlated with assessment of threats posed by Muslim extremists, and threat assessment was not correlated with the number of Muslim Americans who had engaged in violent extremism within the agency’s jurisdiction. By contrast, the perceived threat of right-wing terrorism was correlated with the number of incidents of right-wing violence and not with political attitudes. These findings reflect the context of growing polarization of attitudes toward Muslims in the United States as well as the challenge of bringing counterterrorism policies into proportion with the actual scale of violent extremism.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography