To see the other types of publications on this topic, follow the link: Threats to environment.

Journal articles on the topic 'Threats to environment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Threats to environment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yao, Min, and Min Zhao. "Unmanned aerial vehicle dynamic path planning in an uncertain environment." Robotica 33, no. 3 (2014): 611–21. http://dx.doi.org/10.1017/s0263574714000514.

Full text
Abstract:
SUMMARYAn unmanned aerial vehicle (UAV) dynamic path planning method is proposed to avoid not only static threats but also mobile threats. The path of a UAV is planned or modified by the potential trajectory of the mobile threat, which is predicted by its current position, velocity, and direction angle, because the positions of the UAV and mobile threat are dynamically changing. In each UAV planning path, the UAV incurs some costs, including control costs to change the direction angle, route costs to bypass the threats, and threat costs to acquire some probability to be destroyed by threats. T
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Iris M., and Joshua M. Ackerman. "The Infectiousness of Crowds: Crowding Experiences Are Amplified by Pathogen Threats." Personality and Social Psychology Bulletin 45, no. 1 (2018): 120–32. http://dx.doi.org/10.1177/0146167218780735.

Full text
Abstract:
People sometimes perceive social environments as unpleasantly crowded. Previous work has linked these experiences to incidental factors such as being hungry or hot and to the relevance of the social environment for an individual’s current goals. Here, we demonstrate that crowding perceptions and evaluations also depend on specific, active threats for perceivers. Eight studies test whether infectious disease threats, which are associated with crowded conditions, increase such reactions. Across studies, pathogen threat made dense social environments seem more crowded and generated more negative
APA, Harvard, Vancouver, ISO, and other styles
3

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Full text
Abstract:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are an
APA, Harvard, Vancouver, ISO, and other styles
4

D'yakonova, Iryna, Alina Nikitina, and Natalja Gurvits. "Improvement of the enterprise economic security management in global environment." Geopolitics under Globalization 2, no. 1 (2018): 19–26. http://dx.doi.org/10.21511/gg.02(1).2018.03.

Full text
Abstract:
The basic features of enterprise economic security management are determined. It is proved that the system of enterprise economic security should be considered from the point of view of the impact on it of a multitude of various threats which ensure this system functioning and entering into contradiction with other elements of the system. An improved approach to the management of enterprise economic security is proposed in the global environment. The necessity of further and deeper study of the flow of such destructive and destabilizing phenomena is substantiated because such threats can cause
APA, Harvard, Vancouver, ISO, and other styles
5

Smolders, A. J. P., E. C. H. E. T. Lucassen, and J. G. M. Roelofs. "The isoetid environment: biogeochemistry and threats." Aquatic Botany 73, no. 4 (2002): 325–50. http://dx.doi.org/10.1016/s0304-3770(02)00029-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tsymbrivskyy, Taras. "Cyber threats and global business environment." Law Review 16, no. 2 (2017): 17–33. http://dx.doi.org/10.7220/2029-4239.16.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Theron, Julien. "Networks of Threats: Interconnection, Interaction, Intermediation." Journal of Strategic Security 14, no. 3 (2021): 45–69. http://dx.doi.org/10.5038/1944-0472.14.3.1942.

Full text
Abstract:
The rapidly changing global security environment requires to constantly adapt our understanding of threats. The findings of this paper confirm that threats interact with each other on three levels. Security, conflict, war, and strategic studies converge to build a new qualitative theoretical framework for threat analysis. Shaping the global security environment, threats communicate on three levels. Firstly, the interconnection of agents with similar ideological and/or strategic motivations connects threats. Secondly, interaction exacerbates incidental threats through cooperation, competition,
APA, Harvard, Vancouver, ISO, and other styles
8

Ji, Wan Feng, Hai Feng Xu, Guang Yuan Wang, and Xiang Hong Yang. "Path Planning under Dynamic Threat Environment." Applied Mechanics and Materials 543-547 (March 2014): 1790–94. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.1790.

Full text
Abstract:
This paper studies the solution to combat aircrafts path planning problem in confrontational battle space. First of all, according to the dynamic movement characteristics of emergent threats, a path planning target function model is built based on dynamic threat; then based on the defects of basic genetic algorithm, a kind of improved genetic algorithm based on predatory search strategies is further designed; finally the model and the algorithm are tested effective by simulation verification.
APA, Harvard, Vancouver, ISO, and other styles
9

Vidalis, Stilianos, Andy Jones, and Andrew Blyth. "Assessing cyber-threats in the information environment." Network Security 2004, no. 11 (2004): 10–16. http://dx.doi.org/10.1016/s1353-4858(04)00156-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rowe, Paul. "VOIP - extra threats in the converged environment." Network Security 2005, no. 7 (2005): 12–16. http://dx.doi.org/10.1016/s1353-4858(05)70260-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Parn, Erika A., and David Edwards. "Cyber threats confronting the digital built environment." Engineering, Construction and Architectural Management 26, no. 2 (2019): 245–66. http://dx.doi.org/10.1108/ecam-03-2018-0101.

Full text
Abstract:
Purpose Smart cities provide fully integrated and networked connectivity between virtual/digital assets and physical building/infrastructure assets to form digital economies. However, industrial espionage, cyber-crime and deplorable politically driven cyber-interventions threaten to disrupt and/or physically damage the critical infrastructure that supports national wealth generation and preserves the health, safety and welfare of the populous. The purpose of this paper is to present a comprehensive review of cyber-threats confronting critical infrastructure asset management reliant upon a comm
APA, Harvard, Vancouver, ISO, and other styles
12

Syomych, Mykola. "Management of organizational and legal security in the formation of competitiveness of agricultural business entities." Actual problems of innovative economy, no. 3 (May 30, 2019): 75–82. http://dx.doi.org/10.36887/2524-0455-2019-3-11.

Full text
Abstract:
Introduction. The functioning of agrarian business entities is constantly influenced by external and internal envi-ronmental factors, some of which threaten its organizational and legal security. Given the novelty of investigated security, the issue of determination threats in this area, identifying management tools, methods, and strategies is relevant, as it allows us to consider enterprise security more broadly than in the traditional economic sense. The purpose of the study is to identify the main tools for managing organizational and legal security and to develop a scheme for preventive ma
APA, Harvard, Vancouver, ISO, and other styles
13

VLASOV, Maksim V., Ol'ga N. BUCHINSKAYA, and Vasilii V. SUKHIKH. "Digital environment of trust." Economic Analysis: Theory and Practice 20, no. 7 (2021): 1343–67. http://dx.doi.org/10.24891/ea.20.7.1343.

Full text
Abstract:
Subject. The paper analyzes the digital environment of trust, its role in processes of digitalization of economic relationships, problems of trust, arising during the use of digital tools in the society. Objectives. The purpose is to perform a theoretical analysis of the digital environment of trust, identify and study external and internal factors affecting the emergence and strengthening of threats to the digital environment of trust, develop proposals to reduce these threats. Methods. We apply general scientific methods of knowledge, systems approach, methodological tools of institutional t
APA, Harvard, Vancouver, ISO, and other styles
14

Flieger, Jolanta, and Michał Flieger. "Ionic Liquids Toxicity—Benefits and Threats." International Journal of Molecular Sciences 21, no. 17 (2020): 6267. http://dx.doi.org/10.3390/ijms21176267.

Full text
Abstract:
Ionic liquids (ILs) are solvents with salt structures. Typically, they contain organic cations (ammonium, imidazolium, pyridinium, piperidinium or pyrrolidinium), and halogen, fluorinated or organic anions. While ILs are considered to be environmentally-friendly compounds, only a few reasons support this claim. This is because of high thermal stability, and negligible pressure at room temperature which makes them non-volatile, therefore preventing the release of ILs into the atmosphere. The expansion of the range of applications of ILs in many chemical industry fields has led to a growing thre
APA, Harvard, Vancouver, ISO, and other styles
15

Pywell, M. "A question of survival – military aircraft vs the electromagnetic environment." Aeronautical Journal 108, no. 1087 (2004): 453–64. http://dx.doi.org/10.1017/s0001924000000270.

Full text
Abstract:
Abstract Military aircraft, by definition, need to survive the onslaught of opposing forces to successfully complete their mission. From an aircraft perspective, the electromagnetic (EM) environment can be an enabler, via the use of navigation aids, radar, radio communications etc. – in fact mission success depends on its successful use. However, this environment is also potentially a disabler, as threat weapon systems and the environment itself can harm or destroy the aircraft. This paper discusses risks and hazards thus posed to aircraft survivability, partitioned into two classes – ‘direct’
APA, Harvard, Vancouver, ISO, and other styles
16

Pendergrass, John C., Karen Heart, C. Ranganathan, and V. N. Venkatakrishnan. "A Threat Table Based Assessment of Information Security in Telemedicine." International Journal of Healthcare Information Systems and Informatics 9, no. 4 (2014): 20–31. http://dx.doi.org/10.4018/ijhisi.2014100102.

Full text
Abstract:
Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is needed to ensure, among other things, the privacy of patient information. This paper proposes a threat table approach to assess security threats pertaining to telemedicine applications. The concept and its usefulness are illustrated using a case study. This case study focuses on the capture and representation of salient security threats in tele
APA, Harvard, Vancouver, ISO, and other styles
17

Pardue, Harold, Jeffrey P. Landry, and Alec Yasinsac. "E-Voting Risk Assessment." International Journal of Information Security and Privacy 5, no. 3 (2011): 19–35. http://dx.doi.org/10.4018/jisp.2011070102.

Full text
Abstract:
Approximately 25% (according to http://verifiedvoting.com/) of voting jurisdictions use direct recording electronic systems to record votes. Accurate tabulation of voter intent is critical to safeguard this fundamental act of democracy: voting. Electronic voting systems are known to be vulnerable to attack. Assessing risk to these systems requires a systematic treatment and cataloging of threats, vulnerabilities, technologies, controls, and operational environments. This paper presents a threat tree for direct recording electronic (DRE) voting systems. The threat tree is organized as a hierarc
APA, Harvard, Vancouver, ISO, and other styles
18

Sharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand, and Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment." Electronics 10, no. 15 (2021): 1849. http://dx.doi.org/10.3390/electronics10151849.

Full text
Abstract:
Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an organisation and company’s business seem to need that information security exercise to unambiguously and effectively handle the threat agent’s attacks. How is this unambiguous and effective way in the present-day state of information security practice working? Given the prevalence of threats in the modern information environment, it is essential to
APA, Harvard, Vancouver, ISO, and other styles
19

Ustyuzhanina, Elena V., and Sergey G. Evsukov. "DIGITALIZATION OF THE EDUCATIONAL ENVIRONMENT: OPPORTUNITIES AND THREATS." Vestnik of the Plekhanov Russian University of Economics, no. 1 (February 12, 2018): 3–12. http://dx.doi.org/10.21686/2413-2829-2018-1-3-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Durbin, Steve. "Tackling converged threats: building a security-positive environment." Network Security 2011, no. 6 (2011): 5–8. http://dx.doi.org/10.1016/s1353-4858(11)70061-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Slavkovic, Rade, and Dejan Krsljanin. "Impact of the operational environment on cyber threats." Vojno delo 67, no. 5 (2015): 333–56. http://dx.doi.org/10.5937/vojdelo1505333s.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Han, Jung-Soo. "Security Threats in the Mobile Cloud Service Environment." Journal of Digital Convergence 12, no. 5 (2014): 263–69. http://dx.doi.org/10.14400/jdc.2014.12.5.263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Kislyakov, Pavel Aleksandrovich, and Olga Aleksandrovna Silaeva. "THREATS OF SOCIAL SAFETY OF THE EDUCATION ENVIRONMENT." V mire nauchnykh otkrytiy, no. 9.4 (December 22, 2014): 1460. http://dx.doi.org/10.12731/wsd-2014-9.4-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Böse-O’Reilly, Stephan, Ursel Heudorf, Thomas Lob-Corzilius, Karl Ernst v. Mühlendahl, Matthias Otto, and Sabine Schmidt. "Children's environment in Central Europe: Threats and chances." International Journal of Hygiene and Environmental Health 210, no. 5 (2007): 503–7. http://dx.doi.org/10.1016/j.ijheh.2007.07.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pereira, Paulo, Damià Barceló, and Panos Panagos. "Soil and water threats in a changing environment." Environmental Research 186 (July 2020): 109501. http://dx.doi.org/10.1016/j.envres.2020.109501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ko, Eunhye, Taeeun Kim, and Hwankuk Kim. "Management platform of threats information in IoT environment." Journal of Ambient Intelligence and Humanized Computing 9, no. 4 (2017): 1167–76. http://dx.doi.org/10.1007/s12652-017-0581-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Schreurs, Miranda A. "Global Environment Threats and a Divided Northern Community." International Environmental Agreements: Politics, Law and Economics 5, no. 3 (2005): 349–76. http://dx.doi.org/10.1007/s10784-005-3809-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Naseem, Afshan, and Yasir Ahmad. "Critical Success Factors for Neutralization of Airborne Threats." SAGE Open 10, no. 3 (2020): 215824402096306. http://dx.doi.org/10.1177/2158244020963066.

Full text
Abstract:
Decisions regarding neutralizing airborne threats in the combat environment require comprehensive knowledge of resources at hand and enemy intentions. The complexity of the situation has resulted in the emergence of various models encompassing important factors of threat neutralization. Various characteristics of airborne threats considered important for their assessment have already been identified in previous literature, which include speed, distance, approach angle, maneuverability, and so on. Due to the possible extent of loss to critical assets, literature has emphasized on identifying as
APA, Harvard, Vancouver, ISO, and other styles
29

Han, Ooi Wei, Shahrizal Ide Moslin, and Wan Aminullah. "GNSS Interference Environment in Malaysia: A Case Study." Journal of Engineering Technology and Applied Physics 3, no. 1 (2021): 13–16. http://dx.doi.org/10.33093/jetap.2021.3.1.3.

Full text
Abstract:
Global Navigation Satellite Systems or GNSS is a space technology that has become an essential element nowadays for positioning, navigation & timing (PNT) with wide range of applications in many civilian sectors as well as across military. The reliability, accuracy and availability of GNSS are highly important especially for critical and precise positioning applications. However, the signals from space are weak and it can be easily blocked, disrupted or compromised by several other threats including intentional and unintentional interferences or jamming. GPS jammer is widely available off
APA, Harvard, Vancouver, ISO, and other styles
30

VimalRosy, J., and S. Britto Ramesh Kumar. "Security Threats in Cloud Computing." Asian Journal of Computer Science and Technology 8, S1 (2019): 80–83. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1946.

Full text
Abstract:
Day by day witnesses a wide development of information technology in the use of cloud computing, and its services shape its architecture. It is indeed, that replaces the former attempts to enrich the security strategy in cloud computing. Security is one of the major issues in the cloud computing environment. In this paper we investigate about security threads and possible solution for cloud. The paper is categorized as follows: Section I describes the cloud computing overview. Section II describes the security threats and challenges in cloud computing. Section III describes the Obstacles and v
APA, Harvard, Vancouver, ISO, and other styles
31

Uskov, Vladislav, and Irina Reshetnikova. "Problems of the model of managing the integrated risk assessment for humans and environment in construction activities." MATEC Web of Conferences 265 (2019): 07003. http://dx.doi.org/10.1051/matecconf/201926507003.

Full text
Abstract:
The article discusses the risk assessment methods, the influence of safety threats on the occurrence and likelihood of risks, the difficulties encountered before risk assessment, raises issues of planning and extent of the construction entity's influence on risk assessment and construction protection. Particular attention is paid to the processing of results and analysis of threat assessment. An assumption is made that planning can be used as a risk assessment tool, and a way of using this tool to protect against emerging threats is suggested.
APA, Harvard, Vancouver, ISO, and other styles
32

Буров, Олександр, Олександр Бутнік-Сіверський, Олена Орлюк, and Катерина Горська. "CYBERSECURITY AND INNOVATIVE DIGITAL EDUCATIONAL ENVIRONMENT." Information Technologies and Learning Tools 80, no. 6 (2020): 414–30. http://dx.doi.org/10.33407/itlt.v80i6.4159.

Full text
Abstract:
The article considers interaction of innovation, cybersecurity, and digital education environment. It has been demonstrated that comprehensive digitalization of society is being accompanied by changes in the innovative potential and educational needs of Ukraine, especially in the development of the human intellectual capital and its protection in the digital environment. Human capital in innovation plays a significant role, especially in the digital age. Young people are considered as a vulnerable group that could be the main goal of cyber cognitive operations and as the weakest link of the Sy
APA, Harvard, Vancouver, ISO, and other styles
33

Bagheri, Zahra M., Callum G. Donohue, and Jan M. Hemmi. "Evidence of predictive selective attention in fiddler crabs during escape in the natural environment." Journal of Experimental Biology 223, no. 21 (2020): jeb234963. http://dx.doi.org/10.1242/jeb.234963.

Full text
Abstract:
ABSTRACTSelective attention is of fundamental relevance to animals for performing a diversity of tasks such as mating, feeding, predation and avoiding predators. Within natural environments, prey animals are often exposed to multiple, simultaneous threats, which significantly complicates the decision-making process. However, selective attention is rarely studied in complex, natural environments or in the context of escape responses. We therefore asked how relatively simple animals integrate the information from multiple, concurrent threatening events. Do they identify and respond only to what
APA, Harvard, Vancouver, ISO, and other styles
34

Hamad, Mohammad, and Vassilis Prevelakis. "SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study." Information 11, no. 5 (2020): 273. http://dx.doi.org/10.3390/info11050273.

Full text
Abstract:
In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environment. While these improvements have increased the safety and incontestability of the automotive system, they have opened the door for new potential security threats which need to be defined, assessed, and mitigated. The SAE J3061 standard has defined threat modeling as a critical step toward the secure development process for vehicle systems, but it d
APA, Harvard, Vancouver, ISO, and other styles
35

Aljammal, Ashraf Hamdan, Hani Bani-Salameh, Ayoub Alsarhan, Mohammad Kharabsheh, and Mamoon Obiedat. "Node Verification to Join the Cloud Environment Using Third Party Verification Server." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 4 (2017): 55. http://dx.doi.org/10.3991/ijim.v11i4.6501.

Full text
Abstract:
<strong>Currently, cloud computing is facing different types of threats whether from inside or outside its environment. This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique is proposed to make sure that the new node which asks to join the cloud is not composing a threat on the cloud environment. Our new technique checks the node before it will be guaranteed to join the cloud whether it runs malwares or software that could be used to launch an attack. In this way the cloud will allow only the clean node t
APA, Harvard, Vancouver, ISO, and other styles
36

Zhang, Zhe, Jian Wu, Jiyang Dai, and Cheng He. "Rapid Penetration Path Planning Method for Stealth UAV in Complex Environment with BB Threats." International Journal of Aerospace Engineering 2020 (August 1, 2020): 1–15. http://dx.doi.org/10.1155/2020/8896357.

Full text
Abstract:
This paper presents the flight penetration path planning algorithm in a complex environment with Bogie or Bandit (BB) threats for stealth unmanned aerial vehicle (UAV). The emergence of rigorous air defense radar net necessitates efficient flight path planning and replanning for stealth UAV concerning survivability and penetration ability. We propose the improved A-Star algorithm based on the multiple step search approach to deal with this uprising problem. The objective is to achieve rapid penetration path planning for stealth UAV in a complex environment. Firstly, the combination of single-b
APA, Harvard, Vancouver, ISO, and other styles
37

Rodin, Y. S., and I. P. Sinitsyn. "Security basic model for applied tasks of the distributed information system." PROBLEMS IN PROGRAMMING, no. 2 (June 2021): 016–23. http://dx.doi.org/10.15407/pp2021.02.016.

Full text
Abstract:
The tasks of modelling and the components of the basic model of applied task protection of a distributed information system have been considered. The measurement and relationship of security parameters, protection, new and reference attacks, anomalies, and threat environments have been proposed. The conditions of threats, attacks and, consequently, inconsistencies in the results of applied tasks are proved. At the beginning of the article the concept of a distributed information system, system of applied tasks, modern trends of zero-trust architecture in building information security systems a
APA, Harvard, Vancouver, ISO, and other styles
38

Voskanyan, Y. E. "Modern principles of management of patient safety (systematic review)." Sechenov Medical Journal, no. 3 (September 30, 2018): 17–24. http://dx.doi.org/10.47093/2218-7332_2018.3.17-24.

Full text
Abstract:
The article analyzes the research works devoted to the study of principles of management of patient safety. Used medical databases MEDLINE, Cochrane Collaboration, EMBASE, SCOPE, ISI Web of Science for the period 1991-2017. In most studies a strict sequence of origin of the harm associated with healthcare management (adverse event or unintended injury), which is based on constant system of causes - latent threats, is shown. The development of an adverse event begins with the activation of the latent threat and turning it into an active threat of group 1 (dangerous situation), which is the caus
APA, Harvard, Vancouver, ISO, and other styles
39

El-Khouly, Mahmoud M., and Samir Abou El-Seoud. "Malware Detection in Cloud Environment (MDCE)." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 139. http://dx.doi.org/10.3991/ijim.v11i2.6575.

Full text
Abstract:
Since cloud computing technology is growing day by day, it comes with many security problems, especially from threats such as malware. As more services migrate to the cloud architecture, the cloud will become a more appealing target for cyber criminals. In this paper, we present the current threats to the cloud environment, and the proposed detection systems for malware in the cloud environment. We then present a multiple detection system that is aimed at combating the spread of malware by cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
40

Liudmila, Baeva. "Ethical Threats and Existential Safety." Social Inquiry: Journal of Social Science Research 2, no. 2 (2020): 103–15. http://dx.doi.org/10.3126/sijssr.v2i2.33056.

Full text
Abstract:
Amidst the development of various manifestations of modern electronic culture, security, communication, and ethics issues are acquiring new features and actualization. An objective of the research is a theoretical analysis of the issues of information ethics in the information and communication environment and threats to existential security. The features of the development of information ethics in electronic culture, associated with a high level of liberalism, utilitarianism, as well as antinomy in solving the problem of freedom and security in the digital environment are revealed. Some ethic
APA, Harvard, Vancouver, ISO, and other styles
41

Kearney, Stephen G., Josie Carwardine, April E. Reside, et al. "The threats to Australia’s imperilled species and implications for a national conservation response." Pacific Conservation Biology 25, no. 3 (2019): 231. http://dx.doi.org/10.1071/pc18024.

Full text
Abstract:
Since European occupation of Australia, human activities have caused the dramatic decline and sometimes extinction of many of the continent’s unique species. Here we provide a comprehensive review of threats to species listed as threatened under Australia’s Environment Protection and Biodiversity Conservation Act 1999. Following accepted global categories of threat, we find that invasive species affect the largest number of listed species (1257 species, or 82% of all threatened species); ecosystem modifications (e.g. fire) (74% of listed species) and agricultural activity (57%) are also import
APA, Harvard, Vancouver, ISO, and other styles
42

van Stralen, Daved, and Thomas Mercer. "Pandemic COVID-19, the High-Reliability Organization (HRO), and the Ecology of Fear." Neonatology Today 15, no. 12 (2020): 129–38. http://dx.doi.org/10.51362/neonatology.today/2020121512129138.

Full text
Abstract:
COVID-19 has changed the social, financial, and political environments for healthcare. Healthcare organizations have abruptly changed operations for a new environment due to pervasive threats to the organization, patients, and healthcare professionals. While the direct, infectious presence of COVID-19 as a threat would seem to cause the greatest stress to the healthcare system, perhaps the absence of the threat may cause more severe and wide-ranging problems. Ecological studies demonstrate a greater decrease in prey populations from the predator’s absence due to an “ecology of fear.” By analog
APA, Harvard, Vancouver, ISO, and other styles
43

Hong, Mi Hwa, and Nam Kyu Kim. "How do external territorial threats affect mass killing?" Journal of Peace Research 56, no. 4 (2019): 529–44. http://dx.doi.org/10.1177/0022343318821707.

Full text
Abstract:
The current scholarship on mass killing demonstrates that genocide and other forms of mass murder are usually policy responses to threats, emphasizing armed conflict and political upheaval, such as revolution, as important causal factors. However, scholars have so far had little to say about the relationship between a country’s external threat environment and mass killing. We argue that a country’s external security environment, particularly when its neighbors pose threats to its territorial integrity, is a critical and understudied factor shaping a leader’s decision to employ mass killing. Ex
APA, Harvard, Vancouver, ISO, and other styles
44

Gong, Seonghyeon, and Changhoon Lee. "Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform." Electronics 10, no. 3 (2021): 239. http://dx.doi.org/10.3390/electronics10030239.

Full text
Abstract:
Advanced information technologies have transformed into high-level services for more efficient use of energy resources through the fusion with the energy infrastructure. As a part of these technologies, the energy cloud is a technology that maximizes the efficiency of energy resources through the organic connection between the entities that produce and consume the energy. However, the disruption or destruction of energy cloud systems through cyberattacks can lead to incidents such as massive blackouts, which can lead to national disasters. Furthermore, since the technique and severity of moder
APA, Harvard, Vancouver, ISO, and other styles
45

Kim, Nam Kyu. "External Territorial Threats and Military Regimes." Political Research Quarterly 72, no. 4 (2018): 863–77. http://dx.doi.org/10.1177/1065912918812743.

Full text
Abstract:
This study argues that sustained threats to homeland territory create an environment conducive to the presence of military regimes. Territorial threats lead to increased levels of militarization and make the military internally unified and cohesive. These developments enhance the military’s capacity for intervening in politics where a strong and autonomous military serves as an institutionalized veto player. Accordingly, collegial military regimes, characterized by a group of high-ranking officers and distinct from military strongman rule in which power is concentrated in the hands of a single
APA, Harvard, Vancouver, ISO, and other styles
46

Bolourchi, Mostafa, and Maryam Bolourchi. "Interaction between Fluid Urban Spaces and Reduction of Vulnerability to Risks and Threats in Urban Crises." Journal of Sustainable Development 10, no. 2 (2017): 143. http://dx.doi.org/10.5539/jsd.v10n2p143.

Full text
Abstract:
Tremendous technological developments in contemporary world have transformed all aspects of human life. Through interaction with these developments, living spaces should correspond to science and technology and serve to satisfy basic human needs especially safety and security. Due to their geographical and political situation, many countries have been exposed to a variety of natural or man-made threats, and have suffered heavy human and financial losses. For that reason, urban developments should make use of digital architecture products and create fluidity in order to modify human living spac
APA, Harvard, Vancouver, ISO, and other styles
47

Mrozowska, Alicja. "CATALOG OF NON-MILITARY RISKS OCCURRING IN MARINE AREAS, WITH SPECIAL CONSIDERATION FOR THREATS GENERATED BY NATURAL CONDITIONS." Rocznik Bezpieczeństwa Morskiego XIV (November 2, 2020): 1–2. http://dx.doi.org/10.5604/01.3001.0014.6070.

Full text
Abstract:
The study indicates that not only the state of an armed conflict which may pose a significant threat to people, and the natural environment, but also non-military events occurring during peace, even during the daily functioning of the state and its citizens. The considered problem is aimed at developing a catalogue of forecasted non-military threats, taking into account the development of already defined threats generated by the forces of nature. In addition, the paper specifies the determinants of the occurring natural hazards, and indicates the areas of par-ticular sensitivity, i.e. the prog
APA, Harvard, Vancouver, ISO, and other styles
48

Henderson, David, Michael Lapke, and Christopher Garcia. "SQL Injection: A Demonstration and Implications for Accounting Students." AIS Educator Journal 11, no. 1 (2016): 1–8. http://dx.doi.org/10.3194/1935-8156-11.1.1.

Full text
Abstract:
ABSTRACT The purpose of this paper is to present a pedagogical case that demonstrates how a prevalent cybersecurity threat, SQL Injection (SQLi), operates. Prompted by questions from students such as: “How do cybersecurity threats work?” and “What specific actions can organizations take to mitigate cybersecurity threats?”, this paper demonstrates the technical inner-working of SQLi. Students first answer background questions on SQLi and then simulate SQLi in both a Microsoft Access and web-based environment.
APA, Harvard, Vancouver, ISO, and other styles
49

Burkhardt, Helmut. "Human Footprint on the Global Environment: Threats to Sustainability." Canadian Studies in Population 40, no. 1-2 (2013): 103. http://dx.doi.org/10.25336/p6qc8b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Al-Damkhi, Ali Mohamed, and Rana Abdullah Al-Fares. "Terrorist Threats to the Environment in Iraq and Beyond." Global Environmental Politics 10, no. 1 (2010): 1–6. http://dx.doi.org/10.1162/glep.2010.10.1.1.

Full text
Abstract:
The environmental consequences of political conflict are a growing problem throughout the world. Not only nations, but a variety of terrorist and insurgent groups have shown a disturbing tendency to make use of intentional environmental destruction in the pursuit of their political agendas. Currently, scenarios of environmental terrorism in Iraq are particularly dire, due to the changing political situation in that country, the vulnerability of its petroleum infrastructure, and the precedent set by the catastrophe in Kuwait during the 1991 Gulf War. The international community should remain aw
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!