نتایج جستجو برای: threat

تعداد نتایج: 52909  

2007
John Carlson

Although the nuclear non-proliferation regime has enjoyed considerable success, today it is facing serious threats. Recent and continuing violations of the Nuclear Non-Proliferation Treaty (NPT), particularly by the Democratic People’s Republic of Korea (DPRK) and Iran, as well as the lack of substantive outcome from the 2005 NPT Review Conference, have led some critics to question whether the ...

2009
Timothy D. Lyons T. D. Lyons

A general insight of 20th-century philosophy of science is that the acceptance of a scientific theory is grounded, not merely on a theory’s relation to data, but on its status as having no, or being superior to its, competitors. I explore the ways in which scientific realists might be thought to utilise this insight, have in fact utilised it, and can legitimately utilise it. In more detail, I p...

2010
Patrick Battistello Cyril Delétré

These last few years, the security of VoIP architectures has become a sensitive issue with many vulnerability announcements. This article first aims to distinguish the threats and the applicable protection mechanisms depending on the underlying VoIP architecture. We then investigate the properties of a specific class of existing call establishment mechanisms based on tokens or tickets. In the l...

Journal: :JoWUA 2013
Christian W. Probst René Rydhof Hansen

Insider threats pose a difficult problem for many organisations. While organisations in principle would like to judge the risk posed by a specific insider threat, this is in general not possible. This limitation is caused partly by the lack of models for human behaviour, partly by restrictions on how much and what may be monitored, and by our inability to identify relevant features in large amo...

Journal: :Organization Science 2012
Paul M. Leonardi Tsedal B. Neeley Elizabeth Gerber

Several recent studies have found that managers engage in redundant communication; that is, they send the same message to the same recipient sequentially through two or more unique media. Given how busy most managers are, and how much information their subordinates receive on a daily basis, this practice seems, initially, quite puzzling. We conducted an ethnographic investigation to examine the...

2009

CM is a serious problem in the United States and around the world. 2 It can be defined as any act or series of acts of commission or omission by a parent or caregiver that results in harm, potential for harm, or threat of harm to a child. Acts of commission are deliberate and intentional, however, harm to a child may or may not be the intended consequence. Physical, sexual, and psychological ab...

2011
Gaurav Soni Sandeep Kaushal

This paper examines threats to the security of the Mobile WiMax/ 802.16e broadband wireless access technology. Threats associated with the physical layer and MAC layer are reviewed in detail. Threats are listed and ranked according to the level of risk they represent. This review work can be used to prioritize future research directions in Mobile WiMax/802.16e security.

2013
Samantha Sinclair Fredrik Björklund

Associations between the researcher occupation and gender, and the relation between such associations and career considerations, were examined. Study 1 revealed that students’ perception of the researcher stereotype corresponds more to their perception of the male than the female stereotype. In study 2, the more females implicitly associated the role of researcher with women, the higher they ra...

2005
Boanerges Aleman-Meza Phillip Burns Matthew Eavenson Devanand Palaniswami Amit P. Sheth

Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the research and prototyping of a system that takes an ontological approach, and is primarily targeted for use by the intelligence community. Our approach utilizes the notion of semantic associations and their discovery am...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید