نتایج جستجو برای: threat assessment

تعداد نتایج: 609945  

2006
Marcel Paulssen Richard P. Bagozzi

Current models of market structure are descriptive in nature and lack theoretical grounding in consumer behavior. Such grounding is especially needed in the specification of marketing strategies. A self-regulatory model of consumer consideration-set formation will be employed as a basis of market structure in this article. The authors propose and show that consumers regulate their behavior acco...

Journal: :CoRR 2017
Andrew Fielder Sandra König Emmanouil Panaousis Stefan Schauer Stefan Rass

When undertaking cyber security risk assessments, we must assign numeric values to metrics to compute the final expected loss that represents the risk that an organization is exposed to due to cyber threats. Even if risk assessment is motivated from real-world observations and data, there is always a high chance of assigning inaccurate values due to different uncertainties involved (e.g., evolv...

Journal: :CoRR 2012
Marzieh Sameni Toosarvandani Nasser Modiri Mahdi Afzali

Local Area Networks(LAN) at present become an important instrument for organizing of process and information communication in an organization. They provides important purposes such as association of large amount of data, hardware and software resources and expanding of optimum communications. Becase these network do work with valuable information, the problem of security providing is an importa...

Journal: :Computers & Security 2009
Howard Chivers John A. Clark Pau-Chen Cheng

Risk assessment is concerned with discovering threat paths between potential attackers and critical assets, and is generally carried out during a system’s design and then at fixed intervals during its operational life. However, the currency of such analysis is rapidly eroded by system changes; in dynamic systems these include the need to support ad-hoc collaboration, and dynamic connectivity be...

Journal: :Environmental Modelling and Software 2012
H. Resit Akçakaya Scott Ferson Mark Burgman David A. Keith Georgina M. Mace Charles R. Todd

We comment on a recent article by Newton (Environ. Model. Softw. (2010), 25, 15-23), which proposed a method, based on a Bayesian belief networks, for classifying the threat status of species under the IUCN Red List Categories and Criteria, and compared this method to an earlier one that we had developed that is based on fuzzy logic. There are three types of differences between the results of t...

2011
Ashish Gehani Lee Zaniewski K. Subramani

Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In contrast, we use risk computation to drive changes in an operating system’s security configuration. This allows risk management to occur in real time and reduces the window of exposure to attack. We posit that it is possible to ...

Journal: :Information 2016
Kristian Beckers Jürgen Dürrwang Dominik Holling

The automotive industry has successfully collaborated to release the ISO 26262 standard for developing safe software for cars. The standard describes in detail how to conduct hazard analysis and risk assessments to determine the necessary safety measures for each feature. However, the standard does not concern threat analysis for malicious attackers or how to select appropriate security counter...

Journal: :The journals of gerontology. Series B, Psychological sciences and social sciences 2015
Sarah J Barber Mara Mather Margaret Gatz

OBJECTIVES Stereotype threat can impair older adults' performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments' reward structure. Stereotype threat should be associated with poor performance when the assessment emphasi...

Journal: :Biological reviews of the Cambridge Philosophical Society 2015
Steven L Lima Bradley F Blackwell Travis L DeVault Esteban Fernández-Juricic

Animal-vehicle collisions (AVCs) are a substantial problem in a human-dominated world, but little is known about what goes wrong, from the animal's perspective, when a collision occurs with an automobile, boat, or aircraft. Our goal is to provide insight into reactions of animals to oncoming vehicles when collisions might be imminent. Avoiding a collision requires successful vehicle detection, ...

2015
Xin Ye Guohua Liu Zongshan Li Hao Wang Yuan Zeng RunGuo Zang

Protected areas (PAs) not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitativel...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید