external threats
Recently Published Documents


TOTAL DOCUMENTS

674
(FIVE YEARS 400)

H-INDEX

19
(FIVE YEARS 4)

Author(s):  
E Izquierdo ◽  
J Rodriguez-Coira ◽  
MI Delgado-Dolset ◽  
C Gomez-Casado ◽  
D Barber ◽  
...  

The epithelial barrier has been classically considered as only the first line of defense against irritants, pathogens, and allergens, but it is now known that it also plays an essential role in the immunological response against exogenous agents. In fact, recent reports postulate the epithelial barrier hypothesis as a possible explanation for the increasing incidence and severity of allergic diseases. The epithelial barrier preserves the isolation of the inner tissues from potential external threats. Moreover, a coordinated interaction between epithelial and immune cells ensures the unique immune response taking place in mucosal tissues and that is has been reported to be dysregulated in allergic diseases. Herein, we and others have demonstrated that in severe allergic phenotypes, the epithelial barrier experiments several histological modifications and increased in immune cells infiltration, leading to its dysfunction. This is common in atopic dermatitis, asthma, and/or food allergy. However, the precise role of the epithelial barrier in the mucosal biology during allergic diseases progression is not well understood yet. In this review, we aim to compile recent knowledge regarding the histological structure and immunological function of the epithelial barrier and to shed light on the role of this compartment in the onset, and progression of allergic diseases.


Systems ◽  
2022 ◽  
Vol 10 (1) ◽  
pp. 7
Author(s):  
John Turner ◽  
Dave Snowden ◽  
Nigel Thurlow

The substrate-independence theory utilizes sensemaking techniques to provide cognitively based scaffolds that guide and structure learning. Scaffolds are cognitive abstractions of constraints that relate to information within a system. The substrate-independence theory concentrates on the flow of information as the underlying property of the host system. The substrate-independence theory views social systems as complex adaptive systems capable of repurposing their structure to combat external threats by utilizing constructors and substrates. Constructor theory is used to identify potential construction tasks, the legitimate input and output states that are possible, to map the desired change in the substrate’s attributes. Construction tasks can be mapped in advance for ordered and known environments. Construction tasks may also be mapped in either real-time or post hoc for unordered and complex environments using current sensemaking techniques. Mapping of the construction tasks in real-time becomes part of the landscape, and scaffolds are implemented to aid in achieving the desired state or move to a more manageable environment (e.g., from complex to complicated).


Electronics ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 157
Author(s):  
Nirmala Devi Kathamuthu ◽  
Annadurai Chinnamuthu ◽  
Nelson Iruthayanathan ◽  
Manikandan Ramachandran ◽  
Amir H. Gandomi

The healthcare industry is being transformed by the Internet of Things (IoT), as it provides wide connectivity among physicians, medical devices, clinical and nursing staff, and patients to simplify the task of real-time monitoring. As the network is vast and heterogeneous, opportunities and challenges are presented in gathering and sharing information. Focusing on patient information such as health status, medical devices used by such patients must be protected to ensure safety and privacy. Healthcare information is confidentially shared among experts for analyzing healthcare and to provide treatment on time for patients. Cryptographic and biometric systems are widely used, including deep-learning (DL) techniques to authenticate and detect anomalies, andprovide security for medical systems. As sensors in the network are energy-restricted devices, security and efficiency must be balanced, which is the most important concept to be considered while deploying a security system based on deep-learning approaches. Hence, in this work, an innovative framework, the deep Q-learning-based neural network with privacy preservation method (DQ-NNPP), was designed to protect data transmission from external threats with less encryption and decryption time. This method is used to process patient data, which reduces network traffic. This process also reduces the cost and error of communication. Comparatively, the proposed model outperformed some standard approaches, such as thesecure and anonymous biometric based user authentication scheme (SAB-UAS), MSCryptoNet, and privacy-preserving disease prediction (PPDP). Specifically, the proposed method achieved accuracy of 93.74%, sensitivity of 92%, specificity of 92.1%, communication overhead of 67.08%, 58.72 ms encryption time, and 62.72 ms decryption time.


10.6036/10085 ◽  
2022 ◽  
Vol 97 (1) ◽  
pp. 92-97
Author(s):  
Juan Carlos Olivares Rojas ◽  
ENRIQUE REYES ARCHUNDIA ◽  
JOSE ANTONIO GUTIERREZ GNECCHI ◽  
ARTURO MENDEZ PATIÑO ◽  
JAIME CERDA JACOBO ◽  
...  

Although smart grids offer multiple advantages over traditional grids, there are still challenges to overcome to ensure the quality of service and grid security. In particular, cybersecurity plays an essential role in ensuring grid operation reliability and resilience to external threats. The traditional approach to address cybersecurity issues generally does not consider the human factor as the main component. Recently, the concept of cyber hygiene has emerged, where social and human aspects are fundamental to reduce vulnerabilities and the risk of attacks and breaches. In a similar manner to personal hygiene, which greatly influences people’s health, considering the human factor (i.e., human behaviour, awareness, and training) as a critical cybersecurity component, can significantly improve human operator cybersecurity practices that in turn can result in improved cybersecurity performance. In this paper, the authors propose and test a methodology for implementing cyber hygiene practices in the context of Smart Grid systems, focused on smart metering systems. The results suggest that implementing cyber hygiene practices can improve smart meter cybersecurity and be suitable for implementing other sensitive Smart Grid components. Key Words: Cybersecurity, Cyber Hygiene, Internet of Things, Smart Grid, Smart Meters.


2022 ◽  
Vol 121 (831) ◽  
pp. 3-9
Author(s):  
Fiona B. Adamson ◽  
Kelly M. Greenhill

The world today is profoundly interconnected, but also characterized by ongoing national competition and intra-state conflict. At the nexus of these dynamics is the question of cross-border mobility, which cuts through and connects myriad, disparate areas of “entangled” security—from pandemics to climate change, to conflict and military engagement, to challenges to democracies in the form of internal polarization and external threats. The COVID-19 pandemic provides a striking illustration of this “global security entanglement” in action. This essay presents the concept of security entanglement, illustrates how it operates, and explores some of its theoretical and practical implications.


Author(s):  
Ruslan Pliushch ◽  
◽  
Viktoriia Filippova ◽  
Oksana Pronina ◽  
◽  
...  

Globalization has become one of the factors that led to the formation of a new concept of national security, according to which it is an integral part of the system of the highest level (regional, international, global security), which is a consequence of the integration of the world community in an effort to overcome common threats and challenges. Provision of national security is the main task of the foreign policy of the state, the aim of the national security policy is protection of the state and society from external threats. It is established that national security is a process that includes various measures that guarantee the long and free existence and national (state) development, including the protection and defense of the state as a political institution, and the protection of people and the entire society, their benefits and the natural environment from threats that significantly limit its functioning or harm the benefits subject to special protection. The analysis of the process of formation and development of ideas and views on the problem of defining the essence and content of national security showed that national security acts as an extremely complex, contradictory and long-term, but very important and necessary process to ensure sustainable development of society and state, the preconditions of which were established in different historical eras. It has been proved that national security policy and strategy should define the roles and boundaries of different actors of the country's security, appropriate mechanisms of coordination of their activities and rules of interagency support. In the context of globalization, national security strategies should include a realistic assessment of the costs and sustainability of security institutions and plan their development, in addition, national security strategies and policies are not static and require periodic updating.


Corpus Mundi ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 15-39
Author(s):  
Serguey N. Yakushenkov ◽  
Olesya S. Yakushenkova

Zombies were and still are one of the most important symbols of modern mass culture. The zombie discourse originated among African slaves brought to the sugar plantations in the Caribbean. In many ways, the narratives of the “living dead” were a reaction to the crisis phenomena of plantation life. This is evidenced by the rich comparative material presented on many peoples of the world. Such notions of invulnerability after formal death proved to be an important tool of resistance to new conditions caused by external threats. Termed “revitalization,” they were an important element of the Millennialist movements. While initially the sorcerers who could bring themselves back to life were central to these beliefs, in the following period the focus shifted to the victims of various manipulations, transformed into soulless beings. Leaving the environment of their original “habitat,” zombies took on a new life, occupying a firm place in modern mass culture. Having become a symbol of ruthless exploitation of man, relegated to the level of a machine appendage, zombies proved to be one of the most “productive” symbols. They reflected the main trends in the development of society and even began to function as instruments of philosophical reflection. All this allows us to consider zombies as an indicator of altered society, producing new “walking dead”. The metaphors associated with zombies allows us to conclude that the comprehension of zombies makes modern man begin to perceive them constructively, creating a new image, demonstrating the movement towards humanization.


2021 ◽  
Vol 12 (23) ◽  
pp. 105-131
Author(s):  
Maria do Rosário Mira ◽  
Zélia de Jesus Breda

This paper aims to fill a gap in the existing research about the internationalization of tourism destinations through a systematic review of the literature focusing on publications presented between 2007 and 2017. The research followed the assumptions of the non-probabilistic snowball sampling technique. In addition, the computer programs VosViewer, for bibliometric analysis, and NVivo 10, for content analysis were used. Tourism destinations’ internationalization is a combination of: (i) integration of organizational interest with stakeholders’ interests; (ii) understanding that what moves these elements are endogenous and exogenous business opportunities; (iii) integrating external opportunities in the destination by aligning them with its territorial identity; (iv) achieving coherence between the previous three components through the implementation of a governance model; (v) a governance model that facilitates the destination’s organization by conciliating interests, resources and opportunities; (vi) and the DMOs that coordinate the dynamics generated between the elements of this system, making it possible to organize the supply following its territorial identity. The internationalization process of tourism destinations highlights factors different from the internationalization of companies. In the first scenario, politics, planning, and territory internationalization strategies should target different kinds of reflections according to the level of intervention (local, regional, national or international). In the second, it is essential that supply is aware of investment opportunities abroad, financial packages to support businesses, innovation, and entrepreneurship. The current period exposed the fragility of the tourism sector and how external threats can influence it. Thinking about the internationalization of tourism destinations shows how important it is to organize the tourism offer in accordance with the challenges the sector faces, at the same time as explaining the role of DMOs. Until now, this theme has been mainly studied from the perspective of demand, creating a gap in the existing knowledge about the organizational systems.


Author(s):  
Pratik Narendra Gulhane ◽  
Yash Vishwas Manwar

Cyber Security is a process that’s designed to protect networks and devices from external threats. It is important because it protects all categories of data from theft and damage. This paper addresses Cyber Security, Need of Cyber security and its Measures. In today’s world we found that the amount of threats like data theft, scams, and phishing are increasing day-by-day. So this explains how the cyber security is important while dealing with internet. It can be prevented by following the security measures. To overcome the barriers related to security issues we have to spread awareness about cyber security and its measures. Cyber security is one of the most important aspects of the fast-paced growing digital world. The threats of it are hard to deny, there is no perfect solution for cybercrimes but we should try our best to minimize them.


Author(s):  
T Y Tsai ◽  
H H Tai

Numerous conventional container ports in East Asia are evolving from intercontinental into regional hub ports. This study adopted the Port of Kaohsiung as an example of competition with neighboring ports. The results of this study demonstrated that the Port of Kaohsiung is still a competitive docking port on trans-Pacific trunk routes for North America, despite facing external threats (e.g., upsizing of ships, lack of new deep-water terminals, and new strategic alliances affecting terminal operations), overall shipping cost considerations (e.g., container volume, different ship sizes, and port selection), and increasingly intense competition with neighboring ports. Under such circumstances, the Port of Kaohsiung must keep pace with container ship upsizing, sufficiently increase deep-water terminal capacity, and improve its existing container terminals’ operating efficiency to attract route deployment and larger container ships and thereby maintain its current advantages and position as a regional hub port.


Sign in / Sign up

Export Citation Format

Share Document