threat level
Recently Published Documents


TOTAL DOCUMENTS

169
(FIVE YEARS 81)

H-INDEX

11
(FIVE YEARS 2)

2022 ◽  
pp. 002190962110696
Author(s):  
Shabir Hussain ◽  
Farrukh Shahzad ◽  
Shirin Ahmad

In this study, we present a contextual model for analyzing the escalatory and de-escalatory trends in media reporting of seven conflicts in Pakistan. For this purpose, we combined findings from both survey and content analysis. While the survey helped to examine the journalists’ perceptions about the security threats of conflicts and the factors that influence the reportage, the content analysis was utilized to analyze the escalatory and de-escalatory characteristics in the coverage. The findings show that high security conflicts lead to a patriotic reporting scenario that results in high escalatory coverage. There is a significant decrease in the escalatory coverage as the assumed threat level of a conflict decreases. Similarly, we found that a conflict in which journalists exercised more relative freedom from pressure groups was reported in de-escalatory fashion. These findings can be useful for strategizing for the implementation of peace journalism in Pakistan in particular and elsewhere in general.


2021 ◽  
Vol 288 (1965) ◽  
Author(s):  
Connie R. B. Allen ◽  
Darren P. Croft ◽  
Lauren J. N. Brent

Males in many large mammal species spend a considerable portion of their lives in all-male groups segregated from females. In long-lived species, these all-male groups may contain individuals of vastly different ages, providing the possibility that behaviours such as aggression vary with the age demographic of the social environment, as well as an individual's own age. Here, we explore social factors affecting aggression and fear behaviours in non-musth male African elephants ( Loxodonta africana ) aggregating in an all-male area. Adolescent males had greater probabilities of directing aggressive and fearful behaviours to non-elephant targets when alone compared to when with other males. All males, regardless of age, were less aggressive towards non-elephant targets (e.g. vehicles and non-elephant animals) when larger numbers of males from the oldest age cohort were present. The presence of older males did not influence the probability that other males were aggressive to conspecifics or expressed fearful behaviours towards non-elephant targets. Older bulls may police aggression directed towards non-elephant targets or may lower elephants’ perception of their current threat level. Our results suggest male elephants may pose an enhanced threat to humans and livestock when adolescents are socially isolated, and when fewer older bulls are nearby.


2021 ◽  
Vol 1 ◽  
Author(s):  
Dilan Dhulashia ◽  
Nial Peters ◽  
Colin Horne ◽  
Piers Beasley ◽  
Matthew Ritchie

The use of drones for recreational, commercial and military purposes has seen a rapid increase in recent years. The ability of counter-drone detection systems to sense whether a drone is carrying a payload is of strategic importance as this can help determine the potential threat level posed by a detected drone. This paper presents the use of micro-Doppler signatures collected using radar systems operating at three different frequency bands for the classification of carried payload of two different micro-drones performing two different motions. Use of a KNN classifier with six features extracted from micro-Doppler signatures enabled mean payload classification accuracies of 80.95, 72.50 and 86.05%, for data collected at S-band, C-band and W-band, respectively, when the drone type and motion type are unknown. The impact on classification performance of different amounts of situational information is also evaluated in this paper.


2021 ◽  
Vol 5 (2) ◽  
pp. 157-166
Author(s):  
Muhammad Khairul Faridi ◽  
◽  
Imam Riadi ◽  
Yudi Prayudi ◽  
◽  
...  

The Hospital Management Information System (SIMRS) functions as a medium for hospital information and hospital management. There are patient medical record data, which is the result of interactions between doctors and sufferer. Medical records are sensitive data so that the security of the hospital management information system needs to be improved to convince users or patients that the data stored on SIMRS is safe at attackers. There are several ways to improve system security, one of which is by threat modeling. Threat modeling aims to identify vulnerabilities and threats that exist in SIMRS. In this paper, threat modeling will use the STRIDE-model. The recognition with the STRIDE-model will then be analyzed and sorted according to the modeling with the STRIDE method. After the analysis is complete, it will be calculated and given a rating based on the DREAD method's assessment. The STRIDE method's results show that there are several threats identified, such as there is one threat on the user side, the webserver is five threats, and the database is three threats. The level of the threat varies from the lowest-level (LowL) to the highest-level (HiL). Based on the threat level, it can be a guide and sequence in improving and improving the security system at SIMRS, starting from the LowL to the HiL.


2021 ◽  
Vol 49 (3) ◽  
Author(s):  
Kamila Bento Cavalcanti de Albuquerque ◽  
André Felipe de Araujo Lira

2021 ◽  
pp. 1-17
Author(s):  
Traci Burch

This article presents evidence that exposure to officer-involved deaths of low-threat Black victims increases political interest and voter turnout among Black respondents under age 40 to the 2016 Collaborative Multiracial Post-Election Survey. Victim race, threat level, and visibility affect the likelihood that an officer-involved death will mobilize political interest. Political interest and voter turnout are higher among the treatment group, which was exposed to high-visibility/low-threat Black victims only before participating in the CMPS, than in the control group, which was exposed to such victims only after taking the survey. Exposing young Black respondents to all victims without accounting for threat, visibility, or race does not affect political interest or voter turnout, suggesting the importance of these factors for mobilization. The findings clarify the role that Black Lives Matter activists, journalists, and watchdog groups can play in countering the police actions that shape the visibility and framing of Black victims of police violence.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ke Li ◽  
Yujia Li ◽  
Pengyi Zhang

PurposeThe massive amount of available information and functionality of the Internet makes selective information seeking effortless. This paper aims to understand the selective exposure to information during a health decision-making task.Design/methodology/approachThis study conducted an experiment with a sample of 36 students to examine the influence of prior attitude, perceived threat level and information limit on users’ selective exposure to and recall of coronavirus disease 2019 (COVID-19) vaccination information. Participants were assigned to two conditions with or without an upper limit of the number of articles to be examined, and this study collected the number of articles read, the number of articles included in the report and recall score of the articles after one day of the experiment.FindingsThis study found that (1) participants with a negative attitude were more inclined to view attitude-consistent information and recalled attitude-consistent information more accurately, while participants with a positive attitude viewed more balanced information; (2) participants perceiving higher health threat level recalled attitude-consistent information more accurately; and (3) an upper limit on the number of articles to be viewed does not have any impact on selective exposure.Research limitations/implicationsThe findings of this paper pinpoint the disparity of influence of positive and negative attitudes on selective exposure to and selective recall of health information, which was not previously recognized.Practical implicationsVaccination campaigns should focus on reaching people with negative attitudes who are more prone to selective exposure to encourage them to seek more balanced information.Originality/valueThis is the first paper to explore selective exposure to COVID-19 vaccination information. This study found that people with a negative attitude and a higher level of perceived health threat are more prone to selective exposure, which was not found in previous research.


2021 ◽  
Vol 1 (4) ◽  
pp. 704-743
Author(s):  
Moses Ashawa ◽  
Sarah Morris

The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily. While malware classification and detection tools are being developed to fight malware infection, hackers keep deploying different infection strategies, including permissions usage. Among mobile platforms, Android is the most targeted by malware because of its open OS and popularity. Permissions is one of the major security techniques used by Android and other mobile platforms to control device resources and enhance access control. In this study, we used the t-Distribution stochastic neighbor embedding (t-SNE) and Self-Organizing Map techniques to produce a visualization method using exploratory factor plane analysis to visualize permissions correlation in Android applications. Two categories of datasets were used for this study: the benign and malicious datasets. Dataset was obtained from Contagio, VirusShare, VirusTotal, and Androzoo repositories. A total of 12,267 malicious and 10,837 benign applications with different categories were used. We demonstrate that our method can identify the correlation between permissions and classify Android applications based on their protection and threat level. Our results show that every permission has a threat level. This signifies those permissions with the same protection level have the same threat level.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Victoria Jangada Correia

AbstractTerrorism, crime, and war are all familiar notions; however, the way in which these have been altered through cyberspace is not yet fully, nor unanimously, understood through definitions, theories, and approaches. Although the threat level of terrorism in the UK has lowered to moderate, the threat posed by cyber terrorism has nonetheless heightened throughout the COVID pandemic due to the greater necessity and presence of technology in our lives. This research aimed to highlight the necessity for a unanimous cyber terrorism definition and framework and further aimed to determine what perceptions are held by the general public regarding cyber terrorism through a mixed methods approach. The literature review confirms that there is an absence of a unanimously agreed upon definition of cyber terrorism, and furthermore that the existing academic definitions are not compatible with UK legislation. In addition, the literature review highlights an absence of a cyber terrorism framework that classifies what kind of terrorist activity is cyber enabled or cyber dependent. Quantitative data from the online survey find a couple of significant effects implying the necessity for greater diversity amongst stakeholders which could potentially enhance the detection and prevention of terrorism in the UK. The qualitative data find that although there is some agreement amongst the sample population in views held towards cyber terrorism, some misconceptions are nonetheless present which could have implications on the general public’s ability to identify and report cyber terrorist activity. Overall, the findings from the literature review and the primary data collection aid in developing a cyber terrorism definition that is compatible with UK legislative definitions, and further aids in developing a terrorist activity framework that succinctly highlights the inextricable links between traditional, cyber enabled, and cyber-dependent terrorism.


Sign in / Sign up

Export Citation Format

Share Document