threat situation
Recently Published Documents


TOTAL DOCUMENTS

45
(FIVE YEARS 24)

H-INDEX

6
(FIVE YEARS 0)

Author(s):  
Dan Alva Castillo ◽  
◽  
Brian Meneses Claudio ◽  
Alexi Delgado

Citizen insecurity is a reality with which we must coexist, the cities of Latin America are among the most violent and insecure in the world. According to the statistics of the National Police of Peru, they report that by 2017 the crimes of theft or robbery were the most common because they had a monthly average of 15348 complaints, equivalent to 66.9% of the total crimes nationwide. The INEI (National Institute of Statistics and Informatics) revealed that in the same year the district of Carabayllo obtained 1.85% of the total complaints in Metropolitan Lima, occupying the 17th place in the ranking of districts with the highest number of complaints for this crime. That is why in the present research work a way to counteract these criminal acts was proposed, the first thing is to be located within the operating range of the RF module, so that the remote transmission control can activate it, the RF module will be connected to the power outlet and the siren. The siren will oversee persuading the criminal, in addition to alerting the neighbors about the events that are happening. It was obtained as a result that the system fulfills its purpose, it can be alerted in real time about some attempted theft or at the instant of a threat situation, only by pressing the button of the remote control we can persuade the criminals either by scaring them with the sound or with the help of the neighbors. Keywords-- Citizen insecurity, RF Module, Siren, Remote Control


2021 ◽  
Author(s):  
Torvald F. Ask ◽  
Benjamin J. Knox ◽  
Ricardo Lugo ◽  
Lukas Hoffmann ◽  
Stefan Sütterlin

In cyber threat situations, the establishment of a shared situational awareness as a basis for cyber defense decision-making results from adequate communication of a Recognized Cyber Picture (RCP). RCPs consist of actively selected information and have the goal of accurately presenting the severity and potential consequences of the situation. RCPs must be communicated between individuals, but also between organizations, and often from technical to non-/less technical personnel. The communication of RCPs is subject to many challenges that may affect the transfer of critical information between individuals. There are currently no common best practices for training communication for shared situational awareness among cyber defense personnel. The Orient, Locate, Bridge (OLB) model is a pedagogic tool to improve communication between individuals during a cyber threat situation. According to the model, an individual must apply meta-cognitive awareness (O), perspective taking (L), and communication skills (B) to successfully communicate the RCP. Gamification (applying game elements to non-game contexts) has shown promise as an approach to learning. We propose a novel OLB-based Gamification design to improve dyadic communication for shared situational awareness among (technical and non-technical) individuals during a cyber threat situation. The design includes the Gamification elements of narrative, scoring, feedback, and judgment of self. The proposed concept contributes to the educational development of cyber operators from both military and civilian organizations responsible for defending and securing digital infrastructure. This is achieved by combining the elements of a novel communication model with gamification in a context in urgent need for educational input.


2021 ◽  
pp. 108525
Author(s):  
Yuyu Zhao ◽  
Guang Cheng ◽  
Yu Duan ◽  
Zhouchao Gu ◽  
Yuyang Zhou ◽  
...  

Author(s):  
Dr. Dhirendra Kumar Jena

PRIs were established with a hope to strengthen the rural India. But during Covid-19, it was experienced that they were not even able to support for livelihood to the rural people. Even in the midst of pandemic, though there was life threat situation, people migrated to cities in search of their livelihood. In this backdrop, this paper highlights the available livelihood supportive infrastructure, livelihood generating base and livelihood supporting mechanisms and schemes and unutilized natural resources in the Gram Panchayats. Particularly, this paper focuses on the strength of Gram Panchayat’s self fund, schemes and activities excluding central and state government funding and schemes. The work is produced by the data from both primary and secondary sources. And to make it more scientific, both quantitative and qualitative methods are applied. For this work, Bhograi block of the district of Balasore in Odisha has been taken as area of study. From the study, it is experienced that there is available resources lying unutilised but due to lack of interest, attitude, commitment of the local representatives and officials of Gram Panchayat resources can’t be utilized to harness benefits for people creating jobs and engagements. Finally, some remedial measures like behavioural and attitudinal autonomy of the officials, political neutrality, constitution of Panchayat Development Council (PDC) etc. are suggested to over the problem. Keywords: Gram Panchayat, Rural Economy, Bhograi Block, Odisha, COVID-19


space&FORM ◽  
2021 ◽  
Vol 2020 (46) ◽  
pp. 9-24
Author(s):  
Marcin Goncikowski ◽  

The topic of the paper is determining the impact of an epidemic threat situation on the design of office space and office buildings. The types of actions taken to improve safety are: procedural actions, modifications of technical solutions: architectural and installation and remote work. Solutions in the field of office space architecture include: reducing the density of occupants, introducing partitions, eliminating multi-person offices, using materials that are easy to disinfect and clean, opening windows and installing personal protective equipment dispensers. The installation solutions include air quality improvement, filtration and disinfection systems as well as telecommunication installation systems supervising the use of the building. It can be expected that in the future, technical solutions will be introduced into the designs of buildings and office spaces, which will be a place for meetings, spontaneous interactions, mutual inspiration of employees and strengthening their identification with the employer whereas the ratio of office work places will be lower. The structure of the building is likely to change to a richer commertial part, a co-working part and flexible offices, and a traditional part of office space for lease, but as such office buildings will still be needed.


Author(s):  
Laura S. Guy

Adolescence is a developmental period characterized by a series of remarkable transformations and transitions in social roles. In this chapter, some of the critical concepts for threat assessment and management raised when the person of concern is an adolescent are explored. First, the developmental changes in neurological, cognitive, and psychosocial maturity that occur during this period in the life span are discussed. Consequences arising from deviant peer influences are a concern for any threat situation, but the importance of peers among adolescents intensifies during this developmental period and can be explained in part by neurological changes. Second, the role of the adolescent’s internal world in assessing and managing concerns about targeted violence is examined, including violent ideation and fantasy and psychopathology. The final section presents a discussion of key concepts relevant to managing concerns about risk for targeted violence by adolescents that are consistent with developmentally appropriate and scientifically informed principles.


CONVERTER ◽  
2021 ◽  
pp. 45-51
Author(s):  
Zhaofang Du

This paper studies a new network information security system and its evaluation method based on the security threat situation network security model. This paper expounds the application of active defense system and passive defense system in network security, and uses advanced technical support platform and network security model. In this paper, the active defense system and the passive defense system are organically combined to form a new model of computer network security with characteristics. At the same time, based on the idea of security threat situation evaluation, this paper extends the traditional PDRR security model and proposes a network active defense security model and defense in depth security strategy. On this basis, a hybrid architecture of active and passive defense is proposed. The architecture integrates some new network active defense technologies, and constructs a comprehensive and deep network defense system together with network passive defense means. The experimental results show that the proposed defense model improves the security defense efficiency and effective defense rate of the traditional PDRR security model.


Sign in / Sign up

Export Citation Format

Share Document