162 resultados para security threat
Resumo:
Veterinary use of the nonsteroidal anti-inflammatory (NSAID) drug diclofenac in South Asia has resulted in the collapse of populations of three vulture species of the genus Gyps to the most severe category of global extinction risk. Vultures are exposed to diclofenac when scavenging on livestock treated with the drug shortly before death. Diclofenac causes kidney damage, increased serum uric acid concentrations, visceral gout, and death. Concern about this issue led the Indian Government to announce its intention to ban the veterinary use of diclofenac by September 2005. Implementation of a ban is still in progress late in 2005, and to facilitate this we sought potential alternative NSAIDs by obtaining information from captive bird collections worldwide. We found that the NSAID meloxicam had been administered to 35 captive Gyps vultures with no apparent ill effects. We then undertook a phased programme of safety testing of meloxicam on the African white-backed vulture Gyps africanus, which we had previously established to be as susceptible to diclofenac poisoning as the endangered Asian Gyps vultures. We estimated the likely maximum level of exposure (MLE) of wild vultures and dosed birds by gavage (oral administration) with increasing quantities of the drug until the likely MLE was exceeded in a sample of 40 G. africanus. Subsequently, six G. africanus were fed tissues from cattle which had been treated with a higher than standard veterinary course of meloxicam prior to death. In the final phase, ten Asian vultures of two of the endangered species (Gyps bengalensis, Gyps indicus) were dosed with meloxicam by gavage; five of them at more than the likely MLE dosage. All meloxicam-treated birds survived all treatments, and none suffered any obvious clinical effects. Serum uric acid concentrations remained within the normal limits throughout, and were significantly lower than those from birds treated with diclofenac in other studies. We conclude that meloxicam is of low toxicity to Gyps vultures and that its use in place of diclofenac would reduce vulture mortality substantially in the Indian subcontinent. Meloxicam is already available for veterinary use in India.
Resumo:
Three Gyps vulture species are on the brink of extinction in South Asia owing to the veterinary non-steroidal anti-inflammatory drug (NSAID) diclofenac. Carcasses of domesticated ungulates are the main food source for Asia's vultures and birds die from kidney failure after consuming diclofenac-contaminated tissues. Here, we report on the safety testing of the NSAID ketoprofen, which was not reported to cause mortality in clinical treatment of scavenging birds and is rapidly eliminated from livestock tissues. Safety testing was undertaken using captive non-releasable Cape griffon vultures (Gyps coprotheres) and wild-caught African white-backed vultures (G. africanus), both previously identified as susceptible to diclofenac and suitable surrogates. Ketoprofen doses ranged from 0.5 to 5 mg kg(-1) vulture body weight, based upon recommended veterinary guidelines and maximum levels of exposure for wild vultures (estimated as 1.54 mg kg(-1)). Doses were administered by oral gavage or through feeding tissues from cattle dosed with ketoprofen at 6 mg kg(-1) cattle body weight, before slaughter. Mortalities occurred at dose levels of 1.5 and 5 mg kg(-1) vulture body weight (within the range recommended for clinical treatment) with the same clinical signs as observed for diclofenac. Surveys of livestock carcasses in India indicate that toxic levels of residual ketoprofen are already present in vulture food supplies. Consequently, we strongly recommend that ketoprofen is not used for veterinary treatment of livestock in Asia and in other regions of the world where vultures access livestock carcasses. The only alternative to diclofenac that should be promoted as safe for vultures is the NSAID meloxicam.
Resumo:
Dual-rail encoding, return-to-spacer protocol, and hazard-free logic can be used to resist power analysis attacks by making energy consumed per clock cycle independent of processed data. Standard dual-rail logic uses a protocol with a single spacer, e.g., all-zeros, which gives rise to energy balancing problems. We address these problems by incorporating two spacers; the spacers alternate between adjacent clock cycles. This guarantees that all gates switch in every clock cycle regardless of the transmitted data values. To generate these dual-rail circuits, an automated tool has been developed. It is capable of converting synchronous netlists into dual-rail circuits and it is interfaced to industry CAD tools. Dual-rail and single-rail benchmarks based upon the advanced encryption standard (AES) have been simulated and compared in order to evaluate the method and the tool.
Resumo:
This study explores the associations between mothers' religiosity, and families' and children's functioning in a stratified random sample of 695 Catholic and Protestant motherchild dyads in socially deprived areas in Belfast, Northern Ireland, a region which has experienced centuries of sectarian conflict between Protestant Unionists and Catholics Nationalists. Findings based on mother and child surveys indicated that even in this context of historical political violence associated with religious affiliation, mothers' religiosity played a consistently positive role, including associations with multiple indicators of better family functioning (i.e., more cohesion and behavioral control and less conflict, psychological distress, and adjustment problems) and greater parentchild attachment security. Mothers' religiosity also moderated the association between parentchild attachment security and family resources and family stressors, enhancing positive effects of cohesion and mother behavioral control on motherchild attachment security, and providing protection against risks associated with mothers' psychological distress. Findings are discussed in terms of implications for understanding the role of religiosity in serving as a protective or risk factor for children and families.
Resumo:
This article argues that the terrorist bombings of hotels, pubs and nightclubs in Bali in October 2002, and in Mombasa one month later, were inaugural moments in the post-9/11 securitization of the tourism industry. Although practices of tourism and terrorism seem antithetical – one devoted to travel and leisure, the other to political violence – this article argues that their entanglement is revealed most clearly in the counter-terrorism responses that brought the everyday lives of tourists and tourism workers, as well as the material infrastructure of the tourism industry, within the orbit of a global security apparatus waging a ‘war on terror’. Drawing on critical work in international relations and geography, this article understands the securitization of tourism as part of a much wider logic in which the liberal order enacts pernicious modes of governance by producing a terrorist threat that is exceptional. It explores how this logic is reproduced through a cosmopolitan community symbolized by global travellers, and examines the measures taken by the tourism industry to secure this community (e.g. the physical transformations of hotel infrastructure and the provision of counter-terrorism training).
Resumo:
SALT threatened to institutionalize a bipolar world order. NWS and NNWS alike feared that the US and SU will prioritize global security principles such as systemic stability and conflict stability to Atlantic and European security. Endangered was Europe’s security and position in the future world order. Parity in strategic weapons invalidated the US nuclear umbrella. An ABM deployment and a non-transfer regime threatened Europe’s nuclear defence options. The danger of a Limited War or a denuclearization of Central Europe led to a European co-ordination on nuclear arms control to assure the preservation of the West and the future of Europe.
Resumo:
The relevance of European Union (EU) cross-border cooperation for European border con?ict amelioration may be questioned in the contemporary global climate of threat and insecurity posed by forces of ’dark globalisation’. In any case, empirical evidence exposes the limitations of cross-border cooperation in advancing con?ict amelioration in some border regions. Nevertheless, in an enlarged EU which encompasses Central and East European member states and reaches out to neighbouring states through cross-border cooperation initiatives, the number of real and potential border con?icts with which it is concerned has risen exponentially. Fortunately, there are cases of EU ’borderscapes’ that have adopted a cross-border ’peace-building from below’ approach leading to border con?ict amelioration. Unfortunately, countervailing pressures on EU cross-border cooperation from border security regimes (principally Schengen), the Eurozone crisis, EU budgetary constraints, the conceptualisation of ’Europe as Empire’, and the possible recon?guration of the EU itself compromises this approach. Therefore, the path of European integration may well shift from one of inter-state peace-building and regional crossborder cooperation after the Second World War, to border con?ict and coercion in constituting and reconstituting state borders after the recon?guration of the EU.
Resumo:
Lead is a highly toxic metal known to be an important cause of morbidity and mortality in waterbirds and terrestrial birds worldwide. The risk to birds of poisoning from lead has resulted in the introduction of legislation in many countries, such as UK restrictions on the use of lead in angling weights and lead gunshot. In this study, we examined data on current and historical trends in lead poisoning in British waterbirds and related these to the introduction of legislation restricting the use of lead. Our results indicate that lead poisoning has continued to affect a wide range of British waterbirds long after legal restrictions were introduced. Elevated levels of lead (i.e. > 20.0 mu g/dL) were found in the blood of 34 % (n = 285) of waterbirds tested at four sites in Britain during the 2010/2011 winter and accounted for the deaths of at least 10.6 % (n = 2,365) of waterbirds recovered across Britain between 1971 and 2010 and 8.1 % (n = 1,051) between 2000 and 2010, with lead gunshot being the most likely source of poisoning. The proportion of birds dying from lead poisoning in England did not vary significantly after the introduction of legislation, accounting for 13.7 % of non-infectious causes of death between 1971 and 1987 (n = 204), 20.8 % (n = 360) between 1988 and 1999 and 11.8 % (n = 423) between 2000 and 2010, despite a significant change in lead-related mortality in mute swans found during the same time period, 25 % (n = 12) between 1971 and 1987, 4.6 % (n = 65) between 1988 and 1999 and 2 % (n = 100) between 2000 and 2010. Existing legislation needs review and extension to ensure the delivery of international commitments and a broad-scale transition to the use of non-toxic shot and angling materials in all environments.
Resumo:
The scheduling problem in distributed data-intensive computing environments has become an active research topic due to the tremendous growth in grid and cloud computing environments. As an innovative distributed intelligent paradigm, swarm intelligence provides a novel approach to solving these potentially intractable problems. In this paper, we formulate the scheduling problem for work-flow applications with security constraints in distributed data-intensive computing environments and present a novel security constraint model. Several meta-heuristic adaptations to the particle swarm optimization algorithm are introduced to deal with the formulation of efficient schedules. A variable neighborhood particle swarm optimization algorithm is compared with a multi-start particle swarm optimization and multi-start genetic algorithm. Experimental results illustrate that population based meta-heuristics approaches usually provide a good balance between global exploration and local exploitation and their feasibility and effectiveness for scheduling work-flow applications. © 2010 Elsevier Inc. All rights reserved.
Resumo:
Individuals who have been subtly reminded of death display heightened in-group favouritism, or “worldview defense.” Terror management theory argues (i) that death cues engender worldview defense via psychological mechanisms specifically evolved to suppress death anxiety, and (ii) that the core function of religiosity is to suppress death anxiety. Thus, terror management theory predicts that extremely religious individuals will not evince worldview defense. Here, two studies are presented in support of an alternative perspective. According to the unconscious vigilance hypothesis, subtly processed threats (which need not pertain to death) heighten sensitivity to affectively valenced stimuli (which need not pertain to cultural attitudes). From this perspective, religiosity mitigates the influence of mortality-salience only insofar as afterlife doctrines reduce the perceived threat posed by death. Tibetan Buddhism portrays death as a perilous gateway to rebirth rather than an end to suffering; faith in this doctrine should therefore not be expected to nullify mortality-salience effects. In Study 1, devout Tibetan Buddhists who were subtly reminded of death produced exaggerated aesthetic ratings unrelated to cultural worldviews. In Study 2, devout Tibetan Buddhists produced worldview defense following subliminal exposure to non-death cues of threat. The results demonstrate both the domain-generality of the process underlying worldview defense and the importance of religious doctrinal content in moderating mortality-salience effects.
Resumo:
One of the core elements of successful planning is the individuals’ experience of their shared open spaces. This paper attributes to the relationship between safety and urban design by means of natural surveillance and security in the city’s shared spaces. It examines how political claims over space reassembled alternative definitions of security in one of Cairo’s oldest quarters, and how ambitious planning schemes were mostly driven by problems of insecurity, chaos and disorder. The main crux to this account is based on original documents, interviews and maps which reveals considerable insights and accounts of how this vision affected the quarter’s spatial quality and the user’s reactions to his new spatial formula. It also reveals conflicting conceptions of safety and security between the planning ambitions and the users experiences, which not only lacked reliable visions for securing the quarter, but also resulted further disruption to their everyday living spaces.
Resumo:
Mobile malware has been growing in scale and complexity spurred by the unabated uptake of smartphones worldwide. Android is fast becoming the most popular mobile platform resulting in sharp increase in malware targeting the platform. Additionally, Android malware is evolving rapidly to evade detection by traditional signature-based scanning. Despite current detection measures in place, timely discovery of new malware is still a critical issue. This calls for novel approaches to mitigate the growing threat of zero-day Android malware. Hence, the authors develop and analyse proactive machine-learning approaches based on Bayesian classification aimed at uncovering unknown Android malware via static analysis. The study, which is based on a large malware sample set of majority of the existing families, demonstrates detection capabilities with high accuracy. Empirical results and comparative analysis are presented offering useful insight towards development of effective static-analytic Bayesian classification-based solutions for detecting unknown Android malware.
Resumo:
The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.