96 resultados para security risk analysis

em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast


Relevância:

90.00% 90.00%

Publicador:

Resumo:

An important issue in risk analysis is the distinction between epistemic and aleatory uncertainties. In this paper, the use of distinct representation formats for aleatory and epistemic uncertainties is advocated, the latter being modelled by sets of possible values. Modern uncertainty theories based on convex sets of probabilities are known to be instrumental for hybrid representations where aleatory and epistemic components of uncertainty remain distinct. Simple uncertainty representation techniques based on fuzzy intervals and p-boxes are used in practice. This paper outlines a risk analysis methodology from elicitation of knowledge about parameters to decision. It proposes an elicitation methodology where the chosen representation format depends on the nature and the amount of available information. Uncertainty propagation methods then blend Monte Carlo simulation and interval analysis techniques. Nevertheless, results provided by these techniques, often in terms of probability intervals, may be too complex to interpret for a decision-maker and we, therefore, propose to compute a unique indicator of the likelihood of risk, called confidence index. It explicitly accounts for the decisionmaker’s attitude in the face of ambiguity. This step takes place at the end of the risk analysis process, when no further collection of evidence is possible that might reduce the ambiguity due to epistemic uncertainty. This last feature stands in contrast with the Bayesian methodology, where epistemic uncertainties on input parameters are modelled by single subjective probabilities at the beginning of the risk analysis process.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

It has long been assumed that risk taking is closely associated with criminal behavior. One reason for placing criminals behind bars-aside from punishment and protecting the public-is to prevent them from engaging in further risky criminal activities. Limited attention has been paid to whether being inside or outside prison affects offenders' risk-taking behaviors and attitudes. We compared risk-taking behaviors and attitudes in five risk domains (ethical, financial, health/safety, recreational, social) among 75 incarcerated offenders (i.e., offenders who are currently in prison) and 45 ex-offenders (i.e., offenders who have just been released from prison). Ex-offenders reported higher likelihood of engaging in risky behavior, driven largely by a willingness to take more risks in the recreational and ethical domains. Benefits attributed to risk taking as well as risk perception did not differ between incarcerated and ex-offenders, indicating that the opportunity to take risks might underlie behavioral risk intentions. Our results also indicate that risk-taking activities are better predicted by the expected benefits rather than by risk perception, aside from the health/safety domain. These results highlight the importance of studying the person and the environment and examining risk taking in a number of content domains.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Most child maltreatment occurs within the context of high risk families. There are ethical, economic and ecological reasons why physical abuse in such families should be a major concern. Physical abuse is a significant issue throughout the UK. Yet, while neglect and other forms of abuse are receiving focused attention, physical abuse may languish under the misconceptions that it is no longer a problem, is addressed elsewhere, or is just too overwhelming an issue.
The physical abuse of children can involve regular, violent treatment at the hands of parents or carers over a number of years. Its physical effects may last for days and may result in actual physical injury. It is not accidental. Although physical abuse can occur in any family, it is prevalent in particular sectors of society, where families may be vulnerable to a combination of complex risk factors such as domestic abuse, alcohol and drug (mis)use, and mental health issues. These factors are present in 34% of Serious Case Reviews (SCRs).
The authors provide an increased understanding of risk, analysis, impact, learning and the current landscape of service delivery in relation to the physical abuse of children living in high risk families for professional, postgraduate and policy-making audiences.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

OBJECTIVES: Sphingosine kinase 1 (SphK1) phosphorylates the membrane sphingolipid, sphingosine, to sphingosine-1-phosphate (S1P), an oncogenic mediator, which drives tumor cell growth and survival. Although SphK1 has gained increasing prominence as an oncogenic determinant in several cancers, its potential as a therapeutic target in colon cancer remains uncertain. We investigated the clinical relevance of SphK1 expression in colon cancer as well as its inhibitory effects in vitro.

METHODS: SphK1 expression in human colon tumor tissues was determined by immunohistochemistry and its clinicopathological significance was ascertained in 303 colon cancer cases. The effects of SphK1 inhibition on colon cancer cell viability and the phosphoinositide 3-kinase (PI3K)/Akt cell survival pathway were investigated using a SphK1-selective inhibitor-compound 5c (5c). The cytotoxicity of a novel combination using SphK1 inhibition with the chemotherapeutic drug, 5-fluorouracil (5-FU), was also determined.

RESULTS: High SphK1 expression correlated with advanced tumor stages (AJCC classification). Using a competing risk analysis model to take into account disease recurrence, we found that SphK1 is a significant independent predictor for mortality in colon cancer patients. In vitro, the inhibition of SphK1 induced cell death in colon cancer cell lines and attenuated the serum-dependent PI3K/Akt signaling. Inhibition of SphK1 also enhanced the sensitivity of colon cancer cells to 5-FU.

CONCLUSION: Our findings highlight the impact of SphK1 in colon cancer progression and patient survival, and provide evidence supportive of further development in combination strategies that incorporate SphK1 inhibition with current chemotherapeutic agents to improve colon cancer outcomes.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Risk-taking tendencies and environmental opportunities to commit crime are two key features in understanding criminal behavior. Upon release from prison, ex-prisoners have a much greater opportunity to engage in risky activity and to commit criminal acts. We hypothesized that ex-prisoners would exhibit greater risk-taking tendencies compared to prisoners who have fewer opportunities to engage in risky activity and who are monitored constantly by prison authorities. Using cumulative prospect theory to compare the risky choices of prisoners and ex-prisoners our study revealed that ex-prisoners who were within 16 weeks of their prison release made riskier choices than prisoners. Our data indicate that previous studies comparing prisoners behind bars with nonoffenders may have underestimated the risk-taking tendencies of offenders. The present findings emphasize the central role played by risk-taking attitudes in criminal offending and highlight a need to examine offenders after release from prison.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Android is becoming ubiquitous and currently has the largest share of the mobile OS market with billions of application downloads from the official app market. It has also become the platform most targeted by mobile malware that are becoming more sophisticated to evade state-of-the-art detection approaches. Many Android malware families employ obfuscation techniques in order to avoid detection and this may defeat static analysis based approaches. Dynamic analysis on the other hand may be used to overcome this limitation. Hence in this paper we propose DynaLog, a dynamic analysis based framework for characterizing Android applications. The framework provides the capability to analyse the behaviour of applications based on an extensive number of dynamic features. It provides an automated platform for mass analysis and characterization of apps that is useful for quickly identifying and isolating malicious applications. The DynaLog framework leverages existing open source tools to extract and log high level behaviours, API calls, and critical events that can be used to explore the characteristics of an application, thus providing an extensible dynamic analysis platform for detecting Android malware. DynaLog is evaluated using real malware samples and clean applications demonstrating its capabilities for effective analysis and detection of malicious applications.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The effect that breed standards and selective breeding practices have on the welfare of pedigree dogs has recently come under scrutiny from both the general public and scientific community. Recent research has suggested that breeding for particular aesthetic traits, such as tightly curled tails, highly domed skulls and short muzzles predisposes dogs with these traits to certain inherited defects, such as spina bifida, syringomyelia and brachycephalic airway obstruction syndrome, respectively. Further to this, there is a very large number of inherited diseases that are not related to breed standards, which are thought to be prevalent, partly as a consequence of inbreeding and restricted breeding pools. Inherited diseases, whether linked to conformation or not, have varying impact on the individuals affected by them, and affect varying proportions of the pedigree dog population. Some diseases affect few breeds but are highly prevalent in predisposed breeds. Other diseases affect many breeds, but have low prevalence within each breed. In this paper, we discuss the use of risk analysis and severity diagrams as means of mapping the overall problem of inherited disorders in pedigree dogs and, more specifically, the welfare impact of specific diseases in particular breeds.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We use conjoint choice questions to investigate people's tastes for cancer risk reductions and income in the context of public programs that would provide for remediation at abandoned industrial contaminated sites. Our survey was self-administered using the computer by persons living in the vicinity of an important contaminated site on the Italian National Priority List. The value of a prevented case of cancer is €2.6 million, but this figure does vary with income, perceived exposure to contaminants, and respondent opinions about priorities that should be pursued by cleanup programs. © 2011 Society for Risk Analysis.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The availability of electricity is fundamental to modern society. It is at the top of the list of critical infrastructures and its interruption can have severe consequences. This highly important system is now evolving to become more reliable, efficient, and clean. This evolving infrastructure has become known as the smart grid; and these future smart grid systems will rely heavily on ICT. This infrastructure will require many servers and due to the nature of the grid, many of these systems will be geographically diverse requiring communication links. At the heart of this ICT infrastructure will be security. At each level of the smart grid from smart metering right through to remote sensing and control networks, security will be a key factor for system design consideration. With an increased number of ICT systems in place the security risk also increases. In this paper the authors discuss the changing nature of security in relation to the smart grid by looking at the move from legacy systems to more modern smart grid systems. The potential planes of attack for future smart grid systems are identified, and the general anatomy of a cyber-attack is presented. The authors then introduce the various threat levels of different types of attack and the mitigation techniques that could be put in place for each. Finally, the authors' introduce a Phasor Measurement Unit (PMU) communication system (operated by the authors) that can be used as a test-bed for some of the proposed future security research.