924 resultados para Threat categories


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stereotypes about different groups persist in organizations. Employees from such groups may experience stereotype threat, or the concern that they are being judged on the basis of demeaning stereotypes about groups to which they belong. The goal of this focal article is to discuss whether stereotype threat is a useful construct for organizational psychology research and practice. To this end, we focus on consequences other than acute performance deficits in laboratory settings. In particular, we examine studies that highlight the effects of stereotype threat on intrapersonal outcomes (e.g., job attitudes), interpersonal outcomes (e.g., negotiation), and on the relationship between employees and their organization. The research reviewed suggests that stereotype threat is a potentially important phenomenon in organizations, but it also highlights the paucity of research in an organizational context. We provide suggestions for future research directions as well as for the prevention and amelioration of stereotype threat in the workplace.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The stocking of predators can have significant consequences on recipient aquatic ecosystems. We investigated some potential ecological impacts of stocking a predatory fish (Lates calcarifer) into a coastal river and a large impoundment in north-eastern Australia. L. calcarifer was mostly found in slower-moving, larger reaches of the river or in the main body of the impoundment where there was abundant suitable habitat. In the tidally influenced freshwater reaches of the coastal river, L. calcarifer predominately consumed aytid and palaemonid shrimp that were associated with local macrophyte beds or littoral grasses. In this area the diets of juvenile stocked and wild L. calcarifer were similar and stocked fish displayed a high degree of site fidelity. Further upstream in the river, away from tidal influence, and in the impoundment, fish were the main prey item. Cannibalism was uncommon and we suggest that, at the current stocking densities, there was little dietary evidence of predatory impacts from L. calcarifer on species of conservation concern. We caution against introducing novel predatory species such as L. calcarifer in or near areas that are outside their natural range and are known to support rare, threatened or endangered species.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This month’s long-awaited release of the Trans-Pacific Partnership (TPP) text was the result of years of negotiations on trade ties between nations around the Pacific Rim. Some six weeks earlier, another set of deliberations came to an end as the United Nations unveiled its 17 Sustainable Development Goals (SDGs), which aim to eradicate poverty and reduce inequality by addressing critical issues such as food security, health care, access to education, clean and affordable water, clean energy, and climate action. Unfortunately, the two documents are incompatible. Several chapters of the TPP impinge upon the SDGs, potentially undermining the UN’s efforts to promote sustainable development and equality throughout the Pacific region. Moreover, many developing countries, least-developed countries, and small island states in the Pacific region are excluded from the preferential trade deal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Exotic plant pests (EPPs) threaten production, market access and sustainability of Australian plant production systems. For the grains industry there are over 600 identified EPPs of which 54 are considered high priority, posing a significant threat. Despite Australia’s geographical isolation and strong quarantine systems, the threat from EPPs has never been higher with the increasing levels of travel and trade, emphasising the need for improving our efforts in prevention, preparedness and surveillance for EPPs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Detection and prevention of global network satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the literature: first, to assess in detail the exact nature of threat scenarios posed by spoofing against the most commonly cited targets; second, to investigate the many practical impediments, often underplayed, to carrying out GNSS spoofing attacks in the field; and third, to survey and assess the effectiveness of a wide range of proposed defences against GNSS spoofing. Our conclusion lists promising areas of future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: We aimed to assess the impact of task demands and individual characteristics on threat detection in baggage screeners. Background: Airport security staff work under time constraints to ensure optimal threat detection. Understanding the impact of individual characteristics and task demands on performance is vital to ensure accurate threat detection. Method: We examined threat detection in baggage screeners as a function of event rate (i.e., number of bags per minute) and time on task across 4 months. We measured performance in terms of the accuracy of detection of Fictitious Threat Items (FTIs) randomly superimposed on X-ray images of real passenger bags. Results: Analyses of the percentage of correct FTI identifications (hits) show that longer shifts with high baggage throughput result in worse threat detection. Importantly, these significant performance decrements emerge within the first 10 min of these busy screening shifts only. Conclusion: Longer shift lengths, especially when combined with high baggage throughput, increase the likelihood that threats go undetected. Application: Shorter shift rotations, although perhaps difficult to implement during busy screening periods, would ensure more consistently high vigilance in baggage screeners and, therefore, optimal threat detection and passenger safety.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While the majority of violent threats – defined as an expression of intent to do harm or act out violently against someone or something – do not progress to actual violence, a small proportion of threateners do go on to enact violence. Most researchers argue that violence risk assessments are inadequate for assessing threats of violence, which raises the question: how should a threat assessment (TA) be conducted? To begin to understand available frameworks for assessing threats, a systematic review of TA research literature was conducted. Most TA literature pertains to a specific domain (schools, public figure threats, workplaces) and target audience (clinicians, school personnel, law enforcement). TA guidelines are typically based on literature reviews with some based on empirical measures and others having no strong evidential basis. The most common concepts in TA are exploration of the threatener's mental health, the motivation for the threat and the presence of any plans. Rather than advocating for the development of a protocol for conducting TA, this article outlines the common areas of inquiry in assessing threats and highlights the limitations of current TA guidelines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

- Background Sonography is an important diagnostic tool in children with suspected appendicitis. Reported accuracy and appendiceal visualisation rates vary significantly, as does the management of equivocal ultrasound findings. The aim of this study was to audit appendiceal sonography at a tertiary children's hospital, and provide baseline data for a future prospective study. - Summary of work Records of children who underwent ultrasound studies for possible appendicitis between January 2008 and December 2010 were reviewed. Variables included patient demographics, sonographic appendix characteristics, and secondary signs. Descriptive statistics and analysis using ANOVA, Mann-Whitney U test, and ROC curves were performed. Mater Human Research Ethic Committee approval was granted. - Summary of results There were 457 eligible children. Using a dichotomous diagnostic model (including equivocal results), sensitivity was 89.6%, specificity 91.6%, and diagnostic yield of 40.7%. ROC curve analysis of a 6mm diameter cut-off was 0.88 AUC (95% CI 0.80 to 0.95). - Discussion and conclusions Sonography is an accurate test for acute appendicitis in children, with a high sensitivity and negative predictive value. A diameter of 6mm as an absolute cut-off in a binary model can lead to false findings. Results were compared with available literature. Recent publications propose categorising diameter1 and integrating secondary signs2 to improve accuracy and provide more meaningful results to clinicians. This study will be a benchmark for future studies with multiple diagnostic categorisation.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The dissertation examines aspects of asymmetrical warfare in the war-making of the German military entrepreneur Ernst von Mansfeld during his involvement in the Thirty Years War. Due to the nature of the inquiry, which combines history with military-political theory, the methodological approach of the dissertation is interdisciplinary. The theoretical framework used is that of asymmetrical warfare. The primary sources used in the dissertation are mostly political pamphlets and newsletters. Other sources include letters, documents, and contemporaneous chronicles. The secondary sources are divided into two categories, literature on the history of the Thirty Years War and textbooks covering the theory of asymmetrical warfare. The first category includes biographical works on Ernst von Mansfeld, as well as general histories of the Thirty Years War and seventeenth-century warfare. The second category combines military theory and political science. The structure of the dissertation consists of eight lead chapters, including an introduction and conclusion. The introduction covers the theoretical approach and aims of the dissertation, and provides a brief overlook of the sources and previous research on Ernst von Mansfeld and asymmetrical warfare in the Thirty Years War. The second chapter covers aspects of Mansfeld s asymmetrical warfare from the perspective of operational art. The third chapter investigates the illegal and immoral aspects of Mansfeld s war-making. The fourth chapter compares the differing methods by which Mansfeld and his enemies raised and financed their armies. The fifth chapter investigates Mansfeld s involvement in indirect warfare. The sixth chapter presents Mansfeld as an object and an agent of image and information war. The seventh chapter looks into the counter-reactions, which Mansfeld s asymmetrical warfare provoked from his enemies. The eighth chapter offers a conclusion of the findings. The dissertation argues that asymmetrical warfare presented itself in all the aforementioned areas of Mansfeld s conduct during the Thirty Years War. The operational asymmetry arose from the freedom of movement that Mansfeld enjoyed, while his enemies were constrained by the limits of positional warfare. As a non-state operator Mansfeld was also free to flout the rules of seventeenth-century warfare, which his enemies could not do with equal ease. The raising and financing of military forces was another source of asymmetry, because the nature of early seventeenth-century warfare favoured private military entrepreneurs rather than embryonic fiscal-military states. The dissertation also argues that other powers fought their own asymmetrical and indirect wars against the Habsburgs through Mansfeld s agency. Image and information were asymmetrical weapons, which were both aimed against Mansfeld and utilized by him. Finally, Mansfeld s asymmetrical threat forced the Habsburgs to adapt to his methods, which ultimately lead to the formation of a subcontracted Imperial Army under the management and leadership of Albrecht von Wallenstein. Therefore Mansfeld s asymmetrical warfare ultimately paved way for the kind of state-monopolized, organised, and symmetrical warfare that has prevailed from 1648 onwards. The conclusion is that Mansfeld s conduct in the Thirty Years War matched the criteria for asymmetrical warfare. While traditional historiography treated Mansfeld as an anomaly in the age of European state formation, his asymmetrical warfare has begun to bear resemblance to the contemporary conflicts, where nation states no longer hold the monopoly of violence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Trace metals constitute a major form of water pollutant that can adversely affect fish production. The potentially toxic metals have been identified as lead, zinc, copper, arsenic, antimony, mercury beryllium, barium, cadmium, chromium, nickel, selenium among others. Preliminary laboratory studies have been directed to the determination of traces of lead in the aquatic biota and its toxicity. There are indications that the levels reported in effluents from some of the industries may be above the tolerant limits of local fish species and organisms that make up their food. Metal pollution could become a serious problem to freshwater fisheries in the future as a result of increasing urbanization and industrialization, unless efforts are made to prevent it

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nigeria, the country of many rivers is also rich in lakes, and wetlands, sustainable and wise use of these inland aquatic ecosystem and water resources has become a matter of widespread and intense concern. Unhealthy freshwater ecosystems and seriously diminishing and unequal availability of quality freshwater call for high quality limnological research and expertise to underpin the enhancement of sustainable fisheries and aquaculture development.In every regard of national health, agriculture and economics, the continued over exploitation and misuse of finite freshwater resources is directly causal to the progressively deteriorating fish production and general standard of living.The integration of basic understanding of inland ecosystems with applied problems and their solutions should be of fundamental concern to all stakeholders in our freshwater resource. This is a basic element in creating an attractive and security ensured economic for investment in fisheries development, including aquaculture. This is the focus of this paper