983 resultados para security threat


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction: The Violence Medical Unit (VMU), a specialised forensic medical consultation, was created at the Lausanne university Hospital in 2006. All patients consulting at the ED for interpersonal violencerelated injury are referred to the VMU, which provides forensic documentation of the injury and referral to the relevant community based victim-support organisations within 48 hours of the ED visit. This frees the ED medical staff from forensic injury documentation and legal/social referral, tasks for which they lack both time and training. Among community violence, assaults by nightclub security agents against patrons have increased from 6% to 10% between 2007 and 2009. We set out to characterise the demographics, assault mechanisms, subsequent injuries, prior alcohol intake and ED & VMU costs incurred by this group of patients. Methods: We retrospectively included all patients consulting at the VMU due to assault by nightclub security agents from January 2007 to December 2009. Data was obtained from ED & VMU medical, nursing and administrative records. Results: Our sample included 70 patients, of which 64 were referred by the CHUV ED. The victims were typically young (median age 29) males (93%). 77% of assaults occurred on the weekend between 12 PM and 4 AM, and 73% of the victims were under the influence of alcohol. 83% of the patients were punched, kicked and/or head-butted; 9% had been struck with a blunt instrument. 80% of the injuries were in the head and neck area and 19% of the victims sustained fractures. 21% of the victims were prescribed medical leave. Total ED & VMU costs averaged 1048 SFr. Conclusion: Medical staff treating this population of assault victims must be aware of the assault mechanisms and injury patterns, in particular the high probability of fractures, in order to provide adequate diagnosis and care. Associated inebriation mandates liberal use of radiology, as delayed or missed diagnosis may have medical, medicolegal and legal implications. Emergency medical services play an important role in detecting and reporting of such incidents. Centralised management of the forensic documentation facilitates referral to victim support organisations and epidemiological data collection. Magnitudes and trends of the different types of violence can be determined, and this information can be then impact public safety management policies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report an experiment where participants observed an attack on their virtual body as experienced in an immersive virtual reality (IVR) system. Participants sat by a table with their right hand resting upon it. In IVR, they saw a virtual table that was registered with the real one, and they had a virtual body that substituted their real body seen from a first person perspective. The virtual right hand was collocated with their real right hand. Event-related brain potentials were recorded in two conditions, one where the participant"s virtual hand was attacked with a knife and a control condition where the knife only struck the virtual table. Significantly greater P450 potentials were obtained in the attack condition confirming our expectations that participants had a strong illusion of the virtual hand being their own, which was also strongly supported by questionnaire responses. Higher levels of subjective virtual hand ownership correlated with larger P450 amplitudes. Mu-rhythm event-related desynchronization in the motor cortex and readiness potential (C3-C4) negativity were clearly observed when the virtual hand was threatened as would be expected, if the real hand was threatened and the participant tried to avoid harm. Our results support the idea that event-related potentials may provide a promising non-subjective measure of virtual embodiment. They also support previous experiments on pain observation and are placed into context of similar experiments and studies of body perception and body ownership within cognitive neuroscience.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report an experiment where participants observed an attack on their virtual body as experienced in an immersive virtual reality (IVR) system. Participants sat by a table with their right hand resting upon it. In IVR, they saw a virtual table that was registered with the real one, and they had a virtual body that substituted their real body seen from a first person perspective. The virtual right hand was collocated with their real right hand. Event-related brain potentials were recorded in two conditions, one where the participant"s virtual hand was attacked with a knife and a control condition where the knife only struck the virtual table. Significantly greater P450 potentials were obtained in the attack condition confirming our expectations that participants had a strong illusion of the virtual hand being their own, which was also strongly supported by questionnaire responses. Higher levels of subjective virtual hand ownership correlated with larger P450 amplitudes. Mu-rhythm event-related desynchronization in the motor cortex and readiness potential (C3-C4) negativity were clearly observed when the virtual hand was threatened as would be expected, if the real hand was threatened and the participant tried to avoid harm. Our results support the idea that event-related potentials may provide a promising non-subjective measure of virtual embodiment. They also support previous experiments on pain observation and are placed into context of similar experiments and studies of body perception and body ownership within cognitive neuroscience.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Phase encoded nano structures such as Quick Response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase encoded QR codes. The system is illuminated using polarized light and the QR code is encoded using a phase-only random mask. Using classification algorithms it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase encoded QR codes using polarimetric signatures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We expose the ubiquitous interaction between an information screen and its’ viewers mobile devices, highlights the communication vulnerabilities, suggest mitigation strategies and finally implement these strategies to secure the communication. The screen infers information preferences’ of viewers within its vicinity transparently from their mobile devices over Bluetooth. Backend processing then retrieves up-to-date versions of preferred information from content providers. Retrieved content such as sporting news, weather forecasts, advertisements, stock markets and aviation schedules, are systematically displayed on the screen. To maximise users’ benefit, experience and acceptance, the service is provided with no user interaction at the screen and securely upholding preferences privacy and viewers anonymity. Compelled by the personal nature of mobile devices, their contents privacy, preferences confidentiality, and vulnerabilities imposed by screen, the service’s security is fortified. Fortification is predominantly through efficient cryptographic algorithms inspired by elliptic curves cryptosystems, access control and anonymity mechanisms. These mechanisms are demonstrated to attain set objectives within reasonable performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dreaming is a pure form of phenomenality, created by the brain untouched by external stimulation or behavioral activity, yet including a full range of phenomenal contents. Thus, it has been suggested that the dreaming brain could be used as a model system in a biological research program on consciousness (Revonsuo, 2006). In the present thesis, the philosophical view of biological realism is accepted, and thus, dreaming is considered as a natural biological phenomenon, explainable in naturalistic terms. The major theoretical contribution of the present thesis is that it explores dreaming from a multidisciplinary perspective, integrating information from various fields of science, such as dream research, consciousness research, evolutionary psychology, and cognitive neuroscience. Further, it places dreaming into a multilevel framework, and investigates the constitutive, etiological, and contextual explanations for dreaming. Currently, the only theory offering a full multilevel explanation for dreaming, that is, a theory including constitutive, etiological, and contextual level explanations, is the Threat Simulation Theory (TST) (Revonsuo, 2000a; 2000b). The empirical significance of the present thesis lies in the tests conducted to test this specific theory put forth to explain the form, content, and biological function of dreaming. The first step in the empirical testing of the TST was to define exact criteria for what is a ‘threatening event’ in dreams, and then to develop a detailed and reliable content analysis scale with which it is possible to empirically explore and quantify threatening events in dreams. The second step was to seek answers to the following questions derived from the TST: How frequent threatening events are in dreams? What kind of qualities these events have? How threatening events in dreams relate to the most recently encoded or the most salient memory traces of threatening events experienced in waking life? What are the effects of exposure to severe waking life threat on dreams? The results reveal that threatening events are relatively frequent in dreams, and that the simulated threats are realistic. The most common threats include aggression, are targeted mainly against the dream self, and include simulations of relevant and appropriate defensive actions. Further, real threat experiences activate the threat simulation system in a unique manner, and dream content is modulated by the activation of long term episodic memory traces with highest negative saliency. To sum up, most of the predictions of the TST tested in this thesis received considerable support. The TST presents a strong argument that explains the specific design of dreams as threat simulations. The TST also offers a plausible explanation for why dreaming would have been selected for: because dreaming interacted with the environment in such a way that enhanced fitness of ancestral humans. By referring to a single threat simulation mechanism it furthermore manages to explain a wide variety of dream content data that already exists in the literature, and to predict the overall statistical patterns of threat content in different samples of dreams. The TST and the empirical tests conducted to test the theory are a prime example of what a multidisciplinary approach to mental phenomena can accomplish. Thus far, dreaming seems to have always resided in the periphery of science, never regarded worth to be studied by the mainstream. Nevertheless, when brought to the spotlight, the study of dreaming can greatly benefit from ideas in diverse branches of science. Vice versa, knowledge learned from the study of dreaming can be applied in various disciplines. The main contribution of the present thesis lies in putting dreaming back where it belongs, that is, into the spotlight in the cross-road of various disciplines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tutkielman tavoitteena on oikeudellisten lähteiden systematisoinnilla tuottaa johdonmukainen kuvaus poliisin, rajavartiomiehen sekä ammattisotilaan virkavelvollisuuksista, oikeudellisesta vastuusta ja virkarikosten rangaistavuudesta. Päähuomio kohdistuu virkamiehen määräaikaiseen virantoimituksesta erottamiseen. Oikeudellisella argumentaatiolla pyritään esittämään lainmukainen ja hyväksyttävä tulkintakannanotto siihen, miten kyseistä säädöstä tulisi tulkita. Tutkimusmetodi työssä on oikeusdogmatiikka. Ensisijaisena aineistona tutkielmassa on voimassa oleva lainsäädäntö valmisteluaineistoineen. Toissijaisina lähteinä käytetään kirjallisuutta, viranomaisten kurinpitopäätöksiä ja haastatteluja. Määräaikainen erottaminen voidaan määrätä virkamiehelle, joka toimii vastoin virkavelvollisuuksiaan tai laiminlyö niitä. Säädös on tulkittavissa laajentavasti siten, että myös muut kuin selkeästi viranomaisen valvontavastuulle kuuluvat teot voidaan katsoa virkatehtävien vastaiseksi. Erityisen käyttäytymisvelvoitteen johdosta menettely on rangaistavaa myös vapaa-ajalla. Määräaikainen erottaminen sijoittuu rangaistusasteikossa varoituksen ja irtisanomisen väliin. Rangaistus ei edellytä erityisen painavia perusteita, joita vaaditaan virkamiehen irtisanomiseen. Uuden säädöksen myötä irtisanomisten määrä on vähentynyt Rajavartiolaitoksessa. Säädöksestä on muotoutunut kurinpidollinen lisärangaistus, joka on määrätty virkamiehelle hallinnollisella päätöksellä yleensä rikostuomion jälkeen. Säädös on kuitenkin tarkoitettu ja se mahdollistaa myös puuttumisen varsinaisten virkatehtävien laiminlyönteihin. Lainsäädännön selkeyttämiseksi määräaikaisen erottamisen säädös tulisi poistaa eri viranomaisten erityislainsäädännöstä ja liittää suoraan virkamieslakiin. Säädöksen soveltaminen tulisi ulottaa koskemaan myös muita virkamiehiä, jotka palvelevat kyseisissä viranomaisissa. Tutkimuksen kohteena oleva virkamiesryhmä alistuu virkamiesoikeudessa blankkorangaistusuhan alle. Virkamiehen on vaikea hahmottaa kaikkea rangaistavaa toimintaa, ja virantoimittamisvelvollisuus on usein täsmentymätön ja tulkinnanvarainen. Kokonaisharkinnassa korostuvat myös muut kuin oikeudelliset lähteet (esimerkiksi moraalikäsitykset, etiikka, ohjeet, virkamiehen elämäntilanne). Sotilaiden ja poliisin oikeudenhoito poikkeaa monilta osin muiden virkamiesten oikeudenhoitomenettelystä. Rajavartiolaitoksessa sotilasoikeudenhoidon määräykset ja ohjeet ovat selkeästi puutteelliset. Rajavartiolaitoksen tehtäväkentän ja toimivaltuudet huomioiden tulisi kurinpito- ja virkarikosten tutkinnoissa lähentyä poliisin mallia sekä hyödyntää rikostorjuntahenkilöstön ammattitaitoa oman henkilökunnan esitutkinnoissa. Erityisen turvallisuusviranomaisten virkarikoksiin erikoistuneen tutkintaorganisaation perustaminen voisi tehostaa ja parantaa esitutkintojen tasoa sekä lisätä oikeusvarmuutta.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security issues in telecommunication networks have become more important due to the development of the industry. The number of network elements and services has increased in the radio network as in the core network side, which has increased the number of security related issues. Ericsson has developed an OSS-RC product for operation and maintenance porpoises into the telecommunication networks. OSS-RC is used in a number of telecommunications operators, which have Ericsson's products used in their telecommunication networks. Ericsson provides product installation and maintenance support and guidance, but despite this, the product may have security related issues, either due to lack of following the instructions, human error or defect in the product itself or in a third party products attached. Ericsson’s Operation and Maintenance Security Service for OSS-RC networks aims to provide tools for checking the security level of the O&M product so that it meets all requirements and Ericsson’s own security related rules. Each customer has a unique telecommunications network structure and services, and so the security service has to be to create individually depending on the customer. The purpose of this thesis is to define the basic instructions for creating the security service for different customers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Avhandlingen undersöker den Afrikanska Unionens freds- och säkerhetsråd och dess roll i framhävandet och upprätthållandet av fred, säkerhet och stabilitet i Afrika. Detta freds- och säkerhetsråd etablerades formellt 2004 och opererar under den Afrikanska Unionen (AU) som å sin sida upprättades 2002. Den Afrikanska Unionens freds- och säkerhetsråds roll i framhävandet av fred, säkerhet och stabilitet gör rådet till en hörnsten inom ramen för konfliktförebyggande och -hantering, samt konfliktlösning på den afrikanska kontinenten. Den Afrikanska Unionens freds- och säkerhetsråd spelar också en högst viktig roll i implementeringen av ansvaret att beskydda civilbefolkningen i konfliktsituationer. För uppfyllandet av sitt mandat att framhäva och upprätthålla fred, säkerhet och stabilitet i Afrika krävs det att freds- och säkerhetsrådet samarbetar med andra institutioner och mekanismer som handhar internationella och regionala freds- och säkerhetsärenden. Avhandlingen analyserar tre dimensioner av denna typ av relationer som freds- och säkerhetsrådet bör etablera med dessa organ och mekanismer för att kunna utföra sitt mandat effektivt. Först analyseras relationen mellan Afrikanska Unionens freds- och säkerhetsråd och Förenta Nationernas säkerhetsråd som också beskrivs i artikel 17 (1) i protokollet som förde till etablerandet av AU:s freds- och säkerhetsråd. Analysen understryker FN:s säkerhetsråd som det organ som bär det primära ansvaret i förhållande till fred och säkerhet, medan AU:s freds- och säkerhetsråd fungerar som en kompletterande komponent i sin roll som ett regionalt organ. Avhandlingen fortsätter med att analysera förhållandet mellan AU:s freds- och säkerhetsråd och andra organ inom AU, samt andra relevanta institutioner som framgår av artikel 10, 18 (1), 19 och 20 i protokollet för rådets etablerande. Avhandlingen diskuterar i detalj hur samarbetet mellan AU:s freds- och säkerhetsråd och dessa institutioner och organ kunde förstärkas till fördel för effektivt framhävande och upprätthållande av fred och säkerhet i Afrika. Slutligen analyserar avhandlingen samarbetet mellan AU:s freds- och säkerhetsråd och sub-regionala mekanismer etablerade under regionala ekonomiska gemenskaper som beskrivs i artikel 16 i protokollet för etablerandet av rådet. Avhandlingen diskuterar i detalj rollen för de sub-regionala mekanismerna i den afrikanska freds- och säkerhetsarkitekturen. Avhandlingen diskuterar vidare förhållandet mellan de sub-regionala mekanismerna och den afrikanska stand-by styrkan ASF och förutsättningarna för detta arrangemang att bemöta afrikanska konflikter. Avhandlingen fokuserar också på en harmoniserings- och samarbetsprocess i förhållande till de sub-regionala mekanismerna, de regionala ekonomiska gemenskaperna och den Afrikanska Unionens freds- och säkerhetsråd. Kort sagt beskriver avhandlingen hur förhållandet mellan AU:s freds- och säkerhetsråd och de ovan nämnda organ och mekanismer har en faktisk och potentiell möjlighet att effektivt bidra till fred, säkerhet och stabilitet i Afrika. Avhandlingen identifierar utmaningarna kring att göra detta till ett fungerande förhållande samtidigt som den genererar både generella och specifika rekommendationer om hur dessa utmaningar bäst kan bemötas. Några av dessa utmaningar utgörs av följande aspekter: konflikten mellan AU:s och FN:s reglemang i bemötandet av freds- och säkerhetsutmaningar; de olika metoderna i FN och AU vid implementeringen av principen av universell jurisdiktion; konflikten mellan de olika mandaten som AU:s freds- och säkerhetsråd och FN:s säkerhetsråd har i förhållande till implementeringen av principen om intervention; och konflikten mellan lagarna och metoderna i förhållande till AU:s freds- och säkerhetsråd och de regionala mekanismerna. En av de huvudsakliga rekommendationerna i avhandlingen i bemötandet av de ovan nämnda utmaningarna är att harmonisera de olika systemen för att försäkra att det föreligger ett samordnat bemötande av konflikter i Afrika. Efter att ha identifierat luckorna i AU:s freds- och säkerhetsprotokoll med speciell fokus på förhållandet mellan rådet och de relevanta organen och mekanismerna rekommenderar avhandlingen ett antal tillägg och modifieringar till instrumentet ifråga för att effektivera, stärka och upprätthålla detta förhållande. Avhandlingen föreslår att dessa tillägg och modifieringar skulle företas under 2014 då detta år markerar 10 år efter att AU:s freds- och säkerhetsråd etablerades. Idén bakom detta företagandet ligger i att 10 år torde vara en tillfredställande tidsperiod för att mäta hur freds- och säkerhetsrådet har fungerat och hur dess förhållande med de relevanta institutionerna och mekanismerna kunde förbättras. Avhandlingen representerar den bredaste och nyaste studien inom ramen för artikel 16, 17, 18, 19 och 20 i protokollet för AU:s freds- och säkerhetsråd och introducerar ett innovativt bemötande av utmaningar till fred, säkerhet och stabilitet på den afrikanska kontinenten. Avhandlingen bidrar till teorin och praxisen i AU:s freds- och säkerhetsråd vilket kan vara av intresse för både forskare och praktiker i folkrätt såväl som i internationella freds- och säkerhetsstudier, speciellt i Afrika.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since his inauguration, President Barack Obama has emphasized the need for a new cybersecurity policy, pledging to make it a "national security priority". This is a significant change in security discourse after an eight-year war on terror – a term Obama announced to be no longer in use. After several white papers, reports and the release of the so-called 60-day Cybersecurity Review, Obama announced the creation of a "cyber czar" position and a new military cyber command to coordinate American cyber defence and warfare. China, as an alleged cyber rival, has played an important role in the discourse that introduced the need for the new office and the proposals for changes in legislation. Research conducted before this study suggest the dominance of state-centric enemy descriptions paused briefly after 9/11, but returned soon into threat discourse. The focus on China's cyber activities fits this trend. The aim of this study is to analyze the type of modern threat scenarios through a linguistic case study on the reporting on Chinese hackers. The methodology of this threat analysis is based on the systemic functional language theory, and realizes as an analysis of action and being descriptions (verbs) used by the American authorities. The main sources of data include the Cybersecurity Act 2009, Securing Cyberspace for the 44th Presidency, and 2008 Report to Congress of the U.S. - China Economic and Security Review Commission. Contrary to the prevailing and popularized terrorism discourse, the results show the comeback of Cold War rhetoric as well as the establishment of a state-centric threat perception in cyber discourse. Cyber adversaries are referred to with descriptions of capacity, technological superiority and untrustworthiness, whereas the ‘self’ is described as vulnerable and weak. The threat of cyber attacks is compared to physical attacks on critical military and civilian infrastructure. The authorities and the media form a cycle, in which both sides quote each other and foster each other’s distrust and rhetoric. The white papers present China's cyber army as an existential threat. This leads to cyber discourse turning into a school-book example of a securitization process. The need for security demands action descriptions, which makes new rules and regulations acceptable. Cyber discourse has motives and agendas that are separate from real security discourse: the arms race of the 21st century is about unmanned war.