922 resultados para Jihadist threat
Resumo:
This chapter describes the behaviour that protects wild fish from predators, the external stimuli that elicit such behaviour, how it is affected by nutrient status and its link with stress physiology. The way antipredator behaviour develops is considered, including how inherited differences and experience influence this process, as are costs of showing effective antipredator behaviour and how these are traded off against its obvious benefits. Although cultured fish are protected against predation, they may still experience encounters with predators and much husbandry practice may be perceived by farmed fish as a potential threat. The problems for production, welfare and the environment caused by antipredator responses in cultured fish are discussed, as are problems arising from the fact that the behaviour of released fish may deviate from that shown by fish reared in nature. Potential solutions to such problems are reviewed, based on selecting appropriate fish for culture and on using husbandry practices that reduce the incidence of antipredator responses and, where fish are cultured for release, that mitigate the effects of domestication and captive rearing. Finally, some ways in which fish farmers can make use of the natural antipredator responses of their fish to improve the effectiveness of farming operations are discussed.
Resumo:
The European hare (Lepus europaeus) has declined throughout its native range but invaded numerous regions where it has negatively impacted native wildlife. In southern Sweden, it replaces the native mountain hare (L. timidus) through competition and hybridisation. We investigated temporal change in the invasive range of the European hare in Ireland, and compared its habitat use with the endemic Irish hare (L. timidus hibernicus). The range of the European hare was three times larger and its core range twice as large in 2012–2013 than in 2005. Its rate of radial range expansion was 0.73 km year−1 with its introduction estimated to have occurred ca. 1970. Both species utilised improved and rough grasslands and exhibited markedly similar regression coefficients with almost every land cover variable examined. Irish hares were associated with low fibre and high sugar content grass (good quality grazing) whilst the invader had a greater tolerance for low quality forage. European hares were associated with habitat patch edge density, suggesting it may be more suited to using hedgerows as diurnal resting sites than the Irish hare. Consequently, the invader had a wider niche breadth than the native but their niche overlap was virtually complete. Given the impact of the European hare on native species elsewhere, and its apparent pre-adaption for improved grasslands interspersed with arable land (a habitat that covers 70 % of Ireland), its establishment and range expansion poses a significant threat to the ecological security of the endemic Irish hare, particularly given their ecological similarities.
Resumo:
On 26 December 2003 an Israeli activist was shot by the Israeli Army while he was participating in a demonstration organized by Anarchists Against the Wall (AAtW) in the West Bank. This was the first time Israeli Soldiers have deliberately shot live bullets at a Jewish-Israeli activist. This paper is an attempt to understand the set of conditions, the enveloping frameworks, and the new discourses that have made this event, and similar shootings that soon followed, possible. Situating the actions of AAtW within a much wider context of securitization—of identities, movements, and bodies—we examine strategies of resistance which are deployed in highly securitized public spaces. We claim that an unexpected matrix of identity in which abnormality is configured as security threat render the bodies of activists especially precarious. The paper thus provides an account of the new rationales of security technologies and tactics which increasingly govern public spaces.
Resumo:
Falls are a significant threat to the safety, health and independence of older citizens. Despite the substantial evidence that is available around effective falls prevention programmes and interventions, their translation into falls reduction programmes and policies has yet to be fully realised. While hip fracture rates are decreasing, the number and incidence of fall-related hospital admissions among older people continue to rise. Given the demographic trends that highlight increasing numbers of older people in the UK, which is broadly reflected internationally, there is a financial and social imperative to minimise the rate of falls and associated injuries. Falling is closely aligned to growing older (Slips, Trips and Falls Update: From Acute and Community Hospitals and Mental Health Units in England and Wales, Department of Health, HMSO, London, 2010). According to the World Health Organization, around 30% of older people aged over 65 and 50% of those over 80 will fall each year (Falls Fact Sheet Number 344, WHO, Geneva, 2010). Falls happen as a result of many reasons and can have harmful consequences, including loss of mobility and independence, confidence and in many cases even death (Cochrane Database Syst Rev 15, 2009, 146; Slips, Trips and Falls Update: From Acute and Community Hospitals and Mental Health Units in England and Wales, Department of Health, HMSO, London, 2010; Falling Standards, Broken Promises: Report of the National
Audit of Falls and Bone Health in Older People 2010, Health Care Quality
Improvement Partnership, London, 2011). What is neither fair nor correct is the
common belief by old and young alike that falls are just another inconvenience to put up with. The available evidence justifiably supports the view that well-organised services, based upon national standards and expert guidance, can prevent future falls among older people and reduce death and disability from fractures. This paper will draw from the UK, as an exemplar for policy and practice, to discuss the strategic direction of falls prevention programmes for older people and the partnerships that need to exist between researchers, service providers and users of services to translate evidence to the clinical setting. Second, it will propose some mechanisms for disseminating evidence to healthcare professionals and other stakeholders, to improve the quality and capacity of the clinical workforce.
Resumo:
The next-generation smart grid will rely highly on telecommunications infrastructure for data transfer between various systems. Anywhere we have data transfer in a system is a potential security threat. When we consider the possibility of smart grid data being at the heart of our critical systems infrastructure it is imperative that we do all we can to ensure the confidentiality, availability and integrity of the data. A discussion on security itself is outside the scope of this paper, but if we assume the network to be as secure as possible we must consider what we can do to detect when that security fails, or when the attacks comes from the inside of the network. One way to do this is to setup a hacker-trap, or honeypot. A honeypot is a device or service on a network which appears legitimate, but is in-fact a trap setup to catch breech attempts. This paper identifies the different types of honeypot and describes where each may be used. The authors have setup a test honeypot system which has been live for some time. The test system has been setup to emulate a device on a utility network. The system has had many hits, which are described in detail by the authors. Finally, the authors discuss how larger-scale systems in utilities may benefit from honeypot placement.
Resumo:
The availability of electricity is fundamental to modern society. It is at the top of the list of critical infrastructures and its interruption can have severe consequences. This highly important system is now evolving to become more reliable, efficient, and clean. This evolving infrastructure has become known as the smart grid; and these future smart grid systems will rely heavily on ICT. This infrastructure will require many servers and due to the nature of the grid, many of these systems will be geographically diverse requiring communication links. At the heart of this ICT infrastructure will be security. At each level of the smart grid from smart metering right through to remote sensing and control networks, security will be a key factor for system design consideration. With an increased number of ICT systems in place the security risk also increases. In this paper the authors discuss the changing nature of security in relation to the smart grid by looking at the move from legacy systems to more modern smart grid systems. The potential planes of attack for future smart grid systems are identified, and the general anatomy of a cyber-attack is presented. The authors then introduce the various threat levels of different types of attack and the mitigation techniques that could be put in place for each. Finally, the authors' introduce a Phasor Measurement Unit (PMU) communication system (operated by the authors) that can be used as a test-bed for some of the proposed future security research.
Resumo:
Polybrominated diphenyl ethers (PBDEs) are a group of flame retardants that have been in use since the 1970s. They are included in the list of hazardous substances known as persistent organic pollutants (POPs) because they are extremely hazardous to the environment and human health. PBDEs have been extensively used in industry and manufacturing in Taiwan, thus its citizens are at high risk of exposure to these chemicals.
An assessment of the environmental fate of these compounds in the Zhuoshui river and Changhua County regions of western Taiwan, and also including the adjacent area of the Taiwan Strait, was conducted for three high risk congeners, BDE-47, -99 and -209, to obtain information regarding the partitioning, advection, transfer and long range transport potential of the PBDEs in order to identify the level of risk posed by the pollutants in this region.
The results indicate that large amounts of PBDEs presently reside in all model compartments – air, soil, water, and sediment – with particularly high levels found in air and especially in sediment. The high levels found in sediment, particularly for BDE-209, are significant, since there is the threat of these pollutants entering the food chain, either directly through benthic feeding, or through resuspension and subsequent feeding in the pelagic region of the water column which is a distinct possibility in the strong currents found within the Taiwan Strait. Another important result is that a substantial portion of emissions leave the model domain directly through advection, particularly for BDE-47 (58%) and BDE-209 (75%), thus posing a risk to adjacent communities.
Model results were generally in reasonable agreement with available measured concentrations. In air, model concentrations are in reasonably good agreement with available measured values. For both BDE-47 and -99, model concentrations are a factor of 2-3 higher and BDE-209 within the range of measured values. In soil, model results are somewhat less than measured values. In sediment, model results are at the high end of measured values.
Resumo:
Biodiversity continues to decline in the face of increasing anthropogenic pressures such as habitat destruction, exploitation, pollution and introduction of alien species. Existing global databases of species' threat status or population time series are dominated by charismatic species. The collation of datasets with broad taxonomic and biogeographic extents, and that support computation of a range of biodiversity indicators, is necessary to enable better understanding of historical declines and to project - and avert - future declines. We describe and assess a new database of more than 1.6 million samples from 78 countries representing over 28,000 species, collated from existing spatial comparisons of local-scale biodiversity exposed to different intensities and types of anthropogenic pressures, from terrestrial sites around the world. The database contains measurements taken in 208 (of 814) ecoregions, 13 (of 14) biomes, 25 (of 35) biodiversity hotspots and 16 (of 17) megadiverse countries. The database contains more than 1% of the total number of all species described, and more than 1% of the described species within many taxonomic groups - including flowering plants, gymnosperms, birds, mammals, reptiles, amphibians, beetles, lepidopterans and hymenopterans. The dataset, which is still being added to, is therefore already considerably larger and more representative than those used by previous quantitative models of biodiversity trends and responses. The database is being assembled as part of the PREDICTS project (Projecting Responses of Ecological Diversity In Changing Terrestrial Systems - http://www.predicts.org.uk). We make site-level summary data available alongside this article. The full database will be publicly available in 2015.
Resumo:
Cyanobacterial toxins present in drinking water sources pose a considerable threat to human health. Conventional water treatment systems have proven unreliable for the removal of these toxins and hence new techniques have been investigated. Previous work has shown that TiO2 photocatalysis effectively destroys microcystin-LR in aqueous solutions, however, a variety of by-products were generated. In this paper, we report a mechanistic study of the photocatalytic destruction of microcystin-LR. In particular, the toxicity by-products of the process have been studied using both brine shrimp and protein phosphatase bioassays.
Resumo:
Cyanobacterial toxins present in drinking water sources pose a considerable threat to human health. Conventional water treatment systems have proven unreliable for the removal of these toxins and hence new techniques have been investigated. Previous work has shown that TiO2 photocatalysis effectively destroys microcystin-LR in aqueous solutions, however non-toxic by-products were detected. It has been shown that photocatalytic reactions are enhanced by utilisation of alternative electron acceptors. We report here enhanced photocatalytic degradation of microcystin-LR following the addition of hydrogen peroxide to the system. It was also found that hydrogen peroxide with UV illumination alone was capable of decomposing microcystin-LR although at a much slower rate than found for TiO2. No HPLC detectable by-products were found when the TiO2/UV/H2O2 system was used indicating that this method is more effective than TiO2/UV alone. Results however indicated that only 18% mineralisation occurred with the TiO2/UV/H2O2 system and hence undetectable by-products must still be present. At higher concentrations hydrogen peroxide was found to compete with microcystin-LR for surface sites on the catalyst but at lower peroxide concentrations this competitive adsorption was not observed. Toxicity studies showed that both in the presence and absence of H2O2 the microcystin solutions were detoxified. These findings suggest that hydrogen peroxide greatly enhances the photocatalytic oxidation of microcystin-LR.
Resumo:
The relationship between late-Victorian Decadence and Aestheticism and politics has long been vexed. This article explores the hitherto under-explored confluence of conservatism and avant-garde literature in the period by introducing The Senate, a Tory-Decadent journal that ran from 1894-7. While Decadent authors occupied various political positions, this article argues that The Senate offers a crucial link between conservatism and Decadence The article presents the journal in its political and publishing context, outlining its editorial position on such issues as the Liberal Unionist-Conservative coalition governments, Britain's relationship with Europe and the threat of ‘State Socialism’, as well as its valorisation of Bollingbroke and eighteenth-century Toryism, and its relationship to, and difference from, key Decadent journals the Yellow Book and The Savoy. It then goes on to articulate its relationship to Decadence by focussing on the presence of Paul Verlaine in its pages and its vitriolic response to the press coverage of Oscar Wilde's trials. The article concludes by exploring the surprising wake of The Senate, briefly tracing the editors' influence in the development of Modernism and links with the journal BLAST.
Resumo:
Scholars have devoted much attention to the causes and consequences of Presbyterian emigration from Ulster to the thirteen colonies before 1776. This article moves beyond the eighteenth century to examine the continued religious links between Presbyterians in Ireland and the United States in the nineteenth century. It begins with an examination of the influence of evangelicalism on both sides of the Atlantic and how this promoted unity in denominational identity, missionary activity to convert Catholics, and revivalist religion during the first half of the century. Though Irish Presbyterians had great affection for their American co-religionists, they were not uncritical, and significant tensions did develop over slavery. The article then examines the religious character of Scotch-Irish or Ulster-Scots identity in the late nineteenth century, which was articulated in response to the alleged demoralising influence of large-scale Irish immigration during and after the Famine of the 1840s, the so-called Romanisation of Catholicism, and the threat of Home Rule in Ireland. The importance of identity politics should not obscure religious developments, and the article ends with a consideration of the origins and character of fundamentalism, perhaps one of the most important cultural connections between Protestants in Northern Ireland and the United States in the twentieth century.
Resumo:
Threat prevention with limited security resources is a challenging problem. An optimal strategy is to eectively predict attackers' targets (or goals) based on current available information, and use such predictions to prevent (or disrupt) their planned attacks. In this paper, we propose a game-theoretic framework to address this challenge which encompasses the following three elements. First, we design a method to analyze an attacker's types in order to determine the most plausible type of an attacker. Second, we propose an approach to predict possible targets of an attack and the course of actions that the attackers may take even when the attackers' types are ambiguous. Third, a game-theoretic based strategy is developed to determine the best protection actions for defenders (security resources).
Resumo:
Biometric systems provide a valuable service in helping to identify individuals from their stored personal details. Unfortunately, with the rapidly increasing use of such systems, there is a growing concern about the possible misuse of that information. To counteract the threat, the European Union (EU) has introduced comprehensive legislation that seeks to regulate data collection and help strengthen an individual’s right to privacy. This article looks at the implications of the legislation for biometric system deployment. After an initial consideration of current privacy concerns, it examines what is meant by ‘personal data’ and its protection, in legislation terms. Also covered are issues around the storage of biometric data, including its accuracy, its security, and justification for what is collected. Finally, the privacy issues are illustrated through three biometric use cases: border security, online bank access control and customer profiling in stores.
Resumo:
The signing of the Ulster Covenant on 28 September 1912 by almost 450,000 men and women was a powerful act of defiance on the part of Unionists in the context of what they perceived as the threat to their way of life represented by the Liberal Government's policy of Irish Home Rule. This article attempts to look beyond the well-studied leadership figures of Carson and Craig in order to fashion insights into the way Ulster Protestant society was mobilised around the Covenant and opposition to Home Rule. It draws attention to hitherto over-shadowed personalities who can be said to have exerted crucial local influence. It also contends that although pan-Protestant denominational unity provided the basis for the success of the Covenant, the Presbyterian community was particularly cohesive and purposeful in the campaign. The article further argues that the risk-taking defiance that came more easily to the Presbyterians, on account of a troubled history, largely evaporated in the new political circumstances of Northern Ireland when it became a separate devolved political entity within the UK from 1921.