777 resultados para Cyber threats


Relevância:

20.00% 20.00%

Publicador:

Resumo:

La presente investigación tiene como objetivo analizar la incidencia de las agresiones cibernéticas en el desarrollo informático de las Fuerzas Armadas de Estados Unidos. Los diferentes estudios que se han realizado sobre el ciberespacio se han enfocado en el papel del individuo como actor principal y se ha dejado de lado las repercusiones que éste ha tenido para el Estado, como un nuevo eje de amenazas. Teniendo en cuenta lo anterior, esta investigación demostrará a partir del concepto de securitización, que se busca priorizar la “ciberseguridad” dentro de la agenda del gobierno estadounidense. Al ser este un estudio que aborda experiencias concretas durante un periodo de tiempo de más de 10 años, el diseño metodológico de la investigación será longitudinal, ya que abarcará estudios, artículos, textos y resoluciones que se han realizado desde 2003 hasta la actualidad.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen tomado de la publicaci??n

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Much work has supported the idea that recategorization of ingroups and outgroups into a superordinate category can have beneficial effects for intergroup relations. Recently, however, increases in bias following recategorization have been observed in some contexts. It is argued that such unwanted consequences of recategorization will only be apparent for perceivers who are highly committed to their ingroup subgroups. In Experiments 1 to 3, the authors observed, on both explicit and implicit measures, that an increase in bias following recategorization occurred only for high subgroup identifiers. In Experiment 4, it was found that maintaining the salience of subgroups within a recategorized superordinate group averted this increase in bias for high identifiers and led overall to the lowest levels of bias. These findings are discussed in the context of recent work on the Common Ingroup Identity Model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cybersecurity is a complex challenge that has emerged alongside the evolving global socio-technical environment of social networks that feature connectivity across time and space in ways unimaginable even a decade ago. This paper reports on the preliminary findings of a NATO funded project that investigates the nature of innovation in open collaborative communities and its implications for cyber security. In this paper, the authors describe the framing of relevant issues, the articulation of the research questions, and the derivation of a conceptual framework based on open collaborative innovation that has emerged from preliminary field research in Russia and the UK.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Insect pollinators of crops and wild plants are under threat globally and their decline or loss could have profound economic and environmental consequences. Here, we argue that multiple anthropogenic pressures – including land-use intensification, climate change, and the spread of alien species and diseases – are primarily responsible for insect-pollinator declines. We show that a complex interplay between pressures (eg lack of food sources, diseases, and pesticides) and biological processes (eg species dispersal and interactions) at a range of scales (from genes to ecosystems) underpins the general decline in insect-pollinator populations. Interdisciplinary research on the nature and impacts of these interactions will be needed if human food security and ecosystem function are to be preserved. We highlight key areas that require research focus and outline some practical steps to alleviate the pressures on pollinators and the pollination services they deliver to wild and crop plants.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Severe tropical cyclones (called hurricanes in the North Atlantic and northeast Pacific) can cause loss of human lives and serious economic damage. In his Perspective, Bengtsson charts the current knowledge about how hurricanes form and whether long-term trends can be discerned in the past century or predicted for a future warmer planet. He also discusses the report by Goldenberg et al., who have analyzed hurricane activity in the North Atlantic and the Caribbean over much of the past century.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numerous studies have shown that attention is biased toward threatening events. More recent evidence has also found attentional biases for stimuli that are relevant to the current and temporary goals of an individual. We examined whether goal-relevant information still evokes an attentional bias when this information competes with threatening events. In three experiments, participants performed a dot probe task combined with a separate task that induced a temporary goal. The results of Experiment 1 showed that attention was oriented to goal-relevant pictures in the dot probe task when these pictures were simultaneously presented with neutral or threatening pictures. Whether goal-relevant pictures themselves were threatening or neutral did not influence the results. Experiment 2 replicated these findings in a sample of highly trait-anxious participants. Experiment 3 showed that attention was automatically deployed to stimuli relevant to a temporary goal even in the presence of stimuli that signal imminent and genuine threat (i.e., a colored patch signaling the presentation of an aversive noise). These findings further corroborate the conclusion that an individual's current and temporary goals guide early attentional processes

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Robotics is a key theme in many of the degrees offered in Systems Engineering. The topic has proved useful in attracting students to the University, and it also provides the basis of much practical and project work throughout the degrees. This paper focuses on one aspect, a Part 2 project in which students doing various degrees work together to develop a mobile robot which is controlled remotely to navigate an environment and perform specific tasks. In addition to providing practical experience of relevant academic topics, this project helps to contribute to key teaching and learning priorities including problem based learning, motivation and important employability skills.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter evaluates the potential for legal regulation of the resort to cyber warfare between states under the ‘jus ad bellum’ (the law on the use of force). Debate in the literature has largely concerned whether cyber warfare falls within the scope of Article 2(4) UNC. The first part of this chapter sets out this debate. It then goes on to argue that the ‘Article 2(4) debate’ often misses the fact that an act of cyber warfare can be considered a breach of a different legal rule: the principle of non-intervention. The chapter further considers some of the issues in applying either the prohibition of the use of force or the principle of non-intervention to cyber warfare, and then concludes by arguing that the debate should be reoriented to focus on another existing international legal obligation: the duty to prevent cyber-attacks.