Spelling suggestions: "subject:"[een] PROXY"" "subject:"[enn] PROXY""
191 |
Projecting Power in the Fifth Domain : An assessment of why states use proxies for offensive cyber operationsHjelm, Mattias January 2021 (has links)
In the 21st century, cyber operations have become the modern manifestation of political warfare between great powers. Many states have made considerable efforts to build up their respective cyber commands. Contrary, or as a complement to this, some states choses to rely upon actors detached from the state for conducting their operations online. What incentives explain this strategy? There are inherent risks with employing proxies and states nowadays have an ability to conduct cyber operations from central military commands. This presents a puzzle. By using a comparative case study approach, this thesis provides a portrait of how two leading cyber actors, Russia and The United States employ different strategies in the digital domain. To understand the motivations behind state delegation of cyber conflict, this thesis applies Principal-Agent theory to explain the relationships states cultivate with non-state actors. I propose a framework containing three hypotheses that ought to affect the decision to delegate; cyber proxies offer states a possibility to enhance their capabilities, save cost and evade accountability. Through analysing the cases, I find that the use of cyber proxies could partly be explained by my hypotheses rooted in the PA theory. Lower internal cyber capability and the desire to save costs may explain why states choses to use proxies in the digital domain. However, the empirical evidence is not strong enough to suggest that cyber proxies offer states a possibility to evade accountability. Rather, it is the cyber domain itself that complicates attribution efforts. Consequently, the findings do not confirm the hypothesis that cyber proxies provide enhanced plausible deniability benefits compared to government agents. In spite of that, this thesis concludes that cyber proxies together with their implications for escalatory dynamics will probably remain challenging in the foreseeable future.
|
192 |
Zájmy aktérů v čínsko-vietnamské válce 1979 / Interests of parties to the Sino-Vietnamese War 1979Marhoul, Jan January 2013 (has links)
Diploma thesis Interests of parties to the Sino-Vietnamese War 1979 deals with the lesser know topic of the semi-forgotten war which had been fought during the Cold War era. The most interesting in this conflict is, that it had been fought by former mutual allies. The thesis isn't focused on the course of war, with the beginning on the 17th of February 1979. The form of war so called "limited". It means, that the Chinese Peoples Liberation Army, had its objectives, when they had been reached, the Chinese military units turned back to China. The last Chinese soldier crossed the border on the 16th of March 1979, after four week of harsh fighting's. But the aim of this work is to analyze the interests of the parties involved in the conflict and to prove the hypothesis, that the war was actually proxy war between PRC and USSR.
|
193 |
Solidarity Between Human and Non-Human Animals: Representing Animal Voices in Policy Deliberationsvon Essen, Erica, Allen, Michael P. 03 September 2017 (has links)
In this paper, we discuss the bridging potential of “interspecies” solidarity between the often incommensurable ethics of care and justice. Indeed, we show that the Environmental Communication literature emphasizes feelings of care and compassion as vectors of responsibility taking for animals. But we also show that a growing field of Political Animal Rights suggest that such responsibility taking should instead be grounded in universalizable terms of justice. Our argument is that a dual conception of solidarity can bridge this divide: On the one hand, solidarity as a pre-political relation with animals and, on the other hand, as a political practice based on open public deliberation of universalizable claims to justice; that is, claims to justice advanced by human proxy representatives of vulnerable non-humans. Such a dual conception can both challenge and validate NGOs’ claims to “speak on behalf of animals” in policy following the Aarhus Convention, indeed underwriting the Convention by insights from internatural communication in solidarity as relation, and by subjecting it to rational scrutiny in mini-publics in solidary as practice.
|
194 |
High-resolution simulations of two cold palaeo climates in Europe : MIS 3 and LGMStrandberg, Gustav January 2015 (has links)
The study of past climate is important because it increases our understanding of how the climate system works. Past climate is often reconstructed by using proxies (that is observations of things that tell something about past climate, for example tree rings, pollen in lake sediments and fossils). Model simulations of past climate further increases the knowledge since it has the possibility to gap the space and time between the sparse and scattered proxy observations, since a model simulation gives relatively continuous information about the whole simulated area. Model simulations can also give internally coherent information about parameters that is not easily reconstructed from proxies (for example heat fluxes). In this thesis two periods in the past are simulated by climate models: the Marine Isotope Stage 3 (MIS 3), 44 000 years ago, and the Last Glacial Maximum (LGM), 21 000 years ago. Both periods are characterised by low temperature, low sea level and low level of carbon dioxide. The topography in northern Europe is dominated by ice sheets covering Iceland, Norway and parts of Sweden at MIS3; and more extensive ice sheets covering Iceland, Scandinavia, the British Isles and Northern Germany at LGM. These periods are firstly simulated by a global climate model. Those simulations are subsequently used in a regional climate model to increase the level of detail over Europe. To make the regional climate model simulation more realistic vegetation simulated by a dynamical vegetation model is used in the regional climate model. The climate models simulate European climates much colder than today, especially at LGM. The temperature differences ranges from 5 to 45 °C colder than today; the largest differences being at the ice sheets where the perennial ice cover and the high altitude keep temperatures low. Precipitation is reduced with as much as almost 100 % in northern Europe due to reduced evaporation. Precipitation is increased with as much as 100 % in parts of southern Europe due to changes in atmospheric circulation. The simulations are in broad agreement with proxies, although there are differences. The vegetation model simulates tundra like vegetation (herbs and shrubs) in the ice-free parts of central and southern Europe. The eastern parts of Europe are dominated by needle-leaved trees. The short and cool summers limit vegetation. The simulated vegetation is in broad agreement with reconstructions. Sensitivity studies of vegetation show that changed vegetation can change the monthly mean temperature with 1-3 °C in some seasons and regions. The response depends on regional surface characteristics. Sensitivity studies of ice sheets show that the simulated climate is consistent with the assumptions about the ice sheet extent made in the simulation. The simulated climate is cold enough in northern Europe to support the ice sheet, and warm enough in southern Europe to prevent the ice sheet from expanding in this direction. A removal of the ice sheet would only have an effect on the local scale in the vicinity of the ice sheet, but this experiment did not include changes in the large-scale global atmospheric circulation. Although the regional climate model simulations are to a large degree depending on the global climate model simulations they provide new information. When comparing proxies with model data or studying local/regional climatic features (such as the interplay between climate and vegetation) high horizontal resolution, as in the regional climate model, is important. / Studiet av klimat i det förgångna är viktigt eftersom det ökar vår förståelse för hur klimatsystemet fungerar. Förgånget klimat rekonstrueras ofta med hjälp av proxies (det vill säga observationer av saker som säger något om klimatet förr i tiden, till exempel trädringar, pollen i sjösediment och fossiler). Modellsimuleringar av förgånget klimat ökar kunskapen ytterligare eftersom det ger en möjlighet att fylla i luckorna, i tid och rum, mellan de glesa och spridda proxy-observationerna, eftersom en modellsimulering ger information om hela det simulerade området. Modellsimuleringar kan också ge information om parametrar som inte så lätt rekonstrueras från proxies (till exempel värmeflöden). I denna avhandling simuleras med klimatmodeller två perioder i det förgångna: MIS 3 (Marine Isotope Stage 3), för 44 000 år sedan och LGM (Last Glacial Maximum), för 21 000 år sedan. Båda perioderna kännetecknas av låg temperatur, låg havsnivå och låg halt av koldioxid. Topografin i norra Europa domineras av istäcken som täcker Island, Norge och Sverige vid MIS 3; och istäcken över Island, Skandinavien, Brittiska öarna och norra Tyskland vid LGM. Dessa perioder simuleras först av en global klimatmodell. Simuleringarna används senare i en regional klimatmodell för att öka detaljgraden över Europa. För att göra den regionala klimatmodell-simuleringen mer realistisk så används i den regionala klimatmodellen vegetation som är simulerad av en dynamisk vegetationsmodell. Klimatmodellerna simulerar europeiska klimat som är mycket kallare än dagens, särskilt vid LGM. Temperaturdifferensen spänner från 5 till 45 °C kallare än idag; de största skillnaderna är vid istäckena där det ständiga istäcket och den höga altituden håller temperaturen nere. Nederbörden minskar med så mycket som nästan 100 % i norra Europa på grund av minskad avdunstning. Nederbörden ökar med så mycket som 100 % i delar av södra Europa på grund av förändringar i atmosfärens cirkulation. Simuleringarna stämmer i stora drag överens med proxies, även om det finns skillnader. Vegetationsmodellen simulerar tundralik vegetation (örter och snår) i de isfria delarna av centrala och södra Europa. De östra delarna av Europa domineras av barrträd. De korta och kalla somrarna begränsar vegetationen. Den simulerade vegetationen stämmer i stora drag överens med rekonstruktionerna. Känslighetsstudier av vegetationen visar att förändrad vegetation kan förändra månadsmedeltemperaturen med 1-3 °C i vissa regioner och under vissa säsonger. Responsen beror på regionala egenskaper vid markytan. Känslighetsstudier av istäckena visar att det simulerade klimatet är förenligt med de antaganden av istäckenas utbredning som görs i simuleringen. Det simulerade klimatet är tillräckligt kallt i norra Europa för att göra ett istäcke möjligt, och tillräckligt varmt i södra Europa för att hindra istäcket från att växa i den riktningen. Om istäcket skulle tas bort skulle det bara ha en effekt på lokal skala i närheten av istäcket, men detta experiment innefattade inte förändringar i atmosfärens cirkulation. Även om de regionala klimatmodell-simuleringarna till stor del beror på de globala klimatmodell-simuleringarna så ger de ny information. Vid jämförelser av proxies och modelldata eller studier av lokala/regionala egenskaper hos klimatet (som växelverkan mellan klimat och vegetation) så är hög horisontell upplösning, som i en regional klimatmodell, viktigt.
|
195 |
The development of an English Health-Related Quality of Life (HRQoL) measure for very young children, to be completed by proxyVerstraete, Janine 03 September 2018 (has links)
Background and Aims: There is an increasing awareness that, in order to monitor health outcomes both mortality and morbidity need to be assessed. A common metric used to measure morbidity and functional limitation is the quality adjusted life year or QALY, which incorporates time spent in a health condition and Health-Related Quality of Life (HRQoL) into the measure. This is of increasing importance in Low Income Countries (LIC) where programmes have been adopted and implemented to address the high burden of child mortality. The ‘first 1000 days’ is one such initiative which has been adopted by the WHO to improve nutritional support, health care and social support for both the mother and child. One of the aims is to improve quality of life during this vulnerable period. As there is currently no appropriate measure of HRQoL in this age group, we set out to develop a valid and reliable, HRQoL instrument for children from 1 month to 3 years old, amenable to the elicitation of preference weights. Methods: The new HRQoL instrument, HRQoL-6D-IT, was based firstly on a mapping review of HRQoL measures for children. The next stage involved eliciting options through cognitive review from caregivers of very young children regarding HRQoL dimensions included in the EQ-5D-Y an existing validated HRQoL measure for older children. The care-givers were requested to identify items to be considered for inclusion, the wording and layout of the new measure. The item pool generated from the literature reviews and cognitive interviews were then assessed through a Delphi study with experts in the field. These items were further reduced through subsequent testing of items and retesting of a preliminary measure. The final items on the HRQoL-6D-IT included: movement, play, pain, relationships, communication and eating and, apart from pain, the descriptors referenced the behaviour of the child to age appropriate behaviour. The HRQoL-6D-IT was then tested for validity and reliability in a group of acutely-ill (AI), chronically-ill (CI) and typically developing (TD) children in two provinces in South Africa: Western and Eastern Cape. Results: The methodology used to identify candidate items was rigorous and yielded items which were developed to be observable with dimension descriptors referring to ‘age appropriate behaviour’. Caregivers were able to reliably report on HRQoL of their very young children from age 1-36 months. The content validity had been established during the development of the instrument. Concurrent validity of the different items (dimensions) was tested between the HRQoL-6D-IT and relevant items from the ASQ, FLACC and NIPS pain scale and Diet History.
|
196 |
Hacka dig själv och upptäck attackerFransén, Johan, Sorlija, Adnan January 2019 (has links)
Denna uppsats bygger på idén om att hacka det egna systemet före en utomstående hackare gör det för att upptäcka systemets läckor. Detta görs med ett automatiserat hackingverktyg som utför penetrationstester mot en utvecklad hemsida. Lagringstekniken som används är en eventdatabas med namnet Event Store som lagrar varje händelse som skedde mot hemsidan. Syftet med Event Store är att upptäcka de olika penetrationstesterna och lagra dess händelser för att sedan ge indikationer till administratören att hemsidan var under attack. Uppsatsen riktar sig främst på ifall Event Store är lämpligt att implementera tillsammans med en hemsida som blir attackerad med penetrationstester och vilka för- och nackdelar det finns med att använda Event Store. Resultatet visar att Event Store kan användas för att identifiera anomalier mot en hemsida vid hackingattacker. Med stor sannolikhet kan intrång mot hemsidan bevisas med hjälp utav det utvecklade systemet med Event Store. / This thesis is based on the idea of hacking your own system before an outside hacker does it to find the system vulnerabilities. This is done with an automated hacking tool that performs penetration tests against the created website. The database technology that is used is the event database Event Store that stores every event that take place against the website. The task of Event Store in this case is to discover the different penetration tests and to store the events and to give indications to the administrator that the website was under attack. The study is primarily aimed at finding out whether Event Store is advisable to implement with a website where different penetration testing shall be made, and what the advantages and disadvantages are to using Event Store. Results show that Event Store can be used to identify anomalies against a website during attacks. Intrusions against the website can with great probability be proven with the help of the developed system with Event Store.
|
197 |
Secure Data Service Outsourcing with Untrusted CloudXiong, Huijun 10 June 2013 (has links)
Outsourcing data services to the cloud is a nature fit for cloud usage. However, increasing security and privacy concerns from both enterprises and individuals on their outsourced data inhibit this trend. In this dissertation, we introduce service-centric solutions to address two types of security threats existing in the current cloud environments: semi-honest cloud providers and malicious cloud customers. Our solution aims not only to provide confidentiality and access controllability of outsourced data with strong cryptographic guarantee, but, more importantly, to fulfill specific security requirements from different cloud services with effective systematic ways.
To provide strong cryptographic guarantee to outsourced data, we study the generic security problem caused by semi-honest cloud providers and introduce a novel proxy-based secure data outsourcing scheme. Specifically, our scheme improves the efficiency of traditional proxy re-encryption algorithm by integrating symmetric encryption and proxy re-encryption algorithms. With less computation cost on applying re-encryption operation directly on the encrypted data, our scheme allows flexible and efficient user revocation without revealing underlying data and heavy computation in the untrusted cloud.
To address specific requirement from different cloud services, we investigate two specific cloud services: cloud-based content delivery service and cloud-based data processing service. For the former one, we focus on preserving cache property in the content delivery network and propose CloudSeal, a scheme for securely and flexibly sharing and distributing content via the public cloud. With the ability of caching the major part of a stored cipher content object in the delivery network for content distribution and keeping the minor part with the data owner for content authorization, CloudSeal achieves security and efficiency both theoretically and experimentally. For the later service, we design and realize CloudSafe, a framework that supports secure and efficient data processing with minimum key leakage in the vulnerable cloud virtualization environment. Through the adoption of one-time cryptographic key strategy and a centralized key management framework, CloudSafe efficiently avoids cross-VM side channel attack from malicious cloud customers in the cloud. Our experimental results confirm the practicality and scalability of CloudSafe. / Ph. D.
|
198 |
Proxy Reliability of the 12-Item World Health Organization Disability Assessment Schedule II Among Adult Patients With Mental DisordersZhou, Wei, Liu, Qian, Yu, Yu, Xiao, Shuiyuan, Chen, Lizhang, Khoshnood, Kaveh, Zheng, Shimin 01 August 2020 (has links)
Purpose: Despite the wide usage of World Health Organization Disability Assessment Schedule II (WHODAS 2.0) in psychiatry research and clinical practice, there was limited knowledge on its proxy reliability among people with mental disorders. This paper aimed to compare the 12-item WHODAS 2.0 responses of adult patients with mental disorders to their family caregivers. Methods: In this study, 205 pairs of patients with mental disorders and primary family caregivers were consecutively recruited from one inpatient mental health department in a large hospital in China. All participants completed the 12-item version WHODAS 2.0 to assess patients’ functioning in the 30 days prior to the hospitalization. Measurement invariance, including configural, metric and scalar invariance, was tested across patient and proxy groups, using multi-group confirmatory factor analysis. Agreement between patients and proxies was examined by paired Wilcoxon tests and intraclass correlation coefficients (ICC). Subgroup analyses for proxy reliability were conducted within strata of proxy kinship and patient psychiatric diagnosis. Results: The 12-item WHODAS 2.0 achieved configural, metric and partial scalar invariance across patient and proxy groups. Unsatisfactory consistency was found for most items (ICC < 0.75, P < 0.05), especially for items on Cognition, Getting along, Life activities, and Participation in society (ICC < 0.4, P < 0.05). Spouses agreed with patients more often than parents (ICC ≥ 0.4, P < 0.05). The paired Wilcoxon tests found that impairment of patients with psychotic disorders tended to be overestimated by proxies while proxies tended to underestimate impairment of patients with mood disorders. Conclusion: Our study reveals inconsistency between self and proxy reports in the 12-item WHODAS 2.0 among adult patients with mental disorders. When proxy reports is needed, spouses are preferred than parents. We should be aware of proxies’ impairment overestimation among patients with psychotic disorders and underestimation among patients with mood disorders.
|
199 |
GreenMail: Reducing Email Service’s Carbon Emission with Minimum CostLi, Chen 23 July 2013 (has links)
No description available.
|
200 |
Conjoint Marital Therapy: Proxy Voice Intervention and Softening in the Context of Couple EnactmentsSeedall, Ryan B. 19 August 2004 (has links) (PDF)
This study evaluated the effectiveness of proxy voice intervention, embedded within couple enactments, on client-perceived softening. During enactments, direct couple interaction is the focus while the therapist coaches from the periphery. In the context of an enactment, the therapist may use proxy voice when partners appear to be distressed and expressing themselves in terms of secondary emotions by modeling appropriate attachment and self-concept expression. The primary research question was whether therapist use of proxy voice in an enactment would be more likely to bring about softening effects, or whether use of proxy voice was counter-intuitive to enactment conceptualization and would bring about effects related to struggle (e.g. withdrawal or negativity). The review of literature sets forth (1) enactments as common factors; (2) enactments conceptually and operationally; (3) proxy voice in the context of enactments; and (4) the effects of proxy voice on softening versus withdrawal or negativity. Proxy voice occurred 42 times in nine research sessions where proxy voice was delivered repeatedly in a 20-30 minute enactment episode. Results indicated that proxy voice was significantly (both statistically and clinically) associated to softening while dissimilarly linked with withdrawal or negativity. Results also suggested that proxy voice may be used to dampen volatility and foster couple softening during enactment in the following ways: (1) proxy voice temporarily increases the structure of the couple interaction, thereby allowing the therapist to dampen reactivity and model healthy expression before returning to direct couple interaction; (2) proxy voice is a hypothesis of softer emotions that fits the clients' experiences, helps them to feel validated, and encourages them to consider something in a newer, softer way; and (3) proxy voice taps into foundational relationship dynamics surrounding self-concept and attachment experiences that "propel" interaction processes but remain outside conscious awareness or explicit expression for the couple. These preliminary findings suggest that proxy voice intervention embedded within a fluid, carefully delineated, and discriminating model of enactments effectively facilitates essential elements of couple interaction (expression of primary affect, and self-concept and attachment threats) while promoting self-reliant couple interaction and increased couple softening.
|
Page generated in 0.0532 seconds