• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 184
  • 141
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 470
  • 177
  • 99
  • 86
  • 77
  • 67
  • 65
  • 60
  • 59
  • 56
  • 49
  • 42
  • 39
  • 38
  • 37
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

"Så länge jag inte blir slagen eller dödad så är det fine" : En kvalitativ studie om socialsekreterares erfarenheter av klientutövat våld / "As long as I don't get beaten or killed, I'm fine" : A qualitative study about social service workers experience of threats and violence from clients

Forsberg, Therese, Pedersen, Emma January 2024 (has links)
Over the past decade, several studies have been conducted on the extent to which social workers are subjected to threats and violence from clients. The results of these studies indicate that approximately one-third of social workers have experienced threats or violence from clients. Previous research also shows that social workers in the field of child and family services are at a higher risk of facing client-initiated threats and violence. Based on this statistics, along with the recent disinformantion campaign against the social services' work with the LVU-legislation, we found it interesting to focus our study specifically on social workers in the child and family domain. The purpose of our study was examine the experiences and perceptions of threat and violence from clients that social workers in the child and family domain have, and how these experiences have affected their professional approch. Additionally, we wanted to investigatethe strategies social workers use to feel secure. Our study is based on six semi-structured interviews with participants from two municipalities in southern Sweden. Threats and violence from clients are defined in various ways by the participants, with the main difference in the definition being where one draws the boundaries for what is acceptable. Many participants speak about a process of normalization of violence becomes a stratagy to cope with their work. It is also evident that when social workers are exposed to threats or violence from clients, there is a risk that it may affect the objectivity in assessments and decisiions.
182

On Information Security Processes in Cloud Computing

Mahmoud, Suzan January 2013 (has links)
Cloud computing allows user access to virtual services (applications, servers and devices, digital storage and service packages sources) through a network using a web browser. Cloud computing is rapidly growing and has become an attractive and affordable service model among organizations. It has many benefits but is also associated with many risks and security challenges. In cloud computing users can connect with any device and use virtual computing services at any time and from anywhere, which has brought new challenges for enterprise security. The problem of securing data in the cloud and building trust in the cloud computing environment has become a widely discussed and important issue.This research aims to investigate how enterprises deal with security problems and protect their data in the cloud through security measures and processes. It also investigates what processes could be adapted to the security environment. To achieve this, an empirical study was performed. The empirical study consisted of interviews with a number of enterprises that use cloud computing in their business, with the purpose to give a deep picture of how they handle security issues related to their cloud services.During the empirical study it could be found differences and similarities in the security measures used by the different organizations, depending on the size of the organization and the type of services used or provided by the organizations. Information security should be managed in a series of processes or procedures, linked together in an environment such as the Information security management system (ISMS). On the basis of the evaluation of the interviews and literature, a cloud environment with different security processes is defined.
183

Beyond Terror: The Truth About the Real Threats to Our World.

Rogers, Paul F., Abbott, Chris, Sloboda, J. January 2007 (has links)
Is international terrorism really the single greatest threat to world security? Since the 9/11 attacks, many Western governments assume terrorism to be the greatest threat we face. In response, their dangerous policies attempt to maintain control and keep the status quo by using overwhelming military force. This important book shows why this approach has been such a failure, and how it distracts us from other, much greater, threats of climate change, competition over resources, marginalisation of the majority of the world and global militarisation. Unless urgent, coordinated action is taken in the next 5-10 years on all these issues it will be almost impossible to avoid the earth becoming a highly unstable place by the middle years of this century. Beyond Terror offers an alternative path for politicians, journalists and concerned citizens alike. / Published in Spanish in 2008 by los libros del lince, with the title: Mas Alla del Terror: Las verdaderas amenazas que acechan al mundo.
184

Global Responses to Global Threats: Sustainable Security for the 21st Century

Abbott, Chris, Rogers, Paul F., Sloboda, J. January 2006 (has links)
This major report was the result of an 18-month long research project examining the various threats to global security, and sustainable responses to those threats. Current security policies assume international terrorism to be the greatest threat to global security, and attempt to maintain the status quo and control insecurity through the projection of military force. The authors argue that the failure of this approach has been clearly demonstrated during the last five years of the 'war on terror' and it is distracting governments from the real threats that humanity faces. Unless urgent action is taken within the next five to ten years, it will be extremely difficult, if not impossible, to avoid a highly unstable global system by the middle years of the century.
185

Cyber Threat Intelligence from Honeypot Data using Elasticsearch

Al-Mohannadi, Hamad, Awan, Irfan U., Al Hamar, J., Cullen, Andrea J., Disso, Jules P., Armitage, Lorna 18 May 2018 (has links)
yes / Cyber attacks are increasing in every aspect of daily life. There are a number of different technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), firewalls, switches, routers etc., which are active round the clock. These systems generate alerts and prevent cyber attacks. This is not a straightforward solution however, as IDSs generate a huge volume of alerts that may or may not be accurate: potentially resulting in a large number of false positives. In most cases therefore, these alerts are too many in number to handle. In addition, it is impossible to prevent cyber-attacks simply by using tools. Instead, it requires greater intelligence in order to fully understand an adversary’s motive by analysing various types of Indicator of Compromise (IoC). Also, it is important for the IT employees to have enough knowledge to identify true positive attacks and act according to the incident response process. In this paper, we have proposed a new threat intelligence technique which is evaluated by analysing honeypot log data to identify behaviour of attackers to find attack patterns. To achieve this goal, we have deployed a honeypot on an AWS cloud to collect cyber incident log data. The log data is analysed by using elasticsearch technology namely an ELK (Elasticsearch, Logstash and Kibana) stack.
186

Integrated Flood Risk Management: Towards a Risk-Informed Decision Making Incorporating Natural and Human-Induced Hazards

Castillo Rodríguez, Jesica Tamara 03 May 2018 (has links)
Tesis por compendio / Flood risk reduction is a global challenge. Society demands higher safety and security levels, including those actions related to flood defence infrastructure protection against natural hazards and manmade threats. Dams and levees, among other flood defence infrastructures, are critical hydraulic infrastructures, aiming at reducing the likelihood that people and property will get flooded, but whose failure would result in consequences for the community downstream, including not only economic damages but also loss of life. There is always a probability associated with infrastructure failure, although in general it might be very low. The purpose of the PhD research, with title "Integrated flood risk management: towards a risk-informed decision making incorporating natural and human-induced hazards", here presented is to propose a framework to enhance integrative flood risk management from a multi-hazard perspective (pluvial flooding, river flooding, dam and levee failure, including man-made threats), addressing current needs for decision making on flood risk reduction and analyzing the complexity of multiple hazards and systems which include multiple components. The thesis is structured in three main parts, including: (i) Part I, a methodology aiming at providing a common framework for identifying and characterizing flood risk due to pluvial flooding, river flooding and dam failure, and incorporate information on loads, system response and consequences into risk models to analyse societal and economic flood risk, (ii) Part II, an approach for quantifying and analyzing risk for complex dam-levee systems, to incorporate information from levee failure into risk models based on the aforementioned methodology, and to analyse societal and economic flood risk, including the potential failure of these infrastructures, and (iii) Part III, a screening tool to characterize the impact of human induced threats on risk due to dam failure or mission disruption. Results from this research have proven that the use of risk models provides a logic and mathematically rigorous framework for compiling information for flood risk characterization and analysis from different natural hazards and flood defence performance. The proposed framework in this thesis and applications aimed at encouraging key actors on flood risk management (infrastructure managers, authorities, emergency action planners, etc.) on the use of QRA, and at demonstrating to what extent QRA can usefully contribute to better understanding risk drivers and inform decisions on how to act to efficiently reduce flood risk. / La reducción del riesgo de inundación es un reto global. La sociedad actual demanda cada vez mayores niveles de seguridad, incluyendo la consecución de acciones vinculadas a la protección de las infraestructuras de defensa frente a inundaciones ante amenazas naturales y antrópicas. Presas y diques, entre otras obras de defensa, son infraestructuras críticas cuyo objetivo es reducir la probabilidad de inundación. Sin embargo, su fallo puede resultar en consecuencias para la comunidad situada aguas abajo, incluyendo no sólo daños económicos sino también pérdida potencial de vidas. Siempre existe una cierta probabilidad asociada al fallo de estas infraestructuras, aunque en general muy baja. El objetivo de la investigación llevada a cabo en la presente tesis doctoral, con título "Integrated flood risk management: towards a risk-informed decision making incorporating natural and human-induced hazards", es proporcionar un marco que fomente la gestión integral del riesgo de inundación desde una perspectiva multi-amenaza, considerando las necesidades actuales en la toma de decisiones para la gestión del riesgo de inundación y analizando la complejidad de sistemas con múltiples componentes, afectados por diferentes amenazas. La tesis se estructura en tres partes principales, incluyendo: (a) Parte I, una metodología para proporcionar un marco común para la identificación y caracterización del riesgo de inundación por inundación pluvial, fluvial y fallo de presas, incorporando información sobre solicitaciones, respuesta del sistema y consecuencias en modelos de riesgo que permiten analizar y evaluar el riesgo social y económico por inundación, (b) Parte II, un método para la cuantificación y análisis del riesgo en sistemas complejos presa-dique, con el objetivo de incorporar información referente al fallo de diques en la metodología propuesta en la Parte I, y analizar el riesgo social y económico por inundación incluyendo el fallo de varias infraestructuras de defensa, y (c) Parte III, una herramienta de cribado que permite caracterizar el impacto de amenazas de origen antrópico en el riesgo asociado al fallo de presas. Los resultados de esta investigación demuestran que el uso de modelos de riesgo proporciona un marco lógico y matemáticamente riguroso para la consideración de toda la información necesaria para la adecuada caracterización y análisis del riesgo de inundación por amenazas naturales y por fallo o mal funcionamiento de obras de defensa. El marco metodológico propuesto y las aplicaciones descritas en esta tesis tienen como objetivo impulsar la aplicación del análisis de riesgo por parte de los actores clave en la gestión del riesgo de inundación (gestores de infraestructuras, autoridades locales, gestores de emergencias, etc.) y demostrar en qué medida estos análisis pueden contribuir a alcanzar un mejor conocimiento de los factores clave que componen el riesgo e informar en la toma de decisiones hacia una reducción del riesgo más eficiente. / La reducció del risc d'inundació és un repte global. La societat actual demana majors nivells de seguretat, incloent-hi la realització d'accions vinculades a la protecció de les infraestructures de defensa enfront del risc d'inundacions afectades per amenaces naturals i antròpiques. Preses i dics fluvials, entre altres obres de defensa, són infraestructures crítiques i tenen l'objectiu de reduir la probabilitat d'inundació però el seu trencament pot resultar en conseqüències en, danys econòmics i també pèrdua potencial de vides. Sempre hi ha una certa probabilitat vinculada al trencament d'aquestes infraestructures, encara que en general molt baixa. L'objectiu de la investigació duta a terme en aquesta tesi doctoral, amb títol "Integrated flood risk management: towards a risk-informed decision making incorporating natural and human-induced hazards", és proporcionar un marc per a fomentar la gestió integral del risc d'inundació des d'una perspectiva multi-amenaça, tenint en compte les necessitats actuals per prendre decisions per a la gestió del risc d'inundació i analitzant sistemes complexes amb múltiples components i afectats per diferents amenaces. La tesi s'estructura en tres parts principals: (a) Part I, una metodologia proposada per a proporcionar un marc comú per a la identificació i caracterització del risc d'inundació per inundació pluvial, fluvial i trencament de preses, incorporant informació de sol¿licitacions, resposta del sistema i conseqüències en models de risc que permeten analitzar el risc social i econòmic per inundació, (b) Part II, un mètode per a la quantificació i anàlisi del risc en sistemes complexes, amb l'objectiu d'incorporar informació referent al trencament de dics fluvials en la metodologia descrita en la Part I, i analitzar el risc social i econòmic pel trencament de diverses infraestructures de defensa, i (c) Part III, una ferramenta de pre-anàlisi per a caracteritzar l'impacte d'amenaces de origen antròpic en el risc associat al trencament de preses. Els resultats de la investigació demostren l'utilitat de l'aplicació de models de risc, proporcionant un marc lògic i matemàticament rigorós per a la consideració de tota la informació necessària per a l'adequada caracterització i anàlisi del risc d'inundació per amenaces naturals i per trencament d'obres de defensa. El marc metodològic i les aplicacions derivades d'aquesta tesi tenen com a objectiu impulsar l'aplicació d'anàlisi de risc quantitatius per part dels actors vinculats a la gestió del risc d'inundació (gestors d'infraestructures, autoritats locals, gestors d'emergències, etc.) i demostrar que poden contribuir a disposar d'un millor coneixement dels factors clau que componen el risc, i per a informar les decisions necessàries per a una reducció del risc més eficient. / Castillo Rodríguez, JT. (2017). Integrated Flood Risk Management: Towards a Risk-Informed Decision Making Incorporating Natural and Human-Induced Hazards [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/82305 / Compendio
187

Does capital market drive corporate investment efficiency? Evidence from equity lending supply

Tsai, H.-J., Wu, Yuliang, Xu, B. 2021 July 1916 (has links)
Yes / The increased equity lending supply (ELS) in the equity loan market, available for short sellers to borrow, exposes a firm to greater short selling threats. Considering short sellers’ strong incentives to uncover firm-specific information and monitor managers, we hypothesize that short selling threats, proxied by ELS, enhance corporate investment efficiency. We find that ELS significantly reduces managerial tendencies to underinvest (overinvest) especially for firms prone to underinvest (overinvest). The effect of ELS on investment efficiency is stronger for firms with higher information asymmetry and weaker corporate governance, confirming short sellers’ role in mitigating information and agency costs. However, short selling risk weakens the effect of ELS. Our evidence is robust to endogeneity checks and suggests that corporate investment can be driven by a particular capital market condition: the amount of lendable shares in the equity loan market.
188

Biometric of Intent: A New Approach Identifying Potential Threat in Highly Secured Facilities

Al Hamar, J., Chamieh, J., Al-Mohannadi, Hamad, Al Hamar, M., Al-Mutlaq, A., Musa, Ahmad S. 12 June 2018 (has links)
Yes / Biometric of Intent (BoI) is a Computer Vision (CV) automation, using Artificial Intelligence (AI) techniques, which presents a new approach that extends the reach of the classic biometric identification process. It provides an efficient mechanism which deters the threats raised by unknown individuals who have deceitful intentions and who aim to deploy unlawful operations such as terrorist attacks. In this context, our proposed BoI model is based on a framework constructed upon an automated machine learning facial expression analysis system which can assist law enforcement agencies who intend to deploy a systematic preventive security approach that aims to reduce the risk of potential unlawful attacks by rogue individuals through the evaluation of their emotional state in relation to their malicious intent.
189

Comparative Analysis and Development of Security Tools for Vulnerability Detection : Exploring the Complexity of Developing Robust Security Solutions

Wiklund, Milton January 2024 (has links)
Detta examensarbete ålägger en omfattande studie riktad mot att granska de komplexiteter och utmaningar som förekommer vid utveckling av robusta och effektiva verktyg som upptäcker säkerhetsrisker i kod. Genom att bestyra en jämförande analys av redan existerande säkerhetsverktyg, och engagera sig i ett försök av att utveckla ett säkerhetsverktyg från en grundläggande nivå, strävar detta arbete efter att uppenbara de underliggande anledningarna bakom varför det, inom cybersäkerhet, ännu är en stor utmaning att ligga steget före skadliga aktörer. Inledande bidrar forskningen med en överblick av aktuella säkerhetsverktyg, och samtidigt undersöks deras effektivitet, metoder, samt de typer av sårbarheter som verktygen är designade för att upptäcka. Genom systematiska mätningar betonar studien styrkor och svagheter av säkerhetsverktygen, och samtidigt dokumenteras utvecklingsprocessen av ett nytt säkerhetsverktyg med syfte att upptäcka liknande sårbarheter som de jämförda verktygen. De bemötta utmaningarna vid utvecklande—som att behandla moderna säkerhetshot, och integrera komplexa upptäckningsalgoritmer—diskuteras för att förevisa de övertygande hinder som utvecklare påträffar. Därutöver bedöms viktigheten av att effektivt kunna upptäcka sårbarheter, och hur det kan hjälpa att bevara integritet och pålitlighet av applikationer. Examensarbetet siktar mot att bidra med viktig insyn i området cybersäkerhet, samt stödja fortsatt utveckling i mån av att mildra säkerhetshot. Sammanfattningsvis visar resultatet från denna studie att det krävs både kunskap och ambition för att utveckla ett säkerhetsverktyg från grunden, eftersom nya hot uppstår nästan varenda dag. Studien avslöjar också att skadliga aktörer är kända för att regelbundet leta efter sårbarheter i system, och är en av de ledande anledningarna till varför det är så svårt att bekämpa cyberhot. / This thesis stipulates a comprehensive study aimed at examining the complexities and challenges in developing robust and effective tools for detecting security vulnerabilities in code. By performing a comparative analysis of already existing security tools, and engaging in an attempt of developing a security tool from a foundational level, this work strives to disclose the underlying reasons as to why staying one step ahead of malicious actors remains a difficult challenge in cybersecurity. Introductory, the study provides an overview of current security tools while examining their effectiveness, methodologies, and the types of vulnerabilities they are designed to detect. Through systematic measurements, the study highlights strengths and weaknesses of the security tools while, simultaneously, documenting the process of developing a new security tool designed to detect similar vulnerabilities to the compared tools. The challenges faced during development—such as treating modern security threats, and integrating complex detection algorithms—are discussed to portray the compelling hurdles that developers encounter. Moreover, this thesis assesses the importance of effectively detecting vulnerabilities, and how it can aid in maintaining integrity and trustworthiness of applications. The thesis aims to contribute with valuable insight into the field of cybersecurity and support continued development for mitigating cyber threats. In conclusion, the outcome from this study shows that developing a security tool from a foundational level requires both knowledge and ambition, since new threats occur almost every day. The study also reveals that malicious actors are known for frequently looking for vulnerabilities in systems, making it one of the leading reasons why it is difficult to fight cyber threats.
190

Exploring the Impact of Jihadist Terrorist Attacks on Social Trust: Multiple Unexpected Events During Survey Design

Abdul Karim, Zubaida January 2024 (has links)
Heightened perceptions of threat, along with the proximity and nature of terrorist attacks, can influence trust dynamics. This dynamic often increases due to heightened social cohesion and collective resilience. This study examines the influence of jihadist terrorist attacks on social trust within communities in the Netherlands, Sweden, France, and Germany. The study hypothesized and theorized about how jihadist terrorism influences shifts in societal trust among the affected populations. Utilizing a "multiple unexpected events during survey" (MUESD) research design and integrating individual-level responses from the European Social Survey (ESS) with event-specific data from the Global Terrorism Database (GTD). The findings indicate a statistically significant increase in social trust shortly after the attacks, within the first to two weeks. This emphasizes the link between external security threats and internal social cohesion. By providing a nuanced understanding of the resilience responses activated during crises, the study contributes to the knowledge of the socio-political impact of terrorism and offers insights into the shifts in societal trust among affected populations. This research underscores the importance of understanding how societies react to and recover from terrorist threats, shedding light on the dynamics of trust and community solidarity in the face of adversity.

Page generated in 0.0506 seconds