• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 177
  • 136
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 458
  • 172
  • 94
  • 85
  • 72
  • 66
  • 62
  • 59
  • 57
  • 55
  • 48
  • 41
  • 39
  • 36
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

A machine learning approach to detect insider threats in emails caused by human behaviour

Michael, Antonia January 2020 (has links)
In recent years, there has been a significant increase in insider threats within organisations and these have caused massive losses and damages. Due to the fact that email communications are a crucial part of the modern-day working environment, many insider threats exist within organisations’ email infrastructure. It is a well-known fact that employees not only dispatch ‘business-as-usual’ emails, but also emails that are completely unrelated to company business, perhaps even involving malicious activity and unethical behaviour. Such insider threat activities are mostly caused by employees who have legitimate access to their organisation’s resources, servers, and non-public data. However, these same employees abuse their privileges for personal gain or even to inflict malicious damage on the employer. The problem is that the high volume and velocity of email communication make it virtually impossible to minimise the risk of insider threat activities, by using techniques such as filtering and rule-based systems. The research presented in this dissertation suggests strategies to minimise the risk of insider threat via email systems by employing a machine-learning-based approach. This is done by studying and creating categories of malicious behaviours posed by insiders, and mapping these to phrases that would appear in email communications. Furthermore, a large email dataset is classified according to behavioural characteristics of employees. Machine learning algorithms are employed to identify commonly occurring insider threats and to group the occurrences according to insider threat classifications. / Dissertation (MSc (Computer Science))--University of Pretoria, 2020. / Computer Science / MSc (Computer Science) / Unrestricted
62

SVENSK NEUTRALITET - ETT MINNEBLOTT? En studie om den svenska regeringens syn på den ökadehotbilden kring Östersjön och dess effekt på svensksäkerhets- och försvarspolitik

Delic, Azra, Haydar Kailan, Abdullah January 2020 (has links)
The Russian annexation of Crimea in 2014 was the start of the increasing tensions inthe Baltic sea. According to the Swedish government, the threats against the Nordic-Baltic countries have increased and this study will examine the Swedishgovernment’s security measures during the period of 2014 - 2020. Our methodselection is based on a qualitative text analysis. To review Sweden’s arrangements,we will analyse one proposition from a theoretical framework that is constituted ofthe Constructivism theory and the Securitization theory. The conclusion of the studyis that the Swedish government looks at the situation in the Baltic sea as amultidimensional security process. In order to protect the Swedish territory, thecountry must expand and strengthen both its national and international militarypower.
63

A Qualitative Study on the Experiences of Therapists who Have Been Threatened with Harm or Attacked by a Client or a Relative of a Client During the Course of Treatment in a Non-Residential Setting

Wolverton, Katherine Gray 06 May 2015 (has links)
This qualitative study used a phenomenological approach to understand the experience of six therapists who had been threatened with harm or attacked by a client or a relative of a client in an outpatient setting. Semi-structured interviews were employed to collect data which were then analyzed using thematic coding. While some of the results of this study are consistent with existing literature on attacks on clinicians in acute inpatient settings, many of the study findings suggest that the experiences of therapists working in an outpatient setting who are threatened by a client or a relative of client are unique to that setting. Clinical implications are discussed. / Master of Science
64

Hot och våld i sjuksköterskans profession : En allmän litteraturstudie / Threats and violence in the nursing profession : A general literature review

Karlsson, Jannike, Sibelius, Joel January 2024 (has links)
Bakgrund: Hot och våld mot sjuksköterskor från patienter och närstående inom hälso- och sjukvården är ett globalt problem och kan yttra sig på olika sätt. Konsekvenserna av utsattheten kan skada sjuksköterskorna i sin profession, men även i livet utanför arbetet. Syfte: Att belysa sjuksköterskors utsatthet för hot och våld i professionen och dess konsekvenser. Metod: En allmän litteraturstudie som utgick från en induktiv ansats där tio vetenskapliga artiklar inkluderades. Analysen av artiklarna resulterade i tre huvudkategorier. Resultat: De huvudkategorier som framkom var: förekomst av och orsaker till hot och våld, konsekvenser av hot och våld samt organisationens ansvar vid hot och våld. Första kategorin belyser prevalensen av hot och våld och dess utbredning inom hälso- och sjukvården. Andra kategorin belyser hur sjuksköterskan kan ta skada av utsattheten för hot och våld. Tredje kategorin betonar vikten av organisatoriskt stöd, samt betydelsen av utbildning och rätt förutsättningar för sjuksköterskan vid hot och/eller våld. Konklusion/implikation: Utsattheten i relation till organisationens bristande stöd bidrog till att sjuksköterskor tänkte över sitt val av yrke. Mer forskning behövs inom området för att minimera risker och konsekvenser för hot och våld. / Background: Threats and violence to nursing staff, from patients and relatives, in healthcare is a global problem and can manifest itself in different ways. The consequences of exposure to harm, or threat of harm, to nurses in their professional practice but also in their private life outside of work. Purpose: To illustrate nurses' exposure to threats and violence in the profession and its consequences. Method: A general literature study based on an inductive approach where in ten scientific articles were included. The analysis of the articles resulted in three main categories. Results: The main categories were: the occurrence and causes of threats and violence, the consequences of threats and violence and the organization's responsibility in the event of threats and violence. The first category highlights the prevalence of threats and violence and its spread through the health care. The second category highlights how an individual nurse can be harmed by exposure to threats and violence. The third category emphasizes the importance of organizational support, as well as the importance of training and the correct practices regarding the nurse in the event of threats and/or violence. Conclusion/implication: The exposure in relation to the organization's lack of support contributed to nurses rethinking their chosen profession. More research is needed in the area to minimize risks and consequences of threats and violence.
65

Navigating online harms: countering influence campaigns and hate in the social media ecosystem

Saeed, Mohammad Hammas 24 May 2024 (has links)
Social media platforms have become immensely popular over the years, leading to significant changes in cyberspace and the emergence of numerous challenges. These challenges have various faces, such as disinformation, online hate, cyberbullying, discrimination, biases, and other facets of harm. From the perspective of an end-user, the modern-age online ecosystem can be harmful in various ways, e.g., by consistently coming across disinformation in the online spaces or being targeted by a hate attack because of a specific ethnic or racial background. As we move forward, it is crucial to understand the nature and impact of new-age harms to make the Internet a safer place for everyone. To this end, my first contribution is the study of inauthentic accounts, also known as troll accounts. Troll accounts on social media are often sponsored by state actors aiming to manipulate public opinion on sensitive political topics. The strategy they commonly use is to interact with one another and appear innocuous to a regular user while covertly being used to spread toxic content and/or disinformation. I first study the effect that troll accounts have on online discussions on Reddit and show that state-sponsored troll accounts on Reddit produce threads that attract more toxic comments than other posts on the same subreddit. Next, I build TROLLMAGNIFIER, a detection system for troll accounts based on the observation that these accounts often exhibit loose coordination and interact with each other to advance specific narratives. TROLLMAGNIFIER learns the typical behavior of known troll accounts and identifies more that behave similarly. I show that using TROLLMAGNIFIER, one can grow the initial knowledge of potential trolls provided by Reddit by over 300%. Building upon the understanding of troll accounts and online campaigns, I then study the broader aspects of online disinformation. In this work, I study 19 influence campaigns on Twitter originating from various countries and identify several strategies adopted across different state actors, e.g., using scheduling services to delegate their posting tasks, utilizing fake third-party versions of popular applications (e.g., “Twitter for Android”) to post messages, extensively retweeting to push certain agendas, and posting innocuous messages (e.g., motivational quotes) to potentially avoid detection. Overall, I identify several universal traits among campaigns to create a cross-campaign detection system that can detect upto 94% accounts from unseen campaigns. Lastly, I delve deeper into the importance of cybersafety and study coordinated attacks, such as cyber-aggression and hate attacks, which are becoming increasingly common on video sharing networks like YouTube. Polarized online communities choose targets on prominent online platforms (e.g., YouTube) and organize their attacks by sending hateful messages to their target. The proposed system, TUBERAIDER, addresses this issue by automating the detection and attribution of attacks to their source communities, aiding in moderation, and understanding the motivations behind such actions. The system collects YouTube video links from diverse sources, including 4chan’s /pol/ board, r/The_Donald subreddit, and 16 incel subreddits. The attribution is performed through a machine learning classifier based on TF-IDF scores of important keywords and achieves an accuracy above 75% in attributing a coordinated attack to a given video. In summary, my research focuses on understanding, detecting, and combating online harms using a data-driven approach. I develop tools to mitigate the malicious behavior with the goal of offering policymakers guidelines to ensure user safety on social media platforms.
66

Changing public threats and police priorities: How police chiefs respond to emerging threats

Ibbetson, Paul A. January 1900 (has links)
Doctor of Philosophy / Department of Sociology, Anthropology, and Social Work / Robert K. Schaeffer / Kansas police chiefs are a unique group of individuals. Because are they located throughout the various sized communities within the state, they have the potential to affect the daily lives of more people on a day-today basis than any other branch of law enforcement. The purpose of this study was to analyze how police chiefs prioritize emerging threats. In this study, using a purposeful sample, 40 semi-structured interviews were conducted with Kansas police chiefs across the state. These police chiefs were asked about their views on the biggest emerging threats they have observed within the last 10 years. They were also asked why certain threats become priorities and why others do not. Police chiefs were split on their thoughts of whether or not they believed resources should be allocated in their communities to defend against terrorism in Kansas. What was discovered during the research process went beyond learning about the process of change for threat prioritization, or what specific threats Kansas police chiefs think their communities are facing today. What was discovered was a deeper understanding of how police chiefs think when it comes to the relationship between police departments, police personnel, and community. As police chiefs addressed the processes by which they go about prioritizing emerging threats, they illuminated a unique strategy hierarchy for success that is centered on maintaining positive departmental perception. To maintain this perception, police chiefs work both officially and covertly within governmental structures and the public sphere to control how people think about their personnel and department. A prominent difference was seen in the physical proximity and accessibility of police chiefs to the community between small, medium, and large towns. In effect, to come to an understanding of the process of prioritization for emerging threats for Kansas police chiefs, it was necessary to understand these police administrators’ unique thought processes that they bring to the table when addressing important issues.
67

An analysis of parliamentary intelligence oversight in South Africa with speciric reference to the Joint Standing Committee on intelligence

Dlomo, Dennis Thokozani 08 February 2005 (has links)
This study analyses parliamentary intelligence oversight in South Africa by assessing the understanding of members of the JSCI of its core business, its mission and vision and powers and functions as are stipulated by law. The study locates the JSCI within an international intelligence oversight milieu through a review and evaluation of selected countries’ intelligence oversight mechanisms. Furthermore, international best practice is sought and applicable lessons are drawn for South Africa. The study is bases on a literature review and interviews with members of the JSCI to gather information and draw insights to evaluate and test the propositions in the context of international and national best practice. The propositions, which are supported by the research, are that: · Intelligence oversight in South Africa under the JSCI has hitherto been relatively effective although there is room for improvement. · The JSCI has good relations with the other arms of the state that are responsible for the oversight of Intelligence in South Africa – making parliamentary intelligence oversight, overall, quite effective. · Despite this effectiveness there are legislative gaps and problems pertaining to the modus operandi of the JSCI that need the attention of both the Executive and Legislature and which could be part of a package of legislative reform. The research supported these propositions whilst pointing out that new initiatives need attention if the culture of oversight is to find root. These are the need to widen the scope of accountability to build a culture of accountability among middle and senior management members of the Intelligence structures and secondly the way Parliament resources the JSCI. / Dissertation (M (Political Sciences))--University of Pretoria, 2006. / Political Sciences / unrestricted
68

Lutte aux botnets : les politiques de prévention s'avèrent-elles efficaces?

Allaire, Marie-Renée 07 1900 (has links)
No description available.
69

South Africa's official external threat perceptions : 1994-2012

Mabanga, Silingile Portia January 2013 (has links)
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study is: What is the nature, scope and basis of the post-1994 official external threat perception of South Africa? The research problem generated four subsidiary questions: When does a security issue become a national threat? What types of threat are there? How does the South African government perceive these threats? And whose security is threatened? In responding to the main research questions, the study‟s findings note a change in perceptions during the post-Cold War era as to what constituted threats to security. The focus shifted from traditional to non-traditional threats to national security, because most current threats are non-military and transnational in nature. The analysis of South Africa‟s official external threat perception is informed by the changed views of Government towards what are considered the main threats to national security. The study concludes with key findings in response to the stated problem and with specific recommendations. The study confirmed that the nature of threats and security debates post-1994 have changed constantly with the expansion of the security agenda beyond state and military security. The official viewpoint is that South Africa at present is not faced with any military threats. Emphasis is currently placed on human beings as the main object of security. Most identified threats are transnational in nature and these relate to the illegal flow of immigrants, terrorism, organised crime, climate change (linked to food and water security), regional instability and other socio-economic threats. These threats are being perceived and articulated by Government through policy announcements and public speeches, also validated in the critical analysis of various scholars. The concept of non-traditional threats still lacks a commonly accepted definition; hence the study proposes the need for South Africa to define and outline non-military security threats in a comprehensive manner, preferably through the development of a South African External Threat Perception Framework. Developing such a framework will assist security agencies (such as analysts) and other stakeholders in providing advice and guidance to Government in identifying external security threats. This initiative could eliminate the abuse of power by various stakeholders in securitising any issue as a threat to national security, and instead divert those resources to other Government services. Provision should also be made in the form of policy initiatives on the role of military force and other agencies in addressing non-military security threats. Thus, the development of key elements of an integrated national security strategy in order to address external security issues and threats is essential. / Dissertation (MSecurity Studies)--University of Pretoria, 2013. / gm2015 / Political Sciences / MSecurity Studies / Unrestricted
70

Dynamics of Napier stunt phytoplasma between the cultivated and wild graminae in East Africa / George Ochieng Asudi

Asudi, George Ochieng January 2015 (has links)
Cultivation of Napier grass, Pennisetum purpureum, the most important livestock crop in East Africa is severely constrained by Napier Grass Stunt (NGS) disease. The disease spreads via an insect vector or vegetative propagation of infected plant material and is caused by a phytoplasma. This necessitates the development of an integrated management approach for the disease. Therefore, objectives of this study were to assess the incidence of the disease and its severity, to identify its wild hosts and farmers‟ knowledge on these hosts, to assess the threat of NGS disease to cultivated grasses and to establish the role of wild inoculum sources in its spread. The study showed NGS incidence ranging from 33% in Uganda to 95% in Kenya with 49% of the farmers interviewed, being able to discern NGS disease by its symptoms. Most farmers cited roguing and use of alternative fodder grasses as control measures, making these strategies the likely components of an integrated management approach for the disease. Responders named Sedge grass (Cyperus spp.) and Star grass (Cynodon dactylon) as the likely hosts of diseases caused by phytoplasma. Phytoplasmas were detected in leaves of 11 of 33 wild grass species collected using polymerase chain reaction (PCR) based on the highly conserved phytoplasma-specific 16S ribosomal DNA fragment. Sequence determination of amplified PCR fragments revealed the presence of NGS-related phytoplasmas in 11 grass species, Bermuda grass white leaf (BGWL) phytoplasmas in three and goosegrass white leaf (GGWL) in two wild grass species, showing that the geographical distribution and diversity of phytoplasmas and their grass hosts are greater than previously thought. The relationships between NGS and Hyparrhenia grass white leaf (HGWL) phytoplasmas were determined using sequences based on secA gene and immunodominant protein (imp). Results showed a very low genetic diversity between NGS and HGWL and produced a phylogenetic tree congruent to that produced by the 16S, affirming the inclusion of HGWL in the 16SrXI group. NGS phytoplasma was transmissible to food crops through Maiestas banda Kramer (Hemiptera: Cicadellidae) under screen-house conditions. With 56.3%, Saccharum officinarum showed the highest infection level followed by Eleusine coracana with 50%, Sorghum bicolor with 43.8%, Oryza sativa with 31.3% and Zea mays with 18.8%. All the phytoplasma-infected plants were asymptomatic except S. officinarum plants, which showed mild to moderate symptoms consisting of foliar yellow leaves and bright white or yellow midribs. This hints that besides wild hosts, food crops may also serve as alternative source of inoculum enabling a complex NGS disease cycle, which may add to challenges in the development of the disease control strategies. However, failure by M. banda to transmit HGWL and BGWL phytoplasmas back to Napier grass is an indication that it could be the exclusive vector of NGS. Therefore, there is need to initiate transmission trials using planthoppers and leafhoppers occurring on HGWL and BGWL phytoplasma-infected grasses to determine whether insect vectors capable of transmitting phytoplasmas from native grasses to Napier grass, are present in the region. / PhD (Environmental Sciences), North-West University, Potchefstroom Campus, 2015

Page generated in 0.0454 seconds