451 |
Exploring attentional bias towards threatening faces in chimpanzees / チンパンジーにおける恐怖顔に対する注意バイアスに関する研究Duncan, Andrew Wilson 24 September 2019 (has links)
付記する学位プログラム名: 霊長類学・ワイルドライフサイエンス・リーディング大学院 / 京都大学 / 0048 / 新制・課程博士 / 博士(理学) / 甲第22034号 / 理博第4538号 / 新制||理||1652(附属図書館) / 京都大学大学院理学研究科生物科学専攻 / (主査)教授 友永 雅己, 准教授 宮地 重弘, 教授 濱田 穣 / 学位規則第4条第1項該当 / Doctor of Science / Kyoto University / DFAM
|
452 |
Real Time Biological Threat Agent Detection with a Surface Plasmon Resonance Equipped Unmanned Aerial VehiclePalframan, Mark C. 17 June 2013 (has links)
A system was developed to perform real-time biological threat agent (BTA) detection with a small autonomous unmanned aerial vehicle (UAV). Biological sensors just recently reached a level of miniaturization and sensitivity that made UAV integration a feasible task. A Surface Plasmon Resonance (SPR) biosensor was integrated for the first time into a small UAV platform, allowing the UAV platform to collect and then quantify the concentration of an aerosolized biological agent in real-time. A sensor operator ran the SPR unit through a groundstation laptop and was able to wirelessly view detection results in real time. An aerial sampling mechanism was also developed for use with the SPR sensor. The collection system utilized a custom impinger setup to collect and concentrate aerosolized particles. The particles were then relocated and pressurized for use with the SPR sensor. The sampling system was tested by flying the UAV through a ground based plume of water soluble dye. During a second flight test utilizing the onboard SPR sensor, a sucrose solution was autonomously aerosolized, collected, and then detected by the combined sampling and SPR sensor subsystems, validating the system\'s functionality. The real-time BTA detection system has paved the way for future work quantifying biological agents in the atmosphere and performing source localization procedures. / Master of Science
|
453 |
The Effects of Previous Traumatic Experiences on Learning Outcomes: Perceptions of Black Men Who are Attending Community CollegeThomas, Willie 01 May 2022 (has links)
Academic underachievement among Black students, particularly Black male students, is a troubling trend that has long attracted scholarly attention. The prevailing consensus is that the shortcomings of some Black male students in academic achievement may be attributable to traumatic experiences arising from environments of violent, inner-city poverty that disproportionately affect Black men. Traumatic experiences have been shown to negatively affect Black men’s self-perception, emotions, self-image, and social and cognitive skills, with consequences in the form of measured shortfalls in retention and graduation rates. My qualitative, phenomenological study sought to explore how previous traumatic experiences of Black men affected their academic experiences and achievement while attending a community college. This study was conducted in a virtual environment setting using Zoom video conferencing and each interview ran approximately 45 minutes. Ten Black men were selected from a demographic survey to take part in this study. When asked about traumatic experiences, several participants mentioned the death of a family member as affecting their academic progress. Interpersonal loss may contribute to long-term effects on student engagement. Another reoccurring theme was negative stereotypes related to Black men being reinforced intentionally or unintentionally in the classroom. The findings from this study on the social and cultural experiences of Black men may encourage educational leaders to create more effective academic supports and services designed to improve the success rate of Black, male students who have suffered previous traumatic experiences.
|
454 |
Sekuritizace virové "infodemie": Přijímání čínských a ruských dezinformací Evropskou unií během pandemie COVID-19 / Securitizing the viral "infodemic": EU's reception of Chinese and Russian disinformation during the COVID-19 pandemicChumenko, Viktoriia January 2021 (has links)
Abstract. The outbreak of the novel coronavirus put democratic process, and security architecture across the globe in jeopardy. The global health crisis galvanised the proliferation of pandemic-related disinformation and other malign influence operations, and this phenomenon gave birth to a new buzzword, known as "infodemic". The "infodemic" provided hostile countries with a possibility to launch disinformation campaigns and other malign communication efforts, which in most cases were attributed to external state actors, such as China and Russia. Both actors aimed to weaken the legitimacy of European institutions, and undermine its democratic process. The "infodemic", thus, posed a threat to the EU's security and became a watershed moment in the disinformation discourse for the EU. In the aftermath, this mounting threat of disinformation was instantly acknowledged by EU representatives and institutions in their numerous official statements and policy documents. This dissertation examines the EU's approach towards Chinese and Russian disinformation campaigns through the lenses of securitisation theory and evaluates the success of this process. The findings of the evaluation showcased that neither Russian nor Chinese disinformation was successfully securitised by the EU. It also argues that the EU has...
|
455 |
Sekuritizace imaginární hrozby jako nástroj autoritářské legitimace: Případy Běloruska a Uzbekistánu / Securitization of an imaginary threat as an authoritarian legitimation instrument: The cases of Belarus and UzbekistanAkromov, Otabek January 2021 (has links)
Securitization of an Imaginary Threat as an Authoritarian Legitimation Instrument: The Cases of Belarus and Uzbekistan. July 2021 GUID: 2458329A DCU ID: 19108281 CU ID: 22199053 Presented in partial fulfilment of the requirements for the
Degree of International Master in Security, Intelligence and Strategic Studies Word Count: 22 451 Supervisor: Donnacha Ó Beacháin Date of Submission: 31.07.2021 Abstract This research explores how the securitization of imaginary and exaggerated threats is used as a legitimation instrument in hegemonic authoritarian regimes. Approaching the task through the cases studies, this thesis will situate the securitization practice within the performance mechanism of authoritarian legitimation and apply it in two hegemonic autocratic regimes - Uzbekistan of Islam Karimov and Belarus of Alexander Lukashenko. This dissertation picks qualitative research design. Methodologically, discourse and content analysis will be used to test the theory that will be developed in this project. The arguments presented in the thesis draw upon the primary sources such as speeches, official statements, and memoirs. The dissertation will also refer to the secondary sources in order to synthesise arguments provided by the existing literature related to the issue in question. This research project...
|
456 |
Säkerhetisering av cyber? : En studie om inramningen av cyberhot i svensk politikPohjanen, Sofia January 2021 (has links)
The following thesis intends to study how cyber security and cyber threats are portrayed in Swedish political discourses on cyber between the years 2015-2021. How the question about cyber security is framed can have a major impact on Sweden’s security- and digitization policy and further, on the population's view of which problems are important and how resources should be allocated. Through qualitative text analysis, more specific discourse analysis, political debate articles and government reports will be analyzed to evaluate how the question about cyber security has been framed as an existential threat and if so, for whom? The purpose is to investigate whether features of securitization occurs and if the question about cyber security can be defined as securitized. And further, what kind of measures has been proposed as protection against these threats? The study also aims to identify which actors' arguments and problem representations have had an impact. The results show that there has been a securitization move within political cyber discourses and a number of safety features have been proposed or have already taken place. The question about cyber security can therefore be defined as securitized. The results also show that a few numbers of government actors have the privilege to represent the problems and furthermore, decide what actions to take.
|
457 |
Comparison of adversary emulation tools for reproducing behavior in cyber attacks / : Jämförelse av verktyg för motståndaremulering vid återskapande av beteenden i cyberattackerElgh, Joakim January 2022 (has links)
As cyber criminals can find many different ways of gaining unauthorized access to systems without being detected, it is of high importance for organizations to monitor what is happening inside their systems. Adversary emulation is a way to mimic behavior of advanced adversaries within cyber security, which can be used to test detection capabilities of malicious behavior within a system of an organization. The emulated behavior can be based on what have been observed in real cyber attacks - open source knowledge bases such as MITRE ATT&CK collect this kind of intelligence. Many organizations have in recent years developed tools to simplify emulating the behavior of known adversaries. These tools are referred to as adversary emulation tools in this thesis. The purpose of this thesis was to evaluate how noisy different adversary emulation tools are. This was done through measurements on the amount of event logs generated by Sysmon when performing emulations against a Windows system. The goal was to find out which tool was the least noisy. The different adversary emulation tools included in this thesis were Invoke-AtomicRedTeam, CALDERA, ATTPwn and Red Team Automation. To make sure the correlation between the adversary emulation tools and the generated event logs could be identified, a controlled experiment was selected as the method for the study. Five experiments were designed including one emulation scenario each, executed by the different adversary emulation tools included in each experiment. After each emulation, event logs were collected, filtered, and measured for use in the comparison. Three experiments were conducted which compared Invoke-AtomicRedTeam, CALDERA, and a manual emulation. The results of the first three experiments indicated that Invoke-AtomicRedTeam team was the noisiest, followed by CALDERA, and the manual emulation was the least noisy. On average, the manual emulation generated 83,9% fewer logs than Invoke-AtomicRedTeam and 78,4% fewer logs than CALDERA in experiments 1-3. A fourth experiment compared Red Team Automation and Invoke-AtomicRedTeam, where Red Team Automation was the least noisy tool. The final fifth experiment compared ATTPwn and CALDERA, and the results indicated that these were similarly noisy but in different ways. It was also concluded that a main difference between the adversary emulation tools was that the number of techniques available differed between the tools which could limit the ability to emulate the behavior of real adversaries. However, as the emulation tools were implemented in different ways, this thesis could be one starting point for future development of silent adversary emulation tools or to assist in selecting an existing adversary emulation tool.
|
458 |
Valence Weighting Bias, Stress, and Change in C-Reactive Protein, a Marker ofInflammationKeaveney, Alexis A. 28 August 2019 (has links)
No description available.
|
459 |
Whose good old days? Organizational approaches to history shape experiences for members of historically marginalized groupsReeves, Stephanie Lauren 02 October 2019 (has links)
No description available.
|
460 |
A Methodology for Cyberthreat ranking: Incorporating the NIST Cybersecurity Framework into FAIR ModelBakare, Adeyinka A. 09 June 2020 (has links)
No description available.
|
Page generated in 0.0403 seconds