941 |
Organizovaný zločin a bezpečnost : drogové kartely: celosvětově narůstající bezpečnostní hrozba / Organized crime and security : drug cartels : the global capacity of a rising security threatIbáñez de Foerster, Marcela January 2013 (has links)
Over the last four decades organized crime groups, particularly, drug trafficking organizations or drug cartels, have managed to be under the spotlight of the security agendas of American countries such as Colombia and the United States. During the last two decades, however, the global securitization of the drug trafficking issue, has led them to become a major security threat not only for the Americas, but also for Europe and more recently for West African countries. These organizations pose a threat not only to the security of the state, but to the very essence of it, by corrupting and damaging everything they come in contact with at the political, social, economical and even cultural level. This graduate thesis presents an analysis on Latin American drug trafficking organizations or drugs cartels, as they are commonly known, focusing on the cases of Colombian and Mexican drug cartels. By comparing these two case studies, I suggest that today's Mexican drug trafficking organizations have gained their momentum and incommensurable strength by following the footsteps of the big three Colombian drug cartels that existed between the 1980s and 1990s. The first chapter will expose the definitions and concepts surrounding the research of organized crime. In the second and third chapters, both the...
|
942 |
Stereotype ThreatEckert, Christine 25 April 2017 (has links)
Stereotype Threat wird definiert als ein Gefühl der Bedrohung, das Personen in einer Situation erleben, in der sie befürchten, aufgrund eines negativen Stereotyps über ihre Gruppe beurteilt zu werden bzw. durch ihr Verhalten das Stereotyp unbeabsichtigterweise zu bestätigen. Der Begriff geht auf Claude M. Steele und Joshua Aronson zurück. Stereotype Threat kann als ein situatives Dilemma bezeichnet werden, das bei Mitgliedern stigmatisierter Gruppen in Testsituationen kurzfristig zu signifikanten Leistungseinbußen führen kann. Es kann auch bei anderen Wahlentscheidungen auftreten. Empirisch gesicherte Befunde für die längerfristigen Auswirkungen liegen bisher kaum vor. Auch die auslösenden Bedingungen sind nicht abschließend geklärt.
|
943 |
Nearshore habitat use, estuarine residency, and conservation priorities for Pacific salmon in the Fraser River, British ColumbiaChalifour, Lia 02 May 2022 (has links)
Cumulative effects from multiple anthropogenic stressors over the past three centuries have severely impacted estuarine and coastal habitats, with cascading effects on the species that rely upon them. Pacific salmon (Oncorhynchus sp.) are migratory species that use estuaries as juveniles and as adults and deliver critical nutrients to coastal ecosystems as they move between fresh and marine waters. Many once abundant salmon populations have been extirpated or are in severe decline relative to historic levels, yet the strength of the relationship between habitat loss and population productivity has been challenged. In this dissertation, I applied field studies, otolith analyses, and conservation decision science tools to investigate the relative importance of estuarine habitat to salmon populations, with the aim of advancing effective management solutions for these species and their habitats.
First, I conducted a two-year field survey of fish communities in the Fraser River estuary, British Columbia, Canada comparing the species richness and relative catch amongst three distinct habitats. I found that this impacted estuary still supported a rich community of migratory marine and anadromous fishes, as well as resident estuarine fish species. Each habitat supported some unique fish assemblages, with eelgrass supporting the highest catch and diversity of fishes overall but brackish marsh supporting the highest and most consistent catch of salmonids. Next, I used otolith analyses to quantify the residency and growth of juvenile Chinook salmon in the estuary. I found that for one of the only two remaining Chinook salmon stocks abundant enough to still support limited harvest in the Fraser River, the estuary provides vital rearing habitat, with juveniles residing in the estuary for an average of 6 weeks, during which time they had mean daily growth rates of 0.57 mm fork length, approximating growth in healthier estuarine systems. The use of these habitats by juvenile Chinook salmon had not been quantified previously, so these findings directly inform management of this population, which was recently designated as Threatened by the Committee on the Status of Endangered Wildlife in Canada. Finally, I applied Priority Threat Management, a conservation decision science framework, to predict the future status of Pacific salmon in the lower Fraser River and identify the most cost-effective conservation solutions out of a suite of alternative management strategies. On our current trajectory none of these populations were predicted to be assessed as ‘green’ or healthy status at the end of 25 years. In contrast, implementation of broad scale habitat restoration, protection, and watershed management could considerably improve the viability of the lower Fraser to support these salmon, such that many (14/19) of these populations would have a >50% likelihood of being assessed as healthy.
Together, this research provides novel evidence of active and selective use of estuarine habitats by juvenile salmon, reliance on estuarine habitat for early marine growth by juvenile Chinook salmon, and a direct link between habitat health and population status for lower Fraser River salmon populations. / Graduate / 2023-04-13
|
944 |
High Impact Practices: A Mixed Methods Study of Engagement among Black Undergraduate WomenHalsell, Tiffany Y. 28 July 2017 (has links)
No description available.
|
945 |
3D Object Detection Using Virtual Environment Assisted Deep Network TrainingDale, Ashley S. 12 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / An RGBZ synthetic dataset consisting of five object classes in a variety of virtual environments and orientations was combined with a small sample of real-world
image data and used to train the Mask R-CNN (MR-CNN) architecture in a variety
of configurations. When the MR-CNN architecture was initialized with MS COCO
weights and the heads were trained with a mix of synthetic data and real world data,
F1 scores improved in four of the five classes: The average maximum F1-score of
all classes and all epochs for the networks trained with synthetic data is F1∗ = 0.91,
compared to F1 = 0.89 for the networks trained exclusively with real data, and the
standard deviation of the maximum mean F1-score for synthetically trained networks
is σ∗ = 0.015, compared to σ_F1 = 0.020 for the networks trained exclusively with real F1
data. Various backgrounds in synthetic data were shown to have negligible impact on F1 scores, opening the door to abstract backgrounds and minimizing the need for intensive synthetic data fabrication. When the MR-CNN architecture was initialized with MS COCO weights and depth data was included in the training data, the net- work was shown to rely heavily on the initial convolutional input to feed features into the network, the image depth channel was shown to influence mask generation, and the image color channels were shown to influence object classification. A set of latent variables for a subset of the synthetic datatset was generated with a Variational Autoencoder then analyzed using Principle Component Analysis and Uniform Manifold Projection and Approximation (UMAP). The UMAP analysis showed no meaningful distinction between real-world and synthetic data, and a small bias towards clustering based on image background.
|
946 |
The Effects of Simulated Police Presence on Initial Perceptions and Emotional Responses of College Aged MalesSaulter, Leah J. 30 November 2018 (has links)
No description available.
|
947 |
The Role of Steroidogenic Factor 1 Cells in Modulating Skeletal Muscle ThermogenesisShemery, Ashley M. 09 April 2020 (has links)
No description available.
|
948 |
The human connection to information security : A qualitative study on policy development, communication and compliance in government agencies / Den mänskliga kopplingen till informationssäkerhet : En kvalitativ studie om policyutveckling, kommunikation och efterlevnad inom statliga myndigheterAbdulhadi, Osama January 2023 (has links)
The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. The increasing volume of electronically stored data has led to a rise in cyber threats and breaches, necessitating effective information security policies and regulations. This study focuses on the experiences and perspectives of employees and top management in government agencies regarding the development, communication, compliance, and attitudes towards information security policies and regulations. Semi-structured interviews were conducted with participants from both top management or information security officers and regular employees, which allowed for an in-depth exploration of their experiences and perspectives. The findings show that government agencies systematically develop policies by engaging stakeholders, ensuring accessibility, and adhering to legal frameworks. Addressing the human factor involves training, awareness programs, and top management support. Policy development and implementation include risk assessment, stakeholder identification, objective setting, continuous review, and integration into daily operations. Communication channels such as intranets, training, coordinators, and awareness events are utilized, but their effectiveness is not directly measured. Proposed improvements include enhancing accessibility, improving policy document management, and using clearer language. Employees generally possess a positive attitude towards information security, though their understanding varies, and challenges to their understanding include complex language and unclear instructions. Compliance also varies, with difficulties arising from technical terminology and information overload. Enhanced compliance can be achieved through simplified language, providing better resources, and top management support. Proactive incident management focuses on learning and risk minimization. The human factor and insider threats remain significant concerns, which emphasizes the need for further education, awareness training, and motivation.
|
949 |
StrideLang : Creation of a Domain-Specific Threat Modeling Language using STRIDE, DREAD and MAL / StrideLang : Skapandet av ett Domän-Specifikt Hotmodellerings-Språk med STRIDE, DREAD och MALCerovic, Lazar January 2022 (has links)
Cybersecurity is still one of the main challenges of the digital era for organizations and individuals alike. Threat modeling is an important tool for building systems that are reliable and secure. The research question for this study is to create a domain specific language (DSL) with the Meta Attack Language (MAL), STRIDE and DREAD. One of the main challenges is to choose a DSL that is suitable for threat modeling. The purpose of the study is to provide people with threat modeling with additional tools that can be used in attack simulations. MAL is a meta language used for creating DSL that can be used for attack simulations. An example of a MAL project that usually serves as a template for other DSL is coreLang, which models the general IT infrastructure. STRIDE is a model used in threat modeling to enumerate and categorization of cyberthreats. DREAD is a model used for risk assessment that scores each threat by a value between one and ten. The proposed method for answering the research question is the Design Research Science Method (DRSM), which is often used for creating artifacts. Evaluation of the results is done with tests written in Java using the Junit framework. The result of the study is the creation of strideLang that maps attack steps in coreLang (MAL implementation of the general IT infrastructure DSL) to STRIDE and DREAD models. The primary source of error in the investigation is the risk assessment with DREAD, which can be somewhat inaccurate depending on what specific DSL is used. It would have been valuable if the study incorporated feedback from domain experts specifically with risk assessment. The nature of the STRIDE and DREAD models is that the models are very subjective in practice. However, this study does provide insights in how a DSL can be created based on DREAD and STRIDE. Future work might investigate a different DSL, incorporate tools such as SecuriCAD and compare different threat models. / Cybersäkerhet är fortfarande en av de främsta utmaningarna i den digitala eran för såväl organisationer som individer. Hotmodellering är ett viktigt verktyg för att bygga tillförlitliga och säkra system. Huvudmålet för denna studie är att skapa ett domänspecifikt språk (DSL) med Meta Attack Language (MAL), STRIDE och DREAD. En av de främsta utmaningarna för att nå målet med studien är att hitta ett domänspecifikt språk som är lämpligt för denna typ av hotmodellering. Syftet med studien är att förse personer som arbetar med hotmodellering med ytterligare verktyg för att kunna använda i sina attacksimuleringar. MAL är ett metaspråk som används för att skapa domän-specifika språk och utföra attacksimuleringar. Ett exempel på ett MAL projekt som oftast används som en mall för att skapa nya domänspecifika och modellerar den generella IT infrastrukturen. STRIDE modellen används för att lista och kategorisera digitala hot. DREAD brukar användas tillsammans med STRIDE och används för att risk bedöma digitala hot genom att betygsätta hoten med ett värde mellan ett och tio. Den valda metoden för att lösa forskningsfrågan är Design Research Science Method (DSRM), som används oftast i samband med skapandet av artefakter. Evaluering av resultatet gjordes med tester skrivna i Java med ramverket JUnit. Studien resulterade med skapande av strideLang som mappar attack steg i coreLang till STRIDE och DREAD modellerna. Den främsta felkällan i denna studie är riskbedömningen med DREAD eftersom noggrannheten på riskbedömningen kan variera från specifika domän i IT infrastrukturen. Det hade varit värdefullt om studien integrera domänexperters bedömning i studien främst för DREAD bedömningen. STRIDE och DREAD modellerna är subjektiva vilket betyder att olika experter kan komma till olika slutsatser för samma hot. Däremot så kan studien förse med intressanta insikter om hur ett domän-specifikt språk kan skapas baserat på DREAD och STRIDE modellerna. Framtida studier kan undersöka en mer specifik domän inom IT infrastrukturen, integrera verktyg som SecuriCAD och jämföra olika modeller som används inom hotmodelleringen
|
950 |
Försvarspolitisk frigörelse från det kalla kriget : – En analys av Sveriges försvars- och säkerhetspolitikfrån kalla kriget till idagHellström, Filip January 2022 (has links)
Purpose: The purpose of this study was to analyze accounts of presented narratives in defense bills and any changes to them over time regarding Sweden's defense. Design / Method: A descriptive study was designed. The data material for the study's background consists of quantitative data, taken from public sources regarding population statistics, GDP in SEK (billions) and in percent, inflation and consumer price index, which have been analyzed and interpreted regarding similarities in values. The study's main data is taken from nine defense bills from the year 1986 until 2021. This data have been analyzed by close reading and after a qualitative analysis was performed on the collected data material. Findings: (Background). Sweden's defense spending in relation to GDP has fallen continuously. In particular, a large reduction can be noted from 1990 onwards from 2.6% to 1.3% in 2020. A change in the security policy situation after 1989 can also be seen in the changes to defense spending. Changes can also be seen after 2014, when defense spending increased sharply. (Foreground-Figure). The analysis of narratives in the defense bills shows: (i) a narrative of a total defense (including military and civilian) regardless of a decline or rise in defense spending, (ii) the narrative of external events that affect defense policy, political behavior and decisions (iii) the narrative of threats against Sweden and of non-threats, and (iv) the narrative of the national identity as neutral and militarily non-aligned despite having a defensive alliance in practice. Conclusions: The thematic map of narratives in defense bills shows that accounts about current security and defense policy contain an ambiguity between the narratives about security policy on the one hand and the practical exercise of defense policy, on the other. This is probably due to an ideological view of security policy and to a collective self-image of neutrality and non-alignment, and being a clear voice for human rights, freedom and democracy in all parts of the world, rather than taking an actual pragmatic defense view. This pattern is found throughout the defense bills and expresses a kind of elitist perspective on one's own security policy stance. The study thus suggests that the narrative about the national self-image of neutrality is about the specific common experience and history from the 1940s to today and which has been communicated as specifically Swedish. This self-image appears as a foundation of Swedish security policy. With regard to defense costs, it can be stated that when no perceived impending military threat in the immediate area, defense spending is reduced. / Syfte: Syftet med denna studie var att analysera framställningar presenterade som narrativ i försvarspropositioner och eventuella förändringar av dem över tid avseende Sveriges försvar. Design/metod: En beskrivande (deskriptiv) studie utformades. Källmaterialet till studiens bakgrundsbeskrivning består av kvantitativ data, hämtat från offentliga källor gällande befolkningsstatistik, BNP i kr (miljarder) och i procent, inflation och konsumentprisindex och som analyserats och tolkats gällande likheter i värden. Studiens huvuddata består av nio försvarspropositioner från åren 1986 till 2021. Dessa har använts för närläsningar och en kvalitativ analys utfördes på det insamlade datamaterialet. Resultat: (Resultat bakgrund). Sveriges försvarsutgifter i förhållande till BNP har sjunkit kontinuerligt. Särskilt kan noteras en omfattande neddragning från år 1990 och framåt från 2,6 % till 1,3 % år 2020. Ett förändrat säkerhetspolitiskt läge efter 1989 syns i förändringen av försvarsutgifter. Förändringar syns också efter år 2014 då försvarsutgifterna ökat kraftigt. (Resultat förgrund-figur). Analysen av narrativ i försvarspropositionerna visar: (i) narrativet om totalförsvaret som just ett totalt försvar trots dess ned- och uppmontering, (ii) narrativet om omvärldshändelser som påverkar försvarspolitiken, politiska beteenden och beslut (iii) narrativet om hotbilder mot Sverige och om icke-hot, samt (iv) narrativet om självbilden som neutral och militärt alliansfri trots en allierad försvarspraktik och politik. Slutsatser: Den tematiska kartan över narrativ i försvarspropositioner, visar en berättelse om en tvetydighet mellan narrativen om säkerhetspolitiken å ena sidan och det praktiska försvarspolitiska utövandet, å den andra. Detta beror troligen på att den nationella kollektiva självbilden innehåller en ideologisk syn på neutralitet och alliansfrihet, samt på rollen av en klar röst för mänskliga rättigheter, frihet och demokrati i världens alla delar, snarare än en pragmatisk syn på försvarspolitik. Detta narrativ finns genomgående i försvarspropositionerna och uttrycker ett slags elitistiskt perspektiv på den egna säkerhetspolitiska hållningen. Denna nationella självbild framstår som ett grundelement för säkerhetspolitiken. När det gäller försvarskostnader, kan konstateras att när man inte uppfattar något förestående militärt hot i närområdet, så sparas det på försvarsutgifterna.
|
Page generated in 0.0873 seconds