22,446 results on '"threats"'
Search Results
2. Visualization of Community Safety Threats with Time Series Evaluation
- Author
-
Alam, Intekhab, Gobi, N., Yadav, Renu, Shankar, J., Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Tan, Kay Chen, Series Editor, Kumar, Amit, editor, Gunjan, Vinit Kumar, editor, Senatore, Sabrina, editor, and Hu, Yu-Chen, editor
- Published
- 2025
- Full Text
- View/download PDF
3. Threats and forced displacement in Colombia: an analysis based on municipal data
- Author
-
Vargas, Marlyn Vanessa
- Published
- 2024
- Full Text
- View/download PDF
4. A comprehensive analysis of threat vectors in software-defined networking.
- Author
-
Dahiya, Seema, Sehrawat, Harkesh, Kharb, Seema, and Siwach, Vikas
- Abstract
In recent years, cyber-attacks have become more frequent and advanced, targeting critical infrastructure, businesses, homes, and government agencies. Detecting and preventing these attacks at the earliest stage possible is crucial to avoid serious harm, including data breaches. Researchers and experts in cybersecurity are looking to Software-Defined Networking (SDN) technologies as a solution to enhance real-time defense against cyber-attacks. SDN revolutionizes traditional networking by offering unprecedented flexibility and control over network resources, making it possible to adapt quickly to emerging threats. SDN provides logically centralized network control by separating the control plane from the data plane. This enables network programming and can block network activity when malicious movement is spotted. This paper presents a comprehensive analysis of threat vectors in SDN. It examines the various ways in which SDN networks are vulnerable to cyber-attacks, including network infrastructure, application layer, and SDN controller. The paper also evaluates the effectiveness of existing security measures and proposes future research directions to enhance SDN security. Overall, the paper highlights the potential of SDN as a powerful tool in the fight against cybercrime and emphasizes the importance of continued research and development to improve SDN security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. ПИТАННЯ ЗАХИСТУ ПРОВІДНИХ ГАЛУЗЕЙ ВИРОБНИЦТВА УКРАЇНИ: НАЦІОНАЛЬНІ ПРІОРИТЕТИ.
- Author
-
Петруненко, Я. В. and Тройніков, В. В.
- Subjects
INTERNATIONAL competition ,INTELLECTUAL property ,INFORMATION technology security ,ECONOMIC security ,NATIONAL interest - Abstract
The article emphasises that in the context of a full-scale war and economic crisis, protection of Ukraine's leading industries becomes one of the state's priority tasks. Not only the economic independence of the country, but also its defence capability depends on the preservation and development of these industries. The article identifies the leading industries of Ukraine that require priority protection. The main risks and threats to these industries are analysed. A set of priority measures to protect the leading industries has been developed, including financial support, tax and customs benefits, state guarantees, creation of a favourable investment climate, technology modernisation and innovation, and protection of intellectual property. The implementation of the proposed measures will definitely contribute to strengthening the country's economic security and, accordingly, its defence capability. It is emphasised that in the context of globalisation and competition in international markets, it is extremely important to ensure the sustainability and competitiveness of key production sectors, including energy, machine building, and heavy industry. National priorities in this area should include the development and implementation of effective protection strategies, modernisation of the technological base, improvement of product quality, creation of a favourable investment climate and ener gy security. The author suggests that analysis of innovation trends, study of international experience and introduction of advanced technologies are key aspects of development and protection of leading industries. An effective system of intellectual property protection, implementation of effective cybersecurity and information security measures, and support of state programmes for the development of production capacities contribute to strengthening the protection of import ant sectors of the economy. The author concludes that studying and analysing the problems of protecting Ukraine's leading industries and developing national priorities in this regard are important tasks for ensuring the sustainability and competitiveness of the country's economy in the current conditions of geopolitical and economic challenges, as well as for the post-war reconstruc tion of the state. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. A taxon under siege from multiple threats: results of analysis of chytrid fungi on the Calabrian Alpine newt.
- Author
-
Bernabò, Ilaria, Cittadino, Viviana, Iannella, Mattia, Corapi, Anna, Tiberti, Rocco, Dondero, Lorenzo, Grasselli, Elena, and Romano, Antonio
- Abstract
The fungi
Batrachochytrium dendrobatidis (Bd ) andB. salamandrivorans (Bsal ) and their associated disease, i.e., chytridiomycosis, pose significant threats to amphibians occurring in the Western Palearctic. This study aims to assess the prevalence and infection load ofBd andBsal in the Calabrian Alpine newt,Ichthyosaura alpestris inexpectata , a micro-endemic and endangered subspecies from the Catena Costiera, Calabria, Southern Italy. Ninety newts were sampled from May to October 2023 from five breeding sites, representing the core distribution area of the Calabrian Alpine newt. Molecular analyses revealed that over 50% of the samples tested positive forBd , while none tested positive forBsal . No gross external signs of disease were detected in tested individuals.Bd prevalence and load were balanced between sexes but varied significantly among sites and were negatively associated with newt size, likely indicating site-specific and age variations in infection. AlthoughBsal was not detected, the high prevalence ofBd presents a new conservation challenge for the cold-loving Calabrian Alpine newt, which is already threatened by climate change and the introduction of alien fish in its main breeding sites. Therefore, it is crucial that future conservation actions, including monitoring for potential outbreaks of chytridiomycosis, are implemented adopting rigorous biosecurity measures to prevent further spread of the pathogen and safeguard the entire amphibian community. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
7. Threat assessment for Pacific sand lance (Ammodytes personatus) in the Salish Sea.
- Author
-
Huard, Jacqueline R., Hemming, Victoria, Baker, Matthew R., Blancard, Jennifer, Bruce, Ian, Cook, Sarah, Davoren, Gail K., Dionne, Phillip, East, Virginia, Hipfner, J. Mark, Houtman, Nicola R., Koval, Brian A., Lowry, Dayv, Monks, Rowen, Nicholas, Graham, Proudfoot, Beatrice, Quindazzi, Micah, Quinn, Timothy, Robinson, Clifford L. K., and Rubidge, Emily M.
- Subjects
ECOLOGICAL risk assessment ,EXTREME weather ,ANTHROPOGENIC effects on nature ,FORAGE fishes ,OCEAN acidification - Abstract
Like many forage fish species, Pacific sand lance (Ammodytes personatus) play a key role in nearshore marine ecosystems as an important prey source for a diverse array of predators in the northeastern Pacific. However, the primary threats to Pacific sand lance and their habitat are poorly defined due to a lack of systematic data. Crucial information needed to assess their population status is also lacking including basic knowledge of their local and regional abundance and distribution. Sand lance are currently listed as 'not evaluated' under the IUCN red list and they have not been assessed by US and Canadian agencies. This hampers management and policy efforts focused on their conservation. To address this knowledge gap, we conducted a three-part, structured expert elicitation to assess the vulnerability of Salish Sea sand lance populations. Experts were asked to list and rank key threats to Salish Sea sand lance and/or their habitat, to further quantify the vulnerability of sand lance to identified threats using a vulnerability matrix, and to predict the population trajectory in 25 years from today. Impacts associated with climate change (e.g. sea level rise, sea temperature rise, ocean acidification, and extreme weather) consistently ranked high as threats of concern in the ranking exercise and quantified vulnerability scores. Nearly every expert predicted the population will have declined from current levels in 25 years. These results suggest sand lance face numerous threats and may be in decline under current conditions. This research provides vital information about which threats pose the greatest risk to the long-term health of sand lance populations and their habitat. Managers can use this information to prioritize which threats to address. Future research to reliably quantify population size, better understand the roles of natural and anthropogenic impacts, and to identify the most cost-effective actions to mitigate multiple threats, is recommended. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. The first record the Limnia unguicornis (Diptera, Sciomyzidae) parasites on a vulnerable pulmonate land snail, Vertigo moulinsiana (Gastropoda: Eupulmonata: Vertiginidae) and a literature review on Limnia species.
- Author
-
Wendzonka, Jacek, Sobczyńska, Urszula, and Książkiewicz, Zofia
- Abstract
The literature about mollusc-parasite interactions is focused on species affecting human health, such as trematodes on freshwater snails as intermediate hosts. Far less attention has been paid to parasite-snail interactions in terrestrial habitats. Here we present the first observation of a sciomyzid larva of Limnia unguicornis, parasitizing a vulnerable, tiny air-breading snail, Vertigo moulinsiana (strictly protected by Polish law). Sciomyzids are almost exclusively malacophagous but their biology and ecology are understudied. Thus, we have reviewed the available information on Limnia species and discussed the results of our research. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Acts of offensive behaviour and risk of disability pension in Danish female eldercare workers: prospective cohort with 11-year register follow-up.
- Author
-
Clausen, Thomas, Pihl-Thingvad, Jesper, Villadsen, Ebbe, and Andersen, Lars L.
- Subjects
- *
SELF-evaluation , *RISK assessment , *MEDICAL personnel , *RESEARCH funding , *WORK environment , *DISABILITY evaluation , *RETIREMENT , *REPORTING of diseases , *VIOLENCE in the workplace , *PSYCHOLOGY of women , *DESCRIPTIVE statistics , *AGGRESSION (Psychology) , *LONGITUDINAL method , *ODDS ratio , *BULLYING , *SEXUAL harassment , *JOB stress , *PENSIONS , *MEDICAL care for older people , *CONFIDENCE intervals , *PEOPLE with disabilities , *PROPORTIONAL hazards models , *PSYCHOSOCIAL factors - Abstract
Objectives: To investigate whether acts of offensive behaviour (threats, violence, workplace bullying and sexual harassment) in the workplace and type of perpetrator (internal or external to the workplace) of the offensive behaviours predicted risk of disability pension in Danish eldercare workers. Methods: We merged survey responses from 8731 female eldercare workers with a national register on social transfer payments (Danish Register for Evaluation of Marginalisation (DREAM)), including all types of disability benefits. Using Cox proportional hazards models, we investigated the prospective association between self-reported exposures at baseline and the risk of receiving disability pension (any type of disability benefit payment) during 11 years of follow-up, while adjusting for potential confounders. Results: Self-reported exposure to threats (hazard ratio (HR) 1.14; 95% confidence interval (CI) 1.00–1.32), violence (HR 1.16; 95% CI 1.00–1.35) and bullying (HR 1.44; 95% CI 1.22–1.71) predicted increased risk of disability pension during follow-up, when adjusted for age and educational attainment. When further adjusted for psychosocial working conditions only bullying remained a statistically significant (HR 1.39; 95% CI 1.16–1.67) predictor of disability pension. The results indicated no elevated risk for participants reporting sexual harassment. Moreover, we observed stronger associations between self-reported exposure to threats, violence and workplace bullying and risk of disability pension when the perpetrator was internal to the workplace (i.e. colleagues, managers and/or subordinates), than when the perpetrator was reported to be external to the workplace (i.e. service users, and/or relatives of service users). Conclusions: Results indicate that prevention of work-related exposure to threats, violence and workplace bullying may contribute to reduce involuntary early retirement in female eldercare workers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Addressing the Significance of the Union List with a Focus on Marine Invasive Alien Species Impacts.
- Author
-
Slišković, Merica, Božić, Katja, Žanić Mikuličić, Jelena, and Kolanović, Ines
- Abstract
In the European Union, regulations and policies have been established to prevent and manage invasive alien species (IAS). The EU Regulation 1143/2014/EC, commonly known as the IAS Regulation, identifies species that pose significant ecological risks, requiring a coordinated response across all EU Member States. These species are classified as "species of Union concern" based on thorough risk assessments and standardized procedures within the EU. Accordingly, species are included in The List of Invasive Alien Species of Union Concern (the Union list), which is subject to regular updates through continuous species evaluations. Currently, the majority of the species on this list are terrestrial and freshwater with few marine species represented. The primary aim of this paper is to review the procedure for the inclusion of species in the Union list. The steps for inclusion are outlined by the IAS Regulation and associated legislation, which govern the risk assessment process. In addition, this paper synthesizes available scientific literature and official documents to summarize the impacts of Plotosus lineatus and Rugulopteryx okamurae on biodiversity and ecosystem services. The potential for future updates to the Union list is currently under consideration, and some marine species are within. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Non‐Native Invasive Fish Species (NIFS) in Inland Waters of India: Management Issues, Strategies and Suggestions.
- Author
-
Singh, Atul K.
- Subjects
- *
BODIES of water , *NATURAL resources , *AQUATIC resources , *BIOLOGICAL invasions , *BIOTIC communities - Abstract
ABSTRACT In India, there are 626 non‐native invasive fish species (NIFS), with 16 becoming invasive in inland waters, adversely impacting native biodiversity, and fisheries by altering the abundance of NIFS in commercial catches. Scientific findings highlight that the movement of NIFS interacts with agricultural activities and the evolving environment, facilitating their spread and establishment. The scenario of NIFS invasion disrupts biological communities, ecosystem services and fisherfolk livelihoods. Despite the implementation of existed guidelines, issues related to NIFS have persisted and escalated over time scale putting increased pressure on indigenous aquatic biological resources in inland waters. This paper suggests the need of framing a new management plans, guidelines and regulatory policies to control NIFS invasions, protecting riverine fish biodiversity and ecosystem services. Proposed management strategies include functional response (FR) and adaptive response (AR)‐based approaches, which are discussed to address NIFS management in inland waters. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Taxonomic diversity, distribution, and ecology of the freshwater fishes of the Zambezian Lowveld Ecoregion in southern Africa: A systematic review.
- Author
-
Ntokoane, Tholoana, Vreven, Emmanuel J. W. M. N., Bragança, Pedro H. N., Kadye, Wilbert T., and Chakona, Albert
- Subjects
- *
SCIENTIFIC literature , *FRESHWATER fishes , *FRESHWATER ecology , *NATURAL history , *NATIVE species , *KNOWLEDGE gap theory - Abstract
The Zambezian Lowveld Ecoregion (ZLE) is one of the 22 freshwater ecoregions covering southern Africa. This ecoregion covers ~520,418 km2 and extends from south of the Zambezi Delta in the north to the uMngeni River basin in the south. This study aimed to compile a comprehensive synthesis of the available information on the diversity and distribution of freshwater fishes in this ecoregion based on natural history collection holdings by reviewing the published scientific literature. In total, 105 native species belonging to 39 genera and 17 families were recorded from the ZLE. An important proportion, 20 (19%), of the species are considered to be narrow‐range endemics. Nevertheless, the majority of them (81%) are considered to have broad geographic ranges, with some even extending into adjacent ecoregions. However, recent and ongoing studies indicate that the current taxonomy often underestimates the species diversity and therefore overestimates the distribution ranges of the latter group of freshwater fishes concerned. The present synthesis brings to the fore existing knowledge gaps in species diversity and distribution ranges of freshwater fishes of this ecoregion and highlights the need for the use of integrative approaches to address the prevailing taxonomic conflicts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. POVERTY ALLEVIATION STRATEGY FROM PUBLIC POLICY PERSPECTIVE WITH PENTAHELIX APPROACH IN WEST SERAM DISTRICT.
- Author
-
Lessy, Mohamad, Rahawarin, M. A., and Zacharias, Tehubijuluw
- Subjects
- *
POVERTY reduction , *GOVERNMENT policy , *SOCIAL services , *DATA analysis , *THREATS - Abstract
This study aims to develop a poverty alleviation strategy model in public policy perspective with pentahelix approach in West Seram Regency. This study was designed in quantitative form and used survey method. The informants of this study consisted of officers involved in poverty alleviation strategy in public policy perspective with pentahelix approach in West Seram Regency as many as 4 academics from social welfare science and public administration science as many as 4 people, poverty observer community as many as 2 people, government (Social Service 1 person and Bappeda 1 person) and information media as many as 2 people. The data analysis used is AHP analysis which is an analysis method used to determine the priority order of a plan. The results of the study concluded that (1) internal factors of poverty alleviation strategies in the perspective of public policy in West Seram Regency consist of strength and weakness variables, (2) external factors of poverty alleviation strategies in the perspective of public policy in West Seram Regency consist of opportunity and threat variables, (3) poverty alleviation strategies in the perspective of public policy in West Seram Regency are aggressive strategies, namely trying to improve internal conditions of weaknesses and external threats by utilizing a number of internal strengths and existing external opportunities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Benefits over threats associated with host-country nationals' acculturation preferences: Examining a stereotype content and threat benefit model.
- Author
-
Valenzuela, Marcus A., Schwartz, Seth J., and Zagefka, Hanna
- Subjects
- *
STEREOTYPE threat , *ACCULTURATION , *STEREOTYPE content model , *IMMIGRANTS , *STEREOTYPES , *ATTITUDE (Psychology) - Abstract
A survey study in the US (N = 647) tested predictors of host-country nationals' acculturation preferences regarding whether participants would want immigrants to adopt the mainstream U.S. identity and/or retain their heritage identity. A model was tested positing that perceived competition with immigrants, and the perceived status of immigrants, would predict positive stereotypes held about immigrants in terms of warmth and competence. Positive stereotypes, in turn, were predicted to relate to the extent to which immigrants were seen as posing a threat and/or bringing benefits to the US. Threats and benefits were then posited as predicting the extent to which host-country nationals would want immigrants to adopt a mainstream U.S. identity and/or retain their heritage identity. Although results partially supported our hypotheses, it seems clearer that perceived benefits, rather than threats (which have previously received more attention), appear to predict host-country nationals' acculturation preferences. The theoretical and applied relevance of these findings is discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Global review of anticoagulant rodenticide exposure in wild mammalian carnivores.
- Author
-
Keating, M. P., Saldo, E. A., Frair, J. L., Cunningham, S. A., Mateo, R., and Jachowski, D. S.
- Subjects
- *
LITERATURE reviews , *RODENT populations , *FOOD chains , *CITY dwellers , *CANIDAE , *RODENTICIDES - Abstract
Anticoagulant rodenticides (ARs) are an effective tool used to suppress rodent populations in urban and agricultural settings to reduce human disease risk and economic loss, but widespread use has resulted in adverse effects on predators globally. Attention has largely been focused on impacts of ARs on raptors, although there is increasing evidence that mammalian carnivores are also impacted. We conducted a literature review to assess the extent to which ARs have been documented in wild mammalian carnivores globally and identify potential overlap with imperiled carnivores. We found a small but growing body of literature documenting exposure to ARs in 8 Carnivora families, with Mustelidae (64% of studies), Canidae (44%) and Felidae (23%) most represented. At least 11 different AR compounds were documented in carnivores, and authors claimed that exposure caused mortality of at least one individual in 33.9% of species studied. ARs were listed as a threat for 2% of Red List carnivores, although we found that 19% of Red List carnivores had ranges that overlap countries that have documented AR exposure in carnivores. Collectively, our review highlights the need to prioritize conservation attention on the potential role of ARs on global carnivore declines. We suggest (1) expanding AR monitoring and research outside of the northern hemisphere, (2) supporting long‐term AR monitoring to understand the spatial and temporal variation of AR use and exposure risk, (3) expanding research across trophic levels and across the urban–wildland gradient and 4) research to further our understanding of the point at which morbidity and mortality occur. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Harassed for Their Job: Exploring Factors That Render Journalists Prone to Harassment and Intimidation.
- Author
-
Hiltunen, Ilmari, Suuronen, Aleksi, and Pöyhtäri, Reeta
- Subjects
- *
INVESTIGATIVE reporting , *PUBLIC broadcasting , *REGRESSION analysis , *HARASSMENT , *JOURNALISTS , *INTIMIDATION - Abstract
Amid growing concern over harassment and intimidation targeting journalists, scholarly attention to their occurrence and implications has mushroomed. One aspect of these phenomena that often gets overlooked is that not all journalists seem equally targeted or affected. Applying ordinal regression analysis of 505 sets of questionnaire responses from Finnish professional journalists, the authors found that only a small proportion of respondents experienced harassment and intimidation regularly, while the vast majority reported being targeted very rarely, if at all. The findings illustrate how certain positions and aspects of journalistic work bring increased risk of facing harassment and intimidation, with investigative journalism, published opinion pieces, work in public broadcasting, and social-media visibility as a journalist identified as strong risk factors. At least in the Finnish context, these facets of the work seem to outweigh personal factors (age, gender, etc.) in predicting overall risk. The evidence supports the call for more comprehensive and carefully designed research arrangements that also acknowledge the role of multiple facets of journalistic work in future studies of harassment and intimidation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. EVOLUTION OF BALTIC SECURITY: ANALYSIS OF THREATS AND STRATEGIC RESPONSES.
- Author
-
Rodríguez Cobos, Ricardo
- Subjects
RUSSIA-Ukraine Conflict, 2014- ,SECURITY systems - Abstract
Copyright of Revista UNISCI is the property of Unidad de Investigaciones Sobre Seguridad y Cooperacion International (UNISCI) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
18. A model proposal for enhancing cyber security in industrial IoT environments.
- Author
-
Buja, Atdhe, Apostolova, Marika, and Luma, Artan
- Subjects
INTERNET security ,CYBERTERRORISM ,INDUSTRIAL revolution ,SECURITY systems ,INTERNET of things - Abstract
The revolution of the industrial sector in the automated one has happened with the use of the Industrial Internet of things (IIoT). They are providing unprecedented possibilities for connection, and automation. Also, the ubiquitous of IIoT has brought new cyber security challenges, putting sensitive data at risk. This research paper proposes a comprehensive model for enhancing the cyber security of IIoT systems. Our model integrates various countermeasures, including a proactive assessment of security vulnerabilities, examination of identified vulnerabilities, categorizing data, delivery of comprehensive reports, and assurance of effective countermeasures based on a cost-benefit approach, aligned with industry standards and frameworks. The proposed model aims to address the need for the development of robust and resilient cyber security solutions for IIoT environments. This research work introduces the proposed model's main functions, integration, workflow, and references. With this research, we contribute to the enhancement of cyber security in the IIoT environment by proposing a model that assists with proactive assessment, effective response, and informed decision-making. We envision that the proposed model will support industrial organizations in securing their IIoT systems against cyber threats, ultimately have stability and secure industrial operations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. The Negative Relationship Between Threats and Endorsement of Freedom.
- Author
-
Li, Zheng and Edwards, John A.
- Subjects
COVID-19 pandemic ,LIBERTY ,CERTAINTY - Abstract
The effect of threats on endorsement of freedom has rarely been studied. Studies on hierarchy and uncertainty have implied that people may forsake freedom to gain certainty and control. The research described in this article aimed to test the idea that threats make people endorse freedom less because they make insecurity more salient, which in turn draws attention to the negative aspects of freedom. Two studies tested the hypothesis that threats will be negatively associated with endorsement of different freedoms. People indicated less endorsement of Positive Freedom (i.e., freedom to behave and autonomy) and Negative Freedom (i.e., freedom from interference and restrictions) after versus before the outbreak of COVID-19 (Study 1). Experimentally manipulated threats decreased endorsement of freedom through the perception that freedom is less positive and important (Study 2). These results suggest that even in a country like the United States, where freedom is greatly valued, threats can lessen people's endorsement of freedom. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Systematic Analysis of threats, Machine Learning solutions and Challenges for Securing IoT environment.
- Author
-
Yadav, Bharti, Rao, Deepak Dasaratha, Mandiga, Yasaswini, Gill, Nasib Singh, Gulia, Preeti, and Pareek, Piyush Kumar
- Subjects
INDUSTRIAL controls manufacturing ,INDUSTRIAL robots ,DEEP learning ,MACHINE learning ,INTERNET of things - Abstract
The Internet of Things (IoT) has revolutionized our daily lives, affecting everything from healthcare to transportation and even home automation and industrial control systems. However, as the number of connected devices continues to rise, so do the security risks. In this review, we explore the different types of attacks that target various layers of IoT infrastructure. To counter these threats, researchers have proposed using machine learning (ML) and deep learning (DL) techniques for detecting different types of attacks. However, our examination of existing literature reveals that the effectiveness of these techniques can vary greatly depending on factors like the dataset used, the features considered, and the evaluation methods employed. Finally, we delve into the current challenges facing Intrusion Detection Systems (IDS) in their mission to protect IoT environments from evolving threats. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Immigrant Security in a Culturally Different Environment. The Polish Experience after the Arab Spring.
- Author
-
Skrabacz, Aleksandra and Bryczek-Wróbel, Patrycja
- Subjects
ARAB Spring Uprisings, 2010-2012 ,SOCIAL attitudes ,IMMIGRANTS - Abstract
Since the decolonisation of Africa - especially after 1960 - more and more people have been arriving from the African continent to Europe for settlement purposes. In 2017, the countries of the European Union there were already 9.1 million African nationals living in the European Union. Of this group, 5 million people came from North Africa (most from Morocco) and the rest from Africa south of the Sahara. Poland is one of the countries in the European Union that has received many migrants from different parts of the world. Figures indicate that 2.1 million foreigners, mostly from Africa and Asia, will live in Poland in 2020. The possibility of frequent contact with immigrants has increased. Meeting a person of African origin in their place of residence is now declared by 39% of respondents, while in 2015 it was only 13%. The attitude of Poles towards immigrants from Africa has also changed in recent years. Poles have become accustomed to the everyday presence of foreigners, as indicated by a clear increase in their level of acceptance in their immediate environment. An African as a close neighbour is now accepted by 84% of Poles (up from 61%) and as their son or daughter-in-law by 58% (up from 34%). There is also a growing concern for keeping immigrants safe, especially when it comes to situations where their life or health may be at risk. However, difficulties arise due to differences in culture, religion, customs and the lack of a common language. The paper will discuss and clarify these problems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Enemy of My Enemy? An Examination of Potential Religious Group Threat Effects on Racial Attitudes.
- Author
-
Yancey, George
- Subjects
RACIAL & ethnic attitudes ,RELIGIOUS groups ,THREATS ,RACE ,CHRISTIANS ,CULTURE conflict ,MUSLIMS ,RACIAL minorities - Abstract
Group threat theories postulate that when majority group members feel threatened by minority racial groups, they develop prejudice. However, it is possible that feeling threatened by those perceived as outgroups of racial minorities can lead to support for racial minorities. The threat offered by conservative Christians to progressives can lead those progressives to become more supportive of racial minorities, perceiving those minorities as allies. Data from the 2021 Baylor Religion Survey examined the predictive power of feeling threatened by Republicans, African Americans, conservative Christians, Muslims, atheists, and Buddhists on progressive racial attitudes. After basic social and demographic controls, feeling threatened by conservative Christians and political conservatives was associated with higher support for progressive racialized attitudes, while feeling threatened by Muslims and blacks was associated with lower support for progressive racial attitudes. This research extends theories about group threat theory by focusing on the symbolic threat tied to our current culture war. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Divergent Importance and Geographic Patterns in Threats to Birds and Mammals in China.
- Author
-
Gao, Xin, Liu, Zhuoen, Corlett, Richard T., Jiang, Zhigang, Hughes, Alice, Ma, Keping, Svenning, Jens‐Christian, and Feng, Gang
- Abstract
ABSTRACT Aim Location Methods Results Main Conclusions Wildlife populations are continuing to decrease worldwide. Understanding the ranking and distribution of drivers of species declines is crucial to enable targeted actions to counteract major threats. However, few studies have assessed the relative importance and geographic distribution of threats to biodiversity in China, even for high‐profile groups such as birds and mammals. Therefore, this study aims to rank and map the distribution of threat to birds and mammals in China, which could provide novel insight into biodiversity conservation in China.China.A database of different threats for 147 threatened bird species and 176 threatened terrestrial mammal species was obtained from China's Red List of Biodiversity published in 2021. We collated information on the distribution and threat categories for birds and mammals in China, aiming to classify, rank and map threats. We used Bray–Curtis dissimilarity index to examine the correlations of threats occurring simultaneously, and compared the distribution of habitat of threatened birds and mammals. In addition, we conducted threat ranking analyses of threatened birds and mammals between different orders and traits (body mass and clutch/litter sizes).The results showed that the most common threats to birds were habitat loss, hunting, human disturbance, agriculture, pollution and logging, while the most common threats to mammals were hunting, agriculture, logging, habitat loss, human disturbance and livestock farming or ranching. These threats showed different geographic patterns, and some threats frequently co‐occur as threat syndromes. Forests were the primary habitat for most threatened species, and orders formed by larger species with small clutch or litter sizes were more likely to be threatened.We highlight the most common threats and key areas for conservation. Furthermore, focusing on clusters of co‐occurring threats may be the most effective way to aid recovery of threatened species, and targeted actions are needed to counter ongoing population declines in many groups. These actions should not be limited to the protection of regions where species are at risk of multiple significant threats, but should also include the maintenance and restoration of native forests and strategic planning of afforestation through planted forests. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. A novel measure indicating that a management strategy reduces the likelihood of human-made threats to Cultural World Heritage Sites.
- Author
-
Falk, Martin Thomas and Hagsten, Eva
- Subjects
- *
WORLD Heritage Sites , *HOUSING management , *CULTURAL property , *DEPERSONALIZATION , *CIVIL war , *SOCIAL unrest - Abstract
AbstractThe aim of this study is to present a novel measure of which pairs of human-made factors are most threatening to a Cultural World Heritage Site when time as well as its characteristics, including location, are controlled for. A system of Probit equations is employed on information from the UNESCO State of Conservation and World Heritage databases on the nine most frequently reported external threats (housing, tourism, transportation, destruction, illegal activities, land conversion, accommodation supply, loss of identity and war and civil unrest). This allows an analysis that covers all sites, with 22,190 observations over a time period of 45 years. Threats from war and civil unrest, destruction of heritage and illegal activities all appear in pairs and are strongly correlated with each other. There are also high positive correlations between threats from housing and land conversion, tourism and housing, accommodation and transportation as well as tourism and accommodation. Until 2009, there is an increase in the probability of threats, after that, stagnation is observed. Cultural World Heritage Sites in Africa and the Arab countries face the highest risk of a reported threat. Based on the novel measure, a second step of the analysis employing fixed-effects Logit estimations reveals that threats from tourism, housing and transportation are more seldom identified if the site in question has a management plan. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Ethnobotanical Study of Medicinal Plants in Tehuledere District, Northwest Ethiopia.
- Author
-
Misganaw, Worku, Yiblet, Yalew, and Aneseyee, Abreham Berta
- Subjects
PLANT diseases ,EUCALYPTUS globulus ,ENDANGERED species ,NUMBERS of species ,TRADITIONAL knowledge ,MEDICINAL plants - Abstract
Medicinal plants have constituted a fundamental aspect of human health and wellness for millennia. The objective of this study was to document medicinal plants used to treat human and livestock ailments in the Tehuledere District. The data were collected using semistructured interviews, focus group discussions, and field observations with local informants. Preference ranking, direct matrix ranking, and informant consensus factor were used for data analysis. A total of 63 medicinal plant species belonging to 59 genera and 41 families were documented. The predominant families identified were Lamiaceae and Asteraceae, each containing 6 and 5 species, respectively. Of the recorded medicinal plants, 53 (80.95%) species were used for human ailments, whereas 12 (19.05%) species were used for animal health issues. Among the recorded medicinal plant species, shrubs constitute the highest number with 35% species. The most frequently used plant parts were leaves, accounting for 59% of remedies targeting human ailments. The administration of herbal treatments was primarily oral, aimed at addressing various diseases. The most significant threat to these medicinal plants was attributed to agricultural expansion, followed by the collection of firewood. The aim of documenting the use of medicinal plants in the treatment of diseases was to capture traditional practices, with species such as Eucalyptus globulus, Olea europaea subsp. cuspidata, and Lepidium sativum serving as the foundational basis for future pharmacological studies. It is imperative to prioritize the conservation of Laggera tomentosa and Urtica simensis to safeguard biodiversity and the cultural traditions associated with these endangered species. Engaging local communities in the management and conservation of plant resources, along with the preservation of their traditional knowledge, presents a cost‐effective and sustainable solution. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Mitigating the extinction risk of globally threatened and endemic mountainous Orthoptera species: Parnassiana parnassica and Oropodisma parnassica.
- Author
-
Stefanidis, Apostolis, Kougioumoutzis, Konstantinos, Zografou, Konstantina, Fotiadis, Georgios, Tzortzakaki, Olga, Willemse, Luc, and Kati, Vassiliki
- Subjects
- *
BIOLOGICAL extinction , *TETTIGONIIDAE , *KATYDIDS , *ENDANGERED species , *MOUNTAIN ecology - Abstract
Orthoptera species are vulnerable to extinction on a global scale. Greece hosts 35% (380 species) of the European Orthoptera fauna with a high degree of endemic (37%) and threatened species (37%). We sampled 46 plots (100 m2) to investigate the distribution and ecological requirement of two Greek mountain endemic and red‐listed species: Parnassiana parnassica (Ramme, 1926; Orthoptera: Tettigoniidae; Critically Endangered [CR]) and Oropodisma parnassica (Scudder, 1897; Orthoptera: Caelifera; Endangered [EN]). Species had a restricted geographical range, with two isolated populations confined to high altitudes (1527–2320 m) of Mts. Parnassos and Elikonas. Species distribution models showed that slope affected their suitable habitat, together with the topographic position index and the annual temperature range (P. parnassica), and the amount of green vegetation and evapotranspiration (O. parnassica). Connectivity analysis showed that P. parnassica‐suitable habitat consisted of few larger and well‐connected patches (26 patches: effective mesh size of 1.57 km2) and that O. parnassica‐suitable habitat consisted of more but smaller and less connected patches (56 patches: effective mesh size of 0.3 km2). Generalised linear models showed that the population density of P. parnassica was negatively influenced by the height of herbaceous vegetation and that of O. parnassica was positively influenced by altitude. The species face three main imminent threats: land take, wildfires and global warming, whereas livestock grazing seems to have a positive impact and skiing a neutral impact on their populations. We assessed both species as EN after International Union for Conservation of Nature (IUCN) criteria and a suite of conservation measures are suggested for their status improvement. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Securing Federated Learning: Approaches, Mechanisms and Opportunities.
- Author
-
Moshawrab, Mohammad, Adda, Mehdi, Bouzouane, Abdenour, Ibrahim, Hussein, and Raad, Ali
- Subjects
FEDERATED learning ,ARTIFICIAL intelligence ,SECURITY systems ,MACHINE learning ,RESEARCH personnel - Abstract
With the ability to analyze data, artificial intelligence technology and its offshoots have made difficult tasks easier. The tools of these technologies are now used in almost every aspect of life. For example, Machine Learning (ML), an offshoot of artificial intelligence, has become the focus of interest for researchers in industry, education, healthcare and other disciplines and has proven to be as efficient as, and in some cases better than, experts in answering various problems. However, the obstacles to ML's progress are still being explored, and Federated Learning (FL) has been presented as a solution to the problems of privacy and confidentiality. In the FL approach, users do not disclose their data throughout the learning process, which improves privacy and security. In this article, we look at the security and privacy concepts of FL and the threats and attacks it faces. We also address the security measures used in FL aggregation procedures. In addition, we examine and discuss the use of homomorphic encryption to protect FL data exchange, as well as other security strategies. Finally, we discuss security and privacy concepts in FL and what additional improvements could be made in this context to increase the efficiency of FL algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Traditionally used medicinal plants for human ailments and their threats in Guraferda District, Benchi-Sheko zone, Southwest Ethiopia.
- Author
-
Awoke, Ashebir, Gudesho, Girma, Akmel, Fetku, and Shanmugasundaram, P.
- Subjects
- *
PHYTOTHERAPY , *HEALTH literacy , *CROSS-sectional method , *STATISTICAL correlation , *FOCUS groups , *T-test (Statistics) , *DATA analysis , *INTERVIEWING , *STATISTICAL sampling , *FIELDWORK (Educational method) , *SEX distribution , *JUDGMENT sampling , *DESCRIPTIVE statistics , *SURVEYS , *RESEARCH methodology , *MEDICINAL plants , *INFERENTIAL statistics , *ANALYSIS of variance , *ONE-way analysis of variance , *STATISTICS , *SOCIODEMOGRAPHIC factors , *MAPS , *LEAVES , *COMPARATIVE studies , *DATA analysis software , *EDUCATIONAL attainment , *REGRESSION analysis - Abstract
Background: The field of traditional medicine encompasses a wide range of knowledge, skills, and practices that are deeply rooted in the theories, beliefs, and experiences of different cultures. The research aimed to identify traditional medicinal plants used in Guraferda District and assess the threats they face. Method: A total of 96 individuals, 80 males and 16 females, were interviewed to gather ethnobotanical data. Statistical tests like independent t tests, ANOVA, correlation, and regression were conducted using R software version 4.3.2 to compare informant groups. Result: The study found 81 medicinal plant species in the district from 71 genera and 38 families, with Asteraceae and Solanaceae families having the most species. Leaves were the most commonly used plant part for medicine. Significant differences in plant knowledge were observed across genders, age groups, education levels, and experiences. The highest ICF value was for Dermal and Cutaneous ailments, and Cissampelos mucronata A. Rich and Bidens pilosa L. had the highest fidelity levels. Conclusion: The study highlighted the importance of traditional medicinal plants in treating ailments but noted threats like overharvesting, habitat destruction, and climate change. Conservation efforts and sustainable harvesting practices are crucial to ensure the availability of these plants for future generations. Further research is needed to explore their potential for modern medicine and develop sustainable use strategies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Multiple borders in one war: Constructing mental maps of Syrian refugees as threats.
- Author
-
Skulte‐Ouaiss, Jennifer and Diab, Jasmin Lilian
- Subjects
- *
GEOGRAPHICAL perception , *SYRIANS , *WAR , *FRAMES (Social sciences) , *REFUGEES , *SYRIAN refugees - Abstract
This study delves into the intricate mechanisms by which states employ a complex network of competing and intersecting borders—both real and imagined—to delineate and perpetuate the image of Syrian refugees as security risks. Drawing upon insights from border studies, securitization theory, and framing analysis, we explore the nuanced processes of mental mapping and bordering within the context of the Syrian crisis. By scrutinizing the construction of these borders and mental maps, we highlight the deliberate state‐driven narrative that portrays Syrians as threats, emphasizing that such perceptions are not inherent but rather intentionally crafted. Our investigation sheds light on the state's agency in framing Syrians as threats, a narrative rarely challenged despite the multifaceted nature of the refugee crisis. Through an expanded discussion on historical, geopolitical, and socio‐cultural dimensions, we aim to provide a comprehensive understanding of the intricate dynamics underlying the portrayal of Syrian refugees as perennial security concerns. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. POPULATION THREAT ASSESSMENT OF INCARVILLEA EMODI (BIGNONIACEAE) FROM THE SHIWALIK HILLS OF JAMMU REGION, INDIA.
- Author
-
Paul, Yash, Farooq, Bilques, Manhas, Rajesh Kumar, and Singh, Sagar
- Subjects
- *
BIGNONIACEAE , *WILD plants , *FIELD research , *PLANT species , *DEMOGRAPHIC change - Abstract
The west-central Himalaya region of India is home to the wild herbaceous plant species Incarvillea emodi (Royle ex Lindl.) Chatterjee (Bignoniaceae). It flourishes in rock crevices and displays stunning rosy-pink flowers and its population is on decline in the Jammu region of Kashmir Himalaya. The field survey conducted to evaluate the population status of Incarvillea emodi in Shivalik Hills of Jammu, resulted in locating five populations with a total of just 189 individuals and the populations were found occupying a 1.630 sq km area. The populations are small, discrete and scattered and the condition meets criterion D of the IUCN Red List guidelines and the species be categorised as vulnerable (VU) in the region and needs conservation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Diatom communities of high-altitude creeks in Bosnia and Herzegovina.
- Author
-
Dedić, Anita, Kapetanović, Tatjana, Hafner, Dubravka, and Barinova, Sophia
- Subjects
- *
SPECIES diversity , *WATER temperature , *DIATOMS , *NAVICULA , *PHYSICAL training & conditioning - Abstract
Diatoms from two high-altitude creeks in Bosnia and Herzegovina were studied from June 2005 to May 2007. Along with diatoms, water temperature, pH, conductivity and nutrients were also monitored, indicating stable physical and chemical conditions, low organic loading and oligotrophy. A total of 130 diatom taxa (species and subspecies) were recorded. Mostly oligotrophic and oligo-mesotrophic indicators were recorded in the creeks. The most abundant genera were Eunotia (15), Pinnularia (13), Gomphonema (10) and Navicula (9). The following taxa were recorded in all samples: Cymbopleura naviculiformis (Auerswald ex Heiberg) Krammer, Decussiphycus hexagonus (Torka) Guiry & Gandhi, Eunotia arcus Ehrenberg, Frustulia vulgaris (Thwaites) De Toni, Pinnularia borealis Ehrenberg and Pinnularia viridis (Nitzsch) Ehrenberg. Five new diatom taxa for Bosnia and Herzegovina were recorded. According to the German Red List, the largest number of taxa (34 for creek 1 and 27 for creek 2) were identified as declining taxa and 12 taxa as endangered ones (three for creek 1 and nine for creek 2). The high species richness and the presence of diatom taxa included on the German Red List underline the importance of protecting and preserving this important biotope. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. How Income and Discrimination Shape the Acceptance of Newcomers in Europe: A Comparative Analysis of Native-Born and Immigrant Populations.
- Author
-
Kushnirovich, Nonna
- Subjects
- *
FORM perception , *RACE , *IMMIGRANTS , *INCOME , *ETHNICITY - Abstract
The purpose of this study was to investigate how income and belonging to a discriminated group are associated with perceptions of threats posed by immigrants, and with the willingness to accept newcomers of a different/same race or ethnicity as most people of the receiving country, or newcomers who came from poor countries outside Europe. The study transcended Borjas's theory of 'competing and complementary' to newcomer groups of native workers, expanding it from the economic and labor spheres to the symbolic cultural and social spheres, and extending this theory to the foreign-born European population. The study used data from the European Social Survey Round 10 Data. Three local population groups in the EU were examined: the native-born population, immigrants from non-EU countries living in the EU, and migrants from EU countries living in other EU countries. The study revealed that for native-born people, the salient factor predicting their perceived threats and willingness to accept newcomers was income, and for non-EU veteran immigrants, the salient factor was the feeling of belonging to a discriminated group. Economically disadvantaged native-born people in the EU were a group competing with newcomers. However, disadvantaged and discriminated non-EU immigrants were complementary to newcomers. The study showed that a disadvantaged group may be either competing or complementary to newcomers, depending on the origin of the group's members rather than on the origin of newcomers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Current species protection does not serve its porpoise—Knowledge gaps on the impact of pressures on the Critically Endangered Baltic Proper harbour porpoise population, and future recommendations for its protection.
- Author
-
Koschinski, Sven, Owen, Kylie, Lehnert, Kristina, and Kamińska, Katarzyna
- Subjects
- *
MARINE mammal populations , *WILDLIFE conservation , *HARBOR porpoise , *UNDERWATER noise , *SUSTAINABLE fisheries - Abstract
Successful management requires information on pressures that threaten a species and areas where conservation actions are needed. The Baltic Proper harbour porpoise population was first listed as Critically Endangered by the International Union for the Conservation of Nature in 2008. Now, 16 years later, there is no change in conservation status despite ample conservation policy calling for its protection and an urgent need for management action to protect this population. Here, we provide an overview of the current status of the population, highlight knowledge gaps on the impact of pressures, and make recommendations for management of anthropogenic activities. Based on an exceeded limit for anthropogenic mortality, the high concentrations of contaminants in the Baltic Sea, combined with reductions in prey availability and increases in underwater noise, it is inferred that this population is likely still decreasing in size and conservation action becomes more urgent. As bycatch and unprotected underwater explosions result in direct mortality, they must be reduced to zero. Inputs of contaminants, waste, and existing and emerging noise sources should be minimised and regulated. Additionally, ecosystem‐based sustainable management of fisheries is paramount in order to ensure prey availability, and maintain a healthy Baltic Sea. Stranding networks to routinely assess individuals for genetic population assignment and health need to be expanded, to identify rare samples from this population. Knowledge is still scarce on the population‐level impact of each threat, along with the cumulative impact of multiple pressures on the population. However, the current knowledge and management instruments are sufficient to apply effective protection for the population now. While bycatch is the main pressure impacting this population, urgent conservation action is needed across all anthropogenic activities. Extinction of the Baltic Proper harbour porpoise population is a choice: decision‐makers have the fate of this genetically and biologically distinct marine mammal population in their hands. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Survey on Video Security: Examining Threats, Challenges, and Future Trends.
- Author
-
Asghar, Ali, Shifa, Amna, and Asghar, Mamoona Naveed
- Subjects
DIGITAL technology ,DIGITAL video ,VIDEO on demand ,RESEARCH questions ,DIGITAL media ,VIDEO surveillance - Abstract
Videos represent the most prevailing form of digital media for communication, information dissemination, and monitoring. However, their widespread use has increased the risks of unauthorised access and manipulation, posing significant challenges. In response, various protection approaches have been developed to secure, authenticate, and ensure the integrity of digital videos. This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality, integrity, and availability of video content, and examining how it can be manipulated. It then investigates current developments in the field of video security by exploring two critical research questions. First, it examine the techniques used by adversaries to compromise video data and evaluate their impact. Understanding these attack methodologies is crucial for developing effective defense mechanisms. Second, it explores the various security approaches that can be employed to protect video data, enhancing its transparency, integrity, and trustworthiness. It compares the effectiveness of these approaches across different use cases, including surveillance, video on demand (VoD), and medical videos related to disease diagnostics. Finally, it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape. Through this investigation, this study aims to contribute to the ongoing efforts in securing video data, providing insights that are vital for researchers, practitioners, and policymakers dedicated to enhancing the safety and reliability of video content in our digital world. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. The Impact of Artificial Intelligence on Cyber Security.
- Author
-
STOICA, Andrei-Alexandru, GHENADE, Adrian, and PICA, Aurel Stefan
- Subjects
ARTIFICIAL intelligence ,CYBER intelligence (Computer security) ,INTERNET security ,DATA protection ,PUBLIC law - Abstract
This article aims to present a broad analysis of the impact that artificial intelligence has on cyber security and the advantages and disadvantages that its implementation can bring regarding national security and data protection. The paper aims to describe the current usages of artificial intelligence in civilian and state applications as well as to identify potential future uses for technology. It will focus on how important its employment can help security overall. We will also analyse current levels of cyber security from a legal, technical and administrative point of view and the focus will be on how important artificial intelligence is towards handling specific tasks regarding security in the European Union, United States of America and the People's Republic of China. Furthermore, we will present advantages and disadvantages concerning artificial intelligence in different key domains such as cyberspace and intelligence surveillance and reconnaissance (ISR), mostly on how these are impacted by unmanned devices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
36. NATIONAL POLICY ON SAFE AND VIOLENCE-FREE SECONDARY SCHOOL IMPLEMENTATION: PARENTS-TEACHERS' ASSOCIATION'S ROLES' AWARENESS AND COMPLIANCE IN KATSINA STATE.
- Author
-
Mojishola, Ekure and O. T., Ikwuakam
- Subjects
SECONDARY schools ,GOVERNMENT policy ,MULTIPLE regression analysis ,AWARENESS ,REGRESSION analysis - Abstract
The study examined the implementation of school safety policy and the role of Parents-Teachers' Associations (PTAs) in secondary schools across Katsina State, Nigeria. A sample of 215 PTA members was selected using multistage sampling techniques from all secondary school PTAs in Katsina State. Descriptive survey design and structured questionnaire were adopted in collecting data on awareness, threats, information sources and compliance across the state's three senatorial districts (SD). Frequency counts, percentages, means, PPMC, Analysis of Variance (ANOVA) and multiple regression analysis were employed in data analysis. Findings indicated that PTA members were generally of prime age with adequate education. Significant disparities in awareness levels were observed among the senatorial districts (SD) with Katsina South (KS) lagging behind. High levels of security threats existed across the districts. Radio and television emerged as crucial awareness sources in Katsina Central (KC) and Northern (KN). Compliance with safety roles varied across districts, with KC and KN showing higher engagement compared to southern district. ANOVA result revealed significant variations in safety roles compliance among districts, with KC demonstrating highest mean compliance. Regression analysis indicated that age negatively impacted compliance, while experience, awareness and information sources positively influenced adherence to safety roles. The study underscores the need for a comprehensive approach to addressing gaps in role compliance. It recommends prioritizing interventions for areas with low compliance rates. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Resilience-Based Assessment of Shallow Water Patchy Reefs in Palk Bay of South East Coast of India.
- Author
-
Sadhukhan, Koushik, Dixit, Sudhanshu, Reddiar, Shunmugaraj Thimmu, Shekar, Rukmini, Chatragadda, Ramesh, and Murthy, M. V. Raman
- Abstract
The health of coral reefs in Palk Bay has been influenced by several natural and anthropogenic stressors over the last four decades. This study assessed the resilience potential of Scleractinian corals and their associated biota in Palk Bay to understand the corals' capacity for resistance and provide a detailed account of positive and negative factors that drive reef health to deliver suggestions for management action. In the present study, the survey on underwater marine fauna was conducted using line intercept transect and quadrat sampling methods at four locations in Palk Bay from February 2022 to February 2023. During the current course of investigation, a total of 26 coral species belonging to 8 families and 14 genera were documented. The overall percentage of live coral cover in Palk Bay was recorded as 30.83 ± 2.40, and massive coral forms were found to be the most dominant in all the study sites. Matrix plot on the distribution of juvenile corals in different study sites revealed a higher density of juvenile corals (> 1 indv/m
2 ) in the Vedhalai and Vadakkad sites along Palk Bay. The overall resilience score (0.62) for the Palk Bay reefs was in the medium range (0.60–0.79), indicating that the reef's ecological integrity is currently compromised by several ongoing threats. Macroalgal proliferation (20.00 ± 2.40) is the most serious threat to all of Palk Bay's reefs, although animal invasion (9.25 ± 1.98), sedimentation (7.40 ± 1.30), coral disease (9.45 ± 0.93), and ghost nets (5.35 ± 0.87) are also exerting a detrimental effect on the reef system. In addition, the present study concludes that despite the presence of active threats in Palk Bay, the evidence of resistant coral species, a moderate percentage of live benthic cover, connectivity to the fish assemblage, and survival of young or juvenile coral species will contribute to the recovery potential of Palk Bay reefs and strengthen reef resilience. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
38. Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology
- Author
-
Souppaya, Murugia
- Subjects
Anti-virus ,Authentication ,Computer security ,COTS ,Email ,Encryption ,Firewall ,Hardening ,IPsec ,Lockdown ,Malware ,Microsoft ,Operating system ,Security checklist ,Security configuration ,Security controls ,Security policy ,Security templates ,Spyware ,Threats ,W - Abstract
Abstract: NIST Special Publication 800-68 has been created to assist IT professionals, in particularly Windows XP system administrators and information security personnel, in effectively securing Windows XP systems. It discusses Windows XP and various application security settings in technical detail. The guide provides insight into the threats and security controls that are relevant for various operational environments, such as for a large enterprise or a home office. It describes the need to document, implement, and test security controls, as well as to monitor and maintain systems on an ongoing basis. It presents an overview of the security components offered by Windows XP and provides guidance on installing, backing up, and patching Windows XP systems. It discusses security policy configuration, provides an overview of the settings in the accompanying NIST security templates, and discusses how to apply additional security settings that are not included in the NIST security templates. It demonstrates securing popular office productivity applications, Web browsers, e-mail clients, personal firewalls, antivirus software, and spyware detection and removal utilities on Windows XP systems to provide protection against viruses, worms, Trojan horses, and other types of malicious code. This list is not intended to be a complete list of applications to install on Windows XP system, nor does it imply NIST's endorsement of particular commercial off-the-shelf (COTS) products.
- Published
- 2005
39. IoT Security in a Connected World: Analyzing Threats, Vulnerabilities, and Mitigation Strategies
- Author
-
Volodymyr Shulha, Maher Rafi Tawffaq, Mohammed Ahmed Jasim, Basim Ghalib Mejbel, Samer Saeed Issa, Loai Alamro, and Erahid Aram
- Subjects
iot security ,threats ,vulnerabilities ,mitigation strategies ,connected devices ,cybersecurity ,statistics ,intrusion detection ,blockchain ,ddos attacks ,machine learning ,Telecommunication ,TK5101-6720 - Abstract
Background: Given the pervasive connectivity and integration of the Internet of Things (IoT) devices into daily life, system security is of utmost significance in the modern era. The article examines escalating concerns regarding the security of the Internet of Things, its inherent vulnerabilities, and the necessary precautions required to safeguard our interconnected global environment. Objective: With forecasts indicating that the IoT ecosystem will comprise over 50 billion interconnected devices by 2030, the alarming 300% increase in IoT intrusions over the past year underscores the urgency of addressing this issue. Methodology: In this article, IoT security challenges are divided into three primary categories which include device vulnerabilities, network vulnerabilities, and data security vulnerabilities. Results: Our findings emphasize the necessity for end users, developers, and manufacturers to follow security best practices and take part in security training. The study discovered that successful DDoS attacks use infected IoT devices 65% of the time and there is still legacy firmware on 70% of those devices making them susceptible. Possible solutions that are currently under investigation include secure elements, machine learning anomaly detection intrusion detection systems, and blockchain-based device authentication. Most prominently, proactive IoT security solutions have reduced 85% of the security vulnerabilities for organizations; it is truly a remarkable achievement. Conclusion: Understanding the security dynamic of the IoT ecosystem is a very demandable job as it keeps on changing, and so does the knowledge about it. To ensure that the IoT remains powerful and transformative in a connected society, this article will take a look further into the increasing risks, vulnerabilities, scary stats as well as effective solutions. It underscores the need for strong measures to protect security and greater awareness.
- Published
- 2024
- Full Text
- View/download PDF
40. Evolution of Baltic Security: Analysis of Threats and Strategic Responses
- Author
-
Ricardo Rodríguez Cobos
- Subjects
baltic ,security ,efp ,threats ,nato ,deterrence ,russia ,International relations ,JZ2-6530 - Abstract
This article explores the evolution of security in the Baltic region, focusing first on Estonia, Latvia and Lithuania, and analysing the key challenges posed by the Russian Federation since the annexation of Crimea in 2014 and the subsequent security measures taken by NATO through the Enhanced Forward Presence (eFP) mission. It details the strategic responses of the Baltic states, highlighting their military modernisation, defence cooperation with NATO and growing reliance on multinational exercises. The article also examines the role of Poland as a key player in NATO's eastern flank defence and the integration of Finland and Sweden into NATO, emphasising their contribution to strengthening the Baltic and Arctic security architecture. The analysis concludes with an examination of the multiple threats that characterise the region's security environment, underlining the importance of coherent multinational defence strategies.
- Published
- 2024
41. GEOPOLITICAL „DANCE' OF THE AGGRESSIVE DICTATORS
- Author
-
Constantin Mincu
- Subjects
usa ,russian federation ,china ,romania ,nato ,european union ,threats ,risks ,Military Science - Abstract
After studying the geopolitical developments of the last ten years, the author considers, with sufficient arguments, that the subject of this article is of public interest for Romania and its citizens, but also for NATO member states and/or for those of the European Union. The developments on the world stage in the last ten years (after the illegal annexation of Crimea by the Russian Federation) determined mainly by the great nuclear powers (USA, Russia, China), and by some emerging powers (Turkey, Iran, Brazil, India and others), have a potential role in seriously endangering world peace, including the security of European member or non-member states of NATO and/or the EU. I believe that in this complicated and fluid context, Romania must be very careful, determined and focused to counteract, together with the Allies, the military and hybrid risks and threats coming from some state actors with obvious aggressive tendencies.
- Published
- 2024
42. The Concept of a Method for Predicting the Cascade Effect Under Conditions of Hybrid Warfare
- Author
-
WRÓBLEWSKI Wojciech and WIŚNIEWSKI Michał
- Subjects
hybrid warfare ,civil protection ,cascade effect ,threats ,h56 ,h76 ,Management. Industrial management ,HD28-70 ,Business ,HF5001-6182 - Abstract
The changing nature of conflicts is creating new challenges in civilian protection. Features of hybrid warfare, such as multidimensionality, synergistic effects, blurring of boundaries, or asymmetricity, force practitioners and scholars to consider new threats. The article examines how the characteristics of hybrid warfare affect the emergence of cascade effects. We conducted research on examples of the war in Ukraine and the Israeli-Palestinian war. The concept of a method for predicting the cascade effect under conditions of hybrid war is proposed. The concept involves using the Six Ways to Die method to take areas affecting the health and life of the civilian population and define a network of object dependencies on which proper functioning of the State in these areas depends. Using complementary tools such as process analysis, risk assessment, Petri nets, and Bayesian network in the form of the Critical Infrastructure Security Situational Management methodology, the authors provide a comprehensive solution for modeling how to protect the life and health of the civilian population. To the author’s knowledge, this is the first holistic study in this issue.
- Published
- 2024
- Full Text
- View/download PDF
43. Traditionally used medicinal plants for human ailments and their threats in Guraferda District, Benchi-Sheko zone, Southwest Ethiopia
- Author
-
Ashebir Awoke, Girma Gudesho, Fetku Akmel, and P. Shanmugasundaram
- Subjects
Guraferda ,Ethnobotany ,Threats ,Human ,Traditional medicinal plants ,Other systems of medicine ,RZ201-999 ,Botany ,QK1-989 - Abstract
Abstract Background The field of traditional medicine encompasses a wide range of knowledge, skills, and practices that are deeply rooted in the theories, beliefs, and experiences of different cultures. The research aimed to identify traditional medicinal plants used in Guraferda District and assess the threats they face. Method A total of 96 individuals, 80 males and 16 females, were interviewed to gather ethnobotanical data. Statistical tests like independent t tests, ANOVA, correlation, and regression were conducted using R software version 4.3.2 to compare informant groups. Result The study found 81 medicinal plant species in the district from 71 genera and 38 families, with Asteraceae and Solanaceae families having the most species. Leaves were the most commonly used plant part for medicine. Significant differences in plant knowledge were observed across genders, age groups, education levels, and experiences. The highest ICF value was for Dermal and Cutaneous ailments, and Cissampelos mucronata A. Rich and Bidens pilosa L. had the highest fidelity levels. Conclusion The study highlighted the importance of traditional medicinal plants in treating ailments but noted threats like overharvesting, habitat destruction, and climate change. Conservation efforts and sustainable harvesting practices are crucial to ensure the availability of these plants for future generations. Further research is needed to explore their potential for modern medicine and develop sustainable use strategies.
- Published
- 2024
- Full Text
- View/download PDF
44. An integrated risk assessment method for cross-regional mega construction projects
- Author
-
Xiang, Pengcheng, Xia, Xin, and Pang, Xianya
- Published
- 2024
- Full Text
- View/download PDF
45. Effects of organisational factors and employee characteristics on employers' reporting of client violence in non‐institutional social services in Sweden.
- Author
-
Brodin, Helene and Shanks, Emelie
- Subjects
- *
SOCIAL services , *GENDER , *VIOLENCE , *VIOLENCE in the workplace , *WOMEN'S employment - Abstract
Social services in the welfare sector consist of women‐dominated jobs generally characterised by arduous working conditions, including exposure to client violence. Although there is a rather extensive research base on client violence in institutional social services, less is known about how client violence is handled in noninstitutional social services. Using longitudinal data obtained from the Swedish Work Environment Agency's register on work injuries caused by workplace violence, we examined the effects of organisational factors and employee characteristics on the reporting of client violence in noninstitutional social services. We found that most of the reports about work injuries caused by client violence are filed by public employers and that most reports concern occupational groups performing direct care services in clients' homes. Moreover, although most reports include female employees and incidents of physical violence, reports concerning male employees are comparatively more likely to include physical violence, and reports concerning female employees are comparatively more likely to include threats. Taken together, our findings point to a much‐needed improvement of health and safety measures for care workers in noninstitutional social services in Sweden. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Unraveling the two unknown storm-petrels of South America: a review about the white-vented storm-petrel (oceanites gracilis) and pincoya storm-petrel (Oceanites pincoyae)
- Author
-
Delfino, Henrique C. and Angarita-Báez, Jenny A.
- Abstract
The diverse marine ecosystems found within South America provide a suitable habitat for a wide array of avian species. Nevertheless, despite the richness of species that these ecosystems support, there are still several among them that continue to elude comprehensive scientific understanding and remain unknown. This comprehensive scientific review delves into the intriguing world of two data-deficient marine bird species inhabiting the Pacific coastal regions of South America: the White-Vented Storm-Petrel Oceanites gracilis (Elliot, 1859) and the Pincoya Storm-Petrel Oceanites pincoyae (Harrison et al. 2013). Through an interdisciplinary approach encompassing morphology, distribution, ecology, and conservation issues, we aim to synthesize the available literature about these two species, shedding light on their potential conservation challenges, while also identifying areas where future research efforts should be directed. Much like seabird populations worldwide, these two species are currently confronted with threats such as habitat degradation, overfishing, human disturbances, and disease outbreaks, all of which have the potential to lead to significant population declines in the near future. Based on the IUCN criteria and considering the regional extent of their distribution and population numbers, we suggest a reclassification of both species and strongly advocate for their inclusion in scientific and conservation initiatives to avert their extinction. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Threats of nursing productivity in the digital era: investigating the interplay between smartphones addiction and procrastination behavior among nurses
- Author
-
Ahmed Abdelwahab Ibrahim El-Sayed, Shimaa Fathy Daif Allah Goda, and Gehan Galal Elbialy
- Subjects
Digital ,Productivity ,Nursing ,Threats ,Smartphone ,Addiction ,RT1-120 - Abstract
Abstract Background Controlling smartphone addiction and procrastination among nurses is crucial for enhancing the productivity of both nursing and the healthcare system. Critical care nurses are highly vulnerable to smartphone addiction and procrastination behaviors than other groups. They may purposefully delay their tasks, a practice known as active procrastination, or inadvertently delay them, a practice known as passive procrastination. Aim This study was designed to assess the prevalence of smartphone addiction and procrastination behavior among nurses, examine the effect of smartphone addiction on the active and passive procrastination behaviors, and explore the correlation between active and passive procrastination behaviors among nurses. Method This is a descriptive correlational exploratory study that was conducted at 23 critical care units of one large educational hospital in Egypt. Data were collected from 360 nurses who were conveniently selected using three tools: the Smartphone Addiction Inventory, the New Active Procrastination Scale, and the Unintentional Procrastination Scale. Correlation and regression analyses were conducted to test the hypothetical relationship among the study variables. Results This study revealed that 55.0%, 80.0%, and 45.3% of nurses had a moderate perceived level of smartphone addiction, active procrastination behavior, and passive procrastination behavior, respectively. There is a significant positive correlation between smartphone addiction and both nurses’ active and passive procrastination behaviors. Smartphone addiction accounts for 25% of the variance in nurses’ active procrastination behavior and 18% of the variance in their passive procrastination. Furthermore, there is a moderately significant negative correlation between nurses’ active procrastination behavior and their passive procrastination behavior. Conclusion Nurses are exhibiting moderate levels of smartphone addiction and procrastination, which is a significant threat to the healthcare industry and nursing productivity. This requires technological, educational, and organizational interventions that foster active procrastination and combat passive procrastination behaviors among nurses. Implications Continuous training programs are required to enhance time management skills among nurses and increase the awareness of nurse managers with the symptoms of smartphone addiction among nurses. Nurse leaders should early detect and address the addictive use of smartphones among nurses, identify potential procrastinators, and provide counseling to eradicate these behaviors in the workplace.
- Published
- 2024
- Full Text
- View/download PDF
48. Diversity pattern of ichthyofaunal assemblage in South-central coastal region of Bangladesh
- Author
-
M. R. Sharker, M. A. Kabir, S. D. Choi, K. R. Hasan, M. M. Rahman, and T. A. Shamuel
- Subjects
South-central coastal region ,ichthyofaunal diversity ,conservation status ,biodiversity index ,threats ,Zoology ,QL1-991 - Abstract
The south-central coastal waters of Bangladesh are recognized as one of the foremost aquatic biodiversity hotspots despite severe anthropogenic and environmental hazards to natural fishery resources. Therefore, this study was undertaken to examine the current status of fish faunal diversity and evaluate the condition and conservation status of fish in the rivers spanning the south-central coastal region of Bangladesh. During the research period, spanning from July 2021 to February 2022, a total of 105 fish faunal species belonging to 84 genera, 50 families, and 14 orders were documented. The order Perciformes (27.62%) was found to be the most diverse fish group, followed by Cypriniformes and Scombriformes (12.38%), Siluriformes and Clupeiformes (11.43%), Synbranchiformes and Pleuronectiformes (3.81%). According to the International Union for Conservation of Nature (IUCN) Red List classification, 52 species recorded from the studied areas were determined to be of Least Concern, while 11 species were Vulnerable, 14 species were classified as Endangered, and 7 species are recognized as Critically Endangered. In order to assess the species diversity, richness, and evenness of the fish assemblage in the sampling areas, four diversity indices, viz. the Shannon-Wiener index (H), Simpson’s dominance index (D), Simpson’s index of diversity (1-D), and Margalef’s index (d), were applied. Their overall values were 3.39–3.59, 0.05–0.07, 0.95–0.94, and 7.67–8.75, respectively. All of the species were more or less evenly distributed throughout the three sites, with Kalapara having the most even distribution. Several anthropogenic and natural attributes that contribute to decline in fish diversity were recorded using a survey questionnaire which revealed that management and conservation measures should be taken with utmost urgency.
- Published
- 2024
- Full Text
- View/download PDF
49. CREATIVITY IN THE SYSTEM OF ENSURING HUMAN SOCIAL SECURITY AT THE ENTERPRISE DURING TIMES OF WAR AND ECONOMIC RECOVERY IN UKRAINE
- Author
-
Zakharii Varnalii, Olena Bazhenova, Oksana Mykytiuk, and Tetiana Onysenko
- Subjects
economic security ,social security ,human social security ,threats ,creativity ,intellectual potential ,war ,economic recovery ,Economics as a science ,HB71-74 - Abstract
The study aims to analyze the current challenges of human social security at the enterprise, which acquire new aspects and relevance in the conditions of war and post-war recovery. In the context of innovation and technological progress, this problem takes on a new meaning, requiring effective tools and systems to support citizens. In recent years, societal crises such as the coronavirus epidemic and Russia’s military aggression have transformed social security, increasingly emphasizing military protection and physical security of citizens. Traditionally, social security of a person determines the level of protection of citizens’ interests, rights, and freedoms, as well as the provision of psychological support. Special attention is paid to the formation of a dedicated system of social security at the enterprise, ensuring the protection of employees and their well-being. Under normal conditions, the social security system at enterprises is a stable working structure that is continually improved through the introduction of new tools and functions. Ensuring the social security of a person at the enterprise amidst geostrategic threats requires analysis and effective efforts to maintain peace and stability. The study analyzes and evaluates the factors influencing the level of social security among enterprise personnel, with a focus on the role of creativity as a new tool for shaping and transforming the human social security system. It is determined that creativity can be realized through the existing intellectual potential of the enterprise. The application of these transformation processes is especially relevant for relocated enterprises which have faced the challenges of wartime most acutely and can adequately assess the social needs of their staff. The outcome of the article is the provision of recommendations on establishing an effective system of social security of a person at the level of economic entities. These recommendations consider the incorporation of creativity and innovative approaches in crafting the social infrastructure of the enterprise to ensure its stable development and well-being.
- Published
- 2024
- Full Text
- View/download PDF
50. Evaluating the effectiveness of protected area management in Indonesia
- Author
-
Rudijanta Tjahja Nugraha, Wenda Yandra Komara, Peggy Awanti Nila Krisna, Oktafa Rini Puspita, Muhamad Muslich, Ulfah Mardhiah, and William Marthy
- Subjects
Biodiversity hotspot ,Indonesia ,Management Effectiveness Tracking Tool ,METT ,national parks ,protected areas ,threats ,tropical forest conservation ,General. Including nature conservation, geographical distribution ,QH1-199.5 - Abstract
Protected areas worldwide are strongholds for safeguarding biodiversity, natural habitats, ecosystem services and cultural values. Yet despite their importance, the effectiveness of protected area management varies greatly. Indonesia is a biodiversity hotspot, with 554 protected areas that cover 27 million ha across the archipelago. To assess and improve the management effectiveness of these protected areas, the Government of Indonesia applied an adapted version of the Management Effectiveness Tracking Tool (METT) to assess 422 of the country's protected areas, of which 170 were repeatedly assessed in 2015, 2017 and 2019. We investigated the METT score changes across these protected areas and the factors explaining the varying scores. Over the study years, METT scores significantly improved (mean increase of 44.1%). National parks had the highest mean score, which was 13.4 points higher than other protected area types. After correcting for spatial autocorrelation using a generalized least-squares model, we found that METT score increase was positively influenced by year of assessment and having a well-resourced management authority, with no influence of protected area size or mean protected area budget allocation per ha. The assessments identified five main threats to protected areas: poaching, illegal logging, human settlements, tourism and non-timber cultivation. The widespread and repeated use of METT across the protected areas of Indonesia and the increasing METT scores indicate an overall improvement in management and professionalism. Building on the foundational work in our study, future studies should assess the association between METT scores and progress made towards achieving the conservation objectives of protected areas.
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.