WorldWideScience

Sample records for hurts strategic attack

  1. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  2. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    Science.gov (United States)

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2017-05-01

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  3. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  4. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  5. Defending majority voting systems against a strategic attacker

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell; Ben Haim, Hanoch

    2013-01-01

    Voting systems used in technical and tactical decision making in pattern recognition and target detection, data handling, signal processing, distributed and secure computing etc. are considered. A maxmin two period game is analyzed where the defender first protects and chooses units for participation in voting. The attacker thereafter attacks a subset of units. It is shown that when the defender protects all the voting units, the optimal number of units chosen for voting is either one or the maximal possible odd number. When the defender protects only the units chosen for voting, the optimal number of chosen units increases with the defender resource superiority (i.e., more resources than the attacker) and with probability of providing correct output by any unit. The system success probability always increases in the total number of voting units, the defender–attacker resource ratio, and the probability that each voting unit produces a correct output. The system success probability increases in the attacker–defender contest intensity if the defender achieves per-unit resource superiority, and otherwise decreases in the contest intensity. The presented model and enumerative algorithm allow obtaining optimal voting system defense strategy for any combination of parameters: total number of units, attack and defense resources, unit success probability and contest intensity.

  6. The Vulnerability of Nuclear Facilities to Cyber Attack; Strategic Insights: Spring 2010

    OpenAIRE

    Kesler, Brent

    2011-01-01

    This article appeared in Strategic Insights, Spring 2011 In June 2010, U.S. Senators Susan Collins, Joseph Lieberman, and Tom Carper introduced the Protecting Cyberspace as a National Asset Act. One of its many aims is to protect critical infrastructures in the United States from cyber attack. In January 2011, Brandon Milhorn, staff director of the Senate Homeland Security and Governmental Affairs Committee, defended the bill, saying that it would prevent a hacker from opening ...

  7. Inemisest / Jakob Hurt

    Index Scriptorium Estoniae

    Hurt, Jakob, 1839-1907

    2005-01-01

    Ilm.: Tarto Kalender 1868, lk. 21-37 ; Tarto Kalender 1869, lk. 21-32 ; Tarto Kalender 1870, lk. 21-34 ; Tarto Kalender 1873, lk. 41-48 ; J. Hurt. Inemisest. Tartu, 1868 ; J. Hurt. Inemisest. Faksiimiletrükk. Tallinn, 1990

  8. Hurt people hurt people : Ostracism and aggression

    NARCIS (Netherlands)

    Ren, D.; Wesselmann, E..D.; Williams, K.D.

    2018-01-01

    Because ostracism hurts, it can trigger aggression. Guided by the theoretical framework of the temporal need-threat model of ostracism, we review the existing research that investigates this ostracism-aggression link over the last two decades. Both correlational and experimental research have

  9. When "Holiday Magic" Hurts.

    Science.gov (United States)

    Goldstein, Karen

    2001-01-01

    Claims that religious messages in public school are not acceptable and are hurtful to kids who do not subscribe to the beliefs expressed in those messages. Describes the author's personal experience in helping a teacher transform the script for "Christmas Magic" into the more inclusive "Holiday Magic." (RS)

  10. Can Loud Music Hurt My Ears?

    Science.gov (United States)

    ... Videos for Educators Search English Español Can Loud Music Hurt My Ears? KidsHealth / For Kids / Can Loud Music Hurt My Ears? Print en español La música ... up? Oh! You want to know if loud music can hurt your ears . Are you asking because ...

  11. Strategic Industry Attack.

    Science.gov (United States)

    1980-01-15

    processing functions; it has mines, smelters, elec- trolytic refining plants, and fabrication plants such as wire -producing plants. Copper also has a...In Cont. In R Monchegorsk 20,000 100 20,000 100 20,000 100 20,000 S Monchegorsk 5,000 100 5,000 95 5,260 15 35,070 S Nikel 15,000 100 15,000 95...times. Full indust!", destruction will also produce problems associated with obtaining copper ar,,i wire for use in generating, transmitting, and

  12. Who will attack the competitors? How political parties resolve strategic and collective action dilemmas in negative campaigning.

    Science.gov (United States)

    Dolezal, Martin; Ennser-Jedenastik, Laurenz; Müller, Wolfgang C

    2017-11-01

    Negative campaigning presents parties with a collective action problem. While parties would prefer to have their competitors attacked, potential backlash effects from negative messages mean that individual politicians typically lack the incentives to carry out such attacks. We theorize that parties solve this problem by implementing a division of labour that takes into account the incentives of individual office holders, their availability for campaign activity, and media relevance. Drawing on these arguments we expect that holders of high public office and party leaders are less likely to issue attacks, leaving the bulk of the 'dirty work' to be carried out by party floor leaders and general secretaries. Examining almost 8000 press releases issued by over 600 individual politicians during four election campaigns in Austria, we find strong support for our theoretical expectations.

  13. Hurtful Emotions: Understanding Self-Harm

    Science.gov (United States)

    ... Issues Subscribe September 2017 Print this issue Hurtful Emotions Understanding Self-Harm En español Send us your ... help you learn new ways to cope with emotion. See the Wise Choices box for tips on ...

  14. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  15. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  16. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  17. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  18. When Your Back Hurts: Don't Let Back Pain Knock You Flat

    Science.gov (United States)

    ... Your Back Hurts Don’t Let Back Pain Knock You Flat En español Send us your comments ... Complementary Health Approaches Halt the Hurt! References The SPORT Value Compass: Do the Extra Costs of Undergoing ...

  19. The Headache Under-Response to Treatment (HURT) Questionnaire

    DEFF Research Database (Denmark)

    Westergaard, Maria Ls; Steiner, Timothy J; Macgregor, E Anne

    2013-01-01

    The HURT Questionnaire consists of eight questions which the patient answers as a measure of effectiveness of intervention against headache. This first assessment of clinical utility was conducted in headache specialist centres in three countries in order to demonstrate that HURT was responsive...... that the best possible outcome had been achieved in each patient. Questionnaires were also answered by 42 patients at initial and final visits to a centre in Italy. Internal consistency reliability was very good (α = 0.85) while test-retest reliability was fair to low (κ = 0.38-0.62 and r(s) = 0...

  20. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  1. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  2. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  3. Hurtful Cyber-Teasing and Violence: Who's Laughing out Loud?

    Science.gov (United States)

    Madlock, Paul E.; Westerman, David

    2011-01-01

    The current study sought to specifically examine the affect of teasing by way of technology (cyber-teasing) and the importance of the redressive component of a tease. A triangulated approach was used here to gain better insight into the concept of "hurtful" cyber-teasing between romantic partners. A pretheoretical model was developed…

  4. Helping and hurting others: Person and situation effects on aggressive and prosocial behavior as assessed by the Tangram task.

    Science.gov (United States)

    Saleem, Muniba; Barlett, Christopher P; Anderson, Craig A; Hawkins, Ian

    2017-04-01

    The Tangram Help/Hurt Task is a laboratory-based measure designed to simultaneously assess helpful and hurtful behavior. Across five studies we provide evidence that further establishes the convergent and discriminant validity of the Tangram Help/Hurt Task. Cross-sectional and meta-analytic evidence finds consistently significant associations between helpful and hurtful scores on the Tangram Task and prosocial and aggressive personality traits. Experimental evidence reveals that situational primes known to induce aggressive and prosocial behavior significantly influence helpful and hurtful scores on the Tangram Help/Hurt Task. Additionally, motivation items in all studies indicate that tangram choices are indeed associated with intent of helping and hurting. We discuss the advantages and limitations of the Tangram Help/Hurt Task relative to established measures of helpful and hurtful behavior. Aggr. Behav. 43:133-146, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  5. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  6. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  7. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  8. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  9. Strategic Adaptation

    DEFF Research Database (Denmark)

    Andersen, Torben Juul

    2015-01-01

    This article provides an overview of theoretical contributions that have influenced the discourse around strategic adaptation including contingency perspectives, strategic fit reasoning, decision structure, information processing, corporate entrepreneurship, and strategy process. The related...... concepts of strategic renewal, dynamic managerial capabilities, dynamic capabilities, and strategic response capabilities are discussed and contextualized against strategic responsiveness. The insights derived from this article are used to outline the contours of a dynamic process of strategic adaptation....... This model incorporates elements of central strategizing, autonomous entrepreneurial behavior, interactive information processing, and open communication systems that enhance the organization's ability to observe exogenous changes and respond effectively to them....

  10. Cyber Pearl Harbor - Strategic Setting [video

    OpenAIRE

    Center for Homeland Defense and Security Naval Postgraduate School

    2017-01-01

    Part 2: Strategic Setting. Strategic surprise attack allows the weaker opponent to achieve objectives that it realistically could not expect to secure if it faced a military superior. Because the weaker party recognizes its military inferiority, it seeks to develop ways to circumvent a stronger opponent’s military might and reduce the likelihood that it will act on its deterrent threats.

  11. Alte Harfe. Vollständige Sammlung alter estnischer Volkslieder : Vorrede / Jakob Hurt

    Index Scriptorium Estoniae

    Hurt, Jakob, 1839-1907

    2005-01-01

    Eessõna rmt. : Hurt, Jakob. Vana kannel. 1. kogu : täieline kogu vanu eesti rahvalaulusid = Alte Harfe : vollständige Sammlung alter estnischen Volkslieder. Tartu, 1875-1886. - (Eesti Kirjameeste Seltsi toimetised ; 3)

  12. Strategic Entrepreneurship

    DEFF Research Database (Denmark)

    Klein, Peter G.; Barney, Jay B.; Foss, Nicolai Juul

    Strategic entrepreneurship is a newly recognized field that draws, not surprisingly, from the fields of strategic management and entrepreneurship. The field emerged officially with the 2001 special issue of the Strategic Management Journal on “strategic entrepreneurship”; the first dedicated...... periodical, the Strategic Entrepreneurship Journal, appeared in 2007. Strategic entrepreneurship is built around two core ideas. (1) Strategy formulation and execution involves attributes that are fundamentally entrepreneurial, such as alertness, creativity, and judgment, and entrepreneurs try to create...... and capture value through resource acquisition and competitive posi-tioning. (2) Opportunity-seeking and advantage-seeking—the former the central subject of the entrepreneurship field, the latter the central subject of the strategic management field—are pro-cesses that should be considered jointly. This entry...

  13. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  14. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  15. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  16. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  17. Urban planning after terrorism:The case of Oslo with focus on the impacts of the terrorist attack on the consideration of security, memorialisation and conservation in urban planning

    OpenAIRE

    Paizs, Franziska

    2013-01-01

    Terrorism is a targeted way to hurt a population but also to destroy and annihilate a part of the civilization by attacking the built environment, especially iconic and symbolic buildings with its values of collective memory and cultural heritage, which is at the latest created by the iconic act of destruction. The resilient city with its integrated plans and programs but also technical, personal or physical security aims to reduce the probability and the dimension of terrorist attacks. Howev...

  18. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  19. Strategizing Communication

    DEFF Research Database (Denmark)

    Gulbrandsen, Ib Tunby; Just, Sine Nørholm

    beyond, but not past instrumental, rational plans in order to become better able to understand and manage the concrete, incremental practices and contexts in which communication becomes strategic. Thus, we argue that although strategic communicators do (and should) make plans, a plan in itself does...... of the specific communicative disciplines and practices employed by the organization and/or its individual members, be they marketing, public relations, corporate communication, branding, public affairs or social advocacy. In all cases, strategic communicators do well to focus more on the process of communicating...... for understanding and managing strategic communication processes....

  20. Experiential self-focus writing as a facilitator of processing an interpersonal hurt.

    Science.gov (United States)

    Liao, Kelly Yu-Hsin; Wei, Meifen; Russell, Daniel W; Abraham, W Todd

    2012-10-01

    This study examined the effects of experiential self-focus writing on changes in psychological outcomes (i.e., unforgiveness and negative affect) after an interpersonal hurt and the buffering effects of experiential self-focus writing on the association between anger rumination and these psychological outcomes. A sample of 182 college students who had experienced interpersonal hurt were randomly assigned to either the experiential self-focus writing condition, in which participants wrote about their feelings and experiences related to the hurt, or to a control writing condition in which they wrote about a recent neutral event. Latent growth curve analyses indicated that changes in unforgiveness over time did not differ between the experiential self-focus writing and the control writing conditions. However, relative to the control writing condition, negative affect decreased faster during writing and increased more slowly at follow-ups in the experiential self-focus writing condition. The results supported the hypothesis that negative affect resulting from an interpersonal hurt would significantly decrease over time among participants in the experiential self-focus writing group compared with the control group. Implications of experiential self-focus writing for interpersonal hurt and directions for future studies are discussed. © 2012 Wiley Periodicals, Inc.

  1. Poe Dameron Hurts So Prettily: How Fandom Negotiates with Transmedia Characterization

    Directory of Open Access Journals (Sweden)

    Chera Kee

    2017-12-01

    Full Text Available Charismatic Poe Dameron is the “best pilot in the Resistance,” and while his depiction in Star Wars: The Force Awakens (TFA presents audiences with a confident, dashing Han Solo-type, that is not the end of the characterization. Transmedia TFA paratexts paint Dameron as not only dashing but also reckless and so devoted to the cause he’s willing to plunge headlong into danger for it. Furthermore, the film and these paratexutal tie-ins present Dameron as constantly in danger or in pain. In some fan works based on the film, particularly those in the hurt/comfort (h/c genre, Poe Dameron just keeps getting hurt. While this might seem to be the kink of one particular fandom community, I argue that hurting Poe in fan works not only fills in missing information from the film, it also challenges Disney's characterization.

  2. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  3. Strategic Implications of the Battle of the Atlantic

    National Research Council Canada - National Science Library

    Kosich, Francis

    2000-01-01

    .... Although Hitler correctly identified Britain's economy as its center of gravity and had success in attacking it through 1943, he failed to demonstrate the strategic vision necessary to achieve...

  4. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  5. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  6. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  7. Strategic serendipity

    DEFF Research Database (Denmark)

    Knudsen, Gry Høngsmark; Lemmergaard, Jeanette

    2014-01-01

    This paper contributes to critical voices on the issue of strategic communication. It does so by exploring how an organisation can seize the moment of serendipity based on careful preparation of its issues management and communication channels. The focus of the study is the media coverage......-of-the-art knowledge and in-depth understanding of the affordances of different communication channels, we discuss the importance of establishing opportunities for serendipity in strategic communication planning. The contribution of the paper is to develop the concept of strategic serendipity and show how...

  8. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  9. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  10. Strategic Supply

    National Research Council Canada - National Science Library

    Alexander, Kelly; Cole, Heather; Cural, Ahmet; Daugherty, Darryl; Howard, Russell; Keane, Thomas; Louie, K. Y; McNeely, Rosa; Mordente, Patrick; Petrillo, Robert

    2006-01-01

    ...; but rather, as an enabler across all industries. Therefore, this industry study looked at Strategic Supply as an integrated process performed by industries to obtain comparative and competitive advantage in the global marketplace...

  11. Strategic Forecasting

    DEFF Research Database (Denmark)

    Duus, Henrik Johannsen

    2016-01-01

    Purpose: The purpose of this article is to present an overview of the area of strategic forecasting and its research directions and to put forward some ideas for improving management decisions. Design/methodology/approach: This article is conceptual but also informed by the author’s long contact...... and collaboration with various business firms. It starts by presenting an overview of the area and argues that the area is as much a way of thinking as a toolbox of theories and methodologies. It then spells out a number of research directions and ideas for management. Findings: Strategic forecasting is seen...... as a rebirth of long range planning, albeit with new methods and theories. Firms should make the building of strategic forecasting capability a priority. Research limitations/implications: The article subdivides strategic forecasting into three research avenues and suggests avenues for further research efforts...

  12. Strategic Responsiveness

    DEFF Research Database (Denmark)

    Pedersen, Carsten; Juul Andersen, Torben

    decision making is often conceived as ‘standing on the two feet’ of deliberate or intended strategic decisions by top management and emergent strategic decisions pursued by lower-level managers and employees. In this view, the paper proposes that bottom-up initiatives have a hard time surfacing...... in hierarchical organizations and that lowerlevel managers and employees, therefore, pursue various strategies to bypass the official strategy processes to act on emerging strategic issues and adapt to changing environmental conditions.......The analysis of major resource committing decisions is central focus in the strategy field, but despite decades of rich conceptual and empirical research we still seem distant from a level of understanding that can guide corporate practices under dynamic and unpredictable conditions. Strategic...

  13. Towards realistic threat modeling : attack commodification, irrelevant vulnerabilities, and unrealistic assumptions

    NARCIS (Netherlands)

    Allodi, L.; Etalle, S.

    2017-01-01

    Current threat models typically consider all possible ways an attacker can penetrate a system and assign probabilities to each path according to some metric (e.g. time-to-compromise). In this paper we discuss how this view hinders the realness of both technical (e.g. attack graphs) and strategic

  14. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  15. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  16. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  17. Strategic Aspirations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger; Morsing, Mette; Thyssen, Ole

    2016-01-01

    are often encouraged by social norms, regulations, and institutions—for example, institutionalized standards for corporate social responsibility (CSR) reporting—they live through local articulations and enactments that allow organizations to discover who they are and who they might become. Strategic......Strategic aspirations are public announcements designed to inspire, motivate, and create expectations about the future. Vision statements or value declarations are examples of such talk, through which organizations announce their ideal selves and declare what they (intend to) do. While aspirations...... aspirations, in other words, have exploratory and inspirational potential—two features that are highly essential in complex areas such as sustainability and CSR. This entry takes a communicative focus on strategic aspirations, highlighting the value of aspirational talk, understood as ideals and intentions...

  18. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  19. Strategic Staffing

    Science.gov (United States)

    Clark, Ann B.

    2012-01-01

    Business and industry leaders do not flinch at the idea of placing top talent in struggling departments and divisions. This is not always the case in public education. The Charlotte-Mecklenburg Schools made a bold statement to its community in its strategic plan by identifying two key reform levers--(1) an effective principal leading each school;…

  20. Strategic Equilibrium

    NARCIS (Netherlands)

    van Damme, E.E.C.

    2000-01-01

    An outcome in a noncooperative game is said to be self-enforcing, or a strategic equilibrium, if, whenever it is recommended to the players, no player has an incentive to deviate from it.This paper gives an overview of the concepts that have been proposed as formalizations of this requirement and of

  1. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  2. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  3. Effects of Prosocial, Neutral, and Violent Video Games on Children's Helpful and Hurtful Behaviors.

    Science.gov (United States)

    Saleem, Muniba; Anderson, Craig A; Gentile, Douglas A

    2012-01-01

    Recent research reveals that playing prosocial video games increases prosocial cognitions, positive affect, and helpful behaviors [Gentile et al., 2009; Greitemeyer and Osswald, 2009, 2010, 2011]. These results are consistent with the social-cognitive models of social behavior such as the general learning model [Buckley and Anderson, 2006]. However, no experimental studies have examined such effects on children. Previous research on violent video games suggests that short-term effects of video games are largely based on priming of existing behavioral scripts. Thus, it is unclear whether younger children will show similar effects. This research had 9-14 years olds play a prosocial, neutral, or violent video game, and assessed helpful and hurtful behaviors simultaneously through a new tangram measure. Prosocial games increased helpful and decreased hurtful behavior, whereas violent games had the opposite effects. © 2012 Wiley Periodicals, Inc.

  4. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  5. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  6. More attention when speaking: does it help or does it hurt?

    OpenAIRE

    Nozari, Nazbanou; Thompson-Schill, Sharon L.

    2013-01-01

    Paying selective attention to a word in a multi-word utterance results in a decreased probability of error on that word (benefit), but an increased probability of error on the other words (cost). We ask whether excitation of the prefrontal cortex helps or hurts this cost. One hypothesis (the resource hypothesis) predicts a decrease in the cost due to the deployment of more attentional resources, while another (the focus hypothesis) predicts even greater costs due to further fine-tuning of sel...

  7. Strategic Supply

    Science.gov (United States)

    2006-01-01

    leaders as Sears, Limited Brands, DHL, Circuit City, Cingular, Nestle and IKEA (Manugistics, 2006). The Strategic Supply Chain Industry Study Group...inventory turns have increased. Other global customers have also reaped the benefits of the Manugistics software. IKEA , Sweden’s retail icon...turned to Manugistics after a mid-1990s ERP implementation failed to fix their forecasting problems, which gave way to fluctuating inventory levels. IKEA

  8. Strategic Stillness

    DEFF Research Database (Denmark)

    Hupalo, Mariia

    2017-01-01

    Throughout the world, we can observe visible complexities, ambiguities and activities of continuously overlapping strategic pursuits of different interest groups. Seen this way, the materialities of parking systems can stage and determine contemporary mobilities in two ways: through decisions taken...... “from above” – design and planning regulations, and “from below” by humans who choose modes of transport, ways of interacting and time of travel. These entanglements of technology and culture are manifested in parking infrastructures....

  9. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  11. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  12. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  13. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  14. Identifying and tracking attacks on networks: C3I displays and related technologies

    Science.gov (United States)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  15. Strategic Windows

    DEFF Research Database (Denmark)

    Risberg, Annette; King, David R.; Meglio, Olimpia

    We examine the importance of speed and timing in acquisitions with a framework that identifies management considerations for three interrelated acquisition phases (selection, deal closure and integration) from an acquiring firm’s perspective. Using a process perspective, we pinpoint items within ...... acquisition phases that relate to speed. In particular, we present the idea of time-bounded strategic windows in acquisitions consistent with the notion of kairòs, where opportunities appear and must be pursued at the right time for success to occur....

  16. Strategic Leadership

    Directory of Open Access Journals (Sweden)

    Mohammad Jaradat

    2017-01-01

    Full Text Available Leadership as a concept has been very useful in the last decades, but when it comes to definingand especially to applying strategic leadership theories into the day-to-day life of organizations,things become much more complicated. It is imperative that managers select their basic theoreticalneed in order to assess one organizations leadership. The following article aims to prove that it isnecessary to choose more than one theoretical instrument before applying them into a specificplan, which combines more than one theoretical approach for evaluating and improving strategicleadership into an organization.

  17. Strategic Management

    CERN Document Server

    Jeffs, Chris

    2008-01-01

    The Sage Course Companion on Strategic Management is an accessible introduction to the subject that avoids lengthy debate in order to focus on the core concepts. It will help the reader to develop their understanding of the key theories, whilst enabling them to bring diverse topics together in line with course requirements. The Sage Course Companion also provides advice on getting the most from your course work; help with analysing case studies and tips on how to prepare for examinations. Designed to compliment existing strategy textbooks, the Companion provides: -Quick and easy access to the

  18. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  19. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  20. Strategic plan

    International Nuclear Information System (INIS)

    1993-01-01

    In November 1989, the Office of Environmental Restoration and Waste Management (EM) was formed within the US Department of Energy (DOE). The EM Program was born of the recognition that a significant national effort was necessary to clean up over 45 years' worth of environmental pollution from DOE operations, including the design and manufacture of nuclear materials and weapons. Within EM, the Deputy Assistant Secretary for Environmental Restoration (EM-40) has been assigned responsibility for the assessment and cleanup of areas and facilities that are no longer a part of active DOE operations, but may be contaminated with varying levels and quantifies of hazardous, radioactive, and n-mixed waste. Decontamination and decommissioning (D ampersand D) activities are managed as an integral part of Envirorunental Restoration cleanup efforts. The Office of Environmental Restoration ensures that risks to the environment and to human health and safety are either eliminated or reduced to prescribed, acceptable levels. This Strategic Plan has been developed to articulate the vision of the Deputy Assistant Secretary for Environmental Restoration and to crystallize the specific objectives of the Environmental Restoration Program. The document summarizes the key planning assumptions that guide or constrain the strategic planning effort, outlines the Environmental Restoration Program's specific objectives, and identifies barriers that could limit the Program's success

  1. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  2. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  3. Strategic Decisions and Implications of the German Assault on Norway in 1940

    National Research Council Canada - National Science Library

    Amundsen, Steinar

    2005-01-01

    .... Dismissing one-dimensional theories on the decisions for and strategic implications of the German attack on Norway, this paper discusses underlying factors in the German decision-making process...

  4. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  5. Strategic Planning: What's so Strategic about It?

    Science.gov (United States)

    Strong, Bart

    2005-01-01

    The words "strategic" and "planning" used together can lead to confusion unless one spent the early years of his career in never-ending, team-oriented, corporate training sessions. Doesn't "strategic" have something to do with extremely accurate bombing or a defensive missile system or Star Wars or something? Don't "strategic" and "planning" both…

  6. Strategic Leadership Primer (Third Edition)

    Science.gov (United States)

    2010-01-01

    decision making � STRATEGIC DECISION MAKING Strategic Change There are several strategic decisions that involved...The Ontology of Strategic Decision Making Strategic decisions are non-routine and involve both the art of leadership and the science of management...building consensus,”5 implicitly requires the capacity for strategic decision making� The Complexity of Strategic Decision Making Strategic

  7. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  8. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  9. Implementation Of Strategic Management

    African Journals Online (AJOL)

    Administrator

    Creativity and innovation is the new game plan inherent in strategic .... The diagram below is a simplified operational model of strategic management, ..... Bryson (1995) outlines four benefits of strategic (planning) Management in his ... champions, good strategic planning teams, enough slack to handle potentially disruptive.

  10. Strategic Polarization.

    Science.gov (United States)

    Kalai, Adam; Kalai, Ehud

    2001-08-01

    In joint decision making, similarly minded people may take opposite positions. Consider the example of a marriage in which one spouse gives generously to charity while the other donates nothing. Such "polarization" may misrepresent what is, in actuality, a small discrepancy in preferences. It may be that the donating spouse would like to see 10% of their combined income go to charity each year, while the apparently frugal spouse would like to see 8% donated. A simple game-theoretic analysis suggests that the spouses will end up donating 10% and 0%, respectively. By generalizing this argument to a larger class of games, we provide strategic justification for polarization in many situations such as debates, shared living accommodations, and disciplining children. In some of these examples, an arbitrarily small disagreement in preferences leads to an arbitrarily large loss in utility for all participants. Such small disagreements may also destabilize what, from game-theoretic point of view, is a very stable equilibrium. Copyright 2001 Academic Press.

  11. Strategic forces: Future requirements and options

    Energy Technology Data Exchange (ETDEWEB)

    Speed, R.D.

    1990-11-01

    In the wake of the collapse of the Warsaw Pact and the apparent ending of the Cold War, there have been renewed calls for radical cuts in US strategic forces to levels far below the 10,000 or so warheads allowed each side under the current START proposal. Since it now appears that NATO for the first time will have the capability to defeat a Soviet conventional attack without the necessity of threatening to resort to nuclear weapons, this should pave the way for the rethinking of US strategy and the reduction of US strategic weapons requirements. In this new environment, it seems plausible that, with a modification of the Flexible Response doctrine to forego attempts to disarm the Soviet Union, deterrence could be maintained with 1500 or so survivable strategic weapons. With a new strategy that confined US strategic weapons to the role of deterring the use of nuclear weapons by other countries, a survivable force of about 500 weapons would seem sufficient. With this premise, the implications for the US strategic force structure are examined for two cases: a treaty that allows each side 3000 warheads and one that allows each side 1000 warheads. In Part 1 of this paper, the weapons requirements for deterrence are examined in light of recent changes in the geopolitical environment. In Part 2, it is assumed that the President and Congress have decided that deep cuts in strategic forces are acceptable. 128 refs., 12 figs., 12 tabs. (JF)

  12. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  13. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  14. Speculative attacks, openness and crises

    Directory of Open Access Journals (Sweden)

    Aloisio Araujo

    2012-06-01

    Full Text Available We extended the Cole and Kehoe model (1996 by adding trade and debt denominated in national currency. We then evaluated some external debt defaults and steep national currency devaluations occurred during last decades. Although default is unlikely, steep devaluation has been repeatedly triggered during financial distresses. It helps to overcome financial crisis as it improves trade balance and reduces national debt level. On the other hand, expected devaluation hurts welfare through both higher national debt cost and reductions in the investment level. We modeled such trade-offs and showed that trade openness, by and large, improves the expected welfare as it allows for a better devaluation-response technology. We ran model simulations based on past 48 crises occurred in 32 middle-income countries, reasonably fitting devaluation and default responses observed as from 1971.

  15. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  16. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  17. Strategic Delusions - The Cold Start Doctrine: Proactive Strategy

    Science.gov (United States)

    2016-05-26

    In a post 9/11 scenario, India finds it convenient to brand these insurgencies as terrorism and associate most of them with Pakistan. Given these...strategic and operational imperatives following the 2008 Mumbai terror attacks denied the Indian government the luxury of attaining her objectives

  18. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  19. When it hurts (and helps to try: the role of effort in language learning.

    Directory of Open Access Journals (Sweden)

    Amy S Finn

    Full Text Available Compared to children, adults are bad at learning language. This is counterintuitive; adults outperform children on most measures of cognition, especially those that involve effort (which continue to mature into early adulthood. The present study asks whether these mature effortful abilities interfere with language learning in adults and further, whether interference occurs equally for aspects of language that adults are good (word-segmentation versus bad (grammar at learning. Learners were exposed to an artificial language comprised of statistically defined words that belong to phonologically defined categories (grammar. Exposure occurred under passive or effortful conditions. Passive learners were told to listen while effortful learners were instructed to try to 1 learn the words, 2 learn the categories, or 3 learn the category-order. Effortful learners showed an advantage for learning words while passive learners showed an advantage for learning the categories. Effort can therefore hurt the learning of categories.

  20. When It Hurts (and Helps) to Try: The Role of Effort in Language Learning

    Science.gov (United States)

    Finn, Amy S.; Lee, Taraz; Kraus, Allison; Hudson Kam, Carla L.

    2014-01-01

    Compared to children, adults are bad at learning language. This is counterintuitive; adults outperform children on most measures of cognition, especially those that involve effort (which continue to mature into early adulthood). The present study asks whether these mature effortful abilities interfere with language learning in adults and further, whether interference occurs equally for aspects of language that adults are good (word-segmentation) versus bad (grammar) at learning. Learners were exposed to an artificial language comprised of statistically defined words that belong to phonologically defined categories (grammar). Exposure occurred under passive or effortful conditions. Passive learners were told to listen while effortful learners were instructed to try to 1) learn the words, 2) learn the categories, or 3) learn the category-order. Effortful learners showed an advantage for learning words while passive learners showed an advantage for learning the categories. Effort can therefore hurt the learning of categories. PMID:25047901

  1. Limited attacks on the United States and the Soviet Union

    International Nuclear Information System (INIS)

    Levi, B.; Hippel, F. von.

    1987-01-01

    This report is focused on calculations carried out at Princeton University of the consequences of so-called ''limited'' nuclear attacks by the USA and the USSR on one another - primarily because such scenarios seem to be motivating the acquisition of new nuclear weapons. The conclusions were: The use of only a fraction of the destructive capacity in USA and Soviet nuclear arsenals could have catastrophic consequences to human kind. Although the primary justification of the tens of thousands of nuclear warheads in USA and Soviet arsenals is their potential use against military targets, the most commonly discussed potential large-scale military uses of these weapons - in attacks against the nuclear weapons of the other side - would result in tens of millions of civilian casualties. Certainly, if a first strike resulted in such a huge civilian toll, there could be little assurance of restraint in the response of the country that was attacked. The use of even 1% of the strategic arsenals of the USSR or the USA against the population, military industry or strategic-nuclear targets of the other nation could result in tens of millions of casualties. 17 refs, 6 figs, 5 tabs

  2. Jesus the Strategic Leader

    National Research Council Canada - National Science Library

    Martin, Gregg

    2000-01-01

    Jesus was a great strategic leader who changed the world in many ways. Close study of what he did and how he did it reveals a pattern of behavior that is extremely useful and relevant to the modern strategic leader...

  3. Adjustment among children with relatives who participated in the manhunt following the Boston Marathon attack.

    Science.gov (United States)

    Comer, Jonathan S; Kerns, Caroline E; Elkins, R Meredith; Edson, Aubrey L; Chou, Tommy; Dantowitz, Annie; Miguel, Elizabeth; Brown, Bonnie; Coxe, Stefany; Green, Jennifer Greif

    2014-07-01

    Following the Boston Marathon attack, the extraordinary interagency manhunt and shelter-in-place made for a truly unprecedented experience for area families. Although research on Boston youth has found robust associations between manhunt-related experiences and post-attack functioning, such work does little to identify the specific needs of a particularly vulnerable population--i.e., children with a relative who participated in the manhunt. Understanding the adjustment of these youth is critical for informing clinical efforts. Survey of Boston-area parents/caretakers (N = 460) reporting on their child's attack/manhunt-related experiences, as well as psychosocial functioning in the first six post-attack months; analyses compared youth with and without a relative in law enforcement or the armed services who participated in the manhunt. The proportion of youth with likely PTSD was 5.7 times higher among youth with relatives in the manhunt than among youth without. After accounting for child demographics, blast exposure, and children's own exposure to manhunt events (e.g., hearing/seeing gunfire/explosions, having officers enter/search home), having a relative in the manhunt significantly predicted child PTSD symptoms, emotional symptoms, and hyperactivity/inattention. Fear during the manhunt that a loved one could be hurt mediated relationships between having a relative in the manhunt and clinical outcomes; living within the zone of greatest manhunt activity did not moderate observed relationships. Children with relatives called upon to participate in the unprecedented interagency manhunt following the Boston Marathon attack carried a particularly heavy mental health burden. Continued research is needed to clarify the clinical needs of youth with relatives in high-risk occupations. © 2014 Wiley Periodicals, Inc.

  4. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  5. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  6. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  7. Strategic growth options

    NARCIS (Netherlands)

    Kulatilaka, N.; Perotti, E.C.

    1998-01-01

    We provide a strategic rationale for growth options under uncertainty and imperfect corn-petition. In a market with strategic competition, investment confers a greater capability to take advantage of future growth opportunities. This strategic advantage leads to the capture of a greater share of the

  8. Strategic marketing research

    NARCIS (Netherlands)

    Bijmolt, Tammo H.A.; Frambach, Ruud T.; Verhallen, Theo M.M.

    1996-01-01

    This article introduces the term “strategic marketing research” for the collection and analysis of data in support of strategic marketing management. In particular, strategic marketing research plays an important role in defining the market, analysis of the environment, and the formulation of

  9. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  10. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  11. Learning to think strategically.

    Science.gov (United States)

    1994-01-01

    Strategic thinking focuses on issues that directly affect the ability of a family planning program to attract and retain clients. This issue of "The Family Planning Manager" outlines the five steps of strategic thinking in family planning administration: 1) define the organization's mission and strategic goals; 2) identify opportunities for improving quality, expanding access, and increasing demand; 3) evaluate each option in terms of its compatibility with the organization's goals; 4) select an option; and 5) transform strategies into action. Also included in this issue is a 20-question test designed to permit readers to assess their "strategic thinking quotient" and a list of sample questions to guide a strategic analysis.

  12. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  13. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  14. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  15. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  16. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  17. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  18. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  19. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  20. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  1. US foreign policy towards West Africa after September 11 attacks

    OpenAIRE

    Akinwande, FO

    2014-01-01

    The United States foreign policy towards West Africa experienced a significant shift after the terrorist attacks of US strategic institutions in September 11, 2001. This was marked by the securitization of US foreign policy beyond the military-security context of security into other aspects of US security strategy after the Cold War. In that context, political, economic and environmental sectors became part of US security agenda, as reflected in the post-9/11 US\\ud War on Terror in global reg...

  2. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history...... of their development, how they are integrated into operational planning through strategies of deliberate targeting for modern operations. The paper will draw experience and case studies from Iraq, Syria, and Afghanistan and will offer some lessons learned as well as insight into the future of these methodologies....... Including their possible application on a national security level for managing longer strategic endeavors....

  3. For Whom Does Hate Crime Hurt More? A Comparison of Consequences of Victimization Across Motives and Crime Types.

    Science.gov (United States)

    Mellgren, Caroline; Andersson, Mika; Ivert, Anna-Karin

    2017-12-01

    Hate crimes have been found to have more severe consequences than other parallel crimes that were not motivated by the offenders' hostility toward someone because of their real or perceived difference. Many countries today have hate crime laws that make it possible to increase the penalties for such crimes. The main critique against hate crime laws is that they punish thoughts. Instead, proponents of hate crime laws argue that sentence enhancement is justified because hate crimes cause greater harm. This study compares consequences of victimization across groups of victims to test for whom hate crimes hurt more. We analyzed data that were collected through questionnaires distributed to almost 3,000 students at Malmö University, Sweden, during 2013. The survey focused on students' exposure to, and experiences of, hate crime. A series of separate logistic regression analyses were performed, which analyzed the likelihood for reporting consequences following a crime depending on crime type, perceived motive, repeat victimization, gender, and age. Analyzed as one victim group, victims of hate crime more often reported any of the consequences following a crime compared with victims of parallel non-hate-motivated crimes. And, overall victims of threat more often reported consequences compared with victims of sexual harassment and minor assault. However, all hate crime victim groups did not report more consequences than the non-hate crime victim group. The results provide grounds for questioning that hate crimes hurt the individual victim more. It seems that hate crimes do not hurt all more but hate crimes hurt some victims of some crimes more in some ways.

  4. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  5. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  6. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  7. Cultivating strategic thinking skills.

    Science.gov (United States)

    Shirey, Maria R

    2012-06-01

    This department highlights change management strategies that may be successful in strategically planning and executing organizational change initiatives. With the goal of presenting practical approaches helpful to nurse leaders advancing organizational change, content includes evidence-based projects, tools, and resources that mobilize and sustain organizational change initiatives. In this article, the author presents an overview of strategic leadership and offers approaches for cultivating strategic thinking skills.

  8. Strategic planning for neuroradiologists.

    Science.gov (United States)

    Berlin, Jonathan W; Lexa, Frank J

    2012-08-01

    Strategic planning is becoming essential to neuroradiology as the health care environment continues to emphasize cost efficiency, teamwork and collaboration. A strategic plan begins with a mission statement and vision of where the neuroradiology division would like to be in the near future. Formalized strategic planning frameworks, such as the strengths, weaknesses, opportunities and threats (SWOT), and the Balanced Scorecard frameworks, can help neuroradiology divisions determine their current position in the marketplace. Communication, delegation, and accountability in neuroradiology is essential in executing an effective strategic plan. Copyright © 2012 Elsevier Inc. All rights reserved.

  9. Strategic Belief Management

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul

    While (managerial) beliefs are central to many aspects of strategic organization, interactive beliefs are almost entirely neglected, save for some game theory treatments. In an increasingly connected and networked economy, firms confront coordination problems that arise because of network effects....... The capability to manage beliefs will increasingly be a strategic one, a key source of wealth creation, and a key research area for strategic organization scholars.......While (managerial) beliefs are central to many aspects of strategic organization, interactive beliefs are almost entirely neglected, save for some game theory treatments. In an increasingly connected and networked economy, firms confront coordination problems that arise because of network effects...

  10. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  11. Motorcycle helmet use and the risk of head, neck, and fatal injury: Revisiting the Hurt Study.

    Science.gov (United States)

    Rice, Thomas M; Troszak, Lara; Ouellet, James V; Erhardt, Taryn; Smith, Gordon S; Tsai, Bor-Wen

    2016-06-01

    Most studies find strong evidence that motorcycle helmets protect against injury, but a small number of controversial studies have reported a positive association between helmet use and neck injury. The most commonly cited paper is that of Goldstein (1986). Goldstein obtained and reanalyzed data from the Hurt Study, a prospective, on-scene investigation of 900 motorcycle collisions in the city of Los Angeles. The Goldstein results have been adopted by the anti-helmet community to justify resistance to compulsory motorcycle helmet use on the grounds that helmets may cause neck injuries due to their mass. In the current study, we replicated Goldstein's models to understand how he obtained his unexpected results, and we then applied modern statistical methods to estimate the association of motorcycle helmet use with head injury, fatal injury, and neck injury among collision-involved motorcyclists. We found Goldstein's analysis to be critically flawed due to improper data imputation, modeling of extremely sparse data, and misinterpretation of model coefficients. Our new analysis showed that motorcycle helmets were associated with markedly lower risk of head injury (RR 0.40, 95% CI 0.31-0.52) and fatal injury (RR 0.44, 95% CI 0.26-0.74) and with moderately lower but statistically significant risk of neck injury (RR 0.63, 95% CI 0.40-0.99), after controlling for multiple potential confounders. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. When math hurts: math anxiety predicts pain network activation in anticipation of doing math.

    Directory of Open Access Journals (Sweden)

    Ian M Lyons

    Full Text Available Math can be difficult, and for those with high levels of mathematics-anxiety (HMAs, math is associated with tension, apprehension, and fear. But what underlies the feelings of dread effected by math anxiety? Are HMAs' feelings about math merely psychological epiphenomena, or is their anxiety grounded in simulation of a concrete, visceral sensation - such as pain - about which they have every right to feel anxious? We show that, when anticipating an upcoming math-task, the higher one's math anxiety, the more one increases activity in regions associated with visceral threat detection, and often the experience of pain itself (bilateral dorso-posterior insula. Interestingly, this relation was not seen during math performance, suggesting that it is not that math itself hurts; rather, the anticipation of math is painful. Our data suggest that pain network activation underlies the intuition that simply anticipating a dreaded event can feel painful. These results may also provide a potential neural mechanism to explain why HMAs tend to avoid math and math-related situations, which in turn can bias HMAs away from taking math classes or even entire math-related career paths.

  13. When Math Hurts: Math Anxiety Predicts Pain Network Activation in Anticipation of Doing Math

    Science.gov (United States)

    Lyons, Ian M.; Beilock, Sian L.

    2012-01-01

    Math can be difficult, and for those with high levels of mathematics-anxiety (HMAs), math is associated with tension, apprehension, and fear. But what underlies the feelings of dread effected by math anxiety? Are HMAs’ feelings about math merely psychological epiphenomena, or is their anxiety grounded in simulation of a concrete, visceral sensation – such as pain – about which they have every right to feel anxious? We show that, when anticipating an upcoming math-task, the higher one’s math anxiety, the more one increases activity in regions associated with visceral threat detection, and often the experience of pain itself (bilateral dorso-posterior insula). Interestingly, this relation was not seen during math performance, suggesting that it is not that math itself hurts; rather, the anticipation of math is painful. Our data suggest that pain network activation underlies the intuition that simply anticipating a dreaded event can feel painful. These results may also provide a potential neural mechanism to explain why HMAs tend to avoid math and math-related situations, which in turn can bias HMAs away from taking math classes or even entire math-related career paths. PMID:23118929

  14. The Hurt of Judgment in Excessive Weight Women: A Hermeneutic Study.

    Science.gov (United States)

    Mehrdad, Neda; Hossein Abbasi, Nahid; Nikbakht Nasrabadi, Alireza

    2015-04-23

    Excess weight is one of the increasing problems of the present society and one of the threatening health conditions around the world. Despite many efforts for prevention and treatment or even surgery, the process of excess weight is not decreased in the world. While most of the studies conducted on excess weight concentrated on the issues why people get excess weight or how the prevention and treatment of excess weight must be performed, there is lake of knowledge about what excessive weight people really experience in their daily life. Understanding the lived experience of excess weight in women is linked with their health and society's health while it indirectly develops the nursing knowledge to improve the quality and access to holistic health care in excessive weight women. The aim of study was to describe with a deeper understanding, the lived experience of excess weight in women. Using a hermeneutic phenomenological approach and a van-manen analysis methods, in depth semi- structured interviews were conducted with twelve women who had lived experience of excess weight. The hurt of Judgment was the main theme that emerged in the process of data analysis. This theme was derived from three sub-themes including social judgment, being different and being seen. These findings can prove helpful in promoting the nursing knowledge concerning a holistic approach in communicating to excessive weight people.

  15. More attention when speaking: does it help or does it hurt?

    Science.gov (United States)

    Nozari, Nazbanou; Thompson-Schill, Sharon L

    2013-11-01

    Paying selective attention to a word in a multi-word utterance results in a decreased probability of error on that word (benefit), but an increased probability of error on the other words (cost). We ask whether excitation of the prefrontal cortex helps or hurts this cost. One hypothesis (the resource hypothesis) predicts a decrease in the cost due to the deployment of more attentional resources, while another (the focus hypothesis) predicts even greater costs due to further fine-tuning of selective attention. Our results are more consistent with the focus hypothesis: prefrontal stimulation caused a reliable increase in the benefit and a marginal increase in the cost of selective attention. To ensure that the effects are due to changes to the prefrontal cortex, we provide two checks: We show that the pattern of results is quite different if, instead, the primary motor cortex is stimulated. We also show that the stimulation-related benefits in the verbal task correlate with the stimulation-related benefits in an N-back task, which is known to tap into a prefrontal function. Our results shed light on how selective attention affects language production, and more generally, on how selective attention affects production of a sequence over time. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. When math hurts: math anxiety predicts pain network activation in anticipation of doing math.

    Science.gov (United States)

    Lyons, Ian M; Beilock, Sian L

    2012-01-01

    Math can be difficult, and for those with high levels of mathematics-anxiety (HMAs), math is associated with tension, apprehension, and fear. But what underlies the feelings of dread effected by math anxiety? Are HMAs' feelings about math merely psychological epiphenomena, or is their anxiety grounded in simulation of a concrete, visceral sensation - such as pain - about which they have every right to feel anxious? We show that, when anticipating an upcoming math-task, the higher one's math anxiety, the more one increases activity in regions associated with visceral threat detection, and often the experience of pain itself (bilateral dorso-posterior insula). Interestingly, this relation was not seen during math performance, suggesting that it is not that math itself hurts; rather, the anticipation of math is painful. Our data suggest that pain network activation underlies the intuition that simply anticipating a dreaded event can feel painful. These results may also provide a potential neural mechanism to explain why HMAs tend to avoid math and math-related situations, which in turn can bias HMAs away from taking math classes or even entire math-related career paths.

  17. Does media multitasking always hurt? A positive correlation between multitasking and multisensory integration.

    Science.gov (United States)

    Lui, Kelvin F H; Wong, Alan C-N

    2012-08-01

    Heavy media multitaskers have been found to perform poorly in certain cognitive tasks involving task switching, selective attention, and working memory. An account for this is that with a breadth-biased style of cognitive control, multitaskers tend to pay attention to various information available in the environment, without sufficient focus on the information most relevant to the task at hand. This cognitive style, however, may not cause a general deficit in all kinds of tasks. We tested the hypothesis that heavy media multitaskers would perform better in a multisensory integration task than would others, due to their extensive experience in integrating information from different modalities. Sixty-three participants filled out a questionnaire about their media usage and completed a visual search task with and without synchronous tones (pip-and-pop paradigm). It was found that a higher degree of media multitasking was correlated with better multisensory integration. The fact that heavy media multitaskers are not deficient in all kinds of cognitive tasks suggests that media multitasking does not always hurt.

  18. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  19. How Strategic are Strategic Information Systems?

    Directory of Open Access Journals (Sweden)

    Alan Eardley

    1996-11-01

    Full Text Available There are many examples of information systems which are claimed to have created and sustained competitive advantage, allowed beneficial collaboration or simply ensured the continued survival of the organisations which used them These systems are often referred to as being 'strategic'. This paper argues that many of the examples of strategic information systems as reported in the literature are not sufficiently critical in determining whether the systems meet the generally accepted definition of the term 'strategic' - that of achieving sustainable competitive advantage. Eight of the information systems considered to be strategic are examined here from the standpoint of one widely-accepted 'competition' framework- Porter's model of industry competition . The framework is then used to question the linkage between the information systems and the mechanisms which are required for the enactment of strategic business objectives based on competition. Conclusions indicate that the systems are compatible with Porter's framework. Finally, some limitations of the framework are discussed and aspects of the systems which extend beyond the framework are highlighted

  20. Swords of armageddon: A decision of the strategic mystique

    Energy Technology Data Exchange (ETDEWEB)

    Myers, G.E.

    1987-01-01

    To most Americans, our military and civilian political leaders included, the concept of strategic bombardment brings to mind a myopic vision of nuclear horror; and the long-range delivery systems most commonly associated with strategic warfare--the bombers and intercontinental ballistic missiles--are not supported either by a review of the history of modern warfare or by current statements of air power doctrine, but they persist as a legacy of the destructiveness of the World War II strategic air campaigns and the enduring Soviet-American nuclear confrontation. This paper attempts to dispell these notions and advance a concept of flexibility in strategic force application and US strategic policy formulation. It suggests that individual strategic actions have relevance in large and small, nuclear or nonnuclear wars and that our bombers and even our intercontinental missiles can and should be considered as viable force options in a variety of scenarios. The discussion concludes that strategic attack has historically been and will continue to be an active military mission that can be accomplished in numerous ways by a wide variety of weapons and delivery systems despite a continuing mystique of nuclear holocaust.

  1. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  2. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  3. Lo Strategic Management Accounting

    OpenAIRE

    G. INVERNIZZI

    2005-01-01

    Il saggio indaga gli aggregati informativi e gli elementi che compongono lo strategic management accounting. Sono quindi analizzate le funzioni svolte nei diversi stadi del processo di gestione strategica osservando il suo ruolo all’interno del management accounting. Infine sono approfonditi i rapporti fra i livelli della gestione strategica e lo strategic management accounting.

  4. Crowdnursing - Strategizing Shitstorms

    DEFF Research Database (Denmark)

    Christensen, Lars Holmgaard

    2018-01-01

    This paper will introduce a framework for distinguishing between shitstorm types and social media crises. In need of strategies for handling social media crowds the paper suggests a strategic approach that focus on the cultivation of social media crowds and offers a valuable conceptual...... understanding of crowdnursing as a strategic tool....

  5. Strategic Risk Assessment

    Science.gov (United States)

    Derleth, Jason; Lobia, Marcus

    2009-01-01

    This slide presentation provides an overview of the attempt to develop and demonstrate a methodology for the comparative assessment of risks across the entire portfolio of NASA projects and assets. It includes information about strategic risk identification, normalizing strategic risks, calculation of relative risk score, and implementation options.

  6. 11. Strategic planning.

    Science.gov (United States)

    2014-05-01

    There are several types of planning processes and plans, including strategic, operational, tactical, and contingency. For this document, operational planning includes tactical planning. This chapter examines the strategic planning process and includes an introduction into disaster response plans. "A strategic plan is an outline of steps designed with the goals of the entire organisation as a whole in mind, rather than with the goals of specific divisions or departments". Strategic planning includes all measures taken to provide a broad picture of what must be achieved and in which order, including how to organise a system capable of achieving the overall goals. Strategic planning often is done pre-event, based on previous experience and expertise. The strategic planning for disasters converts needs into a strategic plan of action. Strategic plans detail the goals that must be achieved. The process of converting needs into plans has been deconstructed into its components and includes consideration of: (1) disaster response plans; (2) interventions underway or planned; (3) available resources; (4) current status vs. pre-event status; (5) history and experience of the planners; and (6) access to the affected population. These factors are tempered by the local: (a) geography; (b) climate; (c) culture; (d) safety; and (e) practicality. The planning process consumes resources (costs). All plans must be adapted to the actual conditions--things never happen exactly as planned.

  7. Manage "Human Capital" Strategically

    Science.gov (United States)

    Odden, Allan

    2011-01-01

    To strategically manage human capital in education means restructuring the entire human resource system so that schools not only recruit and retain smart and capable individuals, but also manage them in ways that support the strategic directions of the organization. These management practices must be aligned with a district's education improvement…

  8. Strategic Talk in Film.

    Science.gov (United States)

    Payr, Sabine; Skowron, Marcin; Dobrosovestnova, Anna; Trapp, Martin; Trappl, Robert

    2017-01-01

    Conversational robots and agents are being designed for educational and/or persuasive tasks, e.g., health or fitness coaching. To pursue such tasks over a long time, they will need a complex model of the strategic goal, a variety of strategies to implement it in interaction, and the capability of strategic talk. Strategic talk is incipient ongoing conversation in which at least one participant has the objective of changing the other participant's attitudes or goals. The paper is based on the observation that strategic talk can stretch over considerable periods of time and a number of conversational segments. Film dialogues are taken as a source to develop a model of the strategic talk of mentor characters. A corpus of film mentor utterances is annotated on the basis of the model, and the data are interpreted to arrive at insights into mentor behavior, especially into the realization and sequencing of strategies.

  9. Strategic planning in transition

    DEFF Research Database (Denmark)

    Olesen, Kristian; Richardson, Tim

    2012-01-01

    In this paper, we analyse how contested transitions in planning rationalities and spatial logics have shaped the processes and outputs of recent episodes of Danish ‘strategic spatial planning’. The practice of ‘strategic spatial planning’ in Denmark has undergone a concerted reorientation...... style of ‘strategic spatial planning’ with its associated spatial logics is continuously challenged by a persistent regulatory, top-down rationality of ‘strategic spatial planning’, rooted in spatial Keynesianism, which has long characterised the Danish approach. The findings reveal the emergence...... of a particularly Danish approach, retaining strong regulatory aspects. However this approach does not sit easily within the current neoliberal political climate, raising concerns of an emerging crisis of ‘strategic spatial planning’....

  10. On strategic spatial planning

    Directory of Open Access Journals (Sweden)

    Tošić Branka

    2014-01-01

    Full Text Available The goal of this paper is to explain the origin and development of strategic spatial planning, to show complex features and highlight the differences and/or advantages over traditional, physical spatial planning. Strategic spatial planning is seen as one of approaches in legally defined planning documents, and throughout the display of properties of sectoral national strategies, as well as issues of strategic planning at the local level in Serbia. The strategic approach is clearly recognized at the national and sub-national level of spatial planning in European countries and in our country. It has been confirmed by the goals outlined in documents of the European Union and Serbia that promote the grounds of territorial cohesion and strategic integrated planning, emphasizing cooperation and the principles of sustainable spatial development. [Projekat Ministarstva nauke Republike Srbije, br. 176017

  11. FY17 Strategic Themes.

    Energy Technology Data Exchange (ETDEWEB)

    Leland, Robert W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    I am pleased to present this summary of the FY17 Division 1000 Science and Technology Strategic Plan. As this plan represents a continuation of the work we started last year, the four strategic themes (Mission Engagement, Bold Outcomes, Collaborative Environment, and Safety Imperative) remain the same, along with many of the goals. You will see most of the changes in the actions listed for each goal: We completed some actions, modified others, and added a few new ones. As I’ve stated previously, this is not a strategy to be pursued in tension with the Laboratory strategic plan. The Division 1000 strategic plan is intended to chart our course as we strive to contribute our very best in service of the greater Laboratory strategy. I welcome your feedback and look forward to our dialogue about these strategic themes. Please join me as we move forward to implement the plan in the coming months.

  12. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    Directory of Open Access Journals (Sweden)

    Ashraf Al Sharah

    2016-01-01

    Full Text Available Security in mobile ad hoc networks (MANETs is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

  13. Theorizing Strategic Communication in Parsimony from the U.S. Government Perspective

    Directory of Open Access Journals (Sweden)

    Young Joon Lim

    2015-06-01

    Full Text Available Although the term Strategic Communication seems to be a rising topic in communication studies, it is obvious that the term has been hardly visualized and explained from the U.S. government perspective in academic work. This paper theoretically visualizes strategic communication processes. The Department of State and the Department of Defense streamlined the use of strategic communication in different terms but they both focus on using soft power over hard power to gain support from foreign audiences through communication. Both departments especially after the 9/11attacks have developed programs to win hearts and minds of the target audience. This paper shows the salient process of strategic communication programs and conceptualizes principles of strategic communication from their perspectives. This paper after all illustrates the processes for theorizing strategic communication.

  14. Shady strategic behavior : Recognizing strategic behavior of Dark Triad followers

    NARCIS (Netherlands)

    Schyns, Birgit; Wisse, Barbara; Sanders, Stacey

    2018-01-01

    The importance of strategic behavior in organizations has long been recognized. However, so far the literature has primarily focused on leaders’ strategic behavior, largely ignoring followers’ strategic behavior. In the present paper, we take a follower trait perspective to strategic follower

  15. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  16. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  17. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  18. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  19. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  20. Is strategic stockpiling essential?

    International Nuclear Information System (INIS)

    Anon.

    2007-01-01

    As mentioned by the European Commission, a consultant has surveyed stakeholders on the concept of setting up strategic stockpiles of natural gas, namely to boost the security of Europe's supply, much like the strategic stockpiling for petroleum products the OECD member countries carried out after the petroleum crisis. If strategic stockpiling consists in blocking off a quantity of gas in addition to the usable stockpile, the AFG believes it is necessary to assess the implications of such a measure and to examine the security gain it would actually offer compared to the measures that have already been implemented to secure supplies. (author)

  1. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  2. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  3. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  4. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  5. Strategic agility for nursing leadership.

    Science.gov (United States)

    Shirey, Maria R

    2015-06-01

    This department highlights change management strategies that may be successful in strategically planning and executing organizational change. In this article, the author discusses strategic agility as an important leadership competency and offers approaches for incorporating strategic agility in healthcare systems. A strategic agility checklist and infrastructure-building approach are presented.

  6. Strategic Issues for Training.

    Science.gov (United States)

    Pollitt, David, Ed.

    1999-01-01

    Contains precis of 18 articles on strategic management issues, including management development, on-the-job training, corporate scholarship, educational technology, coaching, investing in intellectual capital, and knowledge management. (SK)

  7. Full closure strategic analysis.

    Science.gov (United States)

    2014-07-01

    The full closure strategic analysis was conducted to create a decision process whereby full roadway : closures for construction and maintenance activities can be evaluated and approved or denied by CDOT : Traffic personnel. The study reviewed current...

  8. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  9. Strategic Communication Institutionalized

    DEFF Research Database (Denmark)

    Kjeldsen, Anna Karina

    2013-01-01

    of institutionalization when strategic communication is not yet visible as organizational practice, and how can such detections provide explanation for the later outcome of the process? (2) How can studies of strategic communication benefit from an institutional perspective? How can the virus metaphor generate a deeper...... understanding of the mechanisms that interact from the time an organization is exposed to a new organizational idea such as strategic communication until it surfaces in the form of symptoms such as mission and vision statements, communication manuals and communication positions? The first part of the article...... focuses on a discussion of the virus metaphor as an alternative to the widespread fashion metaphor for processes of institutionalization. The second part of the article provides empirical examples of the virus metaphor employed, examples that are drawn from a study of the institutionalization of strategic...

  10. Strategic ecosystems of Colombia

    International Nuclear Information System (INIS)

    Marquez Calle German

    2002-01-01

    The author relates the ecosystems in Colombia, he makes a relationship between ecosystems and population, utility of the ecosystems, transformation of the ecosystems and poverty and he shows a methodology of identification of strategic ecosystems

  11. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  12. Value oriented strategic marketing

    Directory of Open Access Journals (Sweden)

    Milisavljević Momčilo

    2013-01-01

    Full Text Available Changes in today's business environment require companies to orient to strategic marketing. The company accepting strategic marketing has a proactive approach and focus on continuous review and reappraisal of existing and seeking new strategic business areas. Difficulties in achieving target profit and growth require turning marketing from the dominant viewpoint of the tangible product to creating superior value and developing relationships with customers. Value orientation implies gaining competitive advantage through continuous research and understanding of what value represents to the consumers and discovering new ways to meet their required values. Strategic marketing investment requires that the investment in the creation of values should be regularly reviewed in order to ensure a focus on customers with high profit potential and environmental value. This increases customer satisfaction and retention and long-term return on investment of companies.

  13. Leading Strategic Leader Teams

    National Research Council Canada - National Science Library

    Burleson, Willard M

    2008-01-01

    .... Although only 1 to 2 percent of the Army's senior leaders will attain a command position of strategic leadership, they are assisted by others, not only by teams specifically designed and structured...

  14. Installation Strategic Planning Guidebook

    Science.gov (United States)

    2012-05-01

    Installation natural resource concerns (for example, wetlands , number of endangered species, water use restrictions, encroachment on training lands...Koehler Publishing, 1994 7. Strategy Safari – A Guided Tour Through the Wilds of Strategic Management by Henry Mintzberg, Bruce Ahlstrand, and...T. (1987). NY: Knopf 36. Shaping Strategic Planning: Frogs, Dragons, Bees and Turkey Tails. Pfeiffer, J. W., Goodstein, L. D. & Nolan, T. M. (1989

  15. A National Strategic Narrative

    Science.gov (United States)

    2011-01-01

    strategic ecosystem . In other words, the U.S. should stop trying to dominate and direct global events. The best we can do is to build our capital so...prosperity and security – within a “strategic ecosystem ,” at home and abroad; that in complexity and uncertainty, there are opportunities and hope, as well...law; sovereignty without tyranny, with assured freedom of expression; and an environment for entrepreneurial freedom and global prosperity, with access

  16. Alibaba's strategic drift

    OpenAIRE

    Kim, Young-Chan; Chen, Pi-Chi

    2016-01-01

    It is fundamental in both a theoretical and practical sense, to analyse the strategies of successful e-businesses who were formulated and operated alongside incumbent competitors. Thus, there have been an array of strategic arguments concerning the rapidly-burgeoning virtual powerhouse Alibaba, who amidst a sea of fortified competitors, found their ground to become one of the most prominent e-businesses of the decade. At the commencing stages, Alibaba lacked a specific strategic goal, aside f...

  17. Processes of Strategic Renewal,

    OpenAIRE

    Harald Aadne, John; Mahnke, Volker

    2010-01-01

    We discuss strategic renewal from a competence perspective. We argue that the management of speed and timing in this process is viewed distinctively when perceived through a cognitive lens. Managers need more firmly grounded process-understanding. The key idea of this paper is to dynamically conceptualize key activities of strategic renewal, and possible sources of break-down as they relate to the managment of speed and timing. Based on a case from the media industry, we identi...

  18. 2015 Enterprise Strategic Vision

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-08-01

    This document aligns with the Department of Energy Strategic Plan for 2014-2018 and provides a framework for integrating our missions and direction for pursuing DOE’s strategic goals. The vision is a guide to advancing world-class science and engineering, supporting our people, modernizing our infrastructure, and developing a management culture that operates a safe and secure enterprise in an efficient manner.

  19. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  20. Strategic market segmentation

    Directory of Open Access Journals (Sweden)

    Maričić Branko R.

    2015-01-01

    Full Text Available Strategic planning of marketing activities is the basis of business success in modern business environment. Customers are not homogenous in their preferences and expectations. Formulating an adequate marketing strategy, focused on realization of company's strategic objectives, requires segmented approach to the market that appreciates differences in expectations and preferences of customers. One of significant activities in strategic planning of marketing activities is market segmentation. Strategic planning imposes a need to plan marketing activities according to strategically important segments on the long term basis. At the same time, there is a need to revise and adapt marketing activities on the short term basis. There are number of criteria based on which market segmentation is performed. The paper will consider effectiveness and efficiency of different market segmentation criteria based on empirical research of customer expectations and preferences. The analysis will include traditional criteria and criteria based on behavioral model. The research implications will be analyzed from the perspective of selection of the most adequate market segmentation criteria in strategic planning of marketing activities.

  1. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  2. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  3. Factors in the doctor-patient relationship that accentuate physicians' hurt feelings when patients terminate the relationship with them.

    Science.gov (United States)

    Hareli, Shlomo; Karnieli-Miller, Orit; Hermoni, Doron; Eidelman, Shmuel

    2007-07-01

    The present study explores the emotional effect of the injury experienced by physician's, as a consequence of a patient's termination of their relationship. A vignette study using different scenarios describing a patient who switched to another doctor was distributed to 119 family physicians. A three-way ANCOVA analysis was employed. Additionally, physicians' answered an open question asking of situations that elicited negative emotions. The quantitative results indicated that termination of the relationship by a "high status" patient and/or after a long duration is more emotionally hurtful than termination by a "lower status" patient after a brief relationship. The results of the open question provided an additional insight into the emotional impact of the doctor's hurt feelings on the doctor-patient relationship. The severity and consequences of the emotional injury experienced by physicians when patients decide to transfer to another physician are influenced by factors related to the patient, physician and the relationship between them. We discuss the implications of our results on the understanding of the emotional injury and consequent impaired function and possible "burn-out" in physicians and explore the possibility of educating doctors to heightened awareness and consequently enhanced ability to cope with such situations.

  4. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  5. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  6. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  7. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  8. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  9. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  10. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  11. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  12. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  13. Cyber Attacks: Emerging Threats to the 21st Century Critical Information Infrastructures

    Directory of Open Access Journals (Sweden)

    Cezar Vasilescu

    2012-06-01

    Full Text Available The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It starts by elaborating a conceptual theoretical framework, observing that when it comes to cyber attacks, cyber war and cyber defense there are no internationally accepted definitions on the subject, mostly because of the relative recency of the terms. The second part analyzes the cyber realities of recent years, emphasizing the most advertised cyber attacks in the international mass media: Estonia (2007 and Georgia (2008, with a focus on two main lessons learned: how complicated is to define a cyber war and how difficult to defend against it. Crucial implications for world’s countries and the role of NATO in assuring an effective collective cyber defense are analyzed in the third part. The need for the development of strategic cyber defense documents (e.g. NATO Cyber Defense Policy, NATO Strategic Concept is further examined. It is suggested that particular attention should be paid to the development of a procedure for clearly discriminating between events (cyber attacks, cyber war, cyber crime, or cyber terrorism, and to a procedure for the conduct of nation’s legitimate military/civil cyber response operations.

  14. Strong Artificial Intelligence and National Security: Operational and Strategic Implications

    Science.gov (United States)

    2015-05-18

    Directed by Steven Spielberg , Performed by Haley Joel Osment, Jude Law, William Hurt, Frances O’Connor and Sam Robards. 16 well-structured, and ill...Artificial Intelligence. Directed by Steven Spielberg . Performed by Haley Joel Osment, Jude Law, William Hurt, Frances O’Connor and Sam Robards

  15. Strategic management for university hospitals

    Directory of Open Access Journals (Sweden)

    Martha Isabel Riaño-Casallas

    2016-10-01

    Full Text Available Introduction: There are several approaches and schools that support strategic management processes. University hospitals require the implementation of a strategic approach to their management, since they are a particular type of organization with the triple mission of providing health care, education and research. Objective: To propose a strategic profile for a university hospital. Materials and methods: The theoretical framework of strategic management was analyzed and some particular components of hospital management were studied; based on these criteria, the strategic management process in three high complexity hospitals of Bogotá, D.C. was examined and a profile of both the objectives and the functional strategies for the hospital was proposed. Results: The main strategic thinking schools are presented; the processes and components of strategic management are described, and a strategic management profile for a university hospital is proposed. Conclusion: The strategic orientation of management for an institution with the characteristics of a university hospital facilitates achieving organizational objectives.

  16. FY16 Strategic Themes.

    Energy Technology Data Exchange (ETDEWEB)

    Leland, Robert W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    I am pleased to present this summary of the Division 1000 Science and Technology Strategic Plan. This plan was created with considerable participation from all levels of management in Division 1000, and is intended to chart our course as we strive to contribute our very best in service of the greater Laboratory strategy. The plan is characterized by four strategic themes: Mission Engagement, Bold Outcomes, Collaborative Environment, and the Safety Imperative. Each theme is accompanied by a brief vision statement, several goals, and planned actions to support those goals throughout FY16. I want to be clear that this is not a strategy to be pursued in tension with the Laboratory strategic plan. Rather, it is intended to describe “how” we intend to show up for the “what” described in Sandia’s Strategic Plan. I welcome your feedback and look forward to our dialogue about these strategic themes. Please join me as we move forward to implement the plan in the coming year.

  17. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  18. Strategizing in multiple ways

    DEFF Research Database (Denmark)

    Larsen, Mette Vinther; Madsen, Charlotte Øland; Rasmussen, Jørgen Gulddahl

    2013-01-01

    Strategy processes are kinds of wayfaring where different actors interpret a formally defined strat-egy differently. In the everyday practice of organizations strategizing takes place in multiple ways through narratives and sensible actions. This forms a meshwork of polyphonic ways to enact one...... and the same strategy. The paper focusses on such processes as they develop in a Danish service company. It is done on the basis of an empirical and longitudinal study of a strategy process in the Service Company where the strategic purpose was to implement value-based management. The theme to be developed...... based on this development paper is whether one can understand these diver-gent strategic wayfaring processes as constructive for organizations....

  19. Thinking strategically about capitation.

    Science.gov (United States)

    Boland, P

    1997-05-01

    All managed care stakeholders--health plan members, employers, providers, community organizations, and government entitites--share a common interest in reducing healthcare costs while improving the quality of care health plan members receive. Although capitation is a usually thought of primarily as a payment mechanism, it can be a powerful tool providers and health plans can use to accomplish these strategic objectives and others, such as restoring and maintaining the health of plan members or improving a community's health status. For capitation to work effectively as a strategic tool, its use must be tied to a corporate agenda of partnering with stakeholders to achieve broader strategic goals. Health plans and providers must develop a partnership strategy in which each stakeholder has well-defined roles and responsibilities. The capitation structure must reinforce interdependence, shift focus from meeting organizational needs to meeting customer needs, and develop risk-driven care strategies.

  20. Tourism and Strategic Planning

    DEFF Research Database (Denmark)

    Pasgaard, Jens Christian

    2012-01-01

    the potential of ‘the extraordinary’ tourism-dominated space. As highlighted in the introduction, this report does not present any systematic analysis of strategic planning processes; neither does it provide any unequivocal conclusions. Rather, the report presents a collection of so-called ‘detours......The main purpose of this report is to explore and unfold the complexity of the tourism phenomenon in order to qualify the general discussion of tourism-related planning challenges. Throughout the report I aim to demonstrate the strategic potential of tourism in a wider sense and more specifically......’ – a collection of theoretical discussions and case studies with the aim to inspire future strategic planning. Due to the complexity and heterogeneity of the phenomenon I use a non-linear and non-chronological report format with the ambition to create a new type of overview. In this regard the report is intended...

  1. NASA strategic plan

    Science.gov (United States)

    1994-01-01

    The NASA Strategic Plan is a living document. It provides far-reaching goals and objectives to create stability for NASA's efforts. The Plan presents NASA's top-level strategy: it articulates what NASA does and for whom; it differentiates between ends and means; it states where NASA is going and what NASA intends to do to get there. This Plan is not a budget document, nor does it present priorities for current or future programs. Rather, it establishes a framework for shaping NASA's activities and developing a balanced set of priorities across the Agency. Such priorities will then be reflected in the NASA budget. The document includes vision, mission, and goals; external environment; conceptual framework; strategic enterprises (Mission to Planet Earth, aeronautics, human exploration and development of space, scientific research, space technology, and synergy); strategic functions (transportation to space, space communications, human resources, and physical resources); values and operating principles; implementing strategy; and senior management team concurrence.

  2. Strategic Self-Ignorance

    DEFF Research Database (Denmark)

    Thunström, Linda; Nordström, Leif Jonas; Shogren, Jason F.

    We examine strategic self-ignorance—the use of ignorance as an excuse to overindulge in pleasurable activities that may be harmful to one’s future self. Our model shows that guilt aversion provides a behavioral rationale for present-biased agents to avoid information about negative future impacts...... of such activities. We then confront our model with data from an experiment using prepared, restaurant-style meals — a good that is transparent in immediate pleasure (taste) but non-transparent in future harm (calories). Our results support the notion that strategic self-ignorance matters: nearly three of five...... subjects (58 percent) chose to ignore free information on calorie content, leading at-risk subjects to consume significantly more calories. We also find evidence consistent with our model on the determinants of strategic self-ignorance....

  3. Strategic self-ignorance

    DEFF Research Database (Denmark)

    Thunström, Linda; Nordström, Leif Jonas; Shogren, Jason F.

    2016-01-01

    We examine strategic self-ignorance—the use of ignorance as an excuse to over-indulge in pleasurable activities that may be harmful to one’s future self. Our model shows that guilt aversion provides a behavioral rationale for present-biased agents to avoid information about negative future impacts...... of such activities. We then confront our model with data from an experiment using prepared, restaurant-style meals—a good that is transparent in immediate pleasure (taste) but non-transparent in future harm (calories). Our results support the notion that strategic self-ignorance matters: nearly three of five...... subjects (58%) chose to ignore free information on calorie content, leading at-risk subjects to consume significantly more calories. We also find evidence consistent with our model on the determinants of strategic self-ignorance....

  4. Strategic environmental assessment

    DEFF Research Database (Denmark)

    Kørnøv, Lone

    1997-01-01

    The integration of environmental considerations into strategic decision making is recognized as a key to achieving sustainability. In the European Union a draft directive on Strategic Environmental Assessment (SEA) is currently being reviewed by the member states. The nature of the proposed SEA...... that the SEA directive will influence the decision-making process positively and will help to promote improved environmental decisions. However, the guidelines for public participation are not sufficient and the democratic element is strongly limited. On the basis of these findings, recommendations relating...

  5. Complex Strategic Choices

    DEFF Research Database (Denmark)

    Leleur, Steen

    to strategic decision making, Complex Strategic Choices presents a methodology which is further illustrated by a number of case studies and example applications. Dr. Techn. Steen Leleur has adapted previously established research based on feedback and input from various conferences, journals and students...... resulting in new material stemming from and focusing on practical application of a systemic approach. The outcome is a coherent and flexible approach named systemic planning. The inclusion of both the theoretical and practical aspects of systemic planning makes this book a key resource for researchers...

  6. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  7. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  8. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  9. Strategic financial analysis: the CFO's role in strategic planning.

    Science.gov (United States)

    Litos, D M

    1985-03-01

    Strategic financial analysis, the financial information support system for the strategic planning process, provides information vital to maintaining a healthy bottom line. This article, the third in HCSM's series on the organizational components of strategic planning, reviews the role of the chief financial officer in determining which programs and services will best meet the future needs of the institution.

  10. Mapping strategic diversity: strategic thinking from a variety of perspectives

    NARCIS (Netherlands)

    Jacobs, D.

    2010-01-01

    In his influential work, Strategy Safari, Henry Mintzberg and his colleagues presented ten schools of strategic thought. In this impressive book, Dany Jacobs demonstrates that the real world of strategic management is much wider and richer. In Mapping Strategic Diversity, Jacobs distinguishes

  11. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  12. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  13. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  14. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  15. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  16. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  17. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  18. Strategic planning and managerial control

    OpenAIRE

    Mihaela Ghicajanu

    2004-01-01

    In this paper present relationship among strategic planning and managerial control process. For begin I want present few elements about strategic planning and managerial control in order to identify link inter these elements.

  19. New Military Strategic Communications System

    National Research Council Canada - National Science Library

    Baldwin, Robert F

    2007-01-01

    ... audience through unified action. The Quadrennial Defense Review Roadmap for Strategic Communications and the Department of Defense, Report of the Defense Science Board Task Force on Strategic Communication both concluded that the US...

  20. Does segmental overlap help or hurt? Evidence from blocked cyclic naming in spoken and written production.

    Science.gov (United States)

    Breining, Bonnie; Nozari, Nazbanou; Rapp, Brenda

    2016-04-01

    Past research has demonstrated interference effects when words are named in the context of multiple items that share a meaning. This interference has been explained within various incremental learning accounts of word production, which propose that each attempt at mapping semantic features to lexical items induces slight but persistent changes that result in cumulative interference. We examined whether similar interference-generating mechanisms operate during the mapping of lexical items to segments by examining the production of words in the context of others that share segments. Previous research has shown that initial-segment overlap amongst a set of target words produces facilitation, not interference. However, this initial-segment facilitation is likely due to strategic preparation, an external factor that may mask underlying interference. In the present study, we applied a novel manipulation in which the segmental overlap across target items was distributed unpredictably across word positions, in order to reduce strategic response preparation. This manipulation led to interference in both spoken (Exp. 1) and written (Exp. 2) production. We suggest that these findings are consistent with a competitive learning mechanism that applies across stages and modalities of word production.

  1. The strategic entrepreneurial thinking imperative

    OpenAIRE

    S. Dhliwayo; J. J. Van Vuuren

    2007-01-01

    Purpose: The aim of this paper is to demonstrate that strategic entrepreneurial thinking is a unitary concept which should be viewed as a standalone construct. Design/Methodology/Approach: The concept strategic entrepreneurial thinking is modelled from an analysis of strategic thinking and entrepreneurial thinking from available literature. The strategic entrepreneurial mindset imperative is then emphasised and confirmed. Findings: This paper's finding is that there is no diff...

  2. A Handbook for Strategic Planning

    Science.gov (United States)

    1994-01-01

    Total Quality Leadership, 48 mtrategic direction, strategic intent , organizational planning, 11tinaiCMc MIisiing.mysteusth nking, gap analysis 17 1CUPMtlI...Department of the Nawy vision, guiding principles, and strategic goals. Washington, DC: Author. Hamel, G., & Prahalad , C. K. (May-June 1989). Strategic ...professoional oirgani/atioins. strategic planning. Adv;ice mInav also take .,V resouirces, perimt, thet [QI 0 )fice, the form of recoiln~inedatioins onl

  3. Scenario-based strategizing

    DEFF Research Database (Denmark)

    Lehr, Thomas; Lorenz, Ullrich; Willert, Markus

    2017-01-01

    -based efficacy and robustness. To facilitate the colla- borative strategizing in teams, we propose a matrix with robustness and efficacy as the two axes, which we call the Parmenides Matrix. We assess the impact of the novel approach by applying it in two cases, at a govern- mental agency (German Environmental...

  4. Strategic decision making

    NARCIS (Netherlands)

    Stokman, Frans N.; Assen, Marcel A.L.M. van; Knoop, Jelle van der; Oosten, Reinier C.H. van

    2000-01-01

    This paper introduces a methodology for strategic intervention in collective decision making.The methodology is based on (1) a decomposition of the problem into a few main controversial issues, (2) systematic interviews of subject area specialists to obtain a specification of the decision

  5. Strategic Marketing for Agribusiness.

    Science.gov (United States)

    Welch, Mary A., Ed.

    1993-01-01

    The steps for strategic market planning are discussed including: (1) assessing the situation with market conditions, customers, competitors, and your firm; and (2) crafting a strategy to prioritize target markets, develop a core strategy, and create a marketing mix. Examples of agribusiness successes are presented. The booklet concludes with a…

  6. Strategic planning for marketers.

    Science.gov (United States)

    Wilson, I

    1978-12-01

    The merits of strategic planning as a marketing tool are discussed in this article which takes the view that although marketers claim to be future-oriented, they focus too little attention on long-term planning and forecasting. Strategic planning, as defined by these authors, usually encompasses periods of between five and twenty-five years and places less emphasis on the past as an absolute predictor of the future. It takes a more probabilistic view of the future than conventional marketing strategy and looks at the corporation as but one component interacting with the total environment. Inputs are examined in terms of environmental, social, political, technological and economic importance. Because of its futuristic orientation, an important tenant of strategic planning is the preparation of several alternative scenarios ranging from most to least likely. By planning for a wide-range of future market conditions, a corporation is more able to be flexible by anticipating the course of future events, and is less likely to become a captive reactor--as the authors believe is now the case. An example of strategic planning at General Elecric is cited.

  7. Strategic port development

    DEFF Research Database (Denmark)

    Olesen, Peter Bjerg; Dukovska-Popovska, Iskra; Steger-Jensen, Kenn

    2012-01-01

    This paper proposes a framework for strategic development of a port’s collaboration with its hinterland. The framework is based on literature relevant to port development and undertakes market perspective by considering import/export data relevant for the region of interest. The series of steps...

  8. Naming as Strategic Communication

    DEFF Research Database (Denmark)

    Schmeltz, Line; Kjeldsen, Anna Karina

    2016-01-01

    This article presents a framework for understanding corporate name change as strategic communication. From a corporate branding perspective, the choice of a new name can be seen as a wish to stand out from a group of similar organizations. Conversely, from an institutional perspective, name change...

  9. Strategic self-management

    DEFF Research Database (Denmark)

    Mørch, Sven; Pultz, Sabina; Strøbæk, Pernille Solveig

    2017-01-01

    perspective. Based on our data analysis, this study contributes theoretically by further-developing the concept of ‘strategic self-management’ in an educational context. We conclude that this concept is suitable for encapsulating how young people make sense of, and deal with, their educational biographies...

  10. Capabilities for Strategic Adaptation

    DEFF Research Database (Denmark)

    Distel, Andreas Philipp

    This dissertation explores capabilities that enable firms to strategically adapt to environmental changes and preserve competitiveness over time – often referred to as dynamic capabilities. While dynamic capabilities being a popular research domain, too little is known about what these capabiliti...

  11. ACNW - 1998 strategic plan

    International Nuclear Information System (INIS)

    1998-01-01

    This plan provides strategic direction to The Advisory Committee on Nuclear Waste (ACNW) in 1998 and beyond for focusing on issues most important to the NRC in carrying out its mission of protecting public health and safety, promoting the common defense and security, and protecting the environment

  12. Strategic Targeted Advertising

    NARCIS (Netherlands)

    A. Galeotti; J.L. Moraga-Gonzalez (José Luis)

    2003-01-01

    textabstractWe present a strategic game of pricing and targeted-advertising. Firms can simultaneously target price advertisements to different groups of customers, or to the entire market. Pure strategy equilibria do not exist and thus market segmentation cannot occur surely. Equilibria exhibit

  13. What is strategic management?

    Science.gov (United States)

    Jasper, Melanie; Crossan, Frank

    2012-10-01

    To discuss the theoretical concept of strategic management and explore its relevance for healthcare organisations and nursing management. Despite being a relatively new approach, the growth of strategic management within organisations has been consistently and increasingly promoted. However, comprehensive definitions are scarce and commonalities of interpretation are limited. This paper presents an exploratory discussion of the construct of strategic management, drawing on the literature and questioning its relevance within health-care organisations. Literature relating to strategic management across a number of fields was accessed, drawing primarily on meta-studies within management literature, to identify key concepts and attempt to present a consistent definition. The concept within health care is explored in relation to nursing management. Inconsistency in definitions and utilisation of key concepts within this management approach results in the term being loosely applied in health-care organisations without recourse to foundational principles and a deep understanding of the approach as a theory as opposed to an applied term. Nurse managers are increasingly asked to adopt the 'next-best-thing' in managerial theories, yet caution needs to be taken in nurses agreeing to use systems that lack an evidence base in terms of both efficacy and relevance of context. © 2012 Blackwell Publishing Ltd.

  14. Scenario-based strategizing

    DEFF Research Database (Denmark)

    Lehr, Thomas; Lorenz, Ullrich; Willert, Markus

    2017-01-01

    For over 40 years, scenarios have been promoted as a key technique for forming strategies in uncertain en- vironments. However, many challenges remain. In this article, we discuss a novel approach designed to increase the applicability of scenario-based strategizing in top management teams. Drawi...... Ministry) and a firm affected by disruptive change (Bosch, leading global supplier of technology and solutions)....

  15. Measuring strategic success.

    Science.gov (United States)

    Gish, Ryan

    2002-08-01

    Strategic triggers and metrics help healthcare providers achieve financial success. Metrics help assess progress toward long-term goals. Triggers signal market changes requiring a change in strategy. All metrics may not move in concert. Organizations need to identify indicators, monitor performance.

  16. AECB strategic plan 1999

    International Nuclear Information System (INIS)

    1999-03-01

    This strategic plan provides the direction and focus required to successfully carry out our mandate in an efficient and effective manner over the next two to three years. It gives broad corporate direction by identifying where efforts need to be focussed, and therefore provides guidance for setting priorities and allocating resources. While we cannot ignore any aspect of our mandate, we must recognize that we will always have more work to do than can be accomplished within the resources available to us. Therefore we must set priorities and develop appropriate management systems to ensure that our major efforts and our resources are being directed towards those priorities. Our strategic plan is not a static document. We will always be faced with new challenges, and our strategies for meeting those challenges will also have to change. Therefore our strategic plan must be seen as a guide that reflects both the ever-changing environment and our ability to deal with new or evolving changes effectively. This plan is not intended to be a detailed operational plan. Each directorate must develop its own operational plans and procedures based on the directions in this strategic plan, and on corporate priorities and policies. (author)

  17. Essays on Strategic Communication

    NARCIS (Netherlands)

    Z. Sharif (Zara)

    2016-01-01

    markdownabstractThree essays on strategic communication are discussed in this dissertation. These essays consider different settings in which a decision maker has to rely on another agent for information. In each essay, we analyze how much information the sender is able to credibly communicate to

  18. Strategic Management of Large Projects

    Institute of Scientific and Technical Information of China (English)

    WangYingluo; LiuYi; LiYuan

    2004-01-01

    The strategic management of large projects is both theoretically and practically important. Some scholars have advanced flexible strategy theory in China. The difference of strategic flexibility and flexible strategy is pointed out. The supporting system and characteristics of flexible strategy are analyzed. The changes of flexible strategy and integration of strategic management are discussed.

  19. Peaceful Development and Strategic Opportunity

    Institute of Scientific and Technical Information of China (English)

    Yang Yi

    2006-01-01

    @@ The international strategic situation and environment China faces have changed dramatically since September 11. China has closely followed and adapted itself to the ever-changing situation, seized strategic opportunity, adjusted its global strategy, adhered to peaceful development and displayed diplomacy and strategic flexibility. These are manifested in the following four aspects:

  20. Strategic Planning and Financial Management

    Science.gov (United States)

    Conneely, James F.

    2010-01-01

    Strong financial management is a strategy for strategic planning success in student affairs. It is crucial that student affairs professionals understand the necessity of linking their strategic planning with their financial management processes. An effective strategic planner needs strong financial management skills to implement the plan over…

  1. Being Strategic in HE Management

    Science.gov (United States)

    West, Andrew

    2008-01-01

    The call to be strategic--and with it the concept of strategic management--can bring to mind a wide range of definitions, and there is now a huge array of academic literature supporting the different schools of thought. At a basic level, however, strategic thinking is probably most simply about focusing on the whole, rather than the part. In…

  2. Strategic Partnerships in Higher Education

    Science.gov (United States)

    Ortega, Janet L.

    2013-01-01

    The purpose of this study was to investigate the impacts of strategic partnerships between community colleges and key stakeholders; to specifically examine strategic partnerships; leadership decision-making; criteria to evaluate strategic partnerships that added value to the institution, value to the students, faculty, staff, and the local…

  3. The Possibilities of Strategic Finance

    Science.gov (United States)

    Chaffee, Ellen

    2010-01-01

    Strategic finance is aligning financial decisions--regarding revenues, creating and maintaining institutional assets, and using those assets--with the institution's mission and strategic plan. The concept known as "strategic finance" increasingly is being seen as a useful perspective for helping boards and presidents develop a sustainable…

  4. Microfoundations of strategic decision effectiveness

    NARCIS (Netherlands)

    Jansen, R.J.G.; Van Santen, Sarah

    2017-01-01

    How do organizations make effective strategic decisions? In this study we build on research on the microfoundations of strategy and strategic decision-making to study the underpinnings of strategic decision effectiveness. We argue that the process-effectiveness link can be more fully understood if

  5. Strategic arms limitation

    Science.gov (United States)

    Allen Greb, G.; Johnson, Gerald W.

    1983-10-01

    Following World War II, American scientists and politicians proposed in the Baruch plan a radical solution to the problem of nuclear weapons: to eliminate them forever under the auspices of an international nuclear development authority. The Soviets, who as yet did not possess the bomb, rejected this plan. Another approach suggested by Secretary of War Henry Stimson to negotiate directly with the Soviet Union was not accepted by the American leadership. These initial arms limitation failures both reflected and exacerbated the hostile political relationship of the superpowers in the 1950s and 1960s. Since 1969, the more modest focus of the Soviet-American arms control process has been on limiting the numbers and sizes of both defensive and offensive strategic systems. The format for this effort has been the Strategic Arms Limitatins Talks (Salt) and more recently the Strategic Arms Reduction Talks (START). Both sides came to these negotiations convinced that nuclear arsenals had grown so large that some for of mutual restraint was needed. Although the SALT/START process has been slow and ponderous, it has produced several concrete the agreements and collateral benefits. The 1972 ABM Treaty restricts the deployment of ballistic missile defense systems, the 1972 Interim Agreement places a quantitative freeze on each side's land based and sea based strategic launchers, and the as yet unratified 1979 SALT II Treaty sets numerical limits on all offensive strategic systems and sublimits on MIRVed systems. Collateral benefits include improved verification procedures, working definitions and counting rules, and permanent bureaucratic apparatus which enhance stability and increase the chances for achieving additional agreements.

  6. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  7. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  8. Cognitive Characteristics of Strategic and Non-strategic Gamblers.

    Science.gov (United States)

    Mouneyrac, Aurélie; Lemercier, Céline; Le Floch, Valérie; Challet-Bouju, Gaëlle; Moreau, Axelle; Jacques, Christian; Giroux, Isabelle

    2018-03-01

    Participation in strategic and non-strategic games is mostly explained in the literature by gender: men gamble on strategic games, while women gamble on non-strategic games. However, little is known about the underlying cognitive factors that could also distinguish strategic and non-strategic gamblers. We suggest that cognitive style and need for cognition also explain participation in gambling subtypes. From a dual-process perspective, cognitive style is the tendency to reject or accept the fast, automatic answer that comes immediately in response to a problem. Individuals that preferentially reject the automatic response use an analytic style, which suggest processing information in a slow way, with deep treatment. The intuitive style supposes a reliance on fast, automatic answers. The need for cognition provides a motivation to engage in effortful activities. One hundred and forty-nine gamblers (53 strategic and 96 non-strategic) answered the Cognitive Reflection Test, Need For Cognition Scale, and socio-demographic questions. A logistic regression was conducted to evaluate the influence of gender, cognitive style and need for cognition on participation in strategic and non-strategic games. Our results show that a model with both gender and cognitive variables is more accurate than a model with gender alone. Analytic (vs. intuitive) style, high (vs. low) need for cognition and being male (vs. female) are characteristics of strategic gamblers (vs. non-strategic gamblers). This study highlights the importance of considering the cognitive characteristics of strategic and non-strategic gamblers in order to develop preventive campaigns and treatments that fit the best profiles for gamblers.

  9. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  10. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  11. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  12. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  13. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  14. The headache under-response to treatment (HURT) questionnaire, an outcome measure to guide follow-up in primary care: development, psychometric evaluation and assessment of utility.

    Science.gov (United States)

    Steiner, T J; Buse, D C; Al Jumah, M; Westergaard, M L; Jensen, R H; Reed, M L; Prilipko, L; Mennini, F S; Láinez, M J A; Ravishankar, K; Sakai, F; Yu, S-Y; Fontebasso, M; Al Khathami, A; MacGregor, E A; Antonaci, F; Tassorelli, C; Lipton, R B

    2018-02-14

    Headache disorders are both common and burdensome but, given the many people affected, provision of health care to all is challenging. Structured headache services based in primary care are the most efficient, equitable and cost-effective solution but place responsibility for managing most patients on health-care providers with limited training in headache care. The development of practical management aids for primary care is therefore a purpose of the Global Campaign against Headache. This manuscript presents an outcome measure, the Headache Under-Response to Treatment (HURT) questionnaire, describing its purpose, development, psychometric evaluation and assessment for clinical utility. The objective was a simple-to-use instrument that would both assess outcome and provide guidance to improving outcome, having utility across the range of headache disorders, across clinical settings and across countries and cultures. After literature review, an expert consensus group drawn from all six world regions formulated HURT through item development and item reduction using item-response theory. Using the American Migraine Prevalence and Prevention Study's general-population respondent panel, two mailed surveys assessed the psychometric properties of HURT, comparing it with other instruments as external validators. Reliability was assessed in patients in two culturally-contrasting clinical settings: headache specialist centres in Europe (n = 159) and primary-care centres in Saudi Arabia (n = 40). Clinical utility was assessed in similar settings (Europe n = 201; Saudi Arabia n = 342). The final instrument, an 8-item self-administered questionnaire, addressed headache frequency, disability, medication use and effect, patients' perceptions of headache "control" and their understanding of their diagnoses. Psychometric evaluation revealed a two-factor model (headache frequency, disability and medication use; and medication efficacy and headache control), with

  15. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  16. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  17. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  18. Innovation and strategic competitiveness

    Directory of Open Access Journals (Sweden)

    Jović Mile B.

    2003-01-01

    Full Text Available Paper discussed relationships of innovation to achieving strategic competitiveness in today globalized economic environment. Special attention is devoted to the nature of competitive advantages on global industries as well national level. Competitive advantage is a firm's ability to transform inputs into goods and services at a profit on a sustained basis, better than competitors. Comparative advantage resides in the factor endowments and created endowments of particular regions. Beside the traditional endowment approach (land, natural resources, labor and the size of the local population it is emphasized the importance of created one such as skilled labor, the technology and knowledge base, government support and culture. Creating corporate or country competitiveness roadmap there are no substantial difference - innovative as well strategic approach is essential.

  19. Strategic innovation portfolio management

    Directory of Open Access Journals (Sweden)

    Stanković Ljiljana

    2015-01-01

    Full Text Available In knowledge-based economy, strategic innovation portfolio management becomes more and more important and critical factor of enterprise's success. Value creation for all the participants in value chain is more successful if it is based on efficient resource allocation and improvement of innovation performances. Numerous researches have shown that companies with best position on the market found their competitiveness on efficient development and exploitation of innovations. In decision making process, enterprise's management is constantly faced with challenge to allocate resources and capabilities as efficiently as possible, in both short and long term. In this paper authors present preliminary results of realized empirical research related to strategic innovation portfolio management in ten chosen enterprises in Serbia. The structure of the paper includes the following parts: theoretical background, explanation of research purpose and methodology, discussion of the results and concluding remarks, including limitations and directions for further research.

  20. Scope of strategic marketing

    Directory of Open Access Journals (Sweden)

    Bradley Frank

    2004-01-01

    Full Text Available Marketing is a philosophy that leads to the process by which organizations, groups and individuals obtain what they need and want by identifying value, providing it, communicating it and delivering it to others. The core concepts of marketing are customers needs, wants and values; products, exchange, communications and relationships. Marketing is strategically concerned with the direction and scope of the long-term activities performed by the organization to obtain a competitive advantage. The organization applies its resources within a changing environment to satisfy customer needs while meeting stakeholder expectations. Implied in this view of strategic marketing is the requirement to develop a strategy to cope with competitors, identify market opportunities, develop and commercialize new products and services, allocate resources among marketing activities and design an appropriate organizational structure to ensure the perform once desired is achieved.

  1. The Strategic Design Perspective

    DEFF Research Database (Denmark)

    Rasmussen, Jørgen

    2006-01-01

    In this article I argue, and exemplify, that designers working in close relation with industry, can have significant influence on the nature and the quality of the products (or services) produced by the companies. In order to achieve this, the designer must become one of the decisive factors...... in the strategic framework of the company. This is done by taking the design process to the business floor of the company and using the design competence to innovate, not only products, but the fundamental concepts for product selection. Using design as a strategic tool will cause entirely new products to emerge...... and will make entire groups of products change into services. In this way new markets will appear to benefit the innovative companies, and if designers do their job well, the focus will be on the users, and thereby benefiting them as well. An example of this process is Novo Nordisk. This pharmaceutical company...

  2. Interoperability Strategic Vision

    Energy Technology Data Exchange (ETDEWEB)

    Widergren, Steven E.; Knight, Mark R.; Melton, Ronald B.; Narang, David; Martin, Maurice; Nordman, Bruce; Khandekar, Aditya; Hardy, Keith S.

    2018-02-28

    The Interoperability Strategic Vision whitepaper aims to promote a common understanding of the meaning and characteristics of interoperability and to provide a strategy to advance the state of interoperability as applied to integration challenges facing grid modernization. This includes addressing the quality of integrating devices and systems and the discipline to improve the process of successfully integrating these components as business models and information technology improve over time. The strategic vision for interoperability described in this document applies throughout the electric energy generation, delivery, and end-use supply chain. Its scope includes interactive technologies and business processes from bulk energy levels to lower voltage level equipment and the millions of appliances that are becoming equipped with processing power and communication interfaces. A transformational aspect of a vision for interoperability in the future electric system is the coordinated operation of intelligent devices and systems at the edges of grid infrastructure. This challenge offers an example for addressing interoperability concerns throughout the electric system.

  3. Strategic decision making

    OpenAIRE

    Stokman, Frans N.; Assen, Marcel A.L.M. van; Knoop, Jelle van der; Oosten, Reinier C.H. van

    2000-01-01

    This paper introduces a methodology for strategic intervention in collective decision making.The methodology is based on (1) a decomposition of the problem into a few main controversial issues, (2) systematic interviews of subject area specialists to obtain a specification of the decision setting,consisting of a list of stakeholders with their capabilities, positions, and salience on each of the issues; (3) computer simulation. The computer simulation models incorporate only the main processe...

  4. Dynamic Strategic Information Transmission

    OpenAIRE

    Mikhail Golosov; Vasiliki Skreta; Aleh Tsyvinski; Andrea Wilson

    2011-01-01

    This paper studies strategic information transmission in a dynamic environment where, each period, a privately informed expert sends a message and a decision maker takes an action. Our main result is that, in contrast to a static environment, full information revelation is possible. The gradual revelation of information and the eventual full revelation is supported by the dynamic rewards and punishments. The construction of a fully revealing equilibrium relies on two key features. The first f...

  5. Strategic Targeted Advertising

    OpenAIRE

    Andrea Galeotti; Jose Luis Moraga

    2003-01-01

    textabstractWe present a strategic game of pricing and targeted-advertising. Firms can simultaneously target price advertisements to different groups of customers, or to the entire market. Pure strategy equilibria do not exist and thus market segmentation cannot occur surely. Equilibria exhibit random advertising --to induce an unequal distribution of information in the market-- and random pricing --to obtain profits from badly informed buyers--. We characterize a positive profits equilibrium...

  6. Strategic Marketing in Tourism

    OpenAIRE

    Silvia Muhcina; Brailoiu Liviu

    2012-01-01

    Tourism is a very dynamic economic sector because is very depended of environmental changes, especially now, when the global economy pass through successive crises. For the competitive organizations, the success means to transform their specific activity in a more market oriented business. The objectives of any organization must be fixed going from a better understanding of the markets. Strategic marketing means to know and analyze the consumers’ needs and the market which organization refers...

  7. Strategic Corporate Social Responsibility

    OpenAIRE

    Planer-Friedrich, Lisa; Sahm, Marco

    2017-01-01

    We examine the strategic use of Corporate Social Responsibility (CSR) in imperfectly competitive markets. The level of CSR determines the weight a firm puts on consumer surplus in its objective function before it decides upon supply. First, we consider symmetric Cournot competition and show that the endogenous level of CSR is positive for any given number of firms. However, positive CSR levels imply smaller equilibrium profits. Second, we find that an incumbent monopolist can use CSR as an en...

  8. The strategic research positioning:

    DEFF Research Database (Denmark)

    Viala, Eva Silberschmidt

    to provide new insights into ‘immigrant’ parents’ perspective on home/school partnership in Denmark. The majority of the immigrant parents came from non-Western countries, and they had already been ‘labelled’ difficult in terms of home/school partnership. This calls for what I call ‘strategic research...... positioning’, meaning critical reflections about the relationship and power balance between the researcher and the researched. The paper focus' on challenges and dilemmas linked to this position....

  9. Making Risk Management Strategic

    DEFF Research Database (Denmark)

    Sax, Johanna; Andersen, Torben Juul

    2018-01-01

    Enterprise risk management (ERM) is an established management practice and is increasing in prominence as more firms spend substantial resources implementing ERM frameworks, partially induced by regulatory requirements. Yet, there is a lack of knowledge as to whether such frameworks add value and...... outcomes. The study develops a new multidimensional measure of adherence to ERM practices where earlier studies typically have relied on dichotomous proxies. We discuss the implications of these findings for ERM practice and strategic management in general....

  10. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  11. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  12. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  13. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  14. Strategic Studies Quarterly- Spring 2016

    Science.gov (United States)

    2016-01-01

    martial culture -is instructive of deterrence calculations in the present day. On the contrary, many foreign strategists now believe that weapons in the...the coast of the Indian city of Porbandar, Gujarat, prompting specula- tion that a Mumbai -style terrorist attack had been narrowly averted.3 Later...specialists is that the likely catalyst for a Cold Start offensive is a major terrorist attack similar to the parliament incident or Mumbai attack of 2008

  15. Strategic Defense Initiative Organization adaptive structures program overview

    Science.gov (United States)

    Obal, Michael; Sater, Janet M.

    In the currently envisioned architecture none of the Strategic Defense System (SDS) elements to be deployed will receive scheduled maintenance. Assessments of performance capability due to changes caused by the uncertain effects of environments will be difficult, at best. In addition, the system will have limited ability to adjust in order to maintain its required performance levels. The Materials and Structures Office of the Strategic Defense Initiative Organization (SDIO) has begun to address solutions to these potential difficulties via an adaptive structures technology program that combines health and environment monitoring with static and dynamic structural control. Conceivable system benefits include improved target tracking and hit-to-kill performance, on-orbit system health monitoring and reporting, and threat attack warning and assessment.

  16. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  17. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  18. Unlocking India’s Strategic Potential in Central Asia

    Science.gov (United States)

    2015-10-01

    war. Nearly 4 decades since, Islamabad has struggled to ensure do- mestic security amid militant attacks, some of which bear the hallmarks of...see Huasheng, pp. 131-138. 79. Jagannath P. Panda , “India’s New Look at Central Asia Policy: A Strategic Review,” in Laruelle, Huchet, et al., pp...Central Asia,” in Dash, p. 8. 99. Peyrouse, Monsoon, p. 197. 100. Stobdan, pp. 48-54. 101. Panda , p. 116. 102. Kavalski, pp. 102-103. 98 103. Peyrouse

  19. The Strategic Communication Plan: Effective Communication for Strategic Leaders

    National Research Council Canada - National Science Library

    Reeder, Melanie

    1998-01-01

    .... It addresses the purpose, developmental process, content, and implementation of a strategic communication plan offering specific recommendations for the creation and effective use of a successful plan...

  20. Exploration in American Archaeology: Essays in Honor of Wesley R. Hurt. edited by Mark G. Plew, University Press of America, Lanham, 1999

    Directory of Open Access Journals (Sweden)

    David L. Browman

    2000-05-01

    Full Text Available This volume contains a short 6 page history of the contributions ofWesley Robert Hurt, Jr., to Americanist archaeology,along with a 4 page 'selected' list of his publications. The review starts with his career in the Southwest, traces the shift in his research to the Plains, and especially South Dakota, and then turns to his later change of interest to South America (especially Colombia, Brazil and Uru­guay. Hurt was born September 20, 1 9 1 7 in New Mexico, and got into archaeology through his cousin, Reginald Fisher, who was working for Dr. Edgar L. Heweu. Hurt started out taking Heweu's Chaco Canyon Field School, and began working on the Jemez Archaeological project as a high school student in the 1930s. After graduating from the University of New Mexico in 1938, he worked from 1938 to 1940 as a WPAArchaeology Project supervisor on Southwest projects, and in 1941 served as the Na­tional Park Service archaeologist at Canyon de Chelly National Monument.

  1. Strategic management of population programs

    OpenAIRE

    Bernhart, Michael H.

    1992-01-01

    Formal strategic planning and management appear to contribute to organizational effectiveness. The author surveys the literature on strategic management in private/for-profit organizations and applies lessons from that literature to population programs. Few would argue that population programs would not benefit from strategic planning and management, but it would be inadvisable to initiate the process when the organization is faced with a short-term crisis; during or immediately before a chan...

  2. Strategic planning: today's hot buttons.

    Science.gov (United States)

    Bohlmann, R C

    1998-01-01

    The first generation of mergers and managed care hasn't slowed down group practices' need for strategic planning. Even groups that already went through one merger are asking about new mergers or ownership possibilities, the future of managed care, performance standards and physician unhappiness. Strategic planning, including consideration of bench-marking, production of ancillary services and physician involvement, can help. Even if only a short, general look at the future, strategic planning shows the proactive leadership needed in today's environment.

  3. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  4. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  5. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  6. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  7. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  8. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  9. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  10. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  11. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  12. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  13. Strategic Human Resources Management

    Directory of Open Access Journals (Sweden)

    Marta Muqaj

    2016-07-01

    Full Text Available Strategic Human Resources Management (SHRM represents an important and sensitive aspect of the functioning and development of a company, business, institution, state, public or private agency of a country. SHRM is based on a point of view of the psychological practices, especially by investing on empowerment, broad training and teamwork. This way it remains the primary resource to maintain stability and competitiveness. SHRM has lately evolved on fast and secure steps, and the transformation from Management of Human Resources to SHRM is becoming popular, but it still remains impossible to exactly estimate how much SHRM has taken place in updating the practices of HRM in organizations and institutions in general. This manuscript aims to make a reflection on strategic management, influence factors in its practices on some organizations. Researchers aim to identify influential factors that play key roles in SHRM, to determine its challenges and priorities which lay ahead, in order to select the most appropriate model for achieving a desirable performance. SHRM is a key factor in the achievement of the objectives of the organization, based on HR through continuous performance growth, it’s a complex process, unpredictable and influenced by many outside and inside factors, which aims to find the shortest way to achieve strategic competitive advantages, by creating structure planning, organizing, thinking values, culture, communication, perspectives and image of the organization. While traditional management of HR is focused on the individual performance of employees, the scientific one is based on the organizational performance, the role of the HRM system as main factor on solving business issues and achievement of competitive advantage within its kind.

  14. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  15. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  16. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  17. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  18. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  19. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  20. Strategic management process in hospitals.

    Science.gov (United States)

    Zovko, V

    2001-01-01

    Strategic management is concerned with strategic choices and strategic implementation; it provides the means by which organizations meet their objectives. In the case of hospitals it helps executives and all employees to understand the real purpose and long term goals of the hospital. Also, it helps the hospital find its place in the health care service provision chain, and enables the hospital to coordinate its activities with other organizations in the health care system. Strategic management is a tool, rather than a solution, that helps executives to identify root causes of major problems in the hospital.

  1. Strategic thinking for radiology

    OpenAIRE

    Schilling, Ronald B.

    1998-01-01

    We have now analyzed the use and benefits of four Strategic Thinking Tools for Radiology: the Vision Statement, the High Five, the Two-by-Two, and Real-Win-Worth. Additional tools will be provided during the tutorial. The tools provided above should be considered as examples. They all contain the 10 benefits outlined earlier to varying degrees. It is extremely important that the tools be used in a manner consistent with the Vision Statement of the organization. The specific situation, the eff...

  2. Strategic Aspects of Bundling

    International Nuclear Information System (INIS)

    Podesta, Marion

    2008-01-01

    The increase of bundle supply has become widespread in several sectors (for instance in telecommunications and energy fields). This paper review relates strategic aspects of bundling. The main purpose of this paper is to analyze profitability of bundling strategies according to the degree of competition and the characteristics of goods. Moreover, bundling can be used as price discrimination tool, screening device or entry barriers. In monopoly case bundling strategy is efficient to sort consumers in different categories in order to capture a maximum of surplus. However, when competition increases, the profitability on bundling strategies depends on correlation of consumers' reservations values. (author)

  3. Guam Strategic Energy Plan

    Energy Technology Data Exchange (ETDEWEB)

    Conrad, M. D.

    2013-07-01

    Describes various energy strategies available to Guam to meet the territory's goal of diversifying fuel sources and reducing fossil energy consumption 20% by 2020.The information presented in this strategic energy plan will be used by the Guam Energy Task Force to develop an energy action plan. Available energy strategies include policy changes, education and outreach, reducing energy consumption at federal facilities, and expanding the use of a range of energy technologies, including buildings energy efficiency and conservation, renewable electricity production, and alternative transportation. The strategies are categorized based on the time required to implement them.

  4. Strategic CSR in Afghanistan

    DEFF Research Database (Denmark)

    Azizi, Sameer

    . Based on an analysis of five CSR projects, it can be assessed that Roshan enhances its competitive advantage through CSR in internal, external, and wider-society levels. It is analyzed that Roshan influences its competitive context both from inside-out and out-side in dimensions, and that the CSR......’, but is based on a ‘license to operate’ motivation, where businesses have free room for maneuvering CSR towards their strategic priorities and business goals. Whether this creates a ‘shared value’ for both business and in particularly for the society is however still questionable....

  5. Strategic Global Climate Command?

    Science.gov (United States)

    Long, J. C. S.

    2016-12-01

    Researchers have been exploring geoengineering because Anthropogenic GHG emissions could drive the globe towards unihabitability for people, wildlife and vegetation. Potential global deployment of these technologies is inherently strategic. For example, solar radiation management to reflect more sunlight might be strategically useful during a period of time where the population completes an effort to cease emissions and carbon removal technologies might then be strategically deployed to move the atmospheric concentrations back to a safer level. Consequently, deployment of these global technologies requires the ability to think and act strategically on the part of the planet's governments. Such capacity most definitely does not exist today but it behooves scientists and engineers to be involved in thinking through how global command might develop because the way they do the research could support the development of a capacity to deploy intervention rationally -- or irrationally. Internationalizing research would get countries used to working together. Organizing the research in a step-wise manner where at each step scientists become skilled at explaining what they have learned, the quality of the information they have, what they don't know and what more they can do to reduce or handle uncertainty, etc. Such a process can increase societal confidence in being able to make wise decisions about deployment. Global capacity will also be enhanced if the sceintific establishment reinvents misssion driven research so that the programs will identify the systemic issues invovled in any proposed technology and systematically address them with research while still encouraging individual creativity. Geoengineering will diverge from climate science in that geoengineering research needs to design interventions for some publically desirable goal and investigates whether a proposed intervention will acheive desired outcomes. The effort must be a systems-engineering design problem

  6. Encouraging environmentally strategic technologies

    International Nuclear Information System (INIS)

    Heaton, G.R.

    1994-01-01

    Having moved beyond its initial absorption with controlling new technology, environmental policy today must focus more strongly on promoting the development and adoption of new technologies. World Resource Institute's (WRI) ongoing study of 'environmentally strategic technology' is addressed to this fundamental policy issue. The study proposes criteria for identifying such technology, offers a specific list, suggests the kinds of public policy changes necessary to encourage their development and finally presents a comparison of critical technology lists (from the White House, the European Community, Japan and the US Department of Defense). (TEC)

  7. Strategic Urban Governance

    DEFF Research Database (Denmark)

    Pagh, Jesper

    2014-01-01

    The days of long-term predict-and-provide planning that saw its heydays in the post-war decades are long gone. As our late-modern time presents us with an evermore complex and contrasting view of the world, planning has become a much more fragmented and ambivalent affair. That a country or a city...... should be run like a private corporation has increasingly become common sense, and thus the competition among entities – be it countries, regions or cities – to a greater and greater extent defines success and the means to achieve it. What has been collected under the umbrella term Strategic Urban...

  8. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  9. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  10. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  11. Neurocognitive dysfunction in strategic and non-strategic gamblers.

    Science.gov (United States)

    Grant, Jon E; Odlaug, Brian L; Chamberlain, Samuel R; Schreiber, Liana R N

    2012-08-07

    It has been theorized that there may be subtypes of pathological gambling, particularly in relation to the main type of gambling activities undertaken. Whether or not putative pathological gambling subtypes differ in terms of their clinical and cognitive profiles has received little attention. Subjects meeting DSM-IV criteria for pathological gambling were grouped into two categories of preferred forms of gambling - strategic (e.g., cards, dice, sports betting, stock market) and non-strategic (e.g., slots, video poker, pull tabs). Groups were compared on clinical characteristics (gambling severity, and time and money spent gambling), psychiatric comorbidity, and neurocognitive tests assessing motor impulsivity and cognitive flexibility. Seventy-seven subjects were included in this sample (45.5% females; mean age: 42.7±14.9) which consisted of the following groups: strategic (n=22; 28.6%) and non-strategic (n=55; 71.4%). Non-strategic gamblers were significantly more likely to be older, female, and divorced. Money spent gambling did not differ significantly between groups although one measure of gambling severity reflected more severe problems for strategic gamblers. Strategic and non-strategic gamblers did not differ in terms of cognitive function; both groups showed impairments in cognitive flexibility and inhibitory control relative to matched healthy volunteers. These preliminary results suggest that preferred form of gambling may be associated with specific clinical characteristics but are not dissociable in terms of cognitive inflexibility and motor impulsivity. Copyright © 2012 Elsevier Inc. All rights reserved.

  12. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  13. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  14. Operationalizing strategic marketing.

    Science.gov (United States)

    Chambers, S B

    1989-05-01

    The strategic marketing process, like any administrative practice, is far simpler to conceptualize than operationalize within an organization. It is for this reason that this chapter focused on providing practical techniques and strategies for implementing the strategic marketing process. First and foremost, the marketing effort needs to be marketed to the various publics of the organization. This chapter advocated the need to organize the marketing analysis into organizational, competitive, and market phases, and it provided examples of possible designs of the phases. The importance and techniques for exhausting secondary data sources and conducting efficient primary data collection methods were explained and illustrated. Strategies for determining marketing opportunities and threats, as well as segmenting markets, were detailed. The chapter provided techniques for developing marketing strategies, including considering the five patterns of coverage available; determining competitor's position and the marketing mix; examining the stage of the product life cycle; and employing a consumer decision model. The importance of developing explicit objectives, goals, and detailed action plans was emphasized. Finally, helpful hints for operationalizing the communication variable and evaluating marketing programs were provided.

  15. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  16. Strategic Planning for Higher Education.

    Science.gov (United States)

    Kotler, Philip; Murphy, Patrick E.

    1981-01-01

    The framework necessary for achieving a strategic planning posture in higher education is outlined. The most important benefit of strategic planning for higher education decision makers is that it forces them to undertake a more market-oriented and systematic approach to long- range planning. (Author/MLW)

  17. Macrofoundation for Strategic Technology Management

    DEFF Research Database (Denmark)

    Pedersen, Jørgen Lindgaard

    1995-01-01

    Neoclassical mainstream economics has no perspective on strategic technology management issues. Market failure economics (externalities etc.)can be of some use to analyze problems of relevance in strategic management problems with technology as a part. Environment, inequality and democratic...... deficits are important problems today...

  18. Strategic Interactions in Franchise Relationships

    NARCIS (Netherlands)

    Croonen, Evelien Petronella Maria

    2006-01-01

    This dissertation deals with understanding strategic interactions between franchisors and franchisees. The empirical part of this study consists of in-depth case studies in four franchise systems in the Dutch drugstore industry. The case studies focus on a total of eight strategic change processes

  19. The Science of Strategic Communication

    Science.gov (United States)

    The field of Strategic Communication involves a focused effort to identify, develop, and present multiple types of communication media on a given subject. A Strategic Communication program recognizes the limitations of the most common communication models (primarily “one s...

  20. Strategic delegation improves cartel stability

    NARCIS (Netherlands)

    Han, M.A.

    2010-01-01

    Fershtman and Judd (1987) and Sklivas (1987) show how strategic delegation in the one-shot Cournot game reduces firm profits. However, with infinitely repeated interaction, strategic delegation allows for an improvement in cartel stability compared to the infinitely repeated standard Cournot game,

  1. Strategic Partnerships in International Development

    Science.gov (United States)

    Treat, Tod; Hartenstine, Mary Beth

    2013-01-01

    This chapter provides a framework and recommendations for development of strategic partnerships in a variety of cultural contexts. Additionally, this study elucidates barriers and possibilities in interagency collaborations. Without careful consideration regarding strategic partnerships' approaches, functions, and goals, the ability to…

  2. The Ethics of Strategic Ambiguity.

    Science.gov (United States)

    Paul, Jim; Strbiak, Christy A.

    1997-01-01

    Examines the concept of strategic ambiguity in communication, and addresses the ethics of strategic ambiguity from an intrapersonal perspective that considers the congruity of communicators' espoused-ethics, ethics-in-use, and behavior, where ethical judgements are based on the congruity between espoused-ethics and actual behavior. Poses questions…

  3. Strategic Planning Is an Oxymoron

    Science.gov (United States)

    Bassett, Patrick F.

    2012-01-01

    The thinking on "strategic thinking" has evolved significantly over the years. In the previous century, the independent school strategy was to focus on long-range planning, blithely projecting 10 years into the future. For decades this worked well enough, but in the late 20th century, independent schools shifted to "strategic planning," with its…

  4. Strategic Planning and Online Learning

    Science.gov (United States)

    McLaughlin-Graham, Karen; Berge, Zane L.

    2005-01-01

    Strategic planning is a critical part of sustaining distance education. Through such planning, the organization can solve business problems that involve training and education in an effective and often cost savings manner compared to in-person training efforts. This paper examines the strategic planning process as it relates to sustaining distance…

  5. Strategic Aspects of Cost Management

    Directory of Open Access Journals (Sweden)

    Angelika I. Petrova

    2013-01-01

    Full Text Available This report is a summary of a research done on the area of Strategic Cost Management (SCM. This report includes a detailed discussion and application of Life Cycle Costing (LCC which a company can use to achieve its strategic objects in today's dynamic business environment. Hence, the main focus of this report is on LCC as mentioned

  6. Using Model to Plan of Strategic Objectives

    OpenAIRE

    Terezie Bartusková; Jitka Baňařová; Zuzana Kusněřová

    2012-01-01

    Importance of strategic planning is unquestionable. However, the practical implementation of a strategic plan faces too many obstacles. The aim of the article is explained the importance of strategic planning and to find how companies in Moravian-Silesian Region deal with strategic planning, and to introduce the model, which helps to set strategic goals in financial indicators area. This model should be part of the whole process of strategic planning and can be use to predict the future value...

  7. A new attack on smoking using an old-time remedy.

    Science.gov (United States)

    Moore, M C; Mikhail, C J

    1996-01-01

    This article first will explain the reasons behind and goals of state recoupment actions against the major cigarette manufacturers, their lobbying arm and trade association, and their public relations firms (collectively referred to as the "tobacco industry") for the recovery of Medicaid and other indigent care expenditures on smoking-related illnesses. These are, primarily, to relieve the heavy financial burden on state treasuries and to stop the tobacco industry from targeting children in advertising and promotions. To put this new legal approach in perspective, the article presents a brief historical background to the tobacco industry's litigation strategy: to wear down opponents through delay and intimidation, to cast doubt on science, and to wrongfully invoke the attorney-client privilege against disclosure of incriminating evidence. Next authors discuss the states' strategy: each filing one suit seeking equitable remedies under theories of restitution/unjust enrichment, indemnity, public nuisance, and injunctive relief to protect the interests of minors, instead of maintaining thousands of product liability claims on behalf of individual smokers. This will be followed by a critique of the industry's response to state actions: political attacks against attorneys general and trial lawyers and charges that the lawsuits would hurt business as well as a variety of legal challenges, including an imaginative but risky defense that if smoking indeed causes disease and attendant health care expenditures, then the tobacco industry ought to be given a credit against those expenditures for the taxes generated by its business and the "savings" which inure to the states from the premature deaths of smokers (the cost of geriatric care, for example). The article will wrap up by impressing on health officials and other readers what is at stake in these actions and what their success or failure will mean for the Medicaid program.

  8. The disguised 'abusive ad hominem' empirically investigated: strategic manoeuvring with direct personal attacks

    NARCIS (Netherlands)

    van Eemeren, F.H.; Garssen, B.; Meuffels, B.

    2012-01-01

    The main finding of a comprehensive empirical research project on the intersubjective acceptability of the pragma-dialectical discussion rules is that ordinary language users judge discussion moves that are considered fallacious from an argumentation-theoretical perspective as unreasonable. In light

  9. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  10. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  11. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  12. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  13. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  14. Strategic cycling: shaking complacency in healthcare strategic planning.

    Science.gov (United States)

    Begun, J; Heatwole, K B

    1999-01-01

    As the conditions affecting business and healthcare organizations in the United States have become more turbulent and uncertain, strategic planning has decreased in popularity. Strategic planning is criticized for stiffling creative responses to the new marketplace and for fostering compartmentalized organizations, adherence to outmoded strategies, tunnel vision in strategy formulation, and overemphasis on planning to the detriment of implementation. However, effective strategic planning can be a force for mobilizing all the constituents of an organization, creating discipline in pursuit of a goal, broadening an organization's perspective, improving communication among disciplines, and motivating the organization's workforce. It is worthwhile for healthcare organizations to preserve these benefits of strategic planning at the same time recognizing the many sources of turbulence and uncertainty in the healthcare environment. A model of "strategic cycling" is presented to address the perceived shortcomings of traditional strategic planning in a dynamic environment. The cycling model facilitates continuous assessment of the organization's mission/values/vision and primary strategies based on feedback from benchmark analysis, shareholder impact, and progress in strategy implementation. Multiple scenarios and contingency plans are developed in recognition of the uncertain future. The model represents a compromise between abandoning strategic planning and the traditional, linear model of planning based on progress through predetermined stages to a masterpiece plan.

  15. ABSTRACTS Preliminary Study of Strategic Inner Cores

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    When a strategic entity attempts to make a dicision, first the project must be m accoroance wlm its strategic framework as well as make the strategic inner cores prominent. The existing theories of development strategy indicate that the formation of the framework can be divided into the following parts: inside and outside environments, purpose, goal, key points, and countermeasures. The strategic inner cores that put forward by this paper is the intensification and advancement for the theory of strategic framework, strategic orientation, strategic vision and main line are inciuded. Appearance of these ideas have improved the theory and enhanced strategic practice.

  16. Strategic thinking for radiology.

    Science.gov (United States)

    Schilling, R B

    1997-08-01

    We have now analyzed the use and benefits of four Strategic Thinking Tools for Radiology: the Vision Statement, the High Five, the Two-by-Two, and Real-Win-Worth. Additional tools will be provided during the tutorial. The tools provided above should be considered as examples. They all contain the 10 benefits outlined earlier to varying degrees. It is extremely important that the tools be used in a manner consistent with the Vision Statement of the organization. The specific situation, the effectiveness of the team, and the experience developed with the tools over time will determine the true benefits of the process. It has also been shown that with active use of the types of tools provided above, teams have learned to modify the tools for increased effectiveness and have created additional tools for specific purposes. Once individuals in the organization become committed to improving communication and to using tools/frameworks for solving problems as a team, effectiveness becomes boundless.

  17. Trust in Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo

    2011-01-01

    This article examines the dynamic and multi-dimensional nature of trust in strategic alliances. Adopting a co-evolutionary approach, I developed a framework to show how trust, conceptualised in different forms, plays distinct roles at various evolutionary stages of the alliance relationship....... Emphasising the multi-dimensional and dynamic role of trust, the framework illustrates how initial levels of a particular type of trust may co-evolve with the alliance and influence subsequent phases of the relationship – either on its own or in combination with other types or dimensions of trust....... The theoretical distinction between trust as antecedent, moderator and outcome during the evolution of the alliance relationship leads to research questions that may guide future empirical research....

  18. Strategizing on innovation systems

    DEFF Research Database (Denmark)

    Jofre, Sergio

    developments enabling proper policy actions. The concept of innovation systems assumes that flows of technology and information among people, companies and institutions are crucial to the innovative process. At national level, innovation and technical development are the result of a complex set of interactions......This paper explores the strategic context of the implementation of the European Institute of Technology (EIT) from the perspective of National Innovation Systems (NIS) and the Triple Helix of University-Government-Industry relationship. The analytical framework is given by a comparative study...... implemented several action plans and programmes aiming at improving its technological and non-technological innovation capability, its performance in the global context is yet week, particularly if compared to rival economies such as Japan and the US (EC, 2008a). A recent initiative to foster Europe...

  19. Strategic research on materials

    International Nuclear Information System (INIS)

    Williams, J.

    1987-01-01

    Strategic research is defined as that which is necessary to support not only an understanding of the phenomenon on which a new technology is based, but also the raft of other technologies needed to exploit the new phenomenon. The theme is illustrated by reference to the development of ceramics of importance to the nuclear industry and in particularly with relation to the AGR. Starting from natural uranium, the underlying and wide ranging research effort devoted to the technology of isotopic enrichment, the investigation of the uranium-oxygen binary system, fabrication of uranium dioxide fuel, interactions between the fuel and stainless steel cans, between the cans and CO 2 coolant and between the coolant and graphite moderator, is outlined. The role of ceramics in stable radioactive waste containment is also briefly mentioned. (author)

  20. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  1. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  2. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  3. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  4. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  5. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  6. Lying for Strategic Advantage: Rational and Boundedly Rational Misrepresentation of Intentions

    OpenAIRE

    Crawford, Vincent P.

    2001-01-01

    Starting from Hendricks and McAfee's (2000) example of the Allies' decision to feint at Calais and attack at Normandy on D-Day, this paper models misrepresentation of intentions to competitors or enemies. Allowing for the possibility of bounded strategic rationality and rational players' responses to it yields a sensible account of lying via costless, noiseless messages. In many cases the model has generically unique pure-strategy sequential equilibria, in which rational players exploit bound...

  7. Towards a strategic approach to special events management in the post-9/11 world

    OpenAIRE

    Jones, G. B.

    2005-01-01

    CHDS State/Local This thesis reviews background related to counterterrorism and law enforcement planning for major special events and it identifies some of the strategic issues that have emerged in special events management since the terrorist attacks of September 11, 2001. It focuses on the subjective and objective components of the systems currently used by DHS and the FBI to categorize and resource special events, and it evaluates whether the current approach to major event planning ...

  8. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  9. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  10. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  11. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  12. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  13. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  14. Strategic Leadership as Determinant of Strategic Change: A Theoretical Review and Propositions

    OpenAIRE

    Ahadiat, Ayi

    2009-01-01

    The strategic change is an issue that closely related to strategic leadership. As this paper elaborates how strategic leadership determines the strategic change, the elaboration of both concept and their relationship are presented through propositions that are developed from the modified Hambrick’s model. Strategic leadership that causes strategic change in terms of strategic process and content within environmental and organizational context will lead to organizational performance as an ulti...

  15. Growing Lots of Food Very Fast Can Hurt our Water for a Long Time, Longer Than You Might Think

    Science.gov (United States)

    Van Meter, K. J.; Basu, N. B.

    2016-12-01

    More people arrive here every day, and we keep trying to grow enough food for them to eat. We try to grow more and more by adding things that can hurt our water and our air. We try to keep track of these things that we add, but we don't understand where it all goes. We don't understand how much is in the ground. We don't understand how much is in the water under the ground. We don't understand how long the water will be bad, even after we stop adding things to help grow more food. Many people have tried to stop adding these things, or to stop these things from getting to the water, and they get sad when they have worked hard to do better but the water stays bad. In our work, we try to help people understand how to make the water better, even when they have to grow a lot of food. We have looked at the ground all around where people grow a lot of food, and have found that some of the bad things stay behind in the ground. This means that even when we work hard to make our water good, the things left in the ground might make our water stay bad for a long time. We tried to find out how long it would take to make our water good if we are working our hardest to be better. It will take longer than you might think, maybe three times as many years as you have fingers.

  16. Vulnerabilities of the security of nuclear material due to cyber attacks

    International Nuclear Information System (INIS)

    Daschil, F.

    2002-01-01

    Full text: The spread of new communication and computer technologies is now the potential for a dedicated, sophisticated adversary to conduct coordinated strikes against the computers, communications systems, and databases of nuclear material security systems. All weapons of cyber war, like viruses, Trojans, access to computer systems are potential risks for the security of nuclear material. New forms of destruction of electronic devices, e.g. Transient Electromagnetic Devices (TED), that could, in the hands of enemies, criminals, or terrorist pose a significant threat to nuclear safety infrastructure components that are based on micro-circuits and computer or micro-processor control. These examples shows the necessity to clearly identify possible risks as: information and communication based disorders and other disruptions and attacks; partial or complete failure of systems causing the risk of unexpected reaction or unmanageable situations; cracking of access codes and elimination of alarm equipment could give easy access to nuclear material; computer manipulation or complete computer and system takeover due to brute force attacks, viruses, Trojans and worms could lead to malfunctions, disruptions and nuclear disasters; computer spying and brute force attacks could give detailed information about technical, organizational and organizational data; combined actions of physical, electronic and computer attacks. The paper gives an overview of potential computer and communication safety gaps and points out strategic implications as the identification of the critical infrastructure, surveillance of computer systems, data access and communication paths. The basic necessity of the development of computer and communication breakdown backup systems as well as measures of precaution against cyber attacks is shown in the paper. (author)

  17. Complex Strategic Choices Applying Systemic Planning for Strategic Decision Making

    CERN Document Server

    Leleur, Steen

    2012-01-01

    Effective decision making requires a clear methodology, particularly in a complex world of globalisation. Institutions and companies in all disciplines and sectors are faced with increasingly multi-faceted areas of uncertainty which cannot always be effectively handled by traditional strategies. Complex Strategic Choices provides clear principles and methods which can guide and support strategic decision making to face the many current challenges. By considering ways in which planning practices can be renewed and exploring the possibilities for acquiring awareness and tools to add value to strategic decision making, Complex Strategic Choices presents a methodology which is further illustrated by a number of case studies and example applications. Dr. Techn. Steen Leleur has adapted previously established research based on feedback and input from various conferences, journals and students resulting in new material stemming from and focusing on practical application of a systemic approach. The outcome is a coher...

  18. Networks and meshworks in strategizing

    DEFF Research Database (Denmark)

    Esbjerg, Lars; Andersen, Poul Houman

    The purpose of this paper is to examine the business network metaphor in relation to strategizing in business and to tentatively propose an alternative metaphor, that of the business meshwork. The paper reviews existing work on strategy and strategizing within the IMP literature, particularly...... the literature on networks and network pictures, and identifies several shortcomings of this work. To develop the notion of business meshworks as an alternative for understanding strategizing practices in business interaction, the paper draws on recent writings within anthropology and the strategy...

  19. The Emerging Strategic Entrepreneurship Field

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Lyngsie, Jacob

    The field of strategic entrepreneurship is a fairly recent one. Its central idea is that opportunity-seeking and advantage-seeking — the former the central subject of the entrepreneurship field, the latter the central subject of the strategic management field — are processes that need...... to be considered jointly. The purpose of this brief chapter is to explain the emergence of SE theory field in terms of a response to research gaps in the neighboring fields of entrepreneurship and strategic management; describe the main tenets of SE theory; discuss its relations to neighboring fields; and finally...

  20. Quarantine after an international biological weapons attack: medical and public health requirements for containment.

    Science.gov (United States)

    Oren, Meir

    2004-11-01

    The world now faces the dreadful possibility of biological weapons attacks by terrorists. Healthcare systems would have to cope with such emergencies should all preemptive measures fail. Information gained from the Global Mercury exercise and the SARS outbreak has shown that containing an outbreak at the start is more effective than reacting to it once it has spread and that containment should be treated both nationally and internationally. On the national level this entails developing rapid and effective methods to detect and identify infected cases, and implementing isolation and control measures to lower the risk of further transmission of the disease while assuring the safety of medical teams and laboratory workers. Strategic contingency plans should incorporate well-defined procedures for hospitalization and isolation of patients, providing regional backup of medical personnel and equipment and maintaining close cooperation between the various bodies in the healthcare system. Quarantine is an effective containment measure, especially if voluntarily imposed. Modern communication systems can help by sending professional teams timely instructions and providing the public with information to reduce panic and stress during quarantine procedures. Informing the public poses a dilemma: finding a balance between giving advance warning of an imminent epidemic outbreak and ascertaining the likelihood of its occurrence. Containment of international bioterrorist attacks depends entirely on close international cooperation to implement national and international strategic contingency plans with free exchange of information and recognition of procedures.

  1. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  2. What You Don't Know Won't Hurt Me: Impression Management Functions of Communication Channels in Relationships.

    Science.gov (United States)

    O'Sullivan, Patrick B.

    2000-01-01

    Addresses the implications of interpersonal communication technology use for personal relationships. Tests elements of an impression management model, which specifies the processes and outcomes of strategic uses of channel and message for self-presentational goals. Supports a functional perspective that views mediated communication channels as a…

  3. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  4. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  5. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  6. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  7. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  8. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  9. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  10. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  11. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  12. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  13. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  14. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  15. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  16. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  17. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  18. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  19. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  20. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  1. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  2. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  3. 7 CFR 25.202 - Strategic plan.

    Science.gov (United States)

    2010-01-01

    ... contributed to the planning process; (3) Identify the amount of State, local, and private resources that will... 7 Agriculture 1 2010-01-01 2010-01-01 false Strategic plan. 25.202 Section 25.202 Agriculture... Procedure § 25.202 Strategic plan. (a) Principles of strategic plan. The strategic plan included in the...

  4. Strategic Vision: A Selected Bibliography

    National Research Council Canada - National Science Library

    Moyer, Jeannette

    2008-01-01

    Strategic Vision is an enduring theme at the U.S. Army War College. Compiled in support of this theme, this selected bibliography reflects books, documents, periodical articles, and a number of web sites...

  5. Strategic Airlift: Our Achilles' Heel

    National Research Council Canada - National Science Library

    Burns, John

    2001-01-01

    ...) deliberate planning and service programmatic processes. The acknowledged shortage of strategic airlift remains the "Achilles' heel" of our nation's power projection capability and is a classic example of a strategy to resource mismatch...

  6. Strategic Military Leaders - Leading Tomorrow

    National Research Council Canada - National Science Library

    Kit, Ng W

    2008-01-01

    .... Four key leadership competencies stand out. We need strategic leaders who are good at doing the right things and doing things right leaders who have the mental agility to choose the correct goals to achieve, the social intelligence to inspire...

  7. Strategic Vision. A Selected Bibliography

    National Research Council Canada - National Science Library

    Gibish, Jane

    2004-01-01

    Strategic Vision is an enduring theme at the U.S. Army War College. Compiled in support of this theme, the following bibliography reflects books, documents, and periodical articles available in our Library...

  8. Strategic Vision: A Selected Bibliography

    National Research Council Canada - National Science Library

    Gibish, Jane

    2001-01-01

    Strategic Vision is an enduring theme at the U.S. Army War College. Compiled in support of this theme, the following bibliography reflects books, documents, and periodical articles in the Army War College Library...

  9. Critical Thinking - A Strategic Competency

    National Research Council Canada - National Science Library

    Gwilliam, Jeffrey

    2002-01-01

    ... accepted, adopted or used by students. This research project explores the reasons for this outcome and provides recommendations and techniques to enhance acceptance of critical thinking as a tool for strategic leaders...

  10. Africa Center for Strategic Studies

    National Research Council Canada - National Science Library

    2000-01-01

    The Africa Center for Strategic Studies supports democratic governance in Africa by offering senior African civilian and military leaders a rigorous academic and practical program in civil-military...

  11. Education and Strategic Research Collaborations

    Science.gov (United States)

    Los Alamos National Laboratory National Security Education Center Image Search Site submit LaboratoryNational Security Education Center Menu Program Offices Energy Security Council New Mexico Consortium Geophysics, Planetary Physics, Signatures Events Collaborations for education and strategic research, student

  12. Strategic Implications of Global Health

    National Research Council Canada - National Science Library

    Monaghan, Karen

    2008-01-01

    "Strategic Implications of Global Health" responds to a request from the Undersecretary of State for Democratization and Global Affairs for an intelligence assessment on the connections between health and U.S. national interests...

  13. Dominant investors and strategic transparency

    NARCIS (Netherlands)

    Perotti, E.C.; von Thadden, E.-L.

    1998-01-01

    This paper studies product market competition under a strategic transparency decision. Dominant investors can influence information collection in the financial market, and thereby corporate transparency, by affecting market liquidity or the cost of information collection. More transparency on a

  14. Dominant investors and strategic transparency

    NARCIS (Netherlands)

    Perotti, E.C.; von Thadden, E.-L.

    1999-01-01

    This paper studies product market competition under a strategic transparency decision. Dominant investors can influence information collection in the financial market, and thereby corporate transparency, by affecting market liquidity or the cost of information collection. More transparency on a

  15. Managing transdisciplinarity in strategic foresight

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Andersen, Per Dannemand; Borch, Kristian

    2010-01-01

    Strategic foresight deals with the long term future and is a transdisciplinary exercise which, among other aims, addresses the prioritization of science and other decision making in science and innovation advisory and funding bodies. This article discusses challenges in strategic foresight...... in relation to transdisciplinarity based on empirical as well as theoretical work in technological domains. By strategic foresight is meant future oriented, participatory consultation of actors and stakeholders, both within and outside a scientific community. It therefore allows multiple stakeholders...... strategic foresight has now been widely accepted for strategy-making and priority-setting in science and innovation policy, the methodologies underpinning it still need further development. Key findings are the identification of challenges, aspects and issues related to management and facilitation...

  16. Strategic Planning for Cardiac Services

    National Research Council Canada - National Science Library

    Gauthier, Gail D

    2008-01-01

    .... This study consists of a strategic analysis of current operations at both facilities that affect the number of cardiothoracic cases performed at both institutions, and analyzing each factor under a process review.

  17. Defeating Terrorism: Strategic Issue Analyses

    National Research Council Canada - National Science Library

    Martin, John

    2002-01-01

    .... This collection of essays represents the initial contributions made by the Institute. They were designed to provide senior Army leadership with context, information, and policy options as they made strategic decisions in the earliest days of the war...

  18. Strategic Audit and Ownership Strategy

    Directory of Open Access Journals (Sweden)

    Mike Franz Wahl

    2015-10-01

    Full Text Available In the new global economy, ownership has become a central issue for organizational performance. Ownership strategy is where corporate governance meets strategic management. Highlighting a knowledge gap in the field of corporate governance, the author is asking the central research question: “how to develop an ownership strategy?” The main purpose of this paper is to answer this original question and develop a better understanding about ownership strategies. Theoretically there is evidence to indicate that there is a link between strategic audit and ownership strategy. Analyzing firm cases from Estonia allows concluding that the strategic audit is useful for developing systemically ownership strategies, which in turn could be a realistic alternative for complete contracts. The use of strategic audits gives the business owner an opportunity to analyze his own actions and behavior, learning, managing knowledge, and finally clearly expressing his will in the form of an ownership strategy.

  19. Maintenance Process Strategic Analysis

    Science.gov (United States)

    Jasiulewicz-Kaczmarek, M.; Stachowiak, A.

    2016-08-01

    The performance and competitiveness of manufacturing companies is dependent on the availability, reliability and productivity of their production facilities. Low productivity, downtime, and poor machine performance is often linked to inadequate plant maintenance, which in turn can lead to reduced production levels, increasing costs, lost market opportunities, and lower profits. These pressures have given firms worldwide the motivation to explore and embrace proactive maintenance strategies over the traditional reactive firefighting methods. The traditional view of maintenance has shifted into one of an overall view that encompasses Overall Equipment Efficiency, Stakeholders Management and Life Cycle assessment. From practical point of view it requires changes in approach to maintenance represented by managers and changes in actions performed within maintenance area. Managers have to understand that maintenance is not only about repairs and conservations of machines and devices, but also actions striving for more efficient resources management and care for safety and health of employees. The purpose of the work is to present strategic analysis based on SWOT analysis to identify the opportunities and strengths of maintenance process, to benefit from them as much as possible, as well as to identify weaknesses and threats, so that they could be eliminated or minimized.

  20. CINT 2020 Strategic Plan

    Energy Technology Data Exchange (ETDEWEB)

    Shinn, Neal D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-12-01

    CINT’s role is to enable world-leading science towards realizing these benefits and our strategic objectives describe what is needed to deliver on this promise. As a vibrant partnership between Los Alamos National Laboratory (LANL) and Sandia National Laboratories (SNL), CINT leverages the unmatched scientific and engineering expertise of our host DOE Laboratories in an Office of Science open-access user facility to benefit hundreds of researchers annually. We have world-leading scientific expertise in four thrust areas, as described in section 1, and specialized capabilities to create, characterize and understand nanomaterials in increasingly complex integrated environments. Building upon these current strengths, we identify some of the capabilities and expertise that the nanoscience community will need in the future and that CINT is well positioned to develop and offer as a user facility. These include an expanding portfolio of our signature Discovery Platforms that can be used alone or as sophisticated “experiments within an experiment”; novel synthetic approaches for exquisitely heterostructured nanowires, nanoparticles and quasi-two-dimensional materials; ultra-high resolution spectroscopic techniques of nanomaterial dynamics; in situ microscopies that provide realtime, spatially-resolved structure/property information for increasingly complex materials systems; advanced simulation techniques for integrated nanomaterials; and multi-scale theory for interfaces and dynamics.

  1. Personal strategic planning

    Directory of Open Access Journals (Sweden)

    Rolando Juan Soliz Estrada

    2011-01-01

    Full Text Available Reconciling personal skills with the demands of a globalized and competitive market has become a pre-requisite for professionals aspiring for success in their careers. The quest for personal fulfillment has encouraged people to search for tools which develop their talents and balance their efforts, in order to achieve a better, happier and healthier life. As an option, planning, which historically was restricted to being an organizational tool, today has also come to be used by individuals who desire personal success. In this way, the objective of this article is to develop a model of Personal Strategic Planning which takes into account the various operation areas and human performance. The proposed model is divided into: Individual Planning, Professional Planning, Family Planning, Personal Business Planning and Political Participation, Social and Religious/Spiritual Planning and their respective fields. In order to analyse and validate the model, exploratory research of a qualitative nature was used through primary and secondary data sources. From the results obtained by the model, it is possible to consider their importance to future research, once the studied areas can be developed in subsequent works.

  2. Strategic Leadership of Corporate Sustainability

    DEFF Research Database (Denmark)

    Strand, Robert

    2014-01-01

    Strategic leadership and corporate sustainability have recently come together in conspicuously explicit fashion through the emergence of top management team (TMT) positions with dedicated corporate sustainability responsibilities. These TMT positions, commonly referred to as 'Chief Sustainability......? What effects do corporate sustainability TMT positions have at their organizations? We consider these questions through strategic leadership and neoinstitutional theoretical frameworks. Through the latter, we also engage with Weberian considerations of bureaucracy. We find that the reasons why...

  3. Always Strategic: Jointly Essential Landpower

    Science.gov (United States)

    2015-02-01

    local deployment of ground forces typi- cally requires a quality of local social and cultural en- gagement that can be strategically vital for American...substantially in COIN mode is inherently hazardous; in good part, the peril reposes in the in- exorable and potentially strategically weakening ef- fect of the...along in earnest pursuit of particularly favored narratives, but social science for crowd psychology does not carry high and con- vincing promise

  4. Institutional Profiles: Some Strategic Tools

    Directory of Open Access Journals (Sweden)

    Frans van Vught

    2014-04-01

    Full Text Available In this paper we argue that both internal and external pressures and conditions urge contemporary higher education institutions to carefully think through their institutional profiles positions in domestic and global higher education contexts. We subsequently analyse strategic positioning from the strategic management literature and offer four tools — mapping, multi-dimensional ranking, benchmarking and degree profiling — to assist higher education institutions in their profiling and positioning strategies.

  5. Strengthening Strategic Stability with Russia

    Science.gov (United States)

    2017-01-01

    political stabil - ity. From the current Russian perspective, both of these compo- nents were thrown out of balance in the 1990s, creating instability ...part of the United States in the early 2000s, stra- tegic stability was replaced with instability and military- political defeats for Russia.27...overall strategic balance of the world political system.8 (As discussed later, the official Russian definition of strategic stability is broadening in

  6. The neoliberalisation of strategic spatial planning

    DEFF Research Database (Denmark)

    Olesen, Kristian

    2014-01-01

    scales, and partly through the normalisation of neoliberal discourses in strategic spatial planning processes. This paper analyses the complex relationship, partly of unease and partly of coevolution, between neoliberalism and strategic spatial planning. Furthermore, the paper discusses the key......Strategic spatial planning practices have recently taken a neoliberal turn in many northwestern European countries. This neoliberalisation of strategic spatial planning has materialised partly in governance reforms aiming to reduce or abolish strategic spatial planning at national and regional...... challenges for strategic spatial planning in the face of neoliberalism and argues for a need to strengthen strategic spatial planning’s critical dimension....

  7. STRATEGIC MANAGEMENT ACCOUNTING: DEFINITION AND TOOLS

    Directory of Open Access Journals (Sweden)

    Nadiia Pylypiv

    2017-08-01

    Full Text Available The article is dedicated to learning the essence of the definition of “strategic management accounting” in domestic and foreign literature. Strategic management accounting tools has been studied and identified constraints that affect its choice. The result of the study is that the understanding of strategic management accounting was formed by authors. The tools which are common for both traditional managerial accounting and strategic and the specific tools necessary for efficient implementation of strategic management accounting have been defined. Keywords: strategic management accounting, definition, tools, strategic management decisions.

  8. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  9. Strategic aspects of innovation management

    Directory of Open Access Journals (Sweden)

    Baruk Jerzy

    2017-12-01

    Full Text Available Innovations are regarded as the main factor for the development of organizations, regions and whole economies. In practice the innovativeness of economic entities is limited by many factors of internal and external origin. Among the internal factors there are factors associated with management itself focusing the attention of managers on the current problems, limited utilization of modern methods of management, especially strategic management and innovation management. In this publication the emphasis was put on the discussion of the essence of strategic approach to innovation management; the essence of strategic innovations and their role in the development of organizations; three model solutions were proposed, they facilitate: rationalization of decision-making processes for the selection of the strategy of innovative activity; making rational decisions with regard to the moments for the implementation of strategic and facilitating innovations; making rational decisions based on the cycle of strategic innovation in the horizontal and vertical system. Thus, the goal of this publication is to propose a strategic approach to innovation management based not on an intuitive approach, but on a rational approach using chosen model solutions.

  10. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  11. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  12. The analysis of strategic planning in transport

    OpenAIRE

    Išoraitė, Margarita

    2006-01-01

    Strategic planning is a process whish brings to life the mission and vision of an enterprise. The article analyses the following issues: 1. Concepts of strategy. 2. Components of strategic planning. 3. The basis of strategic planning. 4. Formal strategic planning. 5. Tools used in strategy development. 6. Problems of strategic planning. Strateginis planavimas yra procesas, kurio metu įgyvendinami įmonės tikslai. Šiame straipsnyje nagrinėjama: strategijos sąvoka; strateginio planavimo kompo...

  13. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  14. Guide for mass prophylaxis of hospital employees in preparation for a bioterrorist attack.

    Science.gov (United States)

    Lee, Jeremy John; Johnson, Shannon John; Sohmer, Michael J

    2009-03-15

    The key elements required for the health-system pharmacist to prepare and implement a hospital-based mass prophylaxis distribution effort for hospital employees are described. A bioterrorist attack may involve multiple jurisdictions which would necessitate a regional response. Pharmacists should collaborate not only with colleagues in their immediate areas, but also with pharmacists and emergency-management planners in neighboring counties and jurisdictions. Pharmacists must also develop antibiotic drug selection protocols and define the quantity needed to maintain hospital operations after a bioterrorist attack. Once the desired antibiotics have been selected and the number of employees has been determined, along with the length of prophylaxis therapy, it should be determined how much money will be needed to purchase and store enough medications to meet the need. Next, provisions must be made to acquire and store the antibiotic cache, with attention paid to cache rotation and packaging and repackaging recommendations. A detailed procedure for the deployment of an antibiotic cache must be developed. This procedure should include job descriptions and job action sheets for deployment team members and plans for receiving and dispensing antibiotics from the Strategic National Stockpile. Once the employee prophylaxis procedure is developed, staff must be educated about it, and exercises should be conducted to identify possible weaknesses in the procedure. Health-system pharmacists should play an active role in designing and implementing an antibiotic prophylaxis plan for employees for a potential bioterrorist attack. Understanding and following procedures provided in the tool kit are critical to their successful readiness.

  15. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  16. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  17. IPPF's strategic vision 2000.

    Science.gov (United States)

    Mahler, H

    1994-09-01

    The International Planned Parenthood Federation (IPPF) supports the objectives of the International Conference on Population and Development. The draft conference document displays the linkages between women's rights, poverty, population, and sustainable development. In the next two to three decades the global population will grow by a staggering 50% and that reality requires sustained socioeconomic growth. The 6 components of IPPF's Strategic Vision 2000 and the action agenda for meeting these challenges are as follows: 1) The small family is rapidly becoming the cultural norm everywhere, as more than 60% of all fertile women and men are using safe and effective contraceptive methods. 2) Sexual and reproductive health is becoming an integral part of the physical, mental, and social health culture and not just the absence of pregnancy, disease or injury. The members of IPPF have been developing programs concentrating on adolescent sexuality. IPPF is also concerned about HIV, AIDS and sexually transmitted diseases as they relate to the work undertaken by family planning associations. 3) The quality of care has been heightened by the right of informed choice, service sustainability, and the maintenance of the highest standards. 4) Vigorous programs are in place to eliminate unsafe abortion and to increase access to safe abortion. 5) Young people are systematically supported to give voice to the need for understanding their sexuality and services. There are currently more than 500 million young women and men between the ages of 15 and 19, and their numbers increase for a long time to come. 6) Women are fast moving towards full participation in all aspects of local and global development demanding reproductive rights. IPPF and its associations, through Vision 2000, are committed to the objective of sexual and reproductive health at the national and international levels.

  18. Plants know where it hurts: root and shoot jasmonic acid induction elicit differential responses in Brassica oleracea.

    Directory of Open Access Journals (Sweden)

    Tom O G Tytgat

    Full Text Available Plants respond to herbivore attack by rapidly inducing defenses that are mainly regulated by jasmonic acid (JA. Due to the systemic nature of induced defenses, attack by root herbivores can also result in a shoot response and vice versa, causing interactions between above- and belowground herbivores. However, little is known about the molecular mechanisms underlying these interactions. We investigated whether plants respond differently when roots or shoots are induced. We mimicked herbivore attack by applying JA to the roots or shoots of Brassica oleracea and analyzed molecular and chemical responses in both organs. In shoots, an immediate and massive change in primary and secondary metabolism was observed. In roots, the JA-induced response was less extensive and qualitatively different from that in the shoots. Strikingly, in both roots and shoots we also observed differential responses in primary metabolism, development as well as defense specific traits depending on whether the JA induction had been below- or aboveground. We conclude that the JA response is not only tissue-specific but also dependent on the organ that was induced. Already very early in the JA signaling pathway the differential response was observed. This indicates that both organs have a different JA signaling cascade, and that the signal eliciting systemic responses contains information about the site of induction, thus providing plants with a mechanism to tailor their responses specifically to the organ that is damaged.

  19. Children's strategic theory of mind.

    Science.gov (United States)

    Sher, Itai; Koenig, Melissa; Rustichini, Aldo

    2014-09-16

    Human strategic interaction requires reasoning about other people's behavior and mental states, combined with an understanding of their incentives. However, the ontogenic development of strategic reasoning is not well understood: At what age do we show a capacity for sophisticated play in social interactions? Several lines of inquiry suggest an important role for recursive thinking (RT) and theory of mind (ToM), but these capacities leave out the strategic element. We posit a strategic theory of mind (SToM) integrating ToM and RT with reasoning about incentives of all players. We investigated SToM in 3- to 9-y-old children and adults in two games that represent prevalent aspects of social interaction. Children anticipate deceptive and competitive moves from the other player and play both games in a strategically sophisticated manner by 7 y of age. One game has a pure strategy Nash equilibrium: In this game, children achieve equilibrium play by the age of 7 y on the first move. In the other game, with a single mixed-strategy equilibrium, children's behavior moved toward the equilibrium with experience. These two results also correspond to two ways in which children's behavior resembles adult behavior in the same games. In both games, children's behavior becomes more strategically sophisticated with age on the first move. Beyond the age of 7 y, children begin to think about strategic interaction not myopically, but in a farsighted way, possibly with a view to cooperating and capitalizing on mutual gains in long-run relationships.

  20. Strategic Decision Making Paradigms: A Primer for Senior Leaders

    Science.gov (United States)

    2009-07-01

    decision making . STRATEGIC DECISION MAKING Strategic Change: There are several strategic...influenced by stakeholders outside of the organization. The Ontology of Strategic Decision Making . Strategic decisions are non-routine and involve...Coates USAWC, July 2009 5 The Complexity of Strategic Decision Making Strategic decisions entail “ill-structured,”6 “messy” or

  1. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  2. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  3. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  4. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  5. Strategic management thinking and practice in the public sector: A strategic planning for all seasons?

    OpenAIRE

    Johnsen, Åge

    2014-01-01

    This paper explores how strategic management thinking manifests itself in strategic management practice in the public sector. Mintzberg’s framework of 10 strategic management schools of thought is chosen for mapping strategic management thinking. The paper analyses a convenience sample of 35 strategic management processes, observation of an agency’s strategy reformulation process and interviews of managers in the public sector in Norway for informing the discussion. Strategic planning is heav...

  6. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  7. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  8. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  9. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  10. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  11. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  12. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  13. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  14. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  15. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  16. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  17. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  18. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  19. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  20. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  1. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  2. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  3. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  4. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  5. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  6. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  7. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  8. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  9. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  10. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  11. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  12. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  13. NATO's Strategic Partnership with Ukraine

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    Russian actions in Ukraine have altered the security land- scape in Europe, highlighting a renewed emphasis on the differences between members and non-members. In this context, NATO must a) create a strategic understanding of partnerships as something that can be transformative, even if it will n......Russian actions in Ukraine have altered the security land- scape in Europe, highlighting a renewed emphasis on the differences between members and non-members. In this context, NATO must a) create a strategic understanding of partnerships as something that can be transformative, even...... if it will not lead to membership in the short or even long term, and b) build such a strategic relationship with Ukraine. In sum, the Russian-induced Ukraine crisis should spur the reform of NATO partnerships – with Ukraine as a case in point....

  14. The Test of Strategic Culture

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja

    2005-01-01

    explains the apparently contradictory aspects of Germany’s stance on Iraq by identifying two competing strands within Germany’s strategic culture. It concludes that the German refusal signals neither a reversion to a pacifist stance nor that Germany is in a process of shedding the bonds and alliances......Germany was the first country to issue a categorical refusal to support the US-led war in Iraq. Some have interpreted this as the result of a clash between the strategic cultures of Germany and the USA, others as a sign that a more nationalistic and assertive Germany is emerging. This article...... that have so far framed the reunified Germany’s military policy. Iraq simply showed that Germany, like most other countries, has conditions that have to be met – in Germany’s case, conditions flowing from the coexistence of two competing schools of thought within Germany’s strategic culture....

  15. Limited rationality and strategic interaction

    DEFF Research Database (Denmark)

    Fehr, Ernst; Tyran, Jean-Robert

    2008-01-01

    Much evidence suggests that people are heterogeneous with regard to their abilities to make rational, forward-looking decisions. This raises the question as to when the rational types are decisive for aggregate outcomes and when the boundedly rational types shape aggregate results. We examine...... this question in the context of a long-standing and important economic problem: the adjustment of nominal prices after an anticipated monetary shock. Our experiments suggest that two types of bounded rationality-money illusion and anchoring-are important behavioral forces behind nominal inertia. However......, depending on the strategic environment, bounded rationality has vastly different effects on aggregate price adjustment. If agents' actions are strategic substitutes, adjustment to the new equilibrium is extremely quick, whereas under strategic complementarity, adjustment is both very slow and associated...

  16. Strategic planning in healthcare organizations.

    Science.gov (United States)

    Rodríguez Perera, Francisco de Paula; Peiró, Manel

    2012-08-01

    Strategic planning is a completely valid and useful tool for guiding all types of organizations, including healthcare organizations. The organizational level at which the strategic planning process is relevant depends on the unit's size, its complexity, and the differentiation of the service provided. A cardiology department, a hemodynamic unit, or an electrophysiology unit can be an appropriate level, as long as their plans align with other plans at higher levels. The leader of each unit is the person responsible for promoting the planning process, a core and essential part of his or her role. The process of strategic planning is programmable, systematic, rational, and holistic and integrates the short, medium, and long term, allowing the healthcare organization to focus on relevant and lasting transformations for the future. Copyright © 2012 Sociedad Española de Cardiología. Published by Elsevier Espana. All rights reserved.

  17. 1 küsimus noorele juhile : Kuidas on kõige parem tähtsad põhimõtted töötajateni viia? / Kaarel Oja, Reet Roos, Martin Hurt... [jt.

    Index Scriptorium Estoniae

    2010-01-01

    Küsimusele vastavad Teater NO99 tegevjuht Kaarel Oja, meediaagentuuri Inspired, tööõigusbüroo ja trükikoja Digiprint omanik Reet Roos, kaitseministeeriumi asekantsler Martin Hurt, SOL Eesti personalijuht Evely Ellert ning investeerimis- ja varahalduslahendusi pakkuva Sampo Life juhatuse liige Erkki Sadam

  18. IS and Business Leaders' Strategizing

    DEFF Research Database (Denmark)

    Hansen, Anne Mette

    adopted an alternative view in which IS strategy represents a shared understanding of the role of IS within the organization. The assumption in these studies is that IS and business leaders constantly negotiate their understandings of the role of IS and strategic objectives as a basis for investment...... to the IS strategy literature by providing a detailed and rich description of IS and business leaders’ learning during IS strategizing. Second, it informs organizational learning theory by providing fundamental new insights to the 4I framework, extending our knowledge of its core constructs and revealing a potential...

  19. The Nature of Strategic Communication

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger; Svensson, Emma

    2017-01-01

    In this article, we address and challenge Nothhaft’s (2016) recent attempt to revive the field of strategic communication through an application of approaches and principles from the studies of the human mind. Instead of an indiscriminate import of a natural science perspective, we argue...... that the shortcomings of the field are dealt with more adequately by recognizing and embracing the immense complexity at play in all dimensions of strategic communication. The challenge is to understand the multiple goals and dimensions of the field, to acknowledge the principle of recursivity in all communicative...

  20. Strategic behaviour under regulatory benchmarking

    Energy Technology Data Exchange (ETDEWEB)

    Jamasb, T. [Cambridge Univ. (United Kingdom). Dept. of Applied Economics; Nillesen, P. [NUON NV (Netherlands); Pollitt, M. [Cambridge Univ. (United Kingdom). Judge Inst. of Management

    2004-09-01

    In order to improve the efficiency of electricity distribution networks, some regulators have adopted incentive regulation schemes that rely on performance benchmarking. Although regulation benchmarking can influence the ''regulation game,'' the subject has received limited attention. This paper discusses how strategic behaviour can result in inefficient behaviour by firms. We then use the Data Envelopment Analysis (DEA) method with US utility data to examine implications of illustrative cases of strategic behaviour reported by regulators. The results show that gaming can have significant effects on the measured performance and profitability of firms. (author)

  1. Strategic campaigns and redistributive politics

    DEFF Research Database (Denmark)

    Schultz, Christian

    2007-01-01

    The article investigates strategic, informative campaigning by two parties when politics concern redistribution. Voters are uncertain about whether parties favour special groups. Parties will target campaigns on groups where most votes are gained by informing about policies. In equilibrium......, campaigning will be most intensive in groups where the uncertainty is largest and where voters are most mobile, most likely to vote, most receptive to campaigns and relatively uninformed initially. These groups will become more informed about policy. Parties will therefore gain more votes by treating...... these groups well so these groups will gain from strategic campaigning. Welfare effects are assessed...

  2. The strategic labor allocation proces : a model of strategic HRM

    NARCIS (Netherlands)

    Bax, Erik H.

    2002-01-01

    In this article the Strategic Labor Allocation Process model (SLAP) is described. The model relates HR-strategies to structure, culture and task technology to HR-policies like recruitment, appraisal and rewarding, to business strategy and to socio-cultural, economic, institutional and technological

  3. Conditional Cooperation : Disentangling Strategic from Non-Strategic Motivations

    NARCIS (Netherlands)

    Reuben, E.; Suetens, S.

    2008-01-01

    We use a novel experimental design to examine the role of reputational concerns in explaining conditional cooperation in social dilemmas. By using the strategy method in a repeated sequential prisoners’ dilemma in which the probabilistic end is known, we can distinguish between strategically and

  4. Strategic Planning and Strategic Thinking Clothed in STRATEGO

    Science.gov (United States)

    Baaki, John; Moseley, James L.

    2011-01-01

    This article shares experiences that participants had playing the game of STRATEGO and how the activity may be linked to strategic planning and thinking. Among the human performance technology implications of playing this game are that gamers agreed on a framework for rules, took stock on where they wanted to go in the future, and generated a risk…

  5. Hurting without Hitting

    DEFF Research Database (Denmark)

    He, Yinghua; Nielsson, Ulf; Wang, Yonglei

    2017-01-01

    Political tension that causes diplomatic strain rarely escalates into direct violence or war. This paper identifies the economic effects of such non-violent political tension by examining Taiwan’s sovereignty debate. Non-violent events harming the relationship with mainland China lead to an avera...

  6. The strategic use of inserts in the Brazilian presidential elections

    Directory of Open Access Journals (Sweden)

    Felipe Borba

    2012-01-01

    Full Text Available The aim of this article is to analyze the communication strategies of presidential candidates during the elections held in 2006 and 2010. The focus is on the strategic component of electoral inserts and the methodology consists of investigating how candidates choose to distribute these inserts in the programming of television networks. The results indicate that the candidates pursue different strategies influenced basically by three variables: electoral legislation, their standing in polls and the difference of resources available. In parallel, the article debates the role of the regulation of electoral advertising and how this set of rules influences the level of information of campaigns, the occurrence of attacks, and party strategies. Overall, 2,993 electoral inserts were examined.

  7. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  8. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  9. Propagating Mixed Uncertainties in Cyber Attacker Payoffs: Exploration of Two-Phase Monte Carlo Sampling and Probability Bounds Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2016-09-16

    Securing cyber-systems on a continual basis against a multitude of adverse events is a challenging undertaking. Game-theoretic approaches, that model actions of strategic decision-makers, are increasingly being applied to address cybersecurity resource allocation challenges. Such game-based models account for multiple player actions and represent cyber attacker payoffs mostly as point utility estimates. Since a cyber-attacker’s payoff generation mechanism is largely unknown, appropriate representation and propagation of uncertainty is a critical task. In this paper we expand on prior work and focus on operationalizing the probabilistic uncertainty quantification framework, for a notional cyber system, through: 1) representation of uncertain attacker and system-related modeling variables as probability distributions and mathematical intervals, and 2) exploration of uncertainty propagation techniques including two-phase Monte Carlo sampling and probability bounds analysis.

  10. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  11. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  12. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  13. Timing of birth: Parsimony favors strategic over dysregulated parturition.

    Science.gov (United States)

    Catalano, Ralph; Goodman, Julia; Margerison-Zilko, Claire; Falconi, April; Gemmill, Alison; Karasek, Deborah; Anderson, Elizabeth

    2016-01-01

    The "dysregulated parturition" narrative posits that the human stress response includes a cascade of hormones that "dysregulates" and accelerates parturition but provides questionable utility as a guide to understand or prevent preterm birth. We offer and test a "strategic parturition" narrative that not only predicts the excess preterm births that dysregulated parturition predicts but also makes testable, sex-specific predictions of the effect of stressful environments on the timing of birth among term pregnancies. We use interrupted time-series modeling of cohorts conceived over 101 months to test for lengthening of early term male gestations in stressed population. We use an event widely reported to have stressed Americans and to have increased the incidence of low birth weight and fetal death across the country-the terrorist attacks of September 2001. We tested the hypothesis that the odds of male infants conceived in December 2000 (i.e., at term in September 2001) being born early as opposed to full term fell below the value expected from those conceived in the 50 prior and 50 following months. We found that term male gestations exposed to the terrorist attacks exhibited 4% lower likelihood of early, as opposed to full or late, term birth. Strategic parturition explains observed data for which the dysregulated parturition narrative offers no prediction-the timing of birth among gestations stressed at term. Our narrative may help explain why findings from studies examining associations between population- and/or individual-level stressors and preterm birth are generally mixed. © 2015 Wiley Periodicals, Inc.

  14. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  15. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  16. Implementation Of Strategic Management: The Challenges And ...

    African Journals Online (AJOL)

    . Only the discerning organizations can manage the changes and vagaries through the implementation of effective strategic management. This article examines the concept of strategic management and its implication for organizational ...

  17. Preemption in U.S. Strategic Culture

    National Research Council Canada - National Science Library

    Marca, Daniela

    2004-01-01

    .... foreign and strategic policy. In essence, this thesis concludes that the Bush doctrine of preemption is inconsistent with the American strategic culture and view of the use of force displayed throughout the American foreign...

  18. General Kenney as a Strategic Leader

    National Research Council Canada - National Science Library

    Manuel, Kent

    1996-01-01

    .... The paper analyzes General Kenney's strategic leadership style, framed within the six strategic leadership tasks defined in the Army's draft FM 22-1-3. These tasks are: provide vision; shape culture...

  19. Senior Strategic Outreach and Engagement Officer | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Senior Strategic Outreach and Engagement Officer provides strategic advice ... the third one in the area of knowledge management and the forth one in the area ... or the International Research Initiative on Adaptation to Climate Change.

  20. GAO Strategic Plan 2007-2012

    National Research Council Canada - National Science Library

    2007-01-01

    In keeping with GAO's commitment to update its strategic plan at least once every 3 years consistent with the Government Performance and Results Act this strategic plan describes our proposed goals...

  1. Implementing Knowledge Management as a Strategic Initiative

    National Research Council Canada - National Science Library

    DiGiacomo, Joseph

    2003-01-01

    ... are: leadership, organization, technology and leaning. Knowledge management was one of five strategic initiatives in the overall strategic plan, which was developed using Kaplan and Norton's Balanced Scorecard methodology...

  2. The War in Afghanistan: A Strategic Analysis

    National Research Council Canada - National Science Library

    Herring, G

    2003-01-01

    This paper is a strategic analysis of the war in Afghanistan. It begins by articulating the United States' strategic objectives for the war, the approaches taken to achieve those objectives, and the resources employed in each approach...

  3. Strategic Leadership in the Transformation Age

    National Research Council Canada - National Science Library

    Kidd, William

    2002-01-01

    ... retained. This paper describes how The Army is addressing the ATLDP identified disconnects in five strategic baseline skills and offers six more skill sets developed by the Strategic Leader Task Force...

  4. The Danish experience of strategic environment assesment

    DEFF Research Database (Denmark)

    Kørnøv, Lone

    2004-01-01

    The article recounts a number of examples of the Danish experience with Strategic Environmental Assessment (SEA).......The article recounts a number of examples of the Danish experience with Strategic Environmental Assessment (SEA)....

  5. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  6. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  7. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  8. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  9. Strategic Planning in Irish Quantity Surveying Pracitces

    OpenAIRE

    Murphy, Roisin

    2011-01-01

    The role and usefulness of strategic planning has been well documented over several decades of strategic management research. Despite the significant body of existing knowledge in the field of strategic planning, there remains a paucity of investigation into the construction sector, specifically in Professional Service Firms (PSF’s) operating within it. The aim of this research was to ascertain the type, scope and extent of strategic planning within Irish Quantity Surveying (QS) practices and...

  10. Crisis - Strategic Management in Public Relation

    OpenAIRE

    Saari Ahmad

    2012-01-01

    This is a concept paper to explore the strategic management approaches in public relations during crisis. The main objective of this article is to identify the most effective action plan for Public relation. The review of the strategic management in public relations literature reveals that the relationship between strategic management and public relations is still vague. Four stages were identified in the process of establishing the action plan for public relations and eleven strategic action...

  11. STRATEGIC MANAGEMENT ACCOUNTING: DEFINITION AND TOOLS

    OpenAIRE

    Pylypiv, Nadiia; Pіatnychuk, Iryna

    2017-01-01

    The article is dedicated to learning the essence of the definition of “strategic management accounting” in domestic and foreign literature. Strategic management accounting tools has been studied and identified constraints that affect its choice. The result of the study is that the understanding of strategic management accounting was formed by authors. The tools which are common for both traditional managerial accounting and strategic and the specific tools necessary for efficient implementati...

  12. Strategic Management in Times of Crisis

    OpenAIRE

    Groh, Maximilian

    2014-01-01

    This aim of this article is to identify unusual strategic-management matters in times of crisis. The research scope is strategic management processes, the characteristics of the processes and methods of strategic crisis management. The study reports research on the contemporary state of strategic crisis-management problems and provides an analysis of some theoretical and methodological principles. The analysis includes a classification of the main problems which must be solved for efficient, ...

  13. STRATEGIC MANAGEMENT OF A TERRITORIAL DISTRIBUTED COMPLEX

    OpenAIRE

    Vidovskiy L. A.; Yanaeva M. V.; Murlin A. G.; Murlinа V. A.

    2015-01-01

    The article is devoted to strategic management and implementation of the strategy. Management strategy is based on the management of strategic potential of the enterprise. The strategic potential of the company generates only those resources that can be changed because of strategic decisions. Analysis of the potential of the enterprise should cover almost all spheres of its activity: the enterprise management, production, marketing, finance, human resources. The article has designed a system ...

  14. Rewarding Stakeholders: The Perspective of Strategic Entrepreneurship

    OpenAIRE

    Dissanayake, Srinath

    2013-01-01

    Prime concern on stakeholders is a crucial aspect in each business success. Among the wide spectrum of organizational strategies, Strategic Entrepreneurship pays a greater emphasis. This essay details practical as well as empirical grounds with regard to the notion of Strategic Entrepreneurship. Focally, strategic Entrepreneurship is an integration of Entrepreneurship (Opportunity Seeking Behavior) and Strategic Management (Advantage Seeking Behavior). Thus I conclude, an amalgamation of Str...

  15. Strategic entrepreneurship in the future: Theoretical views

    Directory of Open Access Journals (Sweden)

    Martinović Milan

    2016-01-01

    Full Text Available The paper describes the role and importance of strategy in contemporary entrepreneurship, which operates under conditions of rapid change. Strategic Enterprise includes a set of entrepreneurial actions undertaken for the purpose of strategic perspective. It describes the key characteristics of modern entrepreneurs with strategic emphasis on the needs of the strategic analysis of business opportunities and possibilities of business enterprises in the specific conditions, at the beginning of the third millennium.

  16. Strategic Groups and Banks’ Performance

    Directory of Open Access Journals (Sweden)

    Gregorz Halaj

    2009-06-01

    Full Text Available The theory of strategic groups predicts the existence of stable groups of companies that adopt similar business strategies. The theory also predicts that groups will differ in performance and in their reaction to external shocks. We use cluster analysis to identify strategic groups in the Polish banking sector. We find stable groups in the Polish banking sector constituted after the year 2000 following the major privatisation and ownership changes connected with transition to the mostly-privately-owned banking sector in the late 90s. Using panel regression methods we show that the allocation of banks to groups is statistically significant in explaining the profitability of banks. Thus, breaking down the banks into strategic groups and allowing for the different reaction of the groups to external shocks helps in a more accurate explanation of profits of the banking sector as a whole.Therefore, a more precise ex ante assessment of the loss absorption capabilities of banks is possible, which is crucial for an analysis of banking sector stability. However, we did not find evidence of the usefulness of strategic groups in explaining the quality of bank portfolios as measured by irregular loans over total loans, which is a more direct way to assess risks to financial stability.

  17. Learning in strategic technology alliances

    NARCIS (Netherlands)

    Schoenmakers, W.W.M.E.; Duysters, G.M.

    2006-01-01

    In this paper we examine the influence of strategic technology alliances on organisational learning. From an empirical perspective we examine the pre- and post-alliance knowledge bases of allying firms. We find that the pre-alliance knowledge base overlap of the allying firms has an inverted

  18. Consultancy on Strategic Information Planning.

    Science.gov (United States)

    Pejova, Zdravka, Ed.; Horton, Forest W., Ed.

    At the workshop, better management through strategic planning of information and consultancy was discussed as one way in which developing and Eastern European countries could tackle the complex information problems they are facing during the transition to a market economy. The sixteen papers in this volume are grouped into three basic categories:…

  19. Strategic Planning: Shaping Future Success

    Science.gov (United States)

    2016-09-01

    fielding, the PM may also be planning for future increments , sustainment and other long-term ef- forts. Strategic planning can help the PM position these...introduced the Planning, Programming, and Budgeting System (PPBS) to the DoD. Prior to that, the DoD’s budget - ing focused on areas such as overhead

  20. Strategic Management in Hybrid Organizations

    NARCIS (Netherlands)

    Joldersma, F.; Winter, V.

    2002-01-01

    Many public service organizations have to deal with rapidly changing environments. Government offers less financial security than in the past and stimulates organizations to develop a market orientation. The focus of this article is explaining the shape of strategic management in public service