WorldWideScience

Sample records for hurts strategic attack

  1. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    Science.gov (United States)

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2017-05-01

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  2. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  3. Why HURT?

    DEFF Research Database (Denmark)

    Buse, Dawn C; Sollars, C Mark; Steiner, Timothy J;

    2012-01-01

    in primary care, where most people with headache receive medical care. In support, LTB is developing a range of headache management aids for primary care. Presently, no single instrument covers the range of assessment and decision-making necessary for successful headache management, and few make......The Global Campaign against Headache, directed by the non-governmental organization Lifting The Burden (LTB) in official relations with the World Health Organization (WHO), aspires to reduce the global burden of headache. Ultimately this calls for improvements in headache management, largely......, perceptions of headache "control" and knowledge of diagnosis. This instrument is intended not only to evaluate current headache outcomes and assess the need for and response to treatment, but also to provide guidance on appropriate actions towards treatment optimization. The first draft of the HURT...

  4. Inemisest / Jakob Hurt

    Index Scriptorium Estoniae

    Hurt, Jakob, 1839-1907

    2005-01-01

    Ilm.: Tarto Kalender 1868, lk. 21-37 ; Tarto Kalender 1869, lk. 21-32 ; Tarto Kalender 1870, lk. 21-34 ; Tarto Kalender 1873, lk. 41-48 ; J. Hurt. Inemisest. Tartu, 1868 ; J. Hurt. Inemisest. Faksiimiletrükk. Tallinn, 1990

  5. Can Loud Music Hurt My Ears?

    Science.gov (United States)

    ... or Too Short All About Puberty Can Loud Music Hurt My Ears? KidsHealth > For Kids > Can Loud Music Hurt My Ears? Print A A A en ... up? Oh! You want to know if loud music can hurt your ears . Are you asking because ...

  6. Can Loud Music Hurt My Ears?

    Science.gov (United States)

    ... What Happens in the Operating Room? Can Loud Music Hurt My Ears? KidsHealth > For Kids > Can Loud Music Hurt My Ears? A A A en español ... up? Oh! You want to know if loud music can hurt your ears . Are you asking because ...

  7. Who will attack the competitors? How political parties resolve strategic and collective action dilemmas in negative campaigning

    Science.gov (United States)

    Dolezal, Martin; Müller, Wolfgang C

    2015-01-01

    Negative campaigning presents parties with a collective action problem. While parties would prefer to have their competitors attacked, potential backlash effects from negative messages mean that individual politicians typically lack the incentives to carry out such attacks. We theorize that parties solve this problem by implementing a division of labour that takes into account the incentives of individual office holders, their availability for campaign activity, and media relevance. Drawing on these arguments we expect that holders of high public office and party leaders are less likely to issue attacks, leaving the bulk of the ‘dirty work’ to be carried out by party floor leaders and general secretaries. Examining almost 8000 press releases issued by over 600 individual politicians during four election campaigns in Austria, we find strong support for our theoretical expectations.

  8. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  9. The West Perfecting Its Techniques To Hurt China

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Spanish Website Rebellion published an article titled The West Perfecting Its Techniques to Hurt China by U.S. writer, filmmaker and journalist Andre Vltchek on November 12, 2010. Excerpts from the article follow:

  10. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  11. Cutting Off the Head of the Snake: Applying and Assessing Leadership Attack in Military Conflict

    Science.gov (United States)

    2013-04-26

    Baldor , “Panetta: Al- Qaida Deaths Hurt Plans For Attacks,” Associated Press, 3 October 2011. 3 Chairman of the Joint Chiefs of Staff, General Colin Powell...October 1999. http://www.washingtonpost.com/wp-srv/national/dotmil/arkin101199.htm (accessed 6 April 2013). Baldor , Lolita C. “Panetta: Al-Qaida

  12. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  13. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  14. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  15. Using Appraisal Theory to Predict Emotional and Coping Responses to Hurtful Messages

    Directory of Open Access Journals (Sweden)

    Amy M. Bippus

    2012-12-01

    Full Text Available Based on appraisal theory (Lazarus 1991; 1999, this study examined the degree to which primary and secondary cognitive appraisals of hurtful messages predict the amountof hurt individuals feel, and the coping behaviors they enact. This study presents a significant step forward in its operationalization of both primary and secondary appraisal variables by treating hurt as an outcome, rather than an antecedent, of the appraisal process, and considers an extensive range of coping responses. We surveyed participants (N = 217 about hurtful messages they received within an array of relationship types. The results revealed that fours types of appraisals predicted the amount of hurt recipients experienced. All coping behaviors except positive reappraisal were significantly predicted by the primary appraisals (categories of risk and secondary appraisals (perceived intentionality and frequency of hurtful messages. The findings explicate appraisal theory’s potential in explaining individuals’ responses to hurtful communication.

  16. The Headache Under-Response to Treatment (HURT) Questionnaire

    DEFF Research Database (Denmark)

    Westergaard, Maria Ls; Steiner, Timothy J; Macgregor, E Anne

    2013-01-01

    to change induced by effective management. We administered HURT on three occasions to 159 consecutive patients seeking non-urgent care from centres in Denmark and the United Kingdom: the first before the initial visit to the centres; the second at the initial visit; and the third when the specialist judged...

  17. Hurtful Cyber-Teasing and Violence: Who's Laughing out Loud?

    Science.gov (United States)

    Madlock, Paul E.; Westerman, David

    2011-01-01

    The current study sought to specifically examine the affect of teasing by way of technology (cyber-teasing) and the importance of the redressive component of a tease. A triangulated approach was used here to gain better insight into the concept of "hurtful" cyber-teasing between romantic partners. A pretheoretical model was developed highlighting…

  18. Strategic Adaptation

    DEFF Research Database (Denmark)

    Andersen, Torben Juul

    2015-01-01

    This article provides an overview of theoretical contributions that have influenced the discourse around strategic adaptation including contingency perspectives, strategic fit reasoning, decision structure, information processing, corporate entrepreneurship, and strategy process. The related...... concepts of strategic renewal, dynamic managerial capabilities, dynamic capabilities, and strategic response capabilities are discussed and contextualized against strategic responsiveness. The insights derived from this article are used to outline the contours of a dynamic process of strategic adaptation...

  19. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  20. Solidarity, community and the political economy of hurt

    Directory of Open Access Journals (Sweden)

    James Arvanitakis

    2009-08-01

    Full Text Available This paper considers whether as anti-racist activists we can form a community of solidarity. Critiquing the issue of ‘whiteness’, I consider whether such a community reflects or actually confronts the structures of a political economy of whiteness. Using both academic literature and narrative research I reflect on my own experiences of racism and hurt. These emotional and important issues are then intertwined within the political economy of whiteness.

  1. Does Generic Advertising Help or Hurt Brand Advertising?

    OpenAIRE

    Suh, Daeseok; Chung, Chanjin

    2009-01-01

    The purpose of this study is to investigate whether the generic advertising helps or hurts the brand advertising within the differentiated product environments. We develop an analytical model that includes both generic and brand advertising expenditures considering vertical product differentiation. Then the analysis is devoted to examine how marginal effects of expenditure affect each other under product differentiation. To help examine the relationship, we also include a new variable, the de...

  2. The Necessity for Smart Power: How a SWIFT Kick Hurts

    Science.gov (United States)

    2013-03-01

    of consolidating financial transactions to provide good oversight, regulations and effective monitoring. In the spring of 2012, the BRIC nations...transfers. It is not the system that is faulty but the influence of the U.S. over it that is the danger to the BRIC nations. The BRICs discussed the...U.S. could hurt them considerably with this action. The question that the BRIC nations asked was, “Must we be subject to the financial will of the

  3. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  4. Thinking Strategically.

    Science.gov (United States)

    Jeffress, Conway

    2000-01-01

    Asserts that community college leaders must think strategically and understand the difference between what is important and immediate, and what is strategic and essential to the long-term survival of a college. States that thinking strategically aligns decision-making and actions with the core purpose of the college; produces core competencies in…

  5. Strategic Entrepreneurship

    DEFF Research Database (Denmark)

    Klein, Peter G.; Barney, Jay B.; Foss, Nicolai Juul

    and capture value through resource acquisition and competitive posi-tioning. (2) Opportunity-seeking and advantage-seeking—the former the central subject of the entrepreneurship field, the latter the central subject of the strategic management field—are pro-cesses that should be considered jointly. This entry......Strategic entrepreneurship is a newly recognized field that draws, not surprisingly, from the fields of strategic management and entrepreneurship. The field emerged officially with the 2001 special issue of the Strategic Management Journal on “strategic entrepreneurship”; the first dedicated...... periodical, the Strategic Entrepreneurship Journal, appeared in 2007. Strategic entrepreneurship is built around two core ideas. (1) Strategy formulation and execution involves attributes that are fundamentally entrepreneurial, such as alertness, creativity, and judgment, and entrepreneurs try to create...

  6. Strategic Entrepreneurship

    DEFF Research Database (Denmark)

    Klein, Peter G.; Barney, Jay B.; Foss, Nicolai Juul

    Strategic entrepreneurship is a newly recognized field that draws, not surprisingly, from the fields of strategic management and entrepreneurship. The field emerged officially with the 2001 special issue of the Strategic Management Journal on “strategic entrepreneurship”; the first dedicated...... and capture value through resource acquisition and competitive posi-tioning. (2) Opportunity-seeking and advantage-seeking—the former the central subject of the entrepreneurship field, the latter the central subject of the strategic management field—are pro-cesses that should be considered jointly. This entry...... periodical, the Strategic Entrepreneurship Journal, appeared in 2007. Strategic entrepreneurship is built around two core ideas. (1) Strategy formulation and execution involves attributes that are fundamentally entrepreneurial, such as alertness, creativity, and judgment, and entrepreneurs try to create...

  7. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  8. Strategizing Communication

    DEFF Research Database (Denmark)

    Gulbrandsen, Ib Tunby; Just, Sine Nørholm

    not determine the success of strategic communication. Rather, contextual factors such as competition, technological developments, global cultural trends and local traditions as well as employees’ skills and attitudes will determine the organization’s communicative success. This holds true regardless......Strategizing Communication offers a unique perspective on the theory and practice of strategic communication. Written for students and practitioners interested in learning about and acquiring tools for dealing with the technological, environmental and managerial challenges, which organizations face...... when communicating in today’s mediascape, this book presents an array of theories, concepts and models through which we can understand and practice communication strategically. The core of the argument is in the title: strategizing – meaning the act of making something strategic. This entails looking...

  9. Alte Harfe. Vollständige Sammlung alter estnischer Volkslieder : Vorrede / Jakob Hurt

    Index Scriptorium Estoniae

    Hurt, Jakob, 1839-1907

    2005-01-01

    Eessõna rmt. : Hurt, Jakob. Vana kannel. 1. kogu : täieline kogu vanu eesti rahvalaulusid = Alte Harfe : vollständige Sammlung alter estnischen Volkslieder. Tartu, 1875-1886. - (Eesti Kirjameeste Seltsi toimetised ; 3)

  10. Alte Harfe. Vollständige Sammlung alter estnischer Volkslieder : Vorrede / Jakob Hurt

    Index Scriptorium Estoniae

    Hurt, Jakob, 1839-1907

    2005-01-01

    Eessõna rmt. : Hurt, Jakob. Vana kannel. 1. kogu : täieline kogu vanu eesti rahvalaulusid = Alte Harfe : vollständige Sammlung alter estnischen Volkslieder. Tartu, 1875-1886. - (Eesti Kirjameeste Seltsi toimetised ; 3)

  11. Many Adults Unaware That Using E-Cigarettes Can Hurt Kids

    Science.gov (United States)

    ... fullstory_161620.html Many Adults Unaware That Using E-Cigarettes Can Hurt Kids Indoor use promotes harmful nicotine ... nicotine deposits on surfaces, a new survey shows. "E-cigarettes primarily emit a toxic aerosol, not harmless water ...

  12. Strategic Supply

    Science.gov (United States)

    2003-01-01

    March 7, 2003. [29] Velis, Lil. “ Publishing Industry : Supply Chain Strategy in Action,” briefing presented to ICAF Strategic Supply Seminar, May 6...Lambert and Stock, page 48. [32] Velis, Lil. “ Publishing Industry : Supply Chain Strategy in Action,” briefing presented to ICAF Strategic Supply

  13. Strategic Responsiveness

    DEFF Research Database (Denmark)

    Pedersen, Carsten; Juul Andersen, Torben

    decision making is often conceived as ‘standing on the two feet’ of deliberate or intended strategic decisions by top management and emergent strategic decisions pursued by lower-level managers and employees. In this view, the paper proposes that bottom-up initiatives have a hard time surfacing...... in hierarchical organizations and that lowerlevel managers and employees, therefore, pursue various strategies to bypass the official strategy processes to act on emerging strategic issues and adapt to changing environmental conditions.......The analysis of major resource committing decisions is central focus in the strategy field, but despite decades of rich conceptual and empirical research we still seem distant from a level of understanding that can guide corporate practices under dynamic and unpredictable conditions. Strategic...

  14. Strategic Forecasting

    DEFF Research Database (Denmark)

    Duus, Henrik Johannsen

    2016-01-01

    Purpose: The purpose of this article is to present an overview of the area of strategic forecasting and its research directions and to put forward some ideas for improving management decisions. Design/methodology/approach: This article is conceptual but also informed by the author’s long contact...... and collaboration with various business firms. It starts by presenting an overview of the area and argues that the area is as much a way of thinking as a toolbox of theories and methodologies. It then spells out a number of research directions and ideas for management. Findings: Strategic forecasting is seen...... as a rebirth of long range planning, albeit with new methods and theories. Firms should make the building of strategic forecasting capability a priority. Research limitations/implications: The article subdivides strategic forecasting into three research avenues and suggests avenues for further research efforts...

  15. Strategic Paralysis: An Airpower Theory for the Present

    Science.gov (United States)

    1992-05-01

    Attacks on a Country�s NEVs 94 10. The Enemy�s Alliance Network 97 11. New England Power Associations Electric Grid 105 12. De Seversky�s Octopus ...vulnerabilities, i.e. hidden, buried, or camouflaged . Strategic Paralysis assumes that attacks on these highly prized elements will not only shock and...grappling with those limbs and cannot strike at his heart. ...To grasp the strategic layout, think of Japan as a giant octopus . [See Figure 12]206

  16. Strategizing Communication

    DEFF Research Database (Denmark)

    Gulbrandsen, Ib Tunby; Just, Sine Nørholm

    not determine the success of strategic communication. Rather, contextual factors such as competition, technological developments, global cultural trends and local traditions as well as employees’ skills and attitudes will determine the organization’s communicative success. This holds true regardless...... and less on the plan to communicate. Against the backdrop of the comprehensive changes to communication in and about organizations brought about by the rise of digital communication technologies and related contextual developments, Strategizing Communication provides better and more up to date tools...

  17. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  18. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  19. Transient Ischemic Attack

    Medline Plus

    Full Text Available Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood ... The only difference between a stroke and TIA is that with TIA the blockage is transient (temporary). ...

  20. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  1. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  2. Watermark copy attack

    OpenAIRE

    Kutter, Martin; Voloshynovskyy, Svyatoslav; Herrigel, Alexander

    2000-01-01

    Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy theembedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. The proposed attack doesnot destroy anembedded watermark, but copies it from one image to a di erent ...

  3. The Watermark Template Attack

    OpenAIRE

    Herrigel, Alexander; Voloshynovskyy, Svyatoslav; Rytsar, Yuriy

    2001-01-01

    This paper presents a new attack, called the watermark template attach, for watermarked images. In contrast to the Stirmark benchmark, this attack does not severely reduce the quality of the image. This attack maintains, therefore, the commercial value of the watermarked image. In contrast to previous approaches, it is not the aim of the attack to change the statistics of embedded watermarks fooling the detection process but to utilize specific concepts that have been recently developed for m...

  4. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  5. Strategic Aspirations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger; Morsing, Mette; Thyssen, Ole

    2016-01-01

    Strategic aspirations are public announcements designed to inspire, motivate, and create expectations about the future. Vision statements or value declarations are examples of such talk, through which organizations announce their ideal selves and declare what they (intend to) do. While aspirations...... aspirations, in other words, have exploratory and inspirational potential—two features that are highly essential in complex areas such as sustainability and CSR. This entry takes a communicative focus on strategic aspirations, highlighting the value of aspirational talk, understood as ideals and intentions...

  6. Strategic Bonding.

    Science.gov (United States)

    Davis, Lynn; Tyson, Ben

    2003-01-01

    Many school buildings are in dire need of renovation, expansion, or replacement. Brief case studies from around the country illustrate the importance of finding out why people vote for or against a construction referendum. Lists recommendations for a strategic campaign. (MLF)

  7. Strategic Staffing

    Science.gov (United States)

    Clark, Ann B.

    2012-01-01

    Business and industry leaders do not flinch at the idea of placing top talent in struggling departments and divisions. This is not always the case in public education. The Charlotte-Mecklenburg Schools made a bold statement to its community in its strategic plan by identifying two key reform levers--(1) an effective principal leading each school;…

  8. Return of ambiguity attacks

    Science.gov (United States)

    Craver, Scott A.

    2002-04-01

    The ambiguity attack, or invertibility attack, was described several years ago as a potential threat to digital watermarking systems. By manipulating the invertibility of watermark embedding, one could negate or subvert the meaning of a copyright mark. These attacks were easily prevented, however, with the appropriate application of one-way functions and cryptographic hashes in watermarking protocols. New research in watermarking, however, has caused the ambiguity attack to resurface as a threat, and this time it will not be as easy averted. Recent work in public-key watermarking create scenarios in which one-way functions may be ineffective against this threat. Furthermore, there are also positive uses for ambiguity attacks, as components in watermarking protocols. This paper provides an overview of the past and possible future of these unusual attacks.

  9. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  10. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  11. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  12. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  13. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  14. Frenzied attacks. A micro-sociological analysis of the emotional dynamics of extreme youth violence.

    Science.gov (United States)

    Weenink, Don

    2014-09-01

    Inspired by phenomenological and interactionist studies of youth violence, this article offers an empirical evaluation of Collins's micro-sociological theory of violence. The main question is whether situations of extreme violence have distinct situational dynamics. Based on analyses of 159 interactions taken from judicial case files, situations of extreme youth violence, here called frenzied attacks, were identified on the basis of the state of encapsulation of the attackers (absorbed in the violence, their sole focus is the destruction of the victim) and the disproportionateness of the violence (the attackers continue to hurt the victims even though they do not pose a threat or a challenge to them). Qualitative and statistical analyses revealed that this emotional state results from a social figuration in which the emotional balance shifts toward complete dominance of the attackers. Thus, the occurrence of frenzied attacks is associated with the moment victims hit the ground, paralyse and start to apologize, with the numerical dominance of the attackers' supportive group and with feelings of group membership, in the form of solidarity excitement and family ties in the attackers' group. Alcohol intoxication is of influence as well, but contrary to the expectation, this effect was independent from solidarity excitement. The article concludes that Collins's theory on the emotional dynamics of violence adds a new dimension to the phenomenological and interactionist traditions of research. © London School of Economics and Political Science 2014.

  15. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history....... Including their possible application on a national security level for managing longer strategic endeavors....

  16. Forgiveness and Its Determinants Depending on the Interpersonal Context of Hurt

    Science.gov (United States)

    Peets, Katlin; Hodges, Ernest V. E.; Salmivalli, Christina

    2013-01-01

    Children and adolescents encounter different hurtful experiences in school settings. How these events are processed (e.g., whether they think that the transgressor was hostile) is likely to depend on the relationship with the transgressor. In this study, we examined how adolescents (58 girls and 35 boys, mean age = 14.03 years, SD = 0.60) dealt…

  17. When News Hurts. The promise of participatory storytelling for urban problem neighbourhoods

    NARCIS (Netherlands)

    Costera-Meijer, I.C.

    2012-01-01

    A content analysis of more than 3400 news items published in national and regional Dutch (quality) newspapers, in combination with ethnographic audience and production research, has allowed us to explain when, how and why news can hurt. A longitudinal ethnographic case study of two highly mediatized

  18. Strategic Marketing

    OpenAIRE

    Potter, Ned

    2015-01-01

    This chapter from The Library Marketing Toolkit focuses on marketing strategy. Marketing is more successful when it happens as part of a constantly-renewing cycle. The aim of this chapter is to demystify the process of strategic marketing, simplifying it into seven key stages with advice on how to implement each one. Particular emphasis is put on dividing your audience and potential audience into segments, and marketing different messages to each group. \\ud \\ud It includes case studies from T...

  19. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  20. Thinking strategically.

    Science.gov (United States)

    Goree, Michael

    2002-01-01

    Over the course of the past 20 years, human resources has tried a variety of strategic initiatives to add value to the working environment, from the alphabets of TQM, CQI, EVA, ROI, ISO, QS, Theory X, Y, Z, Generation X and Y to re-engineering, balanced scorecard, lean, hoshin, six sigma, to Margaret Wheatley's "The Simpler Way" and finally to cheese and fish. The problem is that none of these is a strategy. They are all tactics to accomplish or achieve a strategy.

  1. Strategic Windows

    DEFF Research Database (Denmark)

    Risberg, Annette; King, David R.; Meglio, Olimpia

    We examine the importance of speed and timing in acquisitions with a framework that identifies management considerations for three interrelated acquisition phases (selection, deal closure and integration) from an acquiring firm’s perspective. Using a process perspective, we pinpoint items within...... acquisition phases that relate to speed. In particular, we present the idea of time-bounded strategic windows in acquisitions consistent with the notion of kairòs, where opportunities appear and must be pursued at the right time for success to occur....

  2. Strategic Management

    CERN Document Server

    Jeffs, Chris

    2008-01-01

    The Sage Course Companion on Strategic Management is an accessible introduction to the subject that avoids lengthy debate in order to focus on the core concepts. It will help the reader to develop their understanding of the key theories, whilst enabling them to bring diverse topics together in line with course requirements. The Sage Course Companion also provides advice on getting the most from your course work; help with analysing case studies and tips on how to prepare for examinations. Designed to compliment existing strategy textbooks, the Companion provides: -Quick and easy access to the

  3. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  4. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  5. Strategic Engagement

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    “Pakistan regards China as a strategic partner and the bilateral ties have endured the test of time.”Pakistani Prime Minister Shaukat Aziz made the comment during his four-day official visit to China on April 16 when he met Chinese President Hu Jintao,Premier Wen Jiabao and the NPC Standing Committee Chairman Wu Bangguo.His visit to China also included a trip to Boao,where he delivered a keynote speech at the Boao Forum for Asia held on April 20-22. During his stay in Beijing,the two countries signed 13 agreements on cooperation in the fields of space,telecommunications,education and legal assistance,which enhanced an already close strategic partnership. In an interview with Beijing Review reporter Pan Shuangqin,Prime Minister Aziz addressed a number of issues ranging from Asia’s searching for a win-win economic situation to the influence of Sino-Pakistani relations on regional peace.

  6. Strategic conversation

    Directory of Open Access Journals (Sweden)

    Nicholas Asher

    2013-08-01

    Full Text Available Models of conversation that rely on a strong notion of cooperation don’t apply to strategic conversation — that is, to conversation where the agents’ motives don’t align, such as courtroom cross examination and political debate. We provide a game-theoretic framework that provides an analysis of both cooperative and strategic conversation. Our analysis features a new notion of safety that applies to implicatures: an implicature is safe when it can be reliably treated as a matter of public record. We explore the safety of implicatures within cooperative and non cooperative settings. We then provide a symbolic model enabling us (i to prove a correspondence result between a characterisation of conversation in terms of an alignment of players’ preferences and one where Gricean principles of cooperative conversation like Sincerity hold, and (ii to show when an implicature is safe and when it is not. http://dx.doi.org/10.3765/sp.6.2 BibTeX info

  7. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  8. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  9. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  10. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  11. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  12. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this library is for educational purposes only, and therefore is not intended to be ...

  13. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  14. Bayesian Watermark Attacks

    OpenAIRE

    Shterev, Ivo; Dunson, David

    2012-01-01

    This paper presents an application of statistical machine learning to the field of watermarking. We propose a new attack model on additive spread-spectrum watermarking systems. The proposed attack is based on Bayesian statistics. We consider the scenario in which a watermark signal is repeatedly embedded in specific, possibly chosen based on a secret message bitstream, segments (signals) of the host data. The host signal can represent a patch of pixels from an image or a video frame. We propo...

  15. DNS rebinding attacks

    OpenAIRE

    Kokkinopoulos, Georgios

    2009-01-01

    Approved for public release, distribution unlimited. A Domain Name System (DNS) Rebinding attack compromises the integrity of name resolution in DNS with the goal of controlling the IP address of the host to which the victim ultimately connects. The same origin policy and DNS Pinning techniques were introduced to protect Web browsers from DNS rebinding attacks, but their effectiveness has been undermined by vulnerabilities introduced by plug-ins such as JavaScript and Adobe Flash Play...

  16. Strategic Planning: What's so Strategic about It?

    Science.gov (United States)

    Strong, Bart

    2005-01-01

    The words "strategic" and "planning" used together can lead to confusion unless one spent the early years of his career in never-ending, team-oriented, corporate training sessions. Doesn't "strategic" have something to do with extremely accurate bombing or a defensive missile system or Star Wars or something? Don't "strategic" and "planning" both…

  17. Case Studies in Strategic Planning

    Science.gov (United States)

    1990-03-06

    Contains developed case studies in strategic planning on The Navy General Board, Joint Service War Planning 1919 to 1941, Navy Strategic Planning , NASA...in Strategic Planning NPS-56-88-031-PR of September 1988. Strategic planning , Strategic Management.

  18. Strategic serendipity

    DEFF Research Database (Denmark)

    Knudsen, Gry Høngsmark; Lemmergaard, Jeanette

    2014-01-01

    of – and communicative responses to – Kopenhagen Fur's campaign The World's Best – but not perfect in both broadcast media (e.g. print and television) and social media, more specifically Facebook. Through understanding how an organisation can plan for and take advantage of the unpredictable through state......This paper contributes to critical voices on the issue of strategic communication. It does so by exploring how an organisation can seize the moment of serendipity based on careful preparation of its issues management and communication channels. The focus of the study is the media coverage...... organisations as communicative actors can take advantage of the serendipity afforded by other actors' campaigns when advocating and campaigning....

  19. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  20. Effects of Prosocial, Neutral, and Violent Video Games on Children's Helpful and Hurtful Behaviors.

    Science.gov (United States)

    Saleem, Muniba; Anderson, Craig A; Gentile, Douglas A

    2012-01-01

    Recent research reveals that playing prosocial video games increases prosocial cognitions, positive affect, and helpful behaviors [Gentile et al., 2009; Greitemeyer and Osswald, 2009, 2010, 2011]. These results are consistent with the social-cognitive models of social behavior such as the general learning model [Buckley and Anderson, 2006]. However, no experimental studies have examined such effects on children. Previous research on violent video games suggests that short-term effects of video games are largely based on priming of existing behavioral scripts. Thus, it is unclear whether younger children will show similar effects. This research had 9-14 years olds play a prosocial, neutral, or violent video game, and assessed helpful and hurtful behaviors simultaneously through a new tangram measure. Prosocial games increased helpful and decreased hurtful behavior, whereas violent games had the opposite effects.

  1. Oppositionality and sympathetic skin response in adolescents: specific associations with the headstrong/hurtful dimension.

    Science.gov (United States)

    Silva, Nanucha Teixeira da; Schestatsky, Pedro; Winckler, Pablo Brea; Salum, Giovanni Abrahão; Petroceli, Alana Wypyszynski; Heldt, Elizeth Paz da Silva

    2014-12-01

    Oppositionality encompasses distinct dimensions, and few studies have investigated the validity of such distinctions from a pathophysiological perspective. Our aim was to investigate the association between sympathetic skin responses (SSR) and distinct oppositional dimensions in a community sample of adolescents. Forty adolescents aged 13.84±1.46 years participated in this study. Oppositionality was measured by externalizing behavior and bullying scores (dependent variables), while SSR was recorded by electrical changes at the skin level (independent variables). Results showed that increased SSRs were associated with oppositionality; however, these associations were specific to the headstrong/hurtful dimension. Further exploratory analyses demonstrated that increased SSRs were associated with several types of headstrong/hurtful behaviors and underscore the importance of the first aversive stimuli to differentiate groups with low and high headstrong/hurtful behaviors. There were no differences between groups regarding time until habituation. This study provides insights about how dysfunctions in autonomic balance may contribute to the emergence of oppositional behavior among adolescents.

  2. Life After a Heart Attack

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  3. What Is a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  4. What Causes a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  5. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  6. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  7. Strategic forces: Future requirements and options

    Energy Technology Data Exchange (ETDEWEB)

    Speed, R.D.

    1990-11-01

    In the wake of the collapse of the Warsaw Pact and the apparent ending of the Cold War, there have been renewed calls for radical cuts in US strategic forces to levels far below the 10,000 or so warheads allowed each side under the current START proposal. Since it now appears that NATO for the first time will have the capability to defeat a Soviet conventional attack without the necessity of threatening to resort to nuclear weapons, this should pave the way for the rethinking of US strategy and the reduction of US strategic weapons requirements. In this new environment, it seems plausible that, with a modification of the Flexible Response doctrine to forego attempts to disarm the Soviet Union, deterrence could be maintained with 1500 or so survivable strategic weapons. With a new strategy that confined US strategic weapons to the role of deterring the use of nuclear weapons by other countries, a survivable force of about 500 weapons would seem sufficient. With this premise, the implications for the US strategic force structure are examined for two cases: a treaty that allows each side 3000 warheads and one that allows each side 1000 warheads. In Part 1 of this paper, the weapons requirements for deterrence are examined in light of recent changes in the geopolitical environment. In Part 2, it is assumed that the President and Congress have decided that deep cuts in strategic forces are acceptable. 128 refs., 12 figs., 12 tabs. (JF)

  8. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  9. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  10. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  11. Moving Beyond Strategic Planning to Strategic Thinking.

    Science.gov (United States)

    Wolverton, Mimi; Gmelch, Walter

    1999-01-01

    Examines a moderately sized Washington school district's efforts to move beyond strategic planning as a segregated activity toward thinking strategically about long-term plans to govern both tactical operations and the district's future. Top management grew to recognize the legitimacy of multiple external and internal constituent claims. (25…

  12. Revisiting Strategic versus Non-strategic Cooperation

    NARCIS (Netherlands)

    Reuben, E.; Suetens, S.

    2009-01-01

    We use a novel experimental design to disentangle strategically- and non-strategically-motivated cooperation. By using contingent responses in a repeated sequential prisoners’ dilemma with a known probabilistic end, we differentiate end-game behavior from continuation behavior within individuals

  13. Revisiting Strategic versus Non-strategic Cooperation

    NARCIS (Netherlands)

    Reuben, E.; Suetens, S.

    2009-01-01

    We use a novel experimental design to disentangle strategically- and non-strategically-motivated cooperation. By using contingent responses in a repeated sequential prisoners’ dilemma with a known probabilistic end, we differentiate end-game behavior from continuation behavior within individuals whi

  14. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  15. Strategic Studies Quarterly. Volume 6, Number 2. Summer 2012

    Science.gov (United States)

    2012-06-01

    Arms Limitations Talks ( SALT ) and Strategic Arms Reductions Talks (START), which resulted in treaties reducing the number of long-range nuclear...units attacked Pakistani forces, and Indian jets bombed bases high in the Himalayan Mountains. Although Indian forces carefully stayed on their side of

  16. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  17. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  18. Strategizing NATOs Narratives

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    2014-01-01

    , implementation structures, and capabilities can be used to inform the construction of strategic narratives in NATO. Using Libya as a case study he explains that the formulation and implementation of strategic narratives in NATO currently is a fragmented process that rarely takes into account the grand strategic...

  19. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  20. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  1. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  2. Learning to think strategically.

    Science.gov (United States)

    1994-01-01

    Strategic thinking focuses on issues that directly affect the ability of a family planning program to attract and retain clients. This issue of "The Family Planning Manager" outlines the five steps of strategic thinking in family planning administration: 1) define the organization's mission and strategic goals; 2) identify opportunities for improving quality, expanding access, and increasing demand; 3) evaluate each option in terms of its compatibility with the organization's goals; 4) select an option; and 5) transform strategies into action. Also included in this issue is a 20-question test designed to permit readers to assess their "strategic thinking quotient" and a list of sample questions to guide a strategic analysis.

  3. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  4. Examining the Impact of Strategic Learning on Strategic Agility

    OpenAIRE

    Wael Mohamad Subhi Idris; Methaq Taher Kadhim AL-Rubaie

    2013-01-01

    The main aim of this study is to examining the Impact of Strategic Learning on Strategic Agility in Elba House Company in Jordan. The study adopts the demonstrative analytical approach to achieve their objectives. A total of (55) individual, (47) were respondents and answered the questionnaire distributed. The study finding that the strategic learning (strategic knowledge creation, strategic knowledge distribution, strategic knowledge interpretation and of strategic knowledge implementation) ...

  5. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  6. Strategic Analysis Overview

    Science.gov (United States)

    Cirillo, William M.; Earle, Kevin D.; Goodliff, Kandyce E.; Reeves, J. D.; Stromgren, Chel; Andraschko, Mark R.; Merrill, R. Gabe

    2008-01-01

    NASA s Constellation Program employs a strategic analysis methodology in providing an integrated analysis capability of Lunar exploration scenarios and to support strategic decision-making regarding those scenarios. The strategic analysis methodology integrates the assessment of the major contributors to strategic objective satisfaction performance, affordability, and risk and captures the linkages and feedbacks between all three components. Strategic analysis supports strategic decision making by senior management through comparable analysis of alternative strategies, provision of a consistent set of high level value metrics, and the enabling of cost-benefit analysis. The tools developed to implement the strategic analysis methodology are not element design and sizing tools. Rather, these models evaluate strategic performance using predefined elements, imported into a library from expert-driven design/sizing tools or expert analysis. Specific components of the strategic analysis tool set include scenario definition, requirements generation, mission manifesting, scenario lifecycle costing, crew time analysis, objective satisfaction benefit, risk analysis, and probabilistic evaluation. Results from all components of strategic analysis are evaluated a set of pre-defined figures of merit (FOMs). These FOMs capture the high-level strategic characteristics of all scenarios and facilitate direct comparison of options. The strategic analysis methodology that is described in this paper has previously been applied to the Space Shuttle and International Space Station Programs and is now being used to support the development of the baseline Constellation Program lunar architecture. This paper will present an overview of the strategic analysis methodology and will present sample results from the application of the strategic analysis methodology to the Constellation Program lunar architecture.

  7. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  8. The Construction of Moral Agency in Mother-Child Conversations about Helping and Hurting across Childhood and Adolescence

    Science.gov (United States)

    Recchia, Holly E.; Wainryb, Cecilia; Bourne, Stacia; Pasupathi, Monisha

    2014-01-01

    This study examined mother-child conversations about children's and adolescents' past harmful and helpful actions. The sample included 100 mothers and their 7-, 11-, or 16-year-old children; each dyad discussed events when the child (a) helped a friend and (b) hurt a friend. Analyses suggested that conversations about help may serve to…

  9. Strategic Shock: Managing the Strategic Gap

    Science.gov (United States)

    2013-03-01

    planning for strategic shocks. In Blindside, Francis Fukuyama covers much of the same intellectual territory with a specific focus on national security...Anticipating Strategic Surprise,” in Blindside, ed. Francis Fukuyama (Washington, D.C.: Brookings Institution Press, 2007), 93. 8 Ibid, 94. 9...so. Their theories and application are focused on the business environment rather than the national security environment. 30 Francis Fukuyama

  10. Strategic Thoughts in Organizations

    Directory of Open Access Journals (Sweden)

    Juliane Inês Di Francesco Kich

    2014-08-01

    Full Text Available This paper aims to analyze a new way of thinking about the organizational strategies through a theoretical discussion of the term "strategic thoughts", and its development in organizations. To achieve this, a bibliographical research was conducted in order to go more deeply on the theme and reach a conceptual background, which can support further analysis. Among the results of this research, it is emphasized that the pragmatic characteristics of strategic planningappears to not have more space in the current organizational world, this tool needs to be interconnected to the strategic thought process to bring more effective results. In this regard, the challenged is present in how the organizations could develop a strategic planning that encourages strategic thoughts instead of undermine it, as well as, the development of tools that promote the ability to think strategically in all employees, regardless of the hierarchical levels.

  11. Complex Strategic Choices

    DEFF Research Database (Denmark)

    Leleur, Steen

    . Complex Strategic Choices provides clear principles and methods which can guide and support strategic decision making to face the many current challenges. By considering ways in which planning practices can be renewed and exploring the possibilities for acquiring awareness and tools to add value...... and students in the field of planning and decision analysis as well as practitioners dealing with strategic analysis and decision making. More broadly, Complex Strategic Choices acts as guide for professionals and students involved in complex planning tasks across several fields such as business...... to strategic decision making, Complex Strategic Choices presents a methodology which is further illustrated by a number of case studies and example applications. Dr. Techn. Steen Leleur has adapted previously established research based on feedback and input from various conferences, journals and students...

  12. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  13. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  14. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  15. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  16. Cultivating strategic thinking skills.

    Science.gov (United States)

    Shirey, Maria R

    2012-06-01

    This department highlights change management strategies that may be successful in strategically planning and executing organizational change initiatives. With the goal of presenting practical approaches helpful to nurse leaders advancing organizational change, content includes evidence-based projects, tools, and resources that mobilize and sustain organizational change initiatives. In this article, the author presents an overview of strategic leadership and offers approaches for cultivating strategic thinking skills.

  17. Strategic Marketing Planning Audit

    OpenAIRE

    Violeta Radulescu

    2012-01-01

    Market-oriented strategic planning is the process of defining and maintaining a viable relationship between objectives, training of personnel and resources of an organization, on the one hand and market conditions, on the other hand. Strategic marketing planning is an integral part of the strategic planning process of the organization. For successful marketing organization to obtain a competitive advantage, but also to measure the effectiveness of marketing actions the company is required to ...

  18. Strategic Marketing Planning Audit

    OpenAIRE

    Violeta Radulescu

    2012-01-01

    Market-oriented strategic planning is the process of defining and maintaining a viable relationship between objectives, training of personnel and resources of an organization, on the one hand and market conditions, on the other hand. Strategic marketing planning is an integral part of the strategic planning process of the organization. For successful marketing organization to obtain a competitive advantage, but also to measure the effectiveness of marketing actions the company is required to ...

  19. Strategic planning for neuroradiologists.

    Science.gov (United States)

    Berlin, Jonathan W; Lexa, Frank J

    2012-08-01

    Strategic planning is becoming essential to neuroradiology as the health care environment continues to emphasize cost efficiency, teamwork and collaboration. A strategic plan begins with a mission statement and vision of where the neuroradiology division would like to be in the near future. Formalized strategic planning frameworks, such as the strengths, weaknesses, opportunities and threats (SWOT), and the Balanced Scorecard frameworks, can help neuroradiology divisions determine their current position in the marketplace. Communication, delegation, and accountability in neuroradiology is essential in executing an effective strategic plan. Copyright © 2012 Elsevier Inc. All rights reserved.

  20. Strategic market segmentation

    National Research Council Canada - National Science Library

    Maričić Branko R; Đorđević Aleksandar

    2015-01-01

    ..., requires segmented approach to the market that appreciates differences in expectations and preferences of customers. One of significant activities in strategic planning of marketing activities is market segmentation...

  1. DCOI Strategic Plan

    Data.gov (United States)

    General Services Administration — Under the Data Center Optimization Initiative (DCOI), covered agencies are required to post DCOI Strategic Plans and updates to their FITARA milestones publicly on...

  2. Sandia Strategic Plan 1997

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-12-01

    Sandia embarked on its first exercise in corporate strategic planning during the winter of 1989. The results of that effort were disseminated with the publication of Strategic Plan 1990. Four years later Sandia conducted their second major planning effort and published Strategic Plan 1994. Sandia`s 1994 planning effort linked very clearly to the Department of Energy`s first strategic plan, Fueling a Competitive Economy. It benefited as well from the leadership of Lockheed Martin Corporation, the management and operating contractor. Lockheed Martin`s corporate success is founded on visionary strategic planning and annual operational planning driven by customer requirements and technology opportunities. In 1996 Sandia conducted another major planning effort that resulted in the development of eight long-term Strategic Objectives. Strategic Plan 1997 differs from its predecessors in that the robust elements of previous efforts have been integrated into one comprehensive body. The changes implemented so far have helped establish a living strategic plan with a stronger business focus and with clear deployment throughout Sandia. The concept of a personal line of sight for all employees to this strategic plan and its objectives, goals, and annual milestones is becoming a reality.

  3. Sandia Strategic Plan 1997

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-12-01

    Sandia embarked on its first exercise in corporate strategic planning during the winter of 1989. The results of that effort were disseminated with the publication of Strategic Plan 1990. Four years later Sandia conducted their second major planning effort and published Strategic Plan 1994. Sandia`s 1994 planning effort linked very clearly to the Department of Energy`s first strategic plan, Fueling a Competitive Economy. It benefited as well from the leadership of Lockheed Martin Corporation, the management and operating contractor. Lockheed Martin`s corporate success is founded on visionary strategic planning and annual operational planning driven by customer requirements and technology opportunities. In 1996 Sandia conducted another major planning effort that resulted in the development of eight long-term Strategic Objectives. Strategic Plan 1997 differs from its predecessors in that the robust elements of previous efforts have been integrated into one comprehensive body. The changes implemented so far have helped establish a living strategic plan with a stronger business focus and with clear deployment throughout Sandia. The concept of a personal line of sight for all employees to this strategic plan and its objectives, goals, and annual milestones is becoming a reality.

  4. Strategic Belief Management

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul

    While (managerial) beliefs are central to many aspects of strategic organization, interactive beliefs are almost entirely neglected, save for some game theory treatments. In an increasingly connected and networked economy, firms confront coordination problems that arise because of network effects....... The capability to manage beliefs will increasingly be a strategic one, a key source of wealth creation, and a key research area for strategic organization scholars.......While (managerial) beliefs are central to many aspects of strategic organization, interactive beliefs are almost entirely neglected, save for some game theory treatments. In an increasingly connected and networked economy, firms confront coordination problems that arise because of network effects...

  5. The war on prevention: bellicose cancer metaphors hurt (some) prevention intentions.

    Science.gov (United States)

    Hauser, David J; Schwarz, Norbert

    2015-01-01

    Cancer health information is dominated by enemy and war metaphors intended to motivate the public to "fight" cancer. However, enemy metaphoric framing may influence understanding of, and responses to, cancer. Cancer prevention benefits from avoiding risk increasing behaviors, yet self-limitation is not closely associated with fighting enemies. If so, the metaphor may hurt prevention intentions involving self-limitation. Participants read messages with minute wording variations that established different metaphoric frames. Results show that metaphorically framing cancer as an enemy lessens the conceptual accessibility of (Study 1) and intention for self-limiting prevention behaviors while not increasing intention for monitoring and treatment behaviors (Studies 2 and 3). Framing self-limiting prevention behaviors in terms of fighting an enemy increases their appeal, illustrating the benefits of metaphor matching (Study 3). Overall, these results suggest that enemy metaphors in cancer information reduce some prevention intentions without increasing others, making their use potentially harmful for public health.

  6. When it hurts (and helps) to try: the role of effort in language learning.

    Science.gov (United States)

    Finn, Amy S; Lee, Taraz; Kraus, Allison; Hudson Kam, Carla L

    2014-01-01

    Compared to children, adults are bad at learning language. This is counterintuitive; adults outperform children on most measures of cognition, especially those that involve effort (which continue to mature into early adulthood). The present study asks whether these mature effortful abilities interfere with language learning in adults and further, whether interference occurs equally for aspects of language that adults are good (word-segmentation) versus bad (grammar) at learning. Learners were exposed to an artificial language comprised of statistically defined words that belong to phonologically defined categories (grammar). Exposure occurred under passive or effortful conditions. Passive learners were told to listen while effortful learners were instructed to try to 1) learn the words, 2) learn the categories, or 3) learn the category-order. Effortful learners showed an advantage for learning words while passive learners showed an advantage for learning the categories. Effort can therefore hurt the learning of categories.

  7. Psychological mindsets affect consumption: How different mindsets help (hurt) portion control.

    Science.gov (United States)

    Rucker, Derek D; He, Sharlene

    2016-08-01

    The present work discusses how psychological mindsets-orientations that affect how consumers encode, interpret, and respond to information- can help, as well as hurt, portion control. To this end, the current article first provides an overview of the general idea of psychological mindsets. Subsequently, evidence from three distinct areas of mindset research is reviewed: power and powerlessness; fixed and growth; promotion and prevention. For each literature, the relevant mindsets are discussed, and their implications for consumer behavior generally and portion control specifically are illuminated. The paper also provides a discussion of gaps in mindset research with consideration given to how to bridge the theoretical development on mindsets to practical applications. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. How Strategic are Strategic Information Systems?

    Directory of Open Access Journals (Sweden)

    Alan Eardley

    1996-11-01

    Full Text Available There are many examples of information systems which are claimed to have created and sustained competitive advantage, allowed beneficial collaboration or simply ensured the continued survival of the organisations which used them These systems are often referred to as being 'strategic'. This paper argues that many of the examples of strategic information systems as reported in the literature are not sufficiently critical in determining whether the systems meet the generally accepted definition of the term 'strategic' - that of achieving sustainable competitive advantage. Eight of the information systems considered to be strategic are examined here from the standpoint of one widely-accepted 'competition' framework- Porter's model of industry competition . The framework is then used to question the linkage between the information systems and the mechanisms which are required for the enactment of strategic business objectives based on competition. Conclusions indicate that the systems are compatible with Porter's framework. Finally, some limitations of the framework are discussed and aspects of the systems which extend beyond the framework are highlighted

  9. Breaking Out of Tactics: The Strategic Value Model And Thinking Critically at the Operational Level of War

    Science.gov (United States)

    2014-04-01

    strategic bombers. Despite the success of Operation Cobra in World War II, where B-17s and B-24s blasted German troops in northern France, USAF...and 2003 provide contrasting examples of the strategic gain accomplished by strategic attack missions into the heart of Baghdad. In Operation Desert...Lo, known as Operation Cobra , vindicated advocates of the utility of airpower in support of ground forces.53 The back and forth between Eisenhower

  10. Swords of armageddon: A decision of the strategic mystique

    Energy Technology Data Exchange (ETDEWEB)

    Myers, G.E.

    1987-01-01

    To most Americans, our military and civilian political leaders included, the concept of strategic bombardment brings to mind a myopic vision of nuclear horror; and the long-range delivery systems most commonly associated with strategic warfare--the bombers and intercontinental ballistic missiles--are not supported either by a review of the history of modern warfare or by current statements of air power doctrine, but they persist as a legacy of the destructiveness of the World War II strategic air campaigns and the enduring Soviet-American nuclear confrontation. This paper attempts to dispell these notions and advance a concept of flexibility in strategic force application and US strategic policy formulation. It suggests that individual strategic actions have relevance in large and small, nuclear or nonnuclear wars and that our bombers and even our intercontinental missiles can and should be considered as viable force options in a variety of scenarios. The discussion concludes that strategic attack has historically been and will continue to be an active military mission that can be accomplished in numerous ways by a wide variety of weapons and delivery systems despite a continuing mystique of nuclear holocaust.

  11. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  12. Clinical evaluation of the deadline of healing of the ulcer of Buruli hurts of diameter lower or equal to 10 centimeters in pobe (Benin)

    National Research Council Canada - National Science Library

    Christiane Koudoukpo; Félix Atadokpede; Laouali Salissou; Françoise Assogba; Fabrice Akpadjan; Bérénice Degboe; Nadège Agbessi; Hugues Adégbidi

    2016-01-01

    Introduction: Ulcer of Buruli is a skin disorder due to Mycobacterium ulcerans. The objective was to estimate the deadline of healing of the hurts of the ulcer of ulcer of Buruli of diameter ≤ 10 cm...

  13. Associations between hurtful weight-related comments by family and significant other and the development of disordered eating behaviors in young adults.

    Science.gov (United States)

    Eisenberg, Marla E; Berge, Jerica M; Fulkerson, Jayne A; Neumark-Sztainer, Dianne

    2012-10-01

    Research has found that weight-teasing is associated with disordered eating in adolescents. This study expands on the existing research by examining associations between hurtful weight comments by family and a significant other and disordered eating in young adults. Data come from 1,902 young adults (mean age 25) who completed surveys in 1998, 2003 and 2009. Correlations were examined between receiving hurtful comments from family and significant others, and four disordered eating behaviors in young adulthood, adjusting for prior disordered eating and prior teasing. Disordered eating behaviors were common in young adulthood, and were associated with hearing hurtful weight-related comments from family members and a significant other, for both females and males. Disordered eating prevention activities, which include messages about the potential harm associated with hurtful weight-related comments, should be expanded to address young adults, and programs may want to target relationship partners.

  14. 11. Strategic planning.

    Science.gov (United States)

    2014-05-01

    There are several types of planning processes and plans, including strategic, operational, tactical, and contingency. For this document, operational planning includes tactical planning. This chapter examines the strategic planning process and includes an introduction into disaster response plans. "A strategic plan is an outline of steps designed with the goals of the entire organisation as a whole in mind, rather than with the goals of specific divisions or departments". Strategic planning includes all measures taken to provide a broad picture of what must be achieved and in which order, including how to organise a system capable of achieving the overall goals. Strategic planning often is done pre-event, based on previous experience and expertise. The strategic planning for disasters converts needs into a strategic plan of action. Strategic plans detail the goals that must be achieved. The process of converting needs into plans has been deconstructed into its components and includes consideration of: (1) disaster response plans; (2) interventions underway or planned; (3) available resources; (4) current status vs. pre-event status; (5) history and experience of the planners; and (6) access to the affected population. These factors are tempered by the local: (a) geography; (b) climate; (c) culture; (d) safety; and (e) practicality. The planning process consumes resources (costs). All plans must be adapted to the actual conditions--things never happen exactly as planned.

  15. The Strategic Mediator

    DEFF Research Database (Denmark)

    Rossignoli, Cecilia; Carugati, Andrea; Mola, Lapo

    2009-01-01

    as an exclusive club, the belonging to which provides a strategic advantage. The technology brought forth by the marketplace participates in shaping the strategic demands of the participants which in turn request the marketplace to redesign its own strategy. Profiting from this unintended demand, the e...

  16. Manage "Human Capital" Strategically

    Science.gov (United States)

    Odden, Allan

    2011-01-01

    To strategically manage human capital in education means restructuring the entire human resource system so that schools not only recruit and retain smart and capable individuals, but also manage them in ways that support the strategic directions of the organization. These management practices must be aligned with a district's education improvement…

  17. Strategic environmental assessment

    DEFF Research Database (Denmark)

    Kørnøv, Lone

    1997-01-01

    The integration of environmental considerations into strategic decision making is recognized as a key to achieving sustainability. In the European Union a draft directive on Strategic Environmental Assessment (SEA) is currently being reviewed by the member states. The nature of the proposed SEA...

  18. Manage "Human Capital" Strategically

    Science.gov (United States)

    Odden, Allan

    2011-01-01

    To strategically manage human capital in education means restructuring the entire human resource system so that schools not only recruit and retain smart and capable individuals, but also manage them in ways that support the strategic directions of the organization. These management practices must be aligned with a district's education improvement…

  19. Improved Strategic Planning

    Science.gov (United States)

    1966-04-08

    to analyze the difficulties of providing improved strategic planning needed for more orderly progress in human affairs. This analysis consists of an...identification of important conceptual difficulties which stand in the way of improving strategic planning . This thesis concludes that it is necessary

  20. Strategic Leadership in Schools

    Science.gov (United States)

    Williams, Henry S.; Johnson, Teryl L.

    2013-01-01

    Strategic leadership is built upon traits and actions that encompass the successful execution of all leadership styles. In a world that is rapidly changing, strategic leadership in schools guides school leader through assuring constant improvement process by anticipating future trends and planning for them and noting that plans must be flexible to…

  1. Strategic HRD within companies

    NARCIS (Netherlands)

    Wognum, A.A.M.; Mulder, M.M.

    1999-01-01

    This article reports a preliminary survey that was conducted within the framework of the project on strategic human resource development (HRD), in which for various aspects of organisations the effects of strategic HRD are explored. The aim of the survey was to explore some conditions that are impor

  2. FY17 Strategic Themes.

    Energy Technology Data Exchange (ETDEWEB)

    Leland, Robert W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    I am pleased to present this summary of the FY17 Division 1000 Science and Technology Strategic Plan. As this plan represents a continuation of the work we started last year, the four strategic themes (Mission Engagement, Bold Outcomes, Collaborative Environment, and Safety Imperative) remain the same, along with many of the goals. You will see most of the changes in the actions listed for each goal: We completed some actions, modified others, and added a few new ones. As I’ve stated previously, this is not a strategy to be pursued in tension with the Laboratory strategic plan. The Division 1000 strategic plan is intended to chart our course as we strive to contribute our very best in service of the greater Laboratory strategy. I welcome your feedback and look forward to our dialogue about these strategic themes. Please join me as we move forward to implement the plan in the coming months.

  3. On strategic spatial planning

    Directory of Open Access Journals (Sweden)

    Tošić Branka

    2014-01-01

    Full Text Available The goal of this paper is to explain the origin and development of strategic spatial planning, to show complex features and highlight the differences and/or advantages over traditional, physical spatial planning. Strategic spatial planning is seen as one of approaches in legally defined planning documents, and throughout the display of properties of sectoral national strategies, as well as issues of strategic planning at the local level in Serbia. The strategic approach is clearly recognized at the national and sub-national level of spatial planning in European countries and in our country. It has been confirmed by the goals outlined in documents of the European Union and Serbia that promote the grounds of territorial cohesion and strategic integrated planning, emphasizing cooperation and the principles of sustainable spatial development. [Projekat Ministarstva nauke Republike Srbije, br. 176017

  4. Exploration in American Archaeology: Essays in Honor of Wesley R. Hurt. edited by Mark G. Plew, University Press of America, Lanham, 1999

    OpenAIRE

    David L. Browman

    2000-01-01

    This volume contains a short 6 page history of the contributions ofWesley Robert Hurt, Jr., to Americanist archaeology,along with a 4 page 'selected' list of his publications. The review starts with his career in the Southwest, traces the shift in his research to the Plains, and especially South Dakota, and then turns to his later change of interest to South America (especially Colombia, Brazil and Uru­guay). Hurt was ...

  5. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  6. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  7. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  8. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  9. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  10. The strategic issues - structural elements of strategic management

    OpenAIRE

    Balta Corneliu

    2013-01-01

    The paper presents the most important concepts related to strategic management and the connection with strategic results as they are obtained after the main steps in strategic management are followed. The dynamics of the relationship between strategic issues and objectives is included

  11. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  12. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.

  13. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  14. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  15. Strategic agility for nursing leadership.

    Science.gov (United States)

    Shirey, Maria R

    2015-06-01

    This department highlights change management strategies that may be successful in strategically planning and executing organizational change. In this article, the author discusses strategic agility as an important leadership competency and offers approaches for incorporating strategic agility in healthcare systems. A strategic agility checklist and infrastructure-building approach are presented.

  16. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  17. Additive attacks on speaker recognition

    Science.gov (United States)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  18. Value oriented strategic marketing

    Directory of Open Access Journals (Sweden)

    Milisavljević Momčilo

    2013-01-01

    Full Text Available Changes in today's business environment require companies to orient to strategic marketing. The company accepting strategic marketing has a proactive approach and focus on continuous review and reappraisal of existing and seeking new strategic business areas. Difficulties in achieving target profit and growth require turning marketing from the dominant viewpoint of the tangible product to creating superior value and developing relationships with customers. Value orientation implies gaining competitive advantage through continuous research and understanding of what value represents to the consumers and discovering new ways to meet their required values. Strategic marketing investment requires that the investment in the creation of values should be regularly reviewed in order to ensure a focus on customers with high profit potential and environmental value. This increases customer satisfaction and retention and long-term return on investment of companies.

  19. Engineering Forum Strategic Plan

    Science.gov (United States)

    This Strategic Plan highlights the purpose, mission, goals, and objectives of the U.S. Environmental Protection Agency (EPA) Engineering Forum (EF). It sets forth the principles that guide the EF's decision-making, helps clarify the EF's priorities, and...

  20. Strategic Management: General Concepts

    Directory of Open Access Journals (Sweden)

    Shahram Tofighi

    2010-05-01

    Full Text Available In the era after substitution of long term planning by strategic planning, it was wished that the managers could act more successful in implementing their plans. The outcomes were far from the expected, there were minor improvements. In the organizations, a plenty of namely strategic plans has been developed during strategic planning processes, but most of these plans have been kept in the shelves, a few of them played their roles as guiding documents for the entire organization. What are the factors inducing such outcomes? Different scientists have offered a variety of justifications, according to their expe-riences."nThe first examined issue was misunderstanding stra-tegic planning by the managers and staff; it means the strategic planning process may be executed erroneously, and what they had expected from this process was not accurate. Substantially, strategic planning looks at the future and coming situations, and is designed to answer the questions which emerge in the future. Unfortunately, this critical and fundamental characteristic of strategic planning is obscured."nStrategic planning conveys the concept of drawing the future and developing a set of different probable scenarios along with defining a set of solutions in order to combat undesirable coming conditions for positioning the system or business. It helps organizations save themselves safe and maintain them successful. In other words, in strategic planning efforts we are seeking solutions fit for problems which will appear in the future for the conditions that will emerge in the future. Unfortunately, most of strategic plans which have been developed in the organizations lack this important and critical characteristic; I mean in most of them the developers had offered solutions in order to solve today's problems in the future! "nThe second issue which was considered by the scientists, was the task of ensuring the continuity of effectiveness of the planning, there was a

  1. Transactional vs. Strategic Sourcing

    National Research Council Canada - National Science Library

    Mark Ware

    2010-01-01

    .... It's frequently a situation of "here's the comparator that's needed. . .find it yesterday." Having to source a comparator in a very short amount of time can impose a transactional approach to sourcing, rather than a strategic one...

  2. Strategic planning in transition

    DEFF Research Database (Denmark)

    Olesen, Kristian; Richardson, Tim

    2012-01-01

    In this paper, we analyse how contested transitions in planning rationalities and spatial logics have shaped the processes and outputs of recent episodes of Danish ‘strategic spatial planning’. The practice of ‘strategic spatial planning’ in Denmark has undergone a concerted reorientation...... in the recent years as a consequence of an emerging neoliberal agenda promoting a growth-oriented planning approach emphasising a new spatial logic of growth centres in the major cities and urban regions. The analysis, of the three planning episodes, at different subnational scales, highlights how this new...... style of ‘strategic spatial planning’ with its associated spatial logics is continuously challenged by a persistent regulatory, top-down rationality of ‘strategic spatial planning’, rooted in spatial Keynesianism, which has long characterised the Danish approach. The findings reveal the emergence...

  3. Strategic Communication Institutionalized

    DEFF Research Database (Denmark)

    Kjeldsen, Anna Karina

    2013-01-01

    focuses on a discussion of the virus metaphor as an alternative to the widespread fashion metaphor for processes of institutionalization. The second part of the article provides empirical examples of the virus metaphor employed, examples that are drawn from a study of the institutionalization of strategic...... of institutionalization when strategic communication is not yet visible as organizational practice, and how can such detections provide explanation for the later outcome of the process? (2) How can studies of strategic communication benefit from an institutional perspective? How can the virus metaphor generate a deeper...... understanding of the mechanisms that interact from the time an organization is exposed to a new organizational idea such as strategic communication until it surfaces in the form of symptoms such as mission and vision statements, communication manuals and communication positions? The first part of the article...

  4. The IAU Strategic Plan

    Science.gov (United States)

    Miley, George

    2016-10-01

    I shall review the content of the IAU Strategic Plan (SP) to use astronomy as a tool for stimulating development globally during the decade 2010 - 2020. Considerable progress has been made in its implementation since the last General Assembly.

  5. Network Analysis of Strategic Marketing Actions and Quality Function Deployment

    Directory of Open Access Journals (Sweden)

    fatema daneshian

    2011-12-01

    Nowadays, strategic marketing management has become an accepted practice in the strategic field. An increasing number of researchers consider marketing strategies for offering key competitive advantages associated with strategic marketing management. Every decision in the strategic field should be based on three dimensions of evaluating market, evaluating competitors and evaluating company. In this research, a model has been developed for selecting and ranking marketing strategies considering the evaluation of market (customer satisfaction elements, competitors and company based on Kano model. Quality function deployment (QFD and the analytic network process (ANP approaches have been used for market prioritization. The research has been carried out in three phases. In Phase one, the Kano model of customer satisfaction has been used to determine which requirements of a product or service brings more satisfaction to the customers, followed by the evaluation of competitors and gap analyze. In Phase two, The QFD approach has been used to incorporate the voice of customer (VOC into the marketing strategies of the company and has provided a systematic planning tool for considering the information of elements (in the last phase to make appropriate decisions effectively and efficiently. In Phase three, the ANP method has been used to analyze strategic actions considering company conditions. Finally the outputs of QFD have been corrected by ANP weights. Findings imply that the three most important strategic actions which are important for the company include offering differentiated and new generation of products to the market (leapfrog strategy, optimizing visual properties of products, and widespread and attractive advertising (frontal attack.

  6. Strategizing in multiple ways

    DEFF Research Database (Denmark)

    Larsen, Mette Vinther; Madsen, Charlotte Øland; Rasmussen, Jørgen Gulddahl

    2013-01-01

    Strategy processes are kinds of wayfaring where different actors interpret a formally defined strat-egy differently. In the everyday practice of organizations strategizing takes place in multiple ways through narratives and sensible actions. This forms a meshwork of polyphonic ways to enact one a...... based on this development paper is whether one can understand these diver-gent strategic wayfaring processes as constructive for organizations....

  7. 2015 Enterprise Strategic Vision

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-08-01

    This document aligns with the Department of Energy Strategic Plan for 2014-2018 and provides a framework for integrating our missions and direction for pursuing DOE’s strategic goals. The vision is a guide to advancing world-class science and engineering, supporting our people, modernizing our infrastructure, and developing a management culture that operates a safe and secure enterprise in an efficient manner.

  8. Strategic market segmentation

    Directory of Open Access Journals (Sweden)

    Maričić Branko R.

    2015-01-01

    Full Text Available Strategic planning of marketing activities is the basis of business success in modern business environment. Customers are not homogenous in their preferences and expectations. Formulating an adequate marketing strategy, focused on realization of company's strategic objectives, requires segmented approach to the market that appreciates differences in expectations and preferences of customers. One of significant activities in strategic planning of marketing activities is market segmentation. Strategic planning imposes a need to plan marketing activities according to strategically important segments on the long term basis. At the same time, there is a need to revise and adapt marketing activities on the short term basis. There are number of criteria based on which market segmentation is performed. The paper will consider effectiveness and efficiency of different market segmentation criteria based on empirical research of customer expectations and preferences. The analysis will include traditional criteria and criteria based on behavioral model. The research implications will be analyzed from the perspective of selection of the most adequate market segmentation criteria in strategic planning of marketing activities.

  9. Why does my shoulder hurt? A review of the neuroanatomical and biochemical basis of shoulder pain.

    Science.gov (United States)

    Dean, Benjamin John Floyd; Gwilym, Stephen Edward; Carr, Andrew Jonathan

    2013-11-01

    If a patient asks 'why does my shoulder hurt?' the conversation will quickly turn to scientific theory and sometimes unsubstantiated conjecture. Frequently, the clinician becomes aware of the limits of the scientific basis of their explanation, demonstrating the incompleteness of our understanding of the nature of shoulder pain. This review takes a systematic approach to help answer fundamental questions relating to shoulder pain, with a view to providing insights into future research and novel methods for treating shoulder pain. We shall explore the roles of (1) the peripheral receptors, (2) peripheral pain processing or 'nociception', (3) the spinal cord, (4) the brain, (5) the location of receptors in the shoulder and (6) the neural anatomy of the shoulder. We also consider how these factors might contribute to the variability in the clinical presentation, the diagnosis and the treatment of shoulder pain. In this way we aim to provide an overview of the component parts of the peripheral pain detection system and central pain processing mechanisms in shoulder pain that interact to produce clinical pain.

  10. When math hurts: math anxiety predicts pain network activation in anticipation of doing math.

    Science.gov (United States)

    Lyons, Ian M; Beilock, Sian L

    2012-01-01

    Math can be difficult, and for those with high levels of mathematics-anxiety (HMAs), math is associated with tension, apprehension, and fear. But what underlies the feelings of dread effected by math anxiety? Are HMAs' feelings about math merely psychological epiphenomena, or is their anxiety grounded in simulation of a concrete, visceral sensation - such as pain - about which they have every right to feel anxious? We show that, when anticipating an upcoming math-task, the higher one's math anxiety, the more one increases activity in regions associated with visceral threat detection, and often the experience of pain itself (bilateral dorso-posterior insula). Interestingly, this relation was not seen during math performance, suggesting that it is not that math itself hurts; rather, the anticipation of math is painful. Our data suggest that pain network activation underlies the intuition that simply anticipating a dreaded event can feel painful. These results may also provide a potential neural mechanism to explain why HMAs tend to avoid math and math-related situations, which in turn can bias HMAs away from taking math classes or even entire math-related career paths.

  11. When math hurts: math anxiety predicts pain network activation in anticipation of doing math.

    Directory of Open Access Journals (Sweden)

    Ian M Lyons

    Full Text Available Math can be difficult, and for those with high levels of mathematics-anxiety (HMAs, math is associated with tension, apprehension, and fear. But what underlies the feelings of dread effected by math anxiety? Are HMAs' feelings about math merely psychological epiphenomena, or is their anxiety grounded in simulation of a concrete, visceral sensation - such as pain - about which they have every right to feel anxious? We show that, when anticipating an upcoming math-task, the higher one's math anxiety, the more one increases activity in regions associated with visceral threat detection, and often the experience of pain itself (bilateral dorso-posterior insula. Interestingly, this relation was not seen during math performance, suggesting that it is not that math itself hurts; rather, the anticipation of math is painful. Our data suggest that pain network activation underlies the intuition that simply anticipating a dreaded event can feel painful. These results may also provide a potential neural mechanism to explain why HMAs tend to avoid math and math-related situations, which in turn can bias HMAs away from taking math classes or even entire math-related career paths.

  12. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  13. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  14. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  15. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  16. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  17. Guidelines for strategic planning

    Energy Technology Data Exchange (ETDEWEB)

    1991-07-01

    Strategic planning needs to be done as one of the integral steps in fulfilling our overall Departmental mission. The role of strategic planning is to assure that the longer term destinations, goals, and objectives which the programs and activities of the Department are striving towards are the best we can envision today so that our courses can then be set to move in those directions. Strategic planning will assist the Secretary, Deputy Secretary, and Under Secretary in setting the long-term directions and policies for the Department and in making final decisions on near-term priorities and resource allocations. It will assist program developers and implementors by providing the necessary guidance for multi-year program plans and budgets. It is one of the essential steps in the secretary's Strategic Planning Initiative. The operational planning most of us are so familiar with deals with how to get things done and with the resources needed (people, money, facilities, time) to carry out tasks. Operating plans like budgets, capital line item projects, R D budgets, project proposals, etc., are vital to the mission of the Department. They deal, however, with how to carry out programs to achieve some objective or budget assumption. Strategic planning deals with the prior question of what it is that should be attempted. It deals with what objectives the many programs and activities of the Department of Department should be striving toward. The purpose of this document is to provide guidance to those organizations and personnel starting the process for the first time as well as those who have prepared strategic plans in the past and now wish to review and update them. This guideline should not be constructed as a rigid, restrictive or confining rulebook. Each organization is encouraged to develop such enhancements as they think may be useful in their planning. The steps outlined in this document represent a very simplified approach to strategic planning. 9 refs.

  18. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang; Cui, Shuguang

    2014-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

  19. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  20. FY16 Strategic Themes.

    Energy Technology Data Exchange (ETDEWEB)

    Leland, Robert W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    I am pleased to present this summary of the Division 1000 Science and Technology Strategic Plan. This plan was created with considerable participation from all levels of management in Division 1000, and is intended to chart our course as we strive to contribute our very best in service of the greater Laboratory strategy. The plan is characterized by four strategic themes: Mission Engagement, Bold Outcomes, Collaborative Environment, and the Safety Imperative. Each theme is accompanied by a brief vision statement, several goals, and planned actions to support those goals throughout FY16. I want to be clear that this is not a strategy to be pursued in tension with the Laboratory strategic plan. Rather, it is intended to describe “how” we intend to show up for the “what” described in Sandia’s Strategic Plan. I welcome your feedback and look forward to our dialogue about these strategic themes. Please join me as we move forward to implement the plan in the coming year.

  1. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    Directory of Open Access Journals (Sweden)

    Ashraf Al Sharah

    2016-01-01

    Full Text Available Security in mobile ad hoc networks (MANETs is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

  2. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    permutations of rows and columns. 3 Related Work Most prior empirical cyber security work is interested in characterizing the mode of operation of attack...The attribute networks (ICT att, bandwidth att, bribes att, ICT vie and ICT % diff) have all 1 component, and density and clustering coefficient...attnlrutes or attackers and victims ICT att x ICT vie 0.19*** 0.23*** 0.51*** 0.47*** Bribes att x ICT vie 0.21• 0.21* -0.26* -0.27 Bandwidth att

  3. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  4. Thinking strategically about capitation.

    Science.gov (United States)

    Boland, P

    1997-05-01

    All managed care stakeholders--health plan members, employers, providers, community organizations, and government entitites--share a common interest in reducing healthcare costs while improving the quality of care health plan members receive. Although capitation is a usually thought of primarily as a payment mechanism, it can be a powerful tool providers and health plans can use to accomplish these strategic objectives and others, such as restoring and maintaining the health of plan members or improving a community's health status. For capitation to work effectively as a strategic tool, its use must be tied to a corporate agenda of partnering with stakeholders to achieve broader strategic goals. Health plans and providers must develop a partnership strategy in which each stakeholder has well-defined roles and responsibilities. The capitation structure must reinforce interdependence, shift focus from meeting organizational needs to meeting customer needs, and develop risk-driven care strategies.

  5. Strategic CSR in Afghanistan

    DEFF Research Database (Denmark)

    Azizi, Sameer

    CSR is a rising phenomena in Afghanistan – but why are firms concerned about CSR in a least-developed context such as Afghanistan, and what are the strategic benefits? This paper is one of the first to explore these CSR issues in a least-developed country. It does so by focusing on CSR...... in the Afghan telecommunication sector and in particular on ‘Roshan’ as a case company. The findings of this paper are two-folded. First, it provides an overview of the CSR practices in the telecommunication sector in Afghanistan. Second, it focuses on one case and explains whether Roshan can gain strategic...... advantages through CSR in Afghanistan, and if so which and how these strategic benefits are gained. The paper shows that the developmental challenges of Afghanistan are the key explanations for why companies engage in CSR. Roshan has engaged in proactive CSR to overcome the contextual barriers for growth...

  6. Tourism and Strategic Planning

    DEFF Research Database (Denmark)

    Pasgaard, Jens Christian

    2012-01-01

    the potential of ‘the extraordinary’ tourism-dominated space. As highlighted in the introduction, this report does not present any systematic analysis of strategic planning processes; neither does it provide any unequivocal conclusions. Rather, the report presents a collection of so-called ‘detours......The main purpose of this report is to explore and unfold the complexity of the tourism phenomenon in order to qualify the general discussion of tourism-related planning challenges. Throughout the report I aim to demonstrate the strategic potential of tourism in a wider sense and more specifically......’ – a collection of theoretical discussions and case studies with the aim to inspire future strategic planning. Due to the complexity and heterogeneity of the phenomenon I use a non-linear and non-chronological report format with the ambition to create a new type of overview. In this regard the report is intended...

  7. Strategic Self-Ignorance

    DEFF Research Database (Denmark)

    Thunström, Linda; Nordström, Leif Jonas; Shogren, Jason F.

    We examine strategic self-ignorance—the use of ignorance as an excuse to overindulge in pleasurable activities that may be harmful to one’s future self. Our model shows that guilt aversion provides a behavioral rationale for present-biased agents to avoid information about negative future impacts...... of such activities. We then confront our model with data from an experiment using prepared, restaurant-style meals — a good that is transparent in immediate pleasure (taste) but non-transparent in future harm (calories). Our results support the notion that strategic self-ignorance matters: nearly three of five...... subjects (58 percent) chose to ignore free information on calorie content, leading at-risk subjects to consume significantly more calories. We also find evidence consistent with our model on the determinants of strategic self-ignorance....

  8. Strategic self-ignorance

    DEFF Research Database (Denmark)

    Thunström, Linda; Nordström, Leif Jonas; Shogren, Jason F.

    2016-01-01

    We examine strategic self-ignorance—the use of ignorance as an excuse to over-indulge in pleasurable activities that may be harmful to one’s future self. Our model shows that guilt aversion provides a behavioral rationale for present-biased agents to avoid information about negative future impacts...... of such activities. We then confront our model with data from an experiment using prepared, restaurant-style meals—a good that is transparent in immediate pleasure (taste) but non-transparent in future harm (calories). Our results support the notion that strategic self-ignorance matters: nearly three of five...... subjects (58%) chose to ignore free information on calorie content, leading at-risk subjects to consume significantly more calories. We also find evidence consistent with our model on the determinants of strategic self-ignorance....

  9. Mapping strategic diversity: strategic thinking from a variety of perspectives

    NARCIS (Netherlands)

    Jacobs, D.

    2010-01-01

    In his influential work, Strategy Safari, Henry Mintzberg and his colleagues presented ten schools of strategic thought. In this impressive book, Dany Jacobs demonstrates that the real world of strategic management is much wider and richer. In Mapping Strategic Diversity, Jacobs distinguishes betwee

  10. Mapping strategic diversity: strategic thinking from a variety of perspectives

    NARCIS (Netherlands)

    Jacobs, D.

    2010-01-01

    In his influential work, Strategy Safari, Henry Mintzberg and his colleagues presented ten schools of strategic thought. In this impressive book, Dany Jacobs demonstrates that the real world of strategic management is much wider and richer. In Mapping Strategic Diversity, Jacobs distinguishes

  11. The Strategic Attitude: Integrating Strategic Planning into Daily University Worklife

    Science.gov (United States)

    Dickmeyer, Nathan

    2004-01-01

    Chief financial officers in today's universities are so busy with the challenges of day-to-day management that strategic thinking often takes a back seat. Planning for strategic change can go a long way toward streamlining the very daily tasks that obscure the "big picture." Learning how to integrate strategic thinking into day-to-day management…

  12. Strategic environmental assessment

    DEFF Research Database (Denmark)

    Kørnøv, Lone

    1997-01-01

    The integration of environmental considerations into strategic decision making is recognized as a key to achieving sustainability. In the European Union a draft directive on Strategic Environmental Assessment (SEA) is currently being reviewed by the member states. The nature of the proposed SEA...... that the SEA directive will influence the decision-making process positively and will help to promote improved environmental decisions. However, the guidelines for public participation are not sufficient and the democratic element is strongly limited. On the basis of these findings, recommendations relating...

  13. Macrofoundation for Strategic Technology Management

    DEFF Research Database (Denmark)

    Pedersen, Jørgen Lindgaard

    1995-01-01

    Neoclassical mainstream economics has no perspective on strategic technology management issues. Market failure economics (externalities etc.)can be of some use to analyze problems of relevance in strategic management problems with technology as a part. Environment, inequality and democratic...

  14. Macrofoundation for Strategic Technology Management

    DEFF Research Database (Denmark)

    Pedersen, Jørgen Lindgaard

    1995-01-01

    Neoclassical mainstream economics has no perspective on strategic technology management issues. Market failure economics (externalities etc.)can be of some use to analyze problems of relevance in strategic management problems with technology as a part. Environment, inequality and democratic...

  15. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  16. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  17. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  18. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  19. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst 24...

  20. The Influence of Charismatic Authority on Operational Strategies and Attack Outcomes of Terrorist Groups

    Directory of Open Access Journals (Sweden)

    David C. Hofmann

    2016-06-01

    Full Text Available Despite the historical and contemporary prevalence of charismatic terrorist leaders, there has been very little empirical examination of the relationship between charismatic forms of authority and the strategic operation of terrorist groups. In response to this gap in knowledge, this study seeks to investigate if charismatic authority has a real-world impact on strategic choices and attack outcomes of terrorist groups. Using a theoretical framework meant to help measure charisma in terrorist organizations, this study quantitatively examines how differing levels of the presence of charismatic authority contributes to the choice in operational tactics (e.g., weapon and target choices and the results of attack outcomes (e.g., success rates, lethality within a sample of thirty international terrorist groups. In the concluding section, relevant findings, policy recommendations, study limitations, and areas for future research are discussed.

  1. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  2. Causes, rationales and dynamics : exploring the strategic security partnership between the European Union and Africa

    NARCIS (Netherlands)

    Siradag, Abdurrahim

    2012-01-01

    This study examines a strategic partnership in the areas of peace and security between the EU and Africa. The EU has been strengthening its institutional ties with African organisations since 2000, with security relations with Africa a priority on the EU’s agenda following the 9/11 attacks on the Un

  3. A Handbook for Strategic Planning

    Science.gov (United States)

    1994-01-01

    This handbook was written for Department of the Navy (DON) commanding officers, TQL coordinators, and strategic planning facilitators in response to...questions about the strategic planning process and how it should be conducted within the DON. It is not intended to teach the intricacies of strategic ... planning , but is provided to answer process questions. While every question cannot be anticipated, the handbook details one way to do strategic

  4. Strategic Alignment of Business Intelligence

    OpenAIRE

    Cederberg, Niclas

    2010-01-01

    This thesis is about the concept of strategic alignment of business intelligence. It is based on a theoretical foundation that is used to define and explain business intelligence, data warehousing and strategic alignment. By combining a number of different methods for strategic alignment a framework for alignment of business intelligence is suggested. This framework addresses all different aspects of business intelligence identified as relevant for strategic alignment of business intelligence...

  5. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  6. Strategic Planning and Financial Management

    Science.gov (United States)

    Conneely, James F.

    2010-01-01

    Strong financial management is a strategy for strategic planning success in student affairs. It is crucial that student affairs professionals understand the necessity of linking their strategic planning with their financial management processes. An effective strategic planner needs strong financial management skills to implement the plan over…

  7. The Possibilities of Strategic Finance

    Science.gov (United States)

    Chaffee, Ellen

    2010-01-01

    Strategic finance is aligning financial decisions--regarding revenues, creating and maintaining institutional assets, and using those assets--with the institution's mission and strategic plan. The concept known as "strategic finance" increasingly is being seen as a useful perspective for helping boards and presidents develop a sustainable…

  8. Being Strategic in HE Management

    Science.gov (United States)

    West, Andrew

    2008-01-01

    The call to be strategic--and with it the concept of strategic management--can bring to mind a wide range of definitions, and there is now a huge array of academic literature supporting the different schools of thought. At a basic level, however, strategic thinking is probably most simply about focusing on the whole, rather than the part. In…

  9. The Possibilities of Strategic Finance

    Science.gov (United States)

    Chaffee, Ellen

    2010-01-01

    Strategic finance is aligning financial decisions--regarding revenues, creating and maintaining institutional assets, and using those assets--with the institution's mission and strategic plan. The concept known as "strategic finance" increasingly is being seen as a useful perspective for helping boards and presidents develop a sustainable…

  10. Being Strategic in HE Management

    Science.gov (United States)

    West, Andrew

    2008-01-01

    The call to be strategic--and with it the concept of strategic management--can bring to mind a wide range of definitions, and there is now a huge array of academic literature supporting the different schools of thought. At a basic level, however, strategic thinking is probably most simply about focusing on the whole, rather than the part. In…

  11. Strategic market planning for hospitals.

    Science.gov (United States)

    Zallocco, R L; Joseph, W B; Doremus, H

    1984-01-01

    The application of strategic market planning to hospital management is discussed, along with features of the strategic marketing management process. A portfolio analysis tool, the McKinsey/G.E. Business Screen, is presented and, using a large urban hospital as an example, discussed in detail relative to hospital administration. Finally, strategic implications of the portfolio analysis are examined.

  12. Strategic Management of Large Projects

    Institute of Scientific and Technical Information of China (English)

    WangYingluo; LiuYi; LiYuan

    2004-01-01

    The strategic management of large projects is both theoretically and practically important. Some scholars have advanced flexible strategy theory in China. The difference of strategic flexibility and flexible strategy is pointed out. The supporting system and characteristics of flexible strategy are analyzed. The changes of flexible strategy and integration of strategic management are discussed.

  13. Strategic Planning and Financial Management

    Science.gov (United States)

    Conneely, James F.

    2010-01-01

    Strong financial management is a strategy for strategic planning success in student affairs. It is crucial that student affairs professionals understand the necessity of linking their strategic planning with their financial management processes. An effective strategic planner needs strong financial management skills to implement the plan over…

  14. Armed Helicopters: How the Army Fought Its Way into Attack Aviation

    Science.gov (United States)

    2015-04-01

    particularly that of attack aviation. Inter - service rivalry with the Air Force in its infancy coupled with its overly strategic focus on the role of... Inter -service rivalries began to creep back up as the rigors of combat gave way to shrinking budgets and services looking out for themselves. The...combined arms doctrine as well as the joint arena. The Army’s turbulent battle with bureaucratic barriers, inter -service rivalry, and general

  15. Analysis of Protection Measures for Naval Vessels Berthed at Harbor Against Terrorist Attacks

    Science.gov (United States)

    2016-06-01

    by the Mexican Navy to prevent terrorist attacks on the strategic Campeche Sound (petroleum production area) in the Gulf of Mexico. Martinez used... visualization techniques (Lucas, Kelton, Sanchez, Sanchez, & Anderson, 2015). After choosing factors and the ranges of these factors to explore, an...accurate map possible would be the territory, and thus would be perfectly accurate and perfectly useless. — Neil Gaiman, American Gods “One of the

  16. Bypass Ratio: The US Air Force and Light-Attack Aviation

    Science.gov (United States)

    2013-06-01

    unsatisfactory; 4) The president orders the services to create specialized forces; 5) The services comply by scrambling to recreate former capability... scramble times over long distances and decrease the wait time for troops in contact. Light-attack aircraft can...of the strategic eggs in the high-tech basket. For a long time, the Air Force had to measure its success in speed. Basically, money was not the

  17. Strategic Targeted Advertising

    NARCIS (Netherlands)

    A. Galeotti; J.L. Moraga-Gonzalez (José Luis)

    2003-01-01

    textabstractWe present a strategic game of pricing and targeted-advertising. Firms can simultaneously target price advertisements to different groups of customers, or to the entire market. Pure strategy equilibria do not exist and thus market segmentation cannot occur surely. Equilibria exhibit rand

  18. Strategic Information Systems Planning.

    Science.gov (United States)

    Rowley, Jennifer

    1995-01-01

    Strategic Information Systems Planning (SISP) is the process of establishing a program for implementation and use of information systems in ways that will optimize effectiveness of information resources and use them to support the objectives of the organization. Basic steps in SISP methodology are outlined. (JKP)

  19. The strategic research positioning:

    DEFF Research Database (Denmark)

    Viala, Eva Silberschmidt

    to provide new insights into ‘immigrant’ parents’ perspective on home/school partnership in Denmark. The majority of the immigrant parents came from non-Western countries, and they had already been ‘labelled’ difficult in terms of home/school partnership. This calls for what I call ‘strategic research...

  20. The Strategic Revolution.

    Science.gov (United States)

    Gardner, Andy

    2016-09-08

    On the 40(th) anniversary of the publication of Richard Dawkins's The Selfish Gene, we explore the origins of cynical, strategic thinking in evolutionary biology, investigate how this illuminated the sexual and social lives of animals, and assess Dawkins's suggestion that evolution is best understood by taking the gene's-eye view. Copyright © 2016 Elsevier Inc. All rights reserved.

  1. Towards Strategic Language Learning

    NARCIS (Netherlands)

    Oostdam, R.; Rijlaarsdam, Gert

    1995-01-01

    Towards Strategic Language Learning is the result of extensive research in the relationship between mother tongue education and foreign language learning. As language skills that are taught during native language lessons are applied in foreign language performance as well, it is vital that curricula

  2. Strategic Leadership Development Model

    Science.gov (United States)

    2012-03-19

    system in vogue is relatively streamlined and ensures better grooming of potential strategic leaders at varying stages of their career; however, it...Washington, D.C.: National Defence University Press,1997). 20 Op. Cit. 21 Howard Gardener, Leading Minds; An Anatomy of Leadership (Great Britain

  3. Strategic Tutor Monitoring.

    Science.gov (United States)

    Chee-kwong, Kenneth Chao

    1996-01-01

    Discusses effective tutor monitoring strategies based on experiences at the Open Learning Institute of Hong Kong. Highlights include key performance and strategic control points; situational factors, including tutor expectations and relevant culture; Theory X versus Theory Y leadership theories; and monitoring relationships with tutors. (LRW)

  4. Strategic Targeted Advertising

    NARCIS (Netherlands)

    A. Galeotti; J.L. Moraga-Gonzalez (José Luis)

    2003-01-01

    textabstractWe present a strategic game of pricing and targeted-advertising. Firms can simultaneously target price advertisements to different groups of customers, or to the entire market. Pure strategy equilibria do not exist and thus market segmentation cannot occur surely. Equilibria exhibit rand

  5. What is strategic management?

    Science.gov (United States)

    Jasper, Melanie; Crossan, Frank

    2012-10-01

    To discuss the theoretical concept of strategic management and explore its relevance for healthcare organisations and nursing management. Despite being a relatively new approach, the growth of strategic management within organisations has been consistently and increasingly promoted. However, comprehensive definitions are scarce and commonalities of interpretation are limited. This paper presents an exploratory discussion of the construct of strategic management, drawing on the literature and questioning its relevance within health-care organisations. Literature relating to strategic management across a number of fields was accessed, drawing primarily on meta-studies within management literature, to identify key concepts and attempt to present a consistent definition. The concept within health care is explored in relation to nursing management. Inconsistency in definitions and utilisation of key concepts within this management approach results in the term being loosely applied in health-care organisations without recourse to foundational principles and a deep understanding of the approach as a theory as opposed to an applied term. Nurse managers are increasingly asked to adopt the 'next-best-thing' in managerial theories, yet caution needs to be taken in nurses agreeing to use systems that lack an evidence base in terms of both efficacy and relevance of context. © 2012 Blackwell Publishing Ltd.

  6. Strategic Tutor Monitoring.

    Science.gov (United States)

    Chee-kwong, Kenneth Chao

    1996-01-01

    Discusses effective tutor monitoring strategies based on experiences at the Open Learning Institute of Hong Kong. Highlights include key performance and strategic control points; situational factors, including tutor expectations and relevant culture; Theory X versus Theory Y leadership theories; and monitoring relationships with tutors. (LRW)

  7. Adaptive Airport Strategic Planning

    NARCIS (Netherlands)

    Kwakkel, J.H.; Walker, W.E.; Marchau, V.A.W.J.

    2010-01-01

    Airport Strategic Planning (ASP) focuses on the development of plans for the long-term development of an airport. The dominant approach for ASP is Airport Master Planning (AMP). The goal of AMP is to provide a detailed blueprint for how the airport should look in the future, and how it can get there

  8. The Strategic Resources

    Institute of Scientific and Technical Information of China (English)

    Liu Zhiyang

    2011-01-01

    “The reason I pay close attention to and am very concerned about standards is that fiom my point of view standards are very important resources or even strategic resources.The meteorological work is highly professional and requires standards in every aspect.With disjoint standards,businesses,services and scientific researches cannot be properly done.”

  9. Towards Strategic Language Learning

    NARCIS (Netherlands)

    Oostdam, R.; Rijlaarsdam, Gert

    1995-01-01

    Towards Strategic Language Learning is the result of extensive research in the relationship between mother tongue education and foreign language learning. As language skills that are taught during native language lessons are applied in foreign language performance as well, it is vital that curricula

  10. Strategic Sample Selection

    DEFF Research Database (Denmark)

    Di Tillio, Alfredo; Ottaviani, Marco; Sørensen, Peter Norman

    2017-01-01

    is double logconvex, as with normal noise. The results are applied to the analysis of strategic sample selection by a biased researcher and extended to the case of uncertain and unanticipated selection. Our theoretical analysis offers applied research a new angle on the problem of selection in empirical...

  11. Trust in Strategic Alliances

    DEFF Research Database (Denmark)

    Nielsen, Bo

    2011-01-01

    This article examines the dynamic and multi-dimensional nature of trust in strategic alliances. Adopting a co-evolutionary approach, I developed a framework to show how trust, conceptualised in different forms, plays distinct roles at various evolutionary stages of the alliance relationship...

  12. Grappling with Strategic Dissonance.

    Science.gov (United States)

    Dowie, Sandra

    2002-01-01

    Presents a case study of the Virtual Retina project (an instructional CD-ROM for ophthalmology students) at the University of Alberta as an example of strategic dissonance in an educational technology unit. Offers methods to analyze the external competitive environment and internal capabilities of educational technology units. (EV)

  13. A Strategic Planning Workbook.

    Science.gov (United States)

    Austin, William

    This workbook outlines the Salem Community College's (New Jersey) Strategic Planning Initiative (SPI), which will enable the college to enter the 21st Century as an active agent in the educational advancement of the Salem community. SPI will allow college faculty, staff, students, and the local community to reflect on the vitality of the college…

  14. Strategic planning for marketers.

    Science.gov (United States)

    Wilson, I

    1978-12-01

    The merits of strategic planning as a marketing tool are discussed in this article which takes the view that although marketers claim to be future-oriented, they focus too little attention on long-term planning and forecasting. Strategic planning, as defined by these authors, usually encompasses periods of between five and twenty-five years and places less emphasis on the past as an absolute predictor of the future. It takes a more probabilistic view of the future than conventional marketing strategy and looks at the corporation as but one component interacting with the total environment. Inputs are examined in terms of environmental, social, political, technological and economic importance. Because of its futuristic orientation, an important tenant of strategic planning is the preparation of several alternative scenarios ranging from most to least likely. By planning for a wide-range of future market conditions, a corporation is more able to be flexible by anticipating the course of future events, and is less likely to become a captive reactor--as the authors believe is now the case. An example of strategic planning at General Elecric is cited.

  15. Strategic Marketing for Agribusiness.

    Science.gov (United States)

    Welch, Mary A., Ed.

    1993-01-01

    The steps for strategic market planning are discussed including: (1) assessing the situation with market conditions, customers, competitors, and your firm; and (2) crafting a strategy to prioritize target markets, develop a core strategy, and create a marketing mix. Examples of agribusiness successes are presented. The booklet concludes with a…

  16. EMSL Strategic Plan 2008

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, Allison A.

    2008-08-15

    This Strategic Plan is EMSL’s template for achieving our vision of simultaneous excellence in all aspects of our mission as a national scientific user facility. It reflects our understanding of the long-term stewardship we must work toward to meet the scientific challenges of the Department of Energy and the nation. During the next decade, we will implement the strategies contained in this Plan, working closely with the scientific community, our advisory committees, DOE’s Office of Biological and Environmental Research, and other key stakeholders. This Strategic Plan is fully aligned with the strategic plans of DOE and its Office of Science. We recognize that shifts in science and technology, national priorities, and resources made available through the Federal budget process create planning uncertainties and, ultimately, a highly dynamic planning environment. Accordingly, this Strategic Plan should be viewed as a living document for which we will continually evaluate changing needs and opportunities posed by our stakeholders (i.e., DOE, users, staff, advisory committees), work closely with them to understand and respond to those changes, and align our strategy accordingly.

  17. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  18. Strategic Management and Business Analysis

    CERN Document Server

    Williamson, David; Jenkins, Wyn; Moreton, Keith Michael

    2003-01-01

    Strategic Business Analysis shows students how to carry out a strategic analysis of a business, with clear guidelines on where and how to apply the core strategic techniques and models that are the integral tools of strategic management.The authors identify the key questions in strategic analysis and provide an understandable framework for answering these questions.Several case studies are used to focus understanding and enable a more thorough analysis of the concepts and issues, especially useful for students involved with case study analysis.Accompanying the text is a CD-Rom containing the m

  19. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  20. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal...

  1. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  2. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  3. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  4. Strategizing Communication. Theory and Practice

    DEFF Research Database (Denmark)

    Gulbrandsen, Ib Tunby; Just, Sine Nørholm

    Strategizing Communication offers a unique perspective on the theory and practice of strategic communication. Written for students and practitioners interested in learning about and acquiring tools for dealing with the technological, environmental and managerial challenges, which organizations face...... when communicating in today’s mediascape, this book presents an array of theories, concepts and models through which we can understand and practice communication strategically. The core of the argument is in the title: strategizing – meaning the act of making something strategic. This entails looking...... beyond, but not past instrumental, rational plans in order to become better able to understand and manage the concrete, incremental practices and contexts in which communication becomes strategic. Thus, we argue that although strategic communicators do (and should) make plans, a plan in itself does...

  5. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    at- tack analysis as opposed to analyzing individual attacks; making detection sensors temporally and spatially dynamic; making attack identification...and Analysis Environment Asymmetry 22 3.5 Legacy Support Requirements 27 3.6 Sensors are Static Spatially and Temporally , While Attacks are Dynamic 28...or analysis, typically due to a lack of context from the points of attack. 2. Systems are designed for expressiveness and flexibility a. Many languages

  6. Terror attacks influence driving behavior in Israel

    Science.gov (United States)

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  7. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  8. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  9. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  10. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  11. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  12. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  13. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  14. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...

  15. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  16. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  17. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  18. Cyber Attacks: Emerging Threats to the 21st Century Critical Information Infrastructures

    Directory of Open Access Journals (Sweden)

    Cezar Vasilescu

    2012-06-01

    Full Text Available The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It starts by elaborating a conceptual theoretical framework, observing that when it comes to cyber attacks, cyber war and cyber defense there are no internationally accepted definitions on the subject, mostly because of the relative recency of the terms. The second part analyzes the cyber realities of recent years, emphasizing the most advertised cyber attacks in the international mass media: Estonia (2007 and Georgia (2008, with a focus on two main lessons learned: how complicated is to define a cyber war and how difficult to defend against it. Crucial implications for world’s countries and the role of NATO in assuring an effective collective cyber defense are analyzed in the third part. The need for the development of strategic cyber defense documents (e.g. NATO Cyber Defense Policy, NATO Strategic Concept is further examined. It is suggested that particular attention should be paid to the development of a procedure for clearly discriminating between events (cyber attacks, cyber war, cyber crime, or cyber terrorism, and to a procedure for the conduct of nation’s legitimate military/civil cyber response operations.

  19. The Strategic Mediator

    DEFF Research Database (Denmark)

    Rossignoli, Cecilia; Carugati, Andrea; Mola, Lapo

    2009-01-01

    The last 10 years have witnessed the emergence of electronic marketplaces as players that leverage new technologies to facilitate B2B internet-mediated collaborative business. Nowadays these players are augmenting their services from simple intermediation to include new inter-organizational relat......The last 10 years have witnessed the emergence of electronic marketplaces as players that leverage new technologies to facilitate B2B internet-mediated collaborative business. Nowadays these players are augmenting their services from simple intermediation to include new inter......-marketplace assumes the paradoxical role of strategic mediator: an agent who upholds and heightens the fences of the transactions instead of leveling them. The results have implication in shaping how we see the role of technology as strategic or commoditized....

  20. Scope of strategic marketing

    Directory of Open Access Journals (Sweden)

    Bradley Frank

    2004-01-01

    Full Text Available Marketing is a philosophy that leads to the process by which organizations, groups and individuals obtain what they need and want by identifying value, providing it, communicating it and delivering it to others. The core concepts of marketing are customers needs, wants and values; products, exchange, communications and relationships. Marketing is strategically concerned with the direction and scope of the long-term activities performed by the organization to obtain a competitive advantage. The organization applies its resources within a changing environment to satisfy customer needs while meeting stakeholder expectations. Implied in this view of strategic marketing is the requirement to develop a strategy to cope with competitors, identify market opportunities, develop and commercialize new products and services, allocate resources among marketing activities and design an appropriate organizational structure to ensure the perform once desired is achieved.

  1. Strategic innovation portfolio management

    Directory of Open Access Journals (Sweden)

    Stanković Ljiljana

    2015-01-01

    Full Text Available In knowledge-based economy, strategic innovation portfolio management becomes more and more important and critical factor of enterprise's success. Value creation for all the participants in value chain is more successful if it is based on efficient resource allocation and improvement of innovation performances. Numerous researches have shown that companies with best position on the market found their competitiveness on efficient development and exploitation of innovations. In decision making process, enterprise's management is constantly faced with challenge to allocate resources and capabilities as efficiently as possible, in both short and long term. In this paper authors present preliminary results of realized empirical research related to strategic innovation portfolio management in ten chosen enterprises in Serbia. The structure of the paper includes the following parts: theoretical background, explanation of research purpose and methodology, discussion of the results and concluding remarks, including limitations and directions for further research.

  2. Strategic port development

    DEFF Research Database (Denmark)

    Olesen, Peter Bjerg; Dukovska-Popovska, Iskra; Hvolby, Hans-Henrik

    2014-01-01

    developments. This paper examines a series of models from the port development literature and then proposes an approach for conceptualizing the strategic development of a port’s collaboration with local operators and the local hinterland based on connected development steps. The paper is based on a literature...... review relevant to international port development and a case study done in a Danish port as part of the main authors PhD project. The proposed model provides a strategic approach to control and improve the development of a port system and the connected hinterland. While the model is generic in its......While large global ports are recognised as playing a central role in many supply chains as logistic gateways, smaller regional ports have been more stagnant and have not reached the same level of development as the larger ports. The research literature in relation to port development is also...

  3. Strategic Transfer Pricing

    OpenAIRE

    Michael Alles; Srikant Datar

    1998-01-01

    Most research into cost systems has focused on their motivational implications. This paper takes a different approach, by developing a model where two oligopolistic firms strategically select their cost-based transfer prices. Duopoly models frequently assume that firms game on their choice of prices. Product prices, however, are ultimately based on the firms' transfer prices that communicate manufacturing costs to marketing departments. It is for this reason that transfer prices will have a s...

  4. Thinking strategically about assessment

    OpenAIRE

    Mutch, A

    2002-01-01

    Drawing upon the literature on strategy formulation in organisations, this paper argues for a focus on strategy as process. It relates this to the need to think strategically about assessment, a need engendered by resource pressures, developments in learning and the demands of external stakeholders. It is argued that in practice assessment strategies are often formed at the level of practice, but that this produces contradiction and confusion at higher levels. Such tensions cannot be managed ...

  5. Naming as Strategic Communication

    DEFF Research Database (Denmark)

    Schmeltz, Line; Kjeldsen, Anna Karina

    2016-01-01

    This article presents a framework for understanding corporate name change as strategic communication. From a corporate branding perspective, the choice of a new name can be seen as a wish to stand out from a group of similar organizations. Conversely, from an institutional perspective, name change....... Second, it offers practical support to organizations, private as well as public, who find themselves in a situation where changing the name of the organization could be a way to reach either communicative or organizational goals....

  6. Strategic Stability: Contending Interpretations

    Science.gov (United States)

    2013-02-01

    John Hillas, Mathijus Jansen , Jos Potters, and Dries Ver- meulen, “On the Relation Among Some Definitions of Strategic Stability,” Mathematics of...of those doors. Not only have basic and applied sci- ences grown closer together in many fields, but theo - retical and experimental sciences have...science” bounds problems and provides insights. From the perspective of even the most theo - retical science, the wormhole camera postulated by Sir

  7. Strategic Leadership towards Sustainability

    OpenAIRE

    Robèrt, Karl-Henrik; Broman, Göran; Waldron, David; Ny, Henrik; Byggeth, Sophie; Cook, David; Johansson, Lena; Oldmark, Jonas; Basile, George; Haraldsson, Hördur V.

    2004-01-01

    The Master's programme named "Strategic Leadership Towards Sustainability" is offered at the Blekinge Institute of Technology (Blekinge Tekniska Högskola) in Karlskrona, Sweden. This Master's programme builds on four central themes: (1) four scientific principles for socio-ecological sustainability; (2) a planning methodology of "backcasting" based on those scientific principles for sustainability; (3) a five-level model for planning in complex systems, into which backcasting is incorporated ...

  8. Strategic Human Resources Management

    OpenAIRE

    Marta Muqaj

    2016-01-01

    Strategic Human Resources Management (SHRM) represents an important and sensitive aspect of the functioning and development of a company, business, institution, state, public or private agency of a country. SHRM is based on a point of view of the psychological practices, especially by investing on empowerment, broad training and teamwork. This way it remains the primary resource to maintain stability and competitiveness. SHRM has lately evolved on fast and secure steps, and the transformation...

  9. Employee flourishing strategic framework

    OpenAIRE

    Stelzner, Samuel Georg Eric; Schutte, Corne S. L.

    2016-01-01

    This paper produces a preliminary version of a strategic framework for managing employee flourishing. ‘Flourishing’, a term from positive psychology, describes the experience of ‘the good life’. Providing this experience benefits employees. It also motivates them to sustain the enterprise that provides it. This positions employee flourishing as a strategy for long-term enterprise performance, a key concern of industrial engineering. The framework incorporates a systems approach and literature...

  10. Strategic Appraisal 1996.

    Science.gov (United States)

    1996-01-01

    Haiti 274 Mexico 276 Venezuela 277 Panama 278 Brazil. 279 Drug Interdiction 280 Conclusion 281 Chapter Twelve, AshleyJ. Tellis SOUTH ASIA... Mexico or Saudi Arabia—and others might so chal- lenge American values as practically to require U.S. military involve- ment. The United States...slowly and grudgingly, but he has almost surely made his basic strategic decision to reach a peaceful settlement—even if the posturing and haggling will

  11. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  12. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  13. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    Analysis CONTENTS Page Chapter I "Introduction" o . o . - 1-1 Map A "The Areaof Operations** o • (Prepared by MAJ Michael Marshall) Chapter II "The Strategic...Significance of the Action", . a 5-1 (Prepared by MAJ Mike Mecuffie & CPT Von Richardson) BIBLIOGRAPHY . . .0 . • - ’ 6-1 (Prepared by MAJ Michael Marshall...Selune River to facilitate the VIII Corps advance. Despite a hard fight at Ducey by elements of 5th SS Parachute Division, all 4, objectives were taken by

  14. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  15. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  16. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  17. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  18. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  19. Network Analysis of Strategic Marketing Actions and Quality Function Deployment

    Directory of Open Access Journals (Sweden)

    Fatemeh Daneshian

    2011-01-01

    Full Text Available Nowadays, strategic marketing management has become an accepted practice in the strategic field. An increasing number of researchers consider marketing strategies for offering key competitive advantages associated with strategic marketing management. Every decision in the strategic field should be based on three dimensions of evaluating market, evaluating competitors and evaluating company. In this research, a model has been developed for selecting and ranking marketing strategies considering the evaluation of market (customer satisfaction elements, competitors and company based on Kano model. Quality function deployment (QFD and the analytic network process (ANP approaches have been used for market prioritization. The research has been carried out in three phases. In Phase one, the Kano model of customer satisfaction has been used to determine which requirements of a product or service brings more satisfaction to the customers, followed by the evaluation of competitors and gap analyze. In Phase two, The QFD approach has been used to incorporate the voice of customer (VOC into the marketing strategies of the company and has provided a systematic planning tool for considering the information of elements (in the last phase to make appropriate decisions effectively and efficiently. In Phase three, the ANP method has been used to analyze strategic actions considering company conditions. Finally the outputs of QFD have been corrected by ANP weights. Findings imply that the three most important strategic actions which are important for the company include offering differentiated and new generation of products to the market (leapfrog strategy, optimizing visual properties of products, and widespread and attractive advertising (frontal attack.

  20. Terrorist Attacks and Financial Markets

    OpenAIRE

    Bonekamp, Bas; van Veen, Tom

    2017-01-01

    This paper investigates the magnitude and the duration of the effect of a terrorist attack on stock market indices. We investigate the impact of New York (2001), Madrid (2004), London (2005), Boston (2013), Paris (2015), Brussels (2016), Nice (2016) and Berlin(2016) on the stock indices of the USA (S&P), Japan (NIKKEI), Germany (DAX), Spain (IBEX), UK (FTSE), France (CAC) and the Euronext Index (BEL). We use both a graphical analysis and an event study methodology to assess the effect of terr...

  1. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  2. 7 CFR 25.202 - Strategic plan.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Strategic plan. 25.202 Section 25.202 Agriculture... Procedure § 25.202 Strategic plan. (a) Principles of strategic plan. The strategic plan included in the application must be developed in accordance with the following four key principles: (1) Strategic vision for...

  3. Strategic Planning: Shaping Future Success

    Science.gov (United States)

    2016-09-01

    PMs should already be conducting strategic planning for the long-term sustainment of their system. Maintenance planning, source of repair, and... Strategic planning helped solve this problem. From Sole Source to Competition Some PMs deal with the challenge of breaking out of a sole- source ... strategic planning. For example, I worked a program that was stuck in a sole- source situation for decades. We developed a long-range plan that involved

  4. University Strategic Planning in Cameroon

    OpenAIRE

    Terfot Augustine Ngwana

    2003-01-01

    This article argues that the global, regional, and local realities can complement rather than contradict each other in the process of strategic planning for universities in Sub-Saharan Africa (SSA). Using the case of the University of Buea in Cameroon, it attempts to use the global trends of polarisation in knowledge production capacity as an input or tool for identifying strategic choice in the process of strategic planning in institutions. The national policy background is used to highlight...

  5. SYSTEM REFLEXIVE STRATEGIC MARKETING MANAGEMENT

    Directory of Open Access Journals (Sweden)

    A. Dligach

    2013-10-01

    Full Text Available This article reviews the System Reflexive paradigm of strategic marketing management, being based on the alignment of strategic economic interests of stakeholders, specifically, enterprise owners and hired managers, and consumers. The essence of marketing concept of management comes under review, along with the strategic management approaches to business, buildup and alignment of economic interests of business stakeholders. A roadmap for resolving the problems of modern marketing is proposed through the adoption of System Reflexive marketing theory.

  6. SYSTEM REFLEXIVE STRATEGIC MARKETING MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Andrii A. DLIGACH

    2012-07-01

    Full Text Available This article reviews the System Reflexive paradigm of strategic marketing management, being based on the alignment of strategic economic interests of stakeholders, specifically, enterprise owners and hired managers, and consumers. The essence of marketing concept of management comes under review, along with the strategic management approaches to business, buildup and alignment of economic interests of business stakeholders. A roadmap for resolving the problems of modern marketing is proposed through the adoption of System Reflexive marketing theory.

  7. STRATEGIC COMMUNICATION IN MULTINATIONAL COMPANIES

    Directory of Open Access Journals (Sweden)

    Alexandrina Cristina VASILE

    2014-11-01

    Full Text Available The article intends to show how multinational companies gain market share and visibility by using the appropriate strategic communication. The study evaluate the base framework, analysis, tools, data sources, sets of improvement plans and results that some multinational companies obtain by using strategic communication. The analysed companies are American based mainly communicative corporations and it will be underlined the importance of communication in the current economic environment. The results will show how important strategic communication is along the information used and the strategic management in targeting the position in the market.

  8. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  9. Psychological interventions following terrorist attacks.

    Science.gov (United States)

    Mansdorf, Irwin J

    2008-01-01

    Psychological reactions to terror attacks have been documented as ranging from no symptoms to transient behavioural symptoms to more serious posttraumatic stress. A review of representative studies is presented, with a critical analysis of the salient points of the various psychological intervention strategies for terrorist attacks. Common aspects of both most intervention approaches include multifaceted models that foster social support and include a preparatory phase, a phase of 'psychological first aid' and a follow-up phase of referral for more severe cases. The notion of intervention for all who may show some symptoms is not universally accepted. Where treatment or intervention is used, the debriefing aspect of CISM (Critical Incident Stress Management) remains highly disputed, with the focus on intrusively revisiting the trauma appearing to have questionable value at best. Some data questions whether formal treatment or intervention is necessary or even desirable. For many who choose not to seek out any help following a trauma, clinical data shows no negative results. Moreover, the preponderance of data shows that conventional 'debriefing' is not recommended. If the debriefing mechanism is refined so that intrusive emotional rehashing of the traumatic event is eliminated, the resultant interventions resemble resilience based approaches. Further defining when intervention is called for and refining the mechanisms of intervention in multi-stage intervention.

  10. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  11. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  12. Strategic Human Resources Management

    Directory of Open Access Journals (Sweden)

    Marta Muqaj

    2016-07-01

    Full Text Available Strategic Human Resources Management (SHRM represents an important and sensitive aspect of the functioning and development of a company, business, institution, state, public or private agency of a country. SHRM is based on a point of view of the psychological practices, especially by investing on empowerment, broad training and teamwork. This way it remains the primary resource to maintain stability and competitiveness. SHRM has lately evolved on fast and secure steps, and the transformation from Management of Human Resources to SHRM is becoming popular, but it still remains impossible to exactly estimate how much SHRM has taken place in updating the practices of HRM in organizations and institutions in general. This manuscript aims to make a reflection on strategic management, influence factors in its practices on some organizations. Researchers aim to identify influential factors that play key roles in SHRM, to determine its challenges and priorities which lay ahead, in order to select the most appropriate model for achieving a desirable performance. SHRM is a key factor in the achievement of the objectives of the organization, based on HR through continuous performance growth, it’s a complex process, unpredictable and influenced by many outside and inside factors, which aims to find the shortest way to achieve strategic competitive advantages, by creating structure planning, organizing, thinking values, culture, communication, perspectives and image of the organization. While traditional management of HR is focused on the individual performance of employees, the scientific one is based on the organizational performance, the role of the HRM system as main factor on solving business issues and achievement of competitive advantage within its kind.

  13. Strategic planning and republicanism

    Directory of Open Access Journals (Sweden)

    Mazza Luigi

    2010-01-01

    Full Text Available The paper develops two main linked themes: (i strategic planning reveals in practice limits that are hard to overcome; (ii a complete planning system is efficacy only in the framework of a republican political, social and government culture. It is argued that the growing disappointment associated to strategic planning practices, may be due to excessive expectations, and the difficulties encountered by strategic planning are traced to three main issues: (a the relationship between politics and planning; (b the relationship between government and governance; and (c the relationship between space and socioeconomic development. Some authors recently supported an idea of development as consisting in the qualitative evolution of forms of social rationality and argued that a reflection about the relationships between physical transformations and visions of development could be a way of testing innovations. But such strong demands might be satisfied only if we manage to make a 'new social and territorial pact for development', recreating a social fabric imbued with shared values. The re-creation of a social fabric imbued with shared values requires a rich conception of the political community and the possibility that the moral purposes of the community may be incorporated by the state. All this is missing today. Outside a republican scheme planning activities are principally instruments for legitimising vested interests and facilitating their investments, and the resolution of the conflicts that arise between the planning decisions of the various levels of government becomes at least impracticable. A complete planning system can be practised if can be referred to the authority and syntheses expressed in and by statehood, which suggests that in a democratic system planning is republican by necessity rather than by choice.

  14. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  15. Strategic port development

    DEFF Research Database (Denmark)

    Olesen, Peter Bjerg; Dukovska-Popovska, Iskra; Steger-Jensen, Kenn;

    2012-01-01

    This paper proposes a framework for strategic development of a port’s collaboration with its hinterland. The framework is based on literature relevant to port development and undertakes market perspective by considering import/export data relevant for the region of interest. The series of steps...... proposed in the framework, provide ports with a systematic approach in finding possibilities for new business ventures and increasing integration with the hinterland. The framework is generic in its approach. A case study illustrates possible usage of the framework in terms of hinterland development....

  16. Beyond Strategic Vision

    CERN Document Server

    Cowley, Michael

    2012-01-01

    Hoshin is a system which was developed in Japan in the 1960's, and is a derivative of Management By Objectives (MBO). It is a Management System for determining the appropriate course of action for an organization, and effectively accomplishing the relevant actions and results. Having recognized the power of this system, Beyond Strategic Vision tailors the Hoshin system to fit the culture of North American and European organizations. It is a "how-to" guide to the Hoshin method for executives, managers, and any other professionals who must plan as part of their normal job. The management of an o

  17. Strategic Global Climate Command?

    Science.gov (United States)

    Long, J. C. S.

    2016-12-01

    Researchers have been exploring geoengineering because Anthropogenic GHG emissions could drive the globe towards unihabitability for people, wildlife and vegetation. Potential global deployment of these technologies is inherently strategic. For example, solar radiation management to reflect more sunlight might be strategically useful during a period of time where the population completes an effort to cease emissions and carbon removal technologies might then be strategically deployed to move the atmospheric concentrations back to a safer level. Consequently, deployment of these global technologies requires the ability to think and act strategically on the part of the planet's governments. Such capacity most definitely does not exist today but it behooves scientists and engineers to be involved in thinking through how global command might develop because the way they do the research could support the development of a capacity to deploy intervention rationally -- or irrationally. Internationalizing research would get countries used to working together. Organizing the research in a step-wise manner where at each step scientists become skilled at explaining what they have learned, the quality of the information they have, what they don't know and what more they can do to reduce or handle uncertainty, etc. Such a process can increase societal confidence in being able to make wise decisions about deployment. Global capacity will also be enhanced if the sceintific establishment reinvents misssion driven research so that the programs will identify the systemic issues invovled in any proposed technology and systematically address them with research while still encouraging individual creativity. Geoengineering will diverge from climate science in that geoengineering research needs to design interventions for some publically desirable goal and investigates whether a proposed intervention will acheive desired outcomes. The effort must be a systems-engineering design problem

  18. Employee flourishing strategic framework

    Directory of Open Access Journals (Sweden)

    Stelzner, Samuel Georg Eric

    2016-11-01

    Full Text Available This paper produces a preliminary version of a strategic framework for managing employee flourishing. ‘Flourishing’, a term from positive psychology, describes the experience of ‘the good life’. Providing this experience benefits employees. It also motivates them to sustain the enterprise that provides it. This positions employee flourishing as a strategy for long-term enterprise performance, a key concern of industrial engineering. The framework incorporates a systems approach and literature from a variety of bodies of knowledge, including organisational behaviour and human resource management. The framework includes a process, tools, and elements that assist enterprises to manage employee flourishing.

  19. Strategic Urban Governance

    DEFF Research Database (Denmark)

    Pagh, Jesper

    2014-01-01

    The days of long-term predict-and-provide planning that saw its heydays in the post-war decades are long gone. As our late-modern time presents us with an evermore complex and contrasting view of the world, planning has become a much more fragmented and ambivalent affair. That a country or a city...... should be run like a private corporation has increasingly become common sense, and thus the competition among entities – be it countries, regions or cities – to a greater and greater extent defines success and the means to achieve it. What has been collected under the umbrella term Strategic Urban...

  20. Strategic implementation plan

    Science.gov (United States)

    1989-01-01

    The Life Science Division of the NASA Office of Space Science and Applications (OSSA) describes its plans for assuring the health, safety, and productivity of astronauts in space, and its plans for acquiring further fundamental scientific knowledge concerning space life sciences. This strategic implementation plan details OSSA's goals, objectives, and planned initiatives. The following areas of interest are identified: operational medicine; biomedical research; space biology; exobiology; biospheric research; controlled ecological life support; flight programs and advance technology development; the life sciences educational program; and earth benefits from space life sciences.

  1. Strategizing y liderazgo

    OpenAIRE

    Marín Tuyá, Belén

    2013-01-01

    El desarrollo del strategizing, concepto introducido por Whittington (1996) que enfoca la estrategia en la práctica “cómo algo que las personas hacen”, surgió por la creciente insatisfacción con la investigación convencional en estrategia. Así mientras las personas realizaban la estrategia, las teorías se centraban en análisis multivariantes sobre los efectos de la estrategia en el rendimiento de la organización con una curiosa ausencia de los actores humanos. Con el objetivo de avanzar en el...

  2. The unfocused strategic vision.

    Science.gov (United States)

    Friedman, L H

    1997-01-01

    Integrated delivery systems are often seen as the answer to the question of how to deliver high quality health services to a defined population at the lowest possible cost. This case examines the birth, growth, and ultimate demise of one such system. At first glance, all of the elements necessary for a successful integration were present including visionary leadership and a well defined strategic plan. However, the senior managers did not foresee the problems that would result from a clash of organizational cultures, significant mistrust between and among staff and physicians, and inability to manage the emotional-cognitive landscape.

  3. Guam Strategic Energy Plan

    Energy Technology Data Exchange (ETDEWEB)

    Conrad, M. D.

    2013-07-01

    Describes various energy strategies available to Guam to meet the territory's goal of diversifying fuel sources and reducing fossil energy consumption 20% by 2020.The information presented in this strategic energy plan will be used by the Guam Energy Task Force to develop an energy action plan. Available energy strategies include policy changes, education and outreach, reducing energy consumption at federal facilities, and expanding the use of a range of energy technologies, including buildings energy efficiency and conservation, renewable electricity production, and alternative transportation. The strategies are categorized based on the time required to implement them.

  4. Johan Heyns and the class of '51 � prolegomena to a story of people who got hurt

    Directory of Open Access Journals (Sweden)

    C Landsman

    1996-04-01

    Full Text Available Johan Heyns� and� the� class� of� '51� - prolegomena� to� a� story� of people who got hurt This� article consists of� three parts.� In� the first part a story� is� told of� Johan Heyns and some of� the men who shared with him the� final year of� theologi-cal� training� at� the� University� of Pretoria� in� 1951.� In� the� second� part prolegomena� to� the� telling� of� a� new story� of� Johan� Heyns� are� explained. Finally� this� new story� is� told by� using� the� voices� of� six people� - students, colleagues andfamily� - who� interrupt� each� other's� voice� on� Johan� Heyns, thereby undermining� the popular ideal amongst local church historians that religion� biography� can� and� should� recreate� a� complete� and� consistent image of� a person's� (moral� reality.

  5. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  6. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  7. Operationalizing strategic marketing.

    Science.gov (United States)

    Chambers, S B

    1989-05-01

    The strategic marketing process, like any administrative practice, is far simpler to conceptualize than operationalize within an organization. It is for this reason that this chapter focused on providing practical techniques and strategies for implementing the strategic marketing process. First and foremost, the marketing effort needs to be marketed to the various publics of the organization. This chapter advocated the need to organize the marketing analysis into organizational, competitive, and market phases, and it provided examples of possible designs of the phases. The importance and techniques for exhausting secondary data sources and conducting efficient primary data collection methods were explained and illustrated. Strategies for determining marketing opportunities and threats, as well as segmenting markets, were detailed. The chapter provided techniques for developing marketing strategies, including considering the five patterns of coverage available; determining competitor's position and the marketing mix; examining the stage of the product life cycle; and employing a consumer decision model. The importance of developing explicit objectives, goals, and detailed action plans was emphasized. Finally, helpful hints for operationalizing the communication variable and evaluating marketing programs were provided.

  8. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  9. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  10. The Science of Strategic Communication

    Science.gov (United States)

    The field of Strategic Communication involves a focused effort to identify, develop, and present multiple types of communication media on a given subject. A Strategic Communication program recognizes the limitations of the most common communication models (primarily “one s...

  11. Strategic Marketing for Educational Systems.

    Science.gov (United States)

    Hanson, E. Mark; Henry, Walter

    1992-01-01

    Private-sector strategic marketing processes can significantly benefit schools desiring to develop public confidence and support and establish guidelines for future development. This article defines a strategic marketing model for school systems and articulates the sequence of related research and operational steps comprising it. Although schools…

  12. Always Strategic: Jointly Essential Landpower

    Science.gov (United States)

    2015-02-01

    at the Opportunities tab . ***** All Strategic Studies Institute (SSI) and U.S. Army War College (USAWC) Press publications may be downloaded free...case to be made for emphasizing their extraordinary relative importance. It is necessary to differentiate between general and contextually ... contextual reality almost always seems compatible with at least a shortlist of possibly appropriate alternative strategic approaches. That said, perhaps

  13. Strategic Planning Is an Oxymoron

    Science.gov (United States)

    Bassett, Patrick F.

    2012-01-01

    The thinking on "strategic thinking" has evolved significantly over the years. In the previous century, the independent school strategy was to focus on long-range planning, blithely projecting 10 years into the future. For decades this worked well enough, but in the late 20th century, independent schools shifted to "strategic planning," with its…

  14. Tax rates as strategic substitutes

    NARCIS (Netherlands)

    H. Vrijburg (Hendrik); R.A. de Mooij (Ruud)

    2016-01-01

    textabstractThis paper analytically derives conditions under which the slope of the tax-reaction function is negative in a classical tax competition model. If countries maximize welfare, a negative slope (reflecting strategic substitutability) occurs under relatively mild conditions. The strategic t

  15. Strategic Interactions in Franchise Relationships

    NARCIS (Netherlands)

    Croonen, Evelien Petronella Maria

    2006-01-01

    This dissertation deals with understanding strategic interactions between franchisors and franchisees. The empirical part of this study consists of in-depth case studies in four franchise systems in the Dutch drugstore industry. The case studies focus on a total of eight strategic change processes i

  16. Strategic Management: A Comprehensive Bibliography.

    Science.gov (United States)

    Chaffee, Ellen Earle; de Alba, Renee

    A bibliography on strategic management is presented to assist both practitioners and researchers. Criteria for inclusion were as follows: (1) general in scope, providing introductory information on a variety of subtopics within strategic management; (2) indications that the work is becoming a classic (i.e., frequent citations by other authors);…

  17. Strategic Sealift Supporting Army Deployments

    Science.gov (United States)

    2016-06-10

    STRATEGIC SEALIFT SUPPORTING ARMY DEPLOYMENTS A thesis presented to the Faculty of the U.S. Army Command and General Staff...THOMPSON, MAJ, US ARMY BFA, Louisiana Tech University, Ruston, Louisiana, 1994 Fort Leavenworth, Kansas 2016 Approved for...Strategic Sealift Supporting Army Deployments 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Matthew

  18. Strategic directions in tissue engineering.

    NARCIS (Netherlands)

    Johnson, P.C.; Mikos, A.G.; Fisher, J.P.; Jansen, J.A.

    2007-01-01

    The field of tissue engineering is developing rapidly. Given its ultimate importance to clinical care, the time is appropriate to assess the field's strategic directions to optimize research and development activities. To characterize strategic directions in tissue engineering, a distant but reachab

  19. Strategic Aspects of Cost Management

    Directory of Open Access Journals (Sweden)

    Angelika I. Petrova

    2013-01-01

    Full Text Available This report is a summary of a research done on the area of Strategic Cost Management (SCM. This report includes a detailed discussion and application of Life Cycle Costing (LCC which a company can use to achieve its strategic objects in today's dynamic business environment. Hence, the main focus of this report is on LCC as mentioned

  20. NASA Space Sciences Strategic Planning

    Science.gov (United States)

    Crane, Philippe

    2004-01-01

    The purpose of strategic planning roadmap is to:Fulfill the strategic planning requirements; Provide a guide to the science community in presenting research requests to NASA; Inform and inspire; Focus investments in technology and research for future missions; and Provide the scientific and technical justification for augmentation requests.

  1. Strategic Planning Is an Oxymoron

    Science.gov (United States)

    Bassett, Patrick F.

    2012-01-01

    The thinking on "strategic thinking" has evolved significantly over the years. In the previous century, the independent school strategy was to focus on long-range planning, blithely projecting 10 years into the future. For decades this worked well enough, but in the late 20th century, independent schools shifted to "strategic planning," with its…

  2. Strategic Human Resource Development. Symposium.

    Science.gov (United States)

    2002

    This document contains three papers on strategic human resource (HR) development. "Strategic HR Orientation and Firm Performance in India" (Kuldeep Singh) reports findings from a study of Indian business executives that suggests there is a positive link between HR policies and practices and workforce motivation and loyalty and…

  3. IS and Business Leaders' Strategizing

    DEFF Research Database (Denmark)

    Hansen, Anne Mette

    , and productivity. However, strategizing in such dynamic environments is not straightforward process. While IS and business leaders must develop new IS strategic objectives and move quickly towards new opportunities, they must also be good at exploiting the value of current assets and reducing the costs of existing...

  4. Transfers, Contracts and Strategic Games

    NARCIS (Netherlands)

    Kleppe, J.; Hendrickx, R.L.P.; Borm, P.E.M.; Garcia-Jurado, I.; Fiestras-Janeiro, G.

    2007-01-01

    This paper analyses the role of transfer payments and strategic con- tracting within two-person strategic form games with monetary pay- offs. First, it introduces the notion of transfer equilibrium as a strat- egy combination for which individual stability can be supported by allowing the possibilit

  5. Tax rates as strategic substitutes

    NARCIS (Netherlands)

    H. Vrijburg (Hendrik); R.A. de Mooij (Ruud)

    2016-01-01

    textabstractThis paper analytically derives conditions under which the slope of the tax-reaction function is negative in a classical tax competition model. If countries maximize welfare, a negative slope (reflecting strategic substitutability) occurs under relatively mild conditions. The strategic t

  6. Strategic Planning for Higher Education.

    Science.gov (United States)

    Kotler, Philip; Murphy, Patrick E.

    1981-01-01

    The framework necessary for achieving a strategic planning posture in higher education is outlined. The most important benefit of strategic planning for higher education decision makers is that it forces them to undertake a more market-oriented and systematic approach to long- range planning. (Author/MLW)

  7. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  8. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  9. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  10. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  11. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  12. ABSTRACTS Preliminary Study of Strategic Inner Cores

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    When a strategic entity attempts to make a dicision, first the project must be m accoroance wlm its strategic framework as well as make the strategic inner cores prominent. The existing theories of development strategy indicate that the formation of the framework can be divided into the following parts: inside and outside environments, purpose, goal, key points, and countermeasures. The strategic inner cores that put forward by this paper is the intensification and advancement for the theory of strategic framework, strategic orientation, strategic vision and main line are inciuded. Appearance of these ideas have improved the theory and enhanced strategic practice.

  13. STRATEGIC PLANNING AT SPORTS ORGANIZATIONS

    Directory of Open Access Journals (Sweden)

    Radovan Ilić

    2013-10-01

    Full Text Available The article defines the terminology of the strategic planning at sports organizations and puts an accent on its specifics. The first part explains what is planning and its functions in the strategic management in order to further put a light on the theoretic terminology of strategic planning and strategic management as well as to explain the relation between them. In the second part the phases of the planning in sports are revised as follows: (1 preplanning phase, (2 strategy formulating phase, (3 implementing strategy phase, and (4 evaluation and control of the planned assignments. The last part of the article is dedicated to concluding revisions. The conclusions from the researches of this complex problematic are given by number in a long-term view of the strategic planning in sport organizations.

  14. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  15. Capabilities for Strategic Adaptation

    DEFF Research Database (Denmark)

    Distel, Andreas Philipp

    This dissertation explores capabilities that enable firms to strategically adapt to environmental changes and preserve competitiveness over time – often referred to as dynamic capabilities. While dynamic capabilities being a popular research domain, too little is known about what these capabilities...... empirical studies through the dynamic capabilities lens and develops propositions for future research. The second paper is an empirical study on the origins of firm-level absorptive capacity; it explores how organization-level antecedents, through their impact on individual-level antecedents, influence...... firms’ ability to absorb and leverage new knowledge. The third paper is an empirical study which conceptualizes top managers’ resource cognition as a managerial capability underlying firms’ resource adaptation; it empirically examines the performance implications of this capability and organizational...

  16. Strategic port development

    DEFF Research Database (Denmark)

    Olesen, Peter Bjerg; Dukovska-Popovska, Iskra; Hvolby, Hans-Henrik

    2014-01-01

    While large global ports are recognised as playing a central role in many supply chains as logistic gateways, smaller regional ports have been more stagnant and have not reached the same level of development as the larger ports. The research literature in relation to port development is also...... developments. This paper examines a series of models from the port development literature and then proposes an approach for conceptualizing the strategic development of a port’s collaboration with local operators and the local hinterland based on connected development steps. The paper is based on a literature...... approach, the authors apply it to a Danish case study that illustrates its potential usage in determining port development....

  17. Strategizing on innovation systems

    DEFF Research Database (Denmark)

    Jofre, Sergio

    mobilization. These disparities are less evident when comparing NIS in Japan and the US alone, suggesting a merging trend encouraged by mutual learning. Conversely, the average innovation performance in the EU is greatly affected by the heterogeneous performance among Member States, notably among those newly......, the common path observed in the US and Japan becomes more evident. In the EU this relationship varies greatly among States, however, an overall trend is identified. We observe that the predominant EU triple helix model is characterized by a strong link within government and university and a weaker link......This paper explores the strategic context of the implementation of the European Institute of Technology (EIT) from the perspective of National Innovation Systems (NIS) and the Triple Helix of University-Government-Industry relationship. The analytical framework is given by a comparative study...

  18. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  19. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  20. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc)

    2006-01-01

    textabstractIn this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to

  1. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  2. Revisiting attacker model for smart vehicles

    NARCIS (Netherlands)

    Petit, Jonathan; Feiri, Michael; Kargl, Frank

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this

  3. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks with c...... with cascaded Erbium-doped fiber amplifiers and a comb laser....

  4. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...

  5. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  6. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  7. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  8. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  9. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  10. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  11. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  12. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  13. Performance Evaluation of Wormhole Attack In AODV

    Directory of Open Access Journals (Sweden)

    Samuel Jacob

    2015-02-01

    Full Text Available The Mobile Ad hoc Networks (MANETs is a collection of wireless nodes which interact with each other by sending packets to one another or on behalf of another node, without any central network infrastructure to control data routing. For communication, the nodes cooperatively forward data packets to other nodes in network by using the routing protocol. But, these routing protocols are not secure, thus paving the way for the MANET to be open to malicious attacks. A malicious attack which is commonly observed in MANET environment is wormhole attack. The objective of this work is to analyze the performance parameters of throughput, delay and packet loss in AODV with the existence of wormhole attack. Simulation results have shown that the performance parameters are affected very much when there is an attack due to wormholes.

  14. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  15. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  16. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...... but not the computation. Such weaker model can still be practically useful and moreover, may provide nice building-blocks to tackle full-fledged tampering in future. In this dissertation we study different models of memory-tampering and provide a number of solutions with different flavors. Mainly we took two different...

  17. Complex Strategic Choices Applying Systemic Planning for Strategic Decision Making

    CERN Document Server

    Leleur, Steen

    2012-01-01

    Effective decision making requires a clear methodology, particularly in a complex world of globalisation. Institutions and companies in all disciplines and sectors are faced with increasingly multi-faceted areas of uncertainty which cannot always be effectively handled by traditional strategies. Complex Strategic Choices provides clear principles and methods which can guide and support strategic decision making to face the many current challenges. By considering ways in which planning practices can be renewed and exploring the possibilities for acquiring awareness and tools to add value to strategic decision making, Complex Strategic Choices presents a methodology which is further illustrated by a number of case studies and example applications. Dr. Techn. Steen Leleur has adapted previously established research based on feedback and input from various conferences, journals and students resulting in new material stemming from and focusing on practical application of a systemic approach. The outcome is a coher...

  18. New strategic roles of manufacturing

    DEFF Research Database (Denmark)

    Yang, Cheng; Johansen, John; Boer, Harry

    2008-01-01

    This paper aims to view manufacturing from a new angle, and tries to look beyond fit, focus and trade-offs, approaches which may no longer be sufficient for long-term competitive success. Four cases from different industries are described and used to illustrate and discuss the possibility...... of manufacturing playing new strategic roles. Backward, forward and lateral interactive support are suggested to explicate how manufacturing can realize its new strategic roles. Finally, four new strategic roles of manufacturing are suggested. They are: innovation manufacturing, ramp-up manufacturing, primary...... manufacturing, and service manufacturing....

  19. The Emerging Strategic Entrepreneurship Field

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Lyngsie, Jacob

    The field of strategic entrepreneurship is a fairly recent one. Its central idea is that opportunity-seeking and advantage-seeking — the former the central subject of the entrepreneurship field, the latter the central subject of the strategic management field — are processes that need...... to be considered jointly. The purpose of this brief chapter is to explain the emergence of SE theory field in terms of a response to research gaps in the neighboring fields of entrepreneurship and strategic management; describe the main tenets of SE theory; discuss its relations to neighboring fields; and finally...

  20. Strategic Planning in Hungarian Municipalities

    Directory of Open Access Journals (Sweden)

    Izabella BARATI-STEC

    2015-12-01

    Full Text Available The paper gives a summary of the most recent literature on strategic planning in local governments, while placing the fi ndings in a historical context. It focuses on planning in postsocialist countries, the impact of the heritage ofdecades of central planning and the relationship between decentralization and planning. The study concludes that while strategic planning improves the performance of local governments, special aspects, such as the fi nancial dependency of municipalities, focus on daily operation and on short-term results and enhanced need of institutional and personal capacity management must be taken care of while implementing strategic planning in local governments.

  1. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  2. Strategic Imagination: The Lost Dimension of Strategic Studies.

    Science.gov (United States)

    1984-09-01

    AD-A±52 ±5± STRATEGIC IMAGINATION: THE LOST DIMENSION OF STRATEGIC 1/1 STUDIES(U) NAVAL POSTGRADUATE SCHOOL MONTEREY CA E S VERGER SEP 84...30 2. Wargaming Past Battles............32 3. Manual War Games..............32 4. Machine Games...............33 D5. Computer Assisted Games...may gain an insight and understanding of the problems of the commanders in the field and a glimpse of the military thinking of the time. 3. Manual War

  3. Exploration in American Archaeology: Essays in Honor of Wesley R. Hurt. edited by Mark G. Plew, University Press of America, Lanham, 1999

    Directory of Open Access Journals (Sweden)

    David L. Browman

    2000-05-01

    Full Text Available This volume contains a short 6 page history of the contributions ofWesley Robert Hurt, Jr., to Americanist archaeology,along with a 4 page 'selected' list of his publications. The review starts with his career in the Southwest, traces the shift in his research to the Plains, and especially South Dakota, and then turns to his later change of interest to South America (especially Colombia, Brazil and Uru­guay. Hurt was born September 20, 1 9 1 7 in New Mexico, and got into archaeology through his cousin, Reginald Fisher, who was working for Dr. Edgar L. Heweu. Hurt started out taking Heweu's Chaco Canyon Field School, and began working on the Jemez Archaeological project as a high school student in the 1930s. After graduating from the University of New Mexico in 1938, he worked from 1938 to 1940 as a WPAArchaeology Project supervisor on Southwest projects, and in 1941 served as the Na­tional Park Service archaeologist at Canyon de Chelly National Monument.

  4. The Emotional Hurt from Divorce and Its Compensation%离婚情感伤害及其补偿探析

    Institute of Scientific and Technical Information of China (English)

    周媛媛

    2011-01-01

    With the increase of divorce rate, the emotional hurt from divorce is growing but has been ignored. The subjects of the emotional hurt aroused by divorce include the spouse, the children and the other people. This article attempts to analyze the specific performance of emotional hurt by divorce and then puts forward some pertinent compensation measures. It is desirable that more concrete compensation measures can be improved in legislation and in practice.%随着离婚率的上升,离婚导致的情感伤害也在增加,而目前这种情感伤害往往被人们忽视。文章试图分析离婚导致的配偶一方、儿童以及其他人的情感伤害的具体表现,并针对性地提出了一些补偿措施,希望更多的具体补偿措施能在立法和实践中得到完善。

  5. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  6. 75 FR 18824 - Federal Advisory Committee; U.S. Strategic Command Strategic Advisory Group; Closed Meeting

    Science.gov (United States)

    2010-04-13

    ..., intelligence, and policy-related issues to the Commander, U.S. Strategic Command, during the development of the... of the Secretary Federal Advisory Committee; U.S. Strategic Command Strategic Advisory Group; Closed... announces that the U.S. Strategic Command Strategic Advisory Group will meet on May 6 and 7, 2010....

  7. An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS in MANET

    Directory of Open Access Journals (Sweden)

    Ankur Ashok Acharya

    2016-04-01

    Full Text Available DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death attack are considered to be important as these two attacks may cause severe damage to the network. To provide better security to the network, efficient intrusion detection (IDS system is required to monitor the network continuously, keeping track of malicious activities and policy violations and produce report to the network administrator. UDP flood attack and ping of death attack are given importance in this paper as they are not well addressed in the existing research works. Packet capture and packet decoder is used to identify the packets and retrieve the packet details. A threshold is set for each node that is connected to the network. If the packet flow into the node exceeds the threshold that is set then the administrator is notified about the same.

  8. Wartime Women Rape: A Means of Moral Attack and Emasculation in Lynn Nottage’s Ruined

    Directory of Open Access Journals (Sweden)

    Elaff Ganim Salih

    2016-05-01

    Full Text Available Women rape at warfare was considered a consequence of war in the social, literary and political world for a long period of time. Some criminals of rape escaped justice and others were persecuted on the basis that they were involved in mass rape because it was a natural consequence of war. But, women are targeted with rape in time of war because they are the symbolic representation of a culture, ethnicity, and the unifying fabric of their people and nation. The objective of this paper is to show that war rape is not a result of war; instead it is a means of human destruction through moral attack and emasculation. It aims to show that women rape in warfare is neither a misogynist act nor a sexual violence but it is a pre-planned weapon used strategically and systematically to fulfill certain political and military agenda. The study focuses on the sexual abuse of women in the Democratic Republic of Congo in time of war in Lynn Nottage’s Pulitzer Prize play, Ruined (2007. The study applies Jonathan Gottschall’s Strategic Rape theory, which highlights war rape as a pre-planned military strategy. The enemy emasculates men and attacks them morally by raping their women. Consequently, men’s failure to protect their women causes them to give up resistance, leave their lands and families because of shame and humiliation. The study concludes that women rape in time of war is a tactic followed by conquerors intentionally to facilitate and guarantee the achievement of certain pre-planned goals as was the case of mass rape in the DRC. Keywords: women rape, strategy, emasculation, moral attack, strategic rape theory

  9. The neoliberalisation of strategic spatial planning

    DEFF Research Database (Denmark)

    Olesen, Kristian

    2014-01-01

    Strategic spatial planning practices have recently taken a neoliberal turn in many northwestern European countries. This neoliberalisation of strategic spatial planning has materialised partly in governance reforms aiming to reduce or abolish strategic spatial planning at national and regional...... scales, and partly through the normalisation of neoliberal discourses in strategic spatial planning processes. This paper analyses the complex relationship, partly of unease and partly of coevolution, between neoliberalism and strategic spatial planning. Furthermore, the paper discusses the key...... challenges for strategic spatial planning in the face of neoliberalism and argues for a need to strengthen strategic spatial planning’s critical dimension....

  10. Towards a strategic approach to special events management in the post-9/11 world

    OpenAIRE

    Jones, G. B.

    2005-01-01

    CHDS State/Local This thesis reviews background related to counterterrorism and law enforcement planning for major special events and it identifies some of the strategic issues that have emerged in special events management since the terrorist attacks of September 11, 2001. It focuses on the subjective and objective components of the systems currently used by DHS and the FBI to categorize and resource special events, and it evaluates whether the current approach to major event planning ...

  11. Strategic Arrivals Recommendation Tool Project

    Data.gov (United States)

    National Aeronautics and Space Administration — During the conduct of a NASA Research Announcement (NRA) in 2012 and 2013, the Mosaic ATM team first developed the Strategic Arrivals Recommendation Tool concept, or...

  12. Dominant investors and strategic transparency

    NARCIS (Netherlands)

    E.C. Perotti; E.-L. von Thadden

    1999-01-01

    This paper studies product market competition under a strategic transparency decision. Dominant investors can influence information collection in the financial market, and thereby corporate transparency, by affecting market liquidity or the cost of information collection. More transparency on a firm

  13. Dominant investors and strategic transparency

    NARCIS (Netherlands)

    E.C. Perotti; E.-L. von Thadden

    1998-01-01

    This paper studies product market competition under a strategic transparency decision. Dominant investors can influence information collection in the financial market, and thereby corporate transparency, by affecting market liquidity or the cost of information collection. More transparency on a firm

  14. Managing transdisciplinarity in strategic foresight

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Andersen, Per Dannemand; Borch, Kristian

    2010-01-01

    in relation to transdisciplinarity based on empirical as well as theoretical work in technological domains. By strategic foresight is meant future oriented, participatory consultation of actors and stakeholders, both within and outside a scientific community. It therefore allows multiple stakeholders......Strategic foresight deals with the long term future and is a transdisciplinary exercise which, among other aims, addresses the prioritization of science and other decision making in science and innovation advisory and funding bodies. This article discusses challenges in strategic foresight...... strategic foresight has now been widely accepted for strategy-making and priority-setting in science and innovation policy, the methodologies underpinning it still need further development. Key findings are the identification of challenges, aspects and issues related to management and facilitation...

  15. The Strategic Process in Organisations

    DEFF Research Database (Denmark)

    Sørensen, Lene; Vidal, Rene Victor Valqui

    1999-01-01

    Organisational strategy development is often conceptualised through methodological frameworks. In this paper strategy development is seen as a strategic process characterised by inherent contradictions between actors, OR methods and the problem situation. The paper presents the dimensions...

  16. DURABILITY OF NATURAL POZZOLAN-BASED MORTAR EXPOSED TO SULFATE ATTACK

    Directory of Open Access Journals (Sweden)

    L. Laoufi

    2016-05-01

    Full Text Available Cement is a strategic commodity in the civil engineering for the construction of reinforced concrete structures. But its production generates around 5% of toxic gases such as CO2 responsible for environmental degradation. Furthermore, cement industry is a consumer sector of non-renewable energy. The use in the cement of natural additions is a solution to reduce the CO2 gas and the cost of production. The purpose of this work is the study of a sustainable building material: natural pozzolan Beni-saf (PNB incorporated to mortars exposed to sulfate attack (5% Na2SO4. The loss of mass, monitoring the pH reading of each attack solution as well as specimens dimensions are different tests to study the durability of mortars made with 10, 20 and 30% of natural pozzolan. The result derived from this research is that pozzolan improves mortars resistance to sodium sulfate environment.

  17. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  18. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  19. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  20. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  1. Strategic Leadership of Corporate Sustainability

    DEFF Research Database (Denmark)

    Strand, Robert

    2014-01-01

    ? What effects do corporate sustainability TMT positions have at their organizations? We consider these questions through strategic leadership and neoinstitutional theoretical frameworks. Through the latter, we also engage with Weberian considerations of bureaucracy. We find that the reasons why......Strategic leadership and corporate sustainability have recently come together in conspicuously explicit fashion through the emergence of top management team (TMT) positions with dedicated corporate sustainability responsibilities. These TMT positions, commonly referred to as 'Chief Sustainability...

  2. Executive presence for strategic influence.

    Science.gov (United States)

    Shirey, Maria R

    2013-01-01

    This department highlights change management strategies that may be successful in strategically planning and executing organizational change initiatives. With the goal of presenting practical approaches helpful to nurse leaders advancing organizational change, content includes evidence-based projects, tools, and resources that mobilize and sustain organizational change initiatives. In this article, the author discusses cultivating executive presence, a crucial component of great leadership, needed for strategic influence and to drive change.

  3. STRATEGIC ALLIANCES – THEIR DEFINITION AND FORMATION

    OpenAIRE

    Kinderis, Remigijus; Jucevičius, Giedrius

    2013-01-01

    The article presents analysis of the definition of strategic alliances, the analysis of alliance and the research of a strategic alliance concept; furthermore, it focuses on the contingent hierarchy of alliances. The motives of strategic alliances formation, their categories, groups and benefit for business have been revealed in this article. Special attention is paid to the process of strategic alliance formation and the analysis of factors that influence the formation of strategic alliances...

  4. Maintenance Process Strategic Analysis

    Science.gov (United States)

    Jasiulewicz-Kaczmarek, M.; Stachowiak, A.

    2016-08-01

    The performance and competitiveness of manufacturing companies is dependent on the availability, reliability and productivity of their production facilities. Low productivity, downtime, and poor machine performance is often linked to inadequate plant maintenance, which in turn can lead to reduced production levels, increasing costs, lost market opportunities, and lower profits. These pressures have given firms worldwide the motivation to explore and embrace proactive maintenance strategies over the traditional reactive firefighting methods. The traditional view of maintenance has shifted into one of an overall view that encompasses Overall Equipment Efficiency, Stakeholders Management and Life Cycle assessment. From practical point of view it requires changes in approach to maintenance represented by managers and changes in actions performed within maintenance area. Managers have to understand that maintenance is not only about repairs and conservations of machines and devices, but also actions striving for more efficient resources management and care for safety and health of employees. The purpose of the work is to present strategic analysis based on SWOT analysis to identify the opportunities and strengths of maintenance process, to benefit from them as much as possible, as well as to identify weaknesses and threats, so that they could be eliminated or minimized.

  5. CINT 2020 Strategic Plan

    Energy Technology Data Exchange (ETDEWEB)

    Shinn, Neal D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-12-01

    CINT’s role is to enable world-leading science towards realizing these benefits and our strategic objectives describe what is needed to deliver on this promise. As a vibrant partnership between Los Alamos National Laboratory (LANL) and Sandia National Laboratories (SNL), CINT leverages the unmatched scientific and engineering expertise of our host DOE Laboratories in an Office of Science open-access user facility to benefit hundreds of researchers annually. We have world-leading scientific expertise in four thrust areas, as described in section 1, and specialized capabilities to create, characterize and understand nanomaterials in increasingly complex integrated environments. Building upon these current strengths, we identify some of the capabilities and expertise that the nanoscience community will need in the future and that CINT is well positioned to develop and offer as a user facility. These include an expanding portfolio of our signature Discovery Platforms that can be used alone or as sophisticated “experiments within an experiment”; novel synthetic approaches for exquisitely heterostructured nanowires, nanoparticles and quasi-two-dimensional materials; ultra-high resolution spectroscopic techniques of nanomaterial dynamics; in situ microscopies that provide realtime, spatially-resolved structure/property information for increasingly complex materials systems; advanced simulation techniques for integrated nanomaterials; and multi-scale theory for interfaces and dynamics.

  6. Making strategic choices.

    Science.gov (United States)

    1993-01-01

    Many decision factors enter into making the right strategic choices in today's healthcare environment. Physicians have their perspective. Hospital managers may have a different perspective. Having worked on both sides of the equation, this author suggests that the successful design of an integrated healthcare system will depend on the ability of each to understand the other's agenda. Physician needs aren't necessarily incompatible with those of an organization and vice versa. Cultural differences aren't necessarily cast in stone. If hospital managers can develop an understanding of the physicians' decision factors and tailor a program around the key issues, there will be a greater likelihood of success. At the same time, physicians who are considering an alignment with a health system will need to understand what it will take to make the organization successful. The personal futures of these physicians may be at stake once they are in an integrated relationship. Finally, integrated systems will have new decision criteria for formulating strategy. Both sides should look forward to addressing mutual interests in creative ways.

  7. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  8. Multiple Partial Attacks on Complex Networks

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We numerically investigate the effect of four kinds of partial attacks of multiple targets on the Barabási-Albert (BA) scale-free network and the Erd(o)s-Rényi (ER) random network.Comparing with the effect of single target complete knockout we find that partial attacks of multiple targets may produce an effect higher than the complete knockout of a single target on both BA scale-free network and ER random network.We also find that the BA ecale-free network seems to be more susceptible to multi-target partial attacks than the ER random network.

  9. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  10. Measuring a System’s Attack Surface

    Science.gov (United States)

    2004-01-01

    fold: • In terms of a state machine model of the system, we present formal definitions of attack, attack surface, and attack class. Our definitions are...versions. The rest of this paper is organized as follows. In Section 2, we introduce our state machine model and point out the key differences from...approach in Section 6 and compare it to related work in Section 7. We conclude in Section 8. 2 State Machine Model We use a state machine to model the

  11. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  12. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks ... symptoms are called silent heart attacks. Most Common Symptoms The most common warning symptoms of a heart ...

  13. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  14. A Study on the Effect of the Strategic Intelligence on Decision Making and Strategic Planning

    OpenAIRE

    Mahmoud Reza Esmaili

    2014-01-01

    The present research aims to recognize not only the effective factors on the strategic intelligence, strategic decision making and strategic planning but also it studies the effect of the strategic intelligence on the strategic decision making and strategic planning in organization and companies using the intelligence system in the Khorram-abad city. According to the results, this study is an analytical-survey research. The statistical population for the research is the companies and organiza...

  15. Taxonomy of SSL/TLS Attacks

    Directory of Open Access Journals (Sweden)

    Keerthi Vasan K.

    2016-02-01

    Full Text Available Secure Socket Layer (SSL and Transport Layer Security (TLS protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.

  16. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  17. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  18. Preventing Coordinated Attacks Via Distributed Alert Exchange

    CERN Document Server

    Garcia-Alfaro, Joaquin; Muehl, Gero; Borrell, Joan

    2008-01-01

    Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.

  19. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  20. Performance Evaluation of AODV under Blackhole Attack

    National Research Council Canada - National Science Library

    Tarunpreet Bhatia; A K Verma

    2013-01-01

    .... This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously...

  1. Uncertainties of a preemptive nuclear attack

    Energy Technology Data Exchange (ETDEWEB)

    Bunn, M.; Tsipis, K.

    1983-11-01

    The deterrence of nuclear war requires that nuclear forces not be vulnerable to a preemptive disarming attack that would preclude retaliation. The uncertainties surrounding a countersilo attack stem from incomplete intelligence information about the accuracy of weapons delivery due to errors in the inertial-guidance system and those associated with reentry into the atmosphere. An analyses of these uncertainties examines the results of test flights and calculations based on simulations that consider the problems of fratricide, estimates of yield, and a number of other technical uncertainties that are overshadowed by the uncertainty of whether the nation under attack would respond with launch-on-warning or launch-under-attack. The analysis concludes that, despite a current level of stability, the progress of weapons technology bodes ill for the future unless stringent testing and deployment limitations are imposed. 6 figures, 1 table. (DCK)

  2. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  3. Identifying and Analyzing Web Server Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  4. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  5. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  6. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  7. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  8. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  9. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  10. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  11. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  12. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  13. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  14. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  15. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment...... sequences to treat four moderate-to-severe migraine attacks. Control patients received placebo for three attacks and telcagepant 140 mg for one attack. Efficacy for the first attack (Attack 1) and consistency of efficacy over multiple attacks were assessed. For an individual patient, consistent efficacy...

  16. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  17. Heart Attack Prediction System Based Neural Arbitration

    OpenAIRE

    Helwan, Abdulkader

    2015-01-01

    Heart attack is an asymptomatic and epidemic medical condition that may suddenly occur and causes “death”. Therefore, it is a life-threatening condition and it should be detected before it occurs. Heart attack is so far predicted using the conventional ways of doctor’s examination and by performing some medical tests such as stress test, ECG, and heart CTScan etc. The coronary vessels constriction, the cholesterol levels in the arteries, and other attributes can be good indicators for making ...

  18. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  19. Children's strategic theory of mind.

    Science.gov (United States)

    Sher, Itai; Koenig, Melissa; Rustichini, Aldo

    2014-09-16

    Human strategic interaction requires reasoning about other people's behavior and mental states, combined with an understanding of their incentives. However, the ontogenic development of strategic reasoning is not well understood: At what age do we show a capacity for sophisticated play in social interactions? Several lines of inquiry suggest an important role for recursive thinking (RT) and theory of mind (ToM), but these capacities leave out the strategic element. We posit a strategic theory of mind (SToM) integrating ToM and RT with reasoning about incentives of all players. We investigated SToM in 3- to 9-y-old children and adults in two games that represent prevalent aspects of social interaction. Children anticipate deceptive and competitive moves from the other player and play both games in a strategically sophisticated manner by 7 y of age. One game has a pure strategy Nash equilibrium: In this game, children achieve equilibrium play by the age of 7 y on the first move. In the other game, with a single mixed-strategy equilibrium, children's behavior moved toward the equilibrium with experience. These two results also correspond to two ways in which children's behavior resembles adult behavior in the same games. In both games, children's behavior becomes more strategically sophisticated with age on the first move. Beyond the age of 7 y, children begin to think about strategic interaction not myopically, but in a farsighted way, possibly with a view to cooperating and capitalizing on mutual gains in long-run relationships.

  20. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  1. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  2. LG-ANALYST: linguistic geometry for master air attack planning

    Science.gov (United States)

    Stilman, Boris; Yakhnis, Vladimir; Umanskiy, Oleg

    2003-09-01

    We investigate the technical feasibility of implementing LG-ANALYST, a new software tool based on the Linguistic Geometry (LG) approach. The tool will be capable of modeling and providing solutions to Air Force related battlefield problems and of conducting multiple experiments to verify the quality of the solutions it generates. LG-ANALYST will support generation of the Fast Master Air Attack Plan (MAAP) with subsequent conversion into Air Tasking Order (ATO). An Air Force mission is modeled employing abstract board games (ABG). Such a mission may include, for example, an aircraft strike package moving to a target area with the opposing side having ground-to-air missiles, anti-aircraft batteries, fighter wings, and radars. The corresponding abstract board captures 3D air space, terrain, the aircraft trajectories, positions of the batteries, strategic features of the terrain, such as bridges, and their status, radars and illuminated space, etc. Various animated views are provided by LG-ANALYST including a 3D view for realistic representation of the battlespace and a 2D view for ease of analysis and control. LG-ANALYST will allow a user to model full scale intelligent enemy, plan in advance, re-plan and control in real time Blue and Red forces by generating optimal (or near-optimal) strategies for all sides of a conflict.

  3. Managing transdisciplinarity in strategic foresight

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Andersen, Per Dannemand; Borch, Kristian

    2010-01-01

    Strategic foresight deals with the long term future and is a transdisciplinary exercise which, among other aims, addresses the prioritization of science and other decision making in science and innovation advisory and funding bodies. This article discusses challenges in strategic foresight...... in relation to transdisciplinarity based on empirical as well as theoretical work in technological domains. By strategic foresight is meant future oriented, participatory consultation of actors and stakeholders, both within and outside a scientific community. It therefore allows multiple stakeholders...... to negotiate over how to attain a desirable future. This requires creative thinking from the participants, who need to extend their knowledge into the uncertainty of the future. Equally important is skilled facilitating in order to create a space for dialogue and exploration in a contested territory. Although...

  4. Strategic planning in healthcare organizations.

    Science.gov (United States)

    Rodríguez Perera, Francisco de Paula; Peiró, Manel

    2012-08-01

    Strategic planning is a completely valid and useful tool for guiding all types of organizations, including healthcare organizations. The organizational level at which the strategic planning process is relevant depends on the unit's size, its complexity, and the differentiation of the service provided. A cardiology department, a hemodynamic unit, or an electrophysiology unit can be an appropriate level, as long as their plans align with other plans at higher levels. The leader of each unit is the person responsible for promoting the planning process, a core and essential part of his or her role. The process of strategic planning is programmable, systematic, rational, and holistic and integrates the short, medium, and long term, allowing the healthcare organization to focus on relevant and lasting transformations for the future. Copyright © 2012 Sociedad Española de Cardiología. Published by Elsevier Espana. All rights reserved.

  5. NATO's Strategic Partnership with Ukraine

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    Russian actions in Ukraine have altered the security land- scape in Europe, highlighting a renewed emphasis on the differences between members and non-members. In this context, NATO must a) create a strategic understanding of partnerships as something that can be transformative, even if it will n......Russian actions in Ukraine have altered the security land- scape in Europe, highlighting a renewed emphasis on the differences between members and non-members. In this context, NATO must a) create a strategic understanding of partnerships as something that can be transformative, even...... if it will not lead to membership in the short or even long term, and b) build such a strategic relationship with Ukraine. In sum, the Russian-induced Ukraine crisis should spur the reform of NATO partnerships – with Ukraine as a case in point....

  6. Limited rationality and strategic interaction

    DEFF Research Database (Denmark)

    Fehr, Ernst; Tyran, Jean-Robert

    2008-01-01

    Much evidence suggests that people are heterogeneous with regard to their abilities to make rational, forward-looking decisions. This raises the question as to when the rational types are decisive for aggregate outcomes and when the boundedly rational types shape aggregate results. We examine...... this question in the context of a long-standing and important economic problem: the adjustment of nominal prices after an anticipated monetary shock. Our experiments suggest that two types of bounded rationality-money illusion and anchoring-are important behavioral forces behind nominal inertia. However......, depending on the strategic environment, bounded rationality has vastly different effects on aggregate price adjustment. If agents' actions are strategic substitutes, adjustment to the new equilibrium is extremely quick, whereas under strategic complementarity, adjustment is both very slow and associated...

  7. The Test of Strategic Culture

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja

    2005-01-01

    Germany was the first country to issue a categorical refusal to support the US-led war in Iraq. Some have interpreted this as the result of a clash between the strategic cultures of Germany and the USA, others as a sign that a more nationalistic and assertive Germany is emerging. This article...... explains the apparently contradictory aspects of Germany’s stance on Iraq by identifying two competing strands within Germany’s strategic culture. It concludes that the German refusal signals neither a reversion to a pacifist stance nor that Germany is in a process of shedding the bonds and alliances...... that have so far framed the reunified Germany’s military policy. Iraq simply showed that Germany, like most other countries, has conditions that have to be met – in Germany’s case, conditions flowing from the coexistence of two competing schools of thought within Germany’s strategic culture....

  8. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  9. Contrasting strategic and Milan therapies.

    Science.gov (United States)

    MacKinnon, L

    1983-12-01

    Three related models of therapy are often grouped together as the strategic therapies. These are brief therapy model associated with the Mental Research Institute, approaches developed by Jay Haley and Cloë Madanes, and the model developed by the Milan associates. Controversy exists, however, as to whether the Milan model should be included as a strategic therapy. It appears that the similarities among the three models can mask deeper differences, thus confounding the confusion. This paper contrast the models in their development, theory, and practice.

  10. Final Draft Strategic Marketing Plan.

    Energy Technology Data Exchange (ETDEWEB)

    United States. Bonneville Power Administration.

    1994-02-01

    The Bonneville Power Administration (BPA) has developed a marketing plan to define how BPA can be viable and competitive in the future, a result important to BPA`s customers and constituents. The Marketing Plan represents the preferred customer outcomes, marketplace achievements, and competitive advantage required to accomplish the Vision and the Strategic Business Objectives of the agency. The Marketing Plan contributes to successful implementation of BPA`s Strategic Business Objectives (SBOs) by providing common guidance to organizations and activities throughout the agency responsible for (1) planning, constructing, operating, and maintaining the Federal Columbia River Power System; (2) conducting business with BPA`s customers; and (3) providing required internal support services.

  11. Issues in Strategic Decision Modelling

    CERN Document Server

    Jennings, Paula

    2008-01-01

    [Spreadsheet] Models are invaluable tools for strategic planning. Models help key decision makers develop a shared conceptual understanding of complex decisions, identify sensitivity factors and test management scenarios. Different modelling approaches are specialist areas in themselves. Model development can be onerous, expensive, time consuming, and often bewildering. It is also an iterative process where the true magnitude of the effort, time and data required is often not fully understood until well into the process. This paper explores the traditional approaches to strategic planning modelling commonly used in organisations and considers the application of a real-options approach to match and benefit from the increasing uncertainty in today's rapidly changing world.

  12. Characteristics of Useful and Practical Organizational Strategic Plans

    Science.gov (United States)

    Kaufman, Roger

    2014-01-01

    Most organizational strategic plans are not strategic but rather tactical or operational plans masquerading as "strategic." This article identifies the basic elements required in a useful and practical strategic plan and explains why they are important.

  13. Characteristics of Useful and Practical Organizational Strategic Plans

    Science.gov (United States)

    Kaufman, Roger

    2014-01-01

    Most organizational strategic plans are not strategic but rather tactical or operational plans masquerading as "strategic." This article identifies the basic elements required in a useful and practical strategic plan and explains why they are important.

  14. Modelling social-technical attacks with timed automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, Kim G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In th

  15. Strategic Planning and Strategic Thinking Clothed in STRATEGO

    Science.gov (United States)

    Baaki, John; Moseley, James L.

    2011-01-01

    This article shares experiences that participants had playing the game of STRATEGO and how the activity may be linked to strategic planning and thinking. Among the human performance technology implications of playing this game are that gamers agreed on a framework for rules, took stock on where they wanted to go in the future, and generated a risk…

  16. Strategic Planning and Strategic Thinking Clothed in STRATEGO

    Science.gov (United States)

    Baaki, John; Moseley, James L.

    2011-01-01

    This article shares experiences that participants had playing the game of STRATEGO and how the activity may be linked to strategic planning and thinking. Among the human performance technology implications of playing this game are that gamers agreed on a framework for rules, took stock on where they wanted to go in the future, and generated a risk…

  17. The Strategic Data Project's Strategic Performance Indicators

    Science.gov (United States)

    Page, Lindsay C.; Fullerton, Jon; Bacher-Hicks, Andrew; Owens, Antoniya; Cohodes, Sarah R.; West, Martin R.; Glover, Sarah

    2013-01-01

    Strategic Performance Indicators (SPIs) are summary measures derived from parallel, descriptive analyses conducted across educational agencies. The SPIs are designed to inform agency management and efforts to improve student outcomes. We developed the SPIs to reveal patterns common across partner agencies, to highlight exceptions to those…

  18. The strategic labor allocation proces : a model of strategic HRM

    NARCIS (Netherlands)

    Bax, Erik H.

    2002-01-01

    In this article the Strategic Labor Allocation Process model (SLAP) is described. The model relates HR-strategies to structure, culture and task technology to HR-policies like recruitment, appraisal and rewarding, to business strategy and to socio-cultural, economic, institutional and technological

  19. Strategic Planning as a Perceptual Process,

    Science.gov (United States)

    1981-03-01

    Like any complex human endeavor, the sort of broad scope or long range organizational planning often referred to as strategic planning can be viewed...might be of use to planners and managers concerned with broad scope strategic planning .

  20. The Danish experience of strategic environment assesment

    DEFF Research Database (Denmark)

    Kørnøv, Lone

    2004-01-01

    The article recounts a number of examples of the Danish experience with Strategic Environmental Assessment (SEA).......The article recounts a number of examples of the Danish experience with Strategic Environmental Assessment (SEA)....

  1. The Danish experience of strategic environment assesment

    DEFF Research Database (Denmark)

    Kørnøv, Lone

    2004-01-01

    The article recounts a number of examples of the Danish experience with Strategic Environmental Assessment (SEA).......The article recounts a number of examples of the Danish experience with Strategic Environmental Assessment (SEA)....

  2. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  3. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  4. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  5. On the anatomy of social engineering attacks -- A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    2017-01-01

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing sin

  6. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes...... on a new and general formalism for attack-defence trees....

  7. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  8. Strategic Alliance Poker: Demonstrating the Importance of Complementary Resources and Trust in Strategic Alliance Management

    Science.gov (United States)

    Reutzel, Christopher R.; Worthington, William J.; Collins, Jamie D.

    2012-01-01

    Strategic Alliance Poker (SAP) provides instructors with an opportunity to integrate the resource based view with their discussion of strategic alliances in undergraduate Strategic Management courses. Specifically, SAP provides Strategic Management instructors with an experiential exercise that can be used to illustrate the value creation…

  9. Strategic Alliance Poker: Demonstrating the Importance of Complementary Resources and Trust in Strategic Alliance Management

    Science.gov (United States)

    Reutzel, Christopher R.; Worthington, William J.; Collins, Jamie D.

    2012-01-01

    Strategic Alliance Poker (SAP) provides instructors with an opportunity to integrate the resource based view with their discussion of strategic alliances in undergraduate Strategic Management courses. Specifically, SAP provides Strategic Management instructors with an experiential exercise that can be used to illustrate the value creation…

  10. 75 FR 67695 - U.S. Strategic Command Strategic Advisory Group Closed Meeting

    Science.gov (United States)

    2010-11-03

    ... of the Secretary of Defense U.S. Strategic Command Strategic Advisory Group Closed Meeting AGENCY.... Strategic Command Strategic Advisory Group. DATES: December 9, 2010: 8 a.m. to 5 p.m. December 10, 2010: 8 a... of the meeting is to provide advice on scientific, technical, intelligence, and policy-related...

  11. 76 FR 14950 - Closed Meeting of the U.S. Strategic Command Strategic Advisory Group

    Science.gov (United States)

    2011-03-18

    ... of the Secretary Closed Meeting of the U.S. Strategic Command Strategic Advisory Group AGENCY... notice pertaining to the following federal advisory committee: U.S. Strategic Command Strategic Advisory... meeting is to provide advice on scientific, technical, intelligence, and policy-related issues to...

  12. 75 FR 22561 - Federal Advisory Committee; United States Strategic Command Strategic Advisory Group; Charter...

    Science.gov (United States)

    2010-04-29

    ..., intelligence, and policy-related matters of interest to the Joint Chiefs of Staff and the U.S. Strategic..., communications, intelligence and information operations, or other important aspects of the Nation's strategic... of the Secretary Federal Advisory Committee; United States Strategic Command Strategic Advisory...

  13. Children’s strategic theory of mind

    OpenAIRE

    Sher, Itai; Koenig, Melissa; Rustichini, Aldo

    2014-01-01

    Human interaction requires reasoning not only about other people’s observed behavior and mental states but also about their incentives and goals. The development of children’s strategic thinking is not well understood, leaving open critical questions about early human capacity for strategic interaction. We investigated strategic reasoning in 3- to 9-y-old children and adults in two strategic games that represent prevalent aspects of social interaction: incentives to mislead and competition. W...

  14. Crisis - Strategic Management in Public Relation

    OpenAIRE

    Saari Ahmad

    2012-01-01

    This is a concept paper to explore the strategic management approaches in public relations during crisis. The main objective of this article is to identify the most effective action plan for Public relation. The review of the strategic management in public relations literature reveals that the relationship between strategic management and public relations is still vague. Four stages were identified in the process of establishing the action plan for public relations and eleven strategic action...

  15. Hoshin Kanri Forest : lean strategic organizational design

    OpenAIRE

    Villalba-Díez, Javier

    2017-01-01

    Strategic Lean Management (LM) efforts almost always fail because Leaders often lack a map of their own organization. The reason for this might be that scholars have so far mostly provided qualitative or rigid one-size-fits-all frameworks for strategically designing organizations. The purpose of this work is to provide a comprehensive quantifiable framework for strategically designing organizations for LM. Combining knowledge about Strategic Organizational Design and LM, we introduce a novel ...

  16. Hoshin Kanri Forest : lean strategic organizational design

    OpenAIRE

    Villalba-Díez, Javier

    2016-01-01

    Strategic Lean Management (LM) efforts almost always fail because Leaders often lack a map of their own organization. The reason for this might be that scholars have so far mostly provided qualitative or rigid one-size-fits-all frameworks for strategically designing organizations. The purpose of this work is to provide a comprehensive quantifiable framework for strategically designing organizations for LM. Combining knowledge about Strategic Organizational Design and LM, we introduce a novel ...

  17. Hoshin Kanri Forest : lean strategic organizational design

    OpenAIRE

    Villalba-Díez, Javier

    2016-01-01

    Strategic Lean Management (LM) efforts almost always fail because Leaders often lack a map of their own organization. The reason for this might be that scholars have so far mostly provided qualitative or rigid one-size-fits-all frameworks for strategically designing organizations. The purpose of this work is to provide a comprehensive quantifiable framework for strategically designing organizations for LM. Combining knowledge about Strategic Organizational Design and LM, we introduce a novel ...

  18. Strategic Planning and Army Installation Management.

    Science.gov (United States)

    1996-01-01

    program. The U.S. Army has adopted the Malcolm Baldrige National Quality Award criteria for use in the ACOE program. Strategic planning is one of the...seven pillars of the Baldrige criteria. The Army has recognized that strategic planning is the key to the future. Strategic planning is the key to...and utilization of strategic planning . This paper examines through case study analysis several civilian communities and lessons learned through their

  19. Maturity of strategic management in organizations

    OpenAIRE

    Anna Witek-Crabb

    2015-01-01

    There is some ambivalence with regards to how to improve strategic management of organizations. On the one hand the example of big companies emphasizes the need for formalization and good organization of strategic management process. On the other hand the example of small companies draws attention to such qualities as entrepreneurship, flexibility and adaptability. The concept of strategic management maturity embraces both of these priorities. In this paper a framework for strategic managemen...

  20. Strategic entrepreneurship in the future: Theoretical views

    Directory of Open Access Journals (Sweden)

    Martinović Milan

    2016-01-01

    Full Text Available The paper describes the role and importance of strategy in contemporary entrepreneurship, which operates under conditions of rapid change. Strategic Enterprise includes a set of entrepreneurial actions undertaken for the purpose of strategic perspective. It describes the key characteristics of modern entrepreneurs with strategic emphasis on the needs of the strategic analysis of business opportunities and possibilities of business enterprises in the specific conditions, at the beginning of the third millennium.

  1. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  2. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  3. Collaborative Strategic Planning: Myth or Reality?

    Science.gov (United States)

    Mbugua, Flora; Rarieya, Jane F. A.

    2014-01-01

    The concept and practice of strategic planning, while entrenched in educational institutions in the West, is just catching on in Kenya. While literature emphasizes the importance of collaborative strategic planning, it does not indicate the challenges presented by collaboratively engaging in strategic planning. This article reports on findings of…

  4. The value contribution of strategic foresight

    DEFF Research Database (Denmark)

    Rohrbeck, René; Schwarz, Jan Oliver

    2013-01-01

    This paper focuses on exploring the potential and empirically observable value creation of strategic foresight activities in firms. We first review the literature on strategic foresight, innovation management and strategic management in order to identify the potential value contributions. We use...

  5. Collaborative Strategic Planning: Myth or Reality?

    Science.gov (United States)

    Mbugua, Flora; Rarieya, Jane F. A.

    2014-01-01

    The concept and practice of strategic planning, while entrenched in educational institutions in the West, is just catching on in Kenya. While literature emphasizes the importance of collaborative strategic planning, it does not indicate the challenges presented by collaboratively engaging in strategic planning. This article reports on findings of…

  6. Strategic Activism, Educational Leadership and Social Justice

    Science.gov (United States)

    Ryan, James

    2016-01-01

    This article describes the strategic activism of educational leaders who promote social justice. Given the risks, educational leaders need to be strategic about the ways in which they pursue their activism. Citing current research, this article explores the ways in which leaders strategically pursue their social justice agendas within their own…

  7. Strategic personnel management in an educational institution

    OpenAIRE

    KOROTKOVA M.V.; RYBKINA M.V.; NIKITINA S.O.; SCHERNYKH A.V.

    2016-01-01

    The article analyzes the strategic human resource management in an educational institution. Analyzes the basic normative-legal documents regulating educational activities, including the part of management. Particular importance is given to the types of educational institutions (budgetary, state, and autonomous). The stages of strategic management of staff in educational institutions and development model of strategic management personnel are shown.

  8. Strategic decision quality in Flemish municipalities

    NARCIS (Netherlands)

    B.R.J. George (Bert); S. Desmidt (Sebastian); J. De Moyer (Julie)

    2016-01-01

    textabstractStrategic planning (SP) has taken the public sector by storm because it is widely believed that SP’s approach to strategic decision-making strengthens strategic decision quality (SDQ) in public organizations. However, if or how SP relates to SDQ seems to lack empirical evidence. Drawing

  9. 13 CFR 313.6 - Strategic Plans.

    Science.gov (United States)

    2010-01-01

    .... EDA shall evaluate the Strategic Plan based on the following minimum requirements: (1) An analysis of... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Strategic Plans. 313.6 Section 313... § 313.6 Strategic Plans. (a) General. An Impacted Community that intends to apply for a grant...

  10. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-06

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  11. Conditional beam splitting attack on quantum key distribution

    OpenAIRE

    Calsamiglia, John; Barnett, Stephen M.; Lütkenhaus, Norbert

    2001-01-01

    We present a novel attack on quantum key distribution based on the idea of adaptive absorption [calsam01]. The conditional beam splitting attack is shown to be much more efficient than the conventional beam spitting attack, achieving a performance similar to the, powerful but currently unfeasible, photon number splitting attack. The implementation of the conditional beam splitting attack, based solely on linear optical elements, is well within reach of current technology.

  12. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  13. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  14. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  15. The strategic use of inserts in the Brazilian presidential elections

    Directory of Open Access Journals (Sweden)

    Felipe Borba

    2012-01-01

    Full Text Available The aim of this article is to analyze the communication strategies of presidential candidates during the elections held in 2006 and 2010. The focus is on the strategic component of electoral inserts and the methodology consists of investigating how candidates choose to distribute these inserts in the programming of television networks. The results indicate that the candidates pursue different strategies influenced basically by three variables: electoral legislation, their standing in polls and the difference of resources available. In parallel, the article debates the role of the regulation of electoral advertising and how this set of rules influences the level of information of campaigns, the occurrence of attacks, and party strategies. Overall, 2,993 electoral inserts were examined.

  16. Strategic Groups and Banks’ Performance

    Directory of Open Access Journals (Sweden)

    Gregorz Halaj

    2009-06-01

    Full Text Available The theory of strategic groups predicts the existence of stable groups of companies that adopt similar business strategies. The theory also predicts that groups will differ in performance and in their reaction to external shocks. We use cluster analysis to identify strategic groups in the Polish banking sector. We find stable groups in the Polish banking sector constituted after the year 2000 following the major privatisation and ownership changes connected with transition to the mostly-privately-owned banking sector in the late 90s. Using panel regression methods we show that the allocation of banks to groups is statistically significant in explaining the profitability of banks. Thus, breaking down the banks into strategic groups and allowing for the different reaction of the groups to external shocks helps in a more accurate explanation of profits of the banking sector as a whole.Therefore, a more precise ex ante assessment of the loss absorption capabilities of banks is possible, which is crucial for an analysis of banking sector stability. However, we did not find evidence of the usefulness of strategic groups in explaining the quality of bank portfolios as measured by irregular loans over total loans, which is a more direct way to assess risks to financial stability.

  17. Thinking strategically about electricity pricing

    Energy Technology Data Exchange (ETDEWEB)

    Toulson, D. (Barakat and Chamberlin, Inc., Oakland, CA (United States))

    1992-12-01

    This report describes an approach by which utilities can view pricing from a strategic, market-oriented perspective. It begins by reviewing pricing practices found in private industry and develops a framework for utility rate design that incorporates both customer value and cost of service. A market intelligence system for gathering data relevant to pricing decisions is also briefly outlined.

  18. Strategic Audit and Marketing Plan

    Science.gov (United States)

    Wright, Lianna S.

    2013-01-01

    The purpose of this audit was to revise the marketing plan for ADSum Professional Development School and give the owner a long-term vision of the school to operate competitively in the crowded field of for-profit schools. It is fairly simple to create a strategic plan but harder to implement and execute. Execution requires weeks and months of…

  19. Strategic School Planning in Jordan

    Science.gov (United States)

    Al-Zboon, Mohammad Saleem; Hasan, Manal Subhi

    2012-01-01

    The study aimed to measuring the applying degree of the strategic school planning stages at the Governmental high schools from the educational supervisors and principals perspective in the directorates related to Amman city, the study society was formed of the educational supervisors and principals working at Educational directorates related to…

  20. Strategic petroleum reserve annual report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-02-15

    Section 165 of the Energy Policy and Conservation Act (Public Law 94- 163), as amended, requires the Secretary of Energy to submit annual reports to the President and the Congress on activities of the Strategic Petroleum Reserve (SPR). This report describes activities for the year ending December 31, 1995.

  1. Tax Rates as Strategic Substitutes

    NARCIS (Netherlands)

    R.A. de Mooij (Ruud); H. Vrijburg (Hendrik)

    2012-01-01

    textabstractThis paper analytically derives the conditions under which the slope of the tax reaction function is negative in a classical tax competition model. If countries maximize welfare, we show that a negative slope (reflecting strategic substitutability) occurs under relatively mild conditions

  2. Using Intellectual Property Rights Strategically

    DEFF Research Database (Denmark)

    Reitzig, Markus

    2003-01-01

    With the share of intellectual property among corporate value constantly rising,management's understanding of the strategic use of patents, trademarks, andcopyrights becomes ever more crucial. The vast majority of articles on patent ortrademark strategies, however, is written by and for lawyers...

  3. Strategic Scenario Construction Made Easy

    DEFF Research Database (Denmark)

    Duus, Henrik Johannsen

    2016-01-01

    insights from the area of strategic forecasting (of which scenario planning is a proper subset) and experiences gained from a recent course in that area to develop a simpler, more direct, hands-on method for scenario construction and to provide several ideas for scenario construction that can be used...

  4. Strategic development: a new focus.

    Science.gov (United States)

    Lefko, J J

    1989-03-01

    Despite popular convention, a health-care organization's chief executive officer should be the organization's chief strategist. Planners and marketers must begin to function as strategic development officers responsible for sending the right information to the right decision makers so that they can make the right decisions as quickly as possible.

  5. Negotiation for Strategic Video Games

    OpenAIRE

    Afiouni, Einar Nour; Ovrelid, Leif Julian

    2013-01-01

    This project aims to examine the possibilities of using game theoretic concepts and multi-agent systems in modern video games with real time demands. We have implemented a multi-issue negotiation system for the strategic video game Civilization IV, evaluating different negotiation techniques with a focus on the use of opponent modeling to improve negotiation results.

  6. Strategic Communication: A Departmental Transformation

    Science.gov (United States)

    2010-03-24

    Representatives Adam Smith and Mac Thornberry echoed this view in early March 2010 when they invited other members of the U.S. House of Representatives to...jfq_pages/ editions/i55/1.pdf (accessed January 15, 2010). 5 Ibid. 21 6 U.S. Representatives Adam Smith and Mac Thornberry, “Join the new Strategic

  7. A "Quick & Dirty" Strategic Audit

    Science.gov (United States)

    Brawley, Dorothy E.

    2016-01-01

    In teaching Strategic Management, it is imperative that students first learn how to audit the firm before they begin analysis, planning and implementation. Unfortunately this is a step often overlooked. Without a complete and up to date audit, any analysis conducted would have questionable validity and reliability. This report focuses on an…

  8. Safeguards Technology Strategic Planning Pentachart

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, C. J. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2017-05-25

    Builds on earlier strategic planning workshops conducted for SGIT, SGTS, and SGCP. Many of recommendations from these workshops have been successfully implemented at the IAEA. Provide a context for evaluating new approaches for anticipated safeguards challenges of the future. Approach used by government and military to plan for an uncertain future. Uses consensus decision-making.

  9. Strategic Asset Seeking by EMNEs

    DEFF Research Database (Denmark)

    Petersen, Bent; Seifert, Jr., Rene E.

    2014-01-01

    as the more relevant concept to use when explaining strategic asset seeking of EMNEs. A set of propositions are formulated to guide empirical testing. Originality/value: The insights gained from using the springboard perspective and the LOO concept are non-trivial: They basically predict future dominance...

  10. Strategic Planning for Information Technology.

    Science.gov (United States)

    Bates, Iain

    1990-01-01

    Emphasizes the necessity for libraries to implement strategic planning for information technology. Topics discussed include assessing strengths and weaknesses; the allocation of resources; an OCLC report that surveyed member libraries to determine their planning activities; long-range planning; the need for flexibility; integrating planning with…

  11. NASA Strategic Roadmap Summary Report

    Science.gov (United States)

    Wilson, Scott; Bauer, Frank; Stetson, Doug; Robey, Judee; Smith, Eric P.; Capps, Rich; Gould, Dana; Tanner, Mike; Guerra, Lisa; Johnston, Gordon

    2005-01-01

    In response to the Vision, NASA commissioned strategic and capability roadmap teams to develop the pathways for turning the Vision into a reality. The strategic roadmaps were derived from the Vision for Space Exploration and the Aldrich Commission Report dated June 2004. NASA identified 12 strategic areas for roadmapping. The Agency added a thirteenth area on nuclear systems because the topic affects the entire program portfolio. To ensure long-term public visibility and engagement, NASA established a committee for each of the 13 areas. These committees - made up of prominent members of the scientific and aerospace industry communities and senior government personnel - worked under the Federal Advisory Committee Act. A committee was formed for each of the following program areas: 1) Robotic and Human Lunar Exploration; 2) Robotic and Human Exploration of Mars; 3) Solar System Exploration; 4) Search for Earth-Like Planets; 5) Exploration Transportation System; 6) International Space Station; 7) Space Shuttle; 8) Universe Exploration; 9) Earth Science and Applications from Space; 10) Sun-Solar System Connection; 11) Aeronautical Technologies; 12) Education; 13) Nuclear Systems. This document contains roadmap summaries for 10 of these 13 program areas; The International Space Station, Space Shuttle, and Education are excluded. The completed roadmaps for the following committees: Robotic and Human Exploration of Mars; Solar System Exploration; Search for Earth-Like Planets; Universe Exploration; Earth Science and Applications from Space; Sun-Solar System Connection are collected in a separate Strategic Roadmaps volume. This document contains memebership rosters and charters for all 13 committees.

  12. Strategic and Everyday Innovative Narratives

    DEFF Research Database (Denmark)

    Reff Pedersen, Anne; Brehm Johansen, Mette

    2012-01-01

    in making sense of innovative ideas in everyday practice. An empirical case is offered to demonstrate how two types of innovation narratives emerge: strategic and everyday narratives through involvement of spokespersons and employees. These findings suggest that an advanced understanding of the roles...

  13. The Strategic Nature of Compliance

    DEFF Research Database (Denmark)

    König, Thomas; Mäder, Lars Kai

    2014-01-01

    This compliance study models correct and timely implementation of policies in a multilevel system as a strategic game between a central monitoring agency and multiple implementers and evaluates statistically the empirical implications of this model. We test whether compliance is determined...

  14. Raising financing through strategic timing

    Science.gov (United States)

    Maine, Elicia; Thomas, V. J.

    2017-02-01

    Strategic timing can be key for nano-drug-delivery ventures to get financing. Timely publications engage potential partners; early broad, blocking, relevant patents demonstrate the potential to appropriate value; and venture formation closer to clinical viability better aligns its timeline with that of venture capitalists.

  15. BARRIERS OF STRATEGIC ALLIANCES ORGANIZATION

    Directory of Open Access Journals (Sweden)

    Vladislav M. Sannikov

    2014-01-01

    Full Text Available General barriers of organization of different types of strategic alliances have beenconsidered in the article. There are several recommendations for overcoming themin cases of international alliances, and in case of work in one state. The article also identified goals and tasks of single coordination center of alliance to overcome organization barriers.

  16. Strategic and Everyday Innovative Narratives

    DEFF Research Database (Denmark)

    Reff Pedersen, Anne; Brehm Johansen, Mette

    2012-01-01

    in making sense of innovative ideas in everyday practice. An empirical case is offered to demonstrate how two types of innovation narratives emerge: strategic and everyday narratives through involvement of spokespersons and employees. These findings suggest that an advanced understanding of the roles...

  17. Developing a strategic marketing plan.

    Science.gov (United States)

    Zipin, M L

    1989-06-01

    Strategic planning is essential to the survival of today's hospital. Whether the hospital is an academic medical center, a community hospital or some other type of organization, the key to success is a thorough market planning process. The four-phase process described here focuses on an academic medical center, but it is equally applicable to other types of hospitals.

  18. Networks and meshworks in strategizing

    DEFF Research Database (Denmark)

    Esbjerg, Lars; Andersen, Poul Houman

    the literature on networks and network pictures, and identifies several shortcomings of this work. To develop the notion of business meshworks as an alternative for understanding strategizing practices in business interaction, the paper draws on recent writings within anthropology and the strategy...

  19. A strategic PACS maturity approach

    NARCIS (Netherlands)

    van de Wetering, R.

    2011-01-01

    Finding the key determinants of Picture Archivingand Communication Systems (PACS)performance in hospitals has been a conundrumfor decades. This research provides a method toassess the strategic alignment of PACS in hospitalsin order to find these key determinants. PACS touches upon every single part

  20. Strategic School Planning in Jordan

    Science.gov (United States)

    Al-Zboon, Mohammad Saleem; Hasan, Manal Subhi

    2012-01-01

    The study aimed to measuring the applying degree of the strategic school planning stages at the Governmental high schools from the educational supervisors and principals perspective in the directorates related to Amman city, the study society was formed of the educational supervisors and principals working at Educational directorates related to…