6,729 research outputs found

    The Use of Governance to Identify Cyber Threats Through Social Media

    Get PDF
    Identifying which website, Facebook page or Linked-in connection could lead to an engagement with a terrorist group is beyond the capabilities of ordinary people. Differentiation of one website from another in terms of cyber threat is a complex problem in terms of separating those that encourage and sponsor radicalization and those that do not. These claims usually exist without evidence, and almost always without the opportunity to know where social justice and human-rights support ends, and reaction, dissidence and subversion begins. By overlaying the new modes of governance (NMG) framework against sites and connections that may be subject to ongoing and persistent threats, sites can be divided into two areas. The first aligns closely with governance, whilst the second looks decidedly more threatening. This paper gives an outline for future developments in recognizing simple markers for differentiating hard core extremism from genuine community engagement. The notion that participatory governance need not imply democracy is an important element in future determinations between radically driven cyber threats and moderate media interactions

    INCORPORATING SUBSISTENCE INTO A PROBIT ANALYSIS OF HOUSEHOLD NUTRITION LEVELS

    Get PDF
    Previous nutrient demand and consumption analyses show that several economic and sociodemographic variables are often associated with intakes. However, most of the literature does not account for differences among individuals within households. This study reviewed possible definitions of nutrient differences with respect to nutritional needs. Nutrient levels defined by the Thrifty Food Plan were used as subsistence levels for households in the 1977-78 Nationwide Food Consumption Survey. Probit analysis showed that the usual variables found related to nutrient intakes did not differentiate among subsistence groups. Household life cycle and working female heads influenced whether the household was under its requirement level.Food Consumption/Nutrition/Food Safety,

    Mitigating Cyber-Threats Through Public-Private Partnerships: Low Cost Governance with High-Impact Returns

    Get PDF
    The realization that cyber threats can cause the same devastation to a country as physical security risks has taken the long route towards acceptance. Governments and businesses have thrown the glove of responsibility back and forth on numerous occasions, with government agencies citing the need for private enterprise to take up the mantle, and Business returning the gesture by proposing a ‘national’ perspective on cyber security. Ambit claims such as these drain a range of security resources when both sides should work in concert by directing all available energy towards resolving cyber-threats. This paper compares the public-private arrangements through Australasia in arguing the need for new modes of governance across cyber-security initiatives. Whilst critical infrastructure partnerships accept the need for joint operations – the broader information technology (IT) security industry has yet to embrace the same

    Multiparticle States and the Hadron Spectrum on the Lattice

    Get PDF
    The Clebsch-Gordan decomposition is calculated for direct products of the irreducible representations of the cubic space group. These results are used to identify multiparticle states which appear in the hadron spectrum on the lattice. Consideration of the cubic space group indicates how combinations of both zero momentum and non-zero momentum multiparticle states contribute to the spectrum.Comment: v2) Little groups for lattice momenta corrected. Includes a more consistent labeling scheme. (13 pages

    Twitter influence and cumulative perceptions of extremist support: A case study of Geert Wilders

    Get PDF
    The advent of Social media has changed the manner in which perceptions about power and information can be influenced. Twitter is used as a fast‐paced vehicle to deliver short, succinct pieces of information, creating the perception of acceptance, popularity and authority. In the case of extremist groups, Twitter is one of several avenues to create the perception of endorsement of values that would otherwise gain less prominence through mainstream media. This study examines the use of Twitter in augmenting the status and reputation of anti‐Islam and anti‐immigration policy through the controlled release of social media information bursts. The paper demonstrates the use of new media by extremist groups using open source case study data from the associated Twitter traffic of Geert Wilders. The results indicate the pursuit of increased traction for controversial ideals that provoke and incite others towards extremism, violence, racism and Islamaphobia

    The Malarkey of Money Transfers: Overlooking E-Bay whilst the Hawaladars are Hunted

    Get PDF
    Informal Money Transfer systems represent one of several persistent loopholes in the fight against the War on Terror. Terrorist groups and criminal networks continue to use the Hawala system, as well as other informal transfer systems, to escape the regulatory and administrative control of formal international banking transactions. In an age where global financial regulation is underpinned by international agreement through Basel and others, the ongoing use of IVTs in Australia is cause for increasing concern. Yet Hawala is only half of the informal equation. E-bay and its associated bedfellows outstrip Hawala transfers through the same commercial imperative that drives the modern world, simply by doing business. This paper describes the escalating risk in Australian and International money transfers, and the need for a reconsideration of the prevention strategies that conceal the support for terrorist and criminal activities

    Sex allocation theory reveals a hidden cost of neonicotinoid exposure in a parasitoid wasp

    Get PDF
    P.R.W. was funded by the University of Stirling, C.V.B. and S.M.G. were funded by Nuffield Research Placements and N.C., J.G. and D.M.S. were funded by NERC (NE/J024481/1).Sex allocation theory has proved to be one the most successful theories in evolutionary ecology. However, its role in more applied aspects of ecology has been limited. Here we show how sex allocation theory helps uncover an otherwise hidden cost of neonicotinoid exposure in the parasitoid wasp Nasonia vitripennis. Female N. vitripennis allocate the sex of their offspring in line with Local Mate Competition (LMC) theory. Neonicotinoids are an economically important class of insecticides, but their deployment remains controversial, with evidence linking them to the decline of beneficial species. We demonstrate for the first time to our knowledge, that neonicotinoids disrupt the crucial reproductive behaviour of facultative sex allocation at sub-lethal, field-relevant doses in N. vitripennis. The quantitative predictions we can make from LMC theory show that females exposed to neonicotinoids are less able to allocate sex optimally and that this failure imposes a significant fitness cost. Our work highlights that understanding the ecological consequences of neonicotinoid deployment requires not just measures of mortality or even fecundity reduction among non-target species, but also measures that capture broader fitness costs, in this case offspring sex allocation. Our work also highlights new avenues for exploring how females obtain information when allocating sex under LMC.Publisher PDFPeer reviewe

    Securing the Elderly: A Developmental Approach to Hypermedia Based Online Information Security for Senior Novice Computer Users

    Get PDF
    Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying appropriate controls and safeguards to their computers and networking devices. This paper identifies that web-based computer security information sources do not adequately provide helpful information to senior citizen end-users in terms of both design and content. It subsequently demonstrates a solution designed with the elderly, yet novice, end-user in mind. This paper examines the need for practical computer-based instructions that have wide-ranging applications to a wide selection of under-informed internet consumers. As computer usage rapidly spreads towards total ubiquity across all generations and social levels, the need for web-based education resources to protect generationally differing internet users is urgently required
    corecore