Results for 'threat detection'

983 found
Order:
  1.  19
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  22
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  78
    Advanced Persistent Threats in Cybersecurity – Cyber Warfare.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book aims to provide a comprehensive analysis of Advanced Persistent Threats (APTs), including their characteristics, origins, methods, consequences, and defense strategies, with a focus on detecting these threats. It explores the concept of advanced persistent threats in the context of cyber security and cyber warfare. APTs represent one of the most insidious and challenging forms of cyber threats, characterized by their sophistication, persistence, and targeted nature. The paper examines the origins, characteristics and methods used by APT actors. It also (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web page phishing attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Detection and Mathematical Modeling of Anxiety Disorder Based on Socioeconomic Factors Using Machine Learning Techniques.Razan Ibrahim Alsuwailem & Surbhi Bhatia - 2022 - Human-Centric Computing and Information Sciences 12:52.
    The mental risk poses a high threat to the individuals, especially overseas demographic, including expatriates in comparison to the general Arab demographic. Since Arab countries are renowned for their multicultural environment with half of the population of students and faculties being international, this paper focuses on a comprehensive analysis of mental health problems such as depression, stress, anxiety, isolation, and other unfortunate conditions. The dataset is developed from a web-based survey. The detailed exploratory data analysis is conducted on the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Marine debris ingestion by sea turtles (Testudines) on the Brazilian coast: an underestimated threat?Robson Henrique Carvalho, Pedro Dutra Lacerda, Sarah da Silva Mendes, Bruno Corrêa Barbosa, Mariana Paschoalini, Fábio Prezoto & Bernadete Maria de Sousa - 2015 - Marine Pollution Bulletin 101 (3):746-749.
    Assessment of marine debris ingestion by sea turtles is important, especially to ensure their survival. From January to December 2011, 23 specimens of five species of sea turtleswere found dead or dying after being rehabilitated, along the coast of the municipality of Rio de Janeiro, Brazil. To detect the presence of marine debris in the digestive tract of these turtles, we conducted a postmortemexamination from the esophagus until the distal portion of the large intestine for each specimen. Of the total (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud environment. These strategies aim (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this inconvenience is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Active monitoring of airborne elements in Isparta Province (Turkey) with the epiphytic lichen Physcia aipolia (Erh. ex Humb.) Fürnr.Mustafa Yavuz & Gülşah Çobanoğlu - 2019 - Journal of Elementology 3 (24):1115-1128.
    Air pollutants pose a threat to biodiversity throughout the world. This study was conducted to evaluate atmospheric element accumulation in Isparta city, including Gölcük Nature Park, located in the Western Mediterranean Region of Turkey. It is aimed to determine the air quality and potential pollutant sources in the region through lichen biomonitoring. Specimens of the epiphytic foliose lichen Physcia aipolia (Erh. ex Humb.) Fürnr. were sampled from 14 sites in the study area and analyzed by ICP-MS with reference material (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. Measuring the Immeasurable Mind: Where Contemporary Neuroscience Meets the Aristotelian Tradition.Matthew Owen - 2021 - Lexington Books (Rowman & Littlefield).
    In Measuring the Immeasurable Mind: Where Contemporary Neuroscience Meets the Aristotelian Tradition, Matthew Owen argues that despite its nonphysical character, it is possible to empirically detect and measure consciousness. -/- Toward the end of the previous century, the neuroscience of consciousness set its roots and sprouted within a materialist milieu that reduced the mind to matter. Several decades later, dualism is being dusted off and reconsidered. Although some may see this revival as a threat to consciousness science aimed at (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  13. AI or Your Lying Eyes: Some Shortcomings of Artificially Intelligent Deepfake Detectors.Keith Raymond Harris - 2024 - Philosophy and Technology 37 (7):1-19.
    Deepfakes pose a multi-faceted threat to the acquisition of knowledge. It is widely hoped that technological solutions—in the form of artificially intelligent systems for detecting deepfakes—will help to address this threat. I argue that the prospects for purely technological solutions to the problem of deepfakes are dim. Especially given the evolving nature of the threat, technological solutions cannot be expected to prevent deception at the hands of deepfakes, or to preserve the authority of video footage. Moreover, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Classification of Chicken Diseases Using Deep Learning.Mohammed Al Qatrawi & Samy S. Abu-Naser - 2024 - Information Journal of Academic Information Systems Research (Ijaisr) 8 (4):9-17.
    Abstract: In recent years, the outbreak of various poultry diseases has posed a significant threat to the global poultry industry. Therefore, the accurate and timely detection of chicken diseases is critical to reduce economic losses and prevent the spread of diseases. In this study, we propose a method for classifying chicken diseases using a convolutional neural network (CNN). The proposed method involves preprocessing the chicken images, building and training a CNN model, and evaluating the performance of the model. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all dimensions of Digital transformation and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: There was a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Caponapoli.Asma Mehan - 2023 - In Michael G. Kelly, Jorge Mejía Hernández, Sonja Novak & Giuseppe Resta (eds.), OTHER DESTINATIONS: Translating the Mid-sized European City. Osijek: Faculty of Humanities and Social Sciences, Josip Juraj Strossmayer University of Osijek. pp. 46-62.
    Nowadays there is a general acknowledgment of the importance of place in Italian crime novels. In Caponapoli, Massimo Siviero articulates a narrative way in which he approaches the structures, city, and the built environment to reflect the society, cultural relations, transformations and dysfunctions of contemporary Naples. Joe Pazienza, the private detective, has been seen by him recently before he was a reporter. When hired by his first client, Nada Mormile, someone with all the requirements of the dark lady in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest over (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. Macro and micromanagement practices of reading comprehension programs in selected grade schools in the post-pandemic.Leonora Divinagracia - 2023 - Forum for Linguistic Studies 5 (2):1664.
    After years in distance learning, grade school teachers are now facing the threat of declining reading comprehension among elementary pupils in post-pandemic settings. Teachers observed a spike in the number of non-readers and frustrated readers in intermediate grade levels. Teachers expressed concerns about the state of the education system in the aftermath of the pandemic. The purpose of this exploratory study was to establish an understanding of the challenges and mechanisms of macro- and micro-management strategies of grade school institutions. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a big challenge (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Pandemic Politics - An Introduction.Ewa Latecka, Jean Du Toit & Gregory Morgan Swer - 2021 - Acta Academica 53 (2):1-11.
    The outbreak of COVID-19 in early 2020 and the various measures taken subsequently, either by individual countries or by government and nongovernment bodies with a global reach, have had a profound effect on human lives on a number of levels, be it social, economic, legal, or political. The scramble to respond to the threat posed by the rapid spread of the virus has, in many cases, led to a suspension of ordinary politics whilst at the same time throwing into (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Using Inexpensive Home Alarm for Computer Based Carbon Monoxide Monitoring.Abdullah Hussein Mohammed - 2012 - Asian Transactions on Engineering 2 (02):6.
    The current increase of air pollution rates and its consequences of global warming, health problems and threats to human lives necessitate the continuous search for more efficient and cost effective gas monitoring devices. Devices that is easily available and implementable worldwide. In developing countries the cost and the availability of the equipment is one of the obstacles that contribute to not having an efficient monitoring system. Hence, modifying cheap and easily available devices to work as pollution monitoring system will be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  24. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  25. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused (...)
    Download  
     
    Export citation  
     
    Bookmark   92 citations  
  26. Emerging viral threats and the simultaneity of the non-simultaneous: zooming out in times of Corona.Hub Zwart - 2020 - Medicine, Health Care and Philosophy 23 (4):589-602.
    This paper addresses global bioethical challenges entailed in emerging viral diseases, focussing on their socio-cultural dimension and seeing them as symptomatic of the current era of globalisation. Emerging viral threats exemplify the extent to which humans evolved into a global species, with a pervasive and irreversible impact on the planetary ecosystem. To effectively address these disruptive threats, an attitude of preparedness seems called for, not only on the viroscientific, but also on bioethical, regulatory and governance levels. This paper analyses the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. The Threat of Algocracy: Reality, Resistance and Accommodation.John Danaher - 2016 - Philosophy and Technology 29 (3):245-268.
    One of the most noticeable trends in recent years has been the increasing reliance of public decision-making processes on algorithms, i.e. computer-programmed step-by-step instructions for taking a given set of inputs and producing an output. The question raised by this article is whether the rise of such algorithmic governance creates problems for the moral or political legitimacy of our public decision-making processes. Ignoring common concerns with data protection and privacy, it is argued that algorithmic governance does pose a significant (...) to the legitimacy of such processes. Modelling my argument on Estlund’s threat of epistocracy, I call this the ‘threat of algocracy’. The article clarifies the nature of this threat and addresses two possible solutions. It is argued that neither solution is likely to be successful, at least not without risking many other things we value about social decision-making. The result is a somewhat pessimistic conclusion in which we confront the possibility that we are creating decision-making processes that constrain and limit opportunities for human participation. (shrink)
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  28.  95
    Deception Detection Research: Some Lessons for Epistemology.Peter Graham - forthcoming - In Waldomiro Silva Filho (ed.), Epistemology of Conversation: First essays. Cham: Springer.
    According to our folk theory of lying, liars leak observable cues of their insincerity, observable cues that make it easy to catch a liar in real time. Various prominent social epistemologists rely on the correctness of our folk theory as empirically well-confirmed when building their normative accounts of the epistemology of testimony. Deception detection research in communication studies, however, has shown that our folk-theory is mistaken. It is not empirically well-confirmed but empirically refuted. Michaelian (2010) and Shieber (2012) have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Detection of Brain Tumor Using Deep Learning.Hamza Rafiq Almadhoun & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):29-47.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and reacts like humans, some of the computer activities with artificial intelligence are designed to include speech, recognition, learning, planning and problem solving. Deep learning is a collection of algorithms used in machine learning, it is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is used as a (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  30. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the model’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  31. Pedestrian detection based on hierarchical co-occurrence model for occlusion handling.Xiaowei Zhang, HaiMiao Hu, Fan Jiang & Bo Li - 2015 - Neurocomputing 10.
    In pedestrian detection, occlusions are typically treated as an unstructured source of noise and explicit models have lagged behind those for object appearance, which will result in degradation of detection performance. In this paper, a hierarchical co-occurrence model is proposed to enhance the semantic representation of a pedestrian. In our proposed hierarchical model, a latent SVM structure is employed to model the spatial co-occurrence relations among the parent–child pairs of nodes as hidden variables for handling the partial occlusions. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  32. Direct Detection of Relic Neutrino Background remains impossible: A review of more recent arguments.Florentin Smarandache & Victor Christianto - manuscript
    The existence of big bang relic neutrinos—exact analogues of the big bang relic photons comprising the cosmic microwave background radiation—is a basic prediction of standard cosmology. The standard big bang theory predicts the existence of 1087 neutrinos per flavour in the visible universe. This is an enormous abundance unrivalled by any other known form of matter, falling second only to the cosmic microwave background (CMB) photon. Yet, unlike the CMB photon which boasts its first (serendipitous) detection in the 1960s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Threat from Manipulation Arguments.Benjamin Matheson - 2018 - American Philosophical Quarterly 55 (1):37-50.
    Most seem to presume that what is threatening about manipulation arguments is the ‘no difference’ premise – that is, the claim that there are no responsibility-relevant differences between a manipulated agent and her merely causally determined counterpart. This presumption underlies three recent replies to manipulation arguments from Kearns (2012), King (2013), and Schlosser (2015). But these replies fail to appreciate the true threat from manipulation arguments – namely, the manipulation cases that are allegedly counterexamples to the leading compatibilist conditions (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  34. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This process will be done with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. True Detective: Buddhism, Pessimism or Philosophy?Finn Janning - 2014 - Journal of Philosophy of Life 4 (4).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Introspection Is Signal Detection.Jorge Morales - forthcoming - British Journal for the Philosophy of Science.
    Introspection is a fundamental part of our mental lives. Nevertheless, its reliability and its underlying cognitive architecture have been widely disputed. Here, I propose a principled way to model introspection. By using time-tested principles from signal detection theory (SDT) and extrapolating them from perception to introspection, I offer a new framework for an introspective signal detection theory (iSDT). In SDT, the reliability of perceptual judgments is a function of the strength of an internal perceptual response (signal- to-noise ratio) (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  37. Doing and allowing, threats and sequences.Fiona Woollard - 2008 - Pacific Philosophical Quarterly 89 (2):261–277.
    The distinction between doing and allowing appears to have moral significance, but the very nature of the distinction is as yet unclear. Philippa Foot's ‘pre-existing threats’ account of the doing/allowing distinction is highly influential. According to the best version of Foot's account an agent brings about an outcome if and only if his behaviour is part of the sequence leading to that outcome. When understood in this way, Foot's account escapes objections by Warren Quinn and Jonathan Bennett. However, more analysis (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  38. Is that a Threat?Henry Ian Schiller - 2021 - Erkenntnis 86 (5):1161-1183.
    I introduce game-theoretic models for threats to the discussion of threats in speech act theory. I first distinguish three categories of verbal threats: conditional threats, categorical threats, and covert threats. I establish that all categories of threats can be characterized in terms of an underlying conditional structure. I argue that the aim—or illocutionary point—of a threat is to change the conditions under which an agent makes decisions in a game. Threats are moves in a game that instantiate a subgame (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  39. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  40. The Threat of COVID-19 and Job Insecurity Impact on Depression and Anxiety: An Empirical Study in the USA.Obrenovic Bojan, Jianguo Du, Danijela Godinić, Mohammed Majdy M. Baslom & Diana Tsoy - 2021 - Frontiers in Psychology 12:648572.
    In this study, we conceptualized a framework capturing recurring troublesome elements of mental states such as depression and general anxiety, assessing them by applying standard clinical inventory. The study explores the extent to which danger control and fear control under the Extended Parallel Processing Model (EPPM) threat impact job insecurity, with uncertainty phenomenon causing afflicting effect on the experiential nature of depression heightened by anxiety. With the aim to explore the job insecurity relationship with anxiety and depression, and measure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Failure to detect mismatches between intention and outcome in a simple decision task.Petter Johansson, Lars Hall, Sverker Sikstrom & Andreas Olsson - 2005 - Science 310 (5745):116-119.
    A fundamental assumption of theories of decision-making is that we detect mismatches between intention and outcome, adjust our behavior in the face of error, and adapt to changing circumstances. Is this always the case? We investigated the relation between intention, choice, and introspection. Participants made choices between presented face pairs on the basis of attractiveness, while we covertly manipulated the relationship between choice and outcome that they experienced. Participants failed to notice conspicuous mismatches between their intended choice and the outcome (...)
    Download  
     
    Export citation  
     
    Bookmark   114 citations  
  42. The Threats of Land Resources Management Due to Increasing Rapid Population Growth in Zanzibar.Muhamad Hamdu Haji - 2019 - International Journal of Academic Multidisciplinary Research (IJAMR) 3 (4):1-7.
    Abstract: This paper talks about the threats of land Resources management due to the problem of rapid increase of population growth in Zanzibar Island. Actual there are many threats that are investigated and proved by this study. The land environmental degradation, cutting down the forest for formation of charcoal as their income sources as well as drilling the minerals includes sand and stone are the ones of the threats of land resources management due to the highly increasing of population growth (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Standard Threats: How to Violate Basic Human Rights.Anthony R. Reeves - 2015 - Social Theory and Practice 41 (3):403-434.
    The paper addresses the nature of duties grounded in human rights. Rather than being protections against harm, per se, I contend that human rights largely shield against risk impositions to protected interests. “Risk imposition” is a normative idea requiring explication, but understanding dutiful action in its terms enables human rights to provide prospective policy guidance, hold institutions accountable, operate in non-ideal circumstances, embody impartiality among persons, and define the moral status of agencies in international relations. Slightly differently, I indicate a (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Ontology-based error detection in SNOMED-CT.Werner Ceusters, Barry Smith, Anand Kumar & Christoffel Dhaen - 2004 - Proceedings of Medinfo 2004:482-6.
    Quality assurance in large terminologies is a difficult issue. We present two algorithms that can help terminology developers and users to identify potential mistakes. We demon­strate the methodology by outlining the different types of mistakes that are found when the algorithms are applied to SNOMED-CT. On the basis of the results, we argue that both formal logical and linguistic tools should be used in the development and quality-assurance process of large terminologies.
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  45. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in Gaza (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Threats, Coercion, and Willingness to Damn: Three More Objections against the Unpopulated Hell View.Alex R. Gillham - 2020 - Forum Philosophicum: International Journal for Philosophy 25 (2):235-254.
    In this paper, I develop and evaluate three new objections to the Unpopulated Hell View (UHV). First, I consider whether UHV is false because it presupposes that God makes threats, which a perfect being would not do. Second, I evaluate the argument that UHV is false because it entails that God coerces us and therefore limits our freedom to an objectionable degree. Third, I consider whether UHV is false because it implies that God is willing to damn some individuals to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. IMPLICIT BIAS, STEREOTYPE THREAT, AND POLITICAL CORRECTNESS IN PHILOSOPHY.Sean Allen-Hermanson - 2017 - Philosophies 2 (2).
    This paper offers an unorthodox appraisal of empirical research bearing on the question of the low representation of women in philosophy. It contends that fashionable views in the profession concerning implicit bias and stereotype threat are weakly supported, that philosophers often fail to report the empirical work responsibly, and that the standards for evidence are set very low—so long as you take a certain viewpoint.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Detecting Health Problems Related to Addiction of Video Game Playing Using an Expert System.Samy S. Abu Naser & Mohran H. Al-Bayed - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (9):7-12.
    Today’s everyone normal life can include a normal rate of playing computer games or video games; but what about an excessive or compulsive use of video games that impact on our life? Our kids, who usually spend a lot of time in playing video games will likely have a trouble in paying attention to their school lessons. In this paper, we introduce an expert system to help users in getting the correct diagnosis of the health problem of video game addictions (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  49. The Fallaciousness of Threats: Character and Ad Baculum .F. Macagno & D. Walton - 2007 - Argumentation 28 (3):203-228.
    Robert Kimball, in “What’s Wrong with Argumentum Ad Baculum?” (Argumentation, 2006) argues that dialogue-based models of rational argumentation do not satisfactorily account for what is objectionable about more malicious uses of threats encountered in some ad baculum arguments. We review the dialogue-based approach to argumentum ad baculum, and show how it can offer more than Kimball thinks for analyzing such threat arguments and ad baculum fallacies.
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  50. Sentientism Still Under Threat: Reply to Dung.François Kammerer - 2024 - Journal of Consciousness Studies 31 (3):103-119.
    In 'Ethics Without Sentience: Facing Up to the Probable Insignificance of Phenomenal Consciousness' (Kammerer, 2022), I argued that phenomenal consciousness is probably normatively insignificant, and does not play a significant normative role. In 'Preserving the Normative Significance of Sentience' (Dung, 2024), Leonard Dung challenges my reasoning and defends sentientism about value and moral status against my arguments. Here I respond to Dung's criticism, pointing out three flaws in his reply. My conclusion is that the view that phenomenal consciousness is distinctively (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 983