Perception takes into account the costs and benefits of possible interpretations of incoming sensory data. This should be especially pertinent for threat recognition, where minimising the costs associated with missing a real threat is of primary importance. We tested whether recognition of threats has special characteristics that adapt this process to the task it fulfils. Participants were presented with images of threats and visually matched neutral stimuli, distorted by varying levels of noise. We found threat superiority effect and liberal response bias. Moreover, increasing the level of noise degraded the recognition of the neutral images to higher extent than the threatening images. To summarise, recognising threats is special, in that it is more resistant to noise and decline in stimulus quality, suggesting that threat recognition is a fast ‘all or nothing’ process, in which threat presence is either confirmed or negated.
Międzynarodowa konwencja z Nairobi o usuwaniu wraków weszła w życie 14 kwietnia 2015 r. Do chwili obecnej (31 października 2019) została ona ratyfikowana przez 47 państw, w tym Australię, Kanadę, Chiny, Indie, Republikę Południowej Afryki i większość państw morskich Unii Europejskiej.
Zasadniczym celem konwencji z Nairobi jest ustanowienie ram prawnych dotyczących możliwości działań podejmowanych przez państwa nadbrzeżne w zakresie usuwania wraków stanowiących zagrożenie lub przeszkodę nawigacyjną, albo zagrożenie dla środowiska morskiego. Konwencja ma w założeniu wypełnić istniejącą przed jej wejściem w życie lukę prawną w zakresie możliwych działań państw nadbrzeżnych w stosunku do wraków znajdujących się poza ich terytorium. Zgodnie z jej postanowieniami państwa mogą rozszerzyć zakres stosowania konwencji na morze terytorialne.
Celem niniejszego artykułu jest analiza nowych uprawnień i obowiązków państw nadbrzeżnych oraz znaczenia konwencyjnych pojęć dotyczących zagrożeń nawigacyjnych i środowiskowych powodowanych przez wraki. W artykule scharakteryzowane zostały także wyzwania regulacyjne, którym sprostać muszą państwa nadbrzeżne w procesie implementacji postanowień konwencji. Ostatnia ze wspomnianych kwestii analizowana jest przede wszystkim z perspektywy państwa, które jeszcze nie wdrożyło postanowień konwencji, niemniej jednak w artykule przedstawiono także rozwiązania wybranych państw, które konwencję ratyfikowały.
The article herein presents the method and algorithms for forming the feature space for the base of intellectualized system knowledge for the support system in the cyber threats and anomalies tasks. The system being elaborated might be used both autonomously by cyber threat services analysts and jointly with information protection complex systems. It is shown, that advised algorithms allow supplementing dynamically the knowledge base upon appearing the new threats, which permits to cut the time of their recognition and analysis, in particular, for cases of hard-to-explain features and reduce the false responses in threat recognizing systems, anomalies and attacks at informatization objects. It is stated herein, that collectively with the outcomes of previous authors investigations, the offered algorithms of forming the feature space for identifying cyber threats within decisions making support system are more effective. It is reached at the expense of the fact, that, comparing to existing decisions, the described decisions in the article, allow separate considering the task of threat recognition in the frame of the known classes, and if necessary supplementing feature space for the new threat types. It is demonstrated, that new threats features often initially are not identified within the frame of existing base of threat classes knowledge in the decision support system. As well the methods and advised algorithms allow fulfilling the time-efficient cyber threats classification for a definite informatization object.
The paper presents the probabilistic model of fibrillation currents containing two components with different frequencies. An analysis was conducted of the threat of ventricular fibrillation which occurs in consequence of the electric shock with the highest permissible contact shocking voltage of the network frequency (50 Hz), taking into account the threat caused by the second component of the voltage which has the frequency higher than the network frequency. The sample results of calculations apply to the probability of the ventricular fibrillation in case of a shock caused by the highest permissible contact shocking voltage, for the defined time of shock duration, without and with the participation of an additional voltage component with higher frequency. The formula has been presented for the calculation of the highest permissible contact shock voltages with taking into account the voltage component of the frequency higher than the network frequency. The results of calculations indicate that a considerable reduction of the highest permissible contact shock voltage is necessary in order to compensate for a growth of the ventricular fibrillation threat caused by the presence of an additional component with the frequency other the network frequency. This applies in particular to the long shock duration times and low frequencies (up to 500 Hz) of an additional component of the shocking voltage.
The purpose of this article is to identify and assess environmental risks that may have the greatest impact on the future of humanity. They were divided into two basic groups, i.e. for natural processes and resources. In addition, climate change is described as different group. The authors decided, that a holistic approach to this issue is more desirable than dividing it into two above-mentioned groups. The comparison of various threats was possible due to the application of identical assessment criteria, such as: the harmfulness, rate of spread, scope and moment of occurrence of a given group of threats. Each of the listed criteria has been evaluated on a five-point scale, where 1 has the smallest and 5 the largest impact force. The obtained results show the leading importance of natural processes in maintaining the existing Earth system. In addition, the authors point to a greater risk of problems related to renewable resources than non-renewable one. As a result, it can be assumed that the current degradation of natural processes and excessive use of resources is likely to lead to the risk of global disasters.
The paper depicts a complex, distributed information system aimed at promoting cybersecurity awareness at the national level. The system, that is built in accordance with the Act on National Cybersecurity, passed by the Polish Parliament, enables collecting and processing in near-real time available information on the security status of essential services and digital services and, also, provides for assessment of negative impact of the identified threats concerned with the provision of those services. Advanced access control and dissemination mechanisms, for secure information sharing within the system, are provided in order to aggregate distributed knowledge and use this information for online security risk analysis and for generation and distribution of early warnings.
Almost every construction investment should contain elements of risk forecasting, whose validity depends, among other things, on the correct assessment of potential threats. These risks were defined by the Authors as risk factors that were characterized and then grouped on the basis of performed research in the scope of their identification. Due to lack of method of scheduling railway investments on the construction market, including risk assessment, a research effort was undertaken [14-17], the result of which is the proposed method. The article presents the main assumptions of the original method of rail investment planning, which on the one hand, will take into account the impact of potential threats identified previously by the Authors, and, on the other, will allow project managers to refer to the conditions in which the implementation of a specific facility is planned. The assumption was made that the method, relatively easy to implement, supported by an appropriate computational program, will encourage teams planning the implementation of railway undertakings to its application and will improve the reliability of the schedules they develop.