نتایج جستجو برای: sabotage
تعداد نتایج: 598 فیلتر نتایج به سال:
We present a reduction from a new logic extending van der Meyden’s dynamic logic of permission (DLP) into propositional dynamic logic (PDL), providing a 2EXPTIME decision procedure and showing that all the machinery for PDL can be reused for reasoning about dynamic policies. As a sideeffect, we establish that DLP is EXPTIME-complete. The logic we introduce extends the logic DLP so that the poli...
This experiment shows that Mathew Rabin’s (1993) fairness equilibrium is more descriptive than the relevant null hypothesis, that people’s generosity levels are innate. Participants treated others as they expected others to treat them. Prospective reciprocation creates path dependency in organizations’ cooperation levels. Organization member’s expectations of others’ willingness to cooperate ma...
Many experiments indicate that most individuals are not purely motivated by material self interest, but also care about the well being of others. In this paper we examine tournaments among inequity averse agents, who dislike disadvantageous inequity (envy) and advantageous inequity (compassion). It turns out that inequity averse agents exert higher effort levels than purely self-interested agen...
Radical environmental groups engaged in ecotage—or economic sabotage of inanimate objects thought to be complicit in environmental destruction—have been identified as the leading domestic terrorist threat in the post-9/11 “war on terror.” This article examines the case for extending the conventional definition of terrorism to include attacks not only against noncombatants, but also against inan...
This paper examines key trends and developments in information technology, and the implications of those developments on stability and security. Focus is on cyber threats to computer networks, including information theft and sabotage, and acts that disrupt or deny services. Seven trend areas are examined: ubiquity, mobility, hacking tools, performance, vulnerabilities, groundedness, and informa...
We study dynamic modal operators that can change the model during the evaluation of a formula. In particular, we extend the basic modal language with modalities that are able to swap, delete or add pairs of related elements of the domain, while traversing an edge of the accessibility relation. We study these languages together with the sabotage modal logic, which can arbitrarily delete edges of...
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access control mechanism is identified as one of the major causes that facilitated IT sabotage. In this paper we propose a network access control meta model as per ISO/IEC security evaluation criteria Common Criteria to provide...
A utility tunnel is defined as an underground structure containing one or more utilities, permitting the installation, maintenance and removal of the systems without the necessity of making street cuts or excavations. These underground facilities contain all essential utilities serving large urban areas collected together in a tunnel; therefore they are an inviting target for sabotage or vandal...
Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instru...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید