41 datasets found
  1. w

    Iraq Polling data

    • data.wu.ac.at
    • data.europa.eu
    csv, txt
    Updated Aug 12, 2013
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ministry of Defence (2013). Iraq Polling data [Dataset]. https://data.wu.ac.at/schema/data_gov_uk/NmY0YWJkNDgtOTEzYy00ODU0LTgxNGYtMzk1NjJjMjE1NjRj
    Explore at:
    txt, csvAvailable download formats
    Dataset updated
    Aug 12, 2013
    Dataset provided by
    Ministry of Defence
    License

    Open Government Licence 3.0http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/
    License information was derived automatically

    Area covered
    Iraq
    Description

    MOD is releasing polling data collected in Iraq between June 2005 and the end of 2006 in order to support decision making during Operation Telic, the UK military contribution to the international operation mounted in Iraq between 2003 and 2009. The data provides insight into opinions of citizens in twelve to sixteen cities in Iraq. MOD is releasing this data as part of the government's Open Data Strategy.

  2. nondata

    • figshare.com
    Updated May 31, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    vuslat nur sahin; Elif Sercen Nurcan (2023). nondata [Dataset]. http://doi.org/10.6084/m9.figshare.22014203.v3
    Explore at:
    Dataset updated
    May 31, 2023
    Dataset provided by
    figshare
    Authors
    vuslat nur sahin; Elif Sercen Nurcan
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    We survey the Indo-Pacific understanding of QUAD members using data taken from defence white papers or defence strategy reports from Australia, India, Japan, and the U.S. The data cover from the first mention of the Indo-Pacific to the last published one. In this scope, analyze Australia’s 2013, 2016 Defence White Papers, and 2020 Strategic Updates; India’s 2015-2016, 2016-2017, 2017-2018, 2018-2019, 2019-2020 Ministry of Defence’s Annual Reports; Japan’s 2018, 2019, 2020, 2021 and 2022 Defence of Japan Documents[1], and the U.S’, 2017 National Security Strategy, 2018 and 2022 National Defence Strategy Documents. We used a mixed method during the data collection.

    [1] References are not included in the calculation of the Japanese defence paper.

  3. Coastal Defence Strategy: Rivers Arun to Adur - Datasets - OPERANDUM

    • data-catalogue.operandum-project.eu
    Updated Nov 6, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    operandum-project.eu (2021). Coastal Defence Strategy: Rivers Arun to Adur - Datasets - OPERANDUM [Dataset]. https://data-catalogue.operandum-project.eu/dataset/coastal-defence-strategy-rivers-arun-to-adur
    Explore at:
    Dataset updated
    Nov 6, 2021
    Dataset provided by
    OPERANDUM project
    Description

    Coastal Defence Strategy: Rivers Arun to Adur. Adur & Worthing (GB)

  4. E

    National Security and Defence. English-Estonian parallel data

    • live.european-language-grid.eu
    tmx
    Updated Apr 12, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2024). National Security and Defence. English-Estonian parallel data [Dataset]. https://live.european-language-grid.eu/catalogue/corpus/3067
    Explore at:
    tmxAvailable download formats
    Dataset updated
    Apr 12, 2024
    License

    https://elrc-share.eu/terms/openUnderPSI.htmlhttps://elrc-share.eu/terms/openUnderPSI.html

    Description

    Content of the following documents • National Security Concept of Estonia • National Defence Strategy • Cyber Security Strategy processed and converted into an English-Estonian parallel corpus

  5. D

    Defence Cyber Security Market Report | Global Forecast From 2025 To 2033

    • dataintelo.com
    csv, pdf, pptx
    Updated Jan 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2025). Defence Cyber Security Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/global-defence-cyber-security-market
    Explore at:
    pptx, csv, pdfAvailable download formats
    Dataset updated
    Jan 7, 2025
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Defence Cyber Security Market Outlook



    The global defence cyber security market size was valued at approximately USD 10.2 billion in 2023 and is expected to reach around USD 18.5 billion by 2032, growing at a compound annual growth rate (CAGR) of 6.7% during the forecast period. The market is driven by several growth factors, including increased sophistication of cyber threats, the need for advanced security solutions, and substantial government investments in cyber security infrastructure.



    One of the primary growth factors for the defence cyber security market is the rising incidence of cyber-attacks targeting military and defence infrastructure. Cyber threats have evolved from simple malware to highly sophisticated, state-sponsored attacks aimed at crippling national security. The increasing frequency and complexity of these threats necessitate robust cyber security measures to protect sensitive data and critical systems. Governments and defence organizations are therefore investing heavily in advanced cyber security technologies and solutions to safeguard their operations.



    Another significant growth driver is the global escalation in defence budgets allocated towards cyber security. Countries worldwide are recognizing the strategic importance of cyber resilience in national defence. This recognition has led to the allocation of substantial resources towards developing and deploying cutting-edge cyber security solutions. With the growing dependency on digital infrastructure, the defence sector is increasingly vulnerable to cyber threats, prompting a surge in investments aimed at fortifying cyber defences.



    Technological advancements in artificial intelligence (AI) and machine learning (ML) also play a critical role in propelling the defence cyber security market. These technologies enable the development of intelligent security systems capable of predicting, identifying, and mitigating cyber threats in real-time. The integration of AI and ML into cyber security solutions enhances threat detection capabilities, thereby providing a proactive approach to cyber defense. The adoption of these technologies is expected to continue driving market growth over the forecast period.



    In the ever-evolving landscape of cyber threats, Proactive Cyber Defence has emerged as a crucial strategy for defence organizations. Unlike traditional reactive approaches, proactive cyber defence involves anticipating potential threats and implementing measures to prevent them before they occur. This approach leverages advanced technologies such as artificial intelligence and machine learning to predict and identify vulnerabilities, enabling organizations to bolster their security posture. By adopting proactive cyber defence strategies, defence entities can not only protect their sensitive data and critical systems but also enhance their resilience against sophisticated cyber-attacks. The shift towards a proactive stance is becoming increasingly important as cyber threats continue to grow in complexity and frequency, necessitating a forward-thinking approach to cyber security.



    Regionally, North America holds a dominant position in the defence cyber security market. The region's dominance can be attributed to significant government initiatives and substantial investments in cyber security. The presence of major cyber security companies and advanced technological infrastructure also contributes to the region's leading position. Meanwhile, the Asia Pacific region is anticipated to exhibit the highest growth rate during the forecast period, driven by increasing defence budgets and rapid technological adoption in countries like China and India.



    Component Analysis



    The defence cyber security market is segmented by component into solutions and services. Solutions encompass various cyber security tools and software designed to protect, detect, and counteract cyber threats. These solutions include firewalls, intrusion detection systems, antivirus software, and encryption tools. The solutions segment holds a significant share of the market due to the wide range of applications across different defence operations and the continuous evolution of cyber threats necessitating advanced security solutions.



    On the other hand, the services segment includes consulting, training, and managed security services. Consulting services assist defence organizations in assessing their cyber security posture, identifying vulnerabilities, and developing c

  6. G

    Application Strategy 2017

    • open.canada.ca
    html
    Updated Jul 15, 2019
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    National Defence (2019). Application Strategy 2017 [Dataset]. https://open.canada.ca/data/en/dataset/f0e43525-8c80-4a73-a526-70daa5a25eba
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Jul 15, 2019
    Dataset provided by
    National Defence
    License

    Open Government Licence - Canada 2.0https://open.canada.ca/en/open-government-licence-canada
    License information was derived automatically

    Time period covered
    Apr 1, 2017 - Mar 31, 2022
    Description

    The purpose of this strategy is to establish the vision and objectives for managing the Defence application portfolio as an enabler to Defence business and operational capabilities. This is a horizon 1 strategy intended to direct application related activities over the next five years.

  7. k

    Airbus Defence and Space-Strategy, SWOT and Corporate Finance Report

    • kenresearch.com
    pdf
    Updated Jan 15, 2017
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ken Research (2017). Airbus Defence and Space-Strategy, SWOT and Corporate Finance Report [Dataset]. https://www.kenresearch.com/industry-reports/airbus-defence-space-strategy
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Jan 15, 2017
    Dataset authored and provided by
    Ken Research
    License

    https://www.kenresearch.com/terms-and-conditionshttps://www.kenresearch.com/terms-and-conditions

    Description

    Airbus Defence and Space-Strategy, SWOT and Corporate Finance Report, is a source of comprehensive company data and information. The report covers the company's structure, operation, SWOT analysis, product and service offerings and corporate actions, providing a 360? view of the company. - Market Research | Ken Research

  8. d

    Data from: From resource to female defence: the impact of roosting ecology...

    • search.dataone.org
    • data.niaid.nih.gov
    • +1more
    Updated Apr 5, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Linus Günther; Marlena D. Lopez; Mirjam Knörnschild; Kyle Reid; Martina Nagy; Frieder Mayer (2025). From resource to female defence: the impact of roosting ecology on a bat's mating strategy [Dataset]. http://doi.org/10.5061/dryad.df878
    Explore at:
    Dataset updated
    Apr 5, 2025
    Dataset provided by
    Dryad Digital Repository
    Authors
    Linus Günther; Marlena D. Lopez; Mirjam Knörnschild; Kyle Reid; Martina Nagy; Frieder Mayer
    Time period covered
    Jan 1, 2016
    Description

    With their extraordinary species richness and diversity in ecological traits and social systems, bats are a promising taxon for testing socio-ecological hypotheses in order to get new insights into the evolution of animal social systems. Regarding its roosting habits, proboscis bats form an extreme by occupying sites which are usually completely exposed to daylight (e.g. tree trunks, vines or rocks). This is accompanied by morphological and behavioural adaptations to remain cryptic in exposed day roosts. With long-term behavioural observations and genetic parentage analyses of individually marked proboscis bats, we assessed its social dispersion and male mating strategy during day and night. Our results reveal nocturnal male territoriality—a strategy which most closely resembles a resource-defence polygyny that is frequent also in other tropical bats. Its contrasting clumped social dispersion during the day is likely to be the result of strong selection for crypsis in exposed roosts and...

  9. Data from: Context-dependent defences in turtle ants: resource defensibility...

    • zenodo.org
    • data.niaid.nih.gov
    • +1more
    csv
    Updated May 30, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Scott Powell; Matina Donaldson-Matasci; Augustus Woodrow-Tomizuka; Anna Dornhaus; Scott Powell; Matina Donaldson-Matasci; Augustus Woodrow-Tomizuka; Anna Dornhaus (2022). Data from: Context-dependent defences in turtle ants: resource defensibility and threat level induce dynamic shifts in soldier deployment [Dataset]. http://doi.org/10.5061/dryad.6j984
    Explore at:
    csvAvailable download formats
    Dataset updated
    May 30, 2022
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Scott Powell; Matina Donaldson-Matasci; Augustus Woodrow-Tomizuka; Anna Dornhaus; Scott Powell; Matina Donaldson-Matasci; Augustus Woodrow-Tomizuka; Anna Dornhaus
    License

    CC0 1.0 Universal Public Domain Dedicationhttps://creativecommons.org/publicdomain/zero/1.0/
    License information was derived automatically

    Description
    1. Induced defences involve the dynamic deployment of limited and specialized defensive resources across multiple locations, to maximize organismal defensive function and fitness. They have been studied intensively in plants and solitary animals, but the induced defences of complex animal societies are poorly understood by comparison, despite the coordinated defensive actions of these taxa. 2. Here, we ask whether the level of environmental danger induces shifts in the deployment of limited and morphologically specialized soldiers across multiple nests in colonies of the turtle ant Cephalotes rohweri. Specifically, we test whether less defensible nests induce greater soldier deployment, and whether elevated enemy threat induced further increases in deployment, or reduced deployment consistent with a risk-limiting strategy. 3. We used colony-collection data to provide natural ecological context to our experiments, a field experiment to address how nest-entrance defensibility and soldier number impact defensive performance, and laboratory experiments to test whether differences in nest defensibility and threat level induce dynamic shifts in soldier deployment to new nests. 4. Less defensible nests were lost rapidly in our field experiment, irrespective of soldier number, but soldier deployment significantly increased survivorship of more defensible nests. Concordantly, less defensible nests induced the deployment of more soldiers per nest under low threat in laboratory experiments. Nevertheless, high-threat conditions revealed a risk-limiting soldier deployment strategy: with more danger, the number of soldiers per nest was significantly reduced in less defensible nests, as was the overall number of new soldier-defended nests. Total deployment to new nests was also consistently lower under high threat, dropping from 40% to 30% across colonies. 5. Induced soldier-based defences in turtle ants are therefore context-dependent, and dynamically scaled back at multiple levels when the environment is more dangerous. This dynamic, risk-limiting strategy is in strong contrast to stable patterns of soldier production in ants, and to typical task-allocation dynamics in members of the worker caste. Moreover, these findings establish that the evolution of specialized defensive agents can be coupled with sophisticated and inducible deployment strategies in complex social taxa, as we see for organisms at other levels of biological complexity.
  10. f

    Data from: Más allá de la intervención militar: Ideas para un futuro marco...

    • figshare.com
    pdf
    Updated Feb 24, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Miguel Peco (2016). Más allá de la intervención militar: Ideas para un futuro marco de la Defensa en España [Dataset]. http://doi.org/10.6084/m9.figshare.1614858.v5
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Feb 24, 2016
    Dataset provided by
    figshare
    Authors
    Miguel Peco
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Area covered
    España
    Description

    Ponencia presentada en el II Congreso ADESYD. Madrid, 24 de noviembre de 2015.

  11. G

    National Defence Appearance before the House Committee on Public Accounts –...

    • open.canada.ca
    • ouvert.canada.ca
    html
    Updated Sep 24, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    National Defence (2021). National Defence Appearance before the House Committee on Public Accounts – 25 May 2021 [Dataset]. https://open.canada.ca/data/en/dataset/81de56e7-b1a1-4e74-93d1-fa3fee929352
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Sep 24, 2021
    Dataset provided by
    National Defence
    License

    Open Government Licence - Canada 2.0https://open.canada.ca/en/open-government-licence-canada
    License information was derived automatically

    Time period covered
    May 25, 2021
    Description

    National Defence Appearance before the House Committee on Public Accounts (PACP) for their study of the Office of the Auditor General’s Report 2, National Shipbuilding Strategy (NSS), 25 May 2021

  12. l

    ESRC Net Zero Militaries (NETZMIL) Metadata Record

    • repository.lboro.ac.uk
    Updated Mar 13, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Duncan Depledge; Tamiris Santos (2025). ESRC Net Zero Militaries (NETZMIL) Metadata Record [Dataset]. http://doi.org/10.17028/rd.lboro.25046165.v1
    Explore at:
    Dataset updated
    Mar 13, 2025
    Dataset provided by
    Loughborough University
    Authors
    Duncan Depledge; Tamiris Santos
    License

    Attribution-NonCommercial 4.0 (CC BY-NC 4.0)https://creativecommons.org/licenses/by-nc/4.0/
    License information was derived automatically

    Description

    This file lists the data collected for “Net Zero Militaries (NETZMIL): Retaining operational effectiveness in a low-carbon world”, funded by the ESRC and led by Dr Duncan Depledge.The research focuses on assessing the actual and potential impact of the UK Government’s Net Zero ambitions on future military operations.The data was collected by two researchers, Dr Duncan Depledge and Dr Tamiris Santos.The file is organised by Work Package (WP) with all data collected for each work package listed in a separate tab.© The Author(s)

  13. n

    Data from: Female-biased dispersal in a bat with a female-defence mating...

    • data.niaid.nih.gov
    • datadryad.org
    zip
    Updated Dec 13, 2012
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Martina Nagy; Linus Günther; Mirjam Knörnschild; Frieder Mayer (2012). Female-biased dispersal in a bat with a female-defence mating strategy [Dataset]. http://doi.org/10.5061/dryad.nv5r5
    Explore at:
    zipAvailable download formats
    Dataset updated
    Dec 13, 2012
    Dataset provided by
    Universität Ulm
    Museum für Naturkunde
    Authors
    Martina Nagy; Linus Günther; Mirjam Knörnschild; Frieder Mayer
    License

    https://spdx.org/licenses/CC0-1.0.htmlhttps://spdx.org/licenses/CC0-1.0.html

    Area covered
    Costa Rica
    Description

    The ultimate causes for predominant male-biased dispersal (MBD) in mammals and female-biased dispersal (FBD) in birds are still subject to much debate. Studying exceptions to general patterns of dispersal, for example, FBD in mammals, provides a valuable opportunity to test the validity of proposed evolutionary pressures. We used long-term behavioural and genetic data on individually banded Proboscis bats (Rhynchonycteris naso) to show that this species is one of the rare mammalian exceptions with FBD. Our results suggest that all females disperse from their natal colonies prior to first reproduction and that a substantial proportion of males are philopatric and reproduce in their natal colonies, although male immigration has also been detected. The age of females at first conception falls below the tenure of males, suggesting that females disperse to avoid father–daughter inbreeding. Male philopatry in this species is intriguing because Proboscis bats do not share the usual mammalian correlates (i.e. resource-defence polygyny and/or kin cooperation) of male philopatry. They have a mating strategy based on female defence, where local mate competition between male kin is supposedly severe and should prevent the evolution of male philopatry. However, in contrast to immigrant males, philopatric males may profit from acquaintance with the natal foraging grounds and may be able to attain dominance easier and/or earlier in life. Our results on Proboscis bats lent additional support to the importance of inbreeding avoidance in shaping sex-biased dispersal patterns and suggest that resource defence by males or kin cooperation cannot fully explain the evolution of male philopatry in mammals.

  14. n

    Variation in defence strategies in the metal hyperaccumulator Noccaea...

    • data.niaid.nih.gov
    • search.dataone.org
    • +1more
    zip
    Updated Dec 19, 2018
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Helen N. Fones; Gail M. Preston; J. Andrew C. Smith (2018). Variation in defence strategies in the metal hyperaccumulator Noccaea caerulescens is indicative of synergies and trade-offs between forms of defence [Dataset]. http://doi.org/10.5061/dryad.7tv06
    Explore at:
    zipAvailable download formats
    Dataset updated
    Dec 19, 2018
    Dataset provided by
    University of Oxford
    University of Exeter
    Authors
    Helen N. Fones; Gail M. Preston; J. Andrew C. Smith
    License

    https://spdx.org/licenses/CC0-1.0.htmlhttps://spdx.org/licenses/CC0-1.0.html

    Description

    The metal hyperaccumulator, N. caerulescens, uses metals as a defence against pathogens. Earlier work has suggested both trade-offs and synergies between metals and inducible defences. Different populations of N. caerulescens vary in metal accumulation. Here, we test the hypothesis that this produces different outcomes in trade-offs between defences. We compare zinc concentrations, glucosinolate concentrations, and inducible stress responses, including ROS and cell death, in four N. caerulescens populations, and relate these to the growth of the plant pathogen Pseudomonas syringae, its zinc tolerance mutants, and Pseudomonas pathogens isolated from a natural population of N. caerulescens. The populations display strikingly different defences. Where defences are successful, pathogens are limited primarily by metals, cell death, or organic defences, with evidence of both trade-offs and synergies between these, depending upon population. In addition, we find evidence that Pseudomonas pathogens may evolve to overcome any of these strategies, indicating that the arms race continues. These data indicate that defensive enhancement, joint effects and trade-offs between forms of defence are all plausible explanations for the evolution of metal-based defences, with factors including metal availability and pressures from metal-tolerant pathogens likely shaping the current strategy of each ecotype.

  15. d

    Data from: Unpredictable movement as an anti-predator strategy

    • search.dataone.org
    • datadryad.org
    Updated Apr 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Graham Richardson; Patrick Dickinson; Oliver H.P. Burman; Thomas W. Pike; Oliver H. P. Burman (2025). Unpredictable movement as an anti-predator strategy [Dataset]. http://doi.org/10.5061/dryad.9h95737
    Explore at:
    Dataset updated
    Apr 7, 2025
    Dataset provided by
    Dryad Digital Repository
    Authors
    Graham Richardson; Patrick Dickinson; Oliver H.P. Burman; Thomas W. Pike; Oliver H. P. Burman
    Time period covered
    Jul 23, 2018
    Description

    Prey animals have evolved a wide variety of behaviours to combat the threat of predation, and these have been generally well studied. However, one of the most common and taxonomically widespread antipredator behaviours of all has, remarkably, received almost no experimental attention: so-called ‘protean’ behaviour. This is behaviour which is sufficiently unpredictable to prevent a predator anticipating in detail the future position or actions of its prey. In this study, we used human ‘predators’ participating in 3D virtual reality simulations to test how protean (i.e. unpredictable) variation in prey movement affects participants’ ability to visually target them as they move (a key determinant of successful predation). We found that targeting accuracy was significantly predicted by prey movement path complexity, although, surprisingly, there was little evidence that high levels of unpredictability in the underlying movement rules equated directly to decreased predator performance. Inste...

  16. d

    Data from: Deer grazing drove an assemblage-level evolution of plant...

    • search.dataone.org
    • data.niaid.nih.gov
    Updated Jul 29, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Daiki Takahashi; Yoshihisa Suyama; Kietaro Fukushima; Hiroaki Setoguchi; Shota Sakaguchi (2025). Deer grazing drove an assemblage-level evolution of plant dwarfism in an insular system [Dataset]. http://doi.org/10.5061/dryad.t1g1jwt7c
    Explore at:
    Dataset updated
    Jul 29, 2025
    Dataset provided by
    Dryad Digital Repository
    Authors
    Daiki Takahashi; Yoshihisa Suyama; Kietaro Fukushima; Hiroaki Setoguchi; Shota Sakaguchi
    Time period covered
    Jan 1, 2023
    Description

    Plant dwarfism, a syndrome characterised by a significant reduction in plant height and organ size, is a widely observed pattern of stress-tolerant life-form evolution that results from local adaptation to harsh environmental conditions. The drivers of assemblage-level dwarfism have primarily been attributed to abiotic factors, such as low temperature, aridity, poor soil fertility, or frequent fires. While biotic factors such as grazing pressure from herbivores can contribute to the establishment of plant dwarfism, these factors have rarely been tested at assemblage levels. Focusing on a dwarf plant assemblage comprising over 80 taxa on a small continental island in Japan with a high deer density, we hypothesised that historical deer grazing could also be a factor contributing to the large-scale convergent evolution of dwarfism. To test this hypothesis, we measured the size of 1,908 individual plants of 40 taxa-pairs, comprising both palatable and unpalatable pairs from the island and t..., , , # Deer grazing drove an assemblage-level evolution of plant dwarfism in an insular system

    Raw morphological data, leaf N concentration, and input file for LM analysis and genetic analyses are included. We also show the BioProject ID of raw read data of MIG-seq analysis deposited in NCBI.

    Description of the Data and file structure

    Morphodata_All_20240326.csv

    Raw morphological data
    • Taxapair: Name of the taxa pair
    • Yakushima_alpine_or_counterpart: Binary population code (1: Yakushima alpine taxa, 0: counterpart taxa)
    • Lat: latitude
    • Lon: Longitude
    • Alt: Altitude (m)
    • Taxon name: Scientific name of taxon
    • SpecimenSheetNO: Specimen sheet number or voucher number
    • Locality: Name of collection sites
    • IndividualID: Plant individual ID in the sheet
    • Leafsize: Measured length of leaf (mm)
    • Plantheight: Measured length of plant height (mm)
    • IndexTrait: Used traits for statistical analyses of leaf size or plant height
    • Preference: deer pre...
  17. Defense IT Spending Market Analysis, Size, and Forecast 2025-2029: North...

    • technavio.com
    pdf
    Updated Dec 19, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Technavio (2024). Defense IT Spending Market Analysis, Size, and Forecast 2025-2029: North America (Mexico), Europe (France, Germany, Italy, Spain, and UK), Middle East and Africa (UAE), APAC (Australia, China, India, Japan, and South Korea), South America (Brazil), and Rest of World (ROW) [Dataset]. https://www.technavio.com/report/defense-it-spending-market-industry-analysis
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Dec 19, 2024
    Dataset provided by
    TechNavio
    Authors
    Technavio
    Time period covered
    2025 - 2029
    Area covered
    Germany, Mexico, United Kingdom
    Description

    Snapshot img

    Defense IT Spending Market Size 2025-2029

    The defense it spending market size is forecast to increase by USD 26.01 billion, at a CAGR of 4.7% between 2024 and 2029.

    The market is driven by the development of autonomous systems and the adoption of artificial intelligence (AI) and machine learning (ML) technologies. These advancements are transforming defense operations by enabling automated decision-making, enhanced situational awareness, and improved efficiency. The integration of AI and ML in defense IT systems is expected to lead to significant cost savings and operational improvements. However, the market also faces challenges related to digital sovereignty. As defense organizations increasingly rely on IT systems and cloud services, concerns over data security and privacy are becoming more prominent. The need to ensure data security and maintain control over critical information is a significant challenge for defense IT spending. Additionally, the complexity of integrating new technologies into existing systems and the high cost of implementation can hinder market growth. Companies seeking to capitalize on market opportunities must address these challenges by investing in robust cybersecurity measures, focusing on interoperability, and collaborating with technology partners to drive innovation and efficiency.

    What will be the Size of the Defense IT Spending Market during the forecast period?

    Explore in-depth regional segment analysis with market size data - historical 2019-2023 and forecasts 2025-2029 - in the full report.
    Request Free SampleThe market continues to evolve, with dynamic market activities shaping the landscape across various sectors. Compliance frameworks, such as NIST Cybersecurity Framework, play a crucial role in ensuring security and regulatory adherence. IoT security, machine learning, and malware analysis are integral components of modern defense IT systems, safeguarding against emerging threats. Data recovery and disaster recovery solutions are essential for business continuity, while data backup and big data security protect valuable information. Network security measures, including network virtualization and antivirus software, fortify digital infrastructure against unauthorized access. Risk management practices, like threat modeling and endpoint security, help organizations proactively address vulnerabilities. Zero trust security, artificial intelligence, and database security add layers of protection, while digital certificates and security awareness training enhance overall security posture. Cloud computing, supply chain security, and incident response strategies further strengthen defense IT systems. Penetration testing, red teaming, and vulnerability assessments are ongoing activities that ensure the effectiveness of security measures. Multi-factor authentication, secure software development, and phishing simulations are crucial elements of a comprehensive security strategy. In this ever-changing environment, organizations must remain vigilant and adapt to the latest threats and trends, ensuring their IT systems are secure and compliant.

    How is this Defense IT Spending Industry segmented?

    The defense it spending industry research report provides comprehensive data (region-wise segment analysis), with forecasts and estimates in 'USD billion' for the period 2025-2029, as well as historical data from 2019-2023 for the following segments. TypeServiceSoftwareHardwareApplicationCyber securityIT infrastructureLogistic and asset managementOthersForceDefense forcesCivilian forcesDeployment TypeOn-PremisesCloud-BasedGeographyNorth AmericaUSMexicoEuropeFranceGermanyItalySpainUKMiddle East and AfricaUAEAPACAustraliaChinaIndiaJapanSouth KoreaSouth AmericaBrazilRest of World (ROW)

    By Type Insights

    The service segment is estimated to witness significant growth during the forecast period.The market encompasses various service segments that cater to the unique needs of defense organizations globally. Consulting Services play a crucial role, providing military firms with strategic guidance on digital transformation, cybersecurity, data analytics, and technology adoption. Systems Integration services ensure seamless communication and interoperability by integrating diverse defense IT systems, tools, and software. Network Security safeguards defense networks from external threats, while Data Recovery and Backup services ensure business continuity. Risk Management and Compliance Frameworks help organizations mitigate risks and adhere to regulatory requirements. Application Security and Endpoint Security protect against vulnerabilities in applications and endpoints. Threat Intelligence and Malware Analysis enable proactive threat detection and response. Data Encryption, Digital Certificates, and Secure Software Development ensure data confidentiality and integrity. Cloud Computing and Network Virtualization offer

  18. c

    Data Security in Chatbots for the Insurance Industry: A case study of a...

    • esango.cput.ac.za
    xlsx
    Updated Jan 30, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zilungile Bokolo (2024). Data Security in Chatbots for the Insurance Industry: A case study of a South African Insurance Company [Dataset]. http://doi.org/10.25381/cput.24440926.v1
    Explore at:
    xlsxAvailable download formats
    Dataset updated
    Jan 30, 2024
    Dataset provided by
    Cape Peninsula University of Technology
    Authors
    Zilungile Bokolo
    License

    Attribution-NonCommercial-ShareAlike 4.0 (CC BY-NC-SA 4.0)https://creativecommons.org/licenses/by-nc-sa/4.0/
    License information was derived automatically

    Description

    215296273/2021/12As chatbots become more popular, the insurance industry has adopted their use. Although chatbot has been used a lot in customer relationship management (CRM), there is a lack of data security and privacy control strategies for data in chatbots. During data exchange, the client's data may be compromised through computer security breaches, thus exposing the client to possible fraud and theft. The lack of data security and privacy control strategies for data in chatbots has become a major security concern in financial services institutions. Chatbots access a lot of company and client information and that makes the data contained in chatbots to be the target of hackers which can cause harm to companies and customers.This study explored how data security in chatbots in South African insurance organisations can be attained. To realise the aim of this study, five objectives were formulated as follows, to: 1) identify the potential use cases of chatbots for CRM in a South African insurance organisation; 2) identify the challenges of securing data in a chatbot in a South African insurance organization; 3) determine the security goals, threats, and vulnerabilities associated with the use of chatbots in a South African insurance organisation; 4) develop a threat model for the security and privacy of data in chatbots for a South African insurance organization; and 5) evaluate the threat model for security and privacy of data in the chatbots for a South African insurance organisation.The mixed-methods research methodology was adopted for the study. A case study research strategy that involved data collection from a South African insurance company was used. Semi-structured interviews were conducted with participants that were purposively selected. Also, the STRIDE modelling approach was used to collect data on the security threats and vulnerabilities that pertain to each insurance use case with for each component of STRIDE — Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. Based on the outcome of the STRIDE modelling, a threat model for data security in chatbots for the South African insurance industry was developed using the Attack Defence tool. The threat model reveals the data security threats in chatbots, and how they can be mitigated. An evaluation of the threat model was conducted using security experts who assessed the quality of the threat model. They also provided qualitative feedback on the threat model. The evaluation of the threat model adopted the System Usability Scale (SUS) questionnaire which is a standard questionnaire to evaluate a system or product. The SUS score for each evaluator was calculated, and a mean SUS score was obtained.From the expert evaluation, the developed threat model for data security in insurance chatbots obtained a mean SUS of 79.4 which corresponds to a grade B rating, which is a good rating based on the rules for the SUS scores. From the qualitative feedback, the security experts observed that the threat model can help to improve overall security and protect against potential attacks, and also proactively identify and mitigate potential threats in chatbots.The insurance industry and academia will benefit from this study. Insurance organisations can implement security using the proposed threat model for the security of data in their business chatbots. Also, this study contributes new information to the body of knowledge since this is the first study to develop a threat model for data security in

  19. u

    Application Strategy 2017 - Catalogue - Canadian Urban Data Catalogue (CUDC)...

    • data.urbandatacentre.ca
    • beta.data.urbandatacentre.ca
    Updated Oct 1, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2024). Application Strategy 2017 - Catalogue - Canadian Urban Data Catalogue (CUDC) [Dataset]. https://data.urbandatacentre.ca/dataset/gov-canada-f0e43525-8c80-4a73-a526-70daa5a25eba
    Explore at:
    Dataset updated
    Oct 1, 2024
    License

    Open Government Licence - Canada 2.0https://open.canada.ca/en/open-government-licence-canada
    License information was derived automatically

    Area covered
    Canada
    Description

    The purpose of this strategy is to establish the vision and objectives for managing the Defence application portfolio as an enabler to Defence business and operational capabilities. This is a horizon 1 strategy intended to direct application related activities over the next five years.

  20. u

    Briefing Package for the Standing Committee on National Defence on...

    • data.urbandatacentre.ca
    • beta.data.urbandatacentre.ca
    Updated Oct 1, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2024). Briefing Package for the Standing Committee on National Defence on Procurement Practice and Military Readiness - Catalogue - Canadian Urban Data Catalogue (CUDC) [Dataset]. https://data.urbandatacentre.ca/dataset/gov-canada-f4679ac7-4bb6-4cd1-b8f1-05db4d34340d
    Explore at:
    Dataset updated
    Oct 1, 2024
    License

    Open Government Licence - Canada 2.0https://open.canada.ca/en/open-government-licence-canada
    License information was derived automatically

    Area covered
    Canada
    Description

    Briefing Package for the Standing Committee on National Defence on Procurement Practice and Military Readiness 2018 AG Report 3—Canada's Fighter Force—National Defence 2020 AG Report 3—Supplying the Canadian Armed Forces—National Defence 2021 AG Report 2—National Shipbuilding Strategy 2022 AG Report 6—Arctic Waters Surveillance

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Ministry of Defence (2013). Iraq Polling data [Dataset]. https://data.wu.ac.at/schema/data_gov_uk/NmY0YWJkNDgtOTEzYy00ODU0LTgxNGYtMzk1NjJjMjE1NjRj

Iraq Polling data

Explore at:
8 scholarly articles cite this dataset (View in Google Scholar)
txt, csvAvailable download formats
Dataset updated
Aug 12, 2013
Dataset provided by
Ministry of Defence
License

Open Government Licence 3.0http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/
License information was derived automatically

Area covered
Iraq
Description

MOD is releasing polling data collected in Iraq between June 2005 and the end of 2006 in order to support decision making during Operation Telic, the UK military contribution to the international operation mounted in Iraq between 2003 and 2009. The data provides insight into opinions of citizens in twelve to sixteen cities in Iraq. MOD is releasing this data as part of the government's Open Data Strategy.

Search
Clear search
Close search
Google apps
Main menu