Skip to content
Contact Us | Tel. +49 511 762 – 17715 | @: niederee[at]L3S.de
h2020mirror
  • Home
  • About
    • Collaborations and Synergies​
  • Work Plan
  • News
  • Consortium
  • Downloads
  • Publications
  • Contact
  • Toolkit
Menu Close
  • Home
  • About
    • Collaborations and Synergies​
  • Work Plan
  • News
  • Consortium
  • Downloads
  • Publications
  • Contact
  • Toolkit

Perception-derived Threats

  1. Home>
  2. Toolkit>
  3. Perception-derived Threats

Application of the perception model

  • Post published:June 13, 2022
  • Post category:Perception-derived Threats/Toolkit

In what concerns the model’s application in a threat analysis context, the…

Continue ReadingApplication of the perception model
Application of the perception model

Methodology for analysing perceptions

  • Post published:June 13, 2022
  • Post category:Perception-derived Threats/Toolkit

In order to successfully identify perception derived threats, one must understand which…

Continue ReadingMethodology for analysing perceptions
Methodology for analysing perceptions

Recent Posts

  • Threat analysis from open source information in the context of the MIRROR system
  • Application of the perception model
  • Methodology for analysing perceptions
  • The human rights implications checklist
  • Human rights implications checklist: assumptions

Recent Comments

    Archives

    • June 2022
    • May 2022
    • April 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • January 2021
    • November 2020
    • August 2020
    • April 2020
    • March 2020
    • November 2019
    • August 2019

    Categories

    • Automation
    • Border Security
    • Events
    • Human Rights
    • Media Usage
    • News
    • Perception-derived Threats
    • Publication
    • Social Media
    • Threat Analysis
    • Toolkit
    • Video

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Migration-Related Risks Caused by Misconceptions of Opportunities and Requirement

    MIRROR has received funding from the European Union’s Horizon 2020 research and innovation action program under grant agreement No 832921.
    Follow us:
    Linkedin Twitter

    © All rights reserved

    Imprint | Privacy Policy

    Manage Cookie Consent
    We use cookies to optimize our website and our service.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage vendors Read more about these purposes
    View preferences
    {title} {title} {title}