Sample records for target threat assessment

  1. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  2. Threat Assessment and Targeted Violence at Institutions of Higher Education: Implications for Policy and Practice Including Unique Considerations for Community Colleges

    ERIC Educational Resources Information Center

    Bennett, Laura; Bates, Michael

    2015-01-01

    This article provides an overview of the research on targeted violence, including campus violence, and the implications for policy and practice at institutions of higher education. Unique challenges of threat assessment in the community college setting are explored, and an overview of an effective threat assessment policy and team at William…

  3. A combined emitter threat assessment method based on ICW-RCM

    NASA Astrophysics Data System (ADS)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  4. Stochastic model for threat assessment in multi-sensor defense system

    NASA Astrophysics Data System (ADS)

    Wang, Yongcheng; Wang, Hongfei; Jiang, Changsheng

    2007-11-01

    This paper puts forward a stochastic model for target detecting and tracking in multi-sensor defense systems and applies the Lanchester differential equations to threat assessment in combat. The two different modes of targets tracking and their respective Lanchester differential equations are analyzed and established. By use of these equations, we could briefly estimate the loss of each combat side and accordingly get the threat estimation results, given the situation analysis is accomplished.

  5. Development, Evaluation, and Future Directions of the Virginia Student Threat Assessment Guidelines

    ERIC Educational Resources Information Center

    Cornell, Dewey; Allen, Korrie

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed in response to studies of school shootings conducted by the U.S. Federal Bureau of Investigation, U.S. Secret Service, and U.S. Department of Education that recommended schools should adopt a threat assessment approach to prevent targeted violence. This article reviews the…

  6. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to this subpart must ensure that each of the following undergoes a security threat assessment or a comparable...

  7. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  8. Toward a Framework for Conducting Ecoregional Threats Assessments

    Treesearch

    Jamison Ervin; Jeffrey Parrish

    2006-01-01

    Assessing threats to biodiversity is widely recognized as a critical step in conservation planning. While there have been recent advances in understanding how to assess threats at a site level, there has been relatively little consensus on how threats can be meaningfully assessed at an ecoregional scale. Drawing from numerous threat assessment studies, this paper...

  9. Student threat assessment as a standard school safety practice: Results from a statewide implementation study.

    PubMed

    Cornell, Dewey; Maeng, Jennifer L; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick

    2018-06-01

    Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat assessment teams distinguish serious from nonserious threats. The sample consisted of 1,865 threat assessment cases reported by 785 elementary, middle, and high schools. Students ranged from pre-K to Grade 12, including 74.4% male, 34.6% receiving special education services, 51.2% White, 30.2% Black, 6.8% Hispanic, and 2.7% Asian. Survey data were collected from school-based teams to measure student demographics, threat characteristics, and assessment results. Logistic regression indicated that threat assessment teams were more likely to identify a threat as serious if it was made by a student above the elementary grades (odds ratio 0.57; 95% lower and upper bound 0.42-0.78), a student receiving special education services (1.27; 1.00-1.60), involved battery (1.61; 1.20-2.15), homicide (1.40; 1.07-1.82), or weapon possession (4.41; 2.80-6.96), or targeted an administrator (3.55; 1.73-7.30). Student race and gender were not significantly associated with a serious threat determination. The odds ratio that a student would attempt to carry out a threat classified as serious was 12.48 (5.15-30.22). These results provide new information on the nature and prevalence of threats in schools using threat assessment that can guide further work to develop this emerging school safety practice. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  10. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart. (a...

  11. Keeping Schools Safe through Threat Assessment

    ERIC Educational Resources Information Center

    Barton, Rhonda

    2008-01-01

    This article illustrates how effective a threat assessment program like the Mid-Valley Student Threat Assessment (STAT) program can be in dealing with violent and threatening students. STAT is a a regional system that draws together resources from schools, mental health agencies, law enforcement bureaus, and other youth-serving organizations in…

  12. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... threat; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... SECURITY: GENERAL RULES Security Threat Assessments § 1540.205 Procedures for security threat assessment...

  13. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  14. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  15. The role of warning behaviors in threat assessment: an exploration and suggested typology.

    PubMed

    Reid Meloy, J; Hoffmann, Jens; Guldimann, Angela; James, David

    2012-01-01

    The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors. Previous research on risk factors associated with such warning behaviors is reviewed, and examples of each warning behavior from various intended violence cases are presented, including public figure assassination, adolescent and adult mass murder, corporate celebrity stalking, and both domestic and foreign acts of terrorism. Practical applications and future research into warning behaviors are suggested. Copyright © 2011 John Wiley & Sons, Ltd.

  16. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    .... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...

  17. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...

  18. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  19. External Threat Risk Assessment Algorithm (ExTRAA)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Powell, Troy C.

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind ofmore » r isk posed in a given situation using the radar plot method.« less

  20. Airborne Particulate Threat Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. governmentmore » agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing

  1. An Expert System For Multispectral Threat Assessment And Response

    NASA Astrophysics Data System (ADS)

    Steinberg, Alan N.

    1987-05-01

    A concept has been defined for an automatic system to manage the self-defense of a combat aircraft. Distinctive new features of this concept include: a. the flexible prioritization of tasks and coordinated use of sensor, countermeasures, flight systems and weapons assets by means of an automated planning function; b. the integration of state-of-the-art data fusion algorithms with event prediction processing; c. the use of advanced Artificial Intelligence tools to emulate the decision processes of tactical EW experts. Threat Assessment functions (a) estimate threat identity, lethality and intent on the basis of multi-spectral sensor data, and (b) predict the time to critical events in threat engagements (e.g., target acquisition, tracking, weapon launch, impact). Response Management functions (a) select candidate responses to reported threat situations; (b) estimate the effects of candidate actions on survival; and (c) coordinate the assignment of sensors, weapons and countermeasures with the flight plan. The system employs Finite State Models to represent current engagements and to predict subsequent events. Each state in a model is associated with a set of observable features, allowing interpretation of sensor data and adaptive use of sensor assets. Defined conditions on state transitions allow prediction of times to critical future states and are used in planning self-defensive responses, which are designed either to impede a particular state transition or to force a transition to a lower threat state.

  2. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... prevent completion of the threat assessment). (5) Gender. (6) Country of citizenship. (7) If the applicant... subpart remains valid for five years from the date that TSA issues a Determination of No Security Threat...

  3. Eastern forest environmental threat assessment center

    Treesearch

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  4. A Model for Situation and Threat Assessment

    DTIC Science & Technology

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  5. Shape-based human detection for threat assessment

    NASA Astrophysics Data System (ADS)

    Lee, Dah-Jye; Zhan, Pengcheng; Thomas, Aaron; Schoenberger, Robert B.

    2004-07-01

    Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when monitoring open environments. Any moving objects including animals can falsely trigger the security system. Other security systems that utilize video equipment require human interpretation of the scene in order to make real-time threat assessment. Shape-based human detection technique has been developed for accurate early threat assessments for open and remote environment. Potential threats are isolated from the static background scene using differential motion analysis and contours of the intruding objects are extracted for shape analysis. Contour points are simplified by removing redundant points connecting short and straight line segments and preserving only those with shape significance. Contours are represented in tangent space for comparison with shapes stored in database. Power cepstrum technique has been developed to search for the best matched contour in database and to distinguish a human from other objects from different viewing angles and distances.

  6. The concept of leakage in threat assessment.

    PubMed

    Meloy, J Reid; O'Toole, Mary Ellen

    2011-01-01

    Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings. Copyright © 2011 John Wiley & Sons, Ltd.

  7. Brain activation underlying threat detection to targets of different races.

    PubMed

    Senholzi, Keith B; Depue, Brendan E; Correll, Joshua; Banich, Marie T; Ito, Tiffany A

    2015-01-01

    The current study examined blood oxygen level-dependent signal underlying racial differences in threat detection. During functional magnetic resonance imaging, participants determined whether pictures of Black or White individuals held weapons. They were instructed to make shoot responses when the picture showed armed individuals but don't shoot responses to unarmed individuals, with the cost of not shooting armed individuals being greater than that of shooting unarmed individuals. Participants were faster to shoot armed Blacks than Whites, but faster in making don't shoot responses to unarmed Whites than Blacks. Brain activity differed to armed versus unarmed targets depending on target race, suggesting different mechanisms underlying threat versus safety decisions. Anterior cingulate cortex was preferentially engaged for unarmed Whites than Blacks. Parietal and visual cortical regions exhibited greater activity for armed Blacks than Whites. Seed-based functional connectivity of the amygdala revealed greater coherence with parietal and visual cortices for armed Blacks than Whites. Furthermore, greater implicit Black-danger associations were associated with increased amygdala activation to armed Blacks, compared to armed Whites. Our results suggest that different neural mechanisms may underlie racial differences in responses to armed versus unarmed targets.

  8. The Practice of Campus-Based Threat Assessment: An Overview

    ERIC Educational Resources Information Center

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  9. Assessing Student Threats

    ERIC Educational Resources Information Center

    Brunner, Judy; Emmendorfer, Beth; Lewis, Dennis

    2009-01-01

    For administrators at the secondary level, not many school days go according to plan or script, but few things are more disruptive than a student threat of violence. When threats are made--or if there is a rumor of a serious student threat--it can take both time and resources to investigate, interview, and analyze multiple pieces of information in…

  10. 49 CFR 1572.9 - Applicant information required for HME security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... threat assessment. 1572.9 Section 1572.9 Transportation Other Regulations Relating to Transportation... TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.9 Applicant information required for HME security threat assessment. An applicant must supply the information...

  11. The wilderness threats matrix: A framework for assessing impacts

    Treesearch

    David N. Cole

    1994-01-01

    A comprehensive framework for assessing threats to wilderness is described. The framework is represented as a matrix of potential threats and attributes of wilderness character. Cells in the matrix represent the impacts of threats on each attribute. Potential applications of the matrix are described. An application of the matrix to the wildernesses in the Forest...

  12. Near Earth Asteroid Characterization for Threat Assessment

    NASA Technical Reports Server (NTRS)

    Dotson, Jessie; Mathias, Donovan; Wheeler, Lorien; Wooden, Diane; Bryson, Kathryn; Ostrowski, Daniel

    2017-01-01

    Physical characteristics of NEAs are an essential input to modeling behavior during atmospheric entry and to assess the risk of impact but determining these properties requires a non-trivial investment of time and resources. The characteristics relevant to these models include size, density, strength and ablation coefficient. Some of these characteristics cannot be directly measured, but rather must be inferred from related measurements of asteroids and/or meteorites. Furthermore, for the majority of NEAs, only the basic measurements exist so often properties must be inferred from statistics of the population of more completely characterized objects. The Asteroid Threat Assessment Project at NASA Ames Research Center has developed a probabilistic asteroid impact risk (PAIR) model in order to assess the risk of asteroid impact. Our PAIR model and its use to develop probability distributions of impact risk are discussed in other contributions to PDC 2017 (e.g., Mathias et al.). Here we utilize PAIR to investigate which NEA characteristics are important for assessing the impact threat by investigating how changes in these characteristics alter the damage predicted by PAIR. We will also provide an assessment of the current state of knowledge of the NEA characteristics of importance for asteroid threat assessment. The relative importance of different properties as identified using PAIR will be combined with our assessment of the current state of knowledge to identify potential high impact investigations. In addition, we will discuss an ongoing effort to collate the existing measurements of NEA properties of interest to the planetary defense community into a readily accessible database.

  13. Reactivity to unpredictable threat as a treatment target for fear-based anxiety disorders.

    PubMed

    Gorka, S M; Lieberman, L; Klumpp, H; Kinney, K L; Kennedy, A E; Ajilore, O; Francis, J; Duffecy, J; Craske, M G; Nathan, J; Langenecker, S; Shankman, S A; Phan, K L

    2017-10-01

    Heightened reactivity to unpredictable threat (U-threat) is a core individual difference factor underlying fear-based psychopathology. Little is known, however, about whether reactivity to U-threat is a stable marker of fear-based psychopathology or if it is malleable to treatment. The aim of the current study was to address this question by examining differences in reactivity to U-threat within patients before and after 12-weeks of selective serotonin reuptake inhibitors (SSRIs) or cognitive-behavioral therapy (CBT). Participants included patients with principal fear (n = 22) and distress/misery disorders (n = 29), and a group of healthy controls (n = 21) assessed 12-weeks apart. A well-validated threat-of-shock task was used to probe reactivity to predictable (P-) and U-threat and startle eyeblink magnitude was recorded as an index of defensive responding. Across both assessments, individuals with fear-based disorders displayed greater startle magnitude to U-threat relative to healthy controls and distress/misery patients (who did not differ). From pre- to post-treatment, startle magnitude during U-threat decreased only within the fear patients who received CBT. Moreover, within fear patients, the magnitude of decline in startle to U-threat correlated with the magnitude of decline in fear symptoms. For the healthy controls, startle to U-threat across the two time points was highly reliable and stable. Together, these results indicate that startle to U-threat characterizes fear disorder patients and is malleable to treatment with CBT but not SSRIs within fear patients. Startle to U-threat may therefore reflect an objective, psychophysiological indicator of fear disorder status and CBT treatment response.

  14. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    PubMed

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  15. Towards a Threat Assessment Framework for Ecosystem Services.

    PubMed

    Maron, Martine; Mitchell, Matthew G E; Runting, Rebecca K; Rhodes, Jonathan R; Mace, Georgina M; Keith, David A; Watson, James E M

    2017-04-01

    How can we tell if the ecosystem services upon which we rely are at risk of being lost, potentially permanently? Ecosystem services underpin human well-being, but we lack a consistent approach for categorizing the extent to which they are threatened. We present an assessment framework for assessing the degree to which the adequate and sustainable provision of a given ecosystem service is threatened. Our framework combines information on the states and trends of both ecosystem service supply and demand, with reference to two critical thresholds: demand exceeding supply and ecosystem service 'extinction'. This framework can provide a basis for global, national, and regional assessments of threat to ecosystem services, and accompany existing assessments of threat to species and ecosystems. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Assessing Local and Surrounding Threats to the Protected Area Network in a Biodiversity Hotspot: The Hengduan Mountains of Southwest China.

    PubMed

    Ye, Xin; Liu, Guohua; Li, Zongshan; Wang, Hao; Zeng, Yuan

    2015-01-01

    Protected areas (PAs) not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitatively assessing local and surrounding threats to different types of PAs with gradient buffers, and to main ecoregions in the Hengduan Mountain Hotspot of southwest China. Our findings show that national protected areas (NPAs) have lower and significantly lower threat values (p<0.05) than provincial protected areas (PPAs) and other protected areas (OPAs), respectively, which indicates that NPAs are lands with a lower threat level and higher levels of protection and management. PAs have clear edge effects, as the proportion of areas with low threat levels decline dramatically in the 5-kilometer buffers just outside the PAs. However, NPAs suffered greater declines (58.3%) than PPAs (34.8%) and OPAs (33.4%) in the 5-kilometer buffers. Moreover, a significant positive correlation was found between the size of PAs and the proportion of areas with low threat levels that they contained in both PAs and PA buffers (p<0.01). To control or mitigate current threats at the regional scale, PA managers often require quantitative information related to threat intensities and spatial distribution. The threat assessment in the Hengduan Mountain Hotspot will be useful to policy makers and managers in their efforts to establish effective plans and target-oriented management strategies.

  17. Assessing Local and Surrounding Threats to the Protected Area Network in a Biodiversity Hotspot: The Hengduan Mountains of Southwest China

    PubMed Central

    Ye, Xin; Liu, Guohua; Li, Zongshan; Wang, Hao; Zeng, Yuan

    2015-01-01

    Protected areas (PAs) not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitatively assessing local and surrounding threats to different types of PAs with gradient buffers, and to main ecoregions in the Hengduan Mountain Hotspot of southwest China. Our findings show that national protected areas (NPAs) have lower and significantly lower threat values (p<0.05) than provincial protected areas (PPAs) and other protected areas (OPAs), respectively, which indicates that NPAs are lands with a lower threat level and higher levels of protection and management. PAs have clear edge effects, as the proportion of areas with low threat levels decline dramatically in the 5-kilometer buffers just outside the PAs. However, NPAs suffered greater declines (58.3%) than PPAs (34.8%) and OPAs (33.4%) in the 5-kilometer buffers. Moreover, a significant positive correlation was found between the size of PAs and the proportion of areas with low threat levels that they contained in both PAs and PA buffers (p<0.01). To control or mitigate current threats at the regional scale, PA managers often require quantitative information related to threat intensities and spatial distribution. The threat assessment in the Hengduan Mountain Hotspot will be useful to policy makers and managers in their efforts to establish effective plans and target-oriented management strategies. PMID:26382763

  18. Validity threats: overcoming interference with proposed interpretations of assessment data.

    PubMed

    Downing, Steven M; Haladyna, Thomas M

    2004-03-01

    Factors that interfere with the ability to interpret assessment scores or ratings in the proposed manner threaten validity. To be interpreted in a meaningful manner, all assessments in medical education require sound, scientific evidence of validity. The purpose of this essay is to discuss 2 major threats to validity: construct under-representation (CU) and construct-irrelevant variance (CIV). Examples of each type of threat for written, performance and clinical performance examinations are provided. The CU threat to validity refers to undersampling the content domain. Using too few items, cases or clinical performance observations to adequately generalise to the domain represents CU. Variables that systematically (rather than randomly) interfere with the ability to meaningfully interpret scores or ratings represent CIV. Issues such as flawed test items written at inappropriate reading levels or statistically biased questions represent CIV in written tests. For performance examinations, such as standardised patient examinations, flawed cases or cases that are too difficult for student ability contribute CIV to the assessment. For clinical performance data, systematic rater error, such as halo or central tendency error, represents CIV. The term face validity is rejected as representative of any type of legitimate validity evidence, although the fact that the appearance of the assessment may be an important characteristic other than validity is acknowledged. There are multiple threats to validity in all types of assessment in medical education. Methods to eliminate or control validity threats are suggested.

  19. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    PubMed Central

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2013-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232

  20. Threat evaluation for impact assessment in situation analysis systems

    NASA Astrophysics Data System (ADS)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  1. Assessing Student Threats: A Handbook for Implementing the Salem-Keizer System

    ERIC Educational Resources Information Center

    Van Dreal, John

    2011-01-01

    "Assessing Student Threats: A Handbook for Implementing the Salem-Keizer System" is a manual for the implementation of a threat assessment system that follows the recommendations of the Safe Schools Initiative and the prescriptive outline provided by the FBI. Written from an educator's perspective with contributing authors from law…

  2. A model of service and training: threat assessment on a community college campus.

    PubMed

    Mrad, David F; Hanigan, Antoni J S; Bateman, Joyce R

    2015-02-01

    Forensic psychological assessment for targeted violence is a growing area of practice and community need. These threat assessments are particularly challenging on community college campuses given the broad range of students and the limited internal resources. A collaborative model of partnership between a community college and the training clinic of a doctoral program in clinical psychology has been developed and implemented. The model provides needed service to the community college and rich training experiences for doctoral students in psychology. Implementation of similar partnerships in other settings may be limited by the training and experience of doctoral faculty and the openness of behavioral intervention teams to external participants.

  3. School Behavioral Threat Assessment and Management

    ERIC Educational Resources Information Center

    Louvar Reeves, Melissa A.; Brock, Stephen E.

    2018-01-01

    While schools are safer today than in years past, one act of school violence is one too many. Recent reports have conveyed the importance of schools developing and implementing protocols and procedures to prevent or mitigate school violence. To assist with this task, this article addresses behavioral threat assessment and management (BTAM) in the…

  4. The Role of Threat Assessment and Management in College Counseling: How's That Net Working?

    ERIC Educational Resources Information Center

    Pollard, Jeffrey W.; Flynn, Christopher; Eells, Gregory T.

    2015-01-01

    The authors respond to Goodwin's (2014) "Threat Assessment: Are We Using the Wrong Nets?" and use that article as a springboard to discuss various aspects of the threat assessment and management process. We find that Goodwin misses critical elements of the threat assessment and management process, conflates the process with two types of…

  5. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security threat assessment. 1540.203 Section 1540.203 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES...

  6. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  7. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    PubMed

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  8. A Developmental Perspective on the Virginia Student Threat Assessment Guidelines

    ERIC Educational Resources Information Center

    Cornell, Dewey G.

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed to help multidisciplinary school-based teams use a decision tree to evaluate student threats and take appropriate preventive action. A main goal of this approach is to allow school-based teams to recognize and respond to the developmental complexities of children and adolescents…

  9. Assessing Threats of School Violence: Implications for Counselors

    ERIC Educational Resources Information Center

    Daniels, Jeffrey A.

    2002-01-01

    The author describes important considerations when assessing students' threats made at schools. In a recent article, M. Reddy et al. (2001) presented 4 approaches to assessing the risk of school violence. They submitted important issues and problems with 3 commonly used approaches and suggested a 4th approach as an alternative. Implications for…

  10. Debris and shrapnel assessments for National Ignition Facility targets and diagnostics

    NASA Astrophysics Data System (ADS)

    Masters, N. D.; Fisher, A.; Kalantar, D.; Stölken, J.; Smith, C.; Vignes, R.; Burns, S.; Doeppner, T.; Kritcher, A.; Park, H.-S.

    2016-05-01

    High-energy laser experiments at the National Ignition Facility (NIF) can create debris and shrapnel capable of damaging laser optics and diagnostic instruments. The size, composition and location of target components and sacrificial shielding (e.g., disposable debris shields, or diagnostic filters) and the protection they provide is constrained by many factors, including: chamber and diagnostic geometries, experimental goals and material considerations. An assessment of the generation, nature and velocity of shrapnel and debris and their potential threats is necessary prior to fielding targets or diagnostics. These assessments may influence target and shielding design, filter configurations and diagnostic selection. This paper will outline the approach used to manage the debris and shrapnel risk associated with NIF targets and diagnostics and present some aspects of two such cases: the Material Strength Rayleigh- Taylor campaign and the Mono Angle Crystal Spectrometer (MACS).

  11. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  12. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    PubMed Central

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226

  13. Security threat assessment of an Internet security system using attack tree and vague sets.

    PubMed

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  14. Assessing fear and anxiety in humans using the threat of predictable and unpredictable aversive events (the NPU-threat test)

    PubMed Central

    Schmitz, Anja; Grillon, Christian

    2012-01-01

    The threat of predictable and unpredictable aversive events was developed to assess short-duration (fear) and long-duration (anxiety) aversive states in humans. A typical experiment consists of three conditions: a safe condition (neutral (N)), during which participants are safe from aversive stimuli, and two threat conditions—one in which aversive events are administered predictably (P) (i.e., signaled by a threat cue), and one in which aversive stimuli are administered unpredictably (U). During the so-called NPU -threat test, ongoing change in aversive states is measured with the startle reflex. The NPU -threat test has been validated in pharmacological and clinical studies and can be implemented in children and adults. Similar procedures have been applied in animal models, making the NPU -threat test an ideal tool for translational research. The procedure is relatively short (35 min), simple to implement and generates consistent results with large effect sizes. PMID:22362158

  15. Student Threat Assessment as a Standard School Safety Practice: Results from a Statewide Implementation Study

    ERIC Educational Resources Information Center

    Cornell, Dewey; Maeng, Jennifer L.; Burnette, Anna Grace; Jia, Yuane; Huang, Francis; Konold, Timothy; Datta, Pooja; Malone, Marisa; Meyer, Patrick

    2018-01-01

    Threat assessment has been widely endorsed as a school safety practice, but there is little research on its implementation. In 2013, Virginia became the first state to mandate student threat assessment in its public schools. The purpose of this study was to examine the statewide implementation of threat assessment and to identify how threat…

  16. 49 CFR 1548.15 - Access to cargo: Security threat assessments for individuals having unescorted access to cargo.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for... SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.15 Access to cargo: Security threat... must successfully complete a security threat assessment or comparable security threat assessment...

  17. Threat Assessment of Small Near-Earth Objects

    NASA Astrophysics Data System (ADS)

    Ryan, E.; Ryan, W.

    2010-09-01

    Researchers at the Magdalena Ridge Observatory’s (MRO) 2.4-meter telescope facility are in their third year of a program to derive physical characterization information on some of the smallest (less than 200 meters in diameter) objects in the Near-Earth Object (NEO) population. Tiny comets and asteroids are being discovered by survey programs on a routine basis, so targets available for study have been abundant. Our primary objective is to derive rotation rates for these objects, and to place the results in context with previous data to enhance our understanding of asteroid impact physics and better address the threat from NEOs having Earth-crossing orbits. Rotation rate can be used to infer internal structure, which is a physical property important to assessing the energy needed for object disruption or other forms of hazard mitigation. Since the existing database of rotational data derived from lightcurves of objects in this small size regime is sparse, collection of additional observational data is beneficial. Acquiring more knowledge about the physical nature of NEOs not only contributes to general scientific pursuits, but is important to planetary defense.

  18. Assessing the Threat from Electromagnetic Pulse (EMP). Volume 1: Executive Report

    DTIC Science & Technology

    2017-07-31

    high -altitude electromagnetic pulse threat waveform and its ground pattern. This need arises because of the effect of very low frequency electric...system Equipment to Failure ..................................... 15 Intelligence Community Assessment of the EMP Threat...17 APPENDIX A Legislation Re-establishing the Commission ..................................................... 19 APPENDIX B High

  19. 49 CFR 1548.16 - Security threat assessments for each proprietor, general partner, officer, director, and certain...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for each proprietor..., or owner of the entity must successfully complete a security threat assessment or comparable security... owner of the entity has successfully completed a Security Threat Assessment under part 1540, subpart C...

  20. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    PubMed Central

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  1. Protected areas in tropical Africa: assessing threats and conservation activities.

    PubMed

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  2. Threat Based Risk Assessment for Enterprise Networks

    DTIC Science & Technology

    2016-02-15

    served as the program chair of the Research in Attacks, Intrusions , and Defenses workshop; the Neural Information Processing Systems (NIPS) annual...Threat- Based Risk Assessment for Enterprise Networks Richard P. Lippmann and James F. Riordan Protecting enterprise networks requires...include aids for the hearing impaired, speech recognition, pattern classification, neural networks , and cybersecurity. He has taught three courses

  3. Eight habitats, 38 threats and 55 experts: Assessing ecological risk in a multi-use marine region

    PubMed Central

    Jones, Alice R.; Deveney, Marty R.; Ward, Tim M.; Gillanders, Bronwyn M.

    2017-01-01

    Identifying the relative risk human activities pose to a habitat, and the ecosystem services they provide, can guide management prioritisation and resource allocation. Using a combination of expert elicitation to assess the probable effect of a threat and existing data to assess the level of threat exposure, we conducted a risk assessment for 38 human-mediated threats to eight marine habitats (totalling 304 threat-habitat combinations) in Spencer Gulf, Australia. We developed a score-based survey to collate expert opinion and assess the relative effect of each threat to each habitat, as well as a novel and independent measure of knowledge-based uncertainty. Fifty-five experts representing multiple sectors and institutions participated in the study, with 6 to 15 survey responses per habitat (n = 81 surveys). We identified key threats specific to each habitat; overall, climate change threats received the highest risk rankings, with nutrient discharge identified as a key local-scale stressor. Invasive species and most fishing-related threats, which are commonly identified as major threats to the marine environment, were ranked as low-tier threats to Spencer Gulf, emphasising the importance of regionally-relevant assessments. Further, we identified critical knowledge gaps and quantified uncertainty scores for each risk. Our approach will facilitate prioritisation of resource allocation in a region of increasing social, economic and environmental importance, and can be applied to marine regions where empirical data are lacking. PMID:28489912

  4. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    PubMed

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  5. Assessing the Potential Threat Landscape of a Proposed Reintroduction Site for Carnivores

    PubMed Central

    Page, Samantha K.; Parker, Daniel M.; Peinke, Dean M.; Davies-Mostert, Harriet T.

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent’s first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid. PMID:25822468

  6. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  7. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  8. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for...: Security threat assessments for cargo personnel in the United States. This section applies in the United...— (1) Each individual must successfully complete a security threat assessment or comparable security...

  9. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Procedures for security threat assessment. 1540.205 Section 1540.205 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION...

  10. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Fees for security threat assessment. 1540.209 Section 1540.209 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY...

  11. Narcissism and other-derogation in the absence of ego threat.

    PubMed

    Park, Sun W; Colvin, C Randall

    2015-06-01

    The relation between narcissism and other-derogation has been examined primarily in the context of ego threat. In three studies, we investigated whether narcissistic individuals derogate others in the absence of ego threat. In Study 1, 79 judges watched four videotaped dyadic interactions and rated the personality of the same four people. In Study 2, 66 judges rated the personality of a friend. In Study 3, 72 judges considered the average Northeastern University student and rated the personality of this hypothetical person. Across the three studies, targets' personality characteristics were described on the 100-item California Adult Q-Sort (CAQ; Block, 2008). Judges' ratings of targets were compared to a CAQ prototype of the optimally adjusted person to assess target-derogation. Judges' narcissism and other-derogation were positively related in Studies 1 and 2. Narcissism positively predicted and self-esteem negatively predicted target-derogation after controlling for each other in Study 3. Narcissistic individuals derogate others more than non-narcissistic individuals regardless of whether ego threat is present or absent. © 2014 Wiley Periodicals, Inc.

  12. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... threat assessments for cargo personnel in the United States. 1544.228 Section 1544.228 Transportation... COMMERCIAL OPERATORS Operations § 1544.228 Access to cargo and cargo screening: Security threat assessments... paragraph (b) of this section— (1) Each individual must successfully complete a security threat assessment...

  13. Threat Assessment of Hazardous Materials Transportation in Aircraft Cargo Compartments.

    DOT National Transportation Integrated Search

    1999-12-01

    The Volpe National Transportation Systems Center of the U.S. Department of Transportation's (DOT's) Research and Special Programs Administration (RSPA) has conducted a quantitative threat assessment for RSPA's Office of Hazardous Materials Safety (OH...

  14. Law Enforcement Use of Threat Assessments to Predict Violence

    ERIC Educational Resources Information Center

    Wood, Tracey Michelle

    2016-01-01

    The purpose of this qualitative, descriptive multiple case study was to explore what process, policies and procedures, or set of empirically supported norms governed law enforcement officers in a selected county in the southwest region of the United States when threat assessments were conducted on potentially violent subjects threatening mass…

  15. Attentional bias to threat in the general population is contingent on target competition, not on attentional control settings.

    PubMed

    Wirth, Benedikt Emanuel; Wentura, Dirk

    2018-04-01

    Dot-probe studies usually find an attentional bias towards threatening stimuli only in anxious participants. Here, we investigated under what conditions such a bias occurs in unselected samples. According to contingent-capture theory, an irrelevant cue only captures attention if it matches an attentional control setting. Therefore, we first tested the hypothesis that an attentional control setting tuned to threat must be activated in (non-anxious) individuals. In Experiment 1, we used a dot-probe task with a manipulation of attentional control settings ('threat' - set vs. control set). Surprisingly, we found an (anxiety-independent) attentional bias to angry faces that was not moderated by attentional control settings. Since we presented two stimuli (i.e., a target and a distractor) on the target screen in Experiment 1 (a necessity to realise the test of contingent capture), but most dot-probe studies only employ a single target, we conducted Experiment 2 to test the hypothesis that attentional bias in the general population is contingent on target competition. Participants performed a dot-probe task, involving presentation of a stand-alone target or a target competing with a distractor. We found an (anxiety-independent) attentional bias towards angry faces in the latter but not the former condition. This suggests that attentional bias towards angry faces in unselected samples is not contingent on attentional control settings but on target competition.

  16. The Legal Side of Campus Threat Assessment and Management: What Student Counselors Need to Know

    ERIC Educational Resources Information Center

    Nolan, Jeffrey J.; Moncure, Thomas M., Jr.

    2012-01-01

    This article identifies what student mental health professionals need to know about legal issues of relevance to threat assessment and management. The article summarizes the common law duties and the common law and statutory standards of care that are likely to apply to the work of college and university threat assessment and management teams. The…

  17. Cyber Threat Assessment of Uplink and Commanding System for Mission Operation

    NASA Technical Reports Server (NTRS)

    Ko, Adans Y.; Tan, Kymie M. C.; Cilloniz-Bicchi, Ferner; Faris, Grant

    2014-01-01

    Most of today's Mission Operations Systems (MOS) rely on Ground Data System (GDS) segment to mitigate cyber security risks. Unfortunately, IT security design is done separately from the design of GDS' mission operational capabilities. This incoherent practice leaves many security vulnerabilities in the system without any notice. This paper describes a new way to system engineering MOS, to include cyber threat risk assessments throughout the MOS development cycle, without this, it is impossible to design a dependable and reliable MOS to meet today's rapid changing cyber threat environment.

  18. Algae Assessment of Threats to Freshwater Ecosystems: Trends, Challenges, and Opportunities

    EPA Science Inventory

    As human populations continue to grow, the demands for freshwater resources and ecosystem services are increasing along with concomitant threats to their quality and sustainability. Algal communities in streams, lakes, and wetlands offer powerful insight into assessing and managi...

  19. Assessment of pilot workload with the introduction of an airborne threat-alert system

    NASA Technical Reports Server (NTRS)

    Battiste, Vernol; Bortolussi, Michael R.

    1989-01-01

    Simulated line operations were used to assess the value of the TCAS on the pilot's ability to avoid a collision and to determine the effects of various display configurations and information contents on the flight-crew performance and workload. The crew flew a Phase II Link/Boeing 727 simulator in a simulated ATC environment. Four levels of collision avoidance information were evaluated using the following TCAS display formats: no TCAS information, TCAS information with no traffic display information, TCAS information with threat-activated traffic display information, and TCAS information with a full-time traffic display of threat information. It was found that the use of a threat-activated TCAS display significantly reduced the first officers' workload was significantly reduced by the threat-activated TCAS display, as were the workloads of the captain and the second officer.

  20. Conservation Status and Threat Assessments for North American Crop Wild Relatives

    USDA-ARS?s Scientific Manuscript database

    Conservation status and threat assessments evaluate species’ relative risks of extinction globally, regionally, nationally, or locally, and estimate the degree to which populations of species are already safeguarded in existing conservation systems, with the aim of exposing the critical gaps in curr...

  1. Near Earth Asteroid Characteristics for Asteroid Threat Assessment

    NASA Technical Reports Server (NTRS)

    Dotson, Jessie

    2015-01-01

    Information about the physical characteristics of Near Earth Asteroids (NEAs) is needed to model behavior during atmospheric entry, to assess the risk of an impact, and to model possible mitigation techniques. The intrinsic properties of interest to entry and mitigation modelers, however, rarely are directly measureable. Instead we measure other properties and infer the intrinsic physical properties, so determining the complete set of characteristics of interest is far from straightforward. In addition, for the majority of NEAs, only the basic measurements exist so often properties must be inferred from statistics of the population of more completely characterized objects. We will provide an assessment of the current state of knowledge about the physical characteristics of importance to asteroid threat assessment. In addition, an ongoing effort to collate NEA characteristics into a readily accessible database for use by the planetary defense community will be discussed.

  2. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    PubMed

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  3. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. PMID:23736227

  4. Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode, and Target Cuing on Vigilance

    ERIC Educational Resources Information Center

    Parasuraman, Raja; de Visser, Ewart; Clarke, Ellen; McGarry, W. Ryan; Hussey, Elizabeth; Shaw, Tyler; Thompson, James C.

    2009-01-01

    Three experiments examined the vigilance performance of participants watching videos depicting intentional actions of an individual's hand reaching for and grasping an object--involving transporting or using either a gun or a hairdryer--in order to detect infrequent threat-related actions. Participants indicated detection of target actions either…

  5. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    PubMed

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  6. Insider Threat Assessment: Model, Analysis and Tool

    NASA Astrophysics Data System (ADS)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  7. Maturation of the Asteroid Threat Assessment Project

    NASA Technical Reports Server (NTRS)

    Arnold, J. O..; Burkhard, C. D.

    2017-01-01

    As described at IPPW 12 [1], NASA initiated a new research activity focused on Planetary Defense (PD) on October 1, 2014. The overarching function of the Asteroid Threat Assessment Project (ATAP) is to provide capabilities to assess impact damage of any Near-Earth Object (NEO) that could inflict on the Earth. The activity includes four interrelated efforts: Initial Conditions (at the atmospheric entry interface); Entry Modeling (energy deposition in the atmosphere); Hazards (on the surface including winds, over pressures, thermal exposures, craters, tsunami and earthquakes) and Risk (physics-based). This paper outlines progress by ATAP and highlights achievements that are complimentary to activities of interest to the International Planetary Probe community. The ATAPs work is sponsored by NASAs Planetary Defense Coordination Office (PDCO), a part of the agency's Science Mission Directorate [1] Arnold, J. O., et. al., Overview of a New NASA Activity Focused on Planetary Defense, IPPW 12 Cologne Germany, June 15-19. 2015.

  8. Resilience, Vulnerability and Residual Threat: An Assessment from Indian Sundarban

    NASA Astrophysics Data System (ADS)

    Ghosh, T.

    2016-12-01

    The estuarine islands within Indian Sundarban are extremely vulnerable due to climate change, erosion, flooding and increasing population pressure. Around 4.6 million people are living under constant threat of climatic shocks, affecting their farm based economy and dependency on forest resources for their livelihood. This paper attempts to focus on the dynamics of system's resilience in the backdrop of higher level of vulnerability. Globally the assessment of island vulnerability is generally more focused towards the climate change impacts, rather than taking into account other determining drivers with proper weightage. Three estuarine islands namely Sagar, Ghoramara and Mousani at the western part of Indian Sundarban Delta (ISD) have been chosen for this study to derive the indicator based scoring method using the household survey data from twenty seven (27) sampled `Mouza' (lowest administrative boundary; village) with cluster random sampling. Vulnerability and resilience of these islands have been calculated using the indicators like housing condition, electrification, population density, accretion, adult secondary education level, percentage of people `Below Poverty Line' (BPL) based on per capita income. Residual threats for these islands have been obtained by subtracting the score of resilience and vulnerability of the system. Result suggests that all these islands are in less resilient condition to combat the negative impact of the influencing factors. Sapkhali, Ghoramara, Bankimnagar, Shibpur and Baliara are becoming sensitive from excess residual threats. This study is an initiation for identifying the thrust areas need to address with effective policy adaptation, necessary to minimize the existing vulnerable conditions in these islands. Key words: Vulnerability, Resilience, Residual threat, Indian Sundarban

  9. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    PubMed Central

    Pennington, Charlotte R.; McCann, Joseph J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females’ gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group’s ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females’ gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group’s gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat. PMID:29444126

  10. Riverine threat indices to assess watershed condition and identify primary management capacity of agriculture natural resource management agencies.

    PubMed

    Fore, Jeffrey D; Sowa, Scott P; Galat, David L; Annis, Gust M; Diamond, David D; Rewa, Charles

    2014-03-01

    Managers can improve conservation of lotic systems over large geographies if they have tools to assess total watershed conditions for individual stream segments and can identify segments where conservation practices are most likely to be successful (i.e., primary management capacity). The goal of this research was to develop a suite of threat indices to help agriculture resource management agencies select and prioritize watersheds across Missouri River basin in which to implement agriculture conservation practices. We quantified watershed percentages or densities of 17 threat metrics that represent major sources of ecological stress to stream communities into five threat indices: agriculture, urban, point-source pollution, infrastructure, and all non-agriculture threats. We identified stream segments where agriculture management agencies had primary management capacity. Agriculture watershed condition differed by ecoregion and considerable local variation was observed among stream segments in ecoregions of high agriculture threats. Stream segments with high non-agriculture threats were most concentrated near urban areas, but showed high local variability. 60 % of stream segments in the basin were classified as under U.S. Department of Agriculture's Natural Resources Conservation Service (NRCS) primary management capacity and most segments were in regions of high agricultural threats. NRCS primary management capacity was locally variable which highlights the importance of assessing total watershed condition for multiple threats. Our threat indices can be used by agriculture resource management agencies to prioritize conservation actions and investments based on: (a) relative severity of all threats, (b) relative severity of agricultural threats, and (c) and degree of primary management capacity.

  11. How Stereotype Threat Affects Healthy Older Adults' Performance on Clinical Assessments of Cognitive Decline: The Key Role of Regulatory Fit.

    PubMed

    Barber, Sarah J; Mather, Mara; Gatz, Margaret

    2015-11-01

    Stereotype threat can impair older adults' performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments' reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat's negative effects. By using a loss-avoidance frame, stereotype threat's negative effects can be attenuated or even eliminated. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  12. Stereotype Threat in Classroom Settings: The Interactive Effect of Domain Identification, Task Difficulty and Stereotype Threat on Female Students' Maths Performance

    ERIC Educational Resources Information Center

    Keller, Johannes

    2007-01-01

    Background: Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths…

  13. A Randomized Controlled Study of the Virginia Student Threat Assessment Guidelines in Kindergarten through Grade 12

    ERIC Educational Resources Information Center

    Cornell, Dewey G.; Allen, Korrie; Fan, Xitao

    2012-01-01

    This randomized controlled study examined disciplinary outcomes for 201 students who made threats of violence at school. The students attended 40 schools randomly assigned to use the Virginia Student Threat Assessment Guidelines or follow a business-as-usual disciplinary approach in a control group. Logistic regression analyses found, after…

  14. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  15. Vigilant attention to threat, sleep patterns, and anxiety in peripubertal youth.

    PubMed

    Ricketts, Emily J; Price, Rebecca B; Siegle, Greg J; Silk, Jennifer S; Forbes, Erika E; Ladouceur, Cecile D; Harvey, Allison G; Ryan, Neal D; Dahl, Ronald E; McMakin, Dana L

    2018-05-02

    Vigilant attention to threat is commonly observed in anxiety, undergoes developmental changes in early adolescence, and has been proposed to interfere with sleep initiation and maintenance. We present one of the first studies to use objective measures to examine associations between vigilant attention to threat and difficulties initiating and maintaining sleep in an early adolescent anxious sample. We also explore the moderating role of development (age, puberty) and sex. Participants were 66 peripubertal youth (ages 9-14) with a primary anxiety disorder and 24 healthy control subjects. A dot-probe task was used to assess attentional bias to fearful relative to neutral face stimuli. Eye-tracking indexed selective attentional bias to threat, and reaction time bias indexed action readiness to threat. Sleep was assessed via actigraphy (e.g. sleep onset delay, wake after sleep onset, etc.), parent report (Children's Sleep Habits Questionnaire), and child report (Sleep Self-Report). The Pediatric Anxiety Rating Scale assessed anxiety severity. Eye-tracking initial threat fixation bias (β = .33, p = .001) and threat dwell time bias (β = .22, p = .041) were positively associated with sleep onset latency. Reaction time bias was positively associated with wake after sleep onset (β = .24, p = .026) and parent-reported sleep disturbance (β = .25, p = .019). Anxiety (severity, diagnosis) was not associated with these outcomes. Sex (β = -.32, p = .036) moderated the relation between initial threat fixation bias and sleep onset latency, with a positive association for males (p = .005), but not for females (p = .289). Age and pubertal status did not moderate effects. Vigilant attention to threat is related to longer sleep onset and reduced sleep maintenance. These associations are not stronger in early adolescents with anxiety. Implications for early intervention or prevention that targets vigilant attention to threat to impact sleep disturbance, and

  16. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  17. A vulnerability assessment of 300 species in Florida: threats from sea level rise, land use, and climate change.

    PubMed

    Reece, Joshua Steven; Noss, Reed F; Oetting, Jon; Hoctor, Tom; Volk, Michael

    2013-01-01

    Species face many threats, including accelerated climate change, sea level rise, and conversion and degradation of habitat from human land uses. Vulnerability assessments and prioritization protocols have been proposed to assess these threats, often in combination with information such as species rarity; ecological, evolutionary or economic value; and likelihood of success. Nevertheless, few vulnerability assessments or prioritization protocols simultaneously account for multiple threats or conservation values. We applied a novel vulnerability assessment tool, the Standardized Index of Vulnerability and Value, to assess the conservation priority of 300 species of plants and animals in Florida given projections of climate change, human land-use patterns, and sea level rise by the year 2100. We account for multiple sources of uncertainty and prioritize species under five different systems of value, ranging from a primary emphasis on vulnerability to threats to an emphasis on metrics of conservation value such as phylogenetic distinctiveness. Our results reveal remarkable consistency in the prioritization of species across different conservation value systems. Species of high priority include the Miami blue butterfly (Cyclargus thomasi bethunebakeri), Key tree cactus (Pilosocereus robinii), Florida duskywing butterfly (Ephyriades brunnea floridensis), and Key deer (Odocoileus virginianus clavium). We also identify sources of uncertainty and the types of life history information consistently missing across taxonomic groups. This study characterizes the vulnerabilities to major threats of a broad swath of Florida's biodiversity and provides a system for prioritizing conservation efforts that is quantitative, flexible, and free from hidden value judgments.

  18. A Vulnerability Assessment of 300 Species in Florida: Threats from Sea Level Rise, Land Use, and Climate Change

    PubMed Central

    Reece, Joshua Steven; Noss, Reed F.; Oetting, Jon; Hoctor, Tom; Volk, Michael

    2013-01-01

    Species face many threats, including accelerated climate change, sea level rise, and conversion and degradation of habitat from human land uses. Vulnerability assessments and prioritization protocols have been proposed to assess these threats, often in combination with information such as species rarity; ecological, evolutionary or economic value; and likelihood of success. Nevertheless, few vulnerability assessments or prioritization protocols simultaneously account for multiple threats or conservation values. We applied a novel vulnerability assessment tool, the Standardized Index of Vulnerability and Value, to assess the conservation priority of 300 species of plants and animals in Florida given projections of climate change, human land-use patterns, and sea level rise by the year 2100. We account for multiple sources of uncertainty and prioritize species under five different systems of value, ranging from a primary emphasis on vulnerability to threats to an emphasis on metrics of conservation value such as phylogenetic distinctiveness. Our results reveal remarkable consistency in the prioritization of species across different conservation value systems. Species of high priority include the Miami blue butterfly (Cyclargus thomasi bethunebakeri), Key tree cactus (Pilosocereus robinii), Florida duskywing butterfly (Ephyriades brunnea floridensis), and Key deer (Odocoileus virginianus clavium). We also identify sources of uncertainty and the types of life history information consistently missing across taxonomic groups. This study characterizes the vulnerabilities to major threats of a broad swath of Florida’s biodiversity and provides a system for prioritizing conservation efforts that is quantitative, flexible, and free from hidden value judgments. PMID:24260447

  19. Data fusion approach to threat assessment for radar resources management

    NASA Astrophysics Data System (ADS)

    Komorniczak, Wojciech; Pietrasinski, Jerzy; Solaiman, Basel

    2002-03-01

    The paper deals with the problem of the multifunction radar resources management. The problem consists of target/tasks ranking and tasks scheduling. The paper is focused on the target ranking, with the data fusion approach. The data from the radar (object's velocity, range, altitude, direction etc.), IFF system (Identification Friend or Foe) and ESM system (Electronic Support Measures - information concerning threat's electro - magnetic activities) is used to decide of the importance assignment for each detected target. The main problem consists of the multiplicity of various types of the input information. The information from the radar is of the probabilistic or ambiguous imperfection type and the IFF information is of evidential type. To take the advantage of these information sources the advanced data fusion system is necessary. The system should deal with the following situations: fusion of the evidential and fuzzy information, fusion of the evidential information and a'priori information. The paper describes the system which fuses the fuzzy and the evidential information without previous change to the same type of information. It is also described the proposal of using of the dynamic fuzzy qualifiers. The paper shows the results of the preliminary system's tests.

  20. Cognitive appraisals of stereotype threat.

    PubMed

    Berjot, S; Roland-Levy, C; Girault-Lidvan, N

    2011-04-01

    Using the cognitive appraisal conceptualisation of the transactional model of stress, the goal was to assess how victims of stereotype threat respond to this situation in terms of primary appraisals (threat/challenge) and to investigate whether those appraisals may mediate the relation between stereotype threat and performance. Results show that, while participants from North Africa living in France did appraise the situation more as a threat and less as a challenge, only challenge appraisal mediated between stereotype threat and performance.

  1. A Retrospective Study of School Safety Conditions in High Schools Using the Virginia Threat Assessment Guidelines versus Alternative Approaches

    ERIC Educational Resources Information Center

    Cornell, Dewey; Sheras, Peter; Gregory, Anne; Fan, Xitao

    2009-01-01

    Threat assessment has been widely recommended as a violence prevention approach for schools, but there are few empirical studies of its use. This nonexperimental study of 280 Virginia public high schools compared 95 high schools using the Virginia threat assessment guidelines (Cornell & Sheras, 2006), 131 following other (i.e., locally…

  2. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  3. 49 CFR 1572.9 - Applicant information required for HME security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    .... (13) Passport number. This information is voluntary and may expedite the adjudication process for... information is voluntary and may expedite the adjudication process for applicants who are U.S. citizens born... adjudication process for applicants who have completed a TSA security threat assessment. (16) Whether the...

  4. Heterogeneous Defensive Naval Weapon Assignment To Swarming Threats In Real Time

    DTIC Science & Technology

    2016-03-01

    threat Damage potential of target t if it hits the ship [integer from 0 to 3] _ ttarget phit Probability that target t hits the ship [probability...secondary weapon systems on target t [integer] _ tsec phit Probability that secondary weapon systems launched from target t hit the ship...pairing. These parameters are calculated as follows: 310 _ _t t tpriority target threat target phit = × × (3.1) 3_ 10 _ _t t tsec priority sec

  5. Threat assessment and sensor management in a modular architecture

    NASA Astrophysics Data System (ADS)

    Page, S. F.; Oldfield, J. P.; Islip, S.; Benfold, B.; Brandon, R.; Thomas, P. A.; Stubbins, D. J.

    2016-10-01

    Many existing asset/area protection systems, for example those deployed to protect critical national infrastructure, are comprised of multiple sensors such as EO/IR, radar, and Perimeter Intrusion Detection Systems (PIDS), loosely integrated with a central Command and Control (C2) system. Whilst some sensors provide automatic event detection and C2 systems commonly provide rudimentary multi-sensor rule based alerting, the performance of such systems is limited by the lack of deep integration and autonomy. As a result, these systems have a high degree of operator burden. To address these challenges, an architectural concept termed "SAPIENT" was conceived. SAPIENT is based on multiple Autonomous Sensor Modules (ASMs) connected to a High-Level Decision Making Module (HLDMM) that provides data fusion, situational awareness, alerting, and sensor management capability. The aim of the SAPIENT concept is to allow for the creation of a surveillance system, in a modular plug-and-play manner, that provides high levels of autonomy, threat detection performance, and reduced operator burden. This paper considers the challenges associated with developing an HLDMM aligned with the SAPIENT concept, through the discussion of the design of a realised HLDMM. Particular focus is drawn to how high levels of system level performance can be achieved whilst retaining modularity and flexibility. A number of key aspects of our HLDMM are presented, including an integrated threat assessment and sensor management framework, threat sequence matching, and ASM trust modelling. The results of real-world testing of the HLDMM, in conjunction with multiple Laser, Radar, and EO/IR sensors, in representative semi-urban environments, are discussed.

  6. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  7. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    PubMed

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Defense policy planners and countermeasure developers are often faced with vexing problems involving the prioritization of resources and efforts. This is especially true in the area of Biodefense, where each new emerging infectious disease outbreak brings with it questions regarding the causative agent's potential for weaponization. Recent experience with West Nile Virus, Severe Acute Respiratory Syndrome, Monkeypox, and H1N1 Influenza highlights this problem. Appropriately, in each of these cases, the possibility of bioterrorism was raised, although each outbreak ultimately proved to have a natural origin. In fact, determining whether an outbreak has an unnatural origin can be quite difficult. Thus, the questions remain: could the causative agents of these and other emerging infectious disease outbreaks pose a future weaponization threat? And how great is that threat? Should precious resources be diverted from other defense efforts in order to prepare for possible hostile employment of novel diseases by belligerents? Answering such critical questions requires some form of systematic threat assessment. Through extensive collaborative work conducted within NATO's Biomedical Advisory Council, we developed a scoring matrix for evaluating the weaponization potential of the causative agents of such diseases and attempted to validate our matrix by examining the reproducibility of data using known threat agents. Our matrix included 12 attributes of a potential weapon and was provided, along with detailed scoring instructions, to 12 groups of biodefense experts in 6 NATO nations. Study participants were asked to score each of these 12 attributes on a scale of 0-3: Infectivity, Infection-to-Disease Ratio (Reliability), Predictability (& Incubation Period), Morbidity & Mortality (Virulence), Ease of Large-Scale Production & Storage, Aerosol Stability, Atmospheric Stability, Ease of Dispersal, Communicability, Prophylactic Countermeasure Availability, Therapeutic

  8. Creating Safer Campuses through Implementation of Threat-Assessment Teams: Are They Enough?

    ERIC Educational Resources Information Center

    Toppe, Michele L.

    2017-01-01

    According to higher education policy experts, "Campus threat assessment is not merely a recommendation, but an emerging standard of care." However, despite evidence of the emergence of this standard and the consistency of recommendations that comport with those made by the Virginia Tech Review Panel, college campuses continue to vary…

  9. Attention Bias Modification (ABM): Review of Effects of Multisession ABM Training on Anxiety and Threat-Related Attention in High-Anxious Individuals

    PubMed Central

    Mogg, Karin; Waters, Allison M.; Bradley, Brendan P.

    2017-01-01

    Attention bias modification (ABM) aims to reduce anxiety by reducing attention bias (AB) to threat; however, effects on anxiety and AB are variable. This review examines 34 studies assessing effects of multisession-ABM on both anxiety and AB in high-anxious individuals. Methods include ABM-threat-avoidance (promoting attention-orienting away from threat), ABM-positive-search (promoting explicit, goal-directed attention-search for positive/nonthreat targets among negative/threat distractors), and comparison conditions (e.g., control-attention training combining threat-cue exposure and attention-task practice without AB-modification). Findings indicate anxiety reduction often occurs during both ABM-threat-avoidance and control-attention training; anxiety reduction is not consistently accompanied by AB reduction; anxious individuals often show no pretraining AB in orienting toward threat; and ABM-positive-search training appears promising in reducing anxiety. Methodological and theoretical issues are discussed concerning ABM paradigms, comparison conditions, and AB assessment. ABM methods combining explicit goal-directed attention-search for nonthreat/positive information and effortful threat-distractor inhibition (promoting top-down cognitive control during threat-cue exposure) warrant further evaluation. PMID:28752017

  10. Prototype integration of the joint munitions assessment and planning model with the OSD threat methodology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lynn, R.Y.S.; Bolmarcich, J.J.

    The purpose of this Memorandum is to propose a prototype procedure which the Office of Munitions might employ to exercise, in a supportive joint fashion, two of its High Level Conventional Munitions Models, namely, the OSD Threat Methodology and the Joint Munitions Assessment and Planning (JMAP) model. The joint application of JMAP and the OSD Threat Methodology provides a tool to optimize munitions stockpiles. The remainder of this Memorandum comprises five parts. The first is a description of the structure and use of the OSD Threat Methodology. The second is a description of JMAP and its use. The third discussesmore » the concept of the joint application of JMAP and OSD Threat Methodology. The fourth displays sample output of the joint application. The fifth is a summary and epilogue. Finally, three appendices contain details of the formulation, data, and computer code.« less

  11. 49 CFR 192.923 - How is direct assessment used and for what threats?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192.923 How is direct assessment used and for what threats? (a...

  12. Targeted violence against law enforcement officers.

    PubMed

    Schouten, Ronald; Brennan, Douglas V

    2016-09-01

    As highly visible representatives and guardians of society, law enforcement officers (LEOs) are very public figures. Injury or death in the line of duty, whether due to accidents or intentional acts of violence, is an occupational hazard for LEOs. Targeted assaults on police officers, referred to as ambushes in previous literature, are a particularly perplexing problem with significant implications for society at large. In the summer of 2016, the latest in a series of high-profile acts of violence aimed at police occurred, leading to increased examination of the acts themselves and their causes. This article examines recent trends in assaults on LEOs, focusing on predatory rather than reactive attacks, and applies a threat assessment model to a case of targeted violence against police. We use State of Washington v. Christopher Monfort (2015), a prosecution for arson, assault with intent to murder, and murder, as a case example, to examine how the threat assessment model, and the concepts of affective versus predatory violence help in understanding targeted violence against LEOs, assessing its risk, and managing it. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  13. A Multiple Case Study Exploring Members' Perceptions of Threat Assessment Teams' Training and Resources at Two-Year Colleges

    ERIC Educational Resources Information Center

    Pendleton, Kristi A.

    2017-01-01

    Incorporating a qualitative approach, the purpose of this multiple case study dissertation was: 1) to explore the perceptions of threat assessment teams on campus safety; 2) to study the challenges and barriers two-year colleges experience in relation to the threat assessment team process; and 3) to describe how the teams' perceptions of risk may…

  14. Stress-induced cortisol facilitates threat-related decision making among police officers.

    PubMed

    Akinola, Modupe; Mendes, Wendy Berry

    2012-02-01

    Previous research suggests that cortisol can affect cognitive functions such as memory, decision making, and attentiveness to threat-related cues. Here, we examine whether increases in cortisol, brought on by an acute social stressor, influence threat-related decision making. Eighty-one police officers completed a standardized laboratory stressor and then immediately completed a computer simulated decision-making task designed to examine decisions to accurately shoot or not shoot armed and unarmed Black and White targets. Results indicated that police officers who had larger cortisol increases to the social-stress task subsequently made fewer errors when deciding to shoot armed Black targets relative to armed White targets, suggesting that hypothalamic pituitary adrenal (HPA) activation may exacerbate vigilance for threat cues. We conclude with a discussion of the implications of threat-initiated decision making.

  15. 49 CFR 192.923 - How is direct assessment used and for what threats?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transmission Pipeline Integrity Management § 192.923 How is direct assessment used and for what threats? (a... corrosion (ICDA), and stress corrosion cracking (SCCDA). (b) Primary method. An operator using direct..., appendix A3, and § 192.929 if addressing stress corrosion cracking (SCCDA). (c) Supplemental method. An...

  16. 49 CFR 192.923 - How is direct assessment used and for what threats?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transmission Pipeline Integrity Management § 192.923 How is direct assessment used and for what threats? (a... corrosion (ICDA), and stress corrosion cracking (SCCDA). (b) Primary method. An operator using direct..., appendix A3, and § 192.929 if addressing stress corrosion cracking (SCCDA). (c) Supplemental method. An...

  17. 49 CFR 192.923 - How is direct assessment used and for what threats?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transmission Pipeline Integrity Management § 192.923 How is direct assessment used and for what threats? (a... corrosion (ICDA), and stress corrosion cracking (SCCDA). (b) Primary method. An operator using direct..., appendix A3, and § 192.929 if addressing stress corrosion cracking (SCCDA). (c) Supplemental method. An...

  18. 49 CFR 192.923 - How is direct assessment used and for what threats?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transmission Pipeline Integrity Management § 192.923 How is direct assessment used and for what threats? (a... corrosion (ICDA), and stress corrosion cracking (SCCDA). (b) Primary method. An operator using direct..., appendix A3, and § 192.929 if addressing stress corrosion cracking (SCCDA). (c) Supplemental method. An...

  19. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  20. How Stereotype Threat Affects Healthy Older Adults’ Performance on Clinical Assessments of Cognitive Decline: The Key Role of Regulatory Fit

    PubMed Central

    Mather, Mara; Gatz, Margaret

    2015-01-01

    Objectives. Stereotype threat can impair older adults’ performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments’ reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Method. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Results. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Discussion. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat’s negative effects. By using a loss-avoidance frame, stereotype threat’s negative effects can be attenuated or even eliminated. PMID:25752896

  1. From Presidential Protection to Campus Security: A Brief History of Threat Assessment in North American Schools and Colleges

    ERIC Educational Resources Information Center

    Randazzo, Marisa R.; Cameron, J. Kevin

    2012-01-01

    This article provides a brief history of the development of behavioral threat assessment within colleges and universities in the United States and Canada, from the original Secret Service model used to evaluate threats against the U.S. president, to its adaptations for workplace settings and United States and Canadian secondary schools, to its…

  2. Linguistic threat activates the human amygdala

    PubMed Central

    Isenberg, N.; Silbersweig, D.; Engelien, A.; Emmerich, S.; Malavade, K.; Beattie, B.; Leon, A. C.; Stern, E.

    1999-01-01

    Studies in animals demonstrate a crucial role for the amygdala in emotional and social behavior, especially as related to fear and aggression. Whereas lesion and functional-imaging studies in humans indicate the amygdala’s participation in assessing the significance of nonverbal as well as paralinguistic cues, direct evidence for its role in the emotional processing of linguistic cues is lacking. In this study, we use a modified Stroop task along with a high-sensitivity neuroimaging technique to target the neural substrate engaged specifically when processing linguistic threat. Healthy volunteer subjects were instructed to name the color of words of either threat or neutral valence, presented in different color fonts, while neural activity was measured by using H215O positron-emission tomography. Bilateral amygdalar activation was significantly greater during color naming of threat words than during color naming of neutral words. Associated activations were also noted in sensory-evaluative and motor-planning areas of the brain. Thus, our results demonstrate the amygdala’s role in the processing of danger elicited by language. In addition, the results reinforce the amygdala’s role in the modulation of the perception of, and response to, emotionally salient stimuli. The current study further suggests conservation of phylogenetically older mechanisms of emotional evaluation in the context of more recently evolved linguistic function. PMID:10468630

  3. Technosocial Modeling of IED Threat Scenarios and Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less

  4. Assessing Homeland Chemical Hazards Outside the Military Gates: Industrial Hazard Threat Assessments for Department of Defense Installations

    DTIC Science & Technology

    2002-01-01

    catastrophic health consequences , resulting from potential exposures to industrial chemicals (Armed Forces Medical Intelligence Center, 1998). These...susceptible to damage from a toxic industrial material release. For this second component, the Consequence Assessment Tools Set (CATS) (Defense Threat...accidental toxic industrial material release, the severity of the release, and any associated consequences that might occur. These are based on estimated

  5. Development and assessment of a landscape-scale ecological threat index for the Lower Colorado River Basin

    USGS Publications Warehouse

    Paukert, Craig P.; Pitts, K.L.; Whittier, Joanna B.; Olden, Julian D.

    2011-01-01

    Anthropogenic disturbances impact freshwater biota but are rarely incorporated into conservation planning due to the difficulties in quantifying threats. There is currently no widely accepted method to quantify disturbances, and determining how to measure threats to upstream catchments using disturbance metrics can be time consuming and subjective. We compared four watershed-scale ecological threat indices for the Lower Colorado River Basin (LCRB) using landscape-level threats of land use (e.g., agricultural and urban lands), waterway development and diversions (e.g., number of canals, dams), and human development (e.g., road and railroads density, pollution sites). The LCRB is an ideal region to assess ecological threat indices because of the increasing need for conservation to ensure the persistence of native fishes in highly altered habitat. Each threat was measured for severity (i.e., level of influence on the upstream watershed) and frequency throughout each watershed; both severity and frequency were measured using two different methods. Severity values were based either on peer-reviewed literature and weighted in accordance to their published ecological impact, or assumed equal severity across stressors. Threat frequency was calculated according to either the presence/absence of each stressor, or on the relative density of each stressor in the watershed. Each measure of severity was combined with a measure of frequency, creating four ecological threat indices, and transformed to a 0–100 scale. Threat indices were highly correlated (slopes of 0.94–1.63; R2 of 0.82–0.98), and were highest for watersheds close to urban centers, including Phoenix, Tucson, and Flagstaff, Arizona, and Las Vegas, Nevada. Road crossings and density appeared to be the most influential stressors in the index, but the removal of any individual stressor only changed the index by <5.1 units. Our results indicate that a simpler index with less subjectivity (i.e., presence/absence of

  6. The measurement of threat orientations.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Bovin, Michelle J

    2006-01-01

    To develop measures of 3 threat orientations that affect responses to health behavior messages. In Study 1, college students (N = 47) completed items assessing threat orientations and health behaviors. In Study 2, college students and community adults (N = 110) completed the threat orientation items and measures of convergent and discriminant validity. In Study 1, the control-based, denial-based, and heightened-sensitivity-based threat orientation scales demonstrated good internal consistency and correlated with engagement in health behaviors. In Study 2, the convergent and discriminant validity of the 3 measures was established. The 3 scales have good internal reliability and construct validity.

  7. Temporal allocation of attention toward threat in individuals with posttraumatic stress symptoms.

    PubMed

    Amir, Nader; Taylor, Charles T; Bomyea, Jessica A; Badour, Christal L

    2009-12-01

    Research suggests that individuals with posttraumatic stress disorder (PTSD) selectively attend to threat-relevant information. However, little is known about how initial detection of threat influences the processing of subsequently encountered stimuli. To address this issue, we used a rapid serial visual presentation paradigm (RSVP; Raymond, J. E., Shapiro, K. L., & Arnell, K. M. (1992). Temporary suppression of visual processing in an RSVP task: An attentional blink? Journal of Experimental Psychology: Human Perception and Performance, 18, 849-860) to examine temporal allocation of attention to threat-related and neutral stimuli in individuals with PTSD symptoms (PTS), traumatized individuals without PTSD symptoms (TC), and non-anxious controls (NAC). Participants were asked to identify one or two targets in an RSVP stream. Typically processing of the first target decreases accuracy of identifying the second target as a function of the temporal lag between targets. Results revealed that the PTS group was significantly more accurate in detecting a neutral target when it was presented 300 or 500ms after threat-related stimuli compared to when the target followed neutral stimuli. These results suggest that individuals with PTSD may process trauma-relevant information more rapidly and efficiently than benign information.

  8. Assessing Women's Responses to Sexual Threat: Validity of a Virtual Role-Play Procedure

    ERIC Educational Resources Information Center

    Jouriles, Ernest N.; Rowe, Lorelei Simpson; McDonald, Renee; Platt, Cora G.; Gomez, Gabriella S.

    2011-01-01

    This study evaluated the validity of a role-play procedure that uses virtual reality technology to assess women's responses to sexual threat. Forty-eight female undergraduate students were randomly assigned to either a standard, face-to-face role-play (RP) or a virtual role-play (VRP) of a sexually coercive situation. A multimethod assessment…

  9. Threats to Feminist Identity and Reactions to Gender Discrimination.

    PubMed

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists ( M age  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed.

  10. System considerations for detection and tracking of small targets using passive sensors

    NASA Astrophysics Data System (ADS)

    DeBell, David A.

    1991-08-01

    Passive sensors provide only a few discriminants to assist in threat assessment of small targets. Tracking of the small targets provides additional discriminants. This paper discusses the system considerations for tracking small targets using passive sensors, in particular EO sensors. Tracking helps establish good versus bad detections. Discussed are the requirements to be placed on the sensor system's accuracy, with respect to knowledge of the sightline direction. The detection of weak targets sets a requirement for two levels of tracking in order to reduce processor throughput. A system characteristic is the need to track all detections. For low thresholds, this can mean a heavy track burden. Therefore, thresholds must be adaptive in order not to saturate the processors. Second-level tracks must develop a range estimate in order to assess threat. Sensor platform maneuvers are required if the targets are moving. The need for accurate pointing, good stability, and a good update rate will be shown quantitatively, relating to track accuracy and track association.

  11. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  12. 2007 accomplishment report for the Eastern and Western forest environmental threat assessment centers

    Treesearch

    Danny C. Lee; Jerome S. Beatty

    2008-01-01

    As chance would have it, the Eastern Forest and Western Wildland Environmental Threat Assessment Centers were created the same year (2005) that the Forest Service celebrated its centennial anniversary as an agency of the U.S. Department of Agriculture. The historic birth of the Forest Service provides a nice backdrop to view our own more modest beginnings. Both events...

  13. Search for Two Categories of Target Produces Fewer Fixations to Target-Color Items

    ERIC Educational Resources Information Center

    Menneer, Tamaryn; Stroud, Michael J.; Cave, Kyle R.; Li, Xingshan; Godwin, Hayward J.; Liversedge, Simon P.; Donnelly, Nick

    2012-01-01

    Searching simultaneously for metal threats (guns and knives) and improvised explosive devices (IEDs) in X-ray images is less effective than 2 independent single-target searches, 1 for metal threats and 1 for IEDs. The goals of this study were to (a) replicate this dual-target cost for categorical targets and to determine whether the cost remains…

  14. Analyzing Cyber-Physical Threats on Robotic Platforms.

    PubMed

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  15. Stereotype threat lowers older adults’ self-reported hearing abilities

    PubMed Central

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  16. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    PubMed

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  17. THE GRAY THREAT. Assessing the Next-Generation European Fighters,

    DTIC Science & Technology

    1995-01-01

    magnitude levels substantially, al- though operationally significant benefits against advanced threats are likely only from a narrow forward sector . EF...operationally sig- nificant benefits against advanced radar threats are likely only from a narrow forward sector . Company literature also points to...the industrial sector . Industrial capabilities will be maintained, all procurement programs will be kept up ... The first choice is to give

  18. Threat interferes with response inhibition.

    PubMed

    Hartikainen, Kaisa M; Siiskonen, Anna R; Ogawa, Keith H

    2012-05-09

    A potential threat, such as a spider, captures attention and engages executive functions to adjust ongoing behavior and avoid danger. We and many others have reported slowed responses to neutral targets in the context of emotional distractors. This behavioral slowing has been explained in the framework of attentional competition for limited resources with emotional stimuli prioritized. Alternatively, slowed performance could reflect the activation of avoidance/freezing-type motor behaviors associated with threat. Although the interaction of attention and emotion has been widely studied, little is known on the interaction between emotion and executive functions. We studied how threat-related stimuli (spiders) interact with executive performance and whether the interaction profile fits with a resource competition model or avoidance/freezing-type motor behaviors. Twenty-one young healthy individuals performed a Go-NoGo visual discrimination reaction time (RT) task engaging several executive functions with threat-related and emotionally neutral distractors. The threat-related distractors had no effect on the RT or the error rate in the Go trials. The NoGo error rate, reflecting failure in response inhibition, increased significantly because of threat-related distractors in contrast to neutral distractors, P less than 0.05. Thus, threat-related distractors temporarily impaired response inhibition. Threat-related distractors associated with increased commission errors and no effect on RT does not suggest engagement of avoidance/freezing-type motor behaviors. The results fit in the framework of the resource competition model. A potential threat calls for evaluation of affective significance as well as inhibition of undue emotional reactivity. We suggest that these functions tax executive resources and may render other executive functions, such as response inhibition, temporarily compromised when the demands for resources exceed availability.

  19. Uncertainty-Sensitive Heterogeneous Information Fusion: Assessing Threat with Soft, Uncertain, and Conflicting Evidence

    DTIC Science & Technology

    2016-01-01

    planning exercises and wargaming. Initial Experimentation Late in the research , the prototype platform and the various fusion methods came together. This...Chapter Four points to prior research 2 Uncertainty-Sensitive Heterogeneous Information Fusion in mind multimethod fusing of complex information...our research is assessing the threat of terrorism posed by individuals or groups under scrutiny. Broadly, the ultimate objec- tives, which go well

  20. Assessing homeland chemical hazards outside the military gates: industrial hazard threat assessments for department of defense installations.

    PubMed

    Kirkpatrick, Jeffrey S; Howard, Jacqueline M; Reed, David A

    2002-04-08

    As part of comprehensive joint medical surveillance measures outlined by the Department of Defense, the US Army Center for Health Promotion and Preventive Medicine (USACHPPM) is beginning to assess environmental health threats to continental US military installations. A common theme in comprehensive joint medical surveillance, in support of Force Health Protection, is the identification and assessment of potential environmental health hazards, and the evaluation and documentation of actual exposures in both a continental US and outside a continental US setting. For the continental US assessments, the USACHPPM has utilized the US Environmental Protection Agency (EPA) database for risk management plans in accordance with Public Law 106-40, and the toxic release inventory database, in a state-of the art geographic information systems based program, termed the Consequence Assessment and Management Tool Set, or CATS, for assessing homeland industrial chemical hazards outside the military gates. As an example, the US EPA toxic release inventory and risk management plans databases are queried to determine the types and locations of industries surrounding a continental US military installation. Contaminants of concern are then ranked with respect to known toxicological and physical hazards, where they are then subject to applicable downwind hazard simulations using applicable meteorological and climatological data sets. The composite downwind hazard areas are mapped in relation to emergency response planning guidelines (ERPG), which were developed by the American Industrial Hygiene Association to assist emergency response personnel planning for catastrophic chemical releases. In addition, other geographic referenced data such as transportation routes, satellite imagery and population data are included in the operational, equipment, and morale risk assessment and management process. These techniques have been developed to assist military medical planners and operations

  1. Layoffs and tradeoffs: production, quality, and safety demands under the threat of job loss.

    PubMed

    Probst, Tahira M

    2002-07-01

    Employees often face a conflict between production targets, quality assurance, and adherence to safety policies. In a time when layoffs are on the rise, it is important to understand the effects of employee job insecurity on these potentially competing demands. A laboratory experiment manipulated the threat of layoffs in a simulated organization and assessed its effect on employee productivity, product quality, and adherence to safety policies. Results suggest that student participants faced with the threat of layoffs were more productive, yet violated more safety rules and produced lower quality outputs, than participants in the control condition. Implications for organizations contemplating layoffs and directions for future research are discussed.

  2. Dangerous Enough: Moderating Racial Bias with Contextual Threat Cues

    PubMed Central

    Correll, Joshua; Wittenbrink, Bernd; Park, Bernadette; Judd, Charles M.; Goyle, Arina

    2010-01-01

    Research shows that participants shoot armed Blacks more frequently and quickly than armed Whites, but make don’t-shoot responses more frequently and quickly for unarmed Whites than unarmed Blacks. We argue that this bias reflects the perception of threat – specifically, threat associated with Black males. Other danger cues (not just race) may create a similar predisposition to shoot, and if these cues promote shooting when the target is White, they should attenuate racial bias. We embedded targets in threatening andsafe backgrounds. Racial bias was evident in safe contexts but disappeared when context signaled danger, and this reduction was largely due to an increased tendency to shoot White targets. PMID:21344058

  3. The Threat Among Us: Insiders Intensify Aviation Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krull, Katie E.

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway formore » attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.« less

  4. Conceptual framework for improved wind-related forest threat assessment in the Southeastern United States

    Treesearch

    Scott L. Goodrick; John A. Stanturf

    2010-01-01

    In the Southeastern United States, forests are subject to a variety of damage-causing wind phenomena that range in scale from very localized (downbursts and tornadoes) to broad spatial scales (hurricanes). Incorporating the threat of wind damage into forest management plans requires tools capable of assessing risk across this range of scales. Our conceptual approach...

  5. SLATE: scanning laser automatic threat extraction

    NASA Astrophysics Data System (ADS)

    Clark, David J.; Prickett, Shaun L.; Napier, Ashley A.; Mellor, Matthew P.

    2016-10-01

    SLATE is an Autonomous Sensor Module (ASM) designed to work with the SAPIENT system providing accurate location tracking and classifications of targets that pass through its field of view. The concept behind the SLATE ASM is to produce a sensor module that provides a complementary view of the world to the camera-based systems that are usually used for wide area surveillance. Cameras provide a hi-fidelity, human understandable view of the world with which tracking and identification algorithms can be used. Unfortunately, positioning and tracking in a 3D environment is difficult to implement robustly, making location-based threat assessment challenging. SLATE uses a Scanning Laser Rangefinder (SLR) that provides precise (<1cm) positions, sizes, shapes and velocities of targets within its field-of-view (FoV). In this paper we will discuss the development of the SLATE ASM including the techniques used to track and classify detections that move through the field of view of the sensor providing the accurate tracking information to the SAPIENT system. SLATE's ability to locate targets precisely allows subtle boundary-crossing judgements, e.g. on which side of a chain-link fence a target is. SLATE's ability to track targets in 3D throughout its FoV enables behavior classification such as running and walking which can provide an indication of intent and help reduce false alarm rates.

  6. Assessing the risk of ignition in the Russian far east within a modeling framework of fire threat.

    PubMed

    Loboda, Tatiana V; Csiszar, Ivan A

    2007-04-01

    The forests of high biological importance in the Russian Far East (RFE) have been experiencing increasing pressure from growing demands for natural resources under the changing economy of post-Soviet Russia. This pressure is further amplified by the rising threat of large and catastrophic fire occurrence, which threatens both the resources and the economic potential of the region. In this paper we introduce a conceptual Fire Threat Model (FTM) and use it to provide quantitative assessment of the risk of ignition in the Russian Far East. The remotely sensed data driven FTM is aimed at evaluating potential wildland fire occurrence and its impact and recovery potential for a given resource. This model is intended for use by resource managers to assist in assessing current levels of fire threat to a given resource, projecting the changes in fire threat under changing climate and land use, and evaluating the efficiency of various management approaches aimed at minimizing the fire impact. Risk of ignition (one of the major uncertainties within fire threat modeling) was analyzed using the MODIS active fire product. The risk of ignition in the RFE is shown to be highly variable in spatial and temporal domains. However, the number of ignition points is not directly proportional to the amount of fire occurrence in the area. Fire ignitions in the RFE are strongly linked to anthropogenic activity (transportation routes, settlements, and land use). An increase in the number of fire ignitions during summer months could be attributed to (1) disruption of the summer monsoons and subsequent changes in fire weather and (2) an increase in natural sources of fire ignitions.

  7. Attention to Threats and Combat-Related Posttraumatic Stress Symptoms

    PubMed Central

    Wald, Ilan; Degnan, Kathryn A.; Gorodetsky, Elena; Charney, Dennis S.; Fox, Nathan A.; Fruchter, Eyal; Goldman, David; Lubin, Gad; Pine, Daniel S.; Bar-Haim, Yair

    2015-01-01

    Importance Combat places soldiers at risk for post-traumatic stress disorder (PTSD). The excessive rates of PTSD and other adjustment disorders in soldiers returning home make it imperative to identify risk and resilience factors that could be targeted by novel therapeutic treatments. Objective To investigate the interplay among attention to threat, combat exposure, and other risk factors for PTSD symptoms in soldiers deployed to combat. Design and Setting Longitudinal prospective study of Israeli Defense Force infantry soldiers carried out in 2008 through 2010. Repeated measurements during a 1-year period included baseline and predeployment data collected in training camps and deployment data collected in the combat theater. Participants Infantry soldiers (1085 men; mean age,18.8 years). Main Outcome Measures Postcombat PTSD symptoms. Results Soldiers developed threat vigilance during combat deployment, particularly when they were exposed to high-intensity combat, as indicated by faster response times to targets appearing at the location of threat relative to neutral stimuli (P < .001). Threat-related attention bias also interacted with combat exposure to predict risk for PTSD (P <.05). Bias toward threat at recruitment (P <.001) and bias away from threat just before deployment (P < .05) predicted postcombat PTSD symptoms. Moreover, these threat-related attention associations with PTSD were moderated by genetic and environmental factors, including serotonin transporter (5-HTTLPR) genotype. Conclusions and Relevance Combat exposure interacts with threat-related attention to place soldiers at risk for PTSD, and interactions with other risk factors account for considerable variance in PTSD vulnerability. Understanding these associations informs research on novel attention bias modification techniques and prevention of PTSD. PMID:23407816

  8. Analyzing Cyber-Physical Threats on Robotic Platforms †

    PubMed Central

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  9. A psychosocial risk assessment and management framework to enhance response to CBRN terrorism threats and attacks.

    PubMed

    Lemyre, Louise; Clément, Mélanie; Corneil, Wayne; Craig, Lorraine; Boutette, Paul; Tyshenko, Michael; Karyakina, Nataliya; Clarke, Robert; Krewski, Daniel

    2005-01-01

    Evidence in the disaster mental health literature indicates that psychosocial consequences of terrorism are a critical component of chemical, biological, radiological, and nuclear (CBRN) events, both at the clinical level and the normal behavioral and emotional levels. Planning for such psychosocial aspects should be an integral part of emergency preparedness. As Canada and other countries build the capacity to prevent, mitigate, and manage CBRN threats and events, it is important to recognize the range of social, psychological, emotional, spiritual, behavioral, and cognitive factors that may affect victims and their families, communities, children, the elderly, responders, decision makers, and others at all phases of terrorism, from threat to post-impact recovery. A structured process to assist CBRN emergency planners, decision makers, and responders in identifying psychosocial risks, vulnerable populations, resources, and interventions at various phases of a CBRN event to limit negative psychosocial impacts and promote resilience and adaptive responses is the essence of our psychosocial risk assessment and management (P-RAM) framework. This article presents the evidence base and conceptual underpinnings of the framework, the principles underlying its design, its key elements, and its use in the development of decision tools for responders, planners, decision makers, and the general public to better assess and manage psychosocial aspects of CBRN threats or attacks.

  10. If it walks like a duck: nanosensor threat assessment

    NASA Astrophysics Data System (ADS)

    Chachis, George C.

    2003-09-01

    A convergence of technologies is making deployment of unattended ground nanosensors operationally feasible in terms of energy, communications for both arbitrated and self-organizing distributed, collective behaviors. A number of nano communications technologies are already making network-centric systems possible for MicroElectrical Mechanical (MEM) sensor devices today. Similar technologies may make NanoElectrical Mechanical (NEM) sensor devices operationally feasible a few years from now. Just as organizational behaviors of large numbers of nanodevices can derive strategies from social insects and other group-oriented animals, bio-inspired heuristics for threat assessment provide a conceptual approach for successful integration of nanosensors into unattended smart sensor networks. Biological models such as the organization of social insects or the dynamics of immune systems show promise as biologically-inspired paradigms for protecting nanosensor networks for security scene analysis and battlespace awareness. The paradox of nanosensors is that the smaller the device is the more useful it is but the smaller it is the more vulnerable it is to a variety of threats. In other words simpler means networked nanosensors are more likely to fall prey to a wide-range of attacks including jamming, spoofing, Janisserian recruitment, Pied-Piper distraction, as well as typical attacks computer network security. Thus, unattended sensor technologies call for network architectures that include security and countermeasures to provide reliable scene analysis or battlespace awareness information. Such network centric architectures may well draw upon a variety of bio-inspired approaches to safeguard, validate and make sense of large quantities of information.

  11. Creating a critical mass eliminates the effects of stereotype threat on women's mathematical performance.

    PubMed

    Pennington, Charlotte R; Heim, Derek

    2016-09-01

    Women in mathematical domains may become attuned to situational cues that signal a discredited social identity, contributing to their lower achievement and underrepresentation. This study examined whether heightened in-group representation alleviates the effects of stereotype threat on women's mathematical performance. It further investigated whether single-sex testing environments and stereotype threat influenced participants to believe that their ability was fixed (fixed mindset) rather than a trait that could be developed (growth mindset). One hundred and forty-four female participants were assigned randomly to a self-as-target or group-as-target stereotype threat condition or to a control condition. They completed a modular arithmetic maths test and a mindset questionnaire either alone or in same-sex groups of 3-5 individuals. Participants solved fewer mathematical problems under self-as-target and group-as-target stereotype threat when they were tested alone, but these performance deficits were eliminated when they were tested in single-sex groups. Participants reported a weaker growth mindset when they were tested under stereotype threat and in single-sex groups. Moreover, evidence of inconsistent mediation indicated that single-sex testing environments negatively predicted mindset but positively predicted mathematical performance. These findings suggest that single-sex testing environments may represent a practical intervention to alleviate stereotype threat effects but may have a paradoxical effect on mindset. © 2016 The British Psychological Society.

  12. Unhealthy interactions: the role of stereotype threat in health disparities.

    PubMed

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  13. Unhealthy Interactions: The Role of Stereotype Threat in Health Disparities

    PubMed Central

    Burgess, Diana; Phelan, Sean M.; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors. PMID:23153125

  14. Stereotype threat among older employees: relationship with job attitudes and turnover intentions.

    PubMed

    von Hippel, Courtney; Kalokerinos, Elise K; Henry, Julie D

    2013-03-01

    Stereotype threat, or the belief that one may be the target of demeaning stereotypes, leads to acute performance decrements and reduced psychological well-being. The current research examined stereotype threat among older employees, a group that is the target of many negative stereotypes. Study 1 surveyed older workers in two different organizations regarding their experiences of stereotype threat, their job attitudes and work mental health, and their intentions to resign or retire. Across both samples, feelings of stereotype threat were related to more negative job attitudes and poorer work mental health. In turn, these negative job attitudes were associated with intentions to resign and (possibly) retire. In Study 2, younger and older employees were surveyed. The results indicated that only for older employees were feelings of stereotype threat negatively related to job attitudes, work mental health, and intentions to resign. The implications of these findings for understanding job attitudes and intentions among older workers are discussed. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  15. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    PubMed

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  16. Threats to the viability of California spotted owls

    Treesearch

    John J. Keane

    2017-01-01

    The California spotted owl (Strix occidentalis occidentalis) is a species of conservation concern owing to threats to its habitat and populations. Verner et al. (1992) first assessed the status of the California spotted owl "The California Spotted Owl: A technical Assessment of it’s current status" (CASPO) and identified four factors as either threats or...

  17. Adapting to the Changing Climate: An Assessment of Local Health Department Preparations for Climate Change-Related Health Threats, 2008-2012

    PubMed Central

    Roser-Renouf, Connie; Maibach, Edward W.; Li, Jennifer

    2016-01-01

    Background Climate change poses a major public health threat. A survey of U.S. local health department directors in 2008 found widespread recognition of the threat, but limited adaptive capacity, due to perceived lack of expertise and other resources. Methods We assessed changes between 2008 and 2012 in local public health departments' preparedness for the public health threats of climate change, in light of increasing national polarization on the issue, and widespread funding cutbacks for public health. A geographically representative online survey of directors of local public health departments was conducted in 2011–2012 (N = 174; response rate = 50%), and compared to the 2008 telephone survey results (N = 133; response rate = 61%). Results Significant polarization had occurred: more respondents in 2012 were certain that the threat of local climate change impacts does/does not exist, and fewer were unsure. Roughly 10% said it is not a threat, compared to 1% in 2008. Adaptation capacity decreased in several areas: perceived departmental expertise in climate change risk assessment; departmental prioritization of adaptation; and the number of adaptation-related programs and services departments provided. In 2008, directors' perceptions of local impacts predicted the number of adaptation-related programs and services their departments offered, but in 2012, funding predicted programming and directors' impact perceptions did not. This suggests that budgets were constraining directors' ability to respond to local climate change-related health threats. Results also suggest that departmental expertise may mitigate funding constraints. Strategies for overcoming these obstacles to local public health departments' preparations for climate change are discussed. PMID:26991658

  18. Adapting to the Changing Climate: An Assessment of Local Health Department Preparations for Climate Change-Related Health Threats, 2008-2012.

    PubMed

    Roser-Renouf, Connie; Maibach, Edward W; Li, Jennifer

    2016-01-01

    Climate change poses a major public health threat. A survey of U.S. local health department directors in 2008 found widespread recognition of the threat, but limited adaptive capacity, due to perceived lack of expertise and other resources. We assessed changes between 2008 and 2012 in local public health departments' preparedness for the public health threats of climate change, in light of increasing national polarization on the issue, and widespread funding cutbacks for public health. A geographically representative online survey of directors of local public health departments was conducted in 2011-2012 (N = 174; response rate = 50%), and compared to the 2008 telephone survey results (N = 133; response rate = 61%). Significant polarization had occurred: more respondents in 2012 were certain that the threat of local climate change impacts does/does not exist, and fewer were unsure. Roughly 10% said it is not a threat, compared to 1% in 2008. Adaptation capacity decreased in several areas: perceived departmental expertise in climate change risk assessment; departmental prioritization of adaptation; and the number of adaptation-related programs and services departments provided. In 2008, directors' perceptions of local impacts predicted the number of adaptation-related programs and services their departments offered, but in 2012, funding predicted programming and directors' impact perceptions did not. This suggests that budgets were constraining directors' ability to respond to local climate change-related health threats. Results also suggest that departmental expertise may mitigate funding constraints. Strategies for overcoming these obstacles to local public health departments' preparations for climate change are discussed.

  19. Assessment of Relationship-Specific Incentive and Threat Sensitivities: Predicting Satisfaction and Affect in Adult Intimate Relationships

    ERIC Educational Resources Information Center

    Laurenceau, Jean-Philippe; Kleinman, Brighid M.; Kaczynski, Karen J.; Carver, Charles S.

    2010-01-01

    Self-report scales assessing relationship-specific incentive and threat sensitivity were created. Initial tests of factor structure and associations with relationship quality were conducted in a sample of persons in intimate relationships (Study 1). Associations with conceptually related measures were examined to determine convergent and…

  20. Incorporating threat in hotspots and coldspots of biodiversity and ecosystem services.

    PubMed

    Schröter, Matthias; Kraemer, Roland; Ceauşu, Silvia; Rusch, Graciela M

    2017-11-01

    Spatial prioritization could help target conservation actions directed to maintain both biodiversity and ecosystem services. We delineate hotspots and coldspots of two biodiversity conservation features and five regulating and cultural services by incorporating an indicator of 'threat', i.e. timber harvest profitability for forest areas in Telemark (Norway). We found hotspots, where high values of biodiversity, ecosystem services and threat coincide, ranging from 0.1 to 7.1% of the area, depending on varying threshold levels. Targeting of these areas for conservation follows reactive conservation approaches. In coldspots, high biodiversity and ecosystem service values coincide with low levels of threat, and cover 0.1-3.4% of the forest area. These areas might serve proactive conservation approaches at lower opportunity cost (foregone timber harvest profits). We conclude that a combination of indicators of biodiversity, ecosystem services and potential threat is an appropriate approach for spatial prioritization of proactive and reactive conservation strategies.

  1. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.

    PubMed

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V

    2017-03-21

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider's server contains a lot of valuable resources. LoBSs' users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs' risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs' risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.

  2. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks

    PubMed Central

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V.

    2017-01-01

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. PMID:28335569

  3. Impaired threat prioritisation after selective bilateral amygdala lesions

    PubMed Central

    Bach, Dominik R.; Hurlemann, Rene; Dolan, Raymond J.

    2015-01-01

    The amygdala is proposed to process threat-related information in non-human animals. In humans, empirical evidence from lesion studies has provided the strongest evidence for a role in emotional face recognition and social judgement. Here we use a face-in-the-crowd (FITC) task which in healthy control individuals reveals prioritised threat processing, evident in faster serial search for angry compared to happy target faces. We investigate AM and BG, two individuals with bilateral amygdala lesions due to Urbach–Wiethe syndrome, and 16 control individuals. In lesion patients we show a reversal of a threat detection advantage indicating a profound impairment in prioritising threat information. This is the first direct demonstration that human amygdala lesions impair prioritisation of threatening faces, providing evidence that this structure has a causal role in responding to imminent danger. PMID:25282058

  4. Identifying key conservation threats to Alpine birds through expert knowledge

    PubMed Central

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  5. Physician office readiness for managing Internet security threats.

    PubMed

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  6. Physician Office Readiness for Managing Internet Security Threats

    PubMed Central

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks. Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done. PMID:17238600

  7. Planetary Asteroid Defense Study: Assessing and Responding to the Natural Space Debris Threat

    DTIC Science & Technology

    1995-04-01

    Spectrum of Natural Space Debris Effects 82 Figure 5-1. Threat is a Product of Hazard and Risk 84 Figure 5-2. Variables Affecting Threat...are perhaps the most unique family in the extra-belt region. Unlike other families who define their own orbits, the Trojans share Jupiter’s orbit...Threat. We define threat as the relationship between hazard and risk. It can be likened to a product of the two, notionally depicted in Figure 5-1

  8. Sigma-1 receptor ligands control a switch between passive and active threat responses

    PubMed Central

    Rennekamp, Andrew J.; Huang, Xi-Ping; Wang, You; Patel, Samir; Lorello, Paul J.; Cade, Lindsay; Gonzales, Andrew P. W.; Yeh, Jing-Ruey Joanna; Caldarone, Barbara J.; Roth, Bryan L.; Kokel, David; Peterson, Randall T.

    2016-01-01

    Humans and many animals exhibit freezing behavior in response to threatening stimuli. In humans, inappropriate threat responses are fundamental characteristics of several mental illnesses. To identify small molecules that modulate threat responses, we developed a high-throughput behavioral assay in zebrafish (Danio rerio) and characterized the effects of 10,000 compounds on freezing behavior. We found three classes of compounds that switch the threat response from freezing to escape-like behavior. We then screened these for binding activity across 45 candidate targets. Using target profile clustering we implicated the sigma-1 receptor in the mechanism of behavioral switching and confirmed that known sigma-1 ligands also disrupt freezing behavior. Furthermore, mutation of the sigma-1 gene prevented the behavioral effect of escape-inducing compounds. The compound ‘finazine’ potently bound mammalian sigma-1 and altered rodent threat response behavior. Thus, pharmacological and genetic interrogation of the freezing response revealed sigma-1 as a mediator of vertebrate threat responses. PMID:27239788

  9. ERP correlates of attentional processing in spider fear: evidence of threat-specific hypervigilance.

    PubMed

    Venetacci, Rebecca; Johnstone, Amber; Kirkby, Kenneth C; Matthews, Allison

    2018-05-01

    Attentional bias towards threat can be demonstrated by enhanced processing of threat-related targets and/or greater interference when threat-related distractors are present. These effects are argued to reflect processing within the orienting and executive control networks of the brain respectively. This study investigated behavioural (RT) and electrophysiological correlates of early selective attention and top-down attentional control among females with high (n = 16) or low (n = 16) spider fear (Mean age = 22 years). Participants completed a novel flanker go/nogo task in which a central schematic flower or spider stimulus was flanked by either congruent or incongruent distractors. Participants responded to green stimuli (go trials) and withheld response to yellow stimuli (nogo trials). High fear participants demonstrated significantly shorter reaction times and greater P1 amplitude to spider targets, suggesting specific hypervigilance towards threat-relevant stimuli. In contrast to predictions, there was little evidence for behavioural interference effects or differences in N2 amplitude when distractor stimuli were threat-relevant.

  10. Personality Correlates of Nuclear War Threat Perception.

    ERIC Educational Resources Information Center

    Mayton, Daniel M., II

    This study investigated the relationship between individual personality characteristics and the threat of nuclear war among 192 introductory psychology students at a small college in the Pacific Northwest. One measure of nuclear threat perception was spontaneous concern, which was assessed using five presentations each of the incomplete sentences,…

  11. Self-assessing target with automatic feedback

    DOEpatents

    Larkin, Stephen W.; Kramer, Robert L.

    2004-03-02

    A self assessing target with four quadrants and a method of use thereof. Each quadrant containing possible causes for why shots are going into that particular quadrant rather than the center mass of the target. Each possible cause is followed by a solution intended to help the marksman correct the problem causing the marksman to shoot in that particular area. In addition, the self assessing target contains possible causes for general shooting errors and solutions to the causes of the general shooting error. The automatic feedback with instant suggestions and corrections enables the shooter to improve their marksmanship.

  12. A Framework for School Safety and Risk Management: Results from a Study of 18 Targeted School Shooters

    ERIC Educational Resources Information Center

    Lenhardt, Ann Marie C.; Graham, Lemuel W.; Farrell, Melissa L.

    2018-01-01

    Targeted violence continues to pose a threat to school safety. Reported here are the results of a study of 18 cases of school shooters from 1996 to 2012. Variables examined are individual factors and behaviors, family dynamics, and triggering events. Results indicate the need for expanded school-based mental health services, threat assessment, and…

  13. Stereotype threat and executive resource depletion: examining the influence of emotion regulation.

    PubMed

    Johns, Michael; Inzlicht, Michael; Schmader, Toni

    2008-11-01

    Research shows that stereotype threat reduces performance by diminishing executive resources, but less is known about the psychological processes responsible for these impairments. The authors tested the idea that targets of stereotype threat try to regulate their emotions and that this regulation depletes executive resources, resulting in underperformance. Across 4 experiments, they provide converging evidence that targets of stereotype threat spontaneously attempt to control their expression of anxiety and that such emotion regulation depletes executive resources needed to perform well on tests of cognitive ability. They also demonstrate that providing threatened individuals with a means to effectively cope with negative emotions--by reappraising the situation or the meaning of their anxiety--can restore executive resources and improve test performance. They discuss these results within the framework of an integrated process model of stereotype threat, in which affective and cognitive processes interact to undermine performance.

  14. Stereotype Threat and Executive Resource Depletion: Examining the Influence of Emotion Regulation

    PubMed Central

    Johns, Michael; Inzlicht, Michael; Schmader, Toni

    2010-01-01

    Research shows that stereotype threat reduces performance by diminishing executive resources, but less is known about the psychological processes responsible for these impairments. The authors tested the idea that targets of stereotype threat try to regulate their emotions and that this regulation depletes executive resources, resulting in underperformance. Across 4 experiments, they provide converging evidence that targets of stereotype threat spontaneously attempt to control their expression of anxiety and that such emotion regulation depletes executive resources needed to perform well on tests of cognitive ability. They also demonstrate that providing threatened individuals with a means to effectively cope with negative emotions—by reappraising the situation or the meaning of their anxiety—can restore executive resources and improve test performance. They discuss these results within the framework of an integrated process model of stereotype threat, in which affective and cognitive processes interact to undermine performance. PMID:18999361

  15. Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences

    DTIC Science & Technology

    2004-09-02

    Consequences 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7...OSLGCP now administers the grants programs. 30According to the guidance, threat assessment determines the relative likelihood of a known potential...information on critical infrastructure assets. The Office of State and Local Government Coordination and Preparedness (OSLGCP) administers two grant

  16. Relationships Among Attention Networks and Physiological Responding to Threat

    PubMed Central

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  17. Experimental estimation of snare detectability for robust threat monitoring.

    PubMed

    O'Kelly, Hannah J; Rowcliffe, J Marcus; Durant, Sarah; Milner-Gulland, E J

    2018-02-01

    Hunting with wire snares is rife within many tropical forest systems, and constitutes one of the severest threats to a wide range of vertebrate taxa. As for all threats, reliable monitoring of snaring levels is critical for assessing the relative effectiveness of management interventions. However, snares pose a particular challenge in terms of tracking spatial or temporal trends in their prevalence because they are extremely difficult to detect, and are typically spread across large, inaccessible areas. As with cryptic animal targets, any approach used to monitor snaring levels must address the issue of imperfect detection, but no standard method exists to do so. We carried out a field experiment in Keo Seima Wildlife Reserve in eastern Cambodia with the following objectives: (1) To estimate the detection probably of wire snares within a tropical forest context, and to investigate how detectability might be affected by habitat type, snare type, or observer. (2) To trial two sets of sampling protocols feasible to implement in a range of challenging field conditions. (3) To conduct a preliminary assessment of two potential analytical approaches to dealing with the resulting snare encounter data. We found that although different observers had no discernible effect on detection probability, detectability did vary between habitat type and snare type. We contend that simple repeated counts carried out at multiple sites and analyzed using binomial mixture models could represent a practical yet robust solution to the problem of monitoring snaring levels both inside and outside of protected areas. This experiment represents an important first step in developing improved methods of threat monitoring, and such methods are greatly needed in southeast Asia, as well as in as many other regions.

  18. Real-time network security situation visualization and threat assessment based on semi-Markov process

    NASA Astrophysics Data System (ADS)

    Chen, Junhua

    2013-03-01

    To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment. In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first. Once events are triggered by an attacker's action or system response, the current states of the vulnerabilities are known. Then we calculate the transition probabilities of the vulnerability from the current state to security failure state. Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker's skill level. In the light of the preconditions and post-conditions of vulnerabilities in the network, attack graph is built to visualize security situation in real time. Subsequently, we predict attack path, recognize attack intention and estimate the impact through analysis of attack graph. These help administrators to insight into intrusion steps, determine security state and assess threat. Finally testing in a network shows that this method is reasonable and feasible, and can undertake tremendous analysis task to facilitate administrators' work.

  19. Using resilience and resistance concepts to manage threats to sagebrush ecosystems, Gunnison sage-grouse, and Greater sage-grouse in their eastern range: A strategic multi-scale approach

    USGS Publications Warehouse

    Chambers, Jeanne C.; Beck, Jeffrey L.; Campbell, Steve; Carlson, John; Christiansen, Thomas J.; Clause, Karen J.; Dinkins, Jonathan B.; Doherty, Kevin E.; Griffin, Kathleen A.; Havlina, Douglas W.; Mayer, Kenneth F.; Hennig, Jacob D.; Kurth, Laurie L.; Maestas, Jeremy D.; Manning, Mary E.; Mealor, Brian A.; McCarthy, Clinton; Perea, Marco A.; Pyke, David A.

    2016-01-01

    This report provides a strategic approach developed by a Western Association of Fish and Wildlife Agencies interagency working group for conservation of sagebrush ecosystems, Greater sage-grouse, and Gunnison sage-grouse. It uses information on (1) factors that influence sagebrush ecosystem resilience to disturbance and resistance to nonnative invasive annual grasses and (2) distribution and relative abundance of sage-grouse populations to address persistent ecosystem threats, such as invasive annual grasses and wildfire, and land use and development threats, such as oil and gas development and cropland conversion, to develop effective management strategies. A sage-grouse habitat matrix links relative resilience and resistance of sagebrush ecosystems with modeled sage-grouse breeding habitat probabilities to help decisionmakers assess risks and determine appropriate management strategies at both landscape and site scales. Areas for targeted management are assessed by overlaying matrix components with Greater sage-grouse Priority Areas for Conservation and Gunnison sage-grouse critical habitat and linkages, breeding bird concentration areas, and specific habitat threats. Decision tools are discussed for determining the suitability of target areas for management and the most appropriate management actions. A similar approach was developed for the Great Basin that was incorporated into the Federal land use plan amendments and served as the basis of a Bureau of Land Management Fire and Invasives Assessment Tool, which was used to prioritize sage-grouse habitat for targeted management activities.

  20. Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences

    DTIC Science & Technology

    2005-02-04

    Consequences 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7...OSLGCP). The OSLGCP now administers the grants programs. 37 According to the guidance, threat assessment determines the relative likelihood of a...Preparedness (OSLGCP) administers two grant programs that give states the opportunity to identify critical infrastructure assets: the State Homeland Security

  1. Ecologically relevant neurobehavioral assessment of the development of threat learning

    PubMed Central

    Mouly, Anne-Marie

    2016-01-01

    As altricial infants gradually transition to adults, their proximate environment changes. In three short weeks, pups transition from a small world with the caregiver and siblings to a complex milieu rich in dangers as their environment expands. Such contrasting environments require different learning abilities and lead to distinct responses throughout development. Here, we will review some of the learned fear conditioned responses to threats in rats during their ontogeny, including behavioral and physiological measures that permit the assessment of learning and its supporting neurobiology from infancy through adulthood. In adulthood, odor–shock conditioning produces robust fear learning to the odor that depends upon the amygdala and related circuitry. Paradoxically, this conditioning in young pups fails to support fear learning and supports approach learning to the odor previously paired with shock. This approach learning is mediated by the infant attachment network that does not include the amygdala. During the age range when pups transition from the infant to the adult circuit (10–15 d old), pups have access to both networks: odor–shock conditioning in maternal presence uses the attachment circuit but the adult amygdala-dependent circuit when alone. However, throughout development (as young as 5 d old) the attachment associated learning can be overridden and amygdala-dependent fear learning supported, if the mother expresses fear in the presence of the pup. This social modulation of the fear permits the expression of defense reactions in life threatening situations informed by the caregiver but prevents the learning of the caregiver itself as a threat. PMID:27634146

  2. Working memory regulates trait anxiety-related threat processing biases.

    PubMed

    Booth, Robert W; Mackintosh, Bundy; Sharma, Dinkar

    2017-06-01

    High trait anxious individuals tend to show biased processing of threat. Correlational evidence suggests that executive control could be used to regulate such threat-processing. On this basis, we hypothesized that trait anxiety-related cognitive biases regarding threat should be exaggerated when executive control is experimentally impaired by loading working memory. In Study 1, 68 undergraduates read ambiguous vignettes under high and low working memory load; later, their interpretations of these vignettes were assessed via a recognition test. Trait anxiety predicted biased interpretation of social threat vignettes under high working memory load, but not under low working memory load. In Study 2, 53 undergraduates completed a dot probe task with fear-conditioned Japanese characters serving as threat stimuli. Trait anxiety predicted attentional bias to the threat stimuli but, again, this only occurred under high working memory load. Interestingly however, actual eye movements toward the threat stimuli were only associated with state anxiety, and this was not moderated by working memory load, suggesting that executive control regulates biased threat-processing downstream of initial input processes such as orienting. These results suggest that cognitive loads can exacerbate trait anxiety-related cognitive biases, and therefore represent a useful tool for assessing cognitive biases in future research. More importantly, since biased threat-processing has been implicated in the etiology and maintenance of anxiety, poor executive control may be a risk factor for anxiety disorders. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  3. Relationships among attention networks and physiological responding to threat.

    PubMed

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A; Shankman, Stewart A

    2017-02-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat - related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention - alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. Copyright © 2016 Elsevier Inc. All rights reserved.

  4. An Implementation Analysis of Threat Assessment Policies in Public Universities and Community Colleges in Central Texas: A Post Virginia Tech Incident Assessment

    ERIC Educational Resources Information Center

    Piet DeLaTorre, Christine

    2011-01-01

    It is clear that the tragic events at Virginia Tech and other institutions of higher education (IHEs) have brought threat assessment to the forefront of higher education literature and increased public concern for campus safety. IHEs have a profound duty to learn from the Virginia Tech tragedy and to recognize their responsibility in providing a…

  5. Environmental and health impacts of fine and ultrafine metallic particles: Assessment of threat scores

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goix, Sylvaine; UMR 5245 CNRS-INP-UPS, EcoLab; Lévêque, Thibaut

    2014-08-15

    This study proposes global threat scores to prioritize the harmfulness of anthropogenic fine and ultrafine metallic particles (FMP) emitted into the atmosphere at the global scale. (Eco)toxicity of physicochemically characterized FMP oxides for metals currently observed in the atmosphere (CdO, CuO, PbO, PbSO{sub 4}, Sb{sub 2}O{sub 3}, and ZnO) was assessed by performing complementary in vitro tests: ecotoxicity, human bioaccessibility, cytotoxicity, and oxidative potential. Using an innovative methodology based on the combination of (eco)toxicity and physicochemical results, the following hazard classification of the particles is proposed: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}. Both cadmium compounds exhibited the highest threat score duemore » to their high cytotoxicity and bioaccessible dose, whatever their solubility and speciation, suggesting that cadmium toxicity is due to its chemical form rather than its physical form. In contrast, the Sb{sub 2}O{sub 3} threat score was the lowest due to particles with low specific area and solubility, with no effects except a slight oxidative stress. As FMP physicochemical properties reveal differences in specific area, crystallization systems, dissolution process, and speciation, various mechanisms may influence their biological impact. Finally, this newly developed and global approach could be widely used in various contexts of pollution by complex metal particles and may improve risk management. - Highlights: • Seven micro- and nano- monometallic characterized particles were studied as references. • Bioaccessibility, eco and cytotoxicity, and oxidative potential assays were performed. • According to calculated threat scores: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}.« less

  6. Target assessment for antiparasitic drug discovery

    PubMed Central

    Frearson, Julie A.; Wyatt, Paul G.; Gilbert, Ian H.; Fairlamb, Alan H.

    2010-01-01

    Drug discovery is a high-risk, expensive and lengthy process taking at least 12 years and costing upwards of US$500 million per drug to reach the clinic. For neglected diseases, the drug discovery process is driven by medical need and guided by pre-defined target product profiles. Assessment and prioritisation of the most promising targets for entry into screening programmes is crucial for maximising chances of success. Here we describe criteria used in our drug discovery unit for target assessment and introduce the ‘traffic light’ system as a prioritisation and management tool. We hope this brief review will stimulate basic scientists to acquire additional information necessary for drug discovery. PMID:17962072

  7. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  8. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    PubMed

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Attentional bias towards health-threat information in chronic fatigue syndrome.

    PubMed

    Hou, Ruihua; Moss-Morris, Rona; Bradley, Brendan P; Peveler, Robert; Mogg, Karin

    2008-07-01

    To investigate whether individuals with chronic fatigue syndrome (CFS) show an attentional bias towards health-threat information. Attentional bias (AB) was assessed in individuals with CFS and healthy controls using a visual probe task which presented health-threat and neutral words and pictures for 500 ms. Self-report questionnaires were used to assess CFS symptoms, depression, anxiety, and social desirability. Compared to a healthy control group, the CFS group showed an enhanced AB towards heath-threat stimuli relative to neutral stimuli. The AB was not influenced by the type of stimulus (pictures vs. words). The finding of an AB towards health-threat information in individuals with CFS is supportive of models of CFS which underlie cognitive behavior therapy.

  10. Categorizing threat : building and using a generic threat matrix.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and ismore » not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.« less

  11. Student Reports of Peer Threats of Violence: Prevalence and Outcomes

    ERIC Educational Resources Information Center

    Nekvasil, Erin K.; Cornell, Dewey G.

    2012-01-01

    Authorities in education and law enforcement have recommended that schools use a threat-assessment approach to prevent violence, but there is relatively little research on characteristics and outcomes of threats among students. The current study examined student reports of threat experiences in a sample of 3,756 high school students. Approximately…

  12. Facility target insert shielding assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mocko, Michal

    2015-10-06

    Main objective of this report is to assess the basic shielding requirements for the vertical target insert and retrieval port. We used the baseline design for the vertical target insert in our calculations. The insert sits in the 12”-diameter cylindrical shaft extending from the service alley in the top floor of the facility all the way down to the target location. The target retrieval mechanism is a long rod with the target assembly attached and running the entire length of the vertical shaft. The insert also houses the helium cooling supply and return lines each with 2” diameter. In themore » present study we focused on calculating the neutron and photon dose rate fields on top of the target insert/retrieval mechanism in the service alley. Additionally, we studied a few prototypical configurations of the shielding layers in the vertical insert as well as on the top.« less

  13. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    PubMed

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  14. Measuring attentional biases for threat in children and adults.

    PubMed

    LoBue, Vanessa

    2014-10-19

    Investigators have long been interested in the human propensity for the rapid detection of threatening stimuli. However, until recently, research in this domain has focused almost exclusively on adult participants, completely ignoring the topic of threat detection over the course of development. One of the biggest reasons for the lack of developmental work in this area is likely the absence of a reliable paradigm that can measure perceptual biases for threat in children. To address this issue, we recently designed a modified visual search paradigm similar to the standard adult paradigm that is appropriate for studying threat detection in preschool-aged participants. Here we describe this new procedure. In the general paradigm, we present participants with matrices of color photographs, and ask them to find and touch a target on the screen. Latency to touch the target is recorded. Using a touch-screen monitor makes the procedure simple and easy, allowing us to collect data in participants ranging from 3 years of age to adults. Thus far, the paradigm has consistently shown that both adults and children detect threatening stimuli (e.g., snakes, spiders, angry/fearful faces) more quickly than neutral stimuli (e.g., flowers, mushrooms, happy/neutral faces). Altogether, this procedure provides an important new tool for researchers interested in studying the development of attentional biases for threat.

  15. Understanding the Anti-Access and Area Denial Threat: An Army Perspective

    DTIC Science & Technology

    2015-05-21

    Perspective Approved by: , Monograph Director Peter J . Schifferle, PhD , Seminar Leader James MacGregor, COL...targeting purposes. See also: Ben Berk , China’s Silver Bullet: A Brief Analysis of the Threat Posed by the PRC’s Anti- ship Ballistic Missile (Chapel...16Ben Berk , China’s Silver Bullet: A Brief Analysis of the Threat Posed by the PRC’s Anti

  16. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2012-10-01 2012-10-01 false Access to cargo: Security threat assessments for...

  17. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo: Security threat assessments for...

  18. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2013-10-01 2013-10-01 false Access to cargo: Security threat assessments for...

  19. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the cargo enters an airport Security Identification Display Area or is transferred to another TSA... under §§ 1546.101(a) or (b) accepts the cargo, until the cargo— (A) Enters an airport Security... 49 Transportation 9 2011-10-01 2011-10-01 false Access to cargo: Security threat assessments for...

  20. Identifying species threat hotspots from global supply chains.

    PubMed

    Moran, Daniel; Kanemoto, Keiichiro

    2017-01-04

    Identifying hotspots of species threat has been a successful approach for setting conservation priorities. One important challenge in conservation is that, in many hotspots, export industries continue to drive overexploitation. Conservation measures must consider not just the point of impact, but also the consumer demand that ultimately drives resource use. To understand which species threat hotspots are driven by which consumers, we have developed a new approach to link a set of biodiversity footprint accounts to the hotspots of threatened species on the IUCN Red List of Threatened Species. The result is a map connecting consumption to spatially explicit hotspots driven by production on a global scale. Locating biodiversity threat hotspots driven by consumption of goods and services can help to connect conservationists, consumers, companies and governments in order to better target conservation actions.

  1. Environmental and health impacts of fine and ultrafine metallic particles: assessment of threat scores.

    PubMed

    Goix, Sylvaine; Lévêque, Thibaut; Xiong, Tian-Tian; Schreck, Eva; Baeza-Squiban, Armelle; Geret, Florence; Uzu, Gaëlle; Austruy, Annabelle; Dumat, Camille

    2014-08-01

    This study proposes global threat scores to prioritize the harmfulness of anthropogenic fine and ultrafine metallic particles (FMP) emitted into the atmosphere at the global scale. (Eco)toxicity of physicochemically characterized FMP oxides for metals currently observed in the atmosphere (CdO, CuO, PbO, PbSO(4), Sb(2)O(3), and ZnO) was assessed by performing complementary in vitro tests: ecotoxicity, human bioaccessibility, cytotoxicity, and oxidative potential. Using an innovative methodology based on the combination of (eco)toxicity and physicochemical results, the following hazard classification of the particles is proposed: CdCl2~CdO>CuO>PbO>ZnO>PbSO(4)>Sb(2)O(3). Both cadmium compounds exhibited the highest threat score due to their high cytotoxicity and bioaccessible dose, whatever their solubility and speciation, suggesting that cadmium toxicity is due to its chemical form rather than its physical form. In contrast, the Sb(2)O(3) threat score was the lowest due to particles with low specific area and solubility, with no effects except a slight oxidative stress. As FMP physicochemical properties reveal differences in specific area, crystallization systems, dissolution process, and speciation, various mechanisms may influence their biological impact. Finally, this newly developed and global approach could be widely used in various contexts of pollution by complex metal particles and may improve risk management. Copyright © 2014 Elsevier Inc. All rights reserved.

  2. Ecologically relevant neurobehavioral assessment of the development of threat learning.

    PubMed

    Boulanger Bertolus, Julie; Mouly, Anne-Marie; Sullivan, Regina M

    2016-10-01

    As altricial infants gradually transition to adults, their proximate environment changes. In three short weeks, pups transition from a small world with the caregiver and siblings to a complex milieu rich in dangers as their environment expands. Such contrasting environments require different learning abilities and lead to distinct responses throughout development. Here, we will review some of the learned fear conditioned responses to threats in rats during their ontogeny, including behavioral and physiological measures that permit the assessment of learning and its supporting neurobiology from infancy through adulthood. In adulthood, odor-shock conditioning produces robust fear learning to the odor that depends upon the amygdala and related circuitry. Paradoxically, this conditioning in young pups fails to support fear learning and supports approach learning to the odor previously paired with shock. This approach learning is mediated by the infant attachment network that does not include the amygdala. During the age range when pups transition from the infant to the adult circuit (10-15 d old), pups have access to both networks: odor-shock conditioning in maternal presence uses the attachment circuit but the adult amygdala-dependent circuit when alone. However, throughout development (as young as 5 d old) the attachment associated learning can be overridden and amygdala-dependent fear learning supported, if the mother expresses fear in the presence of the pup. This social modulation of the fear permits the expression of defense reactions in life threatening situations informed by the caregiver but prevents the learning of the caregiver itself as a threat. © 2016 Boulanger Bertolus et al.; Published by Cold Spring Harbor Laboratory Press.

  3. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  4. Threats to information security of real-time disease surveillance systems.

    PubMed

    Henriksen, Eva; Johansen, Monika A; Baardsgaard, Anders; Bellika, Johan G

    2009-01-01

    This paper presents the main results from a qualitative risk assessment of information security aspects for a new real-time disease surveillance approach in general, and for the Snow surveillance system in particular. All possible security threats and acceptable solutions, and the implications these solutions had to the design of the system, were discussed. Approximately 30 threats were identified. None of these got an unacceptable high risk level originally, but two got medium risk level, of which one was concluded to be unacceptable after further investigation. Of the remaining low risk threats, some have severe consequence, thus requiring particular assessment. Since it is very important to identify and solve all security threats before real-time solutions can be used in a wide scale, additional investigations are needed.

  5. Content and Language in Targets and Target Related Assessment (TTRA): Implications for Schools.

    ERIC Educational Resources Information Center

    Clark, John L.; Scarino, Angela

    This paper explores the nature of content and language across the curriculum in relation to the Targets and Target-Related Assessment (TTRA) initiative. The TTRA is an assessment initiative designed to improve the quality of individual learning from Primary 1 to Secondary 5 in Chinese, English, and Mathematics in Hong Kong. A picture of content…

  6. Threat perception in mild cognitive impairment and early dementia.

    PubMed

    Henry, Julie D; Thompson, Claire; Ruffman, Ted; Leslie, Felicity; Withall, Adrienne; Sachdev, Perminder; Brodaty, Henry

    2009-09-01

    Mild cognitive impairment (MCI) and dementia affect many aspects of emotion processing. Even though the ability to detect threat is a particularly important aspect of emotion processing, no study to date has assessed threat perception in either of these groups. The purpose of the present study was to test whether individuals with MCI (n = 38) and mild dementia (n = 34) have difficulty differentiating between faces and situations normatively judged to be either high or low in threat relative to age-matched controls (n = 34). To achieve this aim, all participants completed 2 danger rating tasks that involved viewing and rating high- and low-danger images. It was also assessed whether threat perception was related to cognitive functioning and emotion recognition. The results indicated that all 3 groups were accurately, and comparably, able to differentiate high from low-danger faces. However, the dementia group had difficulties differentiating high from low-danger situations, which reflected a bias to overattribute the level of threat posed by normatively judged nonthreatening situations. This difficulty was related to more general cognitive decline.

  7. Patterns and biases of climate change threats in the IUCN Red List.

    PubMed

    Trull, Nicholas; Böhm, Monika; Carr, Jamie

    2018-02-01

    International Union for Conservation of Nature (IUCN) Red List assessments rely on published data and expert inputs, and biases can be introduced where underlying definitions and concepts are ambiguous. Consideration of climate change threat is no exception, and recently numerous approaches to assessing the threat of climate change to species have been developed. We explored IUCN Red List assessments of amphibians and birds to determine whether species listed as threatened by climate change display distinct patterns in terms of habitat occupied and additional nonclimatic threats faced. We compared IUCN Red List data with a published data set of species' biological and ecological traits believed to infer high vulnerability to climate change and determined whether distributions of climate change-threatened species on the IUCN Red List concur with those of climate change-threatened species identified with the trait-based approach and whether species possessing these traits are more likely to have climate change listed as a threat on the IUCN Red List. Species in some ecosystems (e.g., grassland, shrubland) and subject to particular threats (e.g., invasive species) were more likely to have climate change as a listed threat. Geographical patterns of climate change-threatened amphibians and birds on the IUCN Red List were incongruent with patterns of global species richness and patterns identified using trait-based approaches. Certain traits were linked to increases or decreases in the likelihood of a species being threatened by climate change. Broad temperature tolerance of a species was consistently related to an increased likelihood of climate change threat, indicating counterintuitive relationships in IUCN assessments. To improve the robustness of species assessments of the vulnerability or extinction risk associated with climate change, we suggest IUCN adopt a more cohesive approach whereby specific traits highlighted by our results are considered in Red List

  8. Supporting Red List threat assessments with GeoCAT: geospatial conservation assessment tool.

    PubMed

    Bachman, Steven; Moat, Justin; Hill, Andrew W; de Torre, Javier; Scott, Ben

    2011-01-01

    GeoCAT is an open source, browser based tool that performs rapid geospatial analysis to ease the process of Red Listing taxa. Developed to utilise spatially referenced primary occurrence data, the analysis focuses on two aspects of the geographic range of a taxon: the extent of occurrence (EOO) and the area of occupancy (AOO). These metrics form part of the IUCN Red List categories and criteria and have often proved challenging to obtain in an accurate, consistent and repeatable way. Within a familiar Google Maps environment, GeoCAT users can quickly and easily combine data from multiple sources such as GBIF, Flickr and Scratchpads as well as user generated occurrence data. Analysis is done with the click of a button and is visualised instantly, providing an indication of the Red List threat rating, subject to meeting the full requirements of the criteria. Outputs including the results, data and parameters used for analysis are stored in a GeoCAT file that can be easily reloaded or shared with collaborators. GeoCAT is a first step toward automating the data handling process of Red List assessing and provides a valuable hub from which further developments and enhancements can be spawned.

  9. When and Why Threats Go Undetected: Impacts of Event Rate and Shift Length on Threat Detection Accuracy During Airport Baggage Screening.

    PubMed

    Meuter, Renata F I; Lacherez, Philippe F

    2016-03-01

    We aimed to assess the impact of task demands and individual characteristics on threat detection in baggage screeners. Airport security staff work under time constraints to ensure optimal threat detection. Understanding the impact of individual characteristics and task demands on performance is vital to ensure accurate threat detection. We examined threat detection in baggage screeners as a function of event rate (i.e., number of bags per minute) and time on task across 4 months. We measured performance in terms of the accuracy of detection of Fictitious Threat Items (FTIs) randomly superimposed on X-ray images of real passenger bags. Analyses of the percentage of correct FTI identifications (hits) show that longer shifts with high baggage throughput result in worse threat detection. Importantly, these significant performance decrements emerge within the first 10 min of these busy screening shifts only. Longer shift lengths, especially when combined with high baggage throughput, increase the likelihood that threats go undetected. Shorter shift rotations, although perhaps difficult to implement during busy screening periods, would ensure more consistently high vigilance in baggage screeners and, therefore, optimal threat detection and passenger safety. © 2015, Human Factors and Ergonomics Society.

  10. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could providemore » a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.« less

  11. Avoidance temperament and social-evaluative threat in college students' math performance: a mediation model of math and test anxiety.

    PubMed

    Liew, Jeffrey; Lench, Heather C; Kao, Grace; Yeh, Yu-Chen; Kwok, Oi-man

    2014-01-01

    Standardized testing has become a common form of student evaluation with high stakes, and limited research exists on understanding the roles of students' personality traits and social-evaluative threat on their academic performance. This study examined the roles of avoidance temperament (i.e., fear and behavioral inhibition) and evaluative threat (i.e., fear of failure and being viewed as unintelligent) in standardized math test and course grades in college students. Undergraduate students (N=184) from a large public university were assessed on temperamental fear and behavioral inhibition. They were then given 15 minutes to complete a standardized math test. After the test, students provided data on evaluative threat and their math performance (scores on standardized college entrance exam and average grades in college math courses). Results indicate that avoidance temperament was linked to social-evaluative threat and low standardized math test scores. Furthermore, evaluative threat mediated the influence of avoidance temperament on both types of math performance. Results have educational and clinical implications, particularly for students at risk for test anxiety and underperformance. Interventions targeting emotion regulation and stress management skills may help individuals reduce their math and test anxieties.

  12. Region 6 Targeted Brownfields Assessment

    EPA Pesticide Factsheets

    A Target Brownfields Assessment (TBA) is a free service the EPA Region 6 Brownfields Team provides to communities to support their eligible brownfields projects. Region 6 consists of Arkansas, Louisiana, new Mexico, Oklahoma, and Texas.

  13. An epidemiological assessment of problematic contacts to members of Congress.

    PubMed

    Scalora, Mario J; Baumgartner, Jerome V; Zimmerman, William; Callaway, David; Hatch Maillette, Mary A; Covell, Christmas N; Palarea, Russell E; Krebs, Jason A; Washington, David O

    2002-11-01

    In order to assess the nature of threat assessment activity pertaining to members of Congress, 4387 cases involving threatening and other problematic contact were analyzed. The cases were studied regarding subject characteristics, articulated motives, as well as several aspects of contact behavior in relation to approach behavior. Approachers were significantly less likely to have articulated threat language prior to or during their contacts and were also less likely to have stated a policy grievance (foreign or domestic) as the source of their concern. Further, approachers were substantially more likely to have expressed help seeking requests as part of their prior and approach-related contacts and were less likely to have had racial or sexualized content within their contacts. Approachers were also significantly more likely to have had a criminal record as well as displayed symptoms suggestive of major mental illness. Subjects engaging in approach behavior were also less likely to have used an alias, were less likely to be a direct constituent of the target and were more likely to have contacted multiple congressional targets. The implications for threat assessment activity are discussed.

  14. Cyber threat impact assessment and analysis for space vehicle architectures

    NASA Astrophysics Data System (ADS)

    McGraw, Robert M.; Fowler, Mark J.; Umphress, David; MacDonald, Richard A.

    2014-06-01

    This paper covers research into an assessment of potential impacts and techniques to detect and mitigate cyber attacks that affect the networks and control systems of space vehicles. Such systems, if subverted by malicious insiders, external hackers and/or supply chain threats, can be controlled in a manner to cause physical damage to the space platforms. Similar attacks on Earth-borne cyber physical systems include the Shamoon, Duqu, Flame and Stuxnet exploits. These have been used to bring down foreign power generation and refining systems. This paper discusses the potential impacts of similar cyber attacks on space-based platforms through the use of simulation models, including custom models developed in Python using SimPy and commercial SATCOM analysis tools, as an example STK/SOLIS. The paper discusses the architecture and fidelity of the simulation model that has been developed for performing the impact assessment. The paper walks through the application of an attack vector at the subsystem level and how it affects the control and orientation of the space vehicle. SimPy is used to model and extract raw impact data at the bus level, while STK/SOLIS is used to extract raw impact data at the subsystem level and to visually display the effect on the physical plant of the space vehicle.

  15. Advances in threat assessment and their application to forest and rangeland management—Volume 1 and Volume 2.

    Treesearch

    John M. Pye; H. Michael Rauscher; Yasmeen Sands; Danny C. Lee; Jerome S. Beatty

    2010-01-01

    In July 2006, more than 170 researchers and managers from the United States, Canada, and Mexico convened in Boulder, Colorado, to discuss the state of the science in environmental threat assessment. This two-volume general technical report compiles peer-reviewed papers that were among those presented during the 3-day conference. Papers are organized by four broad...

  16. Assessing Threat Detection Scenarios through Hypothesis Generation and Testing

    DTIC Science & Technology

    2015-12-01

    Dog Day scenario .............................................................................................................. 9...Figure 1. Rankings of priority threats identified in the Dog Day scenario ............................... 9 Figure 2. Rankings of priority...making in uncertain environments relies heavily on pattern matching. Cohen, Freeman, and Wolf (1996) reported that features of the decision problem

  17. Threat Sensitivity in Bipolar Disorder

    PubMed Central

    Muhtadie, Luma; Johnson, Sheri L.

    2015-01-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as “a test of general intelligence.” Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity—including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding— can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. PMID:25688436

  18. Stereotype threat and social function in opioid substitution therapy patients.

    PubMed

    von Hippel, Courtney; Henry, Julie D; Terrett, Gill; Mercuri, Kimberly; McAlear, Karen; Rendell, Peter G

    2017-06-01

    People with a history of substance abuse are subject to widespread stigmatization. It seems likely that this societal disapproval will result in feelings of stereotype threat, or the belief that one is the target of demeaning stereotypes. If so, stereotype threat has the potential to contribute to functional difficulties including poor social outcomes. Eighty drug users on opioid substitution therapy and 84 demographically matched controls completed measures of mental health and social function. The opioid substitution therapy group were additionally asked to complete a measure that focused on their feelings of stereotype threat in relation to their drug use history. Bivariate correlations and hierarchical regression analyses were conducted to establish the magnitude and specificity of the relationship between stereotype threat and social functioning. Relative to controls, the opioid substitution therapy group reported higher levels of negative affect and schizotypy, and poorer social functioning, with all three of these indices significantly correlated with their feelings of stereotype threat. The results also showed that stereotype threat contributed significant unique variance to social functioning in the opioid substitution therapy group, even after taking into account other background, clinical, and mental health variables. Social functioning is an important aspect of recovery, yet these data indicate that people with a history of drug abuse who believe they are the target of stereotypical attitudes have poorer social functioning. This relationship holds after controlling for the impact of other variables on social functioning, including mental health. The theoretical and practical implications of these findings are discussed. Concerns about being stereotyped can shape the social experiences of opioid substitution therapy patients. Opioid substitution therapy patients who feel negatively stereotyped experience greater social function deficits, and this

  19. Integrated response to the dynamic threat of school violence.

    PubMed

    Callaway, David W; Westmoreland, Ted C; Baez, Alejandro A; McKay, Sean A; Raja, Ali S

    2010-01-01

    A terrorist attack on US schools no longer can be considered a Black Swan event. Mounting evidence suggests that extremist organizations actively are targeting US schools. Equally disturbing are data suggesting that schools, universities, and communities are unprepared for large-scale violence. The Operational Medicine Institute Conference on an Integrated Response to the Modern Urban Terrorist Threat revealed significant variations in the perceived threats and critical response gaps among emergency medical providers, law enforcement personnel, politicians, and security specialists. The participants recommended several steps to address these gaps in preparedness, training, responses, and recovery.

  20. The cyber security threat stops in the boardroom.

    PubMed

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  1. Linking terrestrial and marine conservation planning and threats analysis.

    PubMed

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  2. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  3. Girls can play ball: Stereotype threat reduces variability in a motor skill.

    PubMed

    Huber, Meghan E; Brown, Adam J; Sternad, Dagmar

    2016-09-01

    The majority of research on stereotype threat shows what is expected: threat debilitates performance. However, facilitation is also possible, although seldom reported. This study investigated how stereotype threat influences novice females when performing the sensorimotor task of bouncing a ball to a target. We tested the predictions of two prevailing accounts for debilitation and facilitation due to sterotype threat effects: working memory and mere effort. Experimental results showed that variability in performance decreased more in stigmatized females than in control females, consistent with the prediction of the mere effort account, but inconsistent with the working memory account. These findings suggest that stereotype threat effects may be predicated upon the correctness of the dominant motor behavior, rather than on a novice-expert distinction or task difficulty. Further, a comprehensive understanding should incorporate the fact that stereotype threat can facilitate, as well as debilitate, performance. Copyright © 2016 Elsevier B.V. All rights reserved.

  4. An examination of stereotype threat effects on girls' mathematics performance.

    PubMed

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias.

  5. Using population viability criteria to assess strategies to minimize disease threats for an endangered carnivore.

    PubMed

    Doak, Daniel F; Bakker, Victoria J; Vickers, Winston

    2013-04-01

    Outbreaks of infectious disease represent serious threats to the viability of many vertebrate populations, but few studies have included quantitative evaluations of alternative approaches to the management of disease. The most prevalent management approach is monitoring for and rapid response to an epizootic. An alternative is vaccination of a subset of the free-living population (i.e., a "vaccinated core") such that some individuals are partially or fully immune in the event of an epizootic. We developed a simulation model describing epizootic dynamics, which we then embedded in a demographic simulation to assess these alternative approaches to managing rabies epizootics in the island fox (Urocyon littoralis), a species composed of only 6 small populations on the California Channel Islands. Although the monitor and respond approach was superior to the vaccinated-core approach for some transmission models and parameter values, this type of reactive management did not protect the population from rabies under many disease-transmission assumptions. In contrast, a logistically feasible program of prophylactic vaccination for part of the wild population yielded low extinction probabilities across all likely disease-transmission scenarios, even with recurrent disease introductions. Our use of a single metric of successful management-probability of extreme endangerment (i.e., quasi extinction)-to compare very different management approaches allowed an objective assessment of alternative strategies for controlling the threats posed by infectious disease outbreaks. © 2013 Society for Conservation Biology.

  6. Girls Can Play Ball: Stereotype Threat Reduces Variability in a Motor Skill

    PubMed Central

    Huber, Meghan E.; Brown, Adam J.; Sternad, Dagmar

    2016-01-01

    The majority of research on stereotype threat shows what is expected: threat debilitates performance. However, facilitation is also possible, although seldom reported. This study investigated how stereotype threat influences novice females when performing the sensorimotor task of bouncing a ball to target. We tested the predictions of two prevailing accounts for debilitation and facilitation due to ST effects: working memory and mere effort. Experimental results showed that variability in performance decreased more in stigmatized females than in control females, consistent with the prediction of the mere effort account, but inconsistent with the working memory account. These findings suggest that stereotype threat effects may be predicated upon the correctness of the dominant motor behavior rather than on a novice-expert distinction or task difficulty. Further, a comprehensive understanding should incorporate the fact that stereotype threat can facilitate, as well as debilitate, performance. PMID:27249638

  7. Signals of threat do not capture, but prioritize, attention: a conditioning approach.

    PubMed

    Notebaert, Lies; Crombez, Geert; Van Damme, Stefaan; De Houwer, Jan; Theeuwes, Jan

    2011-02-01

    Research suggests that threatening information captures attention more rapidly than neutral information. However, in most studies threat stimuli differ perceptually from neutral stimuli and are instrumental to perform the task, leaving the question unanswered whether threat is sufficient to capture attention. In experiment 1, we designed a visual search task with stimuli of equal salience (colored circles) that have the potential to lead to efficient search (10 ms/item). In experiment 2, one of the colors (conditioned stimulus, CS+) was made threatening by means of fear conditioning. Participants responded to a target presented in one of the circles. Overall, the search was faster on congruent trials (where the target was presented in the CS+) than on baseline trials (where the CS + was absent). Furthermore, the search was slower on incongruent trials (where the target was presented in another color than the CS+) than on baseline trials. The search on congruent trials was affected by set size (90 ms/item), but to a lesser extent than on baseline trials (105 ms/item). We conclude that threat prioritizes, but does not capture attention. PsycINFO Database Record (c) 2011 APA, all rights reserved.

  8. You may worry, but can you recognize threats when you see them?; Neuroticism, threat identifications, and negative affect.

    PubMed

    Tamir, Maya; Robinson, Michael D; Solberg, Emily Crawford

    2006-10-01

    The present studies sought to investigate the hedonic consequences of threat-identification skills at low and high levels of neuroticism. Such skills were assessed in terms of both speed (Study 1) and accuracy (Study 2) of identifying threatening objects in cognitive tasks. As predicted, threat-identification skills interacted with trait neuroticism in predicting subjective experiences. Specifically, individuals high in neuroticism experienced lower levels of negative affect during their everyday lives if they were also skilled in identifying threats in the cognitive tasks (Studies 1-2). Such skills did not matter at low levels of neuroticism. This interactive pattern was also replicated in the context of life domain satisfaction (Study 2). The results support the view that avoidance motivation encompasses multiple component processes, including some that are cognitive in nature, and specifically extends self-regulatory views of neuroticism. Of most importance, our data indicate that threat-identification skills can be hedonically beneficial, rather than costly, at high levels of neuroticism.

  9. In Brief: Threats to species continue

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2009-11-01

    Of 47,677 assessed species, 17,291 are threatened with extinction, according to the latest update of the Red List of Threatened Species issued by the International Union for Conservation of Nature (IUCN) on 3 November. The list indicates that amphibians are the most threatened group of species known to date, with 1895 (nearly 30%) of 6285 amphibians in danger of extinction. Thirty-nine are already extinct or extinct in the wild, 484 are critically endangered, 754 are endangered, and 657 are vulnerable, according to IUCN. Under threat are 21% of mammals, 30% of amphibians, 12% of birds, 28% of reptiles, 37% of freshwater fishes, 70% of plants, and 35% of invertebrates assessed to date. “We have only managed to assess 47,663 species so far; there are many more millions out there which could be under serious threat,” according to IUCN Red List Unit Manager Craig Hilton-Taylor. For more information, visit http://www.iucnredlist.org.

  10. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  11. The virtual-hand illusion: effects of impact and threat on perceived ownership and affective resonance

    PubMed Central

    Ma, Ke; Hommel, Bernhard

    2013-01-01

    The rubber hand illusion refers to the observation that participants perceive “body ownership” for a rubber hand if it moves, or is stroked in synchrony with the participant's real (covered) hand. Research indicates that events targeting artificial body parts can trigger affective responses (affective resonance) only with perceived body ownership, while neuroscientific findings suggest affective resonance irrespective of ownership (e.g., when observing other individuals under threat). We hypothesized that this may depend on the severity of the event. We first replicated previous findings that the rubber hand illusion can be extended to virtual hands—the virtual-hand illusion. We then tested whether hand ownership and affective resonance (assessed by galvanic skin conductance) are modulated by the experience of an event that either “impacted” (a ball hitting the hand) or “threatened” (a knife cutting the hand) the virtual hand. Ownership was stronger if the virtual hand moved synchronously with the participant's own hand, but this effect was independent from whether the hand was impacted or threatened. Affective resonance was mediated by ownership however: In the face of mere impact, participants showed more resonance in the synchronous condition (i.e., with perceived ownership) than in the asynchronous condition. In the face of threat, in turn, affective resonance was independent of synchronicity—participants were emotionally involved even if a threat was targeting a hand that they did not perceive as their own. Our findings suggest that perceived body ownership and affective responses to body-related impact or threat can be dissociated and are thus unlikely to represent the same underlying process. We argue that affective reactions to impact are produced in a top-down fashion if the impacted effector is assumed to be part of one's own body, whereas threatening events trigger affective responses more directly in a bottom-up fashion—irrespective of

  12. Evaluating and ranking the vulnerability of global marine ecosystems to anthropogenic threats.

    PubMed

    Halpern, Benjamin S; Selkoe, Kimberly A; Micheli, Fiorenza; Kappel, Carrie V

    2007-10-01

    Marine ecosystems are threatened by a suite of anthropogenic stressors. Mitigating multiple threats is a daunting task, particularly when funding constraints limit the number of threats that can be addressed. Threats are typically assessed and prioritized via expert opinion workshops that often leave no record of the rationale for decisions, making it difficult to update recommendations with new information. We devised a transparent, repeatable, and modifiable method for collecting expert opinion that describes and documents how threats affect marine ecosystems. Experts were asked to assess the functional impact, scale, and frequency of a threat to an ecosystem; the resistance and recovery time of an ecosystem to a threat; and the certainty of these estimates. To quantify impacts of 38 distinct anthropogenic threats on 23 marine ecosystems, we surveyed 135 experts from 19 different countries. Survey results showed that all ecosystems are threatened by at least nine threats and that nine ecosystems are threatened by >90% of existing threats. The greatest threats (highest impact scores) were increasing sea temperature, demersal destructive fishing, and point-source organic pollution. Rocky reef, coral reef, hard-shelf, mangrove, and offshore epipelagic ecosystems were identified as the most threatened. These general results, however, may be partly influenced by the specific expertise and geography of respondents, and should be interpreted with caution. This approach to threat analysis can identify the greatest threats (globally or locally), most widespread threats, most (or least) sensitive ecosystems, most (or least) threatened ecosystems, and other metrics of conservation value. Additionally, it can be easily modified, updated as new data become available, and scaled to local or regional settings, which would facilitate informed and transparent conservation priority setting.

  13. The cyber threat, trophy information and the fortress mentality.

    PubMed

    Scully, Tim

    2011-10-01

    'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.

  14. Attitudes toward Stillbirth and Death Threat Level in a Sample of Obstetricians.

    ERIC Educational Resources Information Center

    Kirkley-Best, Elizabeth; And Others

    1985-01-01

    Obstetricians and obstetrical residents (N=70) were polled on their attitudes regarding stillbirth and simultaneously were assessed for their level of death threat as measured by the Threat Index. No effect of death threat level on attitudes toward stillbirth was observed, even when extreme scores were isolated and compared. (Author/NRB)

  15. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  16. Prevention of Targeted School Violence by Responding to Students' Psychosocial Crises: The NETWASS Program

    ERIC Educational Resources Information Center

    Leuschner, Vincenz; Fiedler, Nora; Schultze, Martin; Ahlig, Nadine; Göbel, Kristin; Sommer, Friederike; Scholl, Johanna; Cornell, Dewey; Scheithauer, Herbert

    2017-01-01

    The standardized, indicated school-based prevention program "Networks Against School Shootings" combines a threat assessment approach with a general model of prevention of emergency situations in schools through early intervention in student psychosocial crises and training teachers to recognize warning signs of targeted school violence.…

  17. Historical precedence and technical requirements of biological weapons use : a threat assessment.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Estes, Daniel P.; Vogel, Kathleen Margaret; Gaudioso, Jennifer Marie

    2004-05-01

    The threat from biological weapons is assessed through both a comparative historical analysis of the patterns of biological weapons use and an assessment of the technological hurdles to proliferation and use that must be overcome. The history of biological weapons is studied to learn how agents have been acquired and what types of states and substate actors have used agents. Substate actors have generally been more willing than states to use pathogens and toxins and they have focused on those agents that are more readily available. There has been an increasing trend of bioterrorism incidents over the past century, butmore » states and substate actors have struggled with one or more of the necessary technological steps. These steps include acquisition of a suitable agent, production of an appropriate quantity and form, and effective deployment. The technological hurdles associated with the steps present a real barrier to producing a high consequence event. However, the ever increasing technological sophistication of society continually lowers the barriers, resulting in a low but increasing probability of a high consequence bioterrorism event.« less

  18. Adrenocortical responses to offspring-directed threats in two open-nesting birds.

    PubMed

    Butler, Luke K; Bisson, Isabelle-Anne; Hayden, Timothy J; Wikelski, Martin; Romero, L Michael

    2009-07-01

    Dependent young are often easy targets for predators, so for many parent vertebrates, responding to offspring-directed threats is a fundamental part of reproduction. We tested the parental adrenocortical response of the endangered black-capped vireo (Vireo atricapilla) and the common white-eyed vireo (V. griseus) to acute and chronic threats to their offspring. Like many open-nesting birds, our study species experience high offspring mortality. Parents responded behaviorally to a predator decoy or human 1-2m from their nests, but, in contrast to similar studies of cavity-nesting birds, neither these acute threats nor chronic offspring-directed threats altered plasma corticosterone concentrations of parents. Although parents in this study showed no corticosterone response to offspring-directed threats, they always increased corticosterone concentrations in response to capture. To explain these results, we propose that parents perceive their risk of nest-associated death differently depending on nest type, with cavity-nesting adults perceiving greater risk to themselves than open-nesters that can readily detect and escape from offspring-directed threats. Our results agree with previous studies suggesting that the hypothalamic-pituitary-adrenal axis, a major physiological mechanism for coping with threats to survival, probably plays no role in coping with threats to offspring when risks to parents and offspring are not correlated. We extend that paradigm by demonstrating that nest style may influence how adults perceive the correlation between offspring-directed and self-directed threats.

  19. THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E

    Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.

  20. Reactivity to uncertain threat as a familial vulnerability factor for alcohol use disorder.

    PubMed

    Gorka, S M; Hee, D; Lieberman, L; Mittal, V A; Phan, K L; Shankman, S A

    2016-12-01

    When sober, problematic drinkers display exaggerated reactivity to threats that are uncertain (U-threat). Since this aversive affective state can be alleviated via acute alcohol intoxication, it has been posited that individuals who exhibit heightened reactivity to U-threat at baseline are motivated to use alcohol as a means of avoidance-based coping, setting the stage for excessive drinking. To date, however, no study has attempted to characterize the dispositional nature of exaggerated reactivity to U-threat and test whether it is a vulnerability factor or exclusively a disease marker of problematic alcohol use. The current investigation utilized a family study design to address these gaps by examining whether (1) reactivity to U-threat is associated with risk for problematic alcohol use, defined by family history of alcohol use disorder (AUD) and (2) reactivity to U-threat is correlated amongst adult biological siblings. A total of 157 families, and 458 individuals, participated in the study and two biological siblings completed a threat-of-shock task designed to probe reactivity to U-threat and predictable threat (P-threat). Startle potentiation was collected as an index of aversive responding. Within biological siblings, startle potentiation to U-threat [intraclass correlation (ICC) = 0.35] and P-threat (ICC = 0.63) was significantly correlated. In addition, independent of an individuals' own AUD status, startle potentiation to U-threat, but not P-threat, was positively associated with risk for AUD (i.e. AUD family history). This suggests that heightened reactivity to U-threat may be a familial vulnerability factor for problematic drinking and a novel prevention target for AUD.

  1. Threat affects risk preferences in movement decision making

    PubMed Central

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  2. Threat affects risk preferences in movement decision making.

    PubMed

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  3. Threat Assessment Teams: A Model for Coordinating the Institutional Response and Reducing Legal Liability when College Students Threaten Suicide

    ERIC Educational Resources Information Center

    Penven, James C.; Janosik, Steven M.

    2012-01-01

    Increasing numbers of college students with mental health issues are enrolling in college. If these students threaten suicide they present serious legal issues for college officials. Lack of communication and coordination of a response to these students exacerbates the issue. Threat assessment teams can serve as mechanisms to coordinate the…

  4. Portable Integrated Wireless Device Threat Assessment to Aircraft Radio Systems

    NASA Technical Reports Server (NTRS)

    Salud, Maria Theresa P.; Williams, Reuben A. (Technical Monitor)

    2004-01-01

    An assessment was conducted on multiple wireless local area network (WLAN) devices using the three wireless standards for spurious radiated emissions to determine their threat to aircraft radio navigation systems. The measurement process, data and analysis are provided for devices tested using IEEE 802.11a, IEEE 802.11b, and Bluetooth as well as data from portable laptops/tablet PCs and PDAs (grouping known as PEDs). A comparison was made between wireless LAN devices and portable electronic devices. Spurious radiated emissions were investigated in the radio frequency bands for the following aircraft systems: Instrument Landing System Localizer and Glideslope, Very High Frequency (VHF) Communication, VHF Omnidirectional Range, Traffic Collision Avoidance System, Air Traffic Control Radar Beacon System, Microwave Landing System and Global Positioning System. Since several of the contiguous navigation systems were grouped under one encompassing measurement frequency band, there were five measurement frequency bands where spurious radiated emissions data were collected for the PEDs and WLAN devices. The report also provides a comparison between emissions data and regulatory emission limit.

  5. Evaluating anthropogenic threats to endangered killer whales to inform effective recovery plans.

    PubMed

    Lacy, Robert C; Williams, Rob; Ashe, Erin; Balcomb Iii, Kenneth C; Brent, Lauren J N; Clark, Christopher W; Croft, Darren P; Giles, Deborah A; MacDuffee, Misty; Paquet, Paul C

    2017-10-26

    Understanding cumulative effects of multiple threats is key to guiding effective management to conserve endangered species. The critically endangered, Southern Resident killer whale population of the northeastern Pacific Ocean provides a data-rich case to explore anthropogenic threats on population viability. Primary threats include: limitation of preferred prey, Chinook salmon; anthropogenic noise and disturbance, which reduce foraging efficiency; and high levels of stored contaminants, including PCBs. We constructed a population viability analysis to explore possible demographic trajectories and the relative importance of anthropogenic stressors. The population is fragile, with no growth projected under current conditions, and decline expected if new or increased threats are imposed. Improvements in fecundity and calf survival are needed to reach a conservation objective of 2.3% annual population growth. Prey limitation is the most important factor affecting population growth. However, to meet recovery targets through prey management alone, Chinook abundance would have to be sustained near the highest levels since the 1970s. The most optimistic mitigation of noise and contaminants would make the difference between a declining and increasing population, but would be insufficient to reach recovery targets. Reducing acoustic disturbance by 50% combined with increasing Chinook by 15% would allow the population to reach 2.3% growth.

  6. Preliminary development of a GIS-tool to assess threats to shallow groundwater quality from soil pollutants in Glasgow, UK (GRASP).

    NASA Astrophysics Data System (ADS)

    Dochartaigh, B. É. Ó.; Fordyce, F. M.; Ander, E. L.; Bonsor, H. C.

    2009-04-01

    The protection of groundwater and related surface water quality is a key aspect of the European Union Water Framework Directive and environmental legislation in many countries worldwide. Globally, the protection of urban groundwater resources and related ecosystem services is of growing concern as urbanisation increases. Although urban areas are often where groundwater resources are most in need of protection, there is frequently a lack of information about threats to groundwater quality. Most studies of soil and groundwater contamination, although detailed, are site-specific, and city-wide overviews are generally lacking. The British Geological Survey (BGS) is currently undertaking the Clyde Urban Super-Project (CUSP), delivering multi-disciplinary geoscience products for the Glasgow conurbation. Under this project, a GIS-based prioritisation tool known as GRASP (GRoundwater And Soil Pollutants) has been trialled to aid urban planning and sustainable development by providing a broad-scale assessment of threats to groundwater quality across the conurbation. GRASP identifies areas where shallow groundwater quality is at greatest threat from the leaching and downward movement of potentially harmful metals in the soil. Metal contamination is a known problem in many urban centres including Glasgow, which has a long industrial heritage and associated contamination legacy, notably with respect to Cr. GRASP is based primarily upon an existing British Standard - International Standards Organisation methodology to determine the leaching potential of metals from soils, which has been validated for 11 metals: Al, Fe, Cd, Co, Cr, Cu, Hg, Ni, Mn, Pb and Zn (BS-ISO 15175:2004). However, the GRASP tool is innovative as it combines assessments of soil leaching potential with soil metal content data to highlight threats to shallow groundwater quality. The input parameters required for GRASP (soil pH, clay, organic matter, sesquioxide and metal content) are based upon a systematic

  7. Attention Training and the Threat Bias: An ERP Study

    PubMed Central

    O’Toole, Laura; Dennis, Tracy A.

    2011-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these changes remain unclear. To address this issue, 49 non-anxious adults were randomly assigned to either attentional training toward or training away from threat using a modified version of the dot probe task. Behavioral measures of attentional biases were also generated pre- and post-training using the dot probe task. Event-related potentials (ERPs) were generated to threat and non-threat face pairs and probes during pre- and post-training assessments. Effects of training on behavioral measures of the threat bias were significant, but only for those participants showing pre-training biases. Attention training also influenced early spatial attention, as measured by post-training P1 amplitudes to cues. Results illustrate the importance of taking pre-training attention biases in non-anxious individuals into account when evaluating the effects of attention training and tracking physiological changes in attention following training. PMID:22083026

  8. Assessing Potential of VIIRS Data for Contribution to a Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.

    2007-01-01

    This viewgraph presentation reviews the contributions by the Rapid Prototyping Capability (RPC) towards using Visible Infrared Imager / Radiometer Suite (VIIRS) data in assessing the damage to forests. The Healthy Forest Restoration Act of 2003 mandates development of national Early Warning System (EWS) for forest threat monitoring and mitigation. NASA Stennis is working with the US Forest Service to develop needed components of this EWS. The use of MODIS data for monitoring forest disturbance at broad regional scales is a componet of this program. This RPC experiment was initiated to assess potential of the MODIS follow-on, VIIRS, for monitoring forest disturbance at broad scales and thereby contributing to the EWS. This presentation reviews the potential use of the VIIRS to examine the damage to forests caused by gyspy moths in the West Virginia and Virginia area.

  9. Nationwide assessment of nonpoint source threats to water quality

    Treesearch

    Thomas C. Brown; Pamela Froemke

    2012-01-01

    Water quality is a continuing national concern, in part because the containment of pollution from nonpoint (diffuse) sources remains a challenge. We examine the spatial distribution of nonpoint-source threats to water quality. On the basis of comprehensive data sets for a series of watershed stressors, the relative risk of water-quality impairment was estimated for the...

  10. Response of School Personnel to Student Threat Assessment Training

    ERIC Educational Resources Information Center

    Allen, Korrie; Cornell, Dewey; Lorek, Edward; Sheras, Peter

    2008-01-01

    School safety has become an important area of concern for school improvement. This study examined the effects of staff training as means of improving school responses to student threats of violence. A multidisciplinary sample of 351 staff from 2 school divisions completed pre-post training surveys as part of a 1-day training program using the…

  11. A comprehensive approach to managing threats of violence on a university or college campus.

    PubMed

    Regehr, Cheryl; Glancy, Graham D; Carter, Andrea; Ramshaw, Lisa

    Horrifying, high profile acts of violence on campuses remain relatively rare, nevertheless, academic administrators are required to manage threats of violence on campus on an increasingly regular basis. These threats take two primary forms, those in which the perpetrator and the intended victim(s) are clearly identified, often involving repeated threats and threatening behaviour towards an individual; and those involving anonymous threats to commit acts of larger scale violence. Complicating factors in managing these threats include: fear contagion; mass media and social media attention; responsibilities to all members of the university community sometimes including individuals issuing the threat and the intended victims; demands for safety and security measures that are often at odds with professional advice; and permeable campus boundaries that cause security challenges. This paper considers the changing landscape of threat assessment and risk assessment on university and college campuses and suggests opportunities for partnerships between forensic mental health professionals and academic administrators. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Pictures cueing threat: brain dynamics in viewing explicitly instructed danger cues

    PubMed Central

    Schupp, Harald T.

    2012-01-01

    Recent event-related brain potential studies revealed the selective processing of emotional and threatening pictures. Integrating the picture viewing and threat-of-shock paradigm, the present study examined the processing of emotional pictures while they were explicitly instructed to cue threat of real world danger (i.e. electric shocks). Toward this end, 60 pleasant, neutral and unpleasant IAPS-pictures were presented (1 s) as a continuous random stream while high-density EEG and self-reported threat were assessed. In three experimental runs, each picture category was used once as a threat-cue, whereas in the other conditions the same category served as safety-cue. An additional passive viewing run served as a no-threat condition, thus, establishing a threat–safety continuum (threat-cue–safety-cue–no-threat) for each picture category. Threat-of-shock modulated P1, P2 and parieto-occipital LPP amplitudes. While the P1 component differentiated among threat- and no-threat conditions, the P2 and LPP effects were specific to pictures signaling threat-of-shock. Thus, stimulus processing progressively gained more accurate information about environmental threat conditions. Interestingly, the finding of increased EPN and centro-parietal LPP amplitudes to emotional pictures was independent from threat-of-shock manipulation. Accordingly, the results indicate distinct effects associated with the intrinsic significance of emotional pictures and explicitly instructed threat contingencies. PMID:21719425

  13. Ecosystem Risk Assessment Using the Comprehensive Assessment of Risk to Ecosystems (CARE) Tool

    NASA Astrophysics Data System (ADS)

    Battista, W.; Fujita, R.; Karr, K.

    2016-12-01

    Effective Ecosystem Based Management requires a localized understanding of the health and functioning of a given system as well as of the various factors that may threaten the ongoing ability of the system to support the provision of valued services. Several risk assessment models are available that can provide a scientific basis for understanding these factors and for guiding management action, but these models focus mainly on single species and evaluate only the impacts of fishing in detail. We have developed a new ecosystem risk assessment model - the Comprehensive Assessment of Risk to Ecosystems (CARE) - that allows analysts to consider the cumulative impact of multiple threats, interactions among multiple threats that may result in synergistic or antagonistic impacts, and the impacts of a suite of threats on whole-ecosystem productivity and functioning, as well as on specific ecosystem services. The CARE model was designed to be completed in as little as two hours, and uses local and expert knowledge where data are lacking. The CARE tool can be used to evaluate risks facing a single site; to compare multiple sites for the suitability or necessity of different management options; or to evaluate the effects of a proposed management action aimed at reducing one or more risks. This analysis can help users identify which threats are the most important at a given site, and therefore where limited management resources should be targeted. CARE can be applied to virtually any system, and can be modified as knowledge is gained or to better match different site characteristics. CARE builds on previous ecosystem risk assessment tools to provide a comprehensive assessment of fishing and non-fishing threats that can be used to inform environmental management decisions across a broad range of systems.

  14. Ecosystem Risk Assessment Using the Comprehensive Assessment of Risk to Ecosystems (CARE) Tool

    NASA Astrophysics Data System (ADS)

    Battista, W.; Fujita, R.; Karr, K.

    2016-02-01

    Effective Ecosystem Based Management requires a localized understanding of the health and functioning of a given system as well as of the various factors that may threaten the ongoing ability of the system to support the provision of valued services. Several risk assessment models are available that can provide a scientific basis for understanding these factors and for guiding management action, but these models focus mainly on single species and evaluate only the impacts of fishing in detail. We have developed a new ecosystem risk assessment model - the Comprehensive Assessment of Risk to Ecosystems (CARE) - that allows analysts to consider the cumulative impact of multiple threats, interactions among multiple threats that may result in synergistic or antagonistic impacts, and the impacts of a suite of threats on whole-ecosystem productivity and functioning, as well as on specific ecosystem services. The CARE model was designed to be completed in as little as two hours, and uses local and expert knowledge where data are lacking. The CARE tool can be used to evaluate risks facing a single site; to compare multiple sites for the suitability or necessity of different management options; or to evaluate the effects of a proposed management action aimed at reducing one or more risks. This analysis can help users identify which threats are the most important at a given site, and therefore where limited management resources should be targeted. CARE can be applied to virtually any system, and can be modified as knowledge is gained or to better match different site characteristics. CARE builds on previous ecosystem risk assessment tools to provide a comprehensive assessment of fishing and non-fishing threats that can be used to inform environmental management decisions across a broad range of systems.

  15. The relationship of mental illness to targeted contact behavior toward state government agencies and officials.

    PubMed

    Scalora, Mario J; Baumgartner, Jerome V; Plank, Gary L

    2003-01-01

    Research in the burgeoning field of threat assessment has illuminated the importance of mental illness factors when considering risk of targeted violence-particularly related to government agencies and officials. The authors analyzed 127 cases investigated by a state law enforcement agency regarding threatening or other contacts toward public officials or state agency employees prompting security intervention. Univariate and discriminant analysis indicated that mentally ill subjects were significantly more likely to engage in more contacts as well as to make specific demands during such contacts. Mentally ill subjects were also more likely to articulate help-seeking concerns and employ religious themes, as opposed to using insulting, degrading, or ominous language toward the target or issuing complaints regarding policy issues. Contrary to other research, the mentally ill subjects within this sample were not significantly more likely to engage in approach behavior, a threshold for higher risk of violence. Implications for threat assessment activity are discussed. Copyright 2003 John Wiley & Sons, Ltd.

  16. Biological warfare agents as threats to potable water.

    PubMed Central

    Burrows, W D; Renner, S E

    1999-01-01

    Nearly all known biological warfare agents are intended for aerosol application. Although less effective as potable water threats, many are potentially capable of inflicting heavy casualties when ingested. Significant loss of mission capability can be anticipated even when complete recovery is possible. Properly maintained field army water purification equipment can counter this threat, but personnel responsible for the operation and maintenance of the equipment may be most at risk of exposure. Municipal water treatment facilities would be measurably less effective. Some replicating (infectious) agents and a few biotoxins are inactivated by chlorine disinfection; for others chlorine is ineffective or of unknown efficacy. This report assesses the state of our knowledge of agents as potable water threats and contemplates the consequences of intentional or collateral contamination of potable water supplies by 18 replicating agents and 9 biotoxins known or likely to be weaponized or otherwise used as threats. PMID:10585901

  17. Region 6 Targeted Brownfields Assessment Brochure

    EPA Pesticide Factsheets

    A Target Brownfields Assessment (TBA) is a free service the EPA Region 6 Brownfields Team provides to communities to support their eligible brownfields projects. Region 6 consists of Arkansas, Louisiana, New Mexico, Oklahoma, and Texas.

  18. Nuclear threats from small states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one ormore » more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.« less

  19. Threat facilitates subsequent executive control during anxious mood.

    PubMed

    Birk, Jeffrey L; Dennis, Tracy A; Shin, Lisa M; Urry, Heather L

    2011-12-01

    Dual competition framework (DCF) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance. To test these ideas directly, we examined the effects of low-level threat and experimentally induced anxiety on one executive control function, the efficiency of response inhibition. In Study 1, briefly presented stimuli that were mildly threatening (i.e., fearful faces) relative to nonthreatening (i.e., neutral faces) led to facilitated executive control efficiency during experimentally induced anxiety. No such effect was observed during an equally arousing, experimentally induced happy mood state. In Study 2, we assessed the effects of low-level threat, experimentally induced anxiety, and individual differences in trait anxiety on executive control efficiency. Consistent with Study 1, fearful relative to neutral faces led to facilitated executive control efficiency during experimentally induced anxiety. No such effect was observed during an experimentally induced neutral mood state. Moreover, individual differences in trait anxiety did not moderate the effects of threat and anxiety on executive control efficiency. The findings are partially consistent with the predictions of DCF in that low-level threat improved executive control, at least during a state of anxiety. (c) 2011 APA, all rights reserved.

  20. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  1. Threat Assessment & Remediation Analysis (TARA): Methodology Description Version 1.0

    DTIC Science & Technology

    2011-10-01

    collectively support this practice. v Table of Contents 1 Introduction...4 1.3.2.3 Common Vulnerability Scoring System (CVSS) ........................................ 4 1.3.2.4 Microsoft Threat Modeling ...6 2.1.1.3 Eliminate Implausible TTPs ........................................................................ 6 2.1.1.4 Apply Scoring Model

  2. Face processing in adolescents with positive and negative threat bias.

    PubMed

    Sylvester, C M; Petersen, S E; Luby, J L; Barch, D M

    2017-04-01

    Individuals with anxiety disorders exhibit a 'vigilance-avoidance' pattern of attention to threatening stimuli when threatening and neutral stimuli are presented simultaneously, a phenomenon referred to as 'threat bias'. Modifying threat bias through cognitive retraining during adolescence reduces symptoms of anxiety, and so elucidating neural mechanisms of threat bias during adolescence is of high importance. We explored neural mechanisms by testing whether threat bias in adolescents is associated with generalized or threat-specific differences in the neural processing of faces. Subjects were categorized into those with (n = 25) and without (n = 27) threat avoidance based on a dot-probe task at average age 12.9 years. Threat avoidance in this cohort has previously been shown to index threat bias. Brain response to individually presented angry and neutral faces was assessed in a separate session using functional magnetic resonance imaging. Adolescents with threat avoidance exhibited lower activity for both angry and neutral faces relative to controls in several regions in the occipital, parietal, and temporal lobes involved in early visual and facial processing. Results generalized to happy, sad, and fearful faces. Adolescents with a prior history of depression and/or an anxiety disorder had lower activity for all faces in these same regions. A subset of results replicated in an independent dataset. Threat bias is associated with generalized, rather than threat-specific, differences in the neural processing of faces in adolescents. Findings may aid in the development of novel treatments for anxiety disorders that use attention training to modify threat bias.

  3. Threat driven modeling framework using petri nets for e-learning system.

    PubMed

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  4. Countering Threat Networks

    DTIC Science & Technology

    2016-12-21

    PLANNING TO COUNTER THREAT NETWORKS  Joint Intelligence Preparation of the Operational Environment and Threat Networks...Army Expeditionary Forensic Facility in Afghanistan ........ E-9 E-4 Exploitation Support to Intelligence Fusion and Decision Making ......... E-10...Approach The groundwork for successful countering threat networks activities starts with information and intelligence to develop an understanding

  5. Targets as perceivers: How people determine when they will be negatively stereotyped

    PubMed Central

    Wout, Daryl A.; Shih, Margaret J.; Jackson, James S.; Sellers, Robert M.

    2009-01-01

    Research on stereotype threat has demonstrated that when targets are forced to contend with the threat of being negatively stereotyped, their academic performance suffers (Steele & Aronson, 1995). The present research explored how the targets of negative stereotypes determine when they must contend with this threat. Across five experiments, we manipulated both the possibility and probability that Black and female students would be stereotyped as unintelligent prior to taking an analytical test. Collectively, these experiments showed that these students only contended with stereotype threat when they perceived that it was both possible and probable that they would be negatively stereotyped. We discuss the implications of these findings on the experience of being the target of negative stereotypes and on the academic achievement of Blacks and women. PMID:19159136

  6. Spatially explicit multi-threat assessment of food tree species in Burkina Faso: A fine-scale approach

    PubMed Central

    Kindt, Roeland; Loo, Judy; Schmidt, Marco; Bognounou, Fidèle; Da, Sié Sylvestre; Diallo, Ousmane Boukary; Ganaba, Souleymane; Gnoumou, Assan; Lompo, Djingdia; Lykke, Anne Mette; Mbayngone, Elisée; Nacoulma, Blandine Marie Ivette; Ouedraogo, Moussa; Ouédraogo, Oumarou; Parkouda, Charles; Porembski, Stefan; Savadogo, Patrice; Thiombiano, Adjima; Zerbo, Guibien; Vinceti, Barbara

    2017-01-01

    Over the last decades agroforestry parklands in Burkina Faso have come under increasing demographic as well as climatic pressures, which are threatening indigenous tree species that contribute substantially to income generation and nutrition in rural households. Analyzing the threats as well as the species vulnerability to them is fundamental for priority setting in conservation planning. Guided by literature and local experts we selected 16 important food tree species (Acacia macrostachya, Acacia senegal, Adansonia digitata, Annona senegalensis, Balanites aegyptiaca, Bombax costatum, Boscia senegalensis, Detarium microcarpum, Lannea microcarpa, Parkia biglobosa, Sclerocarya birrea, Strychnos spinosa, Tamarindus indica, Vitellaria paradoxa, Ximenia americana, Ziziphus mauritiana) and six key threats to them (overexploitation, overgrazing, fire, cotton production, mining and climate change). We developed a species-specific and spatially explicit approach combining freely accessible datasets, species distribution models (SDMs), climate models and expert survey results to predict, at fine scale, where these threats are likely to have the greatest impact. We find that all species face serious threats throughout much of their distribution in Burkina Faso and that climate change is predicted to be the most prevalent threat in the long term, whereas overexploitation and cotton production are the most important short-term threats. Tree populations growing in areas designated as ‘highly threatened’ due to climate change should be used as seed sources for ex situ conservation and planting in areas where future climate is predicting suitable habitats. Assisted regeneration is suggested for populations in areas where suitable habitat under future climate conditions coincides with high threat levels due to short-term threats. In the case of Vitellaria paradoxa, we suggest collecting seed along the northern margins of its distribution and considering assisted regeneration in

  7. Spatially explicit multi-threat assessment of food tree species in Burkina Faso: A fine-scale approach.

    PubMed

    Gaisberger, Hannes; Kindt, Roeland; Loo, Judy; Schmidt, Marco; Bognounou, Fidèle; Da, Sié Sylvestre; Diallo, Ousmane Boukary; Ganaba, Souleymane; Gnoumou, Assan; Lompo, Djingdia; Lykke, Anne Mette; Mbayngone, Elisée; Nacoulma, Blandine Marie Ivette; Ouedraogo, Moussa; Ouédraogo, Oumarou; Parkouda, Charles; Porembski, Stefan; Savadogo, Patrice; Thiombiano, Adjima; Zerbo, Guibien; Vinceti, Barbara

    2017-01-01

    Over the last decades agroforestry parklands in Burkina Faso have come under increasing demographic as well as climatic pressures, which are threatening indigenous tree species that contribute substantially to income generation and nutrition in rural households. Analyzing the threats as well as the species vulnerability to them is fundamental for priority setting in conservation planning. Guided by literature and local experts we selected 16 important food tree species (Acacia macrostachya, Acacia senegal, Adansonia digitata, Annona senegalensis, Balanites aegyptiaca, Bombax costatum, Boscia senegalensis, Detarium microcarpum, Lannea microcarpa, Parkia biglobosa, Sclerocarya birrea, Strychnos spinosa, Tamarindus indica, Vitellaria paradoxa, Ximenia americana, Ziziphus mauritiana) and six key threats to them (overexploitation, overgrazing, fire, cotton production, mining and climate change). We developed a species-specific and spatially explicit approach combining freely accessible datasets, species distribution models (SDMs), climate models and expert survey results to predict, at fine scale, where these threats are likely to have the greatest impact. We find that all species face serious threats throughout much of their distribution in Burkina Faso and that climate change is predicted to be the most prevalent threat in the long term, whereas overexploitation and cotton production are the most important short-term threats. Tree populations growing in areas designated as 'highly threatened' due to climate change should be used as seed sources for ex situ conservation and planting in areas where future climate is predicting suitable habitats. Assisted regeneration is suggested for populations in areas where suitable habitat under future climate conditions coincides with high threat levels due to short-term threats. In the case of Vitellaria paradoxa, we suggest collecting seed along the northern margins of its distribution and considering assisted regeneration in the

  8. Stereotype threat reduces false recognition when older adults are forewarned.

    PubMed

    Wong, Jessica T; Gallo, David A

    2016-01-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information--a phenomenon attributed to stereotype threat--but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval.

  9. Quantifying anthropogenic threats to orchids using the IUCN Red List.

    PubMed

    Wraith, Jenna; Pickering, Catherine

    2018-04-01

    Orchids are diverse, occur in a wide range of habitats and dominate threatened species lists, but which orchids are threatened, where and by what? Using the International Union for Conservation of Nature Red List, we assessed the range and diversity of threats to orchids globally including identifying four threat syndromes: (1) terrestrial orchids in forests that are endemic to a country and threatened by illegal collecting; (2) orchids threatened by climate change, pollution, transportation and disturbance/development for tourism, and recreation activities, often in East Asia; (3) epiphytic orchids in Sub-Saharan Africa including Madagascar with diverse threats; and (4) South and Southeast Asia orchids threatened by land clearing for shifting agriculture. Despite limitations in the Red List data, the results highlight how conservation efforts can focus on clusters of co-occurring threats in regions while remaining aware of the trifecta of broad threats from plant collecting, land clearing and climate change.

  10. Threat-related selective attention predicts treatment success in childhood anxiety disorders.

    PubMed

    Legerstee, Jeroen S; Tulen, Joke H M; Kallen, Victor L; Dieleman, Gwen C; Treffers, Philip D A; Verhulst, Frank C; Utens, Elisabeth M W J

    2009-02-01

    The present study examined whether threat-related selective attention was predictive of treatment success in children with anxiety disorders and whether age moderated this association. Specific components of selective attention were examined in treatment responders and nonresponders. Participants consisted of 131 children with anxiety disorders (aged 8-16 years), who received standardized cognitive-behavioral therapy. At pretreatment, a pictorial dot-probe task was administered to assess selective attention. Both at pretreatment and posttreatment, diagnostic status of the children was evaluated with a semistructured clinical interview (the Anxiety Disorders Interview Schedule for Children). Selective attention for severely threatening pictures at pretreatment assessment was predictive of treatment success. Examination of the specific components of selective attention revealed that nonresponders showed difficulties to disengage their attention away from severe threat. Treatment responders showed a tendency not to engage their attention toward severe threat. Age was not associated with selective attention and treatment success. Threat-related selective attention is a significant predictor of treatment success in children with anxiety disorders. Clinically anxious children with difficulties disengaging their attention away from severe threat profit less from cognitive-behavioral therapy. For these children, additional training focused on learning to disengage attention away from anxiety-arousing stimuli may be beneficial.

  11. Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach

    NASA Technical Reports Server (NTRS)

    Roy, Sandip; Sridhar, Banavar

    2016-01-01

    , and indeed security solutions are being implemented in the current system. While these security solutions are important, they only provide a piecemeal solution. Particular computers or communication channels are protected from particular attacks, without a holistic view of the air transportation infrastructure. On the other hand, the above-listed incidents highlight that a holistic approach is needed, for several reasons. First, the air transportation infrastructure is a large scale cyber-physical system with multiple stakeholders and diverse legacy assets. It is impractical to protect every cyber- asset from known and unknown disruptions, and instead a strategic view of security is needed. Second, disruptions to the cyber- system can incur complex propagative impacts across the air transportation network, including its physical and human assets. Also, these implications of cyber- events are exacerbated or modulated by other disruptions and operational specifics, e.g. severe weather, operator fatigue or error, etc. These characteristics motivate a holistic and strategic perspective on protecting the air transportation infrastructure from cyber- events. The analysis of cyber- threats to the air traffic system is also inextricably tied to the integration of new autonomy into the airspace. The replacement of human operators with cyber functions leaves the network open to new cyber threats, which must be modeled and managed. Paradoxically, the mitigation of cyber events in the airspace will also likely require additional autonomy, given the fast time scale and myriad pathways of cyber-attacks which must be managed. The assessment of new vulnerabilities upon integration of new autonomy is also a key motivation for a holistic perspective on cyber threats.

  12. Parental and Family Factors as Predictors of Threat Bias in Anxious Youth

    PubMed Central

    Blossom, Jennifer B.; Ginsburg, Golda S.; Birmaher, Boris; Walkup, John T.; Kendall, Philip C.; Keeton, Courtney P.; Langley, Audra K.; Piacentini, John C.; Sakolsky, Dara; Albano, Anne Marie

    2014-01-01

    The present study examined the relative predictive value of parental anxiety, parents' expectation of child threat bias, and family dysfunction on child's threat bias in a clinical sample of anxious youth. Participants (N = 488) were part of the Child/Adolescent Anxiety Multi-modal study (CAMS), ages 7–17 years (M = 10.69; SD = 2.80). Children met diagnostic criteria for generalized anxiety disorder, separation anxiety and/or social phobia. Children and caregivers completed questionnaires assessing child threat bias, child anxiety, parent anxiety and family functioning. Child age, child anxiety, parental anxiety, parents' expectation of child's threat bias and child-reported family dysfunction were significantly associated with child threat bias. Controlling for child's age and anxiety, regression analyses indicated that parents' expectation of child's threat bias and child-reported family dysfunction were significant positive predictors of child's self-reported threat bias. Findings build on previous literature by clarifying parent and family factors that appear to play a role in the development or maintenance of threat bias and may inform etiological models of child anxiety. PMID:25328258

  13. Threat in dreams: an adaptation?

    PubMed

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, p<.00012). Contrary to TST's predictions, the SA participants reported significantly fewer threat dreams (chi([1,N=287])(2)=6.11, p<.0134), and did not differ from the Welsh participants in responses to dream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  14. Targeting Instruction with Formative Assessment Probes

    ERIC Educational Resources Information Center

    Fagan, Emily R.; Tobey, Cheryl Rose; Brodesky, Amy R.

    2016-01-01

    This article introduces the formative assessment probe--a powerful tool for collecting focused, actionable information about student thinking and potential misconceptions--along with a process for targeting instruction in response to probe results. Drawing on research about common student mathematical misconceptions as well as the former work of…

  15. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    PubMed

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  16. Postdeployment threat-related attention bias interacts with combat exposure to account for PTSD and anxiety symptoms in soldiers.

    PubMed

    Sipos, Maurice L; Bar-Haim, Yair; Abend, Rany; Adler, Amy B; Bliese, Paul D

    2014-02-01

    Recent studies suggest that assessment of threat-related attention bias may be useful in identifying soldiers at risk for clinical symptoms. The present study assessed the degree to which soldiers experienced combat events and showed attentional threat avoidance affected their reported levels of post-traumatic stress disorder (PTSD) and anxiety symptoms. Four months after a combat deployment to Iraq, 63 US soldiers completed a survey assessing combat exposures and clinical symptoms as well as a dot-probe task assessing threat-related attention bias. Significant three-way interactions regressing threat reaction times (RTs), neutral RTs, and combat exposure on PTSD and anxiety symptoms were observed. Specifically, soldiers with high levels of combat exposure, who were more likely to demonstrate attentional bias away from threat, were also more symptomatic. These results demonstrate the potential of threat-related attention bias as a behavioral marker of PTSD and anxiety symptoms in a high-risk military occupational context. Published 2013. This article is a U.S. Government work and is in the public domain in the USA.

  17. Assessment of medical reserve corps volunteers' emergency response willingness using a threat- and efficacy-based model.

    PubMed

    Errett, Nicole A; Barnett, Daniel J; Thompson, Carol B; Tosatto, Rob; Austin, Brad; Schaffzin, Samuel; Ansari, Armin; Semon, Natalie L; Balicer, Ran D; Links, Jonathan M

    2013-03-01

    The goal of this study was to investigate the willingness of Medical Reserve Corps (MRC) volunteers to participate in public health emergency-related activities by assessing their attitudes and beliefs. MRC volunteers responded to an online survey organized around the Extended Parallel Process Model (EPPM). Respondents reported agreement with attitude/belief statements representing perceived threat, perceived efficacy, and personal/organizational preparedness in 4 scenarios: a weather-related disaster, a pandemic influenza emergency, a radiological ("dirty bomb") emergency, and an inhalational anthrax bioterrorism emergency. Logistic regression analyses were used to evaluate predictors of volunteer response willingness. In 2 response contexts (if asked and regardless of severity), self-reported willingness to respond was higher among those with a high perceived self-efficacy than among those with low perceived self-efficacy. Analyses of the association between attitude/belief statements and the EPPM profiles indicated that, under all 4 scenarios and with few exceptions, those with a perceived high threat/high efficacy EPPM profile had statistically higher odds of agreement with the attitude/belief statements than those with a perceived low threat/low efficacy EPPM profile. The radiological emergency consistently received the lowest agreement rates for the attitude/belief statements and response willingness across scenarios. The findings suggest that enrollment with an MRC unit is not automatically predictive of willingness to respond in these types of scenarios. While MRC volunteers' self-reported willingness to respond was found to differ across scenarios and among different attitude and belief statements, the identification of self-efficacy as the primary predictor of willingness to respond regardless of severity and if asked highlights the critical role of efficacy in an organized volunteer response context.

  18. Assessment of Medical Reserve Corps Volunteers' Emergency Response Willingness Using a Threat- and Efficacy-Based Model

    PubMed Central

    Barnett, Daniel J.; Thompson, Carol B.; Tosatto, Rob; Austin, Brad; Schaffzin, Samuel; Ansari, Armin; Semon, Natalie L.; Balicer, Ran D.; Links, Jonathan M.

    2013-01-01

    The goal of this study was to investigate the willingness of Medical Reserve Corps (MRC) volunteers to participate in public health emergency–related activities by assessing their attitudes and beliefs. MRC volunteers responded to an online survey organized around the Extended Parallel Process Model (EPPM). Respondents reported agreement with attitude/belief statements representing perceived threat, perceived efficacy, and personal/organizational preparedness in 4 scenarios: a weather-related disaster, a pandemic influenza emergency, a radiological (“dirty bomb”) emergency, and an inhalational anthrax bioterrorism emergency. Logistic regression analyses were used to evaluate predictors of volunteer response willingness. In 2 response contexts (if asked and regardless of severity), self-reported willingness to respond was higher among those with a high perceived self-efficacy than among those with low perceived self-efficacy. Analyses of the association between attitude/belief statements and the EPPM profiles indicated that, under all 4 scenarios and with few exceptions, those with a perceived high threat/high efficacy EPPM profile had statistically higher odds of agreement with the attitude/belief statements than those with a perceived low threat/low efficacy EPPM profile. The radiological emergency consistently received the lowest agreement rates for the attitude/belief statements and response willingness across scenarios. The findings suggest that enrollment with an MRC unit is not automatically predictive of willingness to respond in these types of scenarios. While MRC volunteers' self-reported willingness to respond was found to differ across scenarios and among different attitude and belief statements, the identification of self-efficacy as the primary predictor of willingness to respond regardless of severity and if asked highlights the critical role of efficacy in an organized volunteer response context. PMID:23477632

  19. Does stereotype threat affect women in academic medicine?

    PubMed

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  20. The association between the perception of threat in a dating situation and sexual victimization.

    PubMed

    Breitenbecher, K H

    1999-01-01

    The purpose of the present investigation was to assess the relation between threat perception in a dating situation and sexual victimization. During an initial session, participants in the experimental condition (n = 116) viewed a video that depicts a heterosexual couple interacting on a date and reflects risk factors for sexual assault. Participants in the control condition (n = 108) viewed a video that does not contain such risk factors. Participants in each condition also responded to survey instruments assessing demographic variables, history of child sexual abuse, history of adolescent sexual assault, and perception of threat cues in the stimulus videos. A subset of participants (n = 66) returned for a 5-month follow-up session and was assessed for experience of sexual assault during the follow-up period. Results fail to support an association between threat perception and sexual victimization history or an association between threat perception and sexual victimization during the follow-up period.

  1. We can do it: the interplay of construal orientation and social comparisons under threat.

    PubMed

    Marx, David M; Stapel, Diederik A; Muller, Dominique

    2005-03-01

    The authors investigated how a collective self-construal orientation in combination with positive social comparisons "turns off" the negative effects of stereotype threat. Specifically, Experiment 1 demonstrated that stereotype threat led to increased accessibility of participants' collective self ("we"). Experiment 2 showed that this feeling of "we-ness" in the stereotype threat condition centered on the participants' stereotyped group membership and not on other important social groups (e.g., students). Experiment 3 indicated that in threat situations, when participants' collective self is accessible, positive social comparison information led to improved math test performance and less concern, whereas in nonthreat situations, when the collective self is less accessible, positive comparison information led to worse test performance and more concern. Our final experiment revealed that under stereotype threat, only those comparison targets who are competent in the relevant domain (math), rather than in domains unrelated to math (athletics), enhanced participants' math test performance. ((c) 2005 APA, all rights reserved).

  2. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    PubMed

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior.

  3. Attentional Modulation of Visual-Evoked Potentials by Threat: Investigating the Effect of Evolutionary Relevance

    ERIC Educational Resources Information Center

    Brown, Christopher; El-Deredy, Wael; Blanchette, Isabelle

    2010-01-01

    In dot-probe tasks, threatening cues facilitate attention to targets and enhance the amplitude of the target P1 peak of the visual-evoked potential. While theories have suggested that evolutionarily relevant threats should obtain preferential neural processing, this has not been examined empirically. In this study we examined the effects of…

  4. Attention bias to threat indicates anxiety differences in sheep

    PubMed Central

    Lee, Caroline; Verbeek, Else; Doyle, Rebecca

    2016-01-01

    Humans and animals show increased attention towards threatening stimuli when they are in increased states of anxiety. The few animal studies that have examined this phenomenon, known as attention bias, have applied environmental manipulations to induce anxiety but the effects of drug-induced anxiety levels on attention bias have not been demonstrated. Here, we present an attention bias test to identify high and low anxiety states in sheep using pharmacological manipulation. Increased anxiety was induced using 1-methyl-chlorophenylpiperazine (m-CPP) and decreased anxiety with diazepam, and then we examined the behaviour of sheep in response to the presence of a dog as a threat. Increased attention towards the threat and increased vigilance were shown in sheep that received the m-CPP and reduced in sheep receiving the diazepam. The modulated attention towards a threat displayed by the m-CPP and diazepam animals suggests that attention bias can assess different levels of anxiety in sheep. Measuring attention bias has the potential to improve animal welfare assessment protocols. PMID:27277950

  5. Global risk from extreme geophysical events: threat identification and assessment.

    PubMed

    McGuire, W J

    2006-08-15

    In an increasingly interconnected world, any single geophysical hazard is capable of having consequences far beyond the range of immediate physical effects. Most recently, this was demonstrated by the 2004 Asian tsunami, which took the lives of citizens from 57 different nations, and by Hurricane Katrina in August 2005, which raised fuel prices worldwide and contributed to a record UK trade deficit in the month following the devastation of New Orleans. On an altogether wider scale, global geophysical events (GGEs) are natural phenomena capable of having wholesale deleterious consequences for the world's environment, economy and society. These may arise (i) due to a global physical effect, such as an episode of severe planetary cooling in response to a volcanic 'super-eruption' or large comet or asteroid impact, or (ii) as a result of subsidiary ramifications for the global economy and social fabric of a cataclysmic regional event, such as an Atlantic- or Pacific-wide 'mega-tsunami', or a more spatially confined event at a strategically sensitive location, for example the awaited major Tokyo earthquake. While very infrequent, the wide-ranging-and potentially ruinous-consequences of a GGE for the well-being of the international community make it essential that they are seriously considered within any comprehensive assessment of natural threats.

  6. Information Exchange Between Resilient and High-Threat Networks: Techniques for Threat Mitigation

    DTIC Science & Technology

    2004-11-01

    Information Exchange between Resilient and High-Threat Networks : Techniques for Threat Mitigation Tim Dean and Graham Wyatt QinetiQ...SUMMARY High resilience military networks frequently have requirements for exchange of information with networks of low assurance, including networks of...assured, two-way, information flow between high resilience networks and other networks of unknown threat. The techniques include conventional and

  7. Development of the SAFE Checklist Tool for Assessing Site-Level Threats to Child Protection: Use of Delphi Methods and Application to Two Sites in India.

    PubMed

    Betancourt, Theresa S; Zuilkowski, Stephanie S; Ravichandran, Arathi; Einhorn, Honora; Arora, Nikita; Bhattacharya Chakravarty, Aruna; Brennan, Robert T

    2015-01-01

    The child protection community is increasingly focused on developing tools to assess threats to child protection and the basic security needs and rights of children and families living in adverse circumstances. Although tremendous advances have been made to improve measurement of individual child health status or household functioning for use in low-resource settings, little attention has been paid to a more diverse array of settings in which many children in adversity spend time and how context contributes to threats to child protection. The SAFE model posits that insecurity in any of the following fundamental domains threatens security in the others: Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security. Site-level tools are needed in order to monitor the conditions that can dramatically undermine or support healthy child growth, development and emotional and behavioral health. From refugee camps and orphanages to schools and housing complexes, site-level threats exist that are not well captured by commonly used measures of child health and well-being or assessments of single households (e.g., SDQ, HOME). The present study presents a methodology and the development of a scale for assessing site-level child protection threats in various settings of adversity. A modified Delphi panel process was enhanced with two stages of expert review in core content areas as well as review by experts in instrument development, and field pilot testing. Field testing in two diverse sites in India-a construction site and a railway station-revealed that the resulting SAFE instrument was sensitive to the differences between the sites from the standpoint of core child protection issues.

  8. Terrorism threats and preparedness in Canada: the perspective of the Canadian public.

    PubMed

    Gibson, Stacey; Lemyre, Louise; Clément, Mélanie; Markon, Marie-Pierre L; Lee, Jennifer E C

    2007-06-01

    Although Canada has not experienced a major terrorist attack, an increased global pending threat has put preparedness at the top of the Canadian government's agenda. Given its strong multicultural community and close proximity to the recently targeted United States, the Canadian experience is unique. However, minimal research exists on the public's reactions to terrorism threats and related preparedness strategies. In order for response initiatives to be optimally effective, it is important that the public's opinions regarding terrorism and preparedness be considered. This qualitative study examined perceptions of terrorism threats among Canadians living in Central and Eastern Canada (N = 75) in the fall of 2004. Conceptualizations of terrorism threat, psychosocial impacts, and sense of preparedness were explored in a series of qualitative interviews. Findings revealed that the majority of Canadians did not feel overly threatened by terrorist attacks, due in part to a perception of terrorist threats as related to global sociopolitical events and a positive Canadian identity. In addition, while most respondents did not feel they were individually affected by the threat of terrorism, there was some concern regarding larger societal impacts, such as increased paranoia, discrimination, and threats to civil liberties. Participants' views on preparedness focused largely on the utility of emergency preparedness strategies and the factors that could mitigate or inhibit preparedness at the individual and institutional levels, with a specific focus on education. Finally, the significant relevance of these findings in shaping terrorism preparedness, both in Canada and generally, is discussed.

  9. Attribute-driven transfer learning for detecting novel buried threats with ground-penetrating radar

    NASA Astrophysics Data System (ADS)

    Colwell, Kenneth A.; Collins, Leslie M.

    2016-05-01

    Ground-penetrating radar (GPR) technology is an effective method of detecting buried explosive threats. The system uses a binary classifier to distinguish "targets", or buried threats, from "nontargets" arising from system prescreener false alarms; this classifier is trained on a dataset of previously-observed buried threat types. However, the threat environment is not static, and new threat types that appear must be effectively detected even if they are not highly similar to every previously-observed type. Gathering a new dataset that includes a new threat type is expensive and time-consuming; minimizing the amount of new data required to effectively detect the new type is therefore valuable. This research aims to reduce the number of training examples needed to effectively detect new types using transfer learning, which leverages previous learning tasks to accelerate and improve new ones. Further, new types have attribute data, such as composition, components, construction, and size, which can be observed without GPR and typically are not explicitly included in the learning process. Since attribute tags for buried threats determine many aspects of their GPR representation, a new threat type's attributes can be highly relevant to the transfer-learning process. In this work, attribute data is used to drive transfer learning, both by using attributes to select relevant dataset examples for classifier fusion, and by extending a relevance vector machine (RVM) model to perform intelligent attribute clustering and selection. Classification performance results for both the attribute-only case and the low-data case are presented, using a dataset containing a variety of threat types.

  10. Signaling threat: how situational cues affect women in math, science, and engineering settings.

    PubMed

    Murphy, Mary C; Steele, Claude M; Gross, James J

    2007-10-01

    This study examined the cues hypothesis, which holds that situational cues, such as a setting's features and organization, can make potential targets vulnerable to social identity threat. Objective and subjective measures of identity threat were collected from male and female math, science, and engineering (MSE) majors who watched an MSE conference video depicting either an unbalanced ratio of men to women or a balanced ratio. Women who viewed the unbalanced video exhibited more cognitive and physiological vigilance, and reported a lower sense of belonging and less desire to participate in the conference, than did women who viewed the gender-balanced video. Men were unaffected by this situational cue. The implications for understanding vulnerability to social identity threat, particularly among women in MSE settings, are discussed.

  11. Future land use threats to range-restricted fish species in the United States

    DOE PAGES

    Januchowski-Hartley, Stephanie R.; Holtz, Lauren A.; Martinuzzi, Sebastian; ...

    2016-03-04

    Land use change is one major threat to freshwater biodiversity, and land use change scenarios can help to assess threats from future land use change, thereby guiding proactive conservation decisions. Furthermore, our goal was to identify which range-restricted freshwater fish species are most likely to be affected by land use change and to determine where threats to these species from future land use change in the conterminous United States are most pronounced.

  12. Future land use threats to range-restricted fish species in the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Januchowski-Hartley, Stephanie R.; Holtz, Lauren A.; Martinuzzi, Sebastian

    Land use change is one major threat to freshwater biodiversity, and land use change scenarios can help to assess threats from future land use change, thereby guiding proactive conservation decisions. Furthermore, our goal was to identify which range-restricted freshwater fish species are most likely to be affected by land use change and to determine where threats to these species from future land use change in the conterminous United States are most pronounced.

  13. Canine distemper virus as a threat to wild tigers in Russia and across their range.

    PubMed

    Gilbert, Martin; Soutyrina, Svetlana V; Seryodkin, Ivan V; Sulikhan, Nadezhda; Uphyrkina, Olga V; Goncharuk, Mikhail; Matthews, Louise; Cleaveland, Sarah; Miquelle, Dale G

    2015-07-01

    Canine distemper virus (CDV) has recently been identified in populations of wild tigers in Russia and India. Tiger populations are generally too small to maintain CDV for long periods, but are at risk of infections arising from more abundant susceptible hosts that constitute a reservoir of infection. Because CDV is an additive mortality factor, it could represent a significant threat to small, isolated tiger populations. In Russia, CDV was associated with the deaths of tigers in 2004 and 2010, and was coincident with a localized decline of tigers in Sikhote-Alin Biosphere Zapovednik (from 25 tigers in 2008 to 9 in 2012). Habitat continuity with surrounding areas likely played an important role in promoting an ongoing recovery. We recommend steps be taken to assess the presence and the impact of CDV in all tiger range states, but should not detract focus away from the primary threats to tigers, which include habitat loss and fragmentation, poaching and retaliatory killing. Research priorities include: (i) recognition and diagnosis of clinical cases of CDV in tigers when they occur; and (ii) collection of baseline data on the health of wild tigers. CDV infection of individual tigers need not imply a conservation threat, and modeling should complement disease surveillance and targeted research to assess the potential impact to tiger populations across the range of ecosystems, population densities and climate extremes occupied by tigers. Describing the role of domestic and wild carnivores as contributors to a local CDV reservoir is an important precursor to considering control measures. © 2015 International Society of Zoological Sciences, Institute of Zoology/Chinese Academy of Sciences and Wiley Publishing Asia Pty Ltd.

  14. Assessing Reliability of Cold Spray Sputter Targets in Photovoltaic Manufacturing

    NASA Astrophysics Data System (ADS)

    Hardikar, Kedar; Vlcek, Johannes; Bheemreddy, Venkata; Juliano, Daniel

    2017-10-01

    Cold spray has been used to manufacture more than 800 Cu-In-Ga (CIG) sputter targets for deposition of high-efficiency photovoltaic thin films. It is a preferred technique since it enables high deposit purity and transfer of non-equilibrium alloy states to the target material. In this work, an integrated approach to reliability assessment of such targets with deposit weight in excess of 50 lb. is undertaken, involving thermal-mechanical characterization of the material in as-deposited condition, characterization of the interface adhesion on cylindrical substrate in as-deposited condition, and developing means to assess target integrity under thermal-mechanical loads during the physical vapor deposition (PVD) sputtering process. Mechanical characterization of cold spray deposited CIG alloy is accomplished through the use of indentation testing and adaptation of Brazilian disk test. A custom lever test was developed to characterize adhesion along the cylindrical interface between the CIG deposit and cylindrical substrate, overcoming limitations of current standards. A cohesive zone model for crack initiation and propagation at the deposit interface is developed and validated using the lever test and later used to simulate the potential catastrophic target failure in the PVD process. It is shown that this approach enables reliability assessment of sputter targets and improves robustness.

  15. Does Stereotype Threat Affect Women in Academic Medicine?

    PubMed Central

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  16. Stereotype Threat in U.S. Students Abroad: Negotiating American Identity in the Age of Trump

    ERIC Educational Resources Information Center

    Goldstein, Susan B.

    2017-01-01

    An underinvestigated and significant source of stress for U.S. student sojourners across racial/ethnic groups is exposure to stereotypes that target their American identity. This study built on the extensive research literature on stereotype threat to investigate U.S. students' vulnerability and reactions to being the target of stereotypes.…

  17. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    PubMed

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message.

  18. Stereotype threat prevents perceptual learning

    PubMed Central

    Shiffrin, Richard M.; Boucher, Kathryn L.; Van Loo, Katie; Rydell, Michael T.

    2010-01-01

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype “women are bad at math” causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task as an increasing rate of search for a target Chinese character in a display of such characters. Displays contained two or four characters and half of these contained a target. Search rate increased across a session of training for a control group of women, but not women under ST. Speeding of search is typically explained in terms of learned “popout” (automatic attraction of attention to a target). Did women under ST learn popout but fail to express it? Following training, the women were shown two colored squares and asked to choose the one with the greater color saturation. Superimposed on the squares were task-irrelevant Chinese characters. For women not trained under ST, the presence of a trained target on one square slowed responding, indicating that training had caused the learning of an attention response to targets. Women trained under ST showed no slowing, indicating that they had not learned such an attention response. PMID:20660737

  19. Poland and Global Threats

    NASA Astrophysics Data System (ADS)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  20. Radiological threat assessment and the Federal Response Plan--a gap analysis.

    PubMed

    Conklin, W Craig; Liotta, Philip L

    2005-11-01

    The ability of the federal government to effectively and efficiently respond to nuclear or radiological terrorist attacks has been the subject of intense discussion and analysis for many years. Because of recent terrorist activities and intelligence information, there is strong sentiment that it is not a question of if, but when, a radiological or nuclear terrorist attack will occur. As a result, there is considerable concern that the federal government may not be adequately prepared to respond to an attack involving a radiological dispersal device or improvised nuclear device. In response to these concerns, federal departments and agencies have initiated actions to develop a better understanding of the magnitude of the radiological/nuclear terrorist threat, assess the ability of the federal government to support state and local responses to such attacks, and improve the Nation's ability to prepare for, respond to, and recover from these types of attacks. In an era of limited fiscal growth and competing priorities, the federal government will have to enhance its collaboration with state and local governments, the private sector, and academia to ensure that the Nation is capable of responding to a terrorist attack involving radioactive or nuclear material.

  1. Lizard threat display handicaps endurance.

    PubMed Central

    Brandt, Y

    2003-01-01

    Honest-signalling theory asserts that threat displays reliably advertise attributes that influence fighting success. Endurance, as measured by treadmill performance, predicts the outcome of agonistic interactions among lizards. If threat displays in lizards function to advertise endurance capacity then variation in threat displays should correlate with endurance. I tested this prediction for the duration of threat posturing in male side-blotched lizards (Uta stansburiana) and examined whether threat displays act as quality handicaps, reliable signals that expend the attribute that is advertised. Individual variation in the duration of threat posturing correlated with endurance, while an experimental reduction of endurance diminished the duration of threat posturing. As expected of a quality handicap, endurance fell below baseline after display production. A restriction of aerobic metabolism can account for this effect. In threat posturing, lateral compression of the thorax may interfere with respiration or with circulation, limiting aerobic metabolism and causing a compensatory increase in anaerobic metabolism, thereby generating lactate and diminishing locomotor capacity. Concentrations of lactate measured after display production were higher than baseline, consistent with the proposed mechanism. By restricting aerobic metabolism, the threat posture can act as a quality handicap, simultaneously advertising and expending the endurance capacity of displaying lizards. PMID:12803896

  2. Differential Brain Activation to Angry Faces by Elite Warfighters: Neural Processing Evidence for Enhanced Threat Detection

    PubMed Central

    Paulus, Martin P.; Simmons, Alan N.; Fitzpatrick, Summer N.; Potterat, Eric G.; Van Orden, Karl F.; Bauman, James; Swain, Judith L.

    2010-01-01

    Background Little is known about the neural basis of elite performers and their optimal performance in extreme environments. The purpose of this study was to examine brain processing differences between elite warfighters and comparison subjects in brain structures that are important for emotion processing and interoception. Methodology/Principal Findings Navy Sea, Air, and Land Forces (SEALs) while off duty (n = 11) were compared with n = 23 healthy male volunteers while performing a simple emotion face-processing task during functional magnetic resonance imaging. Irrespective of the target emotion, elite warfighters relative to comparison subjects showed relatively greater right-sided insula, but attenuated left-sided insula, activation. Navy SEALs showed selectively greater activation to angry target faces relative to fearful or happy target faces bilaterally in the insula. This was not accounted for by contrasting positive versus negative emotions. Finally, these individuals also showed slower response latencies to fearful and happy target faces than did comparison subjects. Conclusions/Significance These findings support the hypothesis that elite warfighters deploy greater processing resources toward potential threat-related facial expressions and reduced processing resources to non-threat-related facial expressions. Moreover, rather than expending more effort in general, elite warfighters show more focused neural and performance tuning. In other words, greater neural processing resources are directed toward threat stimuli and processing resources are conserved when facing a nonthreat stimulus situation. PMID:20418943

  3. Development of the SAFE Checklist Tool for Assessing Site-Level Threats to Child Protection: Use of Delphi Methods and Application to Two Sites in India

    PubMed Central

    Betancourt, Theresa S.; Zuilkowski, Stephanie S.; Ravichandran, Arathi; Einhorn, Honora; Arora, Nikita; Bhattacharya Chakravarty, Aruna; Brennan, Robert T.

    2015-01-01

    Background The child protection community is increasingly focused on developing tools to assess threats to child protection and the basic security needs and rights of children and families living in adverse circumstances. Although tremendous advances have been made to improve measurement of individual child health status or household functioning for use in low-resource settings, little attention has been paid to a more diverse array of settings in which many children in adversity spend time and how context contributes to threats to child protection. The SAFE model posits that insecurity in any of the following fundamental domains threatens security in the others: Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security. Site-level tools are needed in order to monitor the conditions that can dramatically undermine or support healthy child growth, development and emotional and behavioral health. From refugee camps and orphanages to schools and housing complexes, site-level threats exist that are not well captured by commonly used measures of child health and well-being or assessments of single households (e.g., SDQ, HOME). Methods The present study presents a methodology and the development of a scale for assessing site-level child protection threats in various settings of adversity. A modified Delphi panel process was enhanced with two stages of expert review in core content areas as well as review by experts in instrument development, and field pilot testing. Results Field testing in two diverse sites in India—a construction site and a railway station—revealed that the resulting SAFE instrument was sensitive to the differences between the sites from the standpoint of core child protection issues. PMID:26540159

  4. Mission Continuity Planning: Strategically Assessing and Planning for Threats to Operations.

    ERIC Educational Resources Information Center

    Qayoumi, Mohammad H.

    This book covers the principles of risk and risk management and offers a framework for analyzing the significant, often unforeseen threats facing higher education institutions today. It examines the critical elements of a disaster preparedness plan and addresses business continuity and mission continuity planning. The book also provides tools for…

  5. Scaling range sizes to threats for robust predictions of risks to biodiversity.

    PubMed

    Keith, David A; Akçakaya, H Resit; Murray, Nicholas J

    2018-04-01

    Assessments of risk to biodiversity often rely on spatial distributions of species and ecosystems. Range-size metrics used extensively in these assessments, such as area of occupancy (AOO), are sensitive to measurement scale, prompting proposals to measure them at finer scales or at different scales based on the shape of the distribution or ecological characteristics of the biota. Despite its dominant role in red-list assessments for decades, appropriate spatial scales of AOO for predicting risks of species' extinction or ecosystem collapse remain untested and contentious. There are no quantitative evaluations of the scale-sensitivity of AOO as a predictor of risks, the relationship between optimal AOO scale and threat scale, or the effect of grid uncertainty. We used stochastic simulation models to explore risks to ecosystems and species with clustered, dispersed, and linear distribution patterns subject to regimes of threat events with different frequency and spatial extent. Area of occupancy was an accurate predictor of risk (0.81<|r|<0.98) and performed optimally when measured with grid cells 0.1-1.0 times the largest plausible area threatened by an event. Contrary to previous assertions, estimates of AOO at these relatively coarse scales were better predictors of risk than finer-scale estimates of AOO (e.g., when measurement cells are <1% of the area of the largest threat). The optimal scale depended on the spatial scales of threats more than the shape or size of biotic distributions. Although we found appreciable potential for grid-measurement errors, current IUCN guidelines for estimating AOO neutralize geometric uncertainty and incorporate effective scaling procedures for assessing risks posed by landscape-scale threats to species and ecosystems. © 2017 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  6. Non-target effects of broadleaf herbicide on a native perennial forb: a demographic framework for assessing and minimizing impacts

    Treesearch

    Elizabeth E. Crone; Marilyn Marler; Dean E. Pearson

    2009-01-01

    Invasive species are one of the leading threats to biodiversity worldwide. Therefore, chemical herbicides are increasingly used to control invasive plants in natural and semi-natural areas. Little is known about the non-target impacts of these chemicals on native species. We conducted an experiment to test the demographic effects of the herbicide picloram on a native...

  7. A freshwater biodiversity hotspot under pressure - assessing threats and identifying conservation needs for ancient Lake Ohrid

    NASA Astrophysics Data System (ADS)

    Kostoski, G.; Albrecht, C.; Trajanovski, S.; Wilke, T.

    2010-12-01

    Immediate conservation measures for world-wide freshwater resources are of eminent importance. This is particularly true for so-called ancient lakes. While these lakes are famous for being evolutionary theatres, often displaying an extraordinarily high degree of biodiversity and endemism, in many cases these biota are also experiencing extreme anthropogenic impact. Lake Ohrid, a major European biodiversity hotspot situated in a trans-frontier setting on the Balkans, is a prime example for a lake with a magnitude of narrow range endemic taxa that are under increasing anthropogenic pressure. Unfortunately, evidence for a "creeping biodiversity crisis" has accumulated over the last decades, and major socio-political changes have gone along with human-mediated environmental changes. Based on field surveys, monitoring data, published records, and expert interviews, we aimed to (1) assess threats to Lake Ohrids' (endemic) biodiversity, (2) summarize existing conservation activities and strategies, and (3) outline future conservation needs for Lake Ohrid. We compiled threats to both specific taxa (and in cases to particular species) as well as to the lake ecosystems itself. Major conservation concerns identified for Lake Ohrid are: (1) watershed impacts, (2) agriculture and forestry, (3) tourism and population growth, (4) non-indigenous species, (5) habitat alteration or loss, (6) unsustainable exploitation of fisheries, and (7) global climate change. Among the major (well-known) threats with high impact are nutrient input (particularly of phosphorus), habitat conversion and silt load. Other threats are potentially of high impact but less well known. Such threats include pollution with hazardous substances (from sources such as mines, former industries, agriculture) or climate change. We review and discuss institutional responsibilities, environmental monitoring and ecosystem management, existing parks and reserves, biodiversity and species measures, international

  8. Stereotype threat and lift effects in motor task performance: the mediating role of somatic and cognitive anxiety.

    PubMed

    Laurin, Raphael

    2013-01-01

    The aim of this investigation was to replicate the stereotype threat and lift effects in a motor task in a neutral sex-typed activity, using somatic and cognitive anxiety as key mediators of these phenomena. It was hypothesized that an ingroup/outgroup social categorization based on gender would have distinctive effects for female and male participants. A total of 161 French physical education students were randomly assigned to three threat conditions--no threat, female threat, and male threat--thus leading to a 3 x 2 (threat by gender) design. The analyses revealed a stereotype lift effect on the performances for both male and female participants, as well as a stereotype threat effect only for female participants. They also indicated that somatic anxiety had a mediating effect on the performance of female participants targeted by a negative stereotype, but that it had a facilitating effect on their performance. The stereotype threat and lift effects on motor tasks were replicated in a neutral sex-typed activity and somatic anxiety seems to have a facilitating mediating effect of the relationships between the gender-conditions (control or female threat) interaction and free-throw performance. The model used to distinguish somatic and cognitive anxiety appeared to be a relevant means of explaining the stereotype threat and lift mechanisms.

  9. The Domestic IED Threat

    DTIC Science & Technology

    2008-01-01

    threat that could use IEDs in the homeland is single-issue organizations. This threat includes such groups as the Okla- homa City bombers and other...threat during joint Army–Air Force exercise U .S . A ir Fo rc e (S te ph en O te ro ) ndupress .ndu.edu issue 48, 1st quarter 2008 / JFQ        69

  10. Presentation from 2016 STAR Tribal Research Meeting: ANTHC Rural Alaska Monitoring Program (RAMP): Assessing, Monitoring, and Adapting to Emerging Environmental Human and Wildlife Health Threats

    EPA Pesticide Factsheets

    This presentation, ANTHC Rural Alaska Monitoring Program (RAMP): Assessing, Monitoring, and Adapting to Emerging Environmental Human and Wildlife Health Threats, was given at the 2016 STAR Tribal Research Meeting held on Sept. 20-21, 2016.

  11. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  12. Anticipation of interoceptive threat in highly anxiety sensitive persons.

    PubMed

    Melzig, Christiane A; Michalowski, Jaroslaw M; Holtz, Katharina; Hamm, Alfons O

    2008-10-01

    Anticipatory anxiety plays a major role in the etiology of panic disorder. Although anticipatory anxiety elicited by expectation of interoceptive cues is specifically relevant for panic patients, it has rarely been studied. Using a population analogue in high fear of such interoceptive arousal sensations (highly anxiety sensitive persons) we evaluated a new experimental paradigm to assess anticipatory anxiety during anticipation of interoceptive (somatic sensations evoked by hyperventilation) and exteroceptive (electric shock) threat. Symptom reports, autonomic arousal, and defensive response mobilization (startle eyeblink response) were monitored during threat and matched safe conditions in 26 highly anxiety sensitive persons and 22 controls. The anticipation of exteroceptive threat led to a defensive and autonomic mobilization as indexed by a potentiation of the startle response and an increase in skin conductance level in both experimental groups. During interoceptive threat, however, only highly anxiety sensitive persons but not the controls exhibited a startle response potentiation as well as autonomic activation. The anticipation of a hyperventilation procedure thus seems a valid paradigm to investigate anticipatory anxiety elicited by interoceptive cues in the clinical context.

  13. Attention bias to threat faces in severe mood dysregulation.

    PubMed

    Hommer, Rebecca E; Meyer, Allison; Stoddard, Joel; Connolly, Megan E; Mogg, Karin; Bradley, Brendan P; Pine, Daniel S; Leibenluft, Ellen; Brotman, Melissa A

    2014-07-01

    We used a dot-probe paradigm to examine attention bias toward threat (i.e., angry) and happy face stimuli in severe mood dysregulation (SMD) versus healthy comparison (HC) youth. The tendency to allocate attention to threat is well established in anxiety and other disorders of negative affect. SMD is characterized by the negative affect of irritability, and longitudinal studies suggest childhood irritability predicts adult anxiety and depression. Therefore, it is important to study pathophysiologic connections between irritability and anxiety disorders. SMD patients (N = 74) and HC youth (N = 42) completed a visual probe paradigm to assess attention bias to emotional faces. Diagnostic interviews were conducted and measures of irritability and anxiety were obtained in patients. SMD youth differed from HC youth in having a bias toward threatening faces (P < .01). Threat bias was positively correlated with the severity of the SMD syndrome and depressive symptoms; degree of threat bias did not differ between SMD youth with and without co-occurring anxiety disorders or depression. SMD and HC youth did not differ in bias toward or away from happy faces. SMD youth demonstrate an attention bias toward threat, with greater threat bias associated with higher levels of SMD symptom severity. Our findings suggest that irritability may share a pathophysiological link with anxiety and depressive disorders. This finding suggests the value of exploring further whether attention bias modification treatments that are effective for anxiety are also helpful in the treatment of irritability. © 2013 Wiley Periodicals, Inc.

  14. Modeling peripheral vision for moving target search and detection.

    PubMed

    Yang, Ji Hyun; Huston, Jesse; Day, Michael; Balogh, Imre

    2012-06-01

    Most target search and detection models focus on foveal vision. In reality, peripheral vision plays a significant role, especially in detecting moving objects. There were 23 subjects who participated in experiments simulating target detection tasks in urban and rural environments while their gaze parameters were tracked. Button responses associated with foveal object and peripheral object (PO) detection and recognition were recorded. In an urban scenario, pedestrians appearing in the periphery holding guns were threats and pedestrians with empty hands were non-threats. In a rural scenario, non-U.S. unmanned aerial vehicles (UAVs) were considered threats and U.S. UAVs non-threats. On average, subjects missed detecting 2.48 POs among 50 POs in the urban scenario and 5.39 POs in the rural scenario. Both saccade reaction time and button reaction time can be predicted by peripheral angle and entrance speed of POs. Fast moving objects were detected faster than slower objects and POs appearing at wider angles took longer to detect than those closer to the gaze center. A second-order mixed-effect model was applied to provide each subject's prediction model for peripheral target detection performance as a function of eccentricity angle and speed. About half the subjects used active search patterns while the other half used passive search patterns. An interactive 3-D visualization tool was developed to provide a representation of macro-scale head and gaze movement in the search and target detection task. An experimentally validated stochastic model of peripheral vision in realistic target detection scenarios was developed.

  15. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    USGS Publications Warehouse

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    example of the type of results generated, we estimated that the probability of the manatee population falling to less than 250 adults on either the Atlantic or Gulf coasts (from a current statewide population size of near 3300) within 100 years is 8.6%. Complete removal of the watercraft threat alone would reduce this risk to 0.4%; complete removal of the warm-water threat to 4.2%; removal of both threats would reduce the risk to 0.1%. The modeling approach we have taken also allows us to consider partial removal of threats, as well as removal of multiple threats simultaneously. We believe the measure we have proposed (probability of quasi-extinction over y years, with quasi-extinction defined as dropping below a threshold of z on either coast) is a suitable measure of status that integrates a number of the elements that are relevant to interpretation under the ESA (it directly integrates risk of extinction and reduction of range, and indirectly integrates loss of genetic diversity). But the identification of the time frame of interest and the tolerable risk of quasi-extinction are policy decisions, and an ecology-based quasi-extinction threshold has not yet been determined. We have endeavored to provide results over a wide range of these parameters to give decision-makers useful information to assess status. This assessment of threats suggests that watercraft-related mortality is having the greatest impact on manatee population growth and resilience. Elimination of this single threat would greatly reduce the probability of quasi-extinction. Loss of warm-water is also a significant threat, particularly over the long-term. Red tide and entanglement, while noticeable threats, have had less of an impact on the manatee population. The effect of water control structures may have already been largely mitigated. We did not, however, consider an exhaustive list of threats. Other threats (e.g., reduction of food resources due to storms and development) may play a

  16. Association between problematic alcohol use and reactivity to uncertain threat in two independent samples

    PubMed Central

    Gorka, Stephanie M.; Lieberman, Lynne; Phan, K. Luan; Shankman, Stewart A.

    2016-01-01

    Background Recent laboratory studies have shown that acute alcohol intoxication selectively and effectively dampens aversive responding to an uncertain threat. An emerging hypothesis is that individuals who exhibit heightened reactivity to an uncertain threat may be especially motivated to use alcohol to dampen their distress, setting the stage for negative reinforcement processes to drive excessive alcohol use. However, no study to date has directly examined whether current problematic drinkers exhibit heightened reactivity to an uncertain threat as would be expected. Methods The present study was therefore designed to examine the association between current problematic alcohol use and reactivity to an uncertain threat during sobriety in two, independent samples. In Study 1 (n = 221) and Study 2 (n = 74), adult participants completed the same well-validated threat-of-shock task which separately probes responses to temporally predictable and unpredictable threat. Startle potentiation was measured as an index of aversive responding. Problematic alcohol use was defined as number of binge episodes within the past 30 days in Study 1 and total scores on a self-report measure of hazardous drinking in Study 2. Results As hypothesized, across both studies greater levels of problematic drinking were associated with greater startle potentiation to an unpredictable threat. In Study 2, hazardous drinking scores were also positively associated with startle potentiation to predictable threat. Conclusions The findings are notably consistent with the notion that heightened reactivity to an uncertain threat is an important individual difference factor associated with the onset and/or maintenance of problematic drinking behaviors and may therefore be a novel prevention and intervention target. PMID:27173662

  17. Setting conservation targets for sandy beach ecosystems

    NASA Astrophysics Data System (ADS)

    Harris, Linda; Nel, Ronel; Holness, Stephen; Sink, Kerry; Schoeman, David

    2014-10-01

    Representative and adequate reserve networks are key to conserving biodiversity. This begs the question, how much of which features need to be placed in protected areas? Setting specifically-derived conservation targets for most ecosystems is common practice; however, this has never been done for sandy beaches. The aims of this paper, therefore, are to propose a methodology for setting conservation targets for sandy beach ecosystems; and to pilot the proposed method using data describing biodiversity patterns and processes from microtidal beaches in South Africa. First, a classification scheme of valued features of beaches is constructed, including: biodiversity features; unique features; and important processes. Second, methodologies for setting targets for each feature under different data-availability scenarios are described. From this framework, targets are set for features characteristic of microtidal beaches in South Africa, as follows. 1) Targets for dune vegetation types were adopted from a previous assessment, and ranged 19-100%. 2) Targets for beach morphodynamic types (habitats) were set using species-area relationships (SARs). These SARs were derived from species richness data from 142 sampling events around the South African coast (extrapolated to total theoretical species richness estimates using previously-established species-accumulation curve relationships), plotted against the area of the beach (calculated from Google Earth imagery). The species-accumulation factor (z) was 0.22, suggesting a baseline habitat target of 27% is required to protect 75% of the species. This baseline target was modified by heuristic principles, based on habitat rarity and threat status, with final values ranging 27-40%. 3) Species targets were fixed at 20%, modified using heuristic principles based on endemism, threat status, and whether or not beaches play an important role in the species' life history, with targets ranging 20-100%. 4) Targets for processes and 5

  18. Interaction of threat and verbal working memory in adolescents.

    PubMed

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  19. Persistent and novel threats to the biodiversity of Kazakhstan’s steppes and semi-deserts

    USGS Publications Warehouse

    Kamp, Johannes; Koshkin, Maxim A; Bragina, Tatyana M; Katzner, Todd E.; Milner-Gulland, E J; Schreiber, Dagmar; Sheldon, Robert; Shmalenko, Alyona; Smelansky, Ilya; Terraube, Julien; Urazaliev, Ruslan

    2016-01-01

    Temperate grasslands have suffered disproportionally from conversion to cropland, degradation and fragmentation. A large proportion of the world’s remaining near-natural grassland is situated in Kazakhstan. We aimed to assess current and emerging threats to steppe and semi-desert biodiversity in Kazakhstan and evaluate conservation research priorities. We conducted a horizon-scanning exercise among conservationists from academia and practice. We first compiled a list of 45 potential threats. These were then ranked by the survey participants according to their perceived severity, the need for research on them, and their novelty. The highest-ranked threats were related to changes in land use (leading to habitat loss and deterioration), direct persecution of wildlife, and rapid infrastructure development due to economic and population growth. Research needs were identified largely in the same areas, and the mean scores of threat severity and research need were highly correlated. Novel threats comprised habitat loss by photovoltaic and wind power stations, climate change and changes in agriculture such as the introduction of biofuels. However, novelty was not correlated with threat severity or research priority, suggesting that the most severe threats are the established ones. Important goals towards more effective steppe and semi-desert conservation in Kazakhstan include more cross-sector collaboration (e.g. by involving stakeholders in conservation and agriculture), greater allocation of funds to under-staffed areas (e.g. protected area management), better representativeness and complementarity in the protected area system and enhanced data collection for wildlife monitoring and threat assessments (including the use of citizen-science databases).

  20. Reactions to a health threat: dispositional threat orientations and message characteristics.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Gonzalez, Amelia; Denison, Elizabeth

    2011-05-01

    This study explored the interactive effects of dispositional threat orientation, type of message, and having children on reactions to a message about exposure to bisphenol A (BPA) in plastics. The study used a 2 (message: Fear Arousal or Plain)×2 (parenting status: child or no child)×2 (threat orientation: high or low) mixed factorial design. Adults (N= 200) recruited via the Internet completed measures of threat orientations, reported whether they were a parent, and read either a low or high fear-arousal message about the risks of BPA exposure. They then completed measures of reactions to the message (perceived susceptibility to BPA effects, negative emotions, and behavioural intentions to engage in protection). Depending on threat orientations, the fear arousal version of the message and parenthood had strikingly different effects, ranging from no effect (for those high in a control-based approach) to prompting change (for those low in a control-based approach) to counterproductive (for those high in an optimistic denial approach). These findings suggest that considering individual differences and their interactions with situational factors could improve both the predictive ability of threat protection theories and the delivery of messages intended to change behaviour. ©2010 The British Psychological Society.

  1. If it bleeds, it leads: separating threat from mere negativity

    PubMed Central

    Boshyan, Jasmine; Adams, Reginald B.; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F.

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. PMID:24493851

  2. Combatting Insider Threats

    NASA Astrophysics Data System (ADS)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  3. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    PubMed Central

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  4. Threat perception after the Boston Marathon bombings: The effects of personal relevance and conceptual framing.

    PubMed

    Wormwood, Jolie Baumann; Lynn, Spencer K; Feldman Barrett, Lisa; Quigley, Karen S

    2016-01-01

    We examined how the Boston Marathon bombings affected threat perception in the Boston community. In a threat perception task, participants attempted to "shoot" armed targets and avoid shooting unarmed targets. Participants viewing images of the bombings accompanied by affectively negative music and text (e.g., "Terror Strikes Boston") made more false alarms (i.e., more errors "shooting" unarmed targets) compared to participants viewing the same images accompanied by affectively positive music and text (e.g., "Boston Strong") and participants who did not view bombing images. This difference appears to be driven by decreased sensitivity (i.e., decreased ability to distinguish guns from non-guns) as opposed to a more liberal bias (i.e., favouring the "shoot" response). Additionally, the more strongly affected the participant was by the bombings, the more their sensitivity was reduced in the negatively framed condition, suggesting that this framing was particularly detrimental to the most vulnerable individuals in the affected community.

  5. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    PubMed

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  6. Are College Students' Assessments of Threat Shaped by the Dangers of Their Childhood Environment?

    PubMed

    Sherman, Amanda K; Minich, Steven H; Langen, Tom A; Skufca, Joseph; Wilke, Andreas

    2016-07-01

    Humans internalize environmental cues of mortality risk at an early age, which influences subsequent risk perceptions and behavior. In this respect, an individual's current risk assessment may be viewed as an adaptive response to the dangers present within his or her early local environment. Here we examine the relationship between several variables indicating threat within an individual's early environment (e.g., prevalence of violent and property crimes, registered sex offenders) and their perception of crime risk within both the childhood and current adult environments. We recruited a group of 657 students who hail from diverse geographic backgrounds to provide the zip code location of their childhood residence along with subjective ratings of danger of that and their current location, which enabled us to compare their ratings of risk/danger with the federally reported crime statistics of each setting. Our results indicate that the early prevalence of registered sex offenders indeed influences an individual's risk perception in adulthood, and that these factors have a differential effect on males and females. Our findings provide support for the theory that early environmental factors signaling danger affect how individuals assess risk within their adult environment. © The Author(s) 2015.

  7. Identification of the Fire Threat in Urban Transit Vehicles

    DOT National Transportation Integrated Search

    1980-06-01

    To improve mass transportation, UMTA tasked the Transportation Systems Center (TSC) to assess the overall fire threat in transit systems and to identify and recommend suitable remedial actions. This report presents the identification of the fire thre...

  8. Stereotype Threat, Inquiring about Test Takers' Race and Gender, and Performance on Low-Stakes Tests in a Large-Scale Assessment. Research Report. ETS RR-15-02

    ERIC Educational Resources Information Center

    Stricker, Lawrence J.; Rock, Donald A.; Bridgeman, Brent

    2015-01-01

    This study explores stereotype threat on low-stakes tests used in a large-scale assessment, math and reading tests in the Education Longitudinal Study of 2002 (ELS). Issues identified in laboratory research (though not observed in studies of high-stakes tests) were assessed: whether inquiring about their race and gender is related to the…

  9. In Brief: Forecasting meningitis threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  10. Bullets versus burgers: is it threat or relevance that captures attention?

    PubMed

    de Oca, Beatrice M; Black, Alison A

    2013-01-01

    Previous studies have found that potentially dangerous stimuli are better at capturing attention than neutral stimuli, a finding sometimes called the threat superiority effect. However, non-threatening stimuli also capture attention in many studies of visual attention. In Experiment 1, the relevance superiority effect was tested with a visual search task comparing detection times for threatening stimuli (guns), pleasant but motivationally relevant stimuli (food), and neutral stimuli (flowers and chairs). Gun targets were detected more rapidly than both types of neutral targets, whereas food targets were detected more quickly than the neutral chair targets only. Guns were detected more rapidly than food. In Experiment 2, threatening targets (guns and snakes), pleasant but motivationally relevant targets (money and food), and neutral targets (trees and couches) were all presented with the same neutral distractors (cactus and pots) in order to control for the valence of the distractor stimulus across the three categories of target stimuli. Threatening and pleasant target categories facilitated attention relative to neutral targets. The results support the view that both threatening and pleasant pictures can be detected more rapidly than neutral targets.

  11. Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector

    DTIC Science & Technology

    2005-06-01

    as a computer fraud case investigated by the Secret Service. Each case was analyzed from a behavioral and a technical perspective to identify...insider threat and address the issue from an approach that draws on human resources, corporate security, and information security perspectives. The ... Secret Service National Threat Assessment Center and the CERT Coordination Center of Carnegie Mellon University’s Software Engineering Institute joined

  12. Insects and their life cycle: Steps to take to assess threats

    Treesearch

    Alicia M. Bray; Jason B. Oliver

    2013-01-01

    This paper provides a brief overview of the importance of wood-boring insects to the forest nursery industry. Descriptions of the major insect groups are provided with special attention to the life stages that are most problematic within each group. Steps are provided to guide individuals to mitigate potential threats if a new insect is detected causing damage to trees...

  13. Is Your School Sick? Five Threats to Healthy Schools.

    ERIC Educational Resources Information Center

    Grubb, Deborah; Diamantes, Thomas

    1998-01-01

    Examines the five major threats to healthy school buildings: sick building syndrome; health-threatening building materials; environmental hazards such as radon gas and asbestos; lead poisoning; and general indoor air quality. Discusses ways to assess and address them. (SR)

  14. Developmental relations between behavioral inhibition, anxiety, and attention biases to threat and positive information

    PubMed Central

    White, Lauren K.; Degnan, Kathryn A.; Henderson, Heather A.; Pérez-Edgar, Koraly; Walker, Olga L.; Shechner, Tomer; Leibenluft, Ellen; Bar-Haim, Yair; Pine, Daniel S.; Fox, Nathan A.

    2016-01-01

    The current study examined relations between behavioral inhibition (BI) assessed in toddlerhood (n=268) and attention biases (AB) to threat and positive faces and maternal reported anxiety assessed when children were 5 and 7-years old. Results revealed that BI predicted anxiety at age 7 in children with AB toward threat, away from positive, or with no bias, at age 7; BI did not predict anxiety for children displaying AB away from threat or toward positive. Five-year AB did not moderate the link between BI and 7-year anxiety. No direct association between AB and BI or anxiety was detected; moreover, children did not show stable AB across development. These findings extend our understanding of the developmental links between BI, AB, and anxiety. PMID:28042902

  15. A strategy for prioritizing threats and recovery actions for at-risk species.

    PubMed

    Darst, Catherine R; Murphy, Philip J; Strout, Nathan W; Campbell, Steven P; Field, Kimberleigh J; Allison, Linda; Averill-Murray, Roy C

    2013-03-01

    Ensuring the persistence of at-risk species depends on implementing conservation actions that ameliorate threats. We developed and implemented a method to quantify the relative importance of threats and to prioritize recovery actions based on their potential to affect risk to Mojave desert tortoises (Gopherus agassizii). We used assessments of threat importance and elasticities of demographic rates from population matrix models to estimate the relative contributions of threats to overall increase in risk to the population. We found that urbanization, human access, military operations, disease, and illegal use of off highway vehicles are the most serious threats to the desert tortoise range-wide. These results suggest that, overall, recovery actions that decrease habitat loss, predation, and crushing will be most effective for recovery; specifically, we found that habitat restoration, topic-specific environmental education, and land acquisition are most likely to result in the greatest decrease in risk to the desert tortoise across its range. In addition, we have developed an application that manages the conceptual model and all supporting information and calculates threat severity and potential effectiveness of recovery actions. Our analytical approach provides an objective process for quantifying threats, prioritizing recovery actions, and developing monitoring metrics for those actions for adaptive management of any at-risk species.

  16. Are needs to manage uncertainty and threat associated with political conservatism or ideological extremity?

    PubMed

    Jost, John T; Napier, Jaime L; Thorisdottir, Hulda; Gosling, Samuel D; Palfai, Tibor P; Ostafin, Brian

    2007-07-01

    Three studies are conducted to assess the uncertainty- threat model of political conservatism, which posits that psychological needs to manage uncertainty and threat are associated with political orientation. Results from structural equation models provide consistent support for the hypothesis that uncertainty avoidance (e.g., need for order, intolerance of ambiguity, and lack of openness to experience) and threat management (e.g., death anxiety, system threat, and perceptions of a dangerous world) each contributes independently to conservatism (vs. liberalism). No support is obtained for alternative models, which predict that uncertainty and threat management are associated with ideological extremism or extreme forms of conservatism only. Study 3 also reveals that resistance to change fully mediates the association between uncertainty avoidance and conservatism, whereas opposition to equality partially mediates the association between threat and conservatism. Implications for understanding the epistemic and existential bases of political orientation are discussed.

  17. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: a review.

    PubMed

    Upadhyayula, Venkata K K

    2012-02-17

    There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad range of threat agents, including radioactive substances, explosive compounds, chemical warfare agents, biotoxins, and biothreat pathogens through any of the four sensory means mentioned previously. Copyright © 2011 Elsevier B.V. All rights reserved.

  18. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  19. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    PubMed

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  20. If it bleeds, it leads: separating threat from mere negativity.

    PubMed

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  1. Targeted gene flow for conservation.

    PubMed

    Kelly, Ella; Phillips, Ben L

    2016-04-01

    Anthropogenic threats often impose strong selection on affected populations, causing rapid evolutionary responses. Unfortunately, these adaptive responses are rarely harnessed for conservation. We suggest that conservation managers pay close attention to adaptive processes and geographic variation, with an eye to using them for conservation goals. Translocating pre-adapted individuals into recipient populations is currently considered a potentially important management tool in the face of climate change. Targeted gene flow, which involves moving individuals with favorable traits to areas where these traits would have a conservation benefit, could have a much broader application in conservation. Across a species' range there may be long-standing geographic variation in traits or variation may have rapidly developed in response to a threatening process. Targeted gene flow could be used to promote natural resistance to threats to increase species resilience. We suggest that targeted gene flow is a currently underappreciated strategy in conservation that has applications ranging from the management of invasive species and their impacts to controlling the impact and virulence of pathogens. © 2015 Society for Conservation Biology.

  2. Threats to US energy security: the challenge of Arab oil

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, J.

    1979-08-13

    Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.

  3. Theory of Prejudice and American Identity Threat Transfer for Latino and Asian Americans.

    PubMed

    Sanchez, Diana T; Chaney, Kimberly E; Manuel, Sara K; Remedios, Jessica D

    2018-03-01

    Latinos and Asian Americans confront similar stereotypes as they are often presumed to be foreigners and subjected to American identity denial. Across six studies (total N = 992), we demonstrate that Latinos and Asians anticipate ingroup prejudice and specific types of subordination (e.g., American identity threat) in the face of outgroup threats that target one another (i.e., stigma transfer). The studies explore whether stigma transfer occurred primarily when shared Latino and Asian stereotype content was a salient component of the prejudice remark (e.g., foreigner stereotypes; Study 3), or when outgroup prejudice targeted a social group with shared stereotype content (Study 4), though neither appeared to substantively moderate stigma transfer. Minority group members who conceptualize prejudiced people as holding multiple biases (i.e., a monolithic prejudice theory) were more susceptible to stigma transfer suggesting that stereotype content is not necessary for stigma transfer because people assume that prejudice is not singular.

  4. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  5. The Influence of Social Threat on Pain, Aggression, and Empathy in Women.

    PubMed

    Karos, Kai; Meulders, Ann; Goubert, Liesbet; Vlaeyen, Johan W S

    2018-03-01

    Only one published study has investigated the effect of a threatening social context on the perception and expression of pain, showing that social threat leads to increased pain reports but reduced nonverbal pain expression. The current study aimed to replicate and extend these findings to further explore the effects of a threatening social context. Healthy, female participants (N = 71) received 10 electrocutaneous stimuli delivered by a confederate. They were led to believe that the confederate was requested to administer 10 painful stimuli (control group) or that the confederate deliberately chose to deliver 10 painful stimuli when given the choice to deliver between 1 to 10 painful stimuli (social threat group). Self-reported pain intensity, unpleasantness, threat value of pain, and painful facial expression were assessed. Additionally, empathy and aggression toward the confederate were investigated. Social threat did not affect painful facial expression or self-reported pain intensity, but led to increased aggression toward the confederate. Moreover, perceived social threat predicted the threat value of pain and reduced empathy toward the confederate. We were not able to replicate the previously reported dissociation between pain reports and pain expression as a result of social threat. However, social threat was associated with an increased threat value of pain, increased aggression, and reduced empathy. A threatening social context affects how threatening pain is perceived and has interpersonal consequences such as increased aggression and reduced empathy, thereby creating a double burden on the individual suffering from pain. Copyright © 2017 The American Pain Society. Published by Elsevier Inc. All rights reserved.

  6. Perceptions of Threats to Physical Safety, Sexual Autonomy, Values, and of Discrimination Drive LGB Prejudices Toward Heterosexuals.

    PubMed

    Pirlott, Angela G; Rusten, Marta L; Butterfuss, Reese M

    2016-09-01

    Many studies have investigated heterosexuals' prejudices toward nonheterosexuals, yet LGB's prejudices toward heterosexuals remain largely unexplored. Therefore, we sought to determine the threats and opportunities (i.e., affordances) LGB perceive heterosexuals to pose and whether those affordances explain their sexual prejudices toward heterosexuals. Study 1 analyzed LGB's reasons for liking and disliking heterosexuals, which determined whether the threats predicted to be salient for LGB mirrored the affordances they generated. Study 2 measured these perceived affordances and examined the extent to which they drove LGB's prejudices toward heterosexuals. Generally, perceptions of discrimination and unreciprocated sexual interest threats drove anger, physical safety and sexual autonomy threats drove fear, and values threats drove moral disgust toward heterosexuals, although results varied slightly by perceiver and target groups. Goals to alleviate the tensions between heterosexuals and LGB require an understanding of the dynamics between these groups. This research provides preliminary insights into understanding those dynamics. © 2016 by the Society for Personality and Social Psychology, Inc.

  7. Integration of Behavioral Threat Management into Fusion Center Operations to Prevent Mass or Targeted Violence

    DTIC Science & Technology

    2016-12-01

    On Killing: The Psychological Cost of Learning to Kill in War and Society (New York: Integrated Media Incorporated, 2014), Kindle location 2618...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. INTEGRATION OF...REPORT DATE December 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE INTEGRATION OF BEHAVIORAL THREAT MANAGEMENT INTO

  8. The Paradox of Parks in Low-Income Areas: Park Use and Perceived Threats

    PubMed Central

    Cohen, Deborah A.; Han, Bing; Derose, Kathryn P.; Williamson, Stephanie; Marsh, Terry; Raaen, Laura; McKenzie, Thomas L.

    2015-01-01

    Concerns about safety and perceived threats have been considered responsible for lower use of parks in high poverty neighborhoods. To quantify the role of perceived threats on park use we systematically observed 48 parks and surveyed park users and household residents in low-income neighborhoods in the City of Los Angeles. Across all parks, the majority of both park users and local residents perceive parks as safe or very safe. We noted apparently homeless individuals during nearly half of all observations, but very few instances of fighting, intimidating groups, smoking and intoxication. The presence of homeless individuals was associated with higher numbers of park users, while the presence of intoxicated persons was associated with lower numbers. Overall the strongest predictors of increased park use were the presence of organized and supervised activities. Therefore, to increase park use, focusing resources on programming may be more fruitful than targeting perceived threats. PMID:27065480

  9. School Threat Assessment in the USA: Lessons Learned from 15 Years of Teaching and Using the Federal Model to Prevent School Shootings

    ERIC Educational Resources Information Center

    Modzeleski, William; Randazzo, Marisa Reddy

    2018-01-01

    This article provides a brief history of the development of the federal model of school threat assessment, which was created by the U.S. Secret Service and U.S. Department of Education based upon findings from their empirical research on school shootings across the USA. The article reviews the major findings from that behavioral research, which…

  10. Personal privacy, information assurance, and the threat posed by malware techology

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2006-04-01

    In spite of our best efforts to secure the cyber world, the threats posed to personal privacy by attacks upon networks and software continue unabated. While there are many reasons for this state of affairs, clearly one of the reasons for continued vulnerabilities in software is the inability to assess their security properties and test their security systems while they are in development. A second reason for this growing threat to personal privacy is the growing sophistication and maliciousness of malware coupled with the increasing difficulty of detecting malware. The pervasive threat posed by malware coupled with the difficulties faced when trying to detect its presence or an attempted intrusion make addressing the malware threat one of the most pressing issues that must be solved in order to insure personal privacy to users of the internet. In this paper, we will discuss the threat posed by malware, the types of malware found in the wild (outside of computer laboratories), and current techniques that are available for from a successful malware penetration. The paper includes a discussion of anti-malware tools and suggestions for future anti-malware efforts.

  11. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  12. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  13. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically andmore » religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.« less

  14. Responsibility/Threat Overestimation Moderates the Relationship Between Contamination-Based Disgust and Obsessive-Compulsive Concerns About Sexual Orientation.

    PubMed

    Ching, Terence H W; Williams, Monnica T; Siev, Jedidiah; Olatunji, Bunmi O

    2018-05-01

    Disgust has been shown to perform a "disease-avoidance" function in contamination fears. However, no studies have examined the relevance of disgust to obsessive-compulsive (OC) concerns about sexual orientation (e.g., fear of one's sexual orientation transforming against one's will, and compulsive avoidance of same-sex and/or gay or lesbian individuals to prevent that from happening). Therefore, we investigated whether the specific domain of contamination-based disgust (i.e., evoked by the perceived threat of transmission of essences between individuals) predicted OC concerns about sexual orientation, and whether this effect was moderated/amplified by obsessive beliefs, in evaluation of a "sexual orientation transformation-avoidance" function. We recruited 283 self-identified heterosexual college students (152 females, 131 males; mean age = 20.88 years, SD = 3.19) who completed three measures assessing disgust, obsessive beliefs, and OC concerns about sexual orientation. Results showed that contamination-based disgust (β = .17), responsibility/threat overestimation beliefs (β = .15), and their interaction (β = .17) each uniquely predicted OC concerns about sexual orientation, ts = 2.22, 2.50, and 2.90, ps < .05. Post hoc probing indicated that high contamination-based disgust accompanied by strong responsibility/threat overestimation beliefs predicted more severe OC concerns about sexual orientation, β = .48, t = 3.24, p < .001. The present study, therefore, provided preliminary evidence for a "sexual orientation transformation-avoidance" process underlying OC concerns about sexual orientation in heterosexual college students, which is facilitated by contamination-based disgust, and exacerbated by responsibility/threat overestimation beliefs. Treatment for OC concerns about sexual orientation should target such beliefs.

  15. Threat-detection in child development: an evolutionary perspective.

    PubMed

    Boyer, Pascal; Bergstrom, Brian

    2011-03-01

    Evidence for developmental aspects of fear-targets and anxiety suggests a complex but stable pattern whereby specific kinds of fears emerge at different periods of development. This developmental schedule seems appropriate to dangers encountered repeatedly during human evolution. Also consistent with evolutionary perspective, the threat-detection systems are domain-specific, comprising different kinds of cues to do with predation, intraspecific violence, contamination-contagion and status loss. Proper evolutionary models may also be relevant to outstanding issues in the domain, notably the connections between typical development and pathology. Copyright © 2010 Elsevier Ltd. All rights reserved.

  16. Traits, States, and Attentional Gates: Temperament and Threat Relevance as Predictors of Attentional Bias to Social Threat

    PubMed Central

    Helzer, Erik G.; Connor-Smith, Jennifer K.; Reed, Marjorie A.

    2009-01-01

    This study investigated the influence of situational and dispositional factors on attentional biases toward social threat, and the impact of these attentional biases on distress in a sample of adolescents. Results suggest greater biases for personally-relevant threat cues, as individuals reporting high social stress were vigilant to subliminal social threat cues, but not physical threat cues, and those reporting low social stress showed no attentional biases. Individual differences in fearful temperament and attentional control interacted to influence attentional biases, with fearful temperament predicting biases to supraliminal social threat only for individuals with poor attentional control. Multivariate analyses exploring relations between attentional biases for social threat and symptoms of anxiety and depression revealed that attentional biases alone were rarely related to symptoms. However, biases did interact with social stress, fearful temperament, and attentional control to predict distress. Results are discussed in terms of automatic and effortful cognitive mechanisms underlying threat cue processing. PMID:18791905

  17. Quality Assessment of Medical Apps that Target Medication-Related Problems.

    PubMed

    Loy, John Shiguang; Ali, Eskinder Eshetu; Yap, Kevin Yi-Lwern

    2016-10-01

    The advent of smartphones has enabled a plethora of medical apps for disease management. As of 2012, there are 40,000 health care-related mobile apps available in the market. Since most of these medical apps do not go through any stringent quality assessment, there is a risk of consumers being misinformed or misled by unreliable information. In this regard, apps that target medication-related problems (MRPs) are not an exception. There is little information on what constitutes quality in apps that target MRPs and how good the existing apps are. To develop a quality assessment tool for evaluating apps that target MRPs and assess the quality of such apps available in the major mobile app stores (iTunes and Google Play). The top 100 free and paid apps in the medical categories of iTunes and Google Play stores (total of 400 apps) were screened for inclusion in the final analysis. English language apps that targeted MRPs were downloaded on test devices to evaluate their quality. Apps intended for clinicians, patients, or both were eligible for evaluation. The quality assessment tool consisted of 4 sections (appropriateness, reliability, usability, privacy), which determined the overall quality of the apps. Apps that fulfilled the inclusion criteria were classified based on the presence of any 1 or more of the 5 features considered important for apps targeting MRPs (monitoring, interaction checker, dose calculator, medication information, medication record). Descriptive statistics and Mann-Whitney tests were used for analysis. Final analysis was based on 59 apps that fulfilled the study inclusion criteria. Apps with interaction checker (66.9%) and monitoring features (54.8%) had the highest and lowest overall qualities. Paid apps generally scored higher for usability than free apps (P = 0.006) but lower for privacy (P = 0.003). Half of the interaction checker apps were unable to detect interactions with herbal medications. Blood pressure and heart rate monitoring apps

  18. Nuclear terrorism - Threat or not?

    NASA Astrophysics Data System (ADS)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  19. A horizon scanning assessment of current and potential future threats to migratory shorebirds

    USGS Publications Warehouse

    Sutherland, William J.; Alves, José A.; Amano, Tatsuya; Chang, Charlotte H.; Davidson, Nicholas C.; Finlayson, C. Max; Gill, Jennifer A.; Gill, Robert E.; González, Patricia M.; Gunnarsson, Tómas Grétar; Kleijn, David; Spray, Chris J.; Székely, Tamás; Thompson, Des B.A.

    2012-01-01

    We review the conservation issues facing migratory shorebird populations that breed in temperate regions and use wetlands in the non-breeding season. Shorebirds are excellent model organisms for understanding ecological, behavioural and evolutionary processes and are often used as indicators of wetland health. A global team of experienced shorebird researchers identified 45 issues facing these shorebird populations, and divided them into three categories (natural, current anthropogenic and future issues). The natural issues included megatsunamis, volcanoes and regional climate changes, while current anthropogenic threats encompassed agricultural intensification, conversion of tidal flats and coastal wetlands by human infrastructure developments and eutrophication of coastal systems. Possible future threats to shorebirds include microplastics, new means of recreation and infectious diseases. We suggest that this review process be broadened to other taxa to aid the identification and ranking of current and future conservation actions.

  20. Breast-related stereotype threat contributes to a symptom cluster in women with breast cancer.

    PubMed

    Li, Jie; Gao, Wei; Yu, Li-Xiang; Zhu, Song-Ying; Cao, Feng-Lin

    2017-05-01

    To investigate the prevalence of breast-related stereotype threat and its effects on a symptom cluster consisting of anxiety, depression and fatigue and on each symptom. The stereotype that breasts are a sign of women's femininity results in patients with breast cancer fearing diminished femininity and rejection, which may induce psychological problems that co-occur as a symptom cluster. Cross-sectional study. A total of 131 patients with breast cancer postmastectomy completed the study. A question measuring breast-related stereotype threat, the Hospital Anxiety and Depression Scale and the Functional Assessment of Chronic Illness Therapy-Fatigue Scale were used to assess their breast-related stereotype threat and symptoms of anxiety, depression and fatigue. Of the 131 patients who answered the breast-related stereotype threat question, 86 (65·6%) reported breast-related stereotype threat. They did not differ significantly in social and clinical characteristics compared with those without the stereotype, but did report significantly higher levels of the symptom cluster and each symptom (anxiety, depression and fatigue). The odds ratios of the stereotype were significant for the symptom cluster, depression and fatigue (odds ratios = 2·52-3·98, p < 0·05). The breast-related stereotype threat was common in patients with breast cancer. There was about a twofold increase in their risk of experiencing the symptom cluster and symptoms of depression and fatigue. In clinical practice, breast-related stereotype threat should be measured together with prevalent symptoms (e.g. anxiety, depression and fatigue) in patients with breast cancer. Our findings will aid the development of interventions for improving the mental health of women with breast cancer. © 2016 John Wiley & Sons Ltd.

  1. Asynchronous threat awareness by observer trials using crowd simulation

    NASA Astrophysics Data System (ADS)

    Dunau, Patrick; Huber, Samuel; Stein, Karin U.; Wellig, Peter

    2016-10-01

    The last few years showed that a high risk of asynchronous threats is given in every day life. Especially in large crowds a high probability of asynchronous attacks is evident. High observational abilities to detect threats are desirable. Consequently highly trained security and observation personal is needed. This paper evaluates the effectiveness of a training methodology to enhance performance of observation personnel engaging in a specific target identification task. For this purpose a crowd simulation video is utilized. The study first provides a measurement of the base performance before the training sessions. Furthermore a training procedure will be performed. Base performance will then be compared to the after training performance in order to look for a training effect. A thorough evaluation of both the training sessions as well as the overall performance will be done in this paper. A specific hypotheses based metric is used. Results will be discussed in order to provide guidelines for the design of training for observational tasks.

  2. A freshwater biodiversity hotspot under pressure - assessing threats and identifying conservation needs for ancient Lake Ohrid

    NASA Astrophysics Data System (ADS)

    Kostoski, G.; Albrecht, C.; Trajanovski, S.; Wilke, T.

    2010-07-01

    Freshwater habitats and species living in freshwater are generally more prone to extinction than terrestrial or marine ones. Immediate conservation measures for world-wide freshwater resources are thus of eminent importance. This is particularly true for so called ancient lakes. While these lakes are famous for being evolutionary theatres, often displaying an extraordinarily high degree of biodiversity and endemism, in many cases these biota are also experiencing extreme anthropogenic impact. Lake Ohrid, the European biodiversity hotspot, is a prime example for a lake with a magnitude of narrow range endemic taxa that are under increasing anthropogenic pressure. Unfortunately, evidence for a "creeping biodiversity crisis" has accumulated over the last decades, and major socio-political changes have gone along with human-mediated environmental changes. Based on field surveys, monitoring data, published records, and expert interviews, we aimed to (1) assess threats to Lake Ohrids' (endemic) biodiversity, (2) summarize existing conservation activities and strategies, and (3) outline future conservation needs for Lake Ohrid. We compiled threats to both specific taxa (and in cases to particular species) as well as to the lake ecosystems itself. Major conservation concerns identified for Lake Ohrid are: (1) watershed impacts, (2) agriculture and forestry, (3) tourism and population growth, (4) non-indigenous species, (5) habitat alteration or loss, (6) unsustainable exploitation of fisheries, and (7) global climate change. Of the 11 IUCN (International Union for Conservation of Nature and Natural Resources) threat classes scored, seven have moderate and three severe impacts. These latter threat classes are energy production and mining, biological resource use, and pollution. We review and discuss institutional responsibilities, environmental monitoring and ecosystem management, existing parks and reserves, biodiversity and species measures, international conservation

  3. Early adolescent adversity inflates threat estimation in females and promotes alcohol use initiation in both sexes.

    PubMed

    Walker, Rachel A; Andreansky, Christopher; Ray, Madelyn H; McDannald, Michael A

    2018-06-01

    Childhood adversity is associated with exaggerated threat processing and earlier alcohol use initiation. Conclusive links remain elusive, as childhood adversity typically co-occurs with detrimental socioeconomic factors, and its impact is likely moderated by biological sex. To unravel the complex relationships among childhood adversity, sex, threat estimation, and alcohol use initiation, we exposed female and male Long-Evans rats to early adolescent adversity (EAA). In adulthood, >50 days following the last adverse experience, threat estimation was assessed using a novel fear discrimination procedure in which cues predict a unique probability of footshock: danger (p = 1.00), uncertainty (p = .25), and safety (p = .00). Alcohol use initiation was assessed using voluntary access to 20% ethanol, >90 days following the last adverse experience. During development, EAA slowed body weight gain in both females and males. In adulthood, EAA selectively inflated female threat estimation, exaggerating fear to uncertainty and safety, but promoted alcohol use initiation across sexes. Meaningful relationships between threat estimation and alcohol use initiation were not observed, underscoring the independent effects of EAA. Results isolate the contribution of EAA to adult threat estimation, alcohol use initiation, and reveal moderation by biological sex. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  4. A Model for Assessment and Mitigation of Threats on the College Campus

    ERIC Educational Resources Information Center

    Keller, Eileen Weisenbach; Hughes, Stephanie; Hertz, Giles

    2011-01-01

    Purpose: An increase in the number of disruptive and violent events on college and university campuses instigated this review of the methods used to interrupt the trend, with the goal of identifying a preliminary model for systematic management of such threats. The intent is to instigate research, review and discussion in order to decrease the…

  5. The impact of Stereotype Threat on the simulated driving performance of older drivers.

    PubMed

    Joanisse, Mélanie; Gagnon, Sylvain; Voloaca, Mihnea

    2013-01-01

    Older drivers are perceived as being dangerous and overly cautious by other drivers. We tested the hypothesis that this negative stereotype has a direct influence on the performance of older drivers. Based on the Stereotype Threat literature, we predicted that older driving performance would be altered after exposure to a Stereotype Threat. Sixty-one older drivers aged 65 and above completed a simulated driving assessment course. Prior to testing, half of the participants were told that the objective of the study was to investigate why older adults aged 65 and above were more implicated in on-road accidents (Stereotype Threat condition) and half were showed a neutral statement. Results confirmed that exposure to the threat significantly altered driving performance. Older adults in the Stereotype Threat condition made more driving mistakes than those in the control group. Interestingly, under a Stereotype Threat condition, older adults tended to commit more speeding infractions. We also observed that domain identification (whether driving is deemed important or not) moderated the impact of the threat. Taken together, these results support recent older drivers' performance models suggesting that the interaction between individual and social factors need to be considered when examining older drivers' performance. Copyright © 2012 Elsevier Ltd. All rights reserved.

  6. Developmental changes in threat and self-blame for preschoolers exposed to intimate partner violence (IPV).

    PubMed

    Miller, Laura E; Howell, Kathryn H; Graham-Bermann, Sandra A

    2014-06-01

    The presence of threat and self-blame in children exposed to violence in the home has been linked to a number of negative behavioral and emotional consequences across developmental periods. Little research, however, has examined self-reported attributions of threat and self-blame in children under the age of 6. The current study evaluated the developmental trajectories of appraisals of threat and self-blame in preschool-aged children recently exposed to intimate partner violence. It was hypothesized that (a) children's appraisals of threat and self-blame would naturally decrease over time and (b) there would be a main effect of child sex on appraisals of self-blame but not threat, such that girls would report higher levels of self-blame than boys. Participants included 68 preschool-aged children (ages 4-6) who were interviewed at two time points over the course of 1 year. Multilevel modeling was employed to examine the effects of violence exposure, child age, and child sex over time. Children's attributions of threat were stable over the course of 1 year, but greater child age was related to lower appraisals of threat. Children's appraisals of self-blame increased over time, and there was a trend for girls to report more self-blame than did boys. It appears that without intervention, young children may be at risk of developing relatively stable maladaptive cognitive patterns, thereby heightening their risk of subsequent developmental psychopathology. Furthermore, girls may need additional intervention targeted at addressing attributions of self-blame.

  7. A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olama, Mohammed M; Allgood, Glenn O; Davenport, Kristen M

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) asmore » well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.« less

  8. Short-term serotonergic but not noradrenergic antidepressant administration reduces attentional vigilance to threat in healthy volunteers.

    PubMed

    Murphy, Susannah E; Yiend, Jenny; Lester, Kathryn J; Cowen, Philip J; Harmer, Catherine J

    2009-03-01

    Anxiety is associated with threat-related biases in information processing such as heightened attentional vigilance to potential threat. Such biases are an important focus of psychological treatments for anxiety disorders. Selective serotonin reuptake inhibitors (SSRIs) are effective in the treatment of a range of anxiety disorders. The aim of this study was to assess the effect of an SSRI on the processing of threat in healthy volunteers. A selective noradrenergic reuptake inhibitor (SNRI), which is not generally used in the treatment of anxiety, was used as a contrast to assess the specificity of SSRI effects on threat processing. Forty-two healthy volunteers were randomly assigned to 7 d double-blind intervention with the SSRI citalopram (20 mg/d), the SNRI reboxetine (8 mg/d), or placebo. On the final day, attentional and interpretative bias to threat was assessed using the attentional probe and the homograph primed lexical decision tasks. Citalopram reduced attentional vigilance towards fearful faces but did not affect the interpretation of ambiguous homographs as threatening. Reboxetine had no significant effect on either of these measures. Citalopram reduces attentional orienting to threatening stimuli, which is potentially relevant to its clinical use in the treatment of anxiety disorders. This finding supports a growing literature suggesting that an important mechanism through which pharmacological agents may exert their effects on mood is by reversing the cognitive biases that characterize the disorders that they treat. Future studies are needed to clarify the neural mechanisms through which these effects on threat processing are mediated.

  9. Insider Threat: Preventing Direct Action Attacks Within the United States Army

    DTIC Science & Technology

    2017-06-09

    violence within the United States, this study focused solely on cases where a US Army Soldier attacked fellow Soldiers. For the purposes of this study ...chapters will examine Army doctrine and two case studies , in detail. The conclusion of this project will provide recommendations on improved... study specifically on insider threats pertaining to targeted violence, this literature review does not include information pertaining to cases

  10. Alcohol's effects on emotionally motivated attention, defensive reactivity and subjective anxiety during uncertain threats.

    PubMed

    Bradford, Daniel E; Motschman, Courtney A; Starr, Mark J; Curtin, John J

    2017-11-01

    Developing a better understanding of how and under what circumstances alcohol affects the emotions, cognitions and neural functions that precede and contribute to dangerous behaviors during intoxication may help to reduce their occurrence. Alcohol intoxication has recently been shown to reduce defensive reactivity and anxiety more during uncertain vs certain threat. However, alcohol's effects on emotionally motivated attention to these threats are unknown. Alcohol may disrupt both affective response to and attentional processing of uncertain threats making intoxicated individuals less able to avoid dangerous and costly behaviors. To test this possibility, we examined the effects of a broad range of blood alcohol concentrations on 96 participants' sub-cortically mediated defensive reactivity (startle potentiation), retrospective subjective anxiety (self-report) and cortically assessed emotionally motivated attention (probe P3 event related potential) while they experienced visually cued uncertain and certain location electric shock threat. As predicted, alcohol decreased defensive reactivity and subjective anxiety more during uncertain vs certain threat. In a novel finding, alcohol dampened emotionally motivated attention during uncertain but not certain threat. This effect appeared independent of alcohol's effects on defensive reactivity and subjective anxiety. These results suggest that alcohol intoxication dampens processing of uncertain threats while leaving processing of certain threats intact. © The Author (2017). Published by Oxford University Press.

  11. Towards a general framework for predicting threat status of data-deficient species from phylogenetic, spatial and environmental information.

    PubMed

    Jetz, Walter; Freckleton, Robert P

    2015-02-19

    In taxon-wide assessments of threat status many species remain not included owing to lack of data. Here, we present a novel spatial-phylogenetic statistical framework that uses a small set of readily available or derivable characteristics, including phylogenetically imputed body mass and remotely sensed human encroachment, to provide initial baseline predictions of threat status for data-deficient species. Applied to assessed mammal species worldwide, the approach effectively identifies threatened species and predicts the geographical variation in threat. For the 483 data-deficient species, the models predict highly elevated threat, with 69% 'at-risk' species in this set, compared with 22% among assessed species. This results in 331 additional potentially threatened mammals, with elevated conservation importance in rodents, bats and shrews, and countries like Colombia, Sulawesi and the Philippines. These findings demonstrate the future potential for combining phylogenies and remotely sensed data with species distributions to identify species and regions of conservation concern. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  12. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  13. Determination of High-Speed Multiple Threat Using Kalman Filter Analysis of Maritime Movement

    DTIC Science & Technology

    2015-06-01

    Ownship, in the blue circle, has destroyed a threat Figure 9. ship, as represented with the red line... destroyed and still arriving when the ship is destroyed ...defenses of a given target. These kinds of attacks are typically used against High Value Assets (HVA), destroyers or larger. While it would be easy

  14. Salience of the Nuclear Threat: Operationalization through Spontaneous Concern.

    ERIC Educational Resources Information Center

    Mayton, Daniel M., II

    An indirect/nonreactive technique of assessing spontaneous concern should be used to examine the salience of the threat of nuclear war. Direct/reactive techniques may produce inconsistent results and inadvertently enhance a false consensus. The procedures for the administration, scoring, and interpretation of a spontaneous concern measure along…

  15. Spontaneous default mode network phase-locking moderates performance perceptions under stereotype threat

    PubMed Central

    Leitner, Jordan B.; Duran-Jordan, Kelly; Magerman, Adam B.; Schmader, Toni; Allen, John J. B.

    2015-01-01

    This study assessed whether individual differences in self-oriented neural processing were associated with performance perceptions of minority students under stereotype threat. Resting electroencephalographic activity recorded in white and minority participants was used to predict later estimates of task errors and self-doubt on a presumed measure of intelligence. We assessed spontaneous phase-locking between dipole sources in left lateral parietal cortex (LPC), precuneus/posterior cingulate cortex (P/PCC), and medial prefrontal cortex (MPFC); three regions of the default mode network (DMN) that are integral for self-oriented processing. Results revealed that minorities with greater LPC-P/PCC phase-locking in the theta band reported more accurate error estimations. All individuals experienced less self-doubt to the extent they exhibited greater LPC-MPFC phase-locking in the alpha band but this effect was driven by minorities. Minorities also reported more self-doubt to the extent they overestimated errors. Findings reveal novel neural moderators of stereotype threat effects on subjective experience. Spontaneous synchronization between DMN regions may play a role in anticipatory coping mechanisms that buffer individuals from stereotype threat. PMID:25398433

  16. Autobiographical memory sources of threats in dreams.

    PubMed

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. Exaggerated neurobiological sensitivity to threat as a mechanism linking anxiety with increased risk for diseases of aging

    PubMed Central

    O’Donovan, Aoife; Slavich, George M; Epel, Elissa S.; Neylan, Thomas C

    2015-01-01

    Anxiety disorders increase risk for the early development of several diseases of aging. Elevated inflammation, a common risk factor across diseases of aging, may play a key role in the relationship between anxiety and physical disease. However, the neurobiological mechanisms linking anxiety with elevated inflammation remain unclear. In this review, we present a neurobiological model of the mechanisms by which anxiety promotes inflammation. Specifically we propose that exaggerated neurobiological sensitivity to threat in anxious individuals may lead to sustained threat perception, which is accompanied by prolonged activation of threat-related neural circuitry and threat-responsive biological systems including the hypothalamic-pituitary-adrenal (HPA) axis, autonomic nervous system (ANS), and inflammatory response. Over time, this pattern of responding can promote chronic inflammation through structural and functional brain changes, altered sensitivity of immune cell receptors, dysregulation of the HPA axis and ANS, and accelerated cellular aging. Chronic inflammation, in turn, increases risk for diseases of aging. Exaggerated neurobiological sensitivity to threat may thus be a treatment target for reducing disease risk in anxious individuals. PMID:23127296

  18. Healthcare Stereotype Threat in Older Adults in the Health and Retirement Study.

    PubMed

    Abdou, Cleopatra M; Fingerhut, Adam W; Jackson, James S; Wheaton, Felicia

    2016-02-01

    Healthcare stereotype threat is the threat of being personally reduced to group stereotypes that commonly operate within the healthcare domain, including stereotypes regarding unhealthy lifestyles and inferior intelligence. The objective of this study was to assess the extent to which people fear being judged in healthcare contexts on several characteristics, including race/ethnicity and age, and to test predictions that experience of such threats would be connected with poorer health and negative perceptions of health care. Data were collected as part of the 2012 Health and Retirement Study (HRS). A module on healthcare stereotype threat, designed by the research team, was administered to a random subset (n=2,048 of the total 20,555) of HRS participants. The final sample for the present healthcare stereotype threat experiment consists of 1,479 individuals. Logistic regression was used to test whether healthcare stereotype threat was associated with self-rated health, reported hypertension, and depressive symptoms, as well as with healthcare-related outcomes, including physician distrust, dissatisfaction with health care, and preventative care use. Seventeen percent of respondents reported healthcare stereotype threat with respect to one or more aspects of their identities. As predicted, healthcare stereotype threat was associated with higher physician distrust and dissatisfaction with health care, poorer mental and physical health (i.e., self-rated health, hypertension, and depressive symptoms), and lower odds of receiving the influenza vaccine. The first of its kind, this study demonstrates that people can experience healthcare stereotype threat on the basis of various stigmatized aspects of social identity, and that these experiences can be linked with larger health and healthcare-related outcomes, thereby contributing to disparities among minority groups. Copyright © 2016. Published by Elsevier Inc.

  19. A cell death assay for assessing the mitochondrial targeting of proteins.

    PubMed

    Camara Teixeira, Daniel; Cordonier, Elizabeth L; Wijeratne, Subhashinee S K; Huebbe, Patricia; Jamin, Augusta; Jarecke, Sarah; Wiebe, Matthew; Zempleni, Janos

    2018-06-01

    The mitochondrial proteome comprises 1000 to 1500 proteins, in addition to proteins for which the mitochondrial localization is uncertain. About 800 diseases have been linked with mutations in mitochondrial proteins. We devised a cell survival assay for assessing the mitochondrial localization in a high-throughput format. This protocol allows us to assess the mitochondrial localization of proteins and their mutants, and to identify drugs and nutrients that modulate the mitochondrial targeting of proteins. The assay works equally well for proteins directed to the outer mitochondrial membrane, inner mitochondrial membrane mitochondrial and mitochondrial matrix, as demonstrated by assessing the mitochondrial targeting of the following proteins: carnitine palmitoyl transferase 1 (consensus sequence and R123C mutant), acetyl-CoA carboxylase 2, uncoupling protein 1 and holocarboxylase synthetase. Our screen may be useful for linking the mitochondrial proteome with rare diseases and for devising drug- and nutrition-based strategies for altering the mitochondrial targeting of proteins. Copyright © 2018 Elsevier Inc. All rights reserved.

  20. Assessing the impact of the U.S. Endangered Species Act recovery planning guidelines on managing threats for listed species.

    PubMed

    Troyer, Caitlin M; Gerber, Leah R

    2015-10-01

    The Endangered Species Act (ESA) of the United States was enacted in 1973 to prevent the extinction of species. Recovery plans, required by 1988 amendments to the ESA, play an important role in organizing these efforts to protect and recover species. To improve the use of science in the recovery planning process, the Society for Conservation Biology (SCB) commissioned an independent review of endangered species recovery planning in 1999. From these findings, the SCB made key recommendations for how management agencies could improve the recovery planning process, after which the U.S. Fish and Wildlife Service and the National Marine Fisheries Service redrafted their recovery planning guidelines. One important recommendation called for recovery plans to make threats a primary focus, including organizing and prioritizing recovery tasks for threat abatement. We sought to determine the extent to which results from the SCB study were incorporated into these new guidelines and whether the SCB recommendations regarding threats manifested in recovery plans written under the new guidelines. Recovery planning guidelines generally incorporated the SCB recommendations, including those for managing threats. However, although recent recovery plans have improved in their treatment of threats, many fail to adequately incorporate threat monitoring. This failure suggests that developing clear guidelines for monitoring should be an important priority in improving ESA recovery planning. © 2015 Society for Conservation Biology.

  1. Conditioned social dominance threat: observation of others’ social dominance biases threat learning

    PubMed Central

    Molapour, Tanaz; Olsson, Andreas

    2016-01-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants’ eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. PMID:27217107

  2. A standard lexicon for biodiversity conservation: unified classifications of threats and actions.

    PubMed

    Salafsky, Nick; Salzer, Daniel; Stattersfield, Alison J; Hilton-Taylor, Craig; Neugarten, Rachel; Butchart, Stuart H M; Collen, Ben; Cox, Neil; Master, Lawrence L; O'Connor, Sheila; Wilkie, David

    2008-08-01

    An essential foundation of any science is a standard lexicon. Any given conservation project can be described in terms of the biodiversity targets, direct threats, contributing factors at the project site, and the conservation actions that the project team is employing to change the situation. These common elements can be linked in a causal chain, which represents a theory of change about how the conservation actions are intended to bring about desired project outcomes. If project teams want to describe and share their work and learn from one another, they need a standard and precise lexicon to specifically describe each node along this chain. To date, there have been several independent efforts to develop standard classifications for the direct threats that affect biodiversity and the conservation actions required to counteract these threats. Recognizing that it is far more effective to have only one accepted global scheme, we merged these separate efforts into unified classifications of threats and actions, which we present here. Each classification is a hierarchical listing of terms and associated definitions. The classifications are comprehensive and exclusive at the upper levels of the hierarchy, expandable at the lower levels, and simple, consistent, and scalable at all levels. We tested these classifications by applying them post hoc to 1191 threatened bird species and 737 conservation projects. Almost all threats and actions could be assigned to the new classification systems, save for some cases lacking detailed information. Furthermore, the new classification systems provided an improved way of analyzing and comparing information across projects when compared with earlier systems. We believe that widespread adoption of these classifications will help practitioners more systematically identify threats and appropriate actions, managers to more efficiently set priorities and allocate resources, and most important, facilitate cross-project learning and the

  3. Outcome and Efficacy of Interventions by a Public Figure Threat Assessment and Management Unit: A Mirrored Study of Concerning Behaviors and Police Contacts Before and After Intervention.

    PubMed

    James, David V; Farnham, Frank R

    2016-09-01

    Specialized units for the assessment and management of concerning behaviors towards public figures have been set up in various jurisdictions. Their efficacy has been demonstrated descriptively and in terms of reduction in concern rates. This study of 100 consecutive cases from the Fixated Threat Assessment Centre (FTAC) in the UK uses a novel measure of outcome in the form of reduction in behaviors of concern and in police call-outs/stops, using data culled from police and health service records. It adopts a mirrored design, comparing individuals over 12-month and 2-year periods before and after FTAC intervention. It demonstrates significant reductions in both numbers of individuals involved in, and number of actual incidents of, concerning communication and problematic approach, as well as police call-outs/stops. Most results are consistent across subgroups with regard to gender, previous convictions, concern level, compulsory hospitalization and grievance-driven behavior. Such threat assessment units reduce risky behavior and save police time and, possibly, costs. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  4. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  5. Men Respond Too: The Effects of a Social-Evaluative Body Image Threat on Shame and Cortisol in University Men

    PubMed Central

    Lamarche, Larkin; Ozimok, Brianne; Gammage, Kimberley L.; Muir, Cameron

    2017-01-01

    Framed within social self-preservation theory, the present study investigated men’s psychobiological responses to social-evaluative body image threats. University men (n = 66) were randomly assigned to either a high or low social-evaluative body image threat condition. Participants provided saliva samples (to assess cortisol) and completed measures of state body shame prior to and following their condition, during which anthropometric and strength measures were assessed. Baseline corrected values indicated men in the high social-evaluative body image threat condition had higher body shame and cortisol than men in the low social-evaluative body image threat condition. These findings suggest that social evaluation in the context of situations that threaten body image leads to potentially negative psychobiological responses in college men. PMID:28891388

  6. Men Respond Too: The Effects of a Social-Evaluative Body Image Threat on Shame and Cortisol in University Men.

    PubMed

    Lamarche, Larkin; Ozimok, Brianne; Gammage, Kimberley L; Muir, Cameron

    2017-11-01

    Framed within social self-preservation theory, the present study investigated men's psychobiological responses to social-evaluative body image threats. University men ( n = 66) were randomly assigned to either a high or low social-evaluative body image threat condition. Participants provided saliva samples (to assess cortisol) and completed measures of state body shame prior to and following their condition, during which anthropometric and strength measures were assessed. Baseline corrected values indicated men in the high social-evaluative body image threat condition had higher body shame and cortisol than men in the low social-evaluative body image threat condition. These findings suggest that social evaluation in the context of situations that threaten body image leads to potentially negative psychobiological responses in college men.

  7. Attention bias for social threat in youth with tic disorders: Links with tic severity and social anxiety.

    PubMed

    Pile, Victoria; Robinson, Sally; Topor, Marta; Hedderly, Tammy; Lau, Jennifer Y F

    2018-06-07

    Many individuals with Tourette syndrome and chronic tic disorders (TS/CTDs) report poor social functioning and comorbid social anxiety. Yet limited research has investigated the role of cognitive factors that highlight social threats in youth with TS/CTD, and whether these biases underlie tic severity and co-occurring social anxiety. This study examined whether selective attention to social threat is enhanced young people with TS/CTDs compared to healthy controls, and whether attention biases are associated with tic severity and social anxiety. Twenty seven young people with TS/CTDs and 25 matched control participants completed an experimental measure of attention bias toward/away from threat stimuli. A clinician-rated interview measuring tic severity/impairment (YGTSS Total Score) and questionnaire measures of social anxiety were completed by participants and their parents. Young people with TS/CTD showed an attention bias to social threat words (relative to benign words) compared to controls but no such bias for social threat faces. Attention bias for social threat words was associated with increasing YGTSS Total Score and parent-reported social anxiety in the TS/CTDs group. Mediation analysis revealed a significant indirect path between YGTSS Total Score and social anxiety, via attention to social threat. Tentatively, these associations appeared to be driven by impairment rather than tic severity scores. Preliminary data suggests that youth with TS/CTD have enhanced attention to threat, compared to controls, and this is associated with impairment and social anxiety. Attention to threat could offer a cognitive mechanism connecting impairment and social anxiety, and so be a valuable trans-diagnostic treatment target.

  8. Meeting the challenge of interacting threats in freshwater ecosystems: A call to scientists and managers

    USGS Publications Warehouse

    Craig, Laura S.; Olden, Julian D.; Arthington, Angela; Entrekin, Sally; Hawkins, Charles P.; Kelly, John J.; Kennedy, Theodore A.; Maitland, Bryan M.; Rosi, Emma J.; Roy, Allison; Strayer, David L.; Tank, Jennifer L.; West, Amie O.; Wooten, Matthew S.

    2017-01-01

    Human activities create threats that have consequences for freshwater ecosystems and, in most watersheds, observed ecological responses are the result of complex interactions among multiple threats and their associated ecological alterations. Here we discuss the value of considering multiple threats in research and management, offer suggestions for filling knowledge gaps, and provide guidance for addressing the urgent management challenges posed by multiple threats in freshwater ecosystems. There is a growing literature assessing responses to multiple alterations, and we build off this background to identify three areas that require greater attention: linking observed alterations to threats, understanding when and where threats overlap, and choosing metrics that best quantify the effects of multiple threats. Advancing science in these areas will help us understand existing ecosystem conditions and predict future risk from multiple threats. Because addressing the complex issues and novel ecosystems that arise from the interaction of multiple threats in freshwater ecosystems represents a significant management challenge, and the risks of management failure include loss of biodiversity, ecological goods, and ecosystem services, we also identify actions that could improve decision-making and management outcomes. These actions include drawing insights from management of individual threats, using threat attributes (e.g., causes and spatio-temporal dynamics) to identify suitable management approaches, testing management strategies that are likely to be successful despite uncertainties about the nature of interactions among threats, avoiding unintended consequences, and maximizing conservation benefits. We also acknowledge the broadly applicable challenges of decision-making within a socio-political and economic framework, and suggest that multidisciplinary teams will be needed to innovate solutions to meet the current and future challenge of interacting threats in

  9. Assessment of a Targeted Trap-Neuter-Return Pilot Study in Auckland, New Zealand

    PubMed Central

    Zito, Sarah; Vigeant, Shalsee; Dale, Arnja

    2018-01-01

    Simple Summary It is generally accepted that stray cats need to be managed to minimise the associated negative impacts and there is a need for effective and humane management tools. One such potential tool is trap-neuter-return (TNR), which anecdotally has been used in New Zealand to manage stray cats, but no concerted and targeted implementation of this technique has been reported, nor any formal assessments conducted. A targeted TNR (TTNR) programme for urban stray cats was implemented and assessed in one Auckland suburb. Assessment was based on the number of incoming felines; stray, unsocialised cats euthanased; unsocialised, unowned cats sterilised and returned (independently of the TTNR programme); and neonatal/underage euthanasias. Incoming stray feline, underage euthanasia, and unsocialised stray cat euthanasia numbers all reduced for the targeted suburb when these outcome measures were compared for the years before and after the programme. These outcome measures had a greater reduction in the targeted suburb compared to the other Auckland suburbs not targeted by the TTNR programme, although causation cannot be inferred, as a variety of reasons could have contributed to the changes. This pilot programme suggests that TTNR could be a valuable humane cat management tool in urban New Zealand, and further assessment is warranted. Abstract There is a need for effective and humane management tools to manage urban stray cats and minimise negative impacts associated with stray cats. One such tool is targeted trap-neuter-return (TTNR), but no concerted implementation of this technique or formal assessments have been reported. To address this deficit, a TTNR programme was implemented and assessed in one Auckland suburb from May 2015 to June 2016; the programme sterilised and returned 348 cats (4.2 cats/1000 residents). Assessment was based on the number of incoming felines; stray, unsocialised cats euthanased; unsocialised, unowned cats sterilised and returned

  10. Postural threat influences vestibular-evoked muscular responses.

    PubMed

    Lim, Shannon B; Cleworth, Taylor W; Horslen, Brian C; Blouin, Jean-Sébastien; Inglis, J Timothy; Carpenter, Mark G

    2017-02-01

    Standing balance is significantly influenced by postural threat. While this effect has been well established, the underlying mechanisms of the effect are less understood. The involvement of the vestibular system is under current debate, and recent studies that investigated the effects of height-induced postural threat on vestibular-evoked responses provide conflicting results based on kinetic (Horslen BC, Dakin CJ, Inglis JT, Blouin JS, Carpenter MG. J Physiol 592: 3671-3685, 2014) and kinematic (Osler CJ, Tersteeg MC, Reynolds RF, Loram ID. Eur J Neurosci 38: 3239-3247, 2013) data. We examined the effect of threat of perturbation, a different form of postural threat, on coupling (cross-correlation, coherence, and gain) of the vestibulo-muscular relationship in 25 participants who maintained standing balance. In the "No-Threat" conditions, participants stood quietly on a stable surface. In the "Threat" condition, participants' balance was threatened with unpredictable mediolateral support surface tilts. Quiet standing immediately before the surface tilts was compared to an equivalent time from the No-Threat conditions. Surface EMG was recorded from bilateral trunk, hip, and leg muscles. Hip and leg muscles exhibited significant increases in peak cross-correlation amplitudes, coherence, and gain (1.23-2.66×) in the Threat condition compared with No-Threat conditions, and significant correlations were observed between threat-related changes in physiological arousal and medium-latency peak cross-correlation amplitude in medial gastrocnemius (r = 0.408) muscles. These findings show a clear threat effect on vestibular-evoked responses in muscles in the lower body, with less robust effects of threat on trunk muscles. Combined with previous work, the present results can provide insight into observed changes during balance control in threatening situations. This is the first study to show increases in vestibular-evoked responses of the lower body muscles under conditions

  11. Association between attention bias to threat and anxiety symptoms in children and adolescents.

    PubMed

    Abend, Rany; de Voogd, Leone; Salemink, Elske; Wiers, Reinout W; Pérez-Edgar, Koraly; Fitzgerald, Amanda; White, Lauren K; Salum, Giovanni A; He, Jie; Silverman, Wendy K; Pettit, Jeremy W; Pine, Daniel S; Bar-Haim, Yair

    2018-03-01

    Considerable research links threat-related attention biases to anxiety symptoms in adults, whereas extant findings on threat biases in youth are limited and mixed. Inconsistent findings may arise due to substantial methodological variability and limited sample sizes, emphasizing the need for systematic research on large samples. The aim of this report is to examine the association between threat bias and pediatric anxiety symptoms using standardized measures in a large, international, multi-site youth sample. A total of 1,291 children and adolescents from seven research sites worldwide completed standardized attention bias assessment task (dot-probe task) and child anxiety symptoms measure (Screen for Child Anxiety Related Emotional Disorders). Using a dimensional approach to symptomatology, we conducted regression analyses predicting overall, and disorder-specific, anxiety symptoms severity, based on threat bias scores. Threat bias correlated positively with overall anxiety symptoms severity (ß = 0.078, P = .004). Furthermore, threat bias was positively associated specifically with social anxiety (ß = 0.072, P = .008) and school phobia (ß = 0.076, P = .006) symptoms severity, but not with panic, generalized anxiety, or separation anxiety symptoms. These associations were not moderated by age or gender. These findings indicate associations between threat bias and pediatric anxiety symptoms, and suggest that vigilance to external threats manifests more prominently in symptoms of social anxiety and school phobia, regardless of age and gender. These findings point to the role of attention bias to threat in anxiety, with implications for translational clinical research. The significance of applying standardized methods in multi-site collaborations for overcoming challenges inherent to clinical research is discussed. © 2017 Wiley Periodicals, Inc.

  12. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glenn, Colleen; Sterbentz, Dane; Wright, Aaron

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best

  13. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model.

    PubMed

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 ( N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 ( N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 ( N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 ( N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict.

  14. Threats: power, family mealtimes, and social influence.

    PubMed

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  15. The role of threats in animal cooperation

    PubMed Central

    Cant, Michael A.

    2011-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors—impact, accuracy and perception—that together determine the effectiveness of threats to induce cooperation. PMID:20798110

  16. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    DTIC Science & Technology

    2013-08-01

    potential threats present in this scene and explain the meaning and implications of these threats. You have two minutes to write a response...could be due to the nature of the tasks or to fatigue. Requiring Soldiers to write answers on multiple trials, and across similar tasks, might have...tasks will likely be significantly different from those experienced in the trainer. This would remove the writing requirement over multiple trials

  17. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  18. Insider Threat to Computer Security at Nuclear Facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    West, Rebecca Lynn

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  19. Portable Wireless Device Threat Assessment for Aircraft Navigation Radios

    NASA Technical Reports Server (NTRS)

    Nguyen, Truong X.; Koppen, Sandra V.; Ely, Jay J.; Williams, Reuben A.; Smith, Laura J.; Salud, Maria Theresa P.

    2004-01-01

    This paper addresses the concern for Wireless Local Area Network devices and two-way radios to cause electromagnetic interference to aircraft navigation radio systems. Spurious radiated emissions from various IEEE 802.11a, 802.11b, and Bluetooth devices are characterized using reverberation chambers. The results are compared with baseline emissions from standard laptop computer and personal digital assistants (PDAs) that are currently allowed for use on aircraft. The results indicate that the WLAN devices tested are not more of a threat to aircraft navigation radios than standard laptop computers and PDAs in most aircraft bands. In addition, spurious radiated emission data from seven pairs of two-way radios are provided. These two-way radios emit at much higher levels in the bands considered. A description of the measurement process, device modes of operation and the measurement results are reported.

  20. Conditioned social dominance threat: observation of others' social dominance biases threat learning.

    PubMed

    Haaker, Jan; Molapour, Tanaz; Olsson, Andreas

    2016-10-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants' eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  1. Perceived Threat and Perceived Neglect: Couples' Underlying Concerns during Conflict

    ERIC Educational Resources Information Center

    Sanford, Keith

    2010-01-01

    The Couples Underlying Concern Inventory assesses 2 fundamental types of distress that couples experience during interpersonal conflict. "Perceived threat" involves a perception that one's partner is blaming and controlling the self. "Perceived neglect" involves a perception that one's partner is failing to make desired contributions or…

  2. Expectancy influences on attention to threat are only weak and transient: Behavioral and physiological evidence.

    PubMed

    Aue, Tatjana; Chauvigné, Léa A S; Bristle, Mirko; Okon-Singer, Hadas; Guex, Raphaël

    2016-12-01

    Can prior expectancies shape attention to threat? To answer this question, we manipulated the expectancies of spider phobics and nonfearful controls regarding the appearance of spider and bird targets in a visual search task. We observed robust evidence for expectancy influences on attention to birds, reflected in error rates, reaction times, pupil diameter, and heart rate (HR). We found no solid effect, however, of the same expectancies on attention to spiders; only HR revealed a weak and transient impact of prior expectancies on the orientation of attention to threat. Moreover, these asymmetric effects for spiders versus birds were observed in both phobics and controls. Our results are thus consistent with the notion of a threat detection mechanism that is only partially permeable to current expectancies, thereby increasing chances of survival in situations that are mistakenly perceived as safe. Copyright © 2016 Elsevier B.V. All rights reserved.

  3. Detection of dim targets in multiple environments

    NASA Astrophysics Data System (ADS)

    Mirsky, Grace M.; Woods, Matthew; Grasso, Robert J.

    2013-10-01

    The proliferation of a wide variety of weapons including Anti-Aircraft Artillery (AAA), rockets, and small arms presents a substantial threat to both military and civilian aircraft. To address this ever-present threat, Northrop Grumman has assessed unguided threat phenomenology to understand the underlying physical principles for detection. These principles, based upon threat transit through the atmosphere, exploit a simple phenomenon universal to all objects moving through an atmosphere comprised of gaseous media to detect and track the threat in the presence of background and clutter. Threat detection has rapidly become a crucial component of aircraft survivability systems that provide situational awareness to the crew. It is particularly important to platforms which may spend a majority of their time at low altitudes and within the effective range of a large variety of weapons. Detection of these threats presents a unique challenge as this class of threat typically has a dim signature coupled with a short duration. Correct identification of each of the threat components (muzzle flash and projectile) is important to determine trajectory and intent while minimizing false alarms and maintaining a high detection probability in all environments.

  4. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    PubMed Central

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  5. Spontaneous default mode network phase-locking moderates performance perceptions under stereotype threat.

    PubMed

    Forbes, Chad E; Leitner, Jordan B; Duran-Jordan, Kelly; Magerman, Adam B; Schmader, Toni; Allen, John J B

    2015-07-01

    This study assessed whether individual differences in self-oriented neural processing were associated with performance perceptions of minority students under stereotype threat. Resting electroencephalographic activity recorded in white and minority participants was used to predict later estimates of task errors and self-doubt on a presumed measure of intelligence. We assessed spontaneous phase-locking between dipole sources in left lateral parietal cortex (LPC), precuneus/posterior cingulate cortex (P/PCC), and medial prefrontal cortex (MPFC); three regions of the default mode network (DMN) that are integral for self-oriented processing. Results revealed that minorities with greater LPC-P/PCC phase-locking in the theta band reported more accurate error estimations. All individuals experienced less self-doubt to the extent they exhibited greater LPC-MPFC phase-locking in the alpha band but this effect was driven by minorities. Minorities also reported more self-doubt to the extent they overestimated errors. Findings reveal novel neural moderators of stereotype threat effects on subjective experience. Spontaneous synchronization between DMN regions may play a role in anticipatory coping mechanisms that buffer individuals from stereotype threat. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  6. Village Level Tsunami Threat Maps for Tamil Nadu, SE Coast of India: Numerical Modeling Technique

    NASA Astrophysics Data System (ADS)

    MP, J.; Kulangara Madham Subrahmanian, D.; V, R. M.

    2014-12-01

    The Indian Ocean tsunami (IOT) devastated several countries of North Indian Ocean. India is one of the worst affected countries after Indonesia and Sri Lanka. In India, Tamil Nadu suffered maximum with fatalities exceeding 8,000 people. Historical records show that tsunami has invaded the shores of Tamil Nadu in the past and has made people realize that the tsunami threat looms over Tamil Nadu and it is necessary to evolve strategies for tsunami threat management. The IOT has brought to light that tsunami inundation and runup varied within short distances and for the disaster management for tsunami, large scale maps showing areas that are likely to be affected by future tsunami are identified. Therefore threat assessment for six villages including Mamallapuram (also called Mahabalipuram) which is famous for its rock-cut temples, from the northern part of Tamil Nadu state of India has been carried out and threat maps categorizing the coast into areas of different degree of threat are prepared. The threat was assessed by numerical modeling using TUNAMI N2 code considering different tsunamigenic sources along the Andaman - Sumatra trench. While GEBCO and C-Map data was used for bathymetry and for land elevation data was generated by RTK - GPS survey for a distance of 1 km from shore and SRTM for the inland areas. The model results show that in addition to the Sumatra source which generated the IOT in 2004, earthquakes originating in Car Nicobar and North Andaman can inflict more damage. The North Andaman source can generate a massive tsunami and an earthquake of magnitude more than Mw 9 can not only affect Tamil Nadu but also entire south east coast of India. The runup water level is used to demarcate the tsunami threat zones in the villages using GIS.

  7. Analysis on the threats and spatiotemporal distribution pattern of security in World Natural Heritage Sites.

    PubMed

    Wang, Zhaoguo; Yang, Zhaoping; Du, Xishihui

    2015-01-01

    World Natural Heritage Sites (WNHS) are treasures that need human protection and invite appreciation, which makes conservation of WNHS an urgent task. This paper assesses where in the world threats are most pressing and which WNHS require emergency assistance. Using an analysis of "hot spots" and inverse distance weighting, it finds that Africa is the region where WNHS are least secure. Reports of the state of the conservation of WNHS describe the many threats that exist. Of these, management activities and institutional factors are the primary threats. The paper suggests relevant measures to improve the WNHS security.

  8. Insular threat associations within taxa worldwide.

    PubMed

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  9. Credible threats and promises.

    PubMed

    McNamara, John M; Houston, Alasdair I

    2002-11-29

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest.

  10. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  11. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. Assessing the Generalizability of Randomized Trial Results to Target Populations

    PubMed Central

    Stuart, Elizabeth A.; Bradshaw, Catherine P.; Leaf, Philip J.

    2014-01-01

    Recent years have seen increasing interest in and attention to evidence-based practices, where the “evidence” generally comes from well-conducted randomized trials. However, while those trials yield accurate estimates of the effect of the intervention for the participants in the trial (known as “internal validity”), they do not always yield relevant information about the effects in a particular target population (known as “external validity”). This may be due to a lack of specification of a target population when designing the trial, difficulties recruiting a sample that is representative of a pre-specified target population, or to interest in considering a target population somewhat different from the population directly targeted by the trial. This paper first provides an overview of existing design and analysis methods for assessing and enhancing the ability of a randomized trial to estimate treatment effects in a target population. It then provides a case study using one particular method, which weights the subjects in a randomized trial to match the population on a set of observed characteristics. The case study uses data from a randomized trial of School-wide Positive Behavioral Interventions and Supports (PBIS); our interest is in generalizing the results to the state of Maryland. In the case of PBIS, after weighting, estimated effects in the target population were similar to those observed in the randomized trial. The paper illustrates that statistical methods can be used to assess and enhance the external validity of randomized trials, making the results more applicable to policy and clinical questions. However, there are also many open research questions; future research should focus on questions of treatment effect heterogeneity and further developing these methods for enhancing external validity. Researchers should think carefully about the external validity of randomized trials and be cautious about extrapolating results to specific

  13. Assessing the generalizability of randomized trial results to target populations.

    PubMed

    Stuart, Elizabeth A; Bradshaw, Catherine P; Leaf, Philip J

    2015-04-01

    Recent years have seen increasing interest in and attention to evidence-based practices, where the "evidence" generally comes from well-conducted randomized trials. However, while those trials yield accurate estimates of the effect of the intervention for the participants in the trial (known as "internal validity"), they do not always yield relevant information about the effects in a particular target population (known as "external validity"). This may be due to a lack of specification of a target population when designing the trial, difficulties recruiting a sample that is representative of a prespecified target population, or to interest in considering a target population somewhat different from the population directly targeted by the trial. This paper first provides an overview of existing design and analysis methods for assessing and enhancing the ability of a randomized trial to estimate treatment effects in a target population. It then provides a case study using one particular method, which weights the subjects in a randomized trial to match the population on a set of observed characteristics. The case study uses data from a randomized trial of school-wide positive behavioral interventions and supports (PBIS); our interest is in generalizing the results to the state of Maryland. In the case of PBIS, after weighting, estimated effects in the target population were similar to those observed in the randomized trial. The paper illustrates that statistical methods can be used to assess and enhance the external validity of randomized trials, making the results more applicable to policy and clinical questions. However, there are also many open research questions; future research should focus on questions of treatment effect heterogeneity and further developing these methods for enhancing external validity. Researchers should think carefully about the external validity of randomized trials and be cautious about extrapolating results to specific populations unless

  14. Insider Threat Mitigation Workshop Instructional Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  15. The need to rationalize and prioritize threatening processes used to determine threat status in the IUCN Red List.

    PubMed

    Hayward, Matt W

    2009-12-01

    Thorough evaluation has made the International Union for Conservation of Nature (IUCN) Red List the most widely used and accepted authority on the conservation status of biodiversity. Although the system used to determine risk of extinction is rigorously and objectively applied, the list of threatening processes affecting a species is far more subjectively determined and has not had adequate review. I reviewed the threats listed in the IUCN Red List for randomly selected groups within the three most threatened orders of mammals: Artiodactyla, Carnivora, and Primates. These groups are taxonomically related and often ecologically similar, so I expected they would suffer relatively similar threats. Hominoid primates and all other terrestrial fauna faced similar threats, except for bovine artiodactyls and large, predatory carnivores, which faced significantly different threats. Although the status of bovines and hominoids and the number of threats affecting them were correlated, this was not the case for large carnivores. Most notable, however, was the great variation in the threats affecting individual members of each group. For example, the endangered European bison (Bison bonasus) has no threatening processes listed for it, and the lion (Panthera leo) is the only large predator listed as threatened with extinction by civil war. Some threatening processes appear spurious for the conservation of the species, whereas other seemingly important factors are not recorded as threats. The subjective nature of listing threatening processes, via expert opinion, results in substantial biases that may be allayed by independent peer review, use of technical manuals, consensus among multiple assessors, incorporation of probability modeling via decision-tree analysis, and adequate coordination among evaluators. The primary focus should be on species-level threats rather than population-level threats because the IUCN Red List is a global assessment and smaller-scale threats are more

  16. Alveolar echinococcosis in Europe and Poland. Threats to humans

    PubMed

    Gawor, Jakub

    The increasing number of detected cases of alveolar echinococcosis (AE) in recent years in Central-Eastern Europe strongly support the need of accurate diagnosis of the disease in patients and its differentiation from cystic echinococcosis. Accordingly to the EU notification requirements both parasitoses are reported jointly as echinococcosis, which makes it impossible to assess epidemiological situation of each disease. AE threat to humans is due to the environmental contamination with eggs of the tapeworm Echinococcus multilocularis excreted by infected foxes. Also contribution of dogs to the parasite transmission should be taken into account in endemic areas. The article presents current data on human cases of AE registered in humans in Europe and Poland, threats of this parasitosis to humans and results of studies on E. multilocularis infection in animals, the definitive hosts.

  17. Psychoanalysis and the nuclear threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threatmore » to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.« less

  18. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  19. Stereotype threat and racial differences in citizens' experiences of police encounters.

    PubMed

    Najdowski, Cynthia J; Bottoms, Bette L; Goff, Phillip Atiba

    2015-10-01

    We conducted 2 studies to investigate how cultural stereotypes that depict Blacks as criminals affect the way Blacks experience encounters with police officers, expecting that such encounters induce Blacks to feel stereotype threat (i.e., concern about being judged and treated unfairly by police because of the stereotype). In Study 1, we asked Black and White participants to report how they feel when interacting with police officers in general. As predicted, Blacks, but not Whites, reported concern that police officers stereotype them as criminals simply because of their race. In addition, this effect was found for Black men but not Black women. In Study 2, we asked Black and White men to imagine a specific police encounter and assessed potential downstream consequences of stereotype threat. Consistent with Study 1, Black but not White men anticipated feeling stereotype threat in the hypothetical police encounter. Further, racial differences in anticipated threat translated into racial differences in anticipated anxiety, self-regulatory efforts, and behavior that is commonly perceived as suspicious by police officers. By demonstrating that Blacks might expect to be judged and treated unfairly by police because of the negative stereotype of Black criminality, this research extends stereotype threat theory to the new domain of criminal justice encounters. It also has practical implications for understanding how the stereotype could ironically contribute to bias-based policing and racial disparities in the justice system. (c) 2015 APA, all rights reserved).

  20. Functional and real-time requirements of a multisensor data fusion (MSDF) situation and threat assessment (STA) resource management (RM) system

    NASA Astrophysics Data System (ADS)

    Duquet, Jean Remi; Bergeron, Pierre; Blodgett, Dale E.; Couture, Jean; Macieszczak, Maciej; Mayrand, Michel; Chalmers, Bruce A.; Paradis, Stephane

    1998-03-01

    The Research and Development group at Lockheed Martin Canada, in collaboration with the Defence Research Establishment Valcartier, has undertaken a research project in order to capture and analyze the real-time and functional requirements of a next generation Command and Control System (CCS) for the Canadian Patrol Frigates, integrating Multi- Sensor Data Fusion (MSDF), Situation and Threat Assessment (STA) and Resource Management (RM). One important aspect of the project is to define how the use of Artificial Intelligence may optimize the performance of an integrated, real-time MSDF/STA/RM system. A closed-loop simulation environment is being developed to facilitate the evaluation of MSDF/STA/RM concepts, algorithms and architectures. This environment comprises (1) a scenario generator, (2) complex sensor, hardkill and softkill weapon models, (3) a real-time monitoring tool, (4) a distributed Knowledge-Base System (KBS) shell. The latter is being completely redesigned and implemented in-house since no commercial KBS shell could adequately satisfy all the project requirements. The closed- loop capability of the simulation environment, together with its `simulated real-time' capability, allows the interaction between the MSDF/STA/RM system and the environment targets during the execution of a scenario. This capability is essential to measure the performance of many STA and RM functionalities. Some benchmark scenarios have been selected to demonstrate quantitatively the capabilities of the selected MSDF/STA/RM algorithms. The paper describes the simulation environment and discusses the MSDF/STA/RM functionalities currently implemented and their performance as an automatic CCS.

  1. Hazards and accessibility: combining and visualizing threat and open infrastructure data for disaster management

    NASA Astrophysics Data System (ADS)

    Tost, Jordi; Ehmel, Fabian; Heidmann, Frank; Olen, Stephanie M.; Bookhagen, Bodo

    2018-05-01

    The assessment of natural hazards and risk has traditionally been built upon the estimation of threat maps, which are used to depict potential danger posed by a particular hazard throughout a given area. But when a hazard event strikes, infrastructure is a significant factor that can determine if the situation becomes a disaster. The vulnerability of the population in a region does not only depend on the area's local threat, but also on the geographical accessibility of the area. This makes threat maps by themselves insufficient for supporting real-time decision-making, especially for those tasks that involve the use of the road network, such as management of relief operations, aid distribution, or planning of evacuation routes, among others. To overcome this problem, this paper proposes a multidisciplinary approach divided in two parts. First, data fusion of satellite-based threat data and open infrastructure data from OpenStreetMap, introducing a threat-based routing service. Second, the visualization of this data through cartographic generalization and schematization. This emphasizes critical areas along roads in a simple way and allows users to visually evaluate the impact natural hazards may have on infrastructure. We develop and illustrate this methodology with a case study of landslide threat for an area in Colombia.

  2. A moving target--incorporating knowledge of the spatial ecology of fish into the assessment and management of freshwater fish populations.

    PubMed

    Cooke, Steven J; Martins, Eduardo G; Struthers, Daniel P; Gutowsky, Lee F G; Power, Michael; Doka, Susan E; Dettmers, John M; Crook, David A; Lucas, Martyn C; Holbrook, Christopher M; Krueger, Charles C

    2016-04-01

    Freshwater fish move vertically and horizontally through the aquatic landscape for a variety of reasons, such as to find and exploit patchy resources or to locate essential habitats (e.g., for spawning). Inherent challenges exist with the assessment of fish populations because they are moving targets. We submit that quantifying and describing the spatial ecology of fish and their habitat is an important component of freshwater fishery assessment and management. With a growing number of tools available for studying the spatial ecology of fishes (e.g., telemetry, population genetics, hydroacoustics, otolith microchemistry, stable isotope analysis), new knowledge can now be generated and incorporated into biological assessment and fishery management. For example, knowing when, where, and how to deploy assessment gears is essential to inform, refine, or calibrate assessment protocols. Such information is also useful for quantifying or avoiding bycatch of imperiled species. Knowledge of habitat connectivity and usage can identify critically important migration corridors and habitats and can be used to improve our understanding of variables that influence spatial structuring of fish populations. Similarly, demographic processes are partly driven by the behavior of fish and mediated by environmental drivers. Information on these processes is critical to the development and application of realistic population dynamics models. Collectively, biological assessment, when informed by knowledge of spatial ecology, can provide managers with the ability to understand how and when fish and their habitats may be exposed to different threats. Naturally, this knowledge helps to better evaluate or develop strategies to protect the long-term viability of fishery production. Failure to understand the spatial ecology of fishes and to incorporate spatiotemporal data can bias population assessments and forecasts and potentially lead to ineffective or counterproductive management actions.

  3. Radioactive threat detection using scintillant-based detectors

    NASA Astrophysics Data System (ADS)

    Chalmers, Alex

    2004-09-01

    An update to the performance of AS&E's Radioactive Threat Detection sensor technology. A model is presented detailing the components of the scintillant-based RTD system employed in AS&E products aimed at detecting radiological WMD. An overview of recent improvements in the sensors, electrical subsystems and software algorithms are presented. The resulting improvements in performance are described and sample results shown from existing systems. Advanced and future capabilities are described with an assessment of their feasibility and their application to Homeland Defense.

  4. Emotion regulation during threat: Parsing the time course and consequences of safety signal processing

    PubMed Central

    HEFNER, KATHRYN R.; VERONA, EDELYN; CURTIN, JOHN. J.

    2017-01-01

    Improved understanding of fear inhibition processes can inform the etiology and treatment of anxiety disorders. Safety signals can reduce fear to threat, but precise mechanisms remain unclear. Safety signals may acquire attentional salience and affective properties (e.g., relief) independent of the threat; alternatively, safety signals may only hold affective value in the presence of simultaneous threat. To clarify such mechanisms, an experimental paradigm assessed independent processing of threat and safety cues. Participants viewed a series of red and green words from two semantic categories. Shocks were administered following red words (cue+). No shocks followed green words (cue−). Words from one category were defined as safety signals (SS); no shocks were administered on cue+ trials. Words from the other (control) category did not provide information regarding shock administration. Threat (cue+ vs. cue−) and safety (SS+ vs. SS−) were fully crossed. Startle response and ERPs were recorded. Startle response was increased during cue+ versus cue−. Safety signals reduced startle response during cue+, but had no effect on startle response during cue−. ERP analyses (PD130 and P3) suggested that participants parsed threat and safety signal information in parallel. Motivated attention was not associated with safety signals in the absence of threat. Overall, these results confirm that fear can be reduced by safety signals. Furthermore, safety signals do not appear to hold inherent hedonic salience independent of their effect during threat. Instead, safety signals appear to enable participants to engage in effective top-down emotion regulatory processes. PMID:27088643

  5. Stereotype threat can reduce older adults' memory errors.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  6. Threatening the heart and mind of gender stereotypes: Can imagined contact influence the physiology of stereotype threat?

    PubMed

    Allen, Ben; Friedman, Bruce H

    2016-01-01

    Research shows that when a gender stereotype is made salient and the target of the stereotype is asked to perform in the stereotyped domain, targets of the stereotype often perform at a lower level compared to situations when the stereotype was not made salient. The noticeable absence of female faculty and students in math and science departments at coed universities throughout the United States may increase the belief in gender stereotypes and discourage women from pursuing careers in these fields. Contact with counterstereotypical exemplars, such as female science experts, decreases belief in gender stereotypes and increases women's motivation to pursue careers in science. Thus, the present study examined whether imagining an interpersonal interaction with a counterstereotypical exemplar removes the physiological and performance effects of stereotype threat. Subjects were asked to imagine either a nature scene or meeting a female math professor, and were also assigned to either a control or stereotype threat condition. Imagination was used because studies have shown it to be an effective method of simulating interpersonal contact. Subjects were 139 young women (mean age 19 years) recruited from a pool of undergraduates. Results showed that the stereotype threat manipulation elicited greater vagal withdrawal and poorer working memory capacity during the n-back, and that vagal withdrawal was attenuated when the stereotype threat manipulation was preceded by a brief imagined interaction with a counterstereotypical exemplar. This study provides novel evidence that exposure to counterstereotypical exemplars can diminish cardiovascular reactions to salient information about threatening gender stereotypes. © 2015 Society for Psychophysiological Research.

  7. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  8. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  9. Evaluating robustness in rank-based risk assessments of freshwater ecosystems

    USGS Publications Warehouse

    Mattson, K.M.; Angermeier, Paul

    2007-01-01

    Conservation planning aims to protect biodiversity by sustainng the natural physical, chemical, and biological processes within representative ecosystems. Often data to measure these components are inadequate or unavailable. The impact of human activities on ecosystem processes complicates integrity assessments and might alter ecosystem organization at multiple spatial scales. Freshwater conservation targets, such as populations and communities, are influenced by both intrinsic aquatic properties and the surrounding landscape, and locally collected data might not accurately reflect potential impacts. We suggest that changes in five major biotic drivers—energy sources, physical habitat, flow regime, water quality, and biotic interactions—might be used as surrogates to inform conservation planners of the ecological integrity of freshwater ecosystems. Threats to freshwater systems might be evaluated based on their impact to these drivers to provide an overview of potential risk to conservation targets. We developed a risk-based protocol, the Ecological Risk Index (ERI), to identify watersheds with least/most risk to conservation targets. Our protocol combines risk-based components, specifically the frequency and severity of human-induced stressors, with biotic drivers and mappable land- and water-use data to provide a summary of relative risk to watersheds. We illustrate application of our protocol with a case study of the upper Tennessee River basin, USA. Differences in risk patterns among the major drainages in the basin reflect dominant land uses, such as mining and agriculture. A principal components analysis showed that localized, moderately severe threats accounted for most of the threat composition differences among our watersheds. We also found that the relative importance of threats is sensitive to the spatial grain of the analysis. Our case study demonstrates that the ERI is useful for evaluating the frequency and severity of ecosystemwide risk, which

  10. Defending Against Advanced Persistent Threats Using Game-Theory

    PubMed Central

    König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker’s incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system’s protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest. PMID:28045922

  11. Defending Against Advanced Persistent Threats Using Game-Theory.

    PubMed

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  12. An Agent-Based Intervention to Assist Drivers Under Stereotype Threat: Effects of In-Vehicle Agents' Attributional Error Feedback.

    PubMed

    Joo, Yeon Kyoung; Lee-Won, Roselyn J

    2016-10-01

    For members of a group negatively stereotyped in a domain, making mistakes can aggravate the influence of stereotype threat because negative stereotypes often blame target individuals and attribute the outcome to their lack of ability. Virtual agents offering real-time error feedback may influence performance under stereotype threat by shaping the performers' attributional perception of errors they commit. We explored this possibility with female drivers, considering the prevalence of the "women-are-bad-drivers" stereotype. Specifically, we investigated how in-vehicle voice agents offering error feedback based on responsibility attribution (internal vs. external) and outcome attribution (ability vs. effort) influence female drivers' performance under stereotype threat. In addressing this question, we conducted an experiment in a virtual driving simulation environment that provided moment-to-moment error feedback messages. Participants performed a challenging driving task and made mistakes preprogrammed to occur. Results showed that the agent's error feedback with outcome attribution moderated the stereotype threat effect on driving performance. Participants under stereotype threat had a smaller number of collisions when the errors were attributed to effort than to ability. In addition, outcome attribution feedback moderated the effect of responsibility attribution on driving performance. Implications of these findings are discussed.

  13. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  14. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  15. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  16. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  17. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  18. Assessing the antecedents and consequences of threat appraisal of an acute psychosocial stressor: the role of optimism, displacement behavior, and physiological responses.

    PubMed

    Zandara, Martina; Villada, Carolina; Hidalgo, Vanesa; Salvador, Alicia

    2018-03-13

    The feeling of stress is increasing in today's societies, particularly in young adults subjected to social evaluative situations in highly competitive academic and work contexts. Threat appraisal is a primary and fundamental reaction when people face a stressful situation. The aim of this study was to investigate the role of dispositional optimism as an antecedent and displacement behavior as a consequence of threat appraisal of a social-evaluative situation of stress. A second objective was to verify the moderating role of physiological responses to stress (heart rate and cortisol reactivity) in the relationship between threat appraisal and displacement behavior. To do this, we combined the Trier Social Stress Test (TSST) with ethological analysis, self-report questionnaires, and physiological data. As expected, people who scored higher on dispositional optimism perceived stress as less threatening, and a higher perception of threat was positively related to displacement behavior patterns. Moreover, the results showed that threat appraisal fully mediates the relationship between dispositional optimism and displacement behavior, and that only heart rate reactivity (not cortisol) moderates the relationship between threat appraisal and displacement behavior.

  19. Stereotype threat affects financial decision making.

    PubMed

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  20. Stereotype threat can reduce older adults' memory errors

    PubMed Central

    Barber, Sarah J.; Mather, Mara

    2014-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment (Seibt & Förster, 2004). Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 & 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well. PMID:24131297

  1. Common IED exploitation target set ontology

    NASA Astrophysics Data System (ADS)

    Russomanno, David J.; Qualls, Joseph; Wowczuk, Zenovy; Franken, Paul; Robinson, William

    2010-04-01

    The Common IED Exploitation Target Set (CIEDETS) ontology provides a comprehensive semantic data model for capturing knowledge about sensors, platforms, missions, environments, and other aspects of systems under test. The ontology also includes representative IEDs; modeled as explosives, camouflage, concealment objects, and other background objects, which comprise an overall threat scene. The ontology is represented using the Web Ontology Language and the SPARQL Protocol and RDF Query Language, which ensures portability of the acquired knowledge base across applications. The resulting knowledge base is a component of the CIEDETS application, which is intended to support the end user sensor test and evaluation community. CIEDETS associates a system under test to a subset of cataloged threats based on the probability that the system will detect the threat. The associations between systems under test, threats, and the detection probabilities are established based on a hybrid reasoning strategy, which applies a combination of heuristics and simplified modeling techniques. Besides supporting the CIEDETS application, which is focused on efficient and consistent system testing, the ontology can be leveraged in a myriad of other applications, including serving as a knowledge source for mission planning tools.

  2. Webinar Presentation: The MATCH Study (Metals Assessment Targeting Community Health)

    EPA Pesticide Factsheets

    This presentation, The MATCH Study (Metals Assessment Targeting Community Health), was given at the NIEHS/EPA Children's Centers 2015 Webinar Series: Historical Perspectives and Research Updates from Previously Funded Children's Centers held on 11/18/15.

  3. Open Ocean Assessments for Management in the GEF Transboundary Waters Assessment Project (TWAP)

    NASA Astrophysics Data System (ADS)

    Fischer, A. S.; Alverson, K. D.

    2010-12-01

    A methodology for a thematic and scientifically-credible assessment of Open Ocean waters as a part of the Global Environment Facility (GEF) Transboundary Waters Assessment Project (TWAP) has been developed in the last 18 months by the Intergovernmental Oceanographic Commission of UNESCO, and is presented for feedback and comment. While developed to help the GEF International Waters focal area target investment to manage looming environmental threats in interlinked freshwater and marine systems (a very focused decision support system), the assessment methodology could contribute to other assessment and management efforts in the UN system and elsewhere. Building on a conceptual framework that describes the relationships between human systems and open ocean natural systems, and on mapping of the human impact on the marine environment, the assessment will evaluate and make projections on a thematic basis, identifying key metrics, indices, and indicators. These themes will include the threats on key ecosystem services of climate change through sea level rise, changed stratification, warming, and ocean acidification; vulnerabilities of ecosystems, habitats, and living marine resources; the impact and sustainability of fisheries; and pollution. Global-level governance arrangements will also be evaluated, with an eye to identifying scope for improved global-level management. The assessment will build on sustained ocean observing systems, model projections, and an assessment of scientific literature, as well as tools for combining knowledge to support identification of priority concerns and in developing scenarios for management. It will include an assessment of key research and observing needs as one way to deal with the scientific uncertainty inherent in such an exercise, and to better link policy and science agendas.

  4. Case study comparison of functional vs. organic stability approaches for assessing threat potential at closed landfills in the USA.

    PubMed

    O'Donnell, Sean T; Caldwell, Michael D; Barlaz, Morton A; Morris, Jeremy W F

    2018-05-01

    Municipal solid waste (MSW) landfills in the USA are regulated under Subtitle D of the Resource Conservation and Recovery Act (RCRA), which includes the requirement to protect human health and the environment (HHE) during the post-closure care (PCC) period. Several approaches have been published for assessment of potential threats to HHE. These approaches can be broadly divided into organic stabilization, which establishes an inert waste mass as the ultimate objective, and functional stability, which considers long-term emissions in the context of minimizing threats to HHE in the absence of active controls. The objective of this research was to conduct a case study evaluation of a closed MSW landfill using long-term data on landfill gas (LFG) production, leachate quality, site geology, and solids decomposition. Evaluations based on both functional and organic stability criteria were compared. The results showed that longer periods of LFG and leachate management would be required using organic stability criteria relative to an approach based on functional stability. These findings highlight the somewhat arbitrary and overly stringent nature of assigning universal stability criteria without due consideration of the landfill's hydrogeologic setting and potential environmental receptors. This supports previous studies that advocated for transition to a passive or inactive control stage based on a performance-based functional stability framework as a defensible mechanism for optimizing and ending regulatory PCC. Copyright © 2018 Elsevier Ltd. All rights reserved.

  5. Multi-Action Planning for Threat Management: A Novel Approach for the Spatial Prioritization of Conservation Actions

    PubMed Central

    Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J.; Linke, Simon

    2015-01-01

    Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms. PMID:26020794

  6. Multi-action planning for threat management: a novel approach for the spatial prioritization of conservation actions.

    PubMed

    Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J; Linke, Simon

    2015-01-01

    Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms.

  7. Optimal Predator Risk Assessment by the Sonar-Jamming Arctiine Moth Bertholdia trigona

    PubMed Central

    Corcoran, Aaron J.; Wagner, Ryan D.; Conner, William E.

    2013-01-01

    Nearly all animals face a tradeoff between seeking food and mates and avoiding predation. Optimal escape theory holds that an animal confronted with a predator should only flee when benefits of flight (increased survival) outweigh the costs (energetic costs, lost foraging time, etc.). We propose a model for prey risk assessment based on the predator's stage of attack. Risk level should increase rapidly from when the predator detects the prey to when it commits to the attack. We tested this hypothesis using a predator – the echolocating bat – whose active biosonar reveals its stage of attack. We used a prey defense – clicking used for sonar jamming by the tiger moth Bertholdia trigona– that can be readily studied in the field and laboratory and is enacted simultaneously with evasive flight. We predicted that prey employ defenses soon after being detected and targeted, and that prey defensive thresholds discriminate between legitimate predatory threats and false threats where a nearby prey is attacked. Laboratory and field experiments using playbacks of ultrasound signals and naturally behaving bats, respectively, confirmed our predictions. Moths clicked soon after bats detected and targeted them. Also, B. trigona clicking thresholds closely matched predicted optimal thresholds for discriminating legitimate and false predator threats for bats using search and approach phase echolocation – the period when bats are searching for and assessing prey. To our knowledge, this is the first quantitative study to correlate the sensory stimuli that trigger defensive behaviors with measurements of signals provided by predators during natural attacks in the field. We propose theoretical models for explaining prey risk assessment depending on the availability of cues that reveal a predator's stage of attack. PMID:23671686

  8. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  9. An Ecological Assessment of the Pandemic Threat of Zika Virus

    PubMed Central

    Getz, Wayne

    2016-01-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset from Zika viral surveillance and serological surveys based in its native range, and construct ecological niche models to test basic hypotheses about its spread and potential establishment. The hypothesis that the outbreak of cases in Mexico and North America are anomalous and outside the native ecological niche of the disease, and may be linked to either genetic shifts between strains, or El Nino or similar climatic events, remains plausible at this time. Comparison of the Zika niche against the known distribution of dengue fever suggests that Zika is more constrained by the seasonality of precipitation and diurnal temperature fluctuations, likely confining autochthonous non-sexual transmission to the tropics without significant evolutionary change. Projecting the range of the diseases in conjunction with three major vector species (Aedes africanus, Ae. aegypti, and Ae. albopictus) that transmit the pathogens, under climate change, suggests that Zika has potential for northward expansion; but, based on current knowledge, our models indicate Zika is unlikely to fill the full range its vectors occupy, and public fear of a vector-borne Zika epidemic in the mainland United States is potentially informed by biased or limited scientific knowledge. With recent sexual transmission of the virus globally, we caution that our results only apply to the vector-borne transmission route of the pathogen, and while the threat of a mosquito-carried Zika pandemic may be overstated in the media

  10. An Ecological Assessment of the Pandemic Threat of Zika Virus.

    PubMed

    Carlson, Colin J; Dougherty, Eric R; Getz, Wayne

    2016-08-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset from Zika viral surveillance and serological surveys based in its native range, and construct ecological niche models to test basic hypotheses about its spread and potential establishment. The hypothesis that the outbreak of cases in Mexico and North America are anomalous and outside the native ecological niche of the disease, and may be linked to either genetic shifts between strains, or El Nino or similar climatic events, remains plausible at this time. Comparison of the Zika niche against the known distribution of dengue fever suggests that Zika is more constrained by the seasonality of precipitation and diurnal temperature fluctuations, likely confining autochthonous non-sexual transmission to the tropics without significant evolutionary change. Projecting the range of the diseases in conjunction with three major vector species (Aedes africanus, Ae. aegypti, and Ae. albopictus) that transmit the pathogens, under climate change, suggests that Zika has potential for northward expansion; but, based on current knowledge, our models indicate Zika is unlikely to fill the full range its vectors occupy, and public fear of a vector-borne Zika epidemic in the mainland United States is potentially informed by biased or limited scientific knowledge. With recent sexual transmission of the virus globally, we caution that our results only apply to the vector-borne transmission route of the pathogen, and while the threat of a mosquito-carried Zika pandemic may be overstated in the media

  11. Acute effects of caffeine on threat-selective attention: moderation by anxiety and EEG theta/beta ratio.

    PubMed

    van Son, Dana; Schalbroeck, Rik; Angelidis, Angelos; van der Wee, Nic J A; van der Does, Willem; Putman, Peter

    2018-05-21

    Spontaneous EEG theta/beta ratio (TBR) probably marks prefrontal cortical (PFC) executive control, and its regulation of attentional threat-bias. Caffeine at moderate doses may strengthen executive control through increased PFC catecholamine action, dependent on basal PFC function. To test if caffeine affects threat-bias, moderated by baseline frontal TBR and trait-anxiety. A pictorial emotional Stroop task was used to assess threat-bias in forty female participants in a cross-over, double-blind study after placebo and 200 mg caffeine. At baseline and after placebo, comparable relations were observed for negative pictures: high TBR was related to low threat-bias in low trait-anxious people. Caffeine had opposite effects on threat-bias in low trait-anxious people with low and high TBR. This further supports TBR as a marker of executive control and highlights the importance of taking baseline executive function into consideration when studying effects of caffeine on executive functions. Copyright © 2018 Elsevier B.V. All rights reserved.

  12. Distinct responses to predictable and unpredictable threat in anxiety pathologies: effect of panic attack.

    PubMed

    Grillon, Christian; O'Connell, Katherine; Lieberman, Lynne; Alvarez, Gabriella; Geraci, Marilla; Pine, Daniel S; Ernst, Monique

    2017-10-01

    Delineating specific clinical phenotypes of anxiety disorders is a crucial step toward better classification and understanding of these conditions. The present study sought to identify differential aversive responses to predictable and unpredictable threat of shock in healthy comparisons and in non-medicated anxiety patients with and without a history of panic attacks (PAs). 143 adults (72 healthy controls; 71 patients with generalized anxiety disorder (GAD) or/and social anxiety disorder (SAD), 24 with and 47 without PAs) were exposed to three conditions: 1) predictable shocks signaled by a cue, 2) unpredictable shocks, and 3) no shock. Startle magnitude was used to assess aversive responses. Across disorders, a PA history was specifically associated with hypersensitivity to unpredictable threat. By disorder, SAD was associated with hypersensitivity to predictable threat, whereas GAD was associated with exaggerated baseline startle. These results identified three physiological patterns. The first is hypersensitivity to unpredictable threat in individuals with PAs. The second is hypersensitivity to predictable threat, which characterizes SAD. The third is enhanced baseline startle in GAD, which may reflect propensity for self-generated anxious thoughts in the absence of imminent danger. These results inform current thinking by linking specific clinical features to particular physiology profiles.

  13. Bio-threat preparedness: Need for a paradigm shift.

    PubMed

    Jindal, A K; Roy, Kaushik

    2014-04-01

    India of late has been vulnerable to Chemical, Biological, Radiological and Nuclear (CBRN) threat, on account of its unique geographic position. Biological threat is an imminent threat in the hands of a terrorist. The public health system of our country is overburdened due to its present role and bio-attack response is not a priority area. This paper suggests that as the prime focus is on the CR and N threats in the integrated CBRN preparedness strategy and that specialized and technical forces are needed to deal with a bio-threat; hence there is a need for a paradigm shift in policy. The emerging field of bio-threat needs to be delinked from the joint family of 'CBRN', with consequent structural and functional changes. A separate specialized cadre needs to be formed for dealing with bio-threat, created from the pool of doctors and non-medical scientists from the AFMS and the DRDO. Structural changes are needed in the organization, to bring in the resources of NCDC, New Delhi for enhanced disease surveillance capacity and creation of a bio-threat mitigation node in the AFMC, Pune.

  14. Are Older Adults Perceived as A Threat to Society? Exploring Perceived Age-Based Threats in 29 Nations.

    PubMed

    Ayalon, Liat

    2017-08-05

    The present study adds to the current body of literature by simultaneously examining the public perception of young and old people as posing realistic threats (e.g., to the group's power, resources, and welfare) and symbolic threats (e.g., to one's world view, belief system and values). The fourth wave of the European Social Survey was administered to individuals from 29 countries. Analysis is based on 56,170 individuals, who had data on the four relevant indicators. The study relied on a latent profile analysis to develop a typology of perceived realistic and symbolic threats to society by younger and older adults. A three-profile solution indicated that the perception of older and younger adults as threats to society often co-occurs. Sociodemographic characteristics at the individual-level and the Gini coefficient (e.g., an inequality indicator) at the country-level had differential associations with the profiles identified. The study calls for a more balanced approach which evaluates attitudes toward both younger and older adults as potential sources of threat. Attention should be paid to individual- and national-level characteristics associated with age-based threats (e.g., the perception of a group, defined by its chronological age, as threatening). © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  15. Threat Assessment and Remediation Analysis (TARA)

    DTIC Science & Technology

    2014-10-01

    of countermeasure selection strategies that prescribe the application of countermeasures based on level of risk tolerance. This paper outlines the...catalog data, which are discussed later in this paper . The methodology can be described as conjoined trade studies, where the first trade identifies and...ranks vulnerabilities based on assessed risk, and the second identifies and selects countermeasures based on assessed utility and cost. This paper

  16. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  17. Assessment of deoxyhypusine hydroxylase as a putative, novel drug target.

    PubMed

    Kerscher, B; Nzukou, E; Kaiser, A

    2010-02-01

    Antimalarial drug resistance has nowadays reached each drug class on the market for longer than 10 years. The focus on validated, classical targets has severe drawbacks. If resistance is arising or already present in the field, a target-based High-Throughput-Screening (HTS) with the respective target involves the risk of identifying compounds to which field populations are also resistant. Thus, it appears that a rewarding albeit demanding challenge for target-based drug discovery is to identify novel drug targets. In the search for new targets for antimalarials, we have investigated the biosynthesis of hypusine, present in eukaryotic initiation factor 5A (eIF5A). Deoxyhypusine hydroxylase (DOHH), which has recently been cloned and expressed from P. falciparum, completes the modification of eIF5A through hydroxylation. Here, we assess the present druggable data on Plasmodium DOHH and its human counterpart. Plasmodium DOHH arose from a cyanobacterial phycobilin lyase by loss of function. It has a low FASTA score of 27 to its human counterpart. The HEAT-like repeats present in the parasite DOHH differ in number and amino acid identity from its human ortholog and might be of considerable interest for inhibitor design.

  18. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Abhayaratne, P; Bale, J

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CImore » facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a

  19. Moderators of age effects on attention bias toward threat and its association with anxiety.

    PubMed

    Namaky, Nauder; Beltzer, Miranda L; Werntz, Alexandra J; Lambert, Ann E; Isaacowitz, Derek M; Teachman, Bethany A

    2017-07-01

    The current study used a research domain criteria (RDoC) approach to assess age differences in multiple indicators of attention bias and its ties to anxiety, examining stimulus domain and cognitive control as moderators of older adults' oft-cited positivity effect (bias towards positive and away from negative stimuli, when compared to younger adults). 38 Younger adults and 38 older adults were administered a battery of cognitive control and trait and state anxiety measures, and completed a dot-probe task to assess attention bias, during which reaction time and fixation duration (using eye-tracking) were recorded for negative and neutral social (a salient threat domain for younger adults) and physical (a salient threat domain for older adults) stimuli. Mixed-effects models demonstrated that older adults were faster to react to dot-probe trials when the probe appeared in the place of negative (vs. neutral) physical stimuli, but displayed no difference in reaction time for social stimuli. Also, older (vs. younger) adults with lower levels of cognitive control were less negatively biased in their visual fixation to social stimuli. A negative reaction time attention bias on the dot-probe task predicted greater trait anxiety among participants with low levels of cognitive control, with a more complex pattern predicting state anxiety. Older adults do attend to social and physical stimuli differently. When stimuli concern a social threat, older adults do not preferentially attend to either neutral or negative stimuli. However, when stimuli concern physical threat, older adults preferentially attend to negative stimuli. Threat biases are associated with anxiety at all ages for those with low cognitive control. Copyright © 2016. Published by Elsevier B.V.

  20. Global patterns in threats to vertebrates by biological invasions

    PubMed Central

    Bellard, C.; Genovesi, P.; Jeschke, J. M.

    2016-01-01

    Biological invasions as drivers of biodiversity loss have recently been challenged. Fundamentally, we must know where species that are threatened by invasive alien species (IAS) live, and the degree to which they are threatened. We report the first study linking 1372 vertebrates threatened by more than 200 IAS from the completely revised Global Invasive Species Database. New maps of the vulnerability of threatened vertebrates to IAS permit assessments of whether IAS have a major influence on biodiversity, and if so, which taxonomic groups are threatened and where they are threatened. We found that centres of IAS-threatened vertebrates are concentrated in the Americas, India, Indonesia, Australia and New Zealand. The areas in which IAS-threatened species are located do not fully match the current hotspots of invasions, or the current hotspots of threatened species. The relative importance of biological invasions as drivers of biodiversity loss clearly varies across regions and taxa, and changes over time, with mammals from India, Indonesia, Australia and Europe are increasingly being threatened by IAS. The chytrid fungus primarily threatens amphibians, whereas invasive mammals primarily threaten other vertebrates. The differences in IAS threats between regions and taxa can help efficiently target IAS, which is essential for achieving the Strategic Plan 2020 of the Convention on Biological Diversity. PMID:26817767

  1. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    PubMed

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  2. Investigating the genetic and environmental bases of biases in threat recognition and avoidance in children with anxiety problems

    PubMed Central

    2012-01-01

    Background Adults with anxiety show biased categorization and avoidance of threats. Such biases may emerge through complex interplay between genetics and environments, occurring early in life. Research on threat biases in children has focuses on a restricted range of biases, with insufficient focus on genetic and environmental origins. Here, we explore differences between children with and without anxiety problems in under-studied areas of threat bias. We focused both on associations with anxious phenotype and the underlying gene-environmental correlates for two specific processes: the categorisation of threat faces and avoidance learning. Method Two-hundred and fifty 10-year old MZ and DZ twin pairs (500 individuals) completed tasks assessing accuracy in the labelling of threatening facial expressions and in the acquisition of avoidant responses to a card associated with a masked threatening face. To assess whether participants met criteria for an anxiety disorder, parents of twins completed a self-guided computerized version of the Development and Well-being Assessment (DAWBA). Comparison of MZ and DZ twin correlations using model-fitting were used to compute estimates of genetic, shared and non-shared environmental effects. Results Of the 500 twins assessed, 25 (5%) met diagnostic criteria for a current anxiety disorder. Children with anxiety disorders were more accurate in their ability to recognize disgust faces than those without anxiety disorders, but were commensurate on identifying other threatening face emotions (angry, fearful, sad). Children with anxiety disorders but also more strongly avoided selecting a conditioned stimulus than non-anxious children. While recognition of socially threatening faces was moderately heritable, avoidant responses were heavily influenced by the non-shared environment. Conclusion These data add to other findings on threat biases in anxious children. Specifically, we found biases in the labelling of some negative

  3. PIRATE: pediatric imaging response assessment and targeting environment

    NASA Astrophysics Data System (ADS)

    Glenn, Russell; Zhang, Yong; Krasin, Matthew; Hua, Chiaho

    2010-02-01

    By combining the strengths of various imaging modalities, the multimodality imaging approach has potential to improve tumor staging, delineation of tumor boundaries, chemo-radiotherapy regime design, and treatment response assessment in cancer management. To address the urgent needs for efficient tools to analyze large-scale clinical trial data, we have developed an integrated multimodality, functional and anatomical imaging analysis software package for target definition and therapy response assessment in pediatric radiotherapy (RT) patients. Our software provides quantitative tools for automated image segmentation, region-of-interest (ROI) histogram analysis, spatial volume-of-interest (VOI) analysis, and voxel-wise correlation across modalities. To demonstrate the clinical applicability of this software, histogram analyses were performed on baseline and follow-up 18F-fluorodeoxyglucose (18F-FDG) PET images of nine patients with rhabdomyosarcoma enrolled in an institutional clinical trial at St. Jude Children's Research Hospital. In addition, we combined 18F-FDG PET, dynamic-contrast-enhanced (DCE) MR, and anatomical MR data to visualize the heterogeneity in tumor pathophysiology with the ultimate goal of adaptive targeting of regions with high tumor burden. Our software is able to simultaneously analyze multimodality images across multiple time points, which could greatly speed up the analysis of large-scale clinical trial data and validation of potential imaging biomarkers.

  4. Assessing Detecting and Deterring the Threat of Maritime Nuclear and Radiological Smuggling in the Western Indian Ocean Region

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khan, M. Umer

    This paper proposes that current maritime smuggling routes in the western Indian Ocean region are similar to those in the past and that the motivations of terrorist groups and the presence of radioactive sources in the Indian Ocean littoral and other states present a significant security threat. The majority of regional terrorist groups have a hybrid structure, piggybacking on criminal activity to fund their terror activities. Additionally, states have used maritime routes in the Indian Ocean region to transport nuclear materials and missiles. Thus, the maritime dimension of such threats remains, and may be increasing. This paper focuses on issues,more » motivations, pathways, and methods to detect and interdict nuclear and radiological trafficking. It analyzes the potential use of maritime technology applications for radiation detection and presents recommendations for states and multinational nonproliferation advocacy organizations to address the threat in the Indian Ocean region.« less

  5. Cognitive control processes in paranoia: the impact of threat induction on strategic cognition and self-focused attention.

    PubMed

    Flower, Laura; Newman-Taylor, Katherine; Stopa, Lusia

    2015-01-01

    Current clinical models emphasize certain cognitive processes in the maintenance of distressing paranoia. While a number of these processes have been examined in detail, the role of strategic cognition and self-focused attention remain under-researched. This study examined the deployment of cognitive strategies and self-focused attention in people with non-clinical paranoia. An experimental design was used to examine the impact of a threat activation task on these processes, in participants with high and low non-clinical paranoia. Twenty-eight people were recruited to each group, and completed measures of anxiety, paranoid cognition, strategic cognition and self-focused attention. The threat activation task was effective in increasing anxiety in people with high and low non-clinical paranoia. The high paranoia group experienced more paranoid cognitions following threat activation. This group also reported greater use of thought suppression, punishment and worry, and less use of social control strategies when under threat. No differences were found between the groups on measures of self-focused attention. This study shows that the threat activation task increased anxiety in people with high non-clinical paranoia, leading to increased paranoid thinking. The use of strategic cognition following threat activation varied dependent on level of non-clinical paranoia. If these differences are replicated in clinical groups, the strategies may be implicated in the maintenance of distressing psychosis, and may therefore be a valuable target for therapeutic intervention.

  6. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  7. Meteoroid and Orbital Debris Threats to NASA's Docking Seals: Initial Assessment and Methodology

    NASA Technical Reports Server (NTRS)

    deGroh, Henry C., III; Nahra, Henry K.

    2009-01-01

    The Crew Exploration Vehicle (CEV) will be exposed to the Micrometeoroid Orbital Debris (MMOD) environment in Low Earth Orbit (LEO) during missions to the International Space Station (ISS) and to the micrometeoroid environment during lunar missions. The CEV will be equipped with a docking system which enables it to connect to ISS and the lunar module known as Altair; this docking system includes a hatch that opens so crew and supplies can pass between the spacecrafts. This docking system is known as the Low Impact Docking System (LIDS) and uses a silicone rubber seal to seal in cabin air. The rubber seal on LIDS presses against a metal flange on ISS (or Altair). All of these mating surfaces are exposed to the space environment prior to docking. The effects of atomic oxygen, ultraviolet and ionizing radiation, and MMOD have been estimated using ground based facilities. This work presents an initial methodology to predict meteoroid and orbital debris threats to candidate docking seals being considered for LIDS. The methodology integrates the results of ground based hypervelocity impacts on silicone rubber seals and aluminum sheets, risk assessments of the MMOD environment for a variety of mission scenarios, and candidate failure criteria. The experimental effort that addressed the effects of projectile incidence angle, speed, mass, and density, relations between projectile size and resulting crater size, and relations between crater size and the leak rate of candidate seals has culminated in a definition of the seal/flange failure criteria. The risk assessment performed with the BUMPER code used the failure criteria to determine the probability of failure of the seal/flange system and compared the risk to the allotted risk dictated by NASA's program requirements.

  8. Meteoroid and Orbital Debris Threats to NASA's Docking Seals: Initial Assessment and Methodology

    NASA Technical Reports Server (NTRS)

    deGroh, Henry C., III; Gallo, Christopher A.; Nahra, Henry K.

    2009-01-01

    The Crew Exploration Vehicle (CEV) will be exposed to the Micrometeoroid Orbital Debris (MMOD) environment in Low Earth Orbit (LEO) during missions to the International Space Station (ISS) and to the micrometeoroid environment during lunar missions. The CEV will be equipped with a docking system which enables it to connect to ISS and the lunar module known as Altair; this docking system includes a hatch that opens so crew and supplies can pass between the spacecrafts. This docking system is known as the Low Impact Docking System (LIDS) and uses a silicone rubber seal to seal in cabin air. The rubber seal on LIDS presses against a metal flange on ISS (or Altair). All of these mating surfaces are exposed to the space environment prior to docking. The effects of atomic oxygen, ultraviolet and ionizing radiation, and MMOD have been estimated using ground based facilities. This work presents an initial methodology to predict meteoroid and orbital debris threats to candidate docking seals being considered for LIDS. The methodology integrates the results of ground based hypervelocity impacts on silicone rubber seals and aluminum sheets, risk assessments of the MMOD environment for a variety of mission scenarios, and candidate failure criteria. The experimental effort that addressed the effects of projectile incidence angle, speed, mass, and density, relations between projectile size and resulting crater size, and relations between crater size and the leak rate of candidate seals has culminated in a definition of the seal/flange failure criteria. The risk assessment performed with the BUMPER code used the failure criteria to determine the probability of failure of the seal/flange system and compared the risk to the allotted risk dictated by NASA s program requirements.

  9. Information Modeling to Assess Eruptive Behavior and Possible Threats on Mt. Etna, Italy

    NASA Astrophysics Data System (ADS)

    Pshenichny, C.; Behncke, B.

    2008-12-01

    One of the best-studied volcanoes of the world, Mt. Etna in Sicily repeatedly exhibits eruptive scenarios that depart from the behavior considered typical for this volcano. Episodes of intense explosive activity, pyroclastic density currents, dome growth, cone collapse, and phreatomagmatic explosions pose a variety of previously underestimated threats to human lives in the summit area of the volcano. However, retrospective analysis of these events shows that they were likely caused by the same very sets of premises and starting conditions as "normal" effusive eruptions, yet combined in an unexpected, probably unique, way. Physical modeling tells us what may happen in terms of physical parameters but not what events we will actually see on a volcano. Bayesian modeling of volcanoes can unite physical parameters and observed events but, unlike physics, it lacks strictness of terms used to describe the events and, hence, may fail to provide a reasonably impartial, complete and self-consistent set of possible scenarios to be expected. Therefore, a tool is needed to process the observational knowledge as strictly as physical matters are treated by mathematics to provide an appropriate event-based framework for assessment of natural hazards during volcanic eruptions. This task requires a modeling not of the volcano itself but of our knowledge of it, and therefore falls into the field of informatis, knowledge engineering, and artificial intelligence. We involved an approach of artificial intelligence developed specially for the needs of geoscience, the method of event bush. Scenarios inferred from event bush fit the observed ones and allow one to foresee other low-probable events that may occur at the volcano. Application of the event bush provides a more impartial vision of volcanic phenomena and may serve as an intermediary between physical modeling, the expert knowledge and numerical assessment, e.g., by means of Bayesian belief networks.

  10. Appalachian Women’s Perceptions of Their Community’s Health Threats

    PubMed Central

    Schoenberg, Nancy E.; Hatcher, Jennifer; Dignan, Mark B.

    2011-01-01

    Context Decades of behavioral research suggest that awareness of health threats is a necessary precursor to engage in health promotion and disease prevention, findings that can be extended to the community level. Purpose We sought to better understand local perspectives on the main health concerns of rural Appalachian communities in order to identify the key health priorities. While Kentucky Appalachian communities are often described as suffering from substandard health, resource, and socioeconomic indicators, strong traditions of community mobilization make possible positive, home-grown change. Methods To assess what women, the key health gatekeepers, perceive as the most significant health threats to their rural communities, 10 focus groups were held with 52 Appalachian women from diverse socioeconomic backgrounds. Tape-recorded narratives were content analyzed and a codebook was developed. Measures designed to increase data trustworthiness included member checks, negative case evidence, and multiple coding. Findings The following rank-ordered conditions emerged as posing the greatest threat to the health of rural Appalachian communities: (1) drug abuse/medication dependence; (2) cancer; (3) heart disease and diabetes (tied); (4) smoking; (5) poor diet/overweight; (6) lack of exercise; and (7) communicable diseases. These health threats were described as specific to the local environment, deriving from broad ecological problems and were connected to one another. Conclusion Drawing on participants’ community-relevant suggestions, we suggest ways in which rural communities may begin to confront these health concerns. These suggestions range from modest, individual-level changes to broader structural-level recommendations. PMID:18257874

  11. Unreliability as a Threat to Understanding Psychopathology: The Cautionary Tale of Attentional Bias

    PubMed Central

    Rodebaugh, Thomas L.; Scullin, Rachel B.; Langer, Julia K.; Dixon, David J.; Huppert, Jonathan D.; Bernstein, Amit; Zvielli, Ariel; Lenze, Eric J.

    2016-01-01

    The use of unreliable measures constitutes a threat to our understanding of psychopathology, because advancement of science using both behavioral and biologically-oriented measures can only be certain if such measurements are reliable. Two pillars of NIMH’s portfolio – the Research Domain Criteria (RDoC) initiative for psychopathology and the target engagement initiative in clinical trials – cannot succeed without measures that possess the high reliability necessary for tests involving mediation and selection based on individual differences. We focus on the historical lack of reliability of attentional bias measures as an illustration of how reliability can pose a threat to our understanding. Our own data replicate previous findings of poor reliability for traditionally-used scores, which suggests a serious problem with the ability to test theories regarding attentional bias. This lack of reliability may also suggest problems with the assumption (in both theory and the formula for the scores) that attentional bias is consistent and stable across time. In contrast, measures accounting for attention as a dynamic process in time show good reliability in our data. The field is sorely in need of research reporting findings and reliability for attentional bias scores using multiple methods, including those focusing on dynamic processes over time. We urge researchers to test and report reliability of all measures, considering findings of low reliability not just as a nuisance but as an opportunity to modify and improve upon the underlying theory. Full assessment of reliability of measures will maximize the possibility that RDoC (and psychological science more generally) will succeed. PMID:27322741

  12. Dimensions of Adversity, Physiological Reactivity, and Externalizing Psychopathology in Adolescence: Deprivation and Threat.

    PubMed

    Busso, Daniel S; McLaughlin, Katie A; Sheridan, Margaret A

    Dysregulation of autonomic nervous system and hypothalamic-pituitary-adrenal (HPA) axis function is a putative intermediate phenotype linking childhood adversity (CA) with later psychopathology. However, associations of CAs with autonomic nervous system and HPA-axis function vary widely across studies. Here, we test a novel conceptual model discriminating between distinct forms of CA (deprivation and threat) and examine their independent associations with physiological reactivity and psychopathology. Adolescents (N = 169; mean [SD] age, 14.9 [1.4] years) with a range of interpersonal violence (e.g., maltreatment, community violence) and poverty exposure participated in the Trier Social Stress test (TSST). During the TSST, electrocardiogram, impedance cardiograph, salivary cortisol, and dehydroepiandrosterone-sulfate data were collected. We compared the associations of poverty (an indicator of deprivation) and interpersonal violence (an indicator of threat) on sympathetic, parasympathetic, and HPA-axis reactivity to the TSST, and assessed whether these differences mediated the association of adversity with internalizing and externalizing symptoms. Exposure to poverty and interpersonal violence was associated with psychopathology. Interpersonal violence, adjusting for poverty, was associated with blunted sympathetic (b = 1.44, p = .050) and HPA-axis reactivity (b = -.09; p = .021). Blunted cortisol reactivity mediated the association of interpersonal violence with externalizing, but not internalizing, psychopathology. In contrast, poverty was not associated with physiological reactivity after adjusting for interpersonal violence. We provide evidence for distinct neurobiological mechanisms through which adversity related to poverty and interpersonal violence is associated with psychopathology in adolescence. Distinguishing distinct pathways through which adversity influences mental health has implications for preventive interventions targeting youths exposed to

  13. Smart CMOS sensor for wideband laser threat detection

    NASA Astrophysics Data System (ADS)

    Schwarze, Craig R.; Sonkusale, Sameer

    2015-09-01

    The proliferation of lasers has led to their widespread use in applications ranging from short range standoff chemical detection to long range Lidar sensing and target designation operating across the UV to LWIR spectrum. Recent advances in high energy lasers have renewed the development of laser weapons systems. The ability to measure and assess laser source information is important to both identify a potential threat as well as determine safety and nominal hazard zone (NHZ). Laser detection sensors are required that provide high dynamic range, wide spectral coverage, pulsed and continuous wave detection, and large field of view. OPTRA, Inc. and Tufts have developed a custom ROIC smart pixel imaging sensor architecture and wavelength encoding optics for measurement of source wavelength, pulse length, pulse repetition frequency (PRF), irradiance, and angle of arrival. The smart architecture provides dual linear and logarithmic operating modes to provide 8+ orders of signal dynamic range and nanosecond pulse measurement capability that can be hybridized with the appropriate detector array to provide UV through LWIR laser sensing. Recent advances in sputtering techniques provide the capability for post-processing CMOS dies from the foundry and patterning PbS and PbSe photoconductors directly on the chip to create a single monolithic sensor array architecture for measuring sources operating from 0.26 - 5.0 microns, 1 mW/cm2 - 2 kW/cm2.

  14. Assessment of a Targeted Trap-Neuter-Return Pilot Study in Auckland, New Zealand.

    PubMed

    Zito, Sarah; Aguilar, Glenn; Vigeant, Shalsee; Dale, Arnja

    2018-05-13

    There is a need for effective and humane management tools to manage urban stray cats and minimise negative impacts associated with stray cats. One such tool is targeted trap-neuter-return (TTNR), but no concerted implementation of this technique or formal assessments have been reported. To address this deficit, a TTNR programme was implemented and assessed in one Auckland suburb from May 2015 to June 2016; the programme sterilised and returned 348 cats (4.2 cats/1000 residents). Assessment was based on the number of incoming felines; stray, unsocialised cats euthanased; unsocialised, unowned cats sterilised and returned (independently of the TTNR programme); and neonatal/underage euthanasias. Incoming stray felines, underage euthanasias, and unsocialised stray cat euthanasias were all reduced for the targeted suburb when compared for the years before and after the programme (the percentage reduction in these parameters was −39, −17, −34, −7, and −47, respectively). These outcome measures had a greater reduction in the targeted suburb compared to the Auckland suburbs not targeted by the TTNR programme ( p < 0.01), although causation cannot be inferred, as a variety of reasons could have contributed to the changes. This pilot programme suggests that TTNR could be a valuable, humane cat management tool in urban New Zealand, and further assessment is warranted.

  15. How to test the threat-simulation theory.

    PubMed

    Revonsuo, Antti; Valli, Katja

    2008-12-01

    Malcolm-Smith, Solms, Turnbull and Tredoux [Malcolm-Smith, S., Solms, M.,Turnbull, O., & Tredoux, C. (2008). Threat in dreams: An adaptation? Consciousness and Cognition, 17, 1281-1291.] have made an attempt to test the Threat-Simulation Theory (TST), a theory offering an evolutionary psychological explanation for the function of dreaming [Revonsuo, A. (2000a). The reinterpretation of dreams: An evolutionary hypothesis of the function of dreaming. Behavioral and Brain Sciences, 23(6), 877-901]. Malcolm-Smith et al. argue that empirical evidence from their own study as well as from some other studies in the literature does not support the main predictions of the TST: that threatening events are frequent and overrepresented in dreams, that exposure to real threats activates the threat-simulation system, and that dream threats contain realistic rehearsals of threat avoidance responses. Other studies, including our own, have come up with results and conclusions that are in conflict with those of Malcolm-Smith et al. In this commentary, we provide an analysis of the sources of these disagreements, and their implications to the TST. Much of the disagreement seems to stem from differing interpretations of the theory and, consequently, of differing methods to test it.

  16. Mapping Historic Gypsy Moth Defoliation with MODIS Satellite Data: Implications for Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spurce, Joseph P.; Hargrove, William; Ryan, Robert E.; Smooth, James C.; Prados, Don; McKellip, Rodney; Sader, Steven A.; Gasser, Jerry; May, George

    2008-01-01

    This viewgraph presentation reviews a project, the goal of which is to study the potential of MODIS data for monitoring historic gypsy moth defoliation. A NASA/USDA Forest Service (USFS) partnership was formed to perform the study. NASA is helping USFS to implement satellite data products into its emerging Forest Threat Early Warning System. The latter system is being developed by the USFS Eastern and Western Forest Threat Assessment Centers. The USFS Forest Threat Centers want to use MODIS time series data for regional monitoring of forest damage (e.g., defoliation) preferably in near real time. The study's methodology is described, and the results of the study are shown.

  17. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  18. Child Maltreatment and Autonomic Nervous System Reactivity: Identifying Dysregulated Stress Reactivity Patterns using the Biopsychosocial Model of Challenge and Threat

    PubMed Central

    McLaughlin, Katie A.; Sheridan, Margaret A.; Alves, Sonia; Mendes, Wendy Berry

    2014-01-01

    OBJECTIVE Disruptions in stress response system development have been posited as mechanisms linking child maltreatment (CM) to psychopathology. Existing theories predict elevated sympathetic nervous system (SNS) reactivity following CM, but evidence for this is inconsistent. We present a novel framework for conceptualizing stress reactivity following CM using the biopsychosocial model of challenge and threat. We predicted that in the context of a social-evaluative stressor, maltreated adolescents would exhibit a threat pattern of reactivity, involving SNS activation paired with elevated vascular resistance and blunted cardiac output (CO) reactivity. METHODS A sample of 168 adolescents (mean age=14.9 years) participated. Recruitment targeted maltreated adolescents; 38.2% qualified as maltreated. Electrocardiogram, impedance cardiography, and blood pressure were acquired at rest and during an evaluated social stressor (Trier Social Stress Test). Pre-ejection period (PEP), CO, and total peripheral resistance (TPR) reactivity were computed during task preparation, speech-delivery, and verbal mental-arithmetic. Internalizing and externalizing symptoms were assessed. RESULTS Maltreatment was unrelated to PEP reactivity during preparation or speech, but maltreated adolescents had reduced PEP reactivity during math. Maltreatment exposure (F(1,145)=3.8-9.4, p=.053-<.001) and severity (β=−.10-.12, p=.030-.007) were associated with significantly reduced CO reactivity during all components of the stress-task and marginally associated with elevated TPR reactivity (F(1,145)=3.8-9.4, p=.053-<.001; β=.07-.11, p=.11-.009, respectively). Threat reactivity was negatively associated with externalizing symptoms. CONCLUSIONS Child maltreatment is associated with a dysregulated pattern of physiological reactivity consistent with theoretical conceptualizations of threat but not previously examined in relation to maltreatment, suggesting a more nuanced pattern of stress reactivity than

  19. Quantifying human response capabilities towards tsunami threats at community level

    NASA Astrophysics Data System (ADS)

    Post, J.; Mück, M.; Zosseder, K.; Wegscheider, S.; Taubenböck, H.; Strunz, G.; Muhari, A.; Anwar, H. Z.; Birkmann, J.; Gebert, N.

    2009-04-01

    Decision makers at the community level need detailed information on tsunami risks in their area. Knowledge on potential hazard impact, exposed elements such as people, critical facilities and lifelines, people's coping capacity and recovery potential are crucial to plan precautionary measures for adaptation and to mitigate potential impacts of tsunamis on society and the environment. A crucial point within a people-centred tsunami risk assessment is to quantify the human response capabilities towards tsunami threats. Based on this quantification and spatial representation in maps tsunami affected and safe areas, difficult-to-evacuate areas, evacuation target points and evacuation routes can be assigned and used as an important contribution to e.g. community level evacuation planning. Major component in the quantification of human response capabilities towards tsunami impacts is the factor time. The human response capabilities depend on the estimated time of arrival (ETA) of a tsunami, the time until technical or natural warning signs (ToNW) can be received, the reaction time (RT) of the population (human understanding of a tsunami warning and the decision to take appropriate action), the evacuation time (ET, time people need to reach a safe area) and the actual available response time (RsT = ETA - ToNW - RT). If RsT is larger than ET, people in the respective areas are able to reach a safe area and rescue themselves. Critical areas possess RsT values equal or even smaller ET and hence people whin these areas will be directly affected by a tsunami. Quantifying the factor time is challenging and an attempt to this is presented here. The ETA can be derived by analyzing pre-computed tsunami scenarios for a respective area. For ToNW we assume that the early warning center is able to fulfil the Indonesian presidential decree to issue a warning within 5 minutes. RT is difficult as here human intrinsic factors as educational level, believe, tsunami knowledge and experience

  20. The Perceived Threat of Affirmative Action Policy

    DTIC Science & Technology

    1975-06-06

    as- sumption was made that affirmative action threat was a phenomenon which was separate and distinct from general racial feelings. The...the respond- ents. However, affirmative action threat was found to be differentially related to general racial feelings at the .001 confidence...level. Thus, affirmative action threat feelings were not independent from general racial feelings. Based on the findings of this study, it was

  1. Technologies to counter aviation security threats

    NASA Astrophysics Data System (ADS)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  2. Quantifying progress toward a conservation assessment for all plants.

    PubMed

    Bachman, Steven P; Nic Lughadha, Eimear M; Rivers, Malin C

    2018-06-01

    The Global Strategy for Plant Conservation (GSPC) set an ambitious target to achieve a conservation assessment for all known plant species by 2020. We consolidated digitally available plant conservation assessments and reconciled their scientific names and assessment status to predefined standards to provide a quantitative measure of progress toward this target. The 241,919 plant conservation assessments generated represent 111,824 accepted land plant species (vascular plants and bryophytes, not algae). At least 73,081 and up to 90,321 species have been assessed at the global scale, representing 21-26% of known plant species. Of these plant species, at least 27,148 and up to 32,542 are threatened. Eighty plant families, including some of the largest, such as Asteraceae, Orchidaceae, and Rubiaceae, are underassessed and should be the focus of assessment effort if the GSPC target is to be met by 2020. Our data set is accessible online (ThreatSearch) and is a baseline that can be used to directly support other GSPC targets and plant conservation action. Although around one-quarter of a million plant assessments have been compiled, the majority of plants are still unassessed. The challenge now is to build on this progress and redouble efforts to document conservation status of unassessed plants to better inform conservation decisions and conserve the most threatened species. © 2017 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  3. Guideline for assessing the performance of electric power systems in natural hazard and human threat events

    USGS Publications Warehouse

    Savage, W.U.; Nishenko, S.P.; Honegger, D.G.; Kempner, L.

    2006-01-01

    Electric power utilities are familiar with and skilled in preparing for and responding to almost-routine natural hazard events such as strong wind and ice storms and seasonal floods, as well as intentional human acts such as vandalism. Recent extreme weather (hurricanes Katrina and Rita), extremely destructive international earthquakes (in Sumatra and Pakistan), and nation-wide concerns regarding future terrorist attacks have increased the pressure on utilities to take appropriate steps to avoid being overwhelmed by such infrequent and exceedingly severe events. Determining what constitutes the appropriate steps to take requires various levels of understanding of the specific hazards and the risks faced by the utility. The American Lifelines Alliance (www. americanlifelinesalliance.org) has prepared a Guideline that provides clear, concise, and nationally-applicable guidance on determining the scope and level of effort necessary to assess power system performance in the wide range of natural hazard or human threat events. Included in this Guideline are specific procedures to follow and information to consider in performing standardized assessments. With the results of such assessments, utility owners can effectively establish and carry out risk management programs that will lead to achieving appropriate levels of performance in future events. The Guideline incorporates an inquiry-driven process with a two-phase performance assessment that can be applied to power systems of any size. The screening phase enables systems or components that are clearly not at risk to be screened out early. The subsequent analysis phase uses results from the screening phase to prioritize and allocate resources for more detailed assessments of hazard, vulnerability, and system performance. This process helps assure that the scope of the assessment meets the specific performance objectives of the inquiry. A case history is presented to illustrate the type of experience with an inquiry

  4. Changes in automatic threat processing precede and predict clinical changes with exposure-based cognitive-behavior therapy for panic disorder.

    PubMed

    Reinecke, Andrea; Waldenmaier, Lara; Cooper, Myra J; Harmer, Catherine J

    2013-06-01

    Cognitive behavioral therapy (CBT) is an effective treatment for emotional disorders such as anxiety or depression, but the mechanisms underlying successful intervention are far from understood. Although it has been a long-held view that psychopharmacological approaches work by directly targeting automatic emotional information processing in the brain, it is usually postulated that psychological treatments affect these processes only over time, through changes in more conscious thought cycles. This study explored the role of early changes in emotional information processing in CBT action. Twenty-eight untreated patients with panic disorder were randomized to a single session of exposure-based CBT or waiting group. Emotional information processing was measured on the day after intervention with an attentional visual probe task, and clinical symptoms were assessed on the day after intervention and at 4-week follow-up. Vigilance for threat information was decreased in the treated group, compared with the waiting group, the day after intervention, before reductions in clinical symptoms. The magnitude of this early effect on threat vigilance predicted therapeutic response after 4 weeks. Cognitive behavioral therapy rapidly affects automatic processing, and these early effects are predictive of later therapeutic change. Such results suggest very fast action on automatic processes mediating threat sensitivity, and they provide an early marker of treatment response. Furthermore, these findings challenge the notion that psychological treatments work directly on conscious thought processes before automatic information processing and imply a greater similarity between early effects of pharmacological and psychological treatments for anxiety than previously thought. Copyright © 2013 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  5. Enhanced processing of threat stimuli under limited attentional resources.

    PubMed

    De Martino, Benedetto; Kalisch, Raffael; Rees, Geraint; Dolan, Raymond J

    2009-01-01

    The ability to process stimuli that convey potential threat, under conditions of limited attentional resources, confers adaptive advantages. This study examined the neurobiology underpinnings of this capacity. Employing an attentional blink paradigm, in conjunction with functional magnetic resonance imaging, we manipulated the salience of the second of 2 face target stimuli (T2), by varying emotionality. Behaviorally, fearful T2 faces were identified significantly more than neutral faces. Activity in fusiform face area increased with correct identification of T2 faces. Enhanced activity in rostral anterior cingulate cortex (rACC) accounted for the benefit in detection of fearful stimuli reflected in a significant interaction between target valence and correct identification. Thus, under conditions of limited attention resources activation in rACC correlated with enhanced processing of emotional stimuli. We suggest that these data support a model in which a prefrontal "gate" mechanism controls conscious access of emotional information under conditions of limited attentional resources.

  6. Measuring Transnational Organized Crime Threats to US National Security

    DTIC Science & Technology

    2016-05-26

    typology is not designed to score TOC networks, so it is not an obvious choice, but it could be easily modified by the TMWG to rank-order TOC networks...States Strategy to Combat Transnational Organized Crime (SCTOC). The strategy identified Transnational Organized Crime ( TOC ) as a national security...identify the TOC groups that present the national security threat defined in the SCTOC? A literature review of existing organized crime assessments

  7. Adapting forest health assessments to changing perspectives on threats--a case example from Sweden.

    PubMed

    Wulff, Sören; Lindelöw, Åke; Lundin, Lars; Hansson, Per; Axelsson, Anna-Lena; Barklund, Pia; Wijk, Sture; Ståhl, Göran

    2012-04-01

    A revised Swedish forest health assessment system is presented. The assessment system is composed of several interacting components which target information needs for strategic and operational decision making and accommodate a continuously expanding knowledge base. The main motivation for separating information for strategic and operational decision making is that major damage outbreaks are often scattered throughout the landscape. Generally, large-scale inventories (such as national forest inventories) cannot provide adequate information for mitigation measures. In addition to broad monitoring programs that provide time-series information on known damaging agents and their effects, there is also a need for local and regional inventories adapted to specific damage events. While information for decision making is the major focus of the health assessment system, the system also contributes to expanding the knowledge base of forest conditions. For example, the integrated monitoring programs provide a better understanding of ecological processes linked to forest health. The new health assessment system should be able to respond to the need for quick and reliable information and thus will be an important part of the future monitoring of Swedish forests.

  8. Stock assessment of fishery target species in Lake Koka, Ethiopia.

    PubMed

    Tesfaye, Gashaw; Wolff, Matthias

    2015-09-01

    Effective management is essential for small-scale fisheries to continue providing food and livelihoods for households, particularly in developing countries where other options are often limited. Studies on the population dynamics and stock assessment on fishery target species are thus imperative to sustain their fisheries and the benefits for the society. In Lake Koka (Ethiopia), very little is known about the vital population parameters and exploitation status of the fishery target species: tilapia Oreochromis niloticus, common carp Cyprinus carpio and catfish Clarias gariepinus. Our study, therefore, aimed at determining the vital population parameters and assessing the status of these target species in Lake Koka using length frequency data collected quarterly from commercial catches from 2007-2012. A total of 20,097 fish specimens (distributed as 7,933 tilapia, 6,025 catfish and 6,139 common carp) were measured for the analysis. Von Bertalarffy growth parameters and their confidence intervals were determined from modal progression analysis using ELEFAN I and applying the jackknife technique. Mortality parameters were determined from length-converted catch curves and empirical models. The exploitation status of these target species were then assessed by computing exploitation rates (E) from mortality parameters as well as from size indicators i.e., assessing the size distribution of fish catches relative to the size at maturity (Lm), the size that provides maximum cohort biomass (Lopt) and the abundance of mega-spawners. The mean value of growth parameters L∞, K and the growth performance index ø' were 44.5 cm, 0.41/year and 2.90 for O. niloticus, 74.1 cm, 0.28/year and 3.19 for C. carpio and 121.9 cm, 0.16/year and 3.36 for C. gariepinus, respectively. The 95 % confidence intervals of the estimates were also computed. Total mortality (Z) estimates were 1.47, 0.83 and 0.72/year for O. niloticus, C. carpio and C. gariepinus, respectively. Our study suggest that

  9. Performing target specific band reduction using artificial neural networks and assessment of its efficacy using various target detection algorithms

    NASA Astrophysics Data System (ADS)

    Yadav, Deepti; Arora, M. K.; Tiwari, K. C.; Ghosh, J. K.

    2016-04-01

    Hyperspectral imaging is a powerful tool in the field of remote sensing and has been used for many applications like mineral detection, detection of landmines, target detection etc. Major issues in target detection using HSI are spectral variability, noise, small size of the target, huge data dimensions, high computation cost, complex backgrounds etc. Many of the popular detection algorithms do not work for difficult targets like small, camouflaged etc. and may result in high false alarms. Thus, target/background discrimination is a key issue and therefore analyzing target's behaviour in realistic environments is crucial for the accurate interpretation of hyperspectral imagery. Use of standard libraries for studying target's spectral behaviour has limitation that targets are measured in different environmental conditions than application. This study uses the spectral data of the same target which is used during collection of the HSI image. This paper analyze spectrums of targets in a way that each target can be spectrally distinguished from a mixture of spectral data. Artificial neural network (ANN) has been used to identify the spectral range for reducing data and further its efficacy for improving target detection is verified. The results of ANN proposes discriminating band range for targets; these ranges were further used to perform target detection using four popular spectral matching target detection algorithm. Further, the results of algorithms were analyzed using ROC curves to evaluate the effectiveness of the ranges suggested by ANN over full spectrum for detection of desired targets. In addition, comparative assessment of algorithms is also performed using ROC.

  10. Religious magnanimity: reminding people of their religious belief system reduces hostility after threat.

    PubMed

    Schumann, Karina; McGregor, Ian; Nash, Kyle A; Ross, Michael

    2014-09-01

    The present research tested the hypothesis that many people's ambient religious beliefs are non-hostile and magnanimous by assessing whether reminding people of their religious belief systems would reduce hostility after threat. Across religious affiliations, participants reported that their religious belief systems encourage magnanimous behavior. In addition, priming their religious belief systems caused them to act more magnanimously, but only when motivated to adhere to salient ideals (i.e., after threats; see Gailliot, Stillman, Schmeichel, Maner, & Plant, 2008; Jonas et al., 2008). Specifically, in Studies 1-5, we found that a general religious belief system prime ("Which religious belief system do you identify with?") reduced the hostility of people's thoughts, behaviors, and judgments following threat. In Studies 6 and 7, we found that the religious belief system prime only reduced hostile reactions to threat among participants who held religious beliefs that oriented them toward magnanimous ideals (Study 6) and who were dispositionally inclined to adhere to their ideals (Study 7). In Study 8, we found support for the role of magnanimous ideals by demonstrating that directly priming these ideals yielded effects similar to those produced by a religious belief system prime. These studies provide consistent evidence that, by invoking magnanimous ideals, a religious belief system prime promotes less hostile responses to threat. 2014 APA, all rights reserved

  11. Maladaptive social information processing in childhood predicts young men's atypical amygdala reactivity to threat.

    PubMed

    Choe, Daniel Ewon; Shaw, Daniel S; Forbes, Erika E

    2015-05-01

    Maladaptive social information processing, such as hostile attributional bias and aggressive response generation, is associated with childhood maladjustment. Although social information processing problems are correlated with heightened physiological responses to social threat, few studies have examined their associations with neural threat circuitry, specifically amygdala activation to social threat. A cohort of 310 boys participated in an ongoing longitudinal study and completed questionnaires and laboratory tasks assessing their social and cognitive characteristics the boys were between 10 and 12 years of age. At age 20, 178 of these young men underwent functional magnetic resonance imaging and a social threat task. At age 22, adult criminal arrest records and self-reports of impulsiveness were obtained. Path models indicated that maladaptive social information-processing at ages 10 and 11 predicted increased left amygdala reactivity to fear faces, an ambiguous threat, at age 20 while accounting for childhood antisocial behavior, empathy, IQ, and socioeconomic status. Exploratory analyses indicated that aggressive response generation - the tendency to respond to threat with reactive aggression - predicted left amygdala reactivity to fear faces and was concurrently associated with empathy, antisocial behavior, and hostile attributional bias, whereas hostile attributional bias correlated with IQ. Although unrelated to social information-processing problems, bilateral amygdala reactivity to anger faces at age 20 was unexpectedly predicted by low IQ at age 11. Amygdala activation did not mediate associations between social information processing and number of criminal arrests, but both impulsiveness at age 22 and arrests were correlated with right amygdala reactivity to anger facial expressions at age 20. Childhood social information processing and IQ predicted young men's amygdala response to threat a decade later, which suggests that childhood social

  12. A review of multi-threat medical countermeasures against chemical warfare and terrorism.

    PubMed

    Cowan, Fred M; Broomfield, Clarence A; Stojiljkovic, Milos P; Smith, William J

    2004-11-01

    The Multi-Threat Medical Countermeasure (MTMC) hypothesis has been proposed with the aim of developing a single countermeasure drug with efficacy against different pathologies caused by multiple classes of chemical warfare agents. Although sites and mechanisms of action and the pathologies caused by different chemical insults vary, common biochemical signaling pathways, molecular mediators, and cellular processes provide targets for MTMC drugs. This article will review the MTMC hypothesis for blister and nerve agents and will expand the scope of the concept to include other chemicals as well as briefly consider biological agents. The article will also consider how common biochemical signaling pathways, molecular mediators, and cellular processes that contribute to clinical pathologies and syndromes may relate to the toxicity of threat agents. Discovery of MTMC provides the opportunity for the integration of diverse researchers and clinicians, and for the exploitation of cutting-edge technologies and drug discovery. The broad-spectrum nature of MTMC can augment military and civil defense to combat chemical warfare and chemical terrorism.

  13. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    PubMed Central

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  14. Childhood maltreatment and threats with weapons.

    PubMed

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  15. Perturbed threat monitoring following a traumatic event predicts risk for post-traumatic stress disorder.

    PubMed

    Naim, R; Wald, I; Lior, A; Pine, D S; Fox, N A; Sheppes, G; Halpern, P; Bar-Haim, Y

    2014-07-01

    Post-traumatic stress disorder (PTSD) is a chronic and difficult to treat psychiatric disorder. Objective, performance-based diagnostic markers that uniquely index risk for PTSD above and beyond subjective self-report markers could inform attempts to improve prevention and early intervention. We evaluated the predictive value of threat-related attention bias measured immediately after a potentially traumatic event, as a risk marker for PTSD at a 3-month follow-up. We measured the predictive contribution of attentional threat bias above and beyond that of the more established marker of risk for PTSD, self-reported psychological dissociation. Dissociation symptoms and threat-related attention bias were measured in 577 motor vehicle accident (MVA) survivors (mean age = 35.02 years, 356 males) within 24 h of admission to an emergency department (ED) of a large urban hospital. PTSD symptoms were assessed at a 3-month follow-up using the Clinician-Administered PTSD Scale (CAPS). Self-reported dissociation symptoms significantly accounted for 16% of the variance in PTSD at follow-up, and attention bias toward threat significantly accounted for an additional 4% of the variance in PTSD. Threat-related attention bias can be reliably measured in the context of a hospital ED and significantly predicts risk for later PTSD. Possible mechanisms underlying the association between threat bias following a potentially traumatic event and risk for PTSD are discussed. The potential application of an attention bias modification treatment (ABMT) tailored to reduce risk for PTSD is suggested.

  16. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    PubMed Central

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of

  17. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting.

    PubMed

    Devriendt, Els; Wellens, Nathalie I H; Flamaing, Johan; Declercq, Anja; Moons, Philip; Boonen, Steven; Milisen, Koen

    2013-09-05

    The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons' medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients' data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. The primary strengths of the BelRAI-system were a structured overview of the patients' condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of care. An actual shortage of

  18. Deflecting the trajectory and changing the narrative: how self-affirmation affects academic performance and motivation under identity threat.

    PubMed

    Sherman, David K; Hartson, Kimberly A; Binning, Kevin R; Purdie-Vaughns, Valerie; Garcia, Julio; Taborsky-Barba, Suzanne; Tomassetti, Sarah; Nussbaum, A David; Cohen, Geoffrey L

    2013-04-01

    To the extent that stereotype and identity threat undermine academic performance, social psychological interventions that lessen threat could buffer threatened students and improve performance. Two studies, each featuring a longitudinal field experiment in a mixed-ethnicity middle school, examined whether a values affirmation writing exercise could attenuate the achievement gap between Latino American and European American students. In Study 1, students completed multiple self-affirmation (or control) activities as part of their regular class assignments. Latino American students, the identity threatened group, earned higher grades in the affirmation than control condition, whereas White students were unaffected. The effects persisted 3 years and, for many students, continued into high school by lifting their performance trajectory. Study 2 featured daily diaries to examine how the affirmation affected psychology under identity threat, with the expectation that it would shape students' narratives of their ongoing academic experience. By conferring a big-picture focus, affirmation was expected to broaden construals, prevent daily adversity from being experienced as identity threat, and insulate academic motivation from identity threat. Indeed, affirmed Latino American students not only earned higher grades than nonaffirmed Latino American students but also construed events at a more abstract than concrete level and were less likely to have their daily feelings of academic fit and motivation undermined by identity threat. Discussion centers on how social-psychological processes propagate themselves over time and how timely interventions targeting these processes can promote well-being and achievement.

  19. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  20. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...