Sample records for air piracy threats

  1. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  2. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  3. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  4. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  5. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  6. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  7. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  8. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  9. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  10. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  11. Piracy on the high seas-threats to travelers' health.

    PubMed

    Nikolić, Nebojša; Missoni, Eduard

    2013-01-01

    Piracy has been threatening international sea trade and creating risk for crews and passengers worldwide. The problem is largely confined to the Somalia coast, West Africa, South America, and Southeast Asia. The targets are merchant ships, cruising yachts, and passenger ships with several thousand people on board. Such attacks can result in loss of lives, short- and long-term health problems, and can further be complicated by the consequences of hostage situations on shore. The purpose of this article is to present the problem of piracy, its relevance to the field of travel medicine, and help travel medicine practitioners to deal with its specifics before, during, and after attack. Comprehensive literature research was done and published data from 2002 until 2012 from the International Chamber of Commerce specialized division-International Maritime Bureau (IMB)-on 3,806 attacks and 7,635 incidents involving human victims are analyzed. Available occupational health data in merchant marine and epidemiological data acquired on board cruise ships were used to estimate the health risks. From 2002 until 2012, 3,806 ships were attacked including 82 yachts and 13 passenger ships. A number of reported piracy attacks worldwide continued to threaten security and lives on sea. In 2012, 297 incidents of piracy and armed robbery were reported, a total of 585 crew members were taken hostage, 26 kidnapped, and 6 killed as a direct result of the incident.(1) CONCLUSION: The risk of being injured or killed by pirates on board cruise ships is actually very low. Piracy on the world's seas is in decline and remains a reasonably localized issue. While this improvement is a result of continued efforts of international naval forces, that protection is only partial and fails to suppress piracy completely. Piracy still presents significant threat to international travel, and future involvement of travel medicine practitioners in providing advice to travelers to piracy regions or victims of

  12. Task force on deterrence of air piracy : final report.

    DOT National Transportation Integrated Search

    1978-11-01

    In February 1969, as the frequency of hijacking of U.S. air carrier aircraft was rising to an all-time high, the Federal Aviation Administration established a multi-disciplinary Task Force on Deterrence of Air Piracy. The work of the Task Force in de...

  13. Maritime Piracy: Examining the U.S. Response to a Global Threat

    DTIC Science & Technology

    2010-03-01

    Security Council in December 2008, as the Countering Piracy off the Horn of Africa Partnership & Action Plan ( CPAP ). In accordance with U.S. policy to...international efforts,‖43 the plan places significant importance on multilateral action to solve the problem of Somali piracy. CPAP seeks to involve a siege...an interest in maritime security.‖44 CPAP directs the U.S., in concert with a ―global partnership,‖ to address three lines of operation: 1

  14. Piracy: The Best Business Model Available

    DTIC Science & Technology

    2013-11-01

    9 3. SOF Hostage Rescue Missions .......................................... 15 4. Recent Evolution of Piracy...positive effect when the pirate enterprise has acted and taken American hostages . However, a course of action with more fundamental results should include...solutions to crimes committed on the seas. As will be discussed, proposed counter-piracy operations aimed at support structures may require SOF air

  15. Piracy off the Horn of Africa

    DTIC Science & Technology

    2010-04-19

    mandate followed months of renewed pirate activity in the region, including the November 2009 seizure of the MV Maran Centaurus , an Greek-flagged...Sirius Star, MV De Xin Hai, MV Maran Centaurus , and the April 2010 hijacking of the MT Samho Dream illustrate the threat piracy can pose to

  16. High Noon on the High Seas: A Proximity-Complexity Model of Maritime Piracy Threats

    DTIC Science & Technology

    2009-04-01

    International Maritime Bureau, Annual Report: Piracy and Armed Robbery Against Ships (Kuala Lumpur: International Chamber of Commerce , 2008). 4...Against Ships (Kuala Lumpur: International Chamber of Commerce , 2007). 7. International Maritime Bureau, Annual Report: Piracy and Armed Robbery...Against Ships (Kuala Lumpur: International Chamber of Commerce , 2008). 8. Statistical Package for the Social Sciences (SPSS) 11.0 for Windows Student

  17. Maritime Security in the Gulf of Guinea Subregion: Threats, Challenges and Solutions

    DTIC Science & Technology

    2011-03-16

    the GoG maritime domain. These threats adversely impact the socio-economic and political fabrics of most countries within the region. Poaching ...geographical location as well as environmental and demographic factors. Poaching , piracy, transnational crime, boundary disputes and environmental...and demographic factors. Poaching , piracy, transnational crime, boundary disputes and environmental degradation are common threats to security of the

  18. Law, Pirates, and Piracy

    ERIC Educational Resources Information Center

    Middleton, Tiffany Willey

    2010-01-01

    Maritime piracy has increasingly been in the news, and in the courtroom, in recent years. This article presents an interview with international legal and overseas piracy expert Douglas Guilfoyle. In this interview, Guilfoyle discusses why piracy is a growing problem and some of the challenges it creates for the international community. He also…

  19. The Counter-Piracy JIATF: Getting AFRICOM into the Piracy Fight

    DTIC Science & Technology

    2009-05-04

    Action Plan, 6. 16 James Kraska and Brian Wilson, “Maritime Piracy in East Africa,” 57. 6 Horn of Africa: Partnership and Action Plan ( CPAP ...12 Piracy off the Horn of Africa: Partnership and Action Plan ( CPAP ), provide this important national-level direction. The NSMS clearly states that...the safety and economic security of the United States depends upon the secure use of the world‟s oceans.” 38 CPAP provides even more detailed

  20. Piracy the Somali Way

    DTIC Science & Technology

    2009-04-01

    University Press, August 2008. “Anger as Piracy Gets Out of Control,” Australian, 21 November 2008. Bateman, Sam, Catherine Zara Raymond, and Joshua, Ho...Contemporary Piracy and Maritime Terrorism, 18. 23 Sam Batemen, Catherine Zara Raymond and Joshua Ho, “Safety and Security in the Malacca and Singapore

  1. Negative Peer Relationships on Piracy Behavior: A Cross-Sectional Study of the Associations between Cyberbullying Involvement and Digital Piracy

    PubMed Central

    Yubero, Santiago; Larrañaga, Elisa; Villora, Beatriz

    2017-01-01

    The present study examines the relationship between different roles in cyberbullying behaviors (cyberbullies, cybervictims, cyberbullies-victims, and uninvolved) and self-reported digital piracy. In a region of central Spain, 643 (49.3% females, 50.7% males) students (grades 7–10) completed a number of self-reported measures, including cyberbullying victimization and perpetration, self-reported digital piracy, ethical considerations of digital piracy, time spent on the Internet, and leisure activities related with digital content. The results of a series of hierarchical multiple regression models for the whole sample indicate that cyberbullies and cyberbullies-victims are associated with more reports of digital piracy. Subsequent hierarchical multiple regression analyses, done separately for males and females, indicate that the relationship between cyberbullying and self-reported digital piracy is sustained only for males. The ANCOVA analysis show that, after controlling for gender, self-reported digital piracy and time spent on the Internet, cyberbullies and cyberbullies-victims believe that digital piracy is a more ethically and morally acceptable behavior than victims and uninvolved adolescents believe. The results provide insight into the association between two deviant behaviors. PMID:28981466

  2. Negative Peer Relationships on Piracy Behavior: A Cross-Sectional Study of the Associations between Cyberbullying Involvement and Digital Piracy.

    PubMed

    Yubero, Santiago; Larrañaga, Elisa; Villora, Beatriz; Navarro, Raúl

    2017-10-05

    The present study examines the relationship between different roles in cyberbullying behaviors (cyberbullies, cybervictims, cyberbullies-victims, and uninvolved) and self-reported digital piracy. In a region of central Spain, 643 (49.3% females, 50.7% males) students (grades 7-10) completed a number of self-reported measures, including cyberbullying victimization and perpetration, self-reported digital piracy, ethical considerations of digital piracy, time spent on the Internet, and leisure activities related with digital content. The results of a series of hierarchical multiple regression models for the whole sample indicate that cyberbullies and cyberbullies-victims are associated with more reports of digital piracy. Subsequent hierarchical multiple regression analyses, done separately for males and females, indicate that the relationship between cyberbullying and self-reported digital piracy is sustained only for males. The ANCOVA analysis show that, after controlling for gender, self-reported digital piracy and time spent on the Internet, cyberbullies and cyberbullies-victims believe that digital piracy is a more ethically and morally acceptable behavior than victims and uninvolved adolescents believe. The results provide insight into the association between two deviant behaviors.

  3. Digital Piracy: An Assessment of Consumer Piracy Risk and Optimal Supply Chain Coordination Strategies

    ERIC Educational Resources Information Center

    Jeong, Bong-Keun

    2010-01-01

    Digital piracy and the emergence of new distribution channels have changed the dynamics of supply chain coordination and created many interesting problems. There has been increased attention to understanding the phenomenon of consumer piracy behavior and its impact on supply chain profitability. The purpose of this dissertation is to better…

  4. Software Piracy Detection Model Using Ant Colony Optimization Algorithm

    NASA Astrophysics Data System (ADS)

    Astiqah Omar, Nor; Zakuan, Zeti Zuryani Mohd; Saian, Rizauddin

    2017-06-01

    Internet enables information to be accessible anytime and anywhere. This scenario creates an environment whereby information can be easily copied. Easy access to the internet is one of the factors which contribute towards piracy in Malaysia as well as the rest of the world. According to a survey conducted by Compliance Gap BSA Global Software Survey in 2013 on software piracy, found out that 43 percent of the software installed on PCs around the world was not properly licensed, the commercial value of the unlicensed installations worldwide was reported to be 62.7 billion. Piracy can happen anywhere including universities. Malaysia as well as other countries in the world is faced with issues of piracy committed by the students in universities. Piracy in universities concern about acts of stealing intellectual property. It can be in the form of software piracy, music piracy, movies piracy and piracy of intellectual materials such as books, articles and journals. This scenario affected the owner of intellectual property as their property is in jeopardy. This study has developed a classification model for detecting software piracy. The model was developed using a swarm intelligence algorithm called the Ant Colony Optimization algorithm. The data for training was collected by a study conducted in Universiti Teknologi MARA (Perlis). Experimental results show that the model detection accuracy rate is better as compared to J48 algorithm.

  5. International and Regional Trends in Maritime Piracy 1989-1993

    DTIC Science & Technology

    1993-12-01

    piracy is not unprecedented in recent history however. In the early 1980s , there was a dramatic increase in the incidence of piracy worldwide. In fact...R. Hyslop , "Contemporary Piracy," in Eric Ellen (ed.), Piracy At Sea (London: ICC Publishing SA, 1989). 7. See the International Maritime Bureau...of the pirate attacks recorded in the Violence At Sea’ database ’I. R. Hyslop , "Contemporary Piracy," 5. ’On November 10, 1991, while underway in the

  6. Modern Piracy: The Impact on Maritime Security

    DTIC Science & Technology

    2008-01-01

    attacked Source: International Chamber of Commerce , Commercial Crime Bureau. http://www.eurocrime.it/sitelPiracy%20and%20Terrorism.pdf Piracy, simply put...agency of the International Chamber of Commerce (ICC), provide regular statistical data and reports of acts ofpiracy and armed robbery against ShipS.14...3: Key Maritime Choke-points / Piracy Hot Spots Source: International Chamber of Commerce , Commercial Crime Bureau. http://www.eurocrime.it/site

  7. Piracy and Its Impact on the Economy

    DTIC Science & Technology

    2010-12-01

    options to supplement lost income, including 4 Catherine Zara Raymond, “Piracy and Armed Robbery in the Malacca Strait: A Problem...Africa: The Piracy Hot Spot and Its Implications for Global Security,” Mediterranean Quarterly, vol. 20 no. 3 (Summer 2009): 100. 41 Catherine Zara ...43 Catherine Zara Raymond, “Piracy and Armed Robbery in the Malacca Strait: A Problem Solved?” Naval War College Review Vol. 62 No. 3 (Summer

  8. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    NASA Astrophysics Data System (ADS)

    Dabova, E. L.

    2013-11-01

    with other subsystems like South East Asia may have different approaches to global governance, international constitutional order, or particular cases such as the measure of infringement of human rights when targeting individuals suspected of terrorist links. Yet international law remains the key part of the Asian and global security regime. The hypothesis of this study is that the "void of governance" regime in territorial and international waters provides lucrative environment for developing terrorism, piracy, environmental degradation, and other criminal activities that pose untraditional threats to the regional security. This "void of governance" regime can be caused by either, or both, de jure or de facto insufficient control over particular marine territories.

  9. Software Piracy in Research: A Moral Analysis.

    PubMed

    Santillanes, Gary; Felder, Ryan Marshall

    2015-08-01

    Researchers in virtually every discipline rely on sophisticated proprietary software for their work. However, some researchers are unable to afford the licenses and instead procure the software illegally. We discuss the prohibition of software piracy by intellectual property laws, and argue that the moral basis for the copyright law offers the possibility of cases where software piracy may be morally justified. The ethics codes that scientific institutions abide by are informed by a rule-consequentialist logic: by preserving personal rights to authored works, people able to do so will be incentivized to create. By showing that the law has this rule-consequentialist grounding, we suggest that scientists who blindly adopt their institutional ethics codes will commit themselves to accepting that software piracy could be morally justified, in some cases. We hope that this conclusion will spark debate over important tensions between ethics codes, copyright law, and the underlying moral basis for these regulations. We conclude by offering practical solutions (other than piracy) for researchers.

  10. Curbing International Piracy of Intellectual Property. Policy Options for a Major Exporting Country.

    ERIC Educational Resources Information Center

    Hoffman, Gary M.; Marcou, George T.

    This report of the International Piracy Project addresses three major topics: (1) The Costs and Complications of Piracy; (2) Rights Enforcement Today; and (3) Policy Options for Curbing Piracy. The first section discusses piracy of copyrights, patents, and other intellectual property, including economic losses and damage to the finances and…

  11. Nowhere to Hide: The Growing Threat to Air Bases

    DTIC Science & Technology

    2013-06-01

    May–June 2013 Air & Space Power Journal | 30 Feature Nowhere to Hide The Growing Threat to Air Bases Col Shannon W. Caudill, USAF Maj Benjamin R...May–June 2013 Air & Space Power Journal | 33 Caudill & Jacobson Nowhere to Hide Feature The Growing Precision of Indirect Fire IDF has become the...personnel.22 More troubling still is the growing threat from within the ranks of American personnel. On 11 May 2009, five American military mem- bers

  12. Maritime Piracy in the Gulf of Guinea, Regional Challenges and Solutions

    DTIC Science & Technology

    2012-11-02

    December 2002. Annual Report. London, United Kingdom. January 2003 39 Catherine Zara Raymond, “Piracy and Armed Robbery in the Malacca Strait: A...40 Catherine Zara Raymond, “Piracy and Armed Robbery in the Malacca Strait: A Problem Solved?” Naval War...who share common challenges in the same 43 Catherine Zara Raymond, “Piracy and Armed Robbery in

  13. Deindividuation and Internet software piracy.

    PubMed

    Hinduja, Sameer

    2008-08-01

    Computer crime has increased exponentially in recent years as hardware, software, and network resources become more affordable and available to individuals from all walks of life. Software piracy is one prevalent type of cybercrime and has detrimentally affected the economic health of the software industry. Moreover, piracy arguably represents a rend in the moral fabric associated with the respect of intellectual property and reduces the financial incentive of product creation and innovation. Deindividuation theory, originating from the field of social psychology, argues that individuals are extricated from responsibility for their actions simply because they no longer have an acute awareness of the identity of self and of others. That is, external and internal constraints that would typically regulate questionable behavior are rendered less effective via certain anonymizing and disinhibiting conditions of the social and environmental context. This exploratory piece seeks to establish the role of deindividuation in liberating individuals to commit software piracy by testing the hypothesis that persons who prefer the anonymity and pseudonymity associated with interaction on the Internet are more likely to pirate software. Through this research, it is hoped that the empirical identification of such a social psychological determinant will help further illuminate the phenomenon.

  14. 76 FR 55332 - Federal Bureau of Investigation Anti-Piracy Warning Seal Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-07

    ... Investigation Anti-Piracy Warning Seal Program AGENCY: Federal Bureau of Investigation (FBI), Justice. ACTION... general authorization for use of the FBI Anti- Piracy Warning Seal (APW Seal). The proposed rule will... period closes. Discussion. The FBI's Anti-Piracy Warning (APW) Seal is a modified image of the FBI's...

  15. Countering Piracy off the Horn of Africa

    DTIC Science & Technology

    2011-01-26

    rate high and local communities focusing on survival. With agriculture limited more or less to self-sustainment, and the waters overfished by...the last two decades. The reason behind this is the failure of the international community to focus on the hub of the region’s piracy: The failed state...decades. The reason behind this is the failure of the international community to focus on the hub of the region‟s piracy: The failed state of Somalia

  16. Maritime security report number 1. January 1996 [piracy ; Colombia ; Brazil

    DOT National Transportation Integrated Search

    1996-01-01

    The first article deals with piracy in Brazil. Because of the high incident rate of maritime piracy in Brazil, the Baltic and International Maritime Council (BIMCO) has change reporting procedures for its ships and port agents in that country. In a r...

  17. Stream piracy in the Black Hills: A geomorphology lab exercise

    USGS Publications Warehouse

    Zaprowski, B.J.; Evenson, E.B.; Epstein, J.B.

    2002-01-01

    The Black Hills of South Dakota exhibits many fine examples of stream piracy that are very suitable for teaching geomorphology lab exercises. This lab goes beyond standard topographic map interpretation by using geologic maps, well logs, gravel provenance and other types of data to teach students about stream piracy. Using a step-by-step method in which the lab exercises ramp up in difficulty, students hone their skills in deductive reasoning and data assimilation. The first exercises deal with the identification of stream piracy at a variety of spatial scales and the lab culminates with an exercise on landscape evolution and drainage rearrangement.

  18. Why the U.S. Navy Should Not Be Fighting Piracy Off Somalia

    DTIC Science & Technology

    2009-05-04

    International Chamber of Commerce (ICC) established in 1981 to serve as the world’s focal point in matters related to maritime crime, there were 293...International Chamber of Commerce , “IMB Reports a Cluster of Pirate Attacks Off the East Coast of Africa.” 3 U.S. National Security Council, Countering Piracy...Counter-Piracy and Combined Task Force 151.” 17 International Chamber of Commerce – International Maritime Bureau, Piracy and Armed Robbery Against

  19. Movie Piracy Networks at Alaba International Market, Lagos, Nigeria.

    PubMed

    Tade, Oludayo; Mmahi, Okoro Paul

    2018-01-01

    This study examined the veiled chain of film piracy, a major crime in the Nigeria entertainment industry. Studies on film piracy in Nigeria have focused on its economic implications, both on the copyright owners and on the Nigerian economy. The organization of the activities of the film pirates has, however, been neglected. Narratives were extracted through in-depth interviews with pirates, "marketers," and "producers." Data indicated that pirates were insiders in the film marketing industry and included importers of foreign movies, registered and nonregistered retailers of Nigerian films, as well as marketers appointed by copyright owners to distribute their films. With the connivance of sales girls working with the copyright owners and dubbing companies, original copies of films (white face) are "procured." Pirates distributed pirated copies, also secretly known as "green face," without issuing receipts or putting the logo of the company on it. For security reasons, pirated films are sold only to buyers introduced by a member in the piracy network. Efforts aimed at fighting piracy must take into account this veiled network to effectively combat intellectual theft via aggressive ban on the public sale of such products.

  20. A novel anti-piracy optical disk with photochromic diarylethene

    NASA Astrophysics Data System (ADS)

    Liu, Guodong; Cao, Guoqiang; Huang, Zhen; Wang, Shenqian; Zou, Daowen

    2005-09-01

    Diarylethene is one of photochromic material with many advantages and one of the most promising recording materials for huge optical data storage. Diarylethene has two forms, which can be converted to each other by laser beams of different wavelength. The material has been researched for rewritable optical disks. Volatile data storage is one of its properties, which was always considered as an obstacle to utility. Many researches have been done for combating the obstacle for a long time. In fact, volatile data storage is very useful for anti-piracy optical data storage. Piracy is a social and economical problem. One technology of anti-piracy optical data storage is to limit readout of the data recorded in the material by encryption software. By the development of computer technologies, this kind of software is more and more easily cracked. Using photochromic diarylethene as the optical recording material, the signals of the data recorded in the material are degraded when it is read, and readout of the data is limited. Because the method uses hardware to realize anti-piracy, it is impossible cracked. In this paper, we will introduce this usage of the material. Some experiments are presented for proving its feasibility.

  1. College Students; Justification for Digital Piracy: A Mixed Methods Study

    ERIC Educational Resources Information Center

    Yu, Szde

    2012-01-01

    A mixed methods project was devoted to understanding college students' justification for digital piracy. The project consisted of two studies, a qualitative one and a quantitative one. Qualitative interviews were conducted to identify main themes in students' justification for digital piracy, and then the findings were tested in a quantitative…

  2. Can U.S.-Led Efforts Reduce Piracy in the Malacca and Singapore Straits?

    DTIC Science & Technology

    2004-02-10

    International Chamber of Commerce and sponsor for the Piracy Reporting Centre (IMB-PRC) in Kuala Lumpur, defines piracy as “the act of boarding any...Report - 2001, IMO Circular MSC.4/Circ.16 (London: 31 March 2002), 17-18. 25 International Chamber of Commerce , “Excerpt from the ICC Piracy...Report, 2001… Trends,” 2002, <http://www.iccwbo.org/home/news_archives /2002/excerpt_ trends.asp>, [01 December 2004]. 26 International Chamber of Commerce , “ICC

  3. Piracy in the Horn of Africa: The Role of Somalia’s Fishermen

    DTIC Science & Technology

    2010-12-01

    37 Catherine Zara Raymond, “Piracy and Armed Robbery in the Malacca Strait: a Problem Solved?” Naval War College review, summer 2009, 62:3, 37. 38...302 Catherine Zara Raymond, “Piracy in Southeast Asia: new trends, Issues and Responses,” Institute of Defense and strategic Studies Singapore...search.aspx?query=pirates%20threaten%20ship%20traffic %20in%20gulf%20of%20aden (accessed October 4, 2010). Raymond, Catherine Zara . “Piracy and

  4. Growth of desferrioxamine-deficient Streptomyces mutants through xenosiderophore piracy of airborne fungal contaminations.

    PubMed

    Arias, Anthony Argüelles; Lambert, Stéphany; Martinet, Loïc; Adam, Delphine; Tenconi, Elodie; Hayette, Marie-Pierre; Ongena, Marc; Rigali, Sébastien

    2015-07-01

    Due to the necessity of iron for housekeeping functions, nutrition, morphogenesis and secondary metabolite production, siderophore piracy could be a key strategy in soil and substrate colonization by microorganisms. Here we report that mutants of bacterium Streptomyces coelicolor unable to produce desferrioxamine siderophores could recover growth when the plates were contaminated by indoor air spores of a Penicillium species and Engyodontium album. UPLC-ESI-MS analysis revealed that the HPLC fractions with the extracellular 'resuscitation' factors of the Penicillium isolate were only those that contained siderophores, i.e. Fe-dimerum acid, ferrichrome, fusarinine C and coprogen. The restored growth of the Streptomyces mutants devoid of desferrioxamine is most likely mediated through xenosiderophore uptake as the cultivability depends on the gene encoding the ABC-transporter-associated DesE siderophore-binding protein. That a filamentous fungus allows the growth of desferrioxamine non-producing Streptomyces in cocultures confirms that xenosiderophore piracy plays a vital role in nutritional interactions between these taxonomically unrelated filamentous microorganisms. © FEMS 2015. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. Capacity Building as an Answer to Piracy in the Horn of Africa

    DTIC Science & Technology

    2010-12-01

    reliable professional choice .17 Also, many Somali pirates consider themselves protectors of their waters against foreign trawlers that illegally fish.18...the area. Many young Somali males view piracy as an optional professional choice .23 Finally, two important contributors to the rise in piracy in the

  6. On the dynamics of stream piracy

    NASA Astrophysics Data System (ADS)

    Goren, L.; Willett, S. D.

    2012-04-01

    Drainage network reorganization by stream piracy is invoked repeatedly to explain the morphology of unique drainage patterns and as a possible mechanism inducing abrupt variations of sediment accumulation rates. However, direct evidence of stream piracy is usually rare, and is highly interpretation dependent. As a first step in assessing how probable capture events are and establishing the conditions that favor stream piracy versus the those that favor stable landscapes, we formulate analytically the physics of divide migration and capture events and study this formulation from a dynamical system point of view. The formulation is based on a one-dimensional topographic cross section between two channels that share a water divide. Two hillslope profiles diverge from the divide and drain into two fluvial bedrock tributaries, whose erosion rate is controlled by a stream power law. The rate of erosion at the bounding channels is thus a function of the upstream drainage area and local slope. A tectonically induced downward perturbation of the elevation of one of the bounding channels lowers the channel slope but at the same time increases the drainage area due to outward migration of the water divide. The changes in slope and area have opposing effect on the erosion rate at the bounding channels, so that the perturbation may either grow or be damped. We define the geomorphic and tectonic parameters that control the behavior of the system and find the regimes that lead to stable landscapes and to capture events.

  7. Intention to Commit Online Music Piracy and Its Antecedents: An Empirical Investigation

    ERIC Educational Resources Information Center

    Morton, Neil A.; Koufteros, Xenophon

    2008-01-01

    Online piracy of copyrighted digital music has become rampant as Internet bandwidth and digital compression technologies have advanced. The music industry has suffered significant financial losses and has responded with lawsuits, although online music piracy remains prevalent. This article developed a research model to study the determinants of…

  8. Countering 21st Century Piracy in the Horn of Africa

    DTIC Science & Technology

    2010-02-01

    2nd ed., s.v. “piracy; pirate.” 2 International Chamber of Commerce Home Page, http://www.icc-ccs.org/ (International Maritime Bureau, accessed...January 2010. 7 International Chamber of Commerce Home Page, “Piracy Figures for 2009.” 8 The United Nations Home Page, Documents – Security Council...Resolution 1846 (accessed January 10, 2010). 9 International Chamber of Commerce Home Page, “Advice to Masters.” 10 United Nations Convention on

  9. Spatial, Temporal and Spatio-Temporal Patterns of Maritime Piracy

    PubMed Central

    Marchione, Elio

    2013-01-01

    Objectives: To examine patterns in the timing and location of incidents of maritime piracy to see whether, like many urban crimes, attacks cluster in space and time. Methods: Data for all incidents of maritime piracy worldwide recorded by the National Geospatial Intelligence Agency are analyzed using time-series models and methods originally developed to detect disease contagion. Results: At the macro level, analyses suggest that incidents of pirate attacks are concentrated in five subregions of the earth’s oceans and that the time series for these different subregions differ. At the micro level, analyses suggest that for the last 16 years (or more), pirate attacks appear to cluster in space and time suggesting that patterns are not static but are also not random. Conclusions: Much like other types of crime, pirate attacks cluster in space, and following an attack at one location the risk of others at the same location or nearby is temporarily elevated. The identification of such regularities has implications for the understanding of maritime piracy and for predicting the future locations of attacks. PMID:25076796

  10. Spatial, Temporal and Spatio-Temporal Patterns of Maritime Piracy.

    PubMed

    Marchione, Elio; Johnson, Shane D

    2013-11-01

    To examine patterns in the timing and location of incidents of maritime piracy to see whether, like many urban crimes, attacks cluster in space and time. Data for all incidents of maritime piracy worldwide recorded by the National Geospatial Intelligence Agency are analyzed using time-series models and methods originally developed to detect disease contagion. At the macro level, analyses suggest that incidents of pirate attacks are concentrated in five subregions of the earth's oceans and that the time series for these different subregions differ. At the micro level, analyses suggest that for the last 16 years (or more), pirate attacks appear to cluster in space and time suggesting that patterns are not static but are also not random. Much like other types of crime, pirate attacks cluster in space, and following an attack at one location the risk of others at the same location or nearby is temporarily elevated. The identification of such regularities has implications for the understanding of maritime piracy and for predicting the future locations of attacks.

  11. Counter Piracy: A More Comprehensive Approach

    DTIC Science & Technology

    2012-04-25

    almost non-existent. The lack of governance allowed local and foreign fishing vessels to take advantage and overfish Somali waters. The local Any...piracy. 18 populace was powerless to stop them from overfishing those grounds that once provided subsistence.67 This situation enabled the

  12. Congress Seeks Tales of Piracy

    ERIC Educational Resources Information Center

    Read, Brock

    2007-01-01

    This month, leaders of two committees in the U.S. House of Representatives sent letters warning of an epidemic of online music and movie piracy to 19 colleges, singling out those schools that, in the eyes of entertainment-industry officials, have been unable to stop students from illegally downloading music and movies. Enclosed with each message…

  13. Optimizing the Naval Force for the Horn of Africa Anti-Piracy Mission

    DTIC Science & Technology

    2009-05-04

    new trend emerged for an increased number of 1 International Chamber of Commerce International...Countering Piracy Off the Horn of Africa: Partnership & Action Plan. Dec 2008, 3. 3 International Chamber of Commerce International Maritime Bureau...Increase off Somali Coast” Release #053- 09. 30 Mar 2009. 26 International Chamber of Commerce Commercial Crime Services. “Live Piracy Report

  14. Buried treasure: evolutionary perspectives on microbial iron piracy

    PubMed Central

    Barber, Matthew F.; Elde, Nels C.

    2015-01-01

    Host-pathogen interactions provide valuable systems for the study of evolutionary genetics and natural selection. The sequestration of essential iron has emerged as a critical innate defense system termed nutritional immunity, leading pathogens to evolve mechanisms of `iron piracy' to scavenge this metal from host proteins. This battle for iron carries numerous consequences not only for host-pathogen evolution, but also microbial community interactions. Here we highlight recent and potential future areas of investigation on the evolutionary implications of microbial iron piracy in relation to molecular arms races, host range, competition, and virulence. Applying evolutionary genetic approaches to the study of microbial iron acquisition could also provide new inroads for understanding and combating infectious disease. PMID:26431675

  15. Piracy off the Horn of Africa

    DTIC Science & Technology

    2009-04-21

    carried out with the intention of damaging or sinking the ship and injuring or killing its crew in retaliation for the deaths of three Somali pirates...of Conduct to repress acts of piracy and armed robbery against ships,” 45 Djibouti, Ethiopia, Kenya, Madagascar, Maldives , Seychelles, Somalia, the

  16. Piracy off the Horn of Africa

    DTIC Science & Technology

    2009-04-24

    damaging or sinking the ship and injuring or killing its crew in retaliation for the deaths of three Somali pirates during U.S. military efforts to...a Code of Conduct to repress acts of piracy and armed robbery against ships,” 45 Djibouti, Ethiopia, Kenya, Madagascar, Maldives , Seychelles

  17. Piracy in cyber space: consumer complicity, pirates and enterprise enforcement

    NASA Astrophysics Data System (ADS)

    Chaudhry, Peggy E.; Chaudhry, Sohail S.; Stumpf, Stephen A.; Sudler, Hasshi

    2011-05-01

    This article presents an overview of the growth of internet piracy in the global marketplace. The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer that downloading music, software, movies and the like, without compensation, is unethical. This awareness is critical for decreasing the demand for counterfeit goods in the virtual marketplace, where a consumer can exhibit a rogue behaviour with a limited fear of prosecution. We address the pyramid of internet piracy, which encompasses sophisticated suppliers/facilitators, such as the Warez group. Recent sting operations, such as Operation Buccaneer, are also depicted to highlight successful tactical manoeuvres of enforcement agencies. An overview of the Digital Millennium Copyright Act and the No Electronic Theft Act is included to debate the controversy surrounding this legislation. A discussion of enterprise enforcement mechanisms and novel anti-piracy technology for cyberspace is provided to reveal some of the tools used to fight the pirates, such as innovations in digital watermarking and NEC's recently announced video content identification technology. Enterprise information systems and its interdependence on the internet are also demanding new technologies that enable internet investigators to rapidly search, verify and potentially remove pirated content using web services. The quality of service of web services designed to efficiently detect pirated content is a growing consideration for new anti-piracy technology.

  18. Modern Piracy and Regional Security Cooperation in the Maritime Domain: The Middle East and Southeast Asia

    DTIC Science & Technology

    2010-03-01

    Information Sharing Centre (ISC),” 433. 33 Catherine Zara Raymond, “Piracy and Armed Robbery in the Malacca Straits,” Naval War College Review 62:3...2009); Catherine Zara Raymond, “Piracy and Armed Robbery in the Malacca Straits,” Naval War College Review 62:3 (Summer 2009); Carolin Liss, “The...Charlottesville, Virginia: University Press of Virginia, 1988). Raymond, Catherine Zara . “Piracy and Armed Robbery in the Malacca Straits.” Naval War College

  19. Piracy in the Horn of Africa: A Comparative Study with Southeast Asia

    DTIC Science & Technology

    2009-12-01

    Federal 2 Graham Gerard Ong-Webb, Piracy in Maritime Asia: Current Trends, ed. Peter Lehr (Routledge: New York, 2007), 55. 3 Catherine Zara ... Zara Raymond (Singapore: Institute of Defense and Strategic Studies, 2005), 61. 46 ICC International Maritime Bureau, Piracy and Armed Robbery against...Southeast Asia.” In The Best of Times, The Worst of Times: Maritime Security in the Asia-Pacific, edited by Joshua Ho and Catherine Zara Raymond, 61

  20. Blackbeard: Politician, Pirate or Jihadi - The Relationship Between State Failure and Piracy in Somalia

    DTIC Science & Technology

    2011-12-01

    political stability and piracy. To prove these hypotheses this paper examines two related topics. Firstly, it reviews the conditions that led to the...networks prefer a weak state to a failed state and that there is a relationship between political stability and piracy. The first section investigated the

  1. Piracy off the Horn of Africa: What is the Most Effective Method of Repression

    DTIC Science & Technology

    2009-05-04

    off the Horn of Africa is growing in frequency, range, aggression, and severity at an alarming rate.” 15 According to the International Chamber of Commerce ‟s...of Africa: Partnership & Action Plan (December 1, 2008), 6. 2 International Chamber of Commerce International Maritime Bureau, Piracy and Armed...Robbery Against Ships. (London, United Kingdom: International Chamber of Commerce International Maritime Bureau, October 2008), 25. 3 Piracy and

  2. Design, Development, and Innovation of an Interactive Multimedia Training Simulator for Responding to Air Transportation Bomb Threats

    NASA Technical Reports Server (NTRS)

    Chung, Christopher A.; Marwaha, Shweta

    2005-01-01

    This paper describes an interactive multimedia simulator for air transportation bomb threat training. The objective of this project is to improve the air transportation sector s capability to respond to bomb threats received by commercial airports and aircraft. The simulator provides realistic training on receiving and responding to a variety of bomb threats that might not otherwise be possible due to time, cost, or operational constraints. Validation analysis indicates that the use of the simulator resulted in statistically significant increases in individual ability to respond to these types of bomb threats.

  3. Piracy off the Horn of Africa

    DTIC Science & Technology

    2011-04-27

    issued a warning strongly advising all U.S. registered yachts and sailing vessels against passage in the Gulf of Aden, Arabian Sea, Somali Basin ...between Malaysia, Singapore and Indonesia , which are credited with having drastically reduced the instance of piracy in Southeast Asia since 2005...in November 2008. Media reports suggested Somali pirates received a $4 million ransom in December 2009 to release the Chinese bulk coal carrier MV

  4. Film Piracy, Organized Crime, and Terrorism

    DTIC Science & Technology

    2009-01-01

    appointed Malaysian Inspector General of Police renewed efforts to fight organized crime by dedicating more resources to Operation Copperhead, originally...opera- tions in Kuala Lumpur.104 The Malaysian government singled out the dragonhead of the Ang Bin Hoey triad, Tee Yam (aka Khoo Tee Yam), as its...interviews with Serious Crime Division of Malaysian Police, August 1, 2005. Getting Down to Cases: Organized Crime and Film Piracy 71 in

  5. Asset Allocation to Cover a Region of Piracy

    DTIC Science & Technology

    2011-09-01

    1087-1092. 8. Kirkpatrick, S., Optimization by Simulated Annealing. Science, 1983. 220(4598): p. 671-680. 9. Daskin , M. S., A bibliography for some...... a uniform piracy risk and where some areas are more vulnerable than others. Simulated annealing was used to allocate the patrolling naval assets

  6. Student Digital Piracy in the Florida State University System: An Exploratory Study on Its Infrastructural Effects

    ERIC Educational Resources Information Center

    Reiss, Jeffrey

    2010-01-01

    Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institution's resources combined with the typical college student's lack of funds makes it more lucrative. Students…

  7. Building the Right Framework for Effective Multinational Anti-Piracy Operations in the Gulf of Aden

    DTIC Science & Technology

    2009-05-04

    Chamber of Commerce – Commercial Crime Services and 6 The International Maritime Bureau Maritime Organization of West and Central Africa 7... Chamber of Commerce - Commercial Crime Services, April 21, 2009, http://www.icc- ccs.org/index.php?option=com_content&view=article&id=350:piracy... Chamber of Commerce – Commercial Crime Services (ICC-CCS) and the International Maritime Bureau (IMB) Similar in operation to ReCAAP, the IMB’s Piracy

  8. Analysis of the Strategy to Combat Maritime Piracy

    DTIC Science & Technology

    2009-12-11

    26  Contemporary Maritime Piracy: Causative Factors...NSC National Security Council PUC Persons Under Control viii SLOC Sea lines of communication SSA Ships Security Assessment SSP Ships Security Plan...UNCLOS United Nations Convention on the Law of the Sea USD United States Dollar U.S. United States ix ILLUSTRATIONS Page Figure 1.  Factors

  9. What Do Computer Science Students Think about Software Piracy?

    ERIC Educational Resources Information Center

    Konstantakis, Nikos I.; Palaigeorgiou, George E.; Siozos, Panos D.; Tsoukalas, Ioannis A.

    2010-01-01

    Today, software piracy is an issue of global importance. Computer science students are the future information and communication technologies professionals and it is important to study the way they approach this issue. In this article, we attempt to study attitudes, behaviours and the corresponding reasoning of computer science students in Greece…

  10. Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach

    NASA Technical Reports Server (NTRS)

    Roy, Sandip; Sridhar, Banavar

    2016-01-01

    Air transportation networks are being disrupted with increasing frequency by failures in their cyber- (computing, communication, control) systems. Whether these cyber- failures arise due to deliberate attacks or incidental errors, they can have far-reaching impact on the performance of the air traffic control and management systems. For instance, a computer failure in the Washington DC Air Route Traffic Control Center (ZDC) on August 15, 2015, caused nearly complete closure of the Centers airspace for several hours. This closure had a propagative impact across the United States National Airspace System, causing changed congestion patterns and requiring placement of a suite of traffic management initiatives to address the capacity reduction and congestion. A snapshot of traffic on that day clearly shows the closure of the ZDC airspace and the resulting congestion at its boundary, which required augmented traffic management at multiple locations. Cyber- events also have important ramifications for private stakeholders, particularly the airlines. During the last few months, computer-system issues have caused several airlines fleets to be grounded for significant periods of time: these include United Airlines (twice), LOT Polish Airlines, and American Airlines. Delays and regional stoppages due to cyber- events are even more common, and may have myriad causes (e.g., failure of the Department of Homeland Security systems needed for security check of passengers, see [3]). The growing frequency of cyber- disruptions in the air transportation system reflects a much broader trend in the modern society: cyber- failures and threats are becoming increasingly pervasive, varied, and impactful. In consequence, an intense effort is underway to develop secure and resilient cyber- systems that can protect against, detect, and remove threats, see e.g. and its many citations. The outcomes of this wide effort on cyber- security are applicable to the air transportation infrastructure

  11. Multinational Counter-Piracy Operations: How Strategically Significant is the Gulf of Guinea to the Major Maritime Powers

    DTIC Science & Technology

    2015-12-01

    DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words ) Piracy in the Gulf of Guinea regularly exceeded that of the Gulf of Aden between 2000 and 2007. But...flow of goods is the flow of services, which in today’s computer-centric world travels electronically in digital bits and bytes through fiber optic...piracy prosecutions, among others. Second order costs include fisheries, food security and food price inflation, tourism , and environmental pollution

  12. River piracy and drainage basin reorganization led by climate-driven glacier retreat

    NASA Astrophysics Data System (ADS)

    Shugar, Daniel H.; Clague, John J.; Best, James L.; Schoof, Christian; Willis, Michael J.; Copland, Luke; Roe, Gerard H.

    2017-04-01

    River piracy--the diversion of the headwaters of one stream into another one--can dramatically change the routing of water and sediment, with a profound effect on landscape evolution. Stream piracy has been investigated in glacial environments, but so far it has mainly been studied over Quaternary or longer timescales. Here we document how retreat of Kaskawulsh Glacier--one of Canada's largest glaciers--abruptly and radically altered the regional drainage pattern in spring 2016. We use a combination of hydrological measurements and drone-generated digital elevation models to show that in late May 2016, meltwater from the glacier was re-routed from discharge in a northward direction into the Bering Sea, to southward into the Pacific Ocean. Based on satellite image analysis and a signal-to-noise ratio as a metric of glacier retreat, we conclude that this instance of river piracy was due to post-industrial climate change. Rapid regional drainage reorganizations of this type can have profound downstream impacts on ecosystems, sediment and carbon budgets, and downstream communities that rely on a stable and sustained discharge. We suggest that the planforms of Slims and Kaskawulsh rivers will adjust in response to altered flows, and the future Kaskawulsh watershed will extend into the now-abandoned headwaters of Slims River and eventually capture the Kluane Lake drainage.

  13. Dynamic Asset Allocation Approaches for Counter-Piracy Operations

    DTIC Science & Technology

    2012-07-01

    problem, has attracted much interest due to an increase in the number of pirate activities in recent years. Marsh [26] provided a game theoretic...model, where one interdiction asset and one surveillance asset are utilized for a counter-piracy mission. Due to the two-person zero sum game structure...that policy using online learning and simulation. The attractive aspects of rollout algorithms are its simplicity, broad applicability, and

  14. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  15. Transnational Crime and Security Threats in Indonesia

    DTIC Science & Technology

    2010-03-01

    archipelagos, while the region’s climate and cultures have also made it highly attractive to leisure activities. Piracy has been a traditional way of...coordinated patrols by Indonesia, Malaysia , and Singapore, along with increased security on vessels have sparked a dramatic downturn in piracy according to...just local but also international. Some sources believe that the network route runs from Cambodia to Southern Philippines to Malaysia then enters

  16. Is China a Threat to the U.S. Economy?

    DTIC Science & Technology

    2007-01-23

    2006 to discuss issues of concern to the U.S. steel industry. 71 Reuters, “China Piracy Costs Film Industry $2.7 Billion in 2005,” June 19, 2006. 72...Motion Picture Association of America estimated that China’s domestic film industry lost about $1.5 billion in revenue to piracy in 2005.71 Chinese

  17. Is China a Threat to the U.S. Economy?

    DTIC Science & Technology

    2006-08-10

    U.S. steel industry. 62 Reuters, “China Piracy Costs Film Industry $2.7 Billion in 2005,” June 19, 2006. 63 For example, in 2004, 13 infants in China...estimated that China’s domestic film industry lost about $1.5 billion in revenue to piracy in 2005.62 Chinese press reports indicate a number of health and

  18. The Domestic IED Threat

    DTIC Science & Technology

    2008-01-01

    threat that could use IEDs in the homeland is single-issue organizations. This threat includes such groups as the Okla- homa City bombers and other...threat during joint Army–Air Force exercise U .S . A ir Fo rc e (S te ph en O te ro ) ndupress .ndu.edu issue 48, 1st quarter 2008 / JFQ        69

  19. Continuity and Contingency in USAF Posture Planning

    DTIC Science & Technology

    2016-01-01

    with these adversaries. It also galvanized U.S. legislators , who dropped their normal objections to building bases overseas and resourced the efforts...Organized crime threats to El Savador gov Terrorism/piracy/crime Central America/Carb 81 Terrorists bomb Colombian parliament Terrorism/piracy/crime...Epidemic 4 2025-2034 Terrorists bomb Colombian parliament Terrorism/piracy/crime 81 2025-2034 Kosovo Civil conflict 18 2025-2034 Israel-Egypt in Sinai

  20. The Long War Against Piracy: Historical Trends (Occasional Paper, Number 32)

    DTIC Science & Technology

    2010-05-01

    develop bases closer to their targets.8 Tortuga , located off the northwest coast of Hispaniola, was the first great pirate sanctuary. It maintained...the boucaniers fled to Tortuga , a small island off the northwest coast of Hispaniola, and turned to piracy. The French boucaniers, whose name was...buccaneers commanded large sailing vessels and operated with impunity throughout the Caribbean. Although the Spanish raided Tortuga from time to time

  1. Imperial boyhood: piracy and the play ethic.

    PubMed

    Deane, Bradley

    2011-01-01

    Representations of perpetual boyhood came to fascinate the late Victorians, partly because such images could naturalize a new spirit of imperial aggression and new policies of preserving power. This article traces the emergence of this fantasy through a series of stories about the relationship of the boy and the pirate, figures whose opposition in mid-Victorian literature was used to articulate the moral legitimacy of colonialism, but who became doubles rather than antitheses in later novels, such as R.L. Stevenson's "Treasure Island" and Joseph Conrad's "Lord Jim." Masculine worth needed no longer to be measured by reference to transcendent, universal laws, but by a morally flexible ethic of competitive play, one that bound together boyishness and piracy in a satisfying game of international adventure.

  2. Effect of slope failures on river-network pattern: A river piracy case study from the flysch belt of the Outer Western Carpathians

    NASA Astrophysics Data System (ADS)

    Baroň, Ivo; Bíl, Michal; Bábek, Ondřej; Smolková, Veronika; Pánek, Tomáš; Macur, Lukáš

    2014-06-01

    Landslides are important geomorphic agents in various mountainous settings. We document here a case of river piracy from the upper part of the Malá Brodská Valley in the Vsetínské Mts., Czech Republic (Rača Unit of the flysch Magura Group of Nappes, flysch belt of the Outer Western Carpathians) controlled by mass movement processes. Based on the field geological, geomorphological and geophysical data, we found out that the landslide accumulations pushed the more active river of out of two subparallel river channels with different erosion activity westwards and forced intensive lateral erosion towards the recently abandoned valley. Apart from the landslide processes, the presence of the N-striking fault, accentuated by higher flow rates of the eastern channel as a result of its larger catchment area, were the most critical factors of the river piracy. As a consequence of the river piracy, intensive retrograde erosion in the elbow of capture and also within the upper portion of the western catchment occurred. Deposits of two landslide dams document recent minimum erosion rates to be 18.8 mm.ky- 1 in the western (captured) catchment, and 3.6 mm.ky- 1 in the eastern catchment respectively. The maximum age of the river piracy is estimated to be of the late Glacial and/or the early Holocene.

  3. Organizing Chaos: Restructuring Counter-Piracy Forces Off the Coast of Somalia

    DTIC Science & Technology

    2011-05-04

    the Maersk Alabama cargo ship. Prior to these attacks, most Americans were likely to associate a pirate with Hollywood’s mascara-wearing Johnny Depp...However, the approach to countering Somali pirates is disorganized. The international community attempts to achieve unity of effort by relying heavily...conducting counter-piracy as ―a good model not only for the Gulf of Aden and the Somali bases, but also for future such endeavors.‖ 12 Mr. Countryman

  4. The Effect of Piracy on Somalia as a Failed State

    DTIC Science & Technology

    2011-02-01

    economic stability and security for Somalia needed to eradicate piracy. If the U.S. were involved in another operation in Somalia to eradicate pirate bases, the international community must provide security and economic stability via a land-based approach. Problem: If the U.S. were involved in another operation in Somalia to eradicate pirate bases, Somalia’s geography, transportation, and political conditions present challenges. The country suffered from drought in the 1990’s, which made peacekeeping forces depend ’on organic supplies.

  5. Piracy and Armed Robbery in the Malacca Strait: A Problem Solved

    DTIC Science & Technology

    2009-01-01

    PIRACY AND ARMED ROBBERY IN THE MALACCA STRAIT A Problem Solved? Catherine Zara Raymond The Malacca Strait is a narrow waterway that extends nearly...waterway is extremely small. With statistics such as these, one might wonder why we are still seeing the publication of articles such Catherine Zara Raymond...Shrivenham, United Kingdom. She is also a PhD student at King’s College London. Previ- ously, Zara worked as an analyst for the security consul- tancy

  6. USAFRICOM’s Role in Counter-Piracy Operations Within the Horn of Africa

    DTIC Science & Technology

    2009-05-04

    for Nature ( WWF ) estimated that IUU fishing threatens essentially every fishery and “accounts for up to 30 percent of total catches in some important...fisheries.” 25 According to the WWF website, IUU fishing is an “organized criminal activity” – similar to maritime piracy. IUU fishing activities...preventing the foreign ships from illegally fishing within Somali territorial waters. 25 WWF -World

  7. Somali Piracy: An Age-Old Solution to a Modern Day Problem

    DTIC Science & Technology

    2010-05-19

    the British-flagged Asian Glory was seized off Somalia and the twenty-thousand ton Singaporean-flagged chemical tanker M /V Pramoni was seized in the...rival clans . h b’ bl I’ 129agaInst one anot er may e a VIa e so utIon. Another option is to leverage some of the influential Somali "entrepreneurs...ofInternational Affairs, 2005: 236­ 239. Raymond, Catherine Zara . "Piracy in Southeast Asia: New Trends, Issues, and Responses." Harvard Asia Quarterly

  8. Old Glory and the Jolly Roger: The Cultural Constraints and Strategic Imperatives of Modern Piracy

    DTIC Science & Technology

    2009-06-01

    41. Watkins , Eric. "Pirates Seize Another Tanker Off Yemen." Oil and Gas Journal (9 January 2009), http://www.ogj.com/display_article/352052/7...Piracy in the Graeco-Roman World. Cambridge: Cambridge University Press, 2002. Dobbins, James, Seth G. Jones, Keith Crane, and Beth Cole DeGrasse. The

  9. Somali Piracy and Anti-Shipping Activity Messages: Lessons for a Successful Counterpiracy Strategy

    DTIC Science & Technology

    2014-06-01

    solving the differences found in each organization’s reporting. This suggestion seems valid and demonstrates an unbiased approach. 19 The studies...agrees the IMB data sets are not free from debate and criticism, yet claims the reports provide the only consistent and reliable set of figures to...different approach to using piracy incident reports. Hastings (2009) explores the political and economic landscapes of failed and weak states to determine

  10. 75 FR 19869 - Blocking Property of Certain Persons Contributing to the Conflict in Somalia

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-15

    ... in Somalia, and acts of piracy and armed robbery at sea off the coast of Somalia, which have... determine that, among other threats to the peace, security, or stability of Somalia, acts of piracy or armed... order, and to take necessary action to give effect to that determination. Sec. 8. This order is not...

  11. A five states survivability model for missions with ground-to-air threats

    NASA Astrophysics Data System (ADS)

    Erlandsson, Tina; Niklasson, Lars

    2013-05-01

    Fighter pilots are exposed to the risk of getting hit by enemy fire when flying missions with ground-to-air threats. A tactical support system including a survivability model could aid the pilot to assess and handle this risk. The survivability model presented here is a Markov model with five states; Undetected, Detected, Tracked, Engaged and Hit. The output from the model is the probabilities that the aircraft is in these states during the mission. The enemy's threat systems are represented with sensor and weapon areas and the transitions between the states depend on whether or not the aircraft is within any of these areas. Contrary to previous work, the model can capture the behaviors that the enemy's sensor systems communicate and that the risk of getting hit depends on the enemy's knowledge regarding the aircraft's kinematics. The paper includes a discussion regarding the interpretation of the states and the factors that influence the transitions between the states. Further developments are also identified for using the model to aid fighter pilots and operators of unmanned aerial vehicles with planning and evaluating missions as well as analyzing the situation during flight.

  12. Maritime Terrorism and the Small Boat Threat to the United States: A Proposed Response

    DTIC Science & Technology

    2009-03-01

    vessel chokepoints,43 and in 2004, the Abu Sayyaf terror group in the Philippines placed a bomb on a passenger ferry that ultimately resulted in...AWW program,61 which encourages boaters 58 Christopher McDaniel & Matthew Tardy , “Role-Based...Indonesia, Singapore and the Philippines , has become a hotbed of maritime piracy and terrorism. It is the region most prone to acts of piracy, accounting

  13. Evaluation of a landscape evolution model to simulate stream piracies: Insights from multivariable numerical tests using the example of the Meuse basin, France

    NASA Astrophysics Data System (ADS)

    Benaïchouche, Abed; Stab, Olivier; Tessier, Bruno; Cojan, Isabelle

    2016-01-01

    In landscapes dominated by fluvial erosion, the landscape morphology is closely related to the hydrographic network system. In this paper, we investigate the hydrographic network reorganization caused by a headward piracy mechanism between two drainage basins in France, the Meuse and the Moselle. Several piracies occurred in the Meuse basin during the past one million years, and the basin's current characteristics are favorable to new piracies by the Moselle river network. This study evaluates the consequences over the next several million years of a relative lowering of the Moselle River (and thus of its basin) with respect to the Meuse River. The problem is addressed with a numerical modeling approach (landscape evolution model, hereafter LEM) that requires empirical determinations of parameters and threshold values. Classically, fitting of the parameters is based on analysis of the relationship between the slope and the drainage area and is conducted under the hypothesis of equilibrium. Application of this conventional approach to the capture issue yields incomplete results that have been consolidated by a parametric sensitivity analysis. The LEM equations give a six-dimensional parameter space that was explored with over 15,000 simulations using the landscape evolution model GOLEM. The results demonstrate that stream piracies occur in only four locations in the studied reach near the city of Toul. The locations are mainly controlled by the local topography and are model-independent. Nevertheless, the chronology of the captures depends on two parameters: the river concavity (given by the fluvial advection equation) and the hillslope erosion factor. Thus, the simulations lead to three different scenarios that are explained by a phenomenon of exclusion or a string of events.

  14. Trading Nets for Guns: The Impact of Illegal Fishing on Piracy in Somalia

    DTIC Science & Technology

    2010-09-01

    Reconsidering the Letter of Marque,” Public Contract Law Journal 39, no. 3 (Spring 2010): 412–464; Katie Stuhldreher, “To Turn the Tide on Piracy in...18 Ibid; Theodore Richard, “Reconsidering the Letter of Marque,” Public Contract Law Journal 39, no. 3 (Spring 2010): 412–464; Martin Murphy...the Letter of Marque,” Public Contract Law Journal 39, no. 3 (Spring 2010): 412–464. 38 Richey, Warren. “Where will captured Somali pirate get

  15. Cross-National Attitudes and Perceptions Concerning Software Piracy: A Comparative Study of Students from the United States and China

    ERIC Educational Resources Information Center

    Rawlinson, David R.; Lupton, Robert A.

    2007-01-01

    Students' attitudes and perceptions regarding the use of unlicensed software are important to educators and businesses. Students have a proven propensity to pirate software and other intellectual property. By understanding how attitudes and perceptions toward software piracy differ among university students in a cross-national context, educators…

  16. 41 CFR 128-1.5009 - Authorization for use of the Federal Bureau of Investigation anti-piracy warning seal.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... of these laws and the authority of the FBI to enforce them. (b) The APW Seal is a modified image of the Official FBI Seal with the words “FBI ANTI-PIRACY WARNING” displayed horizontally across its... text or images appear on the same screen or page. (i) “The unauthorized reproduction or distribution of...

  17. 41 CFR 128-1.5009 - Authorization for use of the Federal Bureau of Investigation anti-piracy warning seal.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... of these laws and the authority of the FBI to enforce them. (b) The APW Seal is a modified image of the Official FBI Seal with the words “FBI ANTI-PIRACY WARNING” displayed horizontally across its... text or images appear on the same screen or page. (i) “The unauthorized reproduction or distribution of...

  18. Intentional cargo disruption by nefarious means: Examining threats, systemic vulnerabilities and securitisation measures in complex global supply chains.

    PubMed

    McGreevy, Conor; Harrop, Wayne

    2015-01-01

    Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined.

  19. Workplace threats to health and job turnover among women workers.

    PubMed

    Gucer, Patricia W; Oliver, Marc; McDiarmid, Melissa

    2003-07-01

    Is job turnover related to concern about workplace health risks? Using data from a national sample of working women, we examined the relationships among workplace risk communications, worker concerns about workplace threats from hazardous substances, indoor air quality, and job change. Eight percent reported changing a job as a result of concern over workplace threats to health. Previous workplace injury predicted concern about hazardous materials and indoor air quality as well as job change, but employer communication about workplace health risks was associated with less job change and less concern about indoor air quality. Women worry about workplace threats to their health enough to change their jobs, but employers may have the power to cut turnover costs and reduce disruption to workers' lives through the use of risk communication programs.

  20. A 5TH GENERATION FIGHTER FOR BELGIUM:LUXURY OR NECESSITY

    DTIC Science & Technology

    2016-02-16

    violence to assert power. Overall, 3 we see threats, old and new, from piracy to terrorism to cyber-attacks. Based on these increased threats, NATO...share information seamlessly and contribute to a Common Operating Picture ( COP ). This construct will balance speed with accuracy to deliver the

  1. Pirate Mother Ship Warning and Reporting System (PMSW&RS)

    DTIC Science & Technology

    2011-09-01

    1958 Geneva Convention and the 1982 Safety of Life At Sea (SOLAS) Convention both direct nations to cooperate in suppression of piracy on the high... seas (Department of the Navy & Department of Homeland Security, 2007). Countering the piracy threat requires a multifaceted approach with all...Pirate attacks on the world’s seas totaled 266 in the first six months of 2011, up from 196 incidents in the same period last year” (International

  2. U.S. Maritime Security: Sustainability Challenges

    DTIC Science & Technology

    2011-09-01

    Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011

  3. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  4. Escorting commercial aircraft to reduce the MANPAD threat

    NASA Astrophysics Data System (ADS)

    Hock, Nicholas; Richardson, M. A.; Butters, B.; Walmsley, R.; Ayling, R.; Taylor, B.

    2005-11-01

    This paper studies the Man-Portable Air Defence System (MANPADS) threat against large commercial aircraft using flight profile analysis, engagement modelling and simulation. Non-countermeasure equipped commercial aircraft are at risk during approach and departure due to the large areas around airports that would need to be secured to prevent the use of highly portable and concealable MANPADs. A software model (CounterSim) has been developed and was used to simulate an SA-7b and large commercial aircraft engagement. The results of this simulation have found that the threat was lessened when a escort fighter aircraft is flown in the 'Centreline Low' position, or 25 m rearward from the large aircraft and 15 m lower, similar to the Air-to-Air refuelling position. In the model a large aircraft on approach had a 50% chance of being hit or having a near miss (within 20m) whereas escorted by a countermeasure equipped F-16 in the 'Centerline Low' position, this was reduced to only 14%. Departure is a particularly vulnerable time for large aircraft due to slow climb rates and the inability to fly evasive manoeuvres. The 'Centreline Low' escorted departure greatly reduced the threat to 16% hit or near miss from 62% for an unescorted heavy aircraft. Overall the CounterSim modelling has showed that escorting a civilian aircraft on approach and departure can reduce the MANPAD threat by 3 to 4 times.

  5. Maritime Security: Fighting Piracy in the Gulf of Aden and Beyond (Heritage Special Report, Number 59, June 24, 2009)

    DTIC Science & Technology

    2009-06-24

    Ghana 3 5 3 3 1 Guinea 4 5 1 4 2 Ivory Coast 2 4 3 1 0 Kenya 1 1 0 0 4 Liberia 1 2 0 0 1 Madagascar 0 1 1 0 1 Mauritania 0 2 1 1 0 Morocco 0 0 1 0 1...expanding governance in the country. This means that piracy, as well as poaching and environmental deso- lation by foreigners, should be vigorously

  6. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    PubMed

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  7. Molecular piracy: manipulation of the ubiquitin system by Kaposi's sarcoma-associated herpesvirus.

    PubMed

    Fujimuro, Masahiro; Hayward, S Diane; Yokosawa, Hideyoshi

    2007-01-01

    Ubiquitination, one of several post-translational protein modifications, plays a key role in the regulation of cellular events, including protein degradation, signal transduction, endocytosis, protein trafficking, apoptosis and immune responses. Ubiquitin attachment at the lysine residue of cellular factors acts as a signal for endocytosis and rapid degradation by the 26S proteasome. It has recently been observed that viruses, especially oncogenic herpesviruses, utilise molecular piracy by encoding their own proteins to interfere with regulation of cell signalling. Kaposi's sarcoma- associated herpesvirus (KSHV) manipulates the ubiquitin system to facilitate cell proliferation, anti-apoptosis and evasion from immunity. In this review, we will describe the strategies used by KSHV at distinct stages of the viral life-cycle to control the ubiquitin system and promote oncogenesis and viral persistence. (c) 2007 John Wiley & Sons, Ltd.

  8. Examining Changing American Perceptions of the Terrorist Threat: From the Oklahoma City Bombing to Al Qaeda

    DTIC Science & Technology

    2017-12-01

    CHANGING AMERICAN PERCEPTIONS OF THE TERRORIST THREAT: FROM THE OKLAHOMA CITY BOMBING TO AL QAEDA by Eli U.S. Persons December 2017 Thesis...THREAT: FROM THE OKLAHOMA CITY BOMBING TO AL QAEDA 5. FUNDING NUMBERS 6. AUTHOR(S) Eli U.S. Persons 7. PERFORMING ORGANIZATION NAME(S) AND...THREAT: FROM THE OKLAHOMA CITY BOMBING TO AL QAEDA Eli U.S. Persons Major, United States Air Force B.S., United States Air Force Academy, 2005

  9. Late Quaternary stream piracy and strath terrace formation along the Belle Fourche and lower Cheyenne Rivers, South Dakota and Wyoming

    USGS Publications Warehouse

    Stamm, John F.; Hendricks, Robert R.; Sawyer, J. Foster; Mahan, Shannon; Zaprowski, Brent J.; Geibel, Nicholas M.; Azzolini, David C.

    2013-01-01

    Stream piracy substantially affected the geomorphic evolution of the Missouri River watershed and drainages within, including the Little Missouri, Cheyenne, Belle Fourche, Bad, and White Rivers. The ancestral Cheyenne River eroded headward in an annular pattern around the eastern and southern Black Hills and pirated the headwaters of the ancestral Bad and White Rivers after ~ 660 ka. The headwaters of the ancestral Little Missouri River were pirated by the ancestral Belle Fourche River, a tributary to the Cheyenne River that currently drains much of the northern Black Hills. Optically stimulated luminescence (OSL) dating techniques were used to estimate the timing of this piracy event at ~ 22–21 ka. The geomorphic evolution of the Cheyenne and Belle Fourche Rivers is also expressed by regionally recognized strath terraces that include (from oldest to youngest) the Sturgis, Bear Butte, and Farmingdale terraces. Radiocarbon and OSL dates from fluvial deposits on these terraces indicate incision to the level of the Bear Butte terrace by ~ 63 ka, incision to the level of the Farmingdale terrace at ~ 40 ka, and incision to the level of the modern channel after ~ 12–9 ka. Similar dates of terrace incision have been reported for the Laramie and Wind River Ranges. Hypothesized causes of incision are the onset of colder climate during the middle Wisconsinan and the transition to the full-glacial climate of the late-Wisconsinan/Pinedale glaciation. Incision during the Holocene of the lower Cheyenne River is as much as ~ 80 m and is 3 to 4 times the magnitude of incision at ~ 63 ka and ~ 40 ka. The magnitude of incision during the Holocene might be due to a combined effect of three geomorphic processes acting in concert: glacial isostatic rebound in lower reaches (~ 40 m), a change from glacial to interglacial climate, and adjustments to increased watershed area resulting from piracy of the ancestral headwaters of the Little Missouri River.

  10. Late Quaternary stream piracy and strath terrace formation along the Belle Fourche and lower Cheyenne Rivers, South Dakota and Wyoming

    NASA Astrophysics Data System (ADS)

    Stamm, John F.; Hendricks, Robert R.; Sawyer, J. Foster; Mahan, Shannon A.; Zaprowski, Brent J.; Geibel, Nicholas M.; Azzolini, David C.

    2013-09-01

    Stream piracy substantially affected the geomorphic evolution of the Missouri River watershed and drainages within, including the Little Missouri, Cheyenne, Belle Fourche, Bad, and White Rivers. The ancestral Cheyenne River eroded headward in an annular pattern around the eastern and southern Black Hills and pirated the headwaters of the ancestral Bad and White Rivers after ~ 660 ka. The headwaters of the ancestral Little Missouri River were pirated by the ancestral Belle Fourche River, a tributary to the Cheyenne River that currently drains much of the northern Black Hills. Optically stimulated luminescence (OSL) dating techniques were used to estimate the timing of this piracy event at ~ 22-21 ka. The geomorphic evolution of the Cheyenne and Belle Fourche Rivers is also expressed by regionally recognized strath terraces that include (from oldest to youngest) the Sturgis, Bear Butte, and Farmingdale terraces. Radiocarbon and OSL dates from fluvial deposits on these terraces indicate incision to the level of the Bear Butte terrace by ~ 63 ka, incision to the level of the Farmingdale terrace at ~ 40 ka, and incision to the level of the modern channel after ~ 12-9 ka. Similar dates of terrace incision have been reported for the Laramie and Wind River Ranges. Hypothesized causes of incision are the onset of colder climate during the middle Wisconsinan and the transition to the full-glacial climate of the late-Wisconsinan/Pinedale glaciation. Incision during the Holocene of the lower Cheyenne River is as much as ~ 80 m and is 3 to 4 times the magnitude of incision at ~ 63 ka and ~ 40 ka. The magnitude of incision during the Holocene might be due to a combined effect of three geomorphic processes acting in concert: glacial isostatic rebound in lower reaches (~ 40 m), a change from glacial to interglacial climate, and adjustments to increased watershed area resulting from piracy of the ancestral headwaters of the Little Missouri River.

  11. 49 CFR 1542.221 - Records of law enforcement response.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... each. (2) The number of acts and attempted acts of aircraft piracy. (3) The number of bomb threats received, real and simulated bombs found, and actual detonations on the airport. (4) The number of arrests...

  12. Child Soldiers: Are U.S. Military Members Prepared to Deal with the Threat?

    DTIC Science & Technology

    2006-02-15

    killing child soldiers. Additional attention should also be invested into identifying interventions that would decrease the negative stigma of mental...AIR WAR COLLEGE AIR UNIVERSITY CHILD SOLDIERS: ARE U.S. MILITARY MEMBERS PREPARED TO DEAL WITH THE THREAT? by Judith Hughes, LtCol, USAF A...COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Child Soldiers: Are U.S. Military Members Prepared to Deal with the Threat? 5a. CONTRACT

  13. Eliminating the major tornado threat in Tornado Alley

    NASA Astrophysics Data System (ADS)

    Tao, R.

    2014-06-01

    The 2013 devastating tornadoes in Oklahoma, Illinois and other states in Tornado Alley raise an important question: Can we do something to eliminate the major tornado threats in Tornado Alley? Violent tornadoes in Tornado Alley start from the clash-between northbound warm air flow and southbound cold air flow. As there is no mountain in Tornado Alley ranging from west to east to weaken or block the air flows, some clashes are violent, creating vortex turbulence called supercells. These supercells are initially in horizontal spinning motion at the lower atmosphere and then tilt as the air turns to rise in the storm's updraft, creating a component of spin around a vertical axis. About 30% of supercells develop into tornadoes, causing tremendous damages. Here we show that if we build three east-west great walls in the American Midwest, 300 m high and 50 m wide, one in North Dakota, one passing Oklahoma to east and the third one in the south Texas and Louisiana, we will weaken or block such air mass clashes and therefore diminish the major tornado threat in the Tornado Alley forever. We may also first build such great walls locally at some areas with frequent devastating tornado outbreaks and then gradually extend them.

  14. Piracy and Maritime Terrorism; A Seamless Transition

    DTIC Science & Technology

    2004-05-18

    1/.html>. [24 April 2004]. Cropley , Ed. “Asia eyes sea security after threats, US warning.” Reuters. 22 Apr 2004. <http://www.marketnewzealand.com...stm>. ii Ed Cropley , “Asia eyes sea security after threats, US warning,” Reuters, 22 Apr 2004. <http://www.marketnewzealand.com/mnz/News/Story.aspx

  15. 49 CFR 1548.15 - Access to cargo: Security threat assessments for individuals having unescorted access to cargo.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for... SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.15 Access to cargo: Security threat... must successfully complete a security threat assessment or comparable security threat assessment...

  16. Strategic Implications of Emerging Threats to West African Countries

    DTIC Science & Technology

    2012-03-14

    deforestation, serious water and air pollution , irresponsible exploitation practices, plundering of resources by devious warlords and politicians all...AQIM‟s threats in the area is damageable to local economy and safety in general. For example, the decision to move the Paris -Dakar auto rally to...to deal with regional threat posed by this phenomenon93. Additionally, the UN Security Council Resolution 2018 of 31 October 2011, “called upon

  17. Countering Air and Missile Threats

    DTIC Science & Technology

    2012-03-23

    information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources , gathering... apportionment guidance by the JFC. Functional component commands serve to ease the burden on the theater and joint task force staffs, free the JFC to focus...action (COA) to attain the desired objectives. Counterair requires a combination of OCA and DCA operations based on the JFC’s air apportionment

  18. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    PubMed

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  19. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  20. Multiple Threats to Child Health from Fossil Fuel Combustion: Impacts of Air Pollution and Climate Change.

    PubMed

    Perera, Frederica P

    2017-02-01

    Approaches to estimating and addressing the risk to children from fossil fuel combustion have been fragmented, tending to focus either on the toxic air emissions or on climate change. Yet developing children, and especially poor children, now bear a disproportionate burden of disease from both environmental pollution and climate change due to fossil fuel combustion. This commentary summarizes the robust scientific evidence regarding the multiple current and projected health impacts of fossil fuel combustion on the young to make the case for a holistic, child-centered energy and climate policy that addresses the full array of physical and psychosocial stressors resulting from fossil fuel pollution. The data summarized here show that by sharply reducing our dependence on fossil fuels we would achieve highly significant health and economic benefits for our children and their future. These benefits would occur immediately and also play out over the life course and potentially across generations. Going beyond the powerful scientific and economic arguments for urgent action to reduce the burning of fossil fuels is the strong moral imperative to protect our most vulnerable populations. Citation: Perera FP. 2017. Multiple threats to child health from fossil fuel combustion: impacts of air pollution and climate change. Environ Health Perspect 125:141-148; http://dx.doi.org/10.1289/EHP299.

  1. Inhalation of 7.5% carbon dioxide increases threat processing in humans.

    PubMed

    Garner, Matthew; Attwood, Angela; Baldwin, David S; James, Alexandra; Munafò, Marcus R

    2011-07-01

    Inhalation of 7.5% CO(2) increases anxiety and autonomic arousal in humans, and elicits fear behavior in animals. However, it is not known whether CO(2) challenge in humans induces dysfunction in neurocognitive processes that characterize generalized anxiety, notably selective attention to environmental threat. Healthy volunteers completed an emotional antisaccade task in which they looked toward or away from (inhibited) negative and neutral stimuli during inhalation of 7.5% CO(2) and air. CO(2) inhalation increased anxiety, autonomic arousal, and erroneous eye movements toward threat on antisaccade trials. Autonomic response to CO(2) correlated with hypervigilance to threat (speed to initiate prosaccades) and reduced threat inhibition (increased orienting toward and slower orienting away from threat on antisaccade trials) independent of change in mood. Findings extend evidence that CO(2) triggers fear behavior in animals via direct innervation of a distributed fear network that mobilizes the detection of and allocation of processing resources toward environmental threat in humans.

  2. Is Your School Sick? Five Threats to Healthy Schools.

    ERIC Educational Resources Information Center

    Grubb, Deborah; Diamantes, Thomas

    1998-01-01

    Examines the five major threats to healthy school buildings: sick building syndrome; health-threatening building materials; environmental hazards such as radon gas and asbestos; lead poisoning; and general indoor air quality. Discusses ways to assess and address them. (SR)

  3. Indigenous Knowledge and Intellectual Property Rights: Confronting Modern Norms to Promote Sustainability

    ERIC Educational Resources Information Center

    Godbole-Chaudhuri, Pragati; Srikantaiah, Deepa; van Fleet, Justin

    2008-01-01

    The global proliferation of intellectual property rights (IPRs), most recently through the World Trade Organization's Trade Related Aspects of Intellectual Property Rights (TRIPS) Agreement, poses a grave threat for Indigenous knowledge systems. There is an increasing amount of "piracy" of Indigenous knowledge, whereby corporations and scientists…

  4. The Implications of Unstable Yemen on Saudi Arabia

    DTIC Science & Technology

    2012-02-28

    total illiteracy, overpopulation , poverty, and lawlessness draw quite a gloomy picture. Yemen has a rapidly growing population with limited resources...is a transit path for oil from the Arabian Gulf 21 and goods from Southeastern Asia . The piracy threat in the Gulf of Aden, along with terrorist

  5. Multiple Threats to Child Health from Fossil Fuel Combustion: Impacts of Air Pollution and Climate Change

    PubMed Central

    Perera, Frederica P.

    2016-01-01

    Background: Approaches to estimating and addressing the risk to children from fossil fuel combustion have been fragmented, tending to focus either on the toxic air emissions or on climate change. Yet developing children, and especially poor children, now bear a disproportionate burden of disease from both environmental pollution and climate change due to fossil fuel combustion. Objective: This commentary summarizes the robust scientific evidence regarding the multiple current and projected health impacts of fossil fuel combustion on the young to make the case for a holistic, child-centered energy and climate policy that addresses the full array of physical and psychosocial stressors resulting from fossil fuel pollution. Discussion: The data summarized here show that by sharply reducing our dependence on fossil fuels we would achieve highly significant health and economic benefits for our children and their future. These benefits would occur immediately and also play out over the life course and potentially across generations. Conclusion: Going beyond the powerful scientific and economic arguments for urgent action to reduce the burning of fossil fuels is the strong moral imperative to protect our most vulnerable populations. Citation: Perera FP. 2017. Multiple threats to child health from fossil fuel combustion: impacts of air pollution and climate change. Environ Health Perspect 125:141–148; http://dx.doi.org/10.1289/EHP299 PMID:27323709

  6. Combination Antimicrobial Nanocomposite Materials for Neutralization of Biological Threat Agents (PREPRINT)

    DTIC Science & Technology

    2008-09-01

    AFRL-RX-TY-TP-2008-4601 PREPRINT COMBINATION ANTIMICROBIAL NANOCOMPOSITE MATERIALS FOR NEUTRALIZATION OF BIOLOGICAL THREAT AGENTS...AIRBASE TECHNOLOGIES DIVISION MATERIALS AND MANUFACTURING DIRECTORATE AIR FORCE RESEARCH LABORATORY AIR FORCE MATERIEL COMMAND 139 BARNES DRIVE, SUITE 2...a composite material that combines the protein and inorganic components. The process can be mimicked in vitro to some degree, providing methods for

  7. Can We Eliminate the Major Tornado Threats in Tornado Alley?

    NASA Astrophysics Data System (ADS)

    Tao, R.

    2014-03-01

    The recent devastating tornado attacks in Oklahoma, Iowa, Nebraska, and South Dakota raise an important question: can we do something to eliminate the major tornado threats in Tornado Alley? Violent tornado attacks in Tornado Alley are starting from intensive encounters between the northbound warm air flow and southbound cold air flow. As there is no mountain in Tornado Alley ranging from west to east to weaken or block such air flows, some encounters are violent, creating instability: The strong wind changes direction and increases in speed and height. As a result, it creates a supercell, violent vortex, an invisible horizontal spinning motion in the lower atmosphere. When the rising air tilts the spinning air from horizontal to vertical, tornadoes with radii of miles are formed and cause tremendous damage. Here we show that if we build three east-west great walls in the American Midwest, 300m high and 50m wide, one in North Dakota, one along the border between Kansas and Oklahoma to east, and the third one in the south Texas and Louisiana, we will diminish the tornado threats in the Tornado Alley forever. We may also build such great walls at some area with frequent devastating tornado attacks first, then gradually extend it. This research is supported in part by a grant from US Naval Research Lab.

  8. Information fusion: telling the story (or threat narrative)

    NASA Astrophysics Data System (ADS)

    Fenstermacher, Laurie

    2014-06-01

    Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.

  9. US Air Force Air Base Ground Defense Doctrine. Are The Issues Which Arose Concerning Air Base Ground Defense During the Vietnam Conflict Recognized in Current US Air Force Doctrine

    DTIC Science & Technology

    1984-05-01

    Conflict; US efforts to overcome these difficulties_ statistics concerning hostile attacks against air bases and the results thereof (8]; and, a...buses. During the period from � through 1973 the threat to ,air bacses iontinued, as reflected in the air base attack statistics provided ,at...advantage of aI r base vulnerabi lities to gather detailed intelligenrci concerning the air bases. C1 48 -STANDOFF ATTACKS- Based upon the statistics in

  10. The Russian Perception of the NATO Aerospace Threat: Could It Lead to Preemption

    DTIC Science & Technology

    2016-09-01

    64 | Air & Space Power Journal The Russian Perception of the NATO Aerospace Threat Could It Lead to Preemption? Lt Col Thomas R. McCabe, USAFR...authoritative Russian military writings and spokesmen have repeatedly declared that the aerospace sphere, where air and space combine into a single...air and space capability, especially its airfields, aircraft, and aerospace defenses.36 Another key objective, as previously noted, may be a

  11. Clean Air Act Requirements and History

    EPA Pesticide Factsheets

    In 1970 congress designed the Clean Air Act to combat a variety of air pollution problems, and to tackle emerging pollution threats such as public health, national welfare, toxic air pollutants, acid rain, protection of the ozone layer, and regional haze.

  12. Lightning threat extent of a small thunderstorm

    NASA Technical Reports Server (NTRS)

    Nicholson, James R.; Maier, Launa M.; Weems, John

    1988-01-01

    The concern for safety of the personnel at the Kennedy Space Center (KSC) has caused NASA to promulgate strict safety procedures requiring either termination or substantial curtailment when ground lightning threat is believed to exist within 9.3 km of a covered operation. In cases where the threat is overestimated, in either space or time, an opportunity cost is accrued. This paper describes a small thunderstorm initiated over the KSC by terrain effects, that serves to exemplify the impact such an event may have on ground operations at the Center. Data from the Air Force Lightning Location and Protection System, the AF/NASA Launch Pad Lightning Warning System field mill network, radar, and satellite imagery are used to describe the thunderstorm and to discuss its impact.

  13. Perceived threat and avoidance maneuvers in response to cockpit traffic displays

    NASA Technical Reports Server (NTRS)

    Smith, J. D.; Ellis, S. R.; Lee, E. C.

    1984-01-01

    Airline pilots rated their perception of the danger of an air-to-air collision based on cockpit displays of traffic information while they monitored simulated departures. They selected avoidance maneuvers when necessary for separation. Most evasive maneuvers were turns rather than vertical maneuvers. Evasive maneuvers chosen for encounters with lowor moderate-collision danger were generally toward the intruding aircraft. This tendency lessened as the perceived threat level increased. In the highest threat situations, pilots turned toward the intruder only at chance levels. Intruders coming from positions in front of the pilot's ship were more frequently avoided by turns toward than when intruders approached laterally or from behind. Some of the implications of the pilot's turning-toward tendencies are discussed with respect to automatic collision avoidance systems and coordination of avoidance maneuvers of conflicting aircraft.

  14. Categorizing threat : building and using a generic threat matrix.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and ismore » not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.« less

  15. Air Superiority by the Numbers: Cutting Combat Air Forces in a Time of Uncertainty

    DTIC Science & Technology

    2014-06-01

    5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) School of Advanced Air And Space Studies,,Air University,,Maxwell Air...iii ACKNOWLEDGMENTS I would first like to thank the men and women whom I have had the...interdiction role. Finally, in the midst of a growing Soviet radar-guided surface-to-air threat, “Skunk Works ” developed the first stealth attack

  16. Bad Air For Children

    ERIC Educational Resources Information Center

    Kane, Dorothy Noyes

    1976-01-01

    Children are especially sensitive to air pollution and consequences to them maybe of longer duration than to adults. The effects of low-level pollution on children are the concern of this article. The need for research on the threat of air pollution to childrens' health is emphasized. (BT)

  17. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  18. Air Superiority at Red Flag: Mass, Technology, and Winning the Next War

    DTIC Science & Technology

    2009-10-01

    NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Air University,Air Force Research Institute,Maxwell AFB,AL,36112 8 . PERFORMING...REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8 -98) Prescribed by ANSI Std Z39-18 Air University...27 8 Attrition variation versus threat aircraft . . . . . . . 30 vi Figure Page 9 Threat weapon and

  19. Jemaah Islamiyah: Reevaluating the Most Dangerous Terrorist Threat in Southeast Asia

    DTIC Science & Technology

    2010-12-01

    why some terrorist groups last longer than others, namely “ideological motivation , economic conditions, regime type, the size of groups, and/or the...States Air Force, RAND Corporation and Project Air Force (U.S.), The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a...in 2003 and 2004, then shifted tactics from car bombs to backpack bombs for their 2005 and 2009 attacks.58 Their operatives received safe haven and

  20. Interspecies modulation of bacterial development through iron competition and siderophore piracy

    PubMed Central

    Traxler, Matthew F.; Seyedsayamdost, Mohammad R.; Clardy, Jon; Kolter, Roberto

    2012-01-01

    Summary While soil-dwelling actinomycetes are renowned for secreting natural products, little is known about the roles of these molecules in mediating actinomycete interactions. In a previous co-culture screen, we found that one actinomycete, Amycolatopsis sp. AA4, inhibited aerial hyphae formation in adjacent colonies of Streptomyces coelicolor. A siderophore, amychelin, mediated this developmental arrest. Here we present genetic evidence that confirms the role of the amc locus in the production of amychelin and in the inhibition of S. coelicolor development. We further characterize the Amycolatopsis sp. AA4 - S. coelicolor interaction by examining expression of developmental and iron acquisition genes over time in co-culture. Manipulation of iron availability and/or growth near Amycolatopsis sp. AA4 led to alterations in expression of the critical developmental gene bldN, and other key down-stream genes in the S. coelicolor transcriptional cascade. In Amycolatopsis sp. AA4, siderophore genes were down-regulated when grown near S. coelicolor, leading us to find that deferrioxamine E, produced by S. coelicolor, could be readily utilized by Amycolatopsis sp. AA4. Collectively these results suggest that competition for iron via siderophore piracy and species-specific siderophores can alter patterns of gene expression and morphological differentiation during actinomycete interactions. PMID:22931126

  1. Interspecies modulation of bacterial development through iron competition and siderophore piracy.

    PubMed

    Traxler, Matthew F; Seyedsayamdost, Mohammad R; Clardy, Jon; Kolter, Roberto

    2012-11-01

    While soil-dwelling actinomycetes are renowned for secreting natural products, little is known about the roles of these molecules in mediating actinomycete interactions. In a previous co-culture screen, we found that one actinomycete, Amycolatopsis sp. AA4, inhibited aerial hyphae formation in adjacent colonies of Streptomyces coelicolor. A siderophore, amychelin, mediated this developmental arrest. Here we present genetic evidence that confirms the role of the amc locus in the production of amychelin and in the inhibition of S. coelicolor development. We further characterize the Amycolatopsis sp. AA4 - S. coelicolor interaction by examining expression of developmental and iron acquisition genes over time in co-culture. Manipulation of iron availability and/or growth near Amycolatopsis sp. AA4 led to alterations in expression of the critical developmental gene bldN, and other key downstream genes in the S. coelicolor transcriptional cascade. In Amycolatopsis sp. AA4, siderophore genes were downregulated when grown near S. coelicolor, leading us to find that deferrioxamine E, produced by S. coelicolor, could be readily utilized by Amycolatopsis sp. AA4. Collectively these results suggest that competition for iron via siderophore piracy and species-specific siderophores can alter patterns of gene expression and morphological differentiation during actinomycete interactions. © 2012 Blackwell Publishing Ltd.

  2. 14 CFR 243.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... control over an aircraft, by force or violence or threat of force or violence, or by any other form of... piracy. Contact means a person not on the covered flight or an entity that should be contacted in case of an aviation disaster. The contact need not have any particular relationship to a passenger. Covered...

  3. 14 CFR 243.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... control over an aircraft, by force or violence or threat of force or violence, or by any other form of... piracy. Contact means a person not on the covered flight or an entity that should be contacted in case of an aviation disaster. The contact need not have any particular relationship to a passenger. Covered...

  4. 14 CFR 243.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... control over an aircraft, by force or violence or threat of force or violence, or by any other form of... piracy. Contact means a person not on the covered flight or an entity that should be contacted in case of an aviation disaster. The contact need not have any particular relationship to a passenger. Covered...

  5. 14 CFR 243.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... control over an aircraft, by force or violence or threat of force or violence, or by any other form of... piracy. Contact means a person not on the covered flight or an entity that should be contacted in case of an aviation disaster. The contact need not have any particular relationship to a passenger. Covered...

  6. 14 CFR 243.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... control over an aircraft, by force or violence or threat of force or violence, or by any other form of... piracy. Contact means a person not on the covered flight or an entity that should be contacted in case of an aviation disaster. The contact need not have any particular relationship to a passenger. Covered...

  7. Volume-holographic memory for laser threat discrimination

    NASA Astrophysics Data System (ADS)

    Delong, Mark L.; Duncan, Bradley D.; Parker, Jack H., Jr.

    1996-10-01

    Using conventional volume-holographic angle multiplexing in an Fe:LiNbO3 crystal, we have developed a compact laser threat discriminator, intended for aircraft integration, that optically detects laser spatial coherence and angle of arrival while simultaneously rejecting incoherent background sources, such as the Sun. The device is intended for a specific type of psychophysical laser attack against U.S. Air Force pilots, namely, third-world-country exploitation of inexpensive and powerful cw Ar-ion or doubled Nd:YAG lasers in the visible spectrum to blind or disorient U.S. pilots. The component does not solve the general tactical laser weapon situation, which includes identifying precision-guided munitions, range finders, and lidar systems that use pulsed infrared lasers. These are fundamentally different threats requiring different detector solutions. The device incorporates a sequence of highly redundant, simple black-and-white warning patterns that are keyed to be reconstructed as the incident laser threat, playing the role of an uncooperative probe beam, changes angle with respect to the crystal. The device tracks both azimuth and elevation, using a nonconventional hologram viewing system. Recording and playback conditions are simplified because nonzero cross talk is a desirable feature of this discriminator, inasmuch as our application requires a nonzero probability of detection for arbitrary directions of arrival within the sensor's field of view. The device can exploit phase-matched grating trade-off with probe-beam wavelength, accommodating wavelength-tunable threats, while still maintaining high direction-of-arrival tracking accuracy. .

  8. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  9. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  10. Army and Air Force Unmanned Air Reconnaissance: Warrior and Hydra Navigating a Maze of Strategic Hedges

    DTIC Science & Technology

    2009-06-01

    Chambliss; Colonel Michael Stickney; Colonel Eric Mathewson; Lieutenant Colonel Robert Kiebler; Lieutenant Colonel Kenneth Kilmurray; Lieutenant...16 Peter Layton , Group Captain, Royal Air Force, “Hedging Strategies, UCAVs, budgets, and improbable threats,” Armed Forces Journal...10 Colonel Eric Mathewson, US Air Force HAF/A2 DCS ISR, “Air Force ISR in a Changed World: ISR Transformation, the Importance

  11. Cyclone: A close air support aircraft for tomorrow

    NASA Technical Reports Server (NTRS)

    Cox, George; Croulet, Donald; Dunn, James; Graham, Michael; Ip, Phillip; Low, Scott; Vance, Gregg; Volckaert, Eric

    1991-01-01

    To meet the threat of the battlefield of the future, the U.S. ground forces will require reliable air support. To provide this support, future aircrews demand a versatile close air support aircraft capable of delivering ordinance during the day, night, or in adverse weather with pin-point accuracy. The Cyclone aircraft meets these requirements, packing the 'punch' necessary to clear the way for effective ground operations. Possessing anti-armor, missile, and precision bombing capability, the Cyclone will counter the threat into the 21st Century. Here, it is shown that the Cyclone is a realistic, economical answer to the demand for a capable close air support aircraft.

  12. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  13. UCAV path planning in the presence of radar-guided surface-to-air missile threats

    NASA Astrophysics Data System (ADS)

    Zeitz, Frederick H., III

    This dissertation addresses the problem of path planning for unmanned combat aerial vehicles (UCAVs) in the presence of radar-guided surface-to-air missiles (SAMs). The radars, collocated with SAM launch sites, operate within the structure of an Integrated Air Defense System (IADS) that permits communication and cooperation between individual radars. The problem is formulated in the framework of the interaction between three sub-systems: the aircraft, the IADS, and the missile. The main features of this integrated model are: The aircraft radar cross section (RCS) depends explicitly on both the aspect and bank angles; hence, the RCS and aircraft dynamics are coupled. The probabilistic nature of IADS tracking is accounted for; namely, the probability that the aircraft has been continuously tracked by the IADS depends on the aircraft RCS and range from the perspective of each radar within the IADS. Finally, the requirement to maintain tracking prior to missile launch and during missile flyout are also modeled. Based on this model, the problem of UCAV path planning is formulated as a minimax optimal control problem, with the aircraft bank angle serving as control. Necessary conditions of optimality for this minimax problem are derived. Based on these necessary conditions, properties of the optimal paths are derived. These properties are used to discretize the dynamic optimization problem into a finite-dimensional, nonlinear programming problem that can be solved numerically. Properties of the optimal paths are also used to initialize the numerical procedure. A homotopy method is proposed to solve the finite-dimensional, nonlinear programming problem, and a heuristic method is proposed to improve the discretization during the homotopy process. Based upon the properties of numerical solutions, a method is proposed for parameterizing and storing information for later recall in flight to permit rapid replanning in response to changing threats. Illustrative examples are

  14. Mitigation Policy Scenario of Space Debris Threat Related with National Security

    NASA Astrophysics Data System (ADS)

    Herdiansyah, Herdis; Frimawaty, Evy; Munir, Ahmad

    2016-02-01

    The development of air space recently entered a new phase, when the space issues correlated with the future of a country. In past time, the space authorization was related with advancing technology by many space mission and various satellite launchings, or it could be said that who ruled technology will rule the space. Therefore, the numerous satellites in the space could be a threat for the countries which are mainly located in the path of the satellite, especially in the equatorial region including Indonesia. This study aims to create a policy scenario in mitigating the threat of space debris. The results showed that although space debris was not threatened national security for now, but the potential and its impact on the future potentially harmful. The threats of orbit circulation for some experts considered as a threat for national security, because its danger potential which caused by space debris could significantly damage the affected areas. However, until now Indonesia has no comprehensive mitigation strategy for space matters although it has been ratified by the United Nations Convention.

  15. Sea piracy sequelae: assessment according to the Diagnostic and Statistical Manual of Mental Disorders-5.

    PubMed

    Ziello, Antonio Rosario; Fasanaro, Angiola Maria; Petrelli, Cristina; Ricci, Giovanna; Sirignano, Ascanio; Amenta, Francesco

    2014-01-01

    Our previous studies have investigated the psychological consequences of kidnapping in a group of Italian seafarers assaulted by sea pirates and held in captivity and in their family members by the criteria of the Diagnostic and Statistical Manual of Mental Disorders (DSM)-4. These studies have shown that both the victims and the family members showed significant psychological disturbances, corresponding to a chronic Post-Traumatic Stress Disorder (PTSD), in the victims, and a pattern of anxiety and depression in their family members. After publication of these studies, an updated edition of the DSM became available, namely, the DSM-5. The DSM-5 redefines some diagnostic criteria, including those related to the PTSD. This work was focused on the re-evaluation of the results of our previous studies in the light of the DSM-5 diagnostic criteria. Sixteen Italians including 4 kidnapped seafarers and 12 family members were examined by a semi-structured interview followed by Clinician-Administered PTSD Scale (CAPS-DX) and the Cognitive Behaviour al Assessment (CBA 2.0) for victims and by State-Trait Anxiety Inventory (STAI) X-1 and X-2 of CBA 2.0 and the Hamilton Depression Rating Scale (HDRS) for family members. Data already obtained were reviewed and re-analysed according to the DSM-5 criteria and the Clinician-Administered PTSD Scale for DSM-5 (CAPS-5). The use of the CAPS-5 did not modify the diagnosis for the victims' group: 3 of 4 had a PTSD diagnosis performed through the CAPS-5. Seven of 12 family members had PTSD diagnosis performed through the CAPS-5, with negative cognitions and mood symptoms being those obtaining the highest score. Using DSM-5 criteria, the diagnosis of PTSD in the direct victims of piracy was confirmed. The same diagnosis could apply to a group of their family members. Besides anxiety and fear, in fact, we found in 7 out 12 subjects the presence of symptoms included by the DSM-5 in the PTSD spectrum. These symptoms were: avoidance, negative

  16. Air Defense: A Computer Game for Research in Human Performance.

    DTIC Science & Technology

    1981-07-01

    warfare (ANW) threat analysis. M’ajor elements of the threat analysis problem \\\\,erc eoibedded in an interactive air detoense game controlled by a...The game requires sustained attention to a complex and interactive "hostile" environment, provides proper experimental control of relevant variables...AD-A102 725 NAVY PERSONNEL RESEARCH AND DEVELOPMENT CENTER SAN DETC F/6 5/10 AIR DEFENSE: A COMPUTER GAME FOR RESEARCH IN HUMAN PERFORMANCE.(U) JUL

  17. 49 CFR 1522.105 - Adoption and implementation of the security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., against acts of criminal violence and air piracy, and against the introduction into aircraft of any... it proposes for the amendment to become effective, unless the designated official allows a shorter...

  18. 1990 Clean Air Act Amendment Summary: Title V

    EPA Pesticide Factsheets

    In 1989, President George W. Bush proposed legislation designed to curb three major threats to the environment and public health: acid rain, urban air pollution, and toxic air emissions. The proposal also called for establishing a national permits program.

  19. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  20. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    PubMed

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  1. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. PMID:23736227

  2. Countering Threat Networks

    DTIC Science & Technology

    2016-12-21

    PLANNING TO COUNTER THREAT NETWORKS  Joint Intelligence Preparation of the Operational Environment and Threat Networks...Army Expeditionary Forensic Facility in Afghanistan ........ E-9 E-4 Exploitation Support to Intelligence Fusion and Decision Making ......... E-10...Approach The groundwork for successful countering threat networks activities starts with information and intelligence to develop an understanding

  3. Determinants of Achieving Effective Shared Situational Awareness within the Context of Global Maritime Partnerships

    DTIC Science & Technology

    2013-06-01

    and security, vessel traffic management, accident and disaster response, search and rescue as well as law enforcement are collecting information...piracy threat. Individually Nigeria , Ghana, Benin, Togo, Cameroon and Senegal have taken practical steps to police their waters but they lack...use their vast natural resources for socio-economic development of their countries. Lloyd’s, the leading maritime insurer, has listed Nigeria , Benin

  4. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  5. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  6. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    PubMed

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  7. Assessing Student Threats

    ERIC Educational Resources Information Center

    Brunner, Judy; Emmendorfer, Beth; Lewis, Dennis

    2009-01-01

    For administrators at the secondary level, not many school days go according to plan or script, but few things are more disruptive than a student threat of violence. When threats are made--or if there is a rumor of a serious student threat--it can take both time and resources to investigate, interview, and analyze multiple pieces of information in…

  8. Clearing the air: identity safety moderates the effects of stereotype threat on women's leadership aspirations.

    PubMed

    Davies, Paul G; Spencer, Steven J; Steele, Claude M

    2005-02-01

    Exposing participants to gender-stereotypic TV commercials designed to elicit the female stereotype, the present research explored whether vulnerability to stereotype threat could persuade women to avoid leadership roles in favor of nonthreatening subordinate roles. Study 1 confirmed that exposure to the stereotypic commercials undermined women's aspirations on a subsequent leadership task. Study 2 established that varying the identity safety of the leadership task moderated whether activation of the female stereotype mediated the effect of the commercials on women's aspirations. Creating an identity-safe environment eliminated vulnerability to stereotype threat despite exposure to threatening situational cues that primed stigmatized social identities and their corresponding stereotypes.

  9. Dogs That Haven't Barked: Towards an Understanding of the Absence of Expected Technological Threats Workshop Bibliography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roseman, Mallory; Zikry, Fareeda

    Lawrence Livermore National Laboratory’s Center for Global Security Research hosted a workshop to investigate why some consistently predicted threats from science and technology (S&T) have not manifested with the impacts to international security as forecasted. During the workshop, “Dogs That Haven’t Barked: Towards an Understanding of the Absence of Expected Technological Threats,” participants used two specific cases to focus the discussion: biotechnology and man-portable air defense systems (MANPADS).

  10. Operation Noble Eagle and the Use of Combat Air Patrols for Homeland Defense

    DTIC Science & Technology

    2008-12-01

    aviation security , together with the absence of terrorist attacks on the homeland and of no actionable intelligence indicating an imminent air threat in America. The following sub-areas were researched to help evaluate and recommend changes to the current ONE CAP policy: the history of air defense in America; U.S. air defense mistakes on 9/11 and the evolution of ONE; improvements in the intelligence community and aviation security since 9/11; specific threats to aviation and the risk of another 9/11-style attack in the United States; and the cost and

  11. Planning and preparing for public health threats at airports.

    PubMed

    Martin, Greg; Boland, Mairin

    2018-03-07

    The ever-increasing speed and scope of human mobility by international air travel has led to a global transport network for infectious diseases with the potential to introduce pathogens into non-endemic areas, and to facilitate rapid spread of novel or mutated zoonotic agents.Robust national emergency preparedness is vital to mitigate the transmission of infectious diseases agents domestically and to prevent onward spread to other countries. Given the complex range of stakeholders who respond to an infectious disease threat being transmitted through air travel, it is important that protocols be tested and practised extensively in advance of a real emergency. Simulation exercises include the identification of possible scenarios based on the probability of hazards and the vulnerability of populations as a basis for planning, and provide a useful measure of preparedness efforts and capabilities.In October 2016, a live simulation exercise was conducted at a major airport in Ireland incorporating a public health threat for the first time, with the notification of a possible case of MERS-CoV aboard an aircraft plus an undercarriage fire. Strengths of the response to the communicable disease threat included appropriate public health risk assessment, case management, passenger information gathering, notification to relevant parties, and communication to passengers and multiple agencies.Lessons learned include:o Exercise planning should not be overly ambitious. In testing too many facets of emergency response, the public health response could be deprioritised.o The practical implementation of communication protocols in a real-time exercise of this scope proved challenging. These protocols should continue to be checked and tested by desk-top exercises to ensure that all staff concerned are familiar with them, especially in the context of staff turn-over.o The roles and responsibilities of the various agencies must be clear to avoid role confusion.o Equipment and

  12. Emerging Threats, Force Structures, and the Role of Air Power in Korea

    DTIC Science & Technology

    2000-01-01

    Cold War. From 1948 to 1989 two different ideolo- gies, Communism and Democracy, struggled for the hearts and minds of the people of the world. It...and eventually, space-based reconnaissance intelligence and communication sys- tems. Throughout the Cold War, large standing armies and navies...were still necessary to meet the threat. The two centers of Communism were the Soviet Union and China. To respond to the challenge from the spread of

  13. Threat in dreams: an adaptation?

    PubMed

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, p<.00012). Contrary to TST's predictions, the SA participants reported significantly fewer threat dreams (chi([1,N=287])(2)=6.11, p<.0134), and did not differ from the Welsh participants in responses to dream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  14. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    PubMed Central

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2013-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232

  15. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    PubMed

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  16. Effect of perceived threat on avoidance maneuvers selected while viewing cockpit traffic displays

    NASA Technical Reports Server (NTRS)

    Smith, J. D.; Ellis, S. R.

    1982-01-01

    Ten airline pilots rated the collision danger of air traffic presented on cockpit displays of traffic information (CDTI) while they monitored simulated departures from Denver. They selected avoidance maneuvers when necessary for separation. Most evasive maneuvers were turns rather than vertical maneuvers. Evasive maneuvers chosen for encounters with low or moderate perceived collision danger were generally toward the intruding aircraft. This tendency lessened as the perceived threat level increased. In the highest threat situations pilots turned toward the intruder only at chance levels. Some of the implications of the pilots' turning-towards tendencies are discussed with respect to automatic collision avoidance systems and coordination of avoidance maneuvers of conflicting aircraft.

  17. The Case for Nation-building: Why and How to Fix Failed States

    DTIC Science & Technology

    2011-12-01

    Asia), pandemic disease (AIDS), and ecologi - cal disaster—to say nothing of the occasional global terrorist organization. Time and time again...borders. And piracy along the east coast of Africa has increased over the last two decades since Somalia’s collapse into anarchy . These threats...ignore the problems, allow anarchy to consume failed states, and pay ever higher costs to isolate themselves and repair any damage after the fact. But

  18. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    PubMed

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior.

  19. Classification of buildings mold threat using electronic nose

    NASA Astrophysics Data System (ADS)

    Łagód, Grzegorz; Suchorab, Zbigniew; Guz, Łukasz; Sobczuk, Henryk

    2017-07-01

    Mold is considered to be one of the most important features of Sick Building Syndrome and is an important problem in current building industry. In many cases it is caused by the rising moisture of building envelopes surface and exaggerated humidity of indoor air. Concerning historical buildings it is mostly caused by outdated raising techniques among that is absence of horizontal isolation against moisture and hygroscopic materials applied for construction. Recent buildings also suffer problem of mold risk which is caused in many cases by hermetization leading to improper performance of gravitational ventilation systems that make suitable conditions for mold development. Basing on our research there is proposed a method of buildings mold threat classification using electronic nose, based on a gas sensors array which consists of MOS sensors (metal oxide semiconductor). Used device is frequently applied for air quality assessment in environmental engineering branches. Presented results show the interpretation of e-nose readouts of indoor air sampled in rooms threatened with mold development in comparison with clean reference rooms and synthetic air. Obtained multivariate data were processed, visualized and classified using a PCA (Principal Component Analysis) and ANN (Artificial Neural Network) methods. Described investigation confirmed that electronic nose - gas sensors array supported with data processing enables to classify air samples taken from different rooms affected with mold.

  20. Information Exchange Between Resilient and High-Threat Networks: Techniques for Threat Mitigation

    DTIC Science & Technology

    2004-11-01

    Information Exchange between Resilient and High-Threat Networks : Techniques for Threat Mitigation Tim Dean and Graham Wyatt QinetiQ...SUMMARY High resilience military networks frequently have requirements for exchange of information with networks of low assurance, including networks of...assured, two-way, information flow between high resilience networks and other networks of unknown threat. The techniques include conventional and

  1. Cognitive appraisals of stereotype threat.

    PubMed

    Berjot, S; Roland-Levy, C; Girault-Lidvan, N

    2011-04-01

    Using the cognitive appraisal conceptualisation of the transactional model of stress, the goal was to assess how victims of stereotype threat respond to this situation in terms of primary appraisals (threat/challenge) and to investigate whether those appraisals may mediate the relation between stereotype threat and performance. Results show that, while participants from North Africa living in France did appraise the situation more as a threat and less as a challenge, only challenge appraisal mediated between stereotype threat and performance.

  2. Poland and Global Threats

    NASA Astrophysics Data System (ADS)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  3. Industrial air pollution is a threat to NY's grape industry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jordan, T.D.

    1977-01-01

    Air pollution has become a serious problem for the grape industry in New York's Great Lakes region. Ozone is discussed in relation to crop damage. There are several by-products of coal-combustion and steel manufacture that may cause serious plant injury. They include: sulfur dioxide, hydrogen fluoride, nitrous oxide, and several of the heavy metals, such as arsenic, mercury, and lead. A leaf injury, called Brown Leaf, has been identified as oxidant stipple, which is caused by excessive ozone. It is evident that excessive soil moisture results in more oxidant stipple. In 1977, an expanded research effort has been undertaken tomore » determine the effects of other air pollutants, such as sulfur dioxide.« less

  4. Lizard threat display handicaps endurance.

    PubMed Central

    Brandt, Y

    2003-01-01

    Honest-signalling theory asserts that threat displays reliably advertise attributes that influence fighting success. Endurance, as measured by treadmill performance, predicts the outcome of agonistic interactions among lizards. If threat displays in lizards function to advertise endurance capacity then variation in threat displays should correlate with endurance. I tested this prediction for the duration of threat posturing in male side-blotched lizards (Uta stansburiana) and examined whether threat displays act as quality handicaps, reliable signals that expend the attribute that is advertised. Individual variation in the duration of threat posturing correlated with endurance, while an experimental reduction of endurance diminished the duration of threat posturing. As expected of a quality handicap, endurance fell below baseline after display production. A restriction of aerobic metabolism can account for this effect. In threat posturing, lateral compression of the thorax may interfere with respiration or with circulation, limiting aerobic metabolism and causing a compensatory increase in anaerobic metabolism, thereby generating lactate and diminishing locomotor capacity. Concentrations of lactate measured after display production were higher than baseline, consistent with the proposed mechanism. By restricting aerobic metabolism, the threat posture can act as a quality handicap, simultaneously advertising and expending the endurance capacity of displaying lizards. PMID:12803896

  5. Passive automatic anti-piracy defense system of ships

    NASA Astrophysics Data System (ADS)

    Szustakowski, M.; Życzkowski, M.; Ciurapiński, W.; Karol, M.; Kastek, M.; Stachowiak, R.; Markowski, P.

    2013-10-01

    The article describes the technological solution for ship self-defense against pirate attacks. The paper presents the design solutions in the field of direct physical protection. All the solutions are connected with the latest optoelectronic and microwave systems and sensors to detect, recognize and the threat posed by pirates. In particular, tests of effectiveness and the detection-range of technology demonstrator developed by a team of authors were carried out.

  6. DSB Task Force Report on Air Dominance: Executive Summary

    DTIC Science & Technology

    2017-01-03

    establish "air superiority" in a localized area and for a period of time as needed to provide freedom of action to ach ieve campaign objectives. Air...cost. To achieve "on-demand air superiori ty," the U.S. must pursue a cross-domain strategy to counter proliferating anti-access and area denial...capability and systems for maintaining air dominance beyond the next decade.ŕ The areas to be addressed included: The projected threat environment

  7. Driving Less for Better Air: Impacts of a Public Information Campaign

    ERIC Educational Resources Information Center

    Henry, Gary T.; Gordon, Craig S.

    2003-01-01

    In the wake of the 1990 amendments to the Clean Air Act, localities across the United States initiated public information campaigns both to raise awareness of threats to air quality and to change behavior related to air pollution by recommending specific behavioral changes in the campaign messages. These campaigns are designed to reduce the health…

  8. Reactions to a health threat: dispositional threat orientations and message characteristics.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Gonzalez, Amelia; Denison, Elizabeth

    2011-05-01

    This study explored the interactive effects of dispositional threat orientation, type of message, and having children on reactions to a message about exposure to bisphenol A (BPA) in plastics. The study used a 2 (message: Fear Arousal or Plain)×2 (parenting status: child or no child)×2 (threat orientation: high or low) mixed factorial design. Adults (N= 200) recruited via the Internet completed measures of threat orientations, reported whether they were a parent, and read either a low or high fear-arousal message about the risks of BPA exposure. They then completed measures of reactions to the message (perceived susceptibility to BPA effects, negative emotions, and behavioural intentions to engage in protection). Depending on threat orientations, the fear arousal version of the message and parenthood had strikingly different effects, ranging from no effect (for those high in a control-based approach) to prompting change (for those low in a control-based approach) to counterproductive (for those high in an optimistic denial approach). These findings suggest that considering individual differences and their interactions with situational factors could improve both the predictive ability of threat protection theories and the delivery of messages intended to change behaviour. ©2010 The British Psychological Society.

  9. Disrupting Somali Piracy via Trust and Influence Operations

    DTIC Science & Technology

    2009-06-01

    cigarettes, and other provisions for future missions, 30 percent in bribes to government officials” (Associated Press, 2009a). Once a group of pirates...incentive – there is a lack of incentive for the crewmembers to be proactive since in most cases pirates pose little threat to the crew; legal and... ethical issues – shipping companies are hesitant to arm their crews due to the dangers associated with firearms onboard ship, insurance restrictions

  10. Combatting Insider Threats

    NASA Astrophysics Data System (ADS)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  11. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    PubMed Central

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  12. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  13. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  14. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  15. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    PubMed

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  16. Threat interferes with response inhibition.

    PubMed

    Hartikainen, Kaisa M; Siiskonen, Anna R; Ogawa, Keith H

    2012-05-09

    A potential threat, such as a spider, captures attention and engages executive functions to adjust ongoing behavior and avoid danger. We and many others have reported slowed responses to neutral targets in the context of emotional distractors. This behavioral slowing has been explained in the framework of attentional competition for limited resources with emotional stimuli prioritized. Alternatively, slowed performance could reflect the activation of avoidance/freezing-type motor behaviors associated with threat. Although the interaction of attention and emotion has been widely studied, little is known on the interaction between emotion and executive functions. We studied how threat-related stimuli (spiders) interact with executive performance and whether the interaction profile fits with a resource competition model or avoidance/freezing-type motor behaviors. Twenty-one young healthy individuals performed a Go-NoGo visual discrimination reaction time (RT) task engaging several executive functions with threat-related and emotionally neutral distractors. The threat-related distractors had no effect on the RT or the error rate in the Go trials. The NoGo error rate, reflecting failure in response inhibition, increased significantly because of threat-related distractors in contrast to neutral distractors, P less than 0.05. Thus, threat-related distractors temporarily impaired response inhibition. Threat-related distractors associated with increased commission errors and no effect on RT does not suggest engagement of avoidance/freezing-type motor behaviors. The results fit in the framework of the resource competition model. A potential threat calls for evaluation of affective significance as well as inhibition of undue emotional reactivity. We suggest that these functions tax executive resources and may render other executive functions, such as response inhibition, temporarily compromised when the demands for resources exceed availability.

  17. Shoulder Launched Missiles (A.K.A. MANPADS): The Ominous Threat to Commercial Aviation

    DTIC Science & Technology

    2006-12-01

    global trade and just-in-time delivery, along with its leadership status in the world’s largest industry , travel and tourism , make it even more...vulnerability to shoulder launched missiles, also known as MANPADS (Man Portable Air Defense Systems). This industry sustains the flow of goods...that “a credible threat to the viability of America’s commercial airline industry could have profound effects on the nation’s economy and on

  18. The measurement of threat orientations.

    PubMed

    Thompson, Suzanne C; Schlehofer, Michèle M; Bovin, Michelle J

    2006-01-01

    To develop measures of 3 threat orientations that affect responses to health behavior messages. In Study 1, college students (N = 47) completed items assessing threat orientations and health behaviors. In Study 2, college students and community adults (N = 110) completed the threat orientation items and measures of convergent and discriminant validity. In Study 1, the control-based, denial-based, and heightened-sensitivity-based threat orientation scales demonstrated good internal consistency and correlated with engagement in health behaviors. In Study 2, the convergent and discriminant validity of the 3 measures was established. The 3 scales have good internal reliability and construct validity.

  19. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  20. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  1. How Does Air Pollution Threaten Basic Human Rights? The Case Study of Bulgaria

    ERIC Educational Resources Information Center

    Ahmedova, Aylin Hasanova

    2016-01-01

    The main purpose of this article is to analyze the relationship between air pollution and human rights. It investigates whether air pollution threatens basic human rights such as the right to health, life, and the environment. Air pollution represents a major threat both to health and to the environment. Despite the adoption of numerous…

  2. National Security Science and Technology Initiative: Air Cargo Screening

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bingham, Philip R; White, Tim; Cespedes, Ernesto

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with fourmore » of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  3. Traits, States, and Attentional Gates: Temperament and Threat Relevance as Predictors of Attentional Bias to Social Threat

    PubMed Central

    Helzer, Erik G.; Connor-Smith, Jennifer K.; Reed, Marjorie A.

    2009-01-01

    This study investigated the influence of situational and dispositional factors on attentional biases toward social threat, and the impact of these attentional biases on distress in a sample of adolescents. Results suggest greater biases for personally-relevant threat cues, as individuals reporting high social stress were vigilant to subliminal social threat cues, but not physical threat cues, and those reporting low social stress showed no attentional biases. Individual differences in fearful temperament and attentional control interacted to influence attentional biases, with fearful temperament predicting biases to supraliminal social threat only for individuals with poor attentional control. Multivariate analyses exploring relations between attentional biases for social threat and symptoms of anxiety and depression revealed that attentional biases alone were rarely related to symptoms. However, biases did interact with social stress, fearful temperament, and attentional control to predict distress. Results are discussed in terms of automatic and effortful cognitive mechanisms underlying threat cue processing. PMID:18791905

  4. Legal Aspects of Asbestos Abatement. Responses to the Threat of Asbestos-Containing Materials in School Buildings.

    ERIC Educational Resources Information Center

    Olson, Kristin

    Exposure to asbestos in the air poses serious health threats, particularly to children. The use of asbestos in schools after World War II may have exposed millions of persons before regulations controlling asbestos use began appearing in the 1970s. Federal efforts to reduce exposure to asbestos have included passage of the Asbestos School Hazard…

  5. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  6. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  7. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    PubMed

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  9. Health Effects of Ambient Air Pollution in Developing Countries.

    PubMed

    Mannucci, Pier Mannuccio; Franchini, Massimo

    2017-09-12

    The deleterious effects of ambient air pollution on human health have been consistently documented by many epidemiologic studies worldwide, and it has been calculated that globally at least seven million deaths are annually attributable to the effects of air pollution. The major air pollutants emitted into the atmosphere by a number of natural processes and human activities include nitrogen oxides, volatile organic compounds, and particulate matter. In addition to the poor ambient air quality, there is increasing evidence that indoor air pollution also poses a serious threat to human health, especially in low-income countries that still use biomass fuels as an energy resource. This review summarizes the current knowledge on ambient air pollution in financially deprived populations.

  10. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  11. Autobiographical memory sources of threats in dreams.

    PubMed

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to this subpart must ensure that each of the following undergoes a security threat assessment or a comparable...

  13. 78 FR 45116 - Approval and Promulgation of Air Quality Implementation Plans and Designation of Areas for Air...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... alternatives. 7. Explain your views as clearly as possible, avoiding the use of profanity or personal threats...-hour PM 2.5 NAAQS. Id. The requirement to submit the section 172(c)(9) contingency measures is... rationale for this view is described in a memorandum from Mary Nichols, Assistant Administrator for Air and...

  14. Conditioned social dominance threat: observation of others’ social dominance biases threat learning

    PubMed Central

    Molapour, Tanaz; Olsson, Andreas

    2016-01-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants’ eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. PMID:27217107

  15. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  16. Removing the Threat in the Air: Teacher Transparency and the Creation of Identity-Safe Graduate Classrooms

    ERIC Educational Resources Information Center

    Tuitt, Franklin

    2008-01-01

    Through a qualitative investigation, the author examined the experiences of 12 Black graduate students to understand better the impact of stereotype threat (Steele, 1997a , 1999) and performance anxieties (Osborne, 2001) on their education in a traditionally white institution (TWI). The results of this study illustrate how some students enter the…

  17. Attacking the Mobile Ballistic Missile Threat in the Post-Cold War Environment. New Rules to an Old Game

    DTIC Science & Technology

    2006-05-01

    harassment, it was not until the Allied ground forces over- ran the launch areas that the threat truly came to an end.21 By becoming mobile, the Germans had...SS-6 “ Sapwood .”28 Korolev’s RD-105/RD-106 propulsion concept for this missile involved a total of five engines—a simple design based on German...to-air missiles mobile because we had a big area to de- fend. Our stationary surface-to-air missile sites were primarily around Moscow and others

  18. The Future of Small Air Forces and Combat Aircraft

    DTIC Science & Technology

    2001-04-01

    dogma and institutional entrenchment by the — blue suited“ élite against continued external opposition. The basic tenants of airpower and the means to...would prove adequate given an investment in an IADS and sophisticated long-range air-to-air missiles (AAMs). If facing a threat operating the latest...platforms, weapons stocks , level of technology, logistic support, morale, C4I, and training levels of personnel. Credibility is simply about the

  19. A review of AirQ Models and their applications for forecasting the air pollution health outcomes.

    PubMed

    Oliveri Conti, Gea; Heibati, Behzad; Kloog, Itai; Fiore, Maria; Ferrante, Margherita

    2017-03-01

    Even though clean air is considered as a basic requirement for the maintenance of human health, air pollution continues to pose a significant health threat in developed and developing countries alike. Monitoring and modeling of classic and emerging pollutants is vital to our knowledge of health outcomes in exposed subjects and to our ability to predict them. The ability to anticipate and manage changes in atmospheric pollutant concentrations relies on an accurate representation of the chemical state of the atmosphere. The task of providing the best possible analysis of air pollution thus requires efficient computational tools enabling efficient integration of observational data into models. A number of air quality models have been developed and play an important role in air quality management. Even though a large number of air quality models have been discussed or applied, their heterogeneity makes it difficult to select one approach above the others. This paper provides a brief review on air quality models with respect to several aspects such as prediction of health effects.

  20. Postural threat influences vestibular-evoked muscular responses.

    PubMed

    Lim, Shannon B; Cleworth, Taylor W; Horslen, Brian C; Blouin, Jean-Sébastien; Inglis, J Timothy; Carpenter, Mark G

    2017-02-01

    Standing balance is significantly influenced by postural threat. While this effect has been well established, the underlying mechanisms of the effect are less understood. The involvement of the vestibular system is under current debate, and recent studies that investigated the effects of height-induced postural threat on vestibular-evoked responses provide conflicting results based on kinetic (Horslen BC, Dakin CJ, Inglis JT, Blouin JS, Carpenter MG. J Physiol 592: 3671-3685, 2014) and kinematic (Osler CJ, Tersteeg MC, Reynolds RF, Loram ID. Eur J Neurosci 38: 3239-3247, 2013) data. We examined the effect of threat of perturbation, a different form of postural threat, on coupling (cross-correlation, coherence, and gain) of the vestibulo-muscular relationship in 25 participants who maintained standing balance. In the "No-Threat" conditions, participants stood quietly on a stable surface. In the "Threat" condition, participants' balance was threatened with unpredictable mediolateral support surface tilts. Quiet standing immediately before the surface tilts was compared to an equivalent time from the No-Threat conditions. Surface EMG was recorded from bilateral trunk, hip, and leg muscles. Hip and leg muscles exhibited significant increases in peak cross-correlation amplitudes, coherence, and gain (1.23-2.66×) in the Threat condition compared with No-Threat conditions, and significant correlations were observed between threat-related changes in physiological arousal and medium-latency peak cross-correlation amplitude in medial gastrocnemius (r = 0.408) muscles. These findings show a clear threat effect on vestibular-evoked responses in muscles in the lower body, with less robust effects of threat on trunk muscles. Combined with previous work, the present results can provide insight into observed changes during balance control in threatening situations. This is the first study to show increases in vestibular-evoked responses of the lower body muscles under conditions

  1. "Advances in Linked Air Quality, Farm Management and Biogeochemistry Models to Address Bidrectional Ammonia Flux in CMAQ"

    EPA Science Inventory

    Recent increases in anthropogenic inputs of nitrogen to air, land and water media pose a growing threat to human health and ecosystems. Modeling of air-surface N flux is one area in need of improvement. Implementation of a linked air quality and cropland management system is de...

  2. Advances in Linked Air Quality, Farm Management and Biogeochemistry Models to Address Bidirectional Ammonia Flux in CMAQ

    EPA Science Inventory

    Recent increases in anthropogenic inputs of nitrogen to air, land and water media pose a growing threat to human health and ecosystems. Modeling of air-surface N flux is one area in need of improvement. Implementation of a linked air quality and cropland management system is de...

  3. Applications Using AIRS Data

    NASA Astrophysics Data System (ADS)

    Ray, S. E.; Pagano, T. S.; Fetzer, E. J.; Lambrigtsen, B.; Olsen, E. T.; Teixeira, J.; Licata, S. J.; Hall, J. R.; Thompson, C. K.

    2015-12-01

    The Atmospheric Infrared Sounder (AIRS) on NASA's Aqua spacecraft has been returning daily global observations of Earth's atmospheric constituents and properties since 2002. With a 12-year data record and daily, global observations in near real-time, AIRS data can play a role in applications that fall under many of the NASA Applied Sciences focus areas. For vector-borne disease, research is underway using AIRS near surface retrievals to assess outbreak risk, mosquito incubation periods and epidemic potential for dengue fever, malaria, and West Nile virus. For drought applications, AIRS temperature and humidity data are being used in the development of new drought indicators and improvement in the understanding of drought development. For volcanic hazards, new algorithms using AIRS data are in development to improve the reporting of sulfur dioxide concentration, the burden and height of volcanic ash and dust, all of which pose a safety threat to aircraft. In addition, anomaly maps of many of AIRS standard products are being produced to help highlight "hot spots" and illustrate trends. To distribute it's applications imagery, AIRS is leveraging existing NASA data frameworks and organizations to facilitate archiving, distribution and participation in the BEDI. This poster will communicate the status of the applications effort for the AIRS Project and provide examples of new maps designed to best communicate the AIRS data.

  4. Health Effects of Ambient Air Pollution in Developing Countries

    PubMed Central

    Mannucci, Pier Mannuccio; Franchini, Massimo

    2017-01-01

    The deleterious effects of ambient air pollution on human health have been consistently documented by many epidemiologic studies worldwide, and it has been calculated that globally at least seven million deaths are annually attributable to the effects of air pollution. The major air pollutants emitted into the atmosphere by a number of natural processes and human activities include nitrogen oxides, volatile organic compounds, and particulate matter. In addition to the poor ambient air quality, there is increasing evidence that indoor air pollution also poses a serious threat to human health, especially in low-income countries that still use biomass fuels as an energy resource. This review summarizes the current knowledge on ambient air pollution in financially deprived populations. PMID:28895888

  5. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  6. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model.

    PubMed

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 ( N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 ( N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 ( N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 ( N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict.

  7. Threats: power, family mealtimes, and social influence.

    PubMed

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  8. The role of threats in animal cooperation

    PubMed Central

    Cant, Michael A.

    2011-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors—impact, accuracy and perception—that together determine the effectiveness of threats to induce cooperation. PMID:20798110

  9. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    DTIC Science & Technology

    2013-08-01

    potential threats present in this scene and explain the meaning and implications of these threats. You have two minutes to write a response...could be due to the nature of the tasks or to fatigue. Requiring Soldiers to write answers on multiple trials, and across similar tasks, might have...tasks will likely be significantly different from those experienced in the trainer. This would remove the writing requirement over multiple trials

  10. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  11. Insider Threat to Computer Security at Nuclear Facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    West, Rebecca Lynn

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  12. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  13. SEMINAR PUBLICATION: ORGANIC AIR EMISSIONS FROM WASTE MANAGEMENT FACILITIES

    EPA Science Inventory

    The organic chemicals contained in wastes processed during waste management operations can volatilize into the atmosphere and cause toxic or carcinogenic effects or contribute to ozone formation. Because air emissions from waste management operations pose a threat to human health...

  14. Conditioned social dominance threat: observation of others' social dominance biases threat learning.

    PubMed

    Haaker, Jan; Molapour, Tanaz; Olsson, Andreas

    2016-10-01

    Social groups are organized along dominance hierarchies, which determine how we respond to threats posed by dominant and subordinate others. The persuasive impact of these dominance threats on mental and physical well-being has been well described but it is unknown how dominance rank of others bias our experience and learning in the first place. We introduce a model of conditioned social dominance threat in humans, where the presence of a dominant other is paired with an aversive event. Participants first learned about the dominance rank of others by observing their dyadic confrontations. During subsequent fear learning, the dominant and subordinate others were equally predictive of an aversive consequence (mild electric shock) to the participant. In three separate experiments, we show that participants' eye-blink startle responses and amygdala reactivity adaptively tracked dominance of others during observation of confrontation. Importantly, during fear learning dominant vs subordinate others elicited stronger and more persistent learned threat responses as measured by physiological arousal and amygdala activity. Our results characterize the neural basis of learning through observing conflicts between others, and how this affects subsequent learning through direct, personal experiences. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  15. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    PubMed Central

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  16. Insular threat associations within taxa worldwide.

    PubMed

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  17. Credible threats and promises.

    PubMed

    McNamara, John M; Houston, Alasdair I

    2002-11-29

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest.

  18. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  19. Environmental Assessment Addressing the Expansion of Sortie-Operations at Moody Air Force Base, Georgia

    DTIC Science & Technology

    2012-08-01

    include the tactical delivery of air-to-ground munitions, laser designation of targets from ground and airborne platforms, and threat evasion. These...world events, which include the tactical delivery of air-to-ground munitions, laser designation of targets from ground and airborne platforms, and...Closure CAA Clean Air Act CAU Classic Associate Unit CEQ Council on Environmental Quality CFR Code of Federal Regulations CO carbon monoxide

  20. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. Copyright © 2016 Elsevier Inc. All rights reserved.

  1. Combat aircraft operations: Training requirements for the German Air Force tactical flying units and the noise problem

    NASA Astrophysics Data System (ADS)

    Jertz, W.

    1992-04-01

    The deterrence potential of an Air Force, and by that the capability to fulfill their mission in times of war, relies on threat oriented training in peacetime. Low level flying is a major tactical means to help aircrews reduce the anticipated threat imposed to them by enemy air defence systems to an acceptable degree. The demand for this capability applies also to air defence tasks against attacking fighter bombers. Military low level flying requires a high degree of proficiency, which can only be reached and maintained by constant training. A high performance level is then the key to air power. The possibilities for this kind of necessary training are restricted by superior demands concerning, amongst others, flying safety and environmental reasons. Too intensive restrictions might reduce the fighting capability of the wings to such an extent, that mission fulfillment could be seriously endangered.

  2. Insider Threat Mitigation Workshop Instructional Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  3. Psychoanalysis and the nuclear threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threatmore » to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.« less

  4. Linking terrestrial and marine conservation planning and threats analysis.

    PubMed

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  5. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  6. Global malaria connectivity through air travel.

    PubMed

    Huang, Zhuojie; Tatem, Andrew J

    2013-08-02

    Air travel has expanded at an unprecedented rate and continues to do so. Its effects have been seen on malaria in rates of imported cases, local outbreaks in non-endemic areas and the global spread of drug resistance. With elimination and global eradication back on the agenda, changing levels and compositions of imported malaria in malaria-free countries, and the threat of artemisinin resistance spreading from Southeast Asia, there is a need to better understand how the modern flow of air passengers connects each Plasmodium falciparum- and Plasmodium vivax-endemic region to the rest of the world. Recently constructed global P. falciparum and P.vivax malaria risk maps, along with data on flight schedules and modelled passenger flows across the air network, were combined to describe and quantify global malaria connectivity through air travel. Network analysis approaches were then utilized to describe and quantify the patterns that exist in passenger flows weighted by malaria prevalence. Finally, the connectivity within and to the Southeast Asia region where the threat of imported artemisinin resistance arising is highest, was examined to highlight risk routes for its spread. The analyses demonstrate the substantial connectivity that now exists between and from malaria-endemic regions through air travel. While the air network provides connections to previously isolated malarious regions, it is clear that great variations exist, with significant regional communities of airports connected by higher rates of flow standing out. The structures of these communities are often not geographically coherent, with historical, economic and cultural ties evident, and variations between P. falciparum and P. vivax clear. Moreover, results highlight how well connected the malaria-endemic areas of Africa are now to Southeast Asia, illustrating the many possible routes that artemisinin-resistant strains could take. The continuing growth in air travel is playing an important role in the

  7. Global malaria connectivity through air travel

    PubMed Central

    2013-01-01

    Background Air travel has expanded at an unprecedented rate and continues to do so. Its effects have been seen on malaria in rates of imported cases, local outbreaks in non-endemic areas and the global spread of drug resistance. With elimination and global eradication back on the agenda, changing levels and compositions of imported malaria in malaria-free countries, and the threat of artemisinin resistance spreading from Southeast Asia, there is a need to better understand how the modern flow of air passengers connects each Plasmodium falciparum- and Plasmodium vivax-endemic region to the rest of the world. Methods Recently constructed global P. falciparum and P.vivax malaria risk maps, along with data on flight schedules and modelled passenger flows across the air network, were combined to describe and quantify global malaria connectivity through air travel. Network analysis approaches were then utilized to describe and quantify the patterns that exist in passenger flows weighted by malaria prevalence. Finally, the connectivity within and to the Southeast Asia region where the threat of imported artemisinin resistance arising is highest, was examined to highlight risk routes for its spread. Results The analyses demonstrate the substantial connectivity that now exists between and from malaria-endemic regions through air travel. While the air network provides connections to previously isolated malarious regions, it is clear that great variations exist, with significant regional communities of airports connected by higher rates of flow standing out. The structures of these communities are often not geographically coherent, with historical, economic and cultural ties evident, and variations between P. falciparum and P. vivax clear. Moreover, results highlight how well connected the malaria-endemic areas of Africa are now to Southeast Asia, illustrating the many possible routes that artemisinin-resistant strains could take. Discussion The continuing growth in air

  8. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  9. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    PubMed

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  10. Assessing fear and anxiety in humans using the threat of predictable and unpredictable aversive events (the NPU-threat test)

    PubMed Central

    Schmitz, Anja; Grillon, Christian

    2012-01-01

    The threat of predictable and unpredictable aversive events was developed to assess short-duration (fear) and long-duration (anxiety) aversive states in humans. A typical experiment consists of three conditions: a safe condition (neutral (N)), during which participants are safe from aversive stimuli, and two threat conditions—one in which aversive events are administered predictably (P) (i.e., signaled by a threat cue), and one in which aversive stimuli are administered unpredictably (U). During the so-called NPU -threat test, ongoing change in aversive states is measured with the startle reflex. The NPU -threat test has been validated in pharmacological and clinical studies and can be implemented in children and adults. Similar procedures have been applied in animal models, making the NPU -threat test an ideal tool for translational research. The procedure is relatively short (35 min), simple to implement and generates consistent results with large effect sizes. PMID:22362158

  11. Stereotype threat can reduce older adults' memory errors.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  12. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  13. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  14. Toward a Framework for Conducting Ecoregional Threats Assessments

    Treesearch

    Jamison Ervin; Jeffrey Parrish

    2006-01-01

    Assessing threats to biodiversity is widely recognized as a critical step in conservation planning. While there have been recent advances in understanding how to assess threats at a site level, there has been relatively little consensus on how threats can be meaningfully assessed at an ecoregional scale. Drawing from numerous threat assessment studies, this paper...

  15. Cooperative measures to mitigate Asia-Pacific maritime conflicts.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chai, Wen-Chung

    2003-05-01

    The economies of East Asia are predominantly export based and, therefore, place special emphasis on the security of the sea lines of communication (SLOCs). Due to economic globalization, the United States shares these concerns. Cooperative measures by the concerned parties could reduce the potential for disruption by maritime conflicts. Primary threats against the SLOCs are disputes over the resources under the seas, disputes over some small island groups, disputes between particular parties (China-Taiwan and North-South Korea), or illegal activities like smuggling, piracy, or terrorism. This paper provides an overview on these threats, issue by issue, to identify common elements andmore » needed cooperation. Cooperation on other topics such as search and rescue, fisheries protection, and oil spill response may help support improved relations to prevent maritime conflicts. Many technologies can help support maritime cooperation, including improved communications links, tracking and emergency beacon devices, and satellite imaging. Appropriate technical and political means are suggested for each threat to the SLOCs.« less

  16. Does air pollution pose a public health problem for New Zealand?

    PubMed

    Scoggins, Amanda

    2004-02-01

    Air pollution is increasingly documented as a threat to public health and a major focus of regulatory activity in developed and developing countries. Air quality indicators suggest New Zealand has clean air relative to many other countries. However, media releases such as 'Christchurch wood fires pump out deadly smog' and 'Vehicle pollution major killer' have sparked public health concern regarding exposure to ambient air pollution, especially in anticipation of increasing emissions and population growth. Recent evidence is presented on the effects of air quality on health, which has been aided by the application of urban airshed models and Geographic Information Systems (GIS). Future directions for research into the effects of air quality on health in New Zealand are discussed, including a national ambient air quality management project: HAPINZ--Health and Air Pollution in New Zealand.

  17. Stereotype threat affects financial decision making.

    PubMed

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  18. Stereotype threat can reduce older adults' memory errors

    PubMed Central

    Barber, Sarah J.; Mather, Mara

    2014-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment (Seibt & Förster, 2004). Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 & 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well. PMID:24131297

  19. Securing the Aviation Transportation System

    DTIC Science & Technology

    2007-12-01

    accessed 27 May 2007) 13 Robert W. Poole, Jr., “ Airport Security : Time for a New Model,” Reason Foundation online article, January 2006, Available from...15 Robert W. Poole, Jr., “ Airport Security : Time for a New Model,” Reason Foundation online article, January 2006...commercial jetliners. 24 Peter St. John, Air Piracy, Airport Security , and International Terrorism

  20. Bio-threat preparedness: Need for a paradigm shift.

    PubMed

    Jindal, A K; Roy, Kaushik

    2014-04-01

    India of late has been vulnerable to Chemical, Biological, Radiological and Nuclear (CBRN) threat, on account of its unique geographic position. Biological threat is an imminent threat in the hands of a terrorist. The public health system of our country is overburdened due to its present role and bio-attack response is not a priority area. This paper suggests that as the prime focus is on the CR and N threats in the integrated CBRN preparedness strategy and that specialized and technical forces are needed to deal with a bio-threat; hence there is a need for a paradigm shift in policy. The emerging field of bio-threat needs to be delinked from the joint family of 'CBRN', with consequent structural and functional changes. A separate specialized cadre needs to be formed for dealing with bio-threat, created from the pool of doctors and non-medical scientists from the AFMS and the DRDO. Structural changes are needed in the organization, to bring in the resources of NCDC, New Delhi for enhanced disease surveillance capacity and creation of a bio-threat mitigation node in the AFMC, Pune.

  1. Are Older Adults Perceived as A Threat to Society? Exploring Perceived Age-Based Threats in 29 Nations.

    PubMed

    Ayalon, Liat

    2017-08-05

    The present study adds to the current body of literature by simultaneously examining the public perception of young and old people as posing realistic threats (e.g., to the group's power, resources, and welfare) and symbolic threats (e.g., to one's world view, belief system and values). The fourth wave of the European Social Survey was administered to individuals from 29 countries. Analysis is based on 56,170 individuals, who had data on the four relevant indicators. The study relied on a latent profile analysis to develop a typology of perceived realistic and symbolic threats to society by younger and older adults. A three-profile solution indicated that the perception of older and younger adults as threats to society often co-occurs. Sociodemographic characteristics at the individual-level and the Gini coefficient (e.g., an inequality indicator) at the country-level had differential associations with the profiles identified. The study calls for a more balanced approach which evaluates attitudes toward both younger and older adults as potential sources of threat. Attention should be paid to individual- and national-level characteristics associated with age-based threats (e.g., the perception of a group, defined by its chronological age, as threatening). © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  2. Air Defense Options for Taiwan: An Assessment of Relative Costs and Operational Benefits

    DTIC Science & Technology

    2016-01-01

    and analyzes them in comparison to current People’s Liberation Army ( PLA ) capabilities. It begins with a description of the PLA air- power threat and... PLA ) to easily counter. Still, air defense in a major war is only one possible category of demands for Taiwan’s air defenses. A variety of more-limited...high, the PLA could check Taiwan’s fighter aircraft if it chose. However, in coercive scenarios that feature very constrained use of force, Taiwan’s

  3. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  4. How you perceive threat determines your behavior

    PubMed Central

    Fernandes, Orlando; Portugal, Liana C. L.; Alves, Rita C. S.; Campagnoli, Rafaela R.; Mocaiber, Izabela; David, Isabel P. A.; Erthal, Fátima C. S.; Volchan, Eliane; de Oliveira, Leticia; Pereira, Mirtes G.

    2013-01-01

    The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT) paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed toward the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during directed toward threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, directed away threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by threat stimuli directed toward the observer. In sum, our data support the concept that emotions are indeed action tendencies. PMID:24115925

  5. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    PubMed

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  6. When and Why Threats Go Undetected: Impacts of Event Rate and Shift Length on Threat Detection Accuracy During Airport Baggage Screening.

    PubMed

    Meuter, Renata F I; Lacherez, Philippe F

    2016-03-01

    We aimed to assess the impact of task demands and individual characteristics on threat detection in baggage screeners. Airport security staff work under time constraints to ensure optimal threat detection. Understanding the impact of individual characteristics and task demands on performance is vital to ensure accurate threat detection. We examined threat detection in baggage screeners as a function of event rate (i.e., number of bags per minute) and time on task across 4 months. We measured performance in terms of the accuracy of detection of Fictitious Threat Items (FTIs) randomly superimposed on X-ray images of real passenger bags. Analyses of the percentage of correct FTI identifications (hits) show that longer shifts with high baggage throughput result in worse threat detection. Importantly, these significant performance decrements emerge within the first 10 min of these busy screening shifts only. Longer shift lengths, especially when combined with high baggage throughput, increase the likelihood that threats go undetected. Shorter shift rotations, although perhaps difficult to implement during busy screening periods, would ensure more consistently high vigilance in baggage screeners and, therefore, optimal threat detection and passenger safety. © 2015, Human Factors and Ergonomics Society.

  7. Plants for Sustainable Improvement of Indoor Air Quality.

    PubMed

    Brilli, Federico; Fares, Silvano; Ghirardo, Andrea; de Visser, Pieter; Calatayud, Vicent; Muñoz, Amalia; Annesi-Maesano, Isabella; Sebastiani, Federico; Alivernini, Alessandro; Varriale, Vincenzo; Menghini, Flavio

    2018-06-01

    Indoor pollution poses a serious threat to human health. Plants represent a sustainable but underexploited solution to enhance indoor air quality. However, the current selection of plants suitable for indoors fails to consider the physiological processes and mechanisms involved in phytoremediation. Therefore, the capacity of plants to remove indoor air pollutants through stomatal uptake (absorption) and non-stomatal deposition (adsorption) remains largely unknown. Moreover, the effects of the indoor plant-associated microbiome still need to be fully analyzed. Here, we discuss how a combination of the enhanced phytoremediation capacity of plants together with cutting-edge air-cleaning and smart sensor technologies can improve indoor life while reducing energy consumption. Copyright © 2018 Elsevier Ltd. All rights reserved.

  8. The Coercive Efficacy of Air Exclusion Zones: Myth or Reality

    DTIC Science & Technology

    2012-06-01

    use force and such threats lacked credibility. The lack of intervention by the international community in other Arab nations may have reinforced such...those of the author. They do not reflect the official position of the US Government, Department of Defense, the United States Air Force, or Air...security. We do not seek the destruction of Iraq, its culture, or its people. Rather, we seek an Iraq that uses its great resources not to destroy, not to

  9. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  10. Wilderness science in a time of change conference-Volume 5: Wilderness ecosystems, threats, and management; 1999 May 23-27; Missoula, MT

    Treesearch

    David N. Cole; Stephen F. McCool; William T. Borrie; Jennifer O' Loughlin

    2000-01-01

    Forty-six papers are presented on the nature and management of threats to wilderness ecosystems. Five overview papers synthesize knowledge and research on wilderness fire, recreation impacts, livestock in wilderness, nonnative invasive plants, and wilderness air quality. Other papers contain the results of specific research projects on wilderness recreation impacts and...

  11. Technosocial Modeling of IED Threat Scenarios and Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiationmore » of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.« less

  12. How to test the threat-simulation theory.

    PubMed

    Revonsuo, Antti; Valli, Katja

    2008-12-01

    Malcolm-Smith, Solms, Turnbull and Tredoux [Malcolm-Smith, S., Solms, M.,Turnbull, O., & Tredoux, C. (2008). Threat in dreams: An adaptation? Consciousness and Cognition, 17, 1281-1291.] have made an attempt to test the Threat-Simulation Theory (TST), a theory offering an evolutionary psychological explanation for the function of dreaming [Revonsuo, A. (2000a). The reinterpretation of dreams: An evolutionary hypothesis of the function of dreaming. Behavioral and Brain Sciences, 23(6), 877-901]. Malcolm-Smith et al. argue that empirical evidence from their own study as well as from some other studies in the literature does not support the main predictions of the TST: that threatening events are frequent and overrepresented in dreams, that exposure to real threats activates the threat-simulation system, and that dream threats contain realistic rehearsals of threat avoidance responses. Other studies, including our own, have come up with results and conclusions that are in conflict with those of Malcolm-Smith et al. In this commentary, we provide an analysis of the sources of these disagreements, and their implications to the TST. Much of the disagreement seems to stem from differing interpretations of the theory and, consequently, of differing methods to test it.

  13. Security threats categories in healthcare information systems.

    PubMed

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  14. Users Guide for the Anvil Threat Corridor Forecast Tool V1.7.0 for AWIPS

    NASA Technical Reports Server (NTRS)

    Bauman, William H., III

    2007-01-01

    landing facilities at the Kennedy Space Center (KSC) and Cape Canaveral Air Force Station (CCAFS) and beyond. The anvil clouds were generated around 1930 UTC (1430 EDT) by thunderstorm activity over central Florida and transported 90 n mi east-northeastward within 2 hours, as diagnosed by the anvil forecast tool. Phase III, delivered in February 2003, built upon the results of Phase II by enhancing the Anvil Threat Sector Tool with the capability to use national model forecast winds for depiction of potential anvil lengths and orientations over the KSC/CCAFS area with lead times from 3 through 168 hours (7 days). In September 2003, AMU customers requested the capability to use data from the KSC 50 MHz Doppler Radar Wind Profiler (DRWP) in the Anvil Threat Sector Tool and this capability was delivered by the AMU in December 2003. In March 2005, the AMU was tasked to migrate the MIDDS Anvil Threat Sector Tool capabilities onto the Advanced Weather Interactive Processing System (AWIPS) as the Anvil Threat Corridor Forecast Tool.

  15. The Perceived Threat of Affirmative Action Policy

    DTIC Science & Technology

    1975-06-06

    as- sumption was made that affirmative action threat was a phenomenon which was separate and distinct from general racial feelings. The...the respond- ents. However, affirmative action threat was found to be differentially related to general racial feelings at the .001 confidence...level. Thus, affirmative action threat feelings were not independent from general racial feelings. Based on the findings of this study, it was

  16. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... threat; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... SECURITY: GENERAL RULES Security Threat Assessments § 1540.205 Procedures for security threat assessment...

  17. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart. (a...

  18. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  19. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    PubMed Central

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  20. Brazilian obligatory subterranean fauna and threats to the hypogean environment

    PubMed Central

    Gallão, Jonas Eduardo; Bichuette, Maria Elina

    2018-01-01

    Abstract The subterranean environment harbors species that are not capable of establishing populations in the epigean environment, i.e., the obligatory subterranean species. These organisms live in a unique selective regime in permanent darkness and usually low food availability, high air humidity in terrestrial habitats, and low temperature range allied to other unique conditions related to lithologies and past climatic influences. The pressure to increase Brazil’s economic growth relies on agricultural/pastoral industries and exporting of raw materials such as iron, limestone, ethanol, soybean, cotton, and meat, as well as huge reservoir constructions to generate electricity. Mining (even on a small scale), agricultural expansion, and hydroelectric projects are extremely harmful to subterranean biodiversity, via the modification and even destruction of hypogean habitats. The Brazilian subterranean species were analyzed with respect to their distributions, presence on the IUCN Red List, and current and potential threats to hypogean habitats. A map and three lists are presented, one with the described obligatory subterranean species, one with undescribed taxa, and one with the current and potential threats to the hypogean environment. To date, 150 obligatory subterranean species have been recorded in Brazil, plus at least 156 undescribed troglomorphic taxa, totaling 306 Brazilian troglobites/obligatory cave fauna. We also analyzed the current and potential cave threats and the conservation actions that are underway to attempt to compensate for loss of these habitats. In according to the Brazilian legislation (Decree 6640) only caves of maximum relevance are fully protected. One strategy to protect the subterranean fauna of Brazil is the inclusion of these species in the IUCN Red List (one of attributes that determines maximum relevance for caves); however, one of the IUCN assumptions is that the taxa must be formally described. It is clear that the description

  1. Stereotype threat lowers older adults’ self-reported hearing abilities

    PubMed Central

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  2. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    PubMed

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  3. Childhood maltreatment and threats with weapons.

    PubMed

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  4. How the USAF Can Lose the Next War Losing Air Superiority

    DTIC Science & Technology

    2009-04-01

    Richard Hawley, then commander of ACC, said in 1998 that “the F-15 will not be able to operate effectively against upcoming threats such as four...Budge Battle” 37 LockheedMartin.com 38 Dougherty, “Defense Suppression”, 18 39 Vallance , “RAF Operations in the Gulf War”, 31 40 GAO Report, “Combat...Accounting Office, “Combat Air Power: Funding Priority for Suppression of Enemy Air Defenses May be Too Low”, October 1996 Vallance , Group Capt

  5. Environmental Assessment: Proposed Construction of Air Force Non-Appropriated Funds Bowling Center at Maxwell Air Force Base, Gunter Annex

    DTIC Science & Technology

    2004-04-01

    indicates that the total residual gasoline constituents (Benzene, Toluene, Ethylbenzene, and Xylene [BTEX] and methyl tertiary butyl ether [MTBE]) are...mean sea level MTBE methyl tertiary butyl ether MW monitoring well N/A Not Applicable NAAQS National Ambient Air Quality Standards NAF Non...Toluene, Ethylbenzene, and Xylene [BTEX] and methyl tertiary butyl ether [MTBE]) are below concentrations which pose a threat to human health and

  6. Stereotype Threat in Classroom Settings: The Interactive Effect of Domain Identification, Task Difficulty and Stereotype Threat on Female Students' Maths Performance

    ERIC Educational Resources Information Center

    Keller, Johannes

    2007-01-01

    Background: Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths…

  7. Threat-Detection and Attentional Bias to Threat in Women Recovered from Anorexia Nervosa: Neural Alterations in Extrastriate and Medial Prefrontal Cortices.

    PubMed

    Bang, Lasse; Rø, Øyvind; Endestad, Tor

    2017-03-01

    Behavioral studies have shown that anorexia nervosa (AN) is associated with attentional bias to general threat cues. The neurobiological underpinnings of attentional bias to threat in AN are unknown. This study investigated the neural responses associated with threat-detection and attentional bias to threat in AN. We measured neural responses to a dot-probe task, involving pairs of angry and neutral face stimuli, in 22 adult women recovered from AN and 21 comparison women. Recovered AN women did not exhibit a behavioral attentional bias to threat. In response to angry faces, recovered women showed significant hypoactivation in the extrastriate cortex. During attentional bias to angry faces, recovered women showed significant hyperactivation in the medial prefrontal cortex. This was because of significant deactivation in comparison women, which was absent in recovered AN women. Women recovered from AN are characterized by altered neural responses to threat cues. Copyright © 2016 John Wiley & Sons, Ltd and Eating Disorders Association. Copyright © 2016 John Wiley & Sons, Ltd and Eating Disorders Association.

  8. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    PubMed Central

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  9. Airborne Particulate Threat Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. governmentmore » agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing

  10. Fisk-based criteria to support validation of detection methods for drinking water and air.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonell, M.; Bhattacharyya, M.; Finster, M.

    2009-02-18

    This report was prepared to support the validation of analytical methods for threat contaminants under the U.S. Environmental Protection Agency (EPA) National Homeland Security Research Center (NHSRC) program. It is designed to serve as a resource for certain applications of benchmark and fate information for homeland security threat contaminants. The report identifies risk-based criteria from existing health benchmarks for drinking water and air for potential use as validation targets. The focus is on benchmarks for chronic public exposures. The priority sources are standard EPA concentration limits for drinking water and air, along with oral and inhalation toxicity values. Many contaminantsmore » identified as homeland security threats to drinking water or air would convert to other chemicals within minutes to hours of being released. For this reason, a fate analysis has been performed to identify potential transformation products and removal half-lives in air and water so appropriate forms can be targeted for detection over time. The risk-based criteria presented in this report to frame method validation are expected to be lower than actual operational targets based on realistic exposures following a release. Note that many target criteria provided in this report are taken from available benchmarks without assessing the underlying toxicological details. That is, although the relevance of the chemical form and analogues are evaluated, the toxicological interpretations and extrapolations conducted by the authoring organizations are not. It is also important to emphasize that such targets in the current analysis are not health-based advisory levels to guide homeland security responses. This integrated evaluation of chronic public benchmarks and contaminant fate has identified more than 200 risk-based criteria as method validation targets across numerous contaminants and fate products in drinking water and air combined. The gap in directly applicable values is

  11. Smoke and mirrors - the politics and culture of air pollution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    E. Melanie DuPuis

    2004-01-15

    From the coal factory chimneys in Manchester, England in the late nineteenth century to the smog hanging over Los Angeles, USA in the late twentieth century, air pollution has long been one of the greatest threats to our environment. In this important collection of original essays, the leading environmental scientists and social scientists examine the politics of air pollution policies and help us to understand the ways these policies have led to, idiosyncratic, effective, ineffective, and even disastrous choices about what we choose to put into and take out of the air. Offering historical, contemporary and cross-national perspectives, this volumemore » provides a refreshing new approach to understanding how air pollution policies have evolved over time.« less

  12. Combating the Insider Cyber Threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  13. Keeping Schools Safe through Threat Assessment

    ERIC Educational Resources Information Center

    Barton, Rhonda

    2008-01-01

    This article illustrates how effective a threat assessment program like the Mid-Valley Student Threat Assessment (STAT) program can be in dealing with violent and threatening students. STAT is a a regional system that draws together resources from schools, mental health agencies, law enforcement bureaus, and other youth-serving organizations in…

  14. Forensic age estimation in anti-piracy trials in Seychelles: Experiences and challenges faced.

    PubMed

    Gunawardena, S A; Liyanage, U A; Weeratna, J B; Mendis, N D N A; Perera, H J M; Jayasekara, R W; Fernando, R

    2017-01-01

    Forensic age estimation (FAE) was conducted using a multifactorial method on thirteen Somali detainees claiming juvenile status during the anti-piracy trials of the Seychelles Supreme Court in 2014/2015. A multidisciplinary team, comprising of four of the authors covering specialties in forensic medicine, forensic odontology and radiology, conducted the FAE using a five-stage protocol. Each detainee was interviewed with an interpreter and examined for disorders affecting dental/skeletal development and for assessment of genital development through Tanner staging. Dental maturity was assessed clinically and radiologically. Eruption stage was assessed using Olze et al. and mandibular third-molar maturity was assessed using Demirjian's classification. Skeletal maturity was assessed from hand-wrist X-rays according to Greulich & Pyle and from CT-clavicle according to Kellinghaus et al. and Schultz et al. Interpretation of findings was done using reference population data from similar ethnic and social backgrounds wherever possible. Final age-ranges were calculated by combining dental and clavicle maturity stages using the regression formula developed by Bassed et al. followed by a 10% correction factor. The team later testified on their findings under cross-examination. The protocol adopted by the authors increased the scientific validity of the findings and was useful in addressing cross-examination queries on exclusion of developmental disorders, ethnic/socioeconomic variability and maintaining chain of custody. Unforeseen jurisdictional and practical limitations were experienced but did not affect the outcome. Combining dental and clavicle developmental data provided the court with a much clearer picture on the likelihood of the detainees' juvenile status which emphasizes the importance of conducting more population studies using combinations of different developmental sites. The authors note that available reference data is mostly from affluent populations whereas

  15. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    PubMed

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  16. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  17. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... prevent completion of the threat assessment). (5) Gender. (6) Country of citizenship. (7) If the applicant... subpart remains valid for five years from the date that TSA issues a Determination of No Security Threat...

  18. Urgency to Assess the Health Impact of Ambient Air Pollution in China.

    PubMed

    Yang, Bo-Yi; Liu, Yimin; Hu, Li-Wen; Zeng, Xiao-Wen; Dong, Guang-Hui

    2017-01-01

    As the world's second-largest economy, China is going on suffering from environmental pollution, especially for ambient air pollution, which has become a major threat to public health; public awareness of the detrimental effects of air pollution on health is increasing-particularly in relation to haze days. Considering the nonlinear relationship of ambient air pollution exposure and health impacts, and the differences in specific sources of air pollution with those in North America and Europe, conducting health impact assessments of ambient air pollution in China has thus become an urgent task for public health practitioners. Systematic review of the health effects of exposure to ambient air pollution from quantitative studies conducted in Chinese could provide vital information for epidemiology-based health impact assessments and the implementation of a national environmental protection policy.

  19. Stereotype Threat Alters the Subjective Experience of Memory.

    PubMed

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  20. United States Air Force Posture Statement 2004

    DTIC Science & Technology

    2004-05-24

    warfighting effort from planning to execution. Air, ground, maritime, and space forces worked together at the same time for the same objectives, not merely...nation, the growing nexus of radicalism and technology. As we continue our work in Afghanistan and Iraq, we stand ready to respond to flashpoints...their potential application in future threats, the mere maintenance of our aging aircraft and space systems will not suffice. Simply stated, our

  1. Pictures cueing threat: brain dynamics in viewing explicitly instructed danger cues

    PubMed Central

    Schupp, Harald T.

    2012-01-01

    Recent event-related brain potential studies revealed the selective processing of emotional and threatening pictures. Integrating the picture viewing and threat-of-shock paradigm, the present study examined the processing of emotional pictures while they were explicitly instructed to cue threat of real world danger (i.e. electric shocks). Toward this end, 60 pleasant, neutral and unpleasant IAPS-pictures were presented (1 s) as a continuous random stream while high-density EEG and self-reported threat were assessed. In three experimental runs, each picture category was used once as a threat-cue, whereas in the other conditions the same category served as safety-cue. An additional passive viewing run served as a no-threat condition, thus, establishing a threat–safety continuum (threat-cue–safety-cue–no-threat) for each picture category. Threat-of-shock modulated P1, P2 and parieto-occipital LPP amplitudes. While the P1 component differentiated among threat- and no-threat conditions, the P2 and LPP effects were specific to pictures signaling threat-of-shock. Thus, stimulus processing progressively gained more accurate information about environmental threat conditions. Interestingly, the finding of increased EPN and centro-parietal LPP amplitudes to emotional pictures was independent from threat-of-shock manipulation. Accordingly, the results indicate distinct effects associated with the intrinsic significance of emotional pictures and explicitly instructed threat contingencies. PMID:21719425

  2. Face processing in adolescents with positive and negative threat bias.

    PubMed

    Sylvester, C M; Petersen, S E; Luby, J L; Barch, D M

    2017-04-01

    Individuals with anxiety disorders exhibit a 'vigilance-avoidance' pattern of attention to threatening stimuli when threatening and neutral stimuli are presented simultaneously, a phenomenon referred to as 'threat bias'. Modifying threat bias through cognitive retraining during adolescence reduces symptoms of anxiety, and so elucidating neural mechanisms of threat bias during adolescence is of high importance. We explored neural mechanisms by testing whether threat bias in adolescents is associated with generalized or threat-specific differences in the neural processing of faces. Subjects were categorized into those with (n = 25) and without (n = 27) threat avoidance based on a dot-probe task at average age 12.9 years. Threat avoidance in this cohort has previously been shown to index threat bias. Brain response to individually presented angry and neutral faces was assessed in a separate session using functional magnetic resonance imaging. Adolescents with threat avoidance exhibited lower activity for both angry and neutral faces relative to controls in several regions in the occipital, parietal, and temporal lobes involved in early visual and facial processing. Results generalized to happy, sad, and fearful faces. Adolescents with a prior history of depression and/or an anxiety disorder had lower activity for all faces in these same regions. A subset of results replicated in an independent dataset. Threat bias is associated with generalized, rather than threat-specific, differences in the neural processing of faces in adolescents. Findings may aid in the development of novel treatments for anxiety disorders that use attention training to modify threat bias.

  3. Eastern forest environmental threat assessment center

    Treesearch

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  4. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  5. Working memory regulates trait anxiety-related threat processing biases.

    PubMed

    Booth, Robert W; Mackintosh, Bundy; Sharma, Dinkar

    2017-06-01

    High trait anxious individuals tend to show biased processing of threat. Correlational evidence suggests that executive control could be used to regulate such threat-processing. On this basis, we hypothesized that trait anxiety-related cognitive biases regarding threat should be exaggerated when executive control is experimentally impaired by loading working memory. In Study 1, 68 undergraduates read ambiguous vignettes under high and low working memory load; later, their interpretations of these vignettes were assessed via a recognition test. Trait anxiety predicted biased interpretation of social threat vignettes under high working memory load, but not under low working memory load. In Study 2, 53 undergraduates completed a dot probe task with fear-conditioned Japanese characters serving as threat stimuli. Trait anxiety predicted attentional bias to the threat stimuli but, again, this only occurred under high working memory load. Interestingly however, actual eye movements toward the threat stimuli were only associated with state anxiety, and this was not moderated by working memory load, suggesting that executive control regulates biased threat-processing downstream of initial input processes such as orienting. These results suggest that cognitive loads can exacerbate trait anxiety-related cognitive biases, and therefore represent a useful tool for assessing cognitive biases in future research. More importantly, since biased threat-processing has been implicated in the etiology and maintenance of anxiety, poor executive control may be a risk factor for anxiety disorders. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. EPA Awards $25K Grant to Lewiston, Maine Non-profit for Indoor Air Quality Efforts

    EPA Pesticide Factsheets

    A non-profit in Lewiston, Maine, has received $25,000 from the US Environmental Protection Agency to reduce health threats caused by poor indoor air quality, including radon indoors, mold and secondhand smoke.

  7. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    PubMed Central

    Zhang, Tianyang; Xi, Sisi; Jin, Yan; Wu, Yanhong

    2017-01-01

    Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1). Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2). The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming. PMID:29081755

  8. Pervasive competition between threat and reward in the brain

    PubMed Central

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip

    2014-01-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the ‘salience hypothesis’, in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the ‘competition hypothesis’, the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. PMID:23547242

  9. Controlling Indoor Air Pollution from Moxibustion

    PubMed Central

    Lu, Chung-Yen; Kang, Sy-Yuan; Liu, Shu-Hui; Mai, Cheng-Wei; Tseng, Chao-Heng

    2016-01-01

    Indoor air quality (IAQ) control of hospitals plays a critical role in protecting both hospital staffs and patients, particularly those who are highly susceptible to the adverse effects of indoor noxious hazards. However, moxibustion in outpatient departments (OPDs) of traditional Chinese medicine (TCM) may be a source of indoor air pollution in hospitals. Some studies have investigated indoor air pollution during moxibustion in Chinese medicine clinics (CMCs) and moxibustion rooms, demonstrating elevated air pollutants that pose a threat to the health of medical staff and patients. Our study investigated the indoor air pollutants of indoor carbon dioxide (CO2), carbon monoxide (CO), formaldehyde (HCHO), total volatile organic compounds (TVOCs), airborne particulate matter with a diameter of ≤10 µm (PM10) and ≤2.5 µm (PM2.5) during moxibustion in an acupuncture and moxibustion room of the OPD in a hospital in Taipei. To evaluate the different control strategies for indoor air pollution from moxibution, a comparison of air pollutants during moxibution among the methods of using alternative old moxa wools, local exhaust ventilation and an air cleaner was conducted. In this study, burning alternative old moxa wools for moxibustion obviously reduced all gaseous pollutants except for aerosols comparing burning fresh moxa wools. Using local exhaust ventilation reduced most of the aerosols after burning moxa. We also found that using an air cleaner was inefficient for controlling indoor air pollutants, particularly gaseous pollutants. Therefore, combining replacing alternative old moxa wools and local exhaust ventilation could be a suitable design for controlling indoor air pollution during moxibustion therapy. PMID:27331817

  10. Controlling Indoor Air Pollution from Moxibustion.

    PubMed

    Lu, Chung-Yen; Kang, Sy-Yuan; Liu, Shu-Hui; Mai, Cheng-Wei; Tseng, Chao-Heng

    2016-06-20

    Indoor air quality (IAQ) control of hospitals plays a critical role in protecting both hospital staffs and patients, particularly those who are highly susceptible to the adverse effects of indoor noxious hazards. However, moxibustion in outpatient departments (OPDs) of traditional Chinese medicine (TCM) may be a source of indoor air pollution in hospitals. Some studies have investigated indoor air pollution during moxibustion in Chinese medicine clinics (CMCs) and moxibustion rooms, demonstrating elevated air pollutants that pose a threat to the health of medical staff and patients. Our study investigated the indoor air pollutants of indoor carbon dioxide (CO₂), carbon monoxide (CO), formaldehyde (HCHO), total volatile organic compounds (TVOCs), airborne particulate matter with a diameter of ≤10 µm (PM10) and ≤2.5 µm (PM2.5) during moxibustion in an acupuncture and moxibustion room of the OPD in a hospital in Taipei. To evaluate the different control strategies for indoor air pollution from moxibution, a comparison of air pollutants during moxibution among the methods of using alternative old moxa wools, local exhaust ventilation and an air cleaner was conducted. In this study, burning alternative old moxa wools for moxibustion obviously reduced all gaseous pollutants except for aerosols comparing burning fresh moxa wools. Using local exhaust ventilation reduced most of the aerosols after burning moxa. We also found that using an air cleaner was inefficient for controlling indoor air pollutants, particularly gaseous pollutants. Therefore, combining replacing alternative old moxa wools and local exhaust ventilation could be a suitable design for controlling indoor air pollution during moxibustion therapy.

  11. Interactions between stereotype threat, subjective aging, and memory in older adults.

    PubMed

    Marquet, Manon; Missotten, Pierre; Dardenne, Benoit; Adam, Stéphane

    2017-12-08

    This study examined whether the effects of stereotype threat on memory and subjective age were moderated by positive age stereotypes and self-perceptions of aging among older adults. Perceived threat as a mechanism underlying these effects was also explored. Results showed that stereotype threat (high vs. low threat) did not affect the dependent variables. Moreover, self-perceptions of aging did not moderate the effect of stereotype threat on the dependent variables. However, for people with more positive age stereotypes, older people under highthreat perceived more threat than people under low threat. This could be explained by an effect of age stereotypes in the high-threat group: the more positive age stereotypes held by participants, the more they perceived threat, which in turn decreased their memory performance and made them feel mentally older. We hypothesized that age group identity is stronger in people with more positive age stereotypes, which increase perceived threat.

  12. An examination of stereotype threat effects on girls' mathematics performance.

    PubMed

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias.

  13. Identity threat and stigma in cancer patients

    PubMed Central

    Marziliano, Allison; Moyer, Anne

    2014-01-01

    Cancer stigma has undergone an important transformation in recent decades. In general, this disease no longer fits squarely into Goffman’s classic taxonomy of stigmatized conditions. This review will demonstrate that, with important adaptations, an identity-threat model of stigma can be used to organize cancer stigma research post-Goffman. This adapted model postulates that one’s personal attributions, responses to situational threat, and disease/treatment characteristics can be used to predict identity threat and well-being of individuals with cancer. Implications for further research and clinical practice are discussed. PMID:28070343

  14. You may worry, but can you recognize threats when you see them?; Neuroticism, threat identifications, and negative affect.

    PubMed

    Tamir, Maya; Robinson, Michael D; Solberg, Emily Crawford

    2006-10-01

    The present studies sought to investigate the hedonic consequences of threat-identification skills at low and high levels of neuroticism. Such skills were assessed in terms of both speed (Study 1) and accuracy (Study 2) of identifying threatening objects in cognitive tasks. As predicted, threat-identification skills interacted with trait neuroticism in predicting subjective experiences. Specifically, individuals high in neuroticism experienced lower levels of negative affect during their everyday lives if they were also skilled in identifying threats in the cognitive tasks (Studies 1-2). Such skills did not matter at low levels of neuroticism. This interactive pattern was also replicated in the context of life domain satisfaction (Study 2). The results support the view that avoidance motivation encompasses multiple component processes, including some that are cognitive in nature, and specifically extends self-regulatory views of neuroticism. Of most importance, our data indicate that threat-identification skills can be hedonically beneficial, rather than costly, at high levels of neuroticism.

  15. Communicating Homeland Security Threats: Government and Public Efforts

    DTIC Science & Technology

    2010-12-01

    States has never operated at a threat level lower than blue - guarded risk. The Homeland Security Advisory Council’s primary recommendations included...changing the alert level baseline to blue (guarded risk). Their rationale for resetting the threat level baseline includes acknowledging that a...accustomed to the guarded blue level indicative of a general threat of terrorist attack. To assume that public officials and citizens would ever

  16. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  17. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  18. Pervasive competition between threat and reward in the brain.

    PubMed

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  19. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    PubMed

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  20. Attention Training and the Threat Bias: An ERP Study

    PubMed Central

    O’Toole, Laura; Dennis, Tracy A.

    2011-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these changes remain unclear. To address this issue, 49 non-anxious adults were randomly assigned to either attentional training toward or training away from threat using a modified version of the dot probe task. Behavioral measures of attentional biases were also generated pre- and post-training using the dot probe task. Event-related potentials (ERPs) were generated to threat and non-threat face pairs and probes during pre- and post-training assessments. Effects of training on behavioral measures of the threat bias were significant, but only for those participants showing pre-training biases. Attention training also influenced early spatial attention, as measured by post-training P1 amplitudes to cues. Results illustrate the importance of taking pre-training attention biases in non-anxious individuals into account when evaluating the effects of attention training and tracking physiological changes in attention following training. PMID:22083026

  1. RISK ASSESSMENT OF OXIDANT GASES AND PARTICULATE AIR POLLUTANTS: UNCERTAINTIES AND RESEARCH NEEDS

    EPA Science Inventory

    The assessment of risks to human health associated with exposure to oxidant air pollutants has not received adequate attention despite the recognized public health threat posed by the ubiquitous presence of these compounds in the environment. n this article, research needs and un...

  2. Naval War College Review. Volume 63, Number 1, Winter 2010

    DTIC Science & Technology

    2010-01-01

    Impeccable Incident. Summer 2009:101–11 Raymond, Catherine Zara . Piracy and Armed Robbery in the Malacca Strait: A Problem Solved? Summer 2009:31–42...an Old Problem: Report of the Naval War College Workshop on Countering Maritime Piracy. Autumn 2009:141–54 Raymond, Catherine Zara . Piracy and Armed

  3. Stereotype threat in salary negotiations is mediated by reservation salary.

    PubMed

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  4. A combined emitter threat assessment method based on ICW-RCM

    NASA Astrophysics Data System (ADS)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  5. Threat facilitates subsequent executive control during anxious mood.

    PubMed

    Birk, Jeffrey L; Dennis, Tracy A; Shin, Lisa M; Urry, Heather L

    2011-12-01

    Dual competition framework (DCF) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance. To test these ideas directly, we examined the effects of low-level threat and experimentally induced anxiety on one executive control function, the efficiency of response inhibition. In Study 1, briefly presented stimuli that were mildly threatening (i.e., fearful faces) relative to nonthreatening (i.e., neutral faces) led to facilitated executive control efficiency during experimentally induced anxiety. No such effect was observed during an equally arousing, experimentally induced happy mood state. In Study 2, we assessed the effects of low-level threat, experimentally induced anxiety, and individual differences in trait anxiety on executive control efficiency. Consistent with Study 1, fearful relative to neutral faces led to facilitated executive control efficiency during experimentally induced anxiety. No such effect was observed during an experimentally induced neutral mood state. Moreover, individual differences in trait anxiety did not moderate the effects of threat and anxiety on executive control efficiency. The findings are partially consistent with the predictions of DCF in that low-level threat improved executive control, at least during a state of anxiety. (c) 2011 APA, all rights reserved.

  6. Development of a Laboratory for Improving Communication between Air Traffic Controllers and Pilots

    NASA Technical Reports Server (NTRS)

    Brammer, Anthony

    2003-01-01

    Runway incursions and other surface incidents are known to be significant threats to aviation safety and efficiency. Though the number of near mid-air collisions in U.S. air space has remained unchanged during the last five years, the number of runway incursions has increased and they are almost all due to human error. The three most common factors contributing to air traffic controller and pilot error in airport operations include two that involve failed auditory communication. This project addressed the problems of auditory communication in air traffic control from an acoustical standpoint, by establishing an acoustics laboratory designed for this purpose and initiating research into selected topics that show promise for improving voice communications between air traffic controllers and pilots.

  7. Left-Wing Extremism: The Current Threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders frommore » that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.« less

  8. Software Quality and Copyright: Issues in Computer-Assisted Instruction.

    ERIC Educational Resources Information Center

    Helm, Virginia

    The two interconnected problems of educational quality and piracy are described and analyzed in this book, which begins with an investigation of the accusations regarding the alleged dismal quality of educational software. The reality behind accusations of rampant piracy and the effect of piracy on the quality of educational software is examined…

  9. Development of the Academic Stereotype Threat Inventory

    ERIC Educational Resources Information Center

    Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.

    2008-01-01

    The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…

  10. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    .... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...

  11. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... (3) Date and place of birth. (4) Social security number (submission is voluntary, although failure to provide it may delay or prevent completion of the threat assessment). (5) Gender. (6) Country of... Border Protection. (i) If asserting completion of a comparable threat assessment listed in paragraph (h...

  12. Ambient Air Pollution and Morbidity in Chinese.

    PubMed

    Hu, Li-Wen; Lawrence, Wayne R; Liu, Yimin; Yang, Bo-Yi; Zeng, Xiao-Wen; Chen, Wen; Dong, Guang-Hui

    2017-01-01

    The rapid economic growth in China is coupled with a severe ambient air pollution, which poses a huge threat to human health and the sustainable development of social economy. The rapid urbanization and industrialization over the last three decades have placed China as one of countries with the greatest disease burden in world. Notably, the prevalence rate of chronic noncommunicable diseases (CND), including respiratory diseases, CVD, and stroke, in 2010 reaches 16.9%. The continuous growth of the incidence of CND urgent needs for effective regulatory action for health protection. This study aims to evaluate the impact of rapid urbanization on status of ambient air pollution and associated adverse health effects on the incidence and the burden of CND and risk assessment. Our findings would be greatly significant in the prediction of the risk of ambient air pollution on CND and for evidence-based policy making and risk management in China.

  13. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  14. Modelling ultraviolet threats

    NASA Astrophysics Data System (ADS)

    James, I.

    2016-10-01

    Electro-optically (EO) guided surface to air missiles (SAM) have developed to use Ultraviolet (UV) wavebands supplementary to the more common Infrared (IR) wavebands. Missiles such as the US Stinger have been around for some time but are not considered a proliferation risk. The Chinese FN-16 and Russian SA-29 (Verba) are considered a much higher proliferation risk. As a result, models of the missile seekers must be developed to understand the characteristics of the seeker and the potential performance enhancement that are included. Therefore, the purpose of this paper is to introduce the steps that have been taken to characterise and model these missiles. It begins by outlining some of the characteristics of the threats, the key elements of a UV scene, the potential choice of waveband for a detector, the initial modelling work to represent the UV detector of the missile and presents initial results. The modelling shows that the UV detection range of a typical aircraft is dependent on both the size of the aircraft and its reflectivity. However, the strength of this correlation is less than expected. As a result, further work is required to model more seeker types and to investigate what is causing the weak correlations found in these initial investigations. In addition, there needs to be further study of the sensitivities of the model to other variables, such as the modelled detectivity of the detector and the signal to noise ratio assumed. Overall, the outcome of this work will be to provide specifications for aircraft size and reflectivity that limit the effectiveness of the UV channels.

  15. Advanced Insider Threat Mitigation Workshop Instructional Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, Philip; Larsen, Robert; O'Brien, Mike

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing theirmore » effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.« less

  16. Implicit self-esteem compensation: automatic threat defense.

    PubMed

    Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly

    2007-11-01

    Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.

  17. Species co-occurrence analysis predicts management outcomes for multiple threats.

    PubMed

    Tulloch, Ayesha I T; Chadès, Iadine; Lindenmayer, David B

    2018-03-01

    Mitigating the impacts of global anthropogenic change on species is conservation's greatest challenge. Forecasting the effects of actions to mitigate threats is hampered by incomplete information on species' responses. We develop an approach to predict community restructuring under threat management, which combines models of responses to threats with network analyses of species co-occurrence. We discover that contributions by species to network co-occurrence predict their recovery under reduction of multiple threats. Highly connected species are likely to benefit more from threat management than poorly connected species. Importantly, we show that information from a few species on co-occurrence and expected responses to alternative threat management actions can be used to train a response model for an entire community. We use a unique management dataset for a threatened bird community to validate our predictions and, in doing so, demonstrate positive feedbacks in occurrence and co-occurrence resulting from shared threat management responses during ecosystem recovery.

  18. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    PubMed

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  19. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    PubMed Central

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2013-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat. PMID:22746674

  20. Stereotype threat can both enhance and impair older adults' memory.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  1. Urban air pollution in Sub-Saharan Africa: Time for action.

    PubMed

    Amegah, A Kofi; Agyei-Mensah, Samuel

    2017-01-01

    Air quality in cities of Sub-Saharan African (SSA) countries has deteriorated with the situation driven by rapid population growth and its attendant increased vehicle ownership, increased use of solid fuels for cooking and heating, and poor waste management practices. Industrial expansion in these cities is also a major contributor to the worsening air pollution. Exposure to ambient air pollution is a major threat to human health in SSA with 176,000 deaths and 626,000 DALYs in the region attributable to ambient air pollution exposure. These estimates are however likely to be much higher than reported due to the limited data emanating from the region. Recently, the adoption of the World Health Assembly resolution on air pollution and health, and Sustainable Development Goals are a welcome boost for urban air pollution control efforts in SSA. In this article, we have outlined within the broad framework of these international policy instruments, measures for addressing urban air pollution and its associated health impacts in SSA sustainably. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  3. Quantifying a threat: Evidence of a numeric processing bias.

    PubMed

    Hamamouche, Karina A; Niemi, Laura; Cordes, Sara

    2017-06-01

    Humans prioritize the processing of threats over neutral stimuli; thus, not surprisingly, the presence of threats has been shown to alter performance on both perceptual and cognitive tasks. Yet whether the quantification process is disrupted in the presence of threat is unknown. In three experiments, we examined numerical estimation and discrimination abilities in adults in the context of threatening (spiders) and non-threatening (e.g., flowers) stimuli. Results of the numerical estimation task (Experiment 1) showed that participants underestimated the number of threatening relative to neutral stimuli. Additionally, numerical discrimination data reveal that participants' abilities to discriminate between the number of entities in two arrays were worsened when the arrays consisted of threatening entities versus neutral entities (Experiment 2). However, discrimination abilities were enhanced when threatening content was presented immediately before neutral dot arrays (Experiment 3). Together, these studies suggest that threats impact our processing of visual numerosity via changes in attention to numerical stimuli, and that the nature of the threat (intrinsic or extrinsic to the stimulus) is vital in determining the direction of this impact. Intrinsic threat content in stimuli impedes its own quantification; yet threat that is extrinsic to the sets to be enumerated enhances numerical processing for subsequently presented neutral stimuli. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Chapter 25: Pollution and Fishing Threats to Marbled Murrelets

    Treesearch

    D. Michael Fry

    1995-01-01

    The principal pollutant threats to Marbled Murrelets are chlorinated organic effluent discharges from chlorine bleach pulp mills located in California, Washington, and British Columbia. The distribution of murrelets away from riverine input of agricultural chemicals reduces the threat from these pollutants. Plastic ingestion does not appear to pose a serious threat to...

  5. Proliferation: Threat and response

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of thesemore » weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.« less

  6. Threat evaluation for impact assessment in situation analysis systems

    NASA Astrophysics Data System (ADS)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  7. Protecting the health of U.S. military forces in Romania: endemic disease threat considerations.

    PubMed

    Perkins, Dana

    2009-01-01

    In 2005 the United States and Romania signed a historic access agreement establishing the first U.S. military bases in the former Soviet bloc country of Romania. The bases will host joint exercises aimed at developing regional military cooperation with forces throughout the entire 92-country USEUCOM area of responsibility (AOR). These forward operating bases (FOBs) or "lily pads" will include the Smârdan Training Range, Babadag Training Range, Mihail Kogălniceanu (MK) Air Base, and Cincu Training Range. They will be under the command of Joint Task Force East (JTF-East), headquartered at the MK Air Base. Here described are the naturally occurring pathogens of clinical significance that exist in the region, including those of known biowarfare/bioterrorism (BW/BT) potential. Notwithstanding the length of deployment for training, proactive clinical and environmental surveillance should be linked to the implementation of adequate Force Health Protection (FHP) measures to minimize the impact these medical threats may have on JTF-East operations.

  8. Personality Correlates of Nuclear War Threat Perception.

    ERIC Educational Resources Information Center

    Mayton, Daniel M., II

    This study investigated the relationship between individual personality characteristics and the threat of nuclear war among 192 introductory psychology students at a small college in the Pacific Northwest. One measure of nuclear threat perception was spontaneous concern, which was assessed using five presentations each of the incomplete sentences,…

  9. Air quality modeling of selected aromatic and non-aromatic air toxics in the Houston urban and industrial airshed

    NASA Astrophysics Data System (ADS)

    Coarfa, Violeta Florentina

    2007-12-01

    Air toxics, also called hazardous air pollutants (HAPs), pose a serious threat to human health and the environment. Their study is important in the Houston area, where point sources, mostly located along the Ship Channel, mobile and area sources contribute to large emissions of such toxic pollutants. Previous studies carried out in this area found dangerous levels of different HAPs in the atmosphere. This thesis presents several studies that were performed for the aromatic and non-aromatic air toxics in the HGA. For these studies we developed several tools: (1) a refined chemical mechanism, which explicitly represents 18 aromatic air toxics that were lumped under two model species by the previous version, based on their reactivity with the hydroxyl radical; (2) an engineering version of an existing air toxics photochemical model that enables us to perform much faster long-term simulations compared to the original model, that leads to a 8--9 times improvement in the running time across different computing platforms; (3) a combined emission inventory based on the available emission databases. Using the developed tools, we quantified the mobile source impact on a few selected air toxics, and analyzed the temporal and spatial variation of selected aromatic and non-aromatic air toxics in a few regions within the Houston area; these regions were characterized by different emissions and environmental conditions.

  10. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    PubMed Central

    Pennington, Charlotte R.; McCann, Joseph J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females’ gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group’s ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females’ gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group’s gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat. PMID:29444126

  11. Identifying key conservation threats to Alpine birds through expert knowledge

    PubMed Central

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  12. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    PubMed

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  13. Prefrontal inhibition of threat processing reduces working memory interference

    PubMed Central

    Clarke, Robert; Johnstone, Tom

    2013-01-01

    Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM) task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modeling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesized that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat-related interference. PMID

  14. The wilderness threats matrix: A framework for assessing impacts

    Treesearch

    David N. Cole

    1994-01-01

    A comprehensive framework for assessing threats to wilderness is described. The framework is represented as a matrix of potential threats and attributes of wilderness character. Cells in the matrix represent the impacts of threats on each attribute. Potential applications of the matrix are described. An application of the matrix to the wildernesses in the Forest...

  15. Fractal Analysis of Air Pollutant Concentrations

    NASA Astrophysics Data System (ADS)

    Cortina-Januchs, M. G.; Barrón-Adame, J. M.; Vega-Corona, A.; Andina, D.

    2010-05-01

    Air pollution poses significant threats to human health and the environment throughout the developed and developing countries. This work focuses on fractal analysis of pollutant concentration in Salamanca, Mexico. The city of Salamanca has been catalogued as one of the most polluted cities in Mexico. The main causes of pollution in this city are fixed emission sources, such as chemical industry and electricity generation. Sulphur Dioxide (SO2) and Particulate Matter less than 10 micrometer in diameter (PM10) are the most important pollutants in this region. Air pollutant concentrations were investigated by applying the box counting method in time series obtained of the Automatic Environmental Monitoring Network (AEMN). One year of time series of hourly average concentrations were analyzed in order to characterize the temporal structures of SO2 and PM10.

  16. Vibrational spectroscopy standoff detection of threat chemicals

    NASA Astrophysics Data System (ADS)

    Ortiz-Rivera, William; Pacheco-Londoño, Leonardo C.; Castro-Suarez, John R.; Felix-Rivera, Hilsamar; Hernandez-Rivera, Samuel P.

    2011-06-01

    Spectroscopy based standoff detection systems: Raman and FTIR have been tested for detection of threat chemicals, including highly energetic materials, homemade explosives, explosives formulations and high explosives mixtures. Other threat chemicals studied included toxic industrial compounds (TIC) and chemical agent simulants. Microorganisms and biological threat agent simulants have also been detected at standoff distances. Open Path FTIR has been used to detect vapors and chemicals deposited on metal surfaces at μg/cm2 levels at distances as far as 30 m in active mode and 60 m in passive mode. In the case of Raman telescope, standoff distances for acetonitrile and ammonium nitrate were 140 m.

  17. Emerging oomycete threats to plants and animals

    PubMed Central

    Chaparro-Garcia, Angela

    2016-01-01

    Oomycetes, or water moulds, are fungal-like organisms phylogenetically related to algae. They cause devastating diseases in both plants and animals. Here, we describe seven oomycete species that are emerging or re-emerging threats to agriculture, horticulture, aquaculture and natural ecosystems. They include the plant pathogens Phytophthora infestans, Phytophthora palmivora, Phytophthora ramorum, Plasmopara obducens, and the animal pathogens Aphanomyces invadans, Saprolegnia parasitica and Halioticida noduliformans. For each species, we describe its pathology, importance and impact, discuss why it is an emerging threat and briefly review current research activities. This article is part of the themed issue ‘Tackling emerging fungal threats to animal health, food security and ecosystem resilience’. PMID:28080985

  18. Threat-Related Attention Bias Variability and Posttraumatic Stress.

    PubMed

    Naim, Reut; Abend, Rany; Wald, Ilan; Eldar, Sharon; Levi, Ofir; Fruchter, Eyal; Ginat, Karen; Halpern, Pinchas; Sipos, Maurice L; Adler, Amy B; Bliese, Paul D; Quartana, Phillip J; Pine, Daniel S; Bar-Haim, Yair

    2015-12-01

    Threat monitoring facilitates survival by allowing one to efficiently and accurately detect potential threats. Traumatic events can disrupt healthy threat monitoring, inducing biased and unstable threat-related attention deployment. Recent research suggests that greater attention bias variability, that is, attention fluctuations alternating toward and away from threat, occurs in participants with PTSD relative to healthy comparison subjects who were either exposed or not exposed to traumatic events. The current study extends findings on attention bias variability in PTSD. Previous measurement of attention bias variability was refined by employing a moving average technique. Analyses were conducted across seven independent data sets; in each, data on attention bias variability were collected by using variants of the dot-probe task. Trauma-related and anxiety symptoms were evaluated across samples by using structured psychiatric interviews and widely used self-report questionnaires, as specified for each sample. Analyses revealed consistent evidence of greater attention bias variability in patients with PTSD following various types of traumatic events than in healthy participants, participants with social anxiety disorder, and participants with acute stress disorder. Moreover, threat-related, and not positive, attention bias variability was correlated with PTSD severity. These findings carry possibilities for using attention bias variability as a specific cognitive marker of PTSD and for tailoring protocols for attention bias modification for this disorder.

  19. Fear-related behaviors in situations of mass threat

    PubMed Central

    Espinola, Maria; Shultz, James M.; Espinel, Zelde; Althouse, Benjamin M.; Cooper, Janice L.; Baingana, Florence; Marcelin, Louis Herns; Cela, Toni; Towers, Sherry; Mazurik, Laurie; Greene, M. Claire; Beck, Alyssa; Fredrickson, Michelle; McLean, Andrew; Rechkemmer, Andreas

    2016-01-01

    ABSTRACT This Disaster Health Briefing focuses on the work of an expanding team of researchers that is exploring the dynamics of fear-related behaviors in situations of mass threat. Fear-related behaviors are individual or collective behaviors and actions initiated in response to fear reactions that are triggered by a perceived threat or actual exposure to a potentially traumatizing event. Importantly, fear-related behaviors modulate the future risk of harm. Disaster case scenarios are presented to illustrate how fear-related behaviors operate when a potentially traumatic event threatens or endangers the physical and/or psychological health, wellbeing, and integrity of a population. Fear-related behaviors may exacerbate harm, leading to severe and sometimes deadly consequences as exemplified by the Ebola pandemic in West Africa. Alternatively, fear-related behaviors may be channeled in a constructive and life-saving manner to motivate protective behaviors that mitigate or prevent harm, depending upon the nature of the threat scenario that is confronting the population. The interaction between fear-related behaviors and a mass threat is related to the type, magnitude, and consequences of the population encounter with the threat or hazard. The expression of FRBs, ranging from risk exacerbation to risk reduction, is also influenced by such properties of the threat as predictability, familiarity, controllability, preventability, and intentionality. PMID:28265486

  20. Differential Brain Activation to Angry Faces by Elite Warfighters: Neural Processing Evidence for Enhanced Threat Detection

    PubMed Central

    Paulus, Martin P.; Simmons, Alan N.; Fitzpatrick, Summer N.; Potterat, Eric G.; Van Orden, Karl F.; Bauman, James; Swain, Judith L.

    2010-01-01

    Background Little is known about the neural basis of elite performers and their optimal performance in extreme environments. The purpose of this study was to examine brain processing differences between elite warfighters and comparison subjects in brain structures that are important for emotion processing and interoception. Methodology/Principal Findings Navy Sea, Air, and Land Forces (SEALs) while off duty (n = 11) were compared with n = 23 healthy male volunteers while performing a simple emotion face-processing task during functional magnetic resonance imaging. Irrespective of the target emotion, elite warfighters relative to comparison subjects showed relatively greater right-sided insula, but attenuated left-sided insula, activation. Navy SEALs showed selectively greater activation to angry target faces relative to fearful or happy target faces bilaterally in the insula. This was not accounted for by contrasting positive versus negative emotions. Finally, these individuals also showed slower response latencies to fearful and happy target faces than did comparison subjects. Conclusions/Significance These findings support the hypothesis that elite warfighters deploy greater processing resources toward potential threat-related facial expressions and reduced processing resources to non-threat-related facial expressions. Moreover, rather than expending more effort in general, elite warfighters show more focused neural and performance tuning. In other words, greater neural processing resources are directed toward threat stimuli and processing resources are conserved when facing a nonthreat stimulus situation. PMID:20418943

  1. Effects of threat management interactions on conservation priorities.

    PubMed

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  2. Health benefits from improved outdoor air quality and intervention in China.

    PubMed

    Li, Shanshan; Williams, Gail; Guo, Yuming

    2016-07-01

    China is at its most critical stage of outdoor air quality management. In order to prevent further deterioration of air quality and to protect human health, the Chinese government has made a series of attempts to reduce ambient air pollution. Unlike previous literature reviews on the widespread hazards of air pollution on health, this review article firstly summarized the existing evidence of human health benefits from intermittently improved outdoor air quality and intervention in China. Contents of this paper provide concrete and direct clue that improvement in outdoor air quality generates various health benefits in China, and confirm from a new perspective that it is worthwhile for China to shift its development strategy from economic growth to environmental economic sustainability. Greater emphasis on sustainable environment design, consistently strict regulatory enforcement, and specific monitoring actions should be regarded in China to decrease the health risks and to avoid long-term environmental threats. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. The Population Threat

    ERIC Educational Resources Information Center

    McNamara, Robert S.

    1969-01-01

    In an address delivered at the University of Notre Dame, May 1969, Secretary McNamara discussed the threat of unmanageable population pressure which is undervalued and misunderstood by the general public. Unrestricted population growth will have catastrophic consequences unless it is dealt with rapidly and rationally. Copies from: Office of…

  4. Improvements to the WRF-CMAQ modeling system for fine-scale air quality simulations

    EPA Science Inventory

    Despite significant reductions in atmospheric pollutants such as ozone (O3) and fine particulate matter (PM2.5) over the past several decades, air pollution continues to pose a threat to the health of humans and sensitive ecosystems. A number of areas across...

  5. Stereotype Threat, Identity Salience, and Spatial Reasoning

    ERIC Educational Resources Information Center

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups…

  6. Protecting national parks from air pollution effects: Making sausage from science and policy

    USGS Publications Warehouse

    Baron, Jill S.; Blett, Tamara; Malm, William C.; Alexander, Ruth; Doremus, Holly

    2016-01-01

    The story of air pollution research, policy development, and management in national parks is a fascinating blend of cultural change, vision, interdisciplinary and interagency collaboration, and science-policy-management-stakeholder collaborations. Unable to ignore the loss of iconic vistas from regional haze and loss of fish from acid rain in the 1980s, the National Park Service (NPS) embraced an obligation to protect resources from threats originating outside park boundaries. Upholding the Organic Act requirement for parks to remain "unimpaired" for the enjoyment of future generations, and using the Clean Air Act statement that NPS has an “affirmative responsibility” to protect park resources, NPS has supported, and effectively used, research as a means to protect lands, waters, and vistas from a mostly unseen threat. Using visibility and atmospheric nitrogen deposition as examples, we will illustrate some success stories where NPS led the way to benefit not only parks, but the Nation.

  7. Review of air pollution and health impacts in Malaysia.

    PubMed

    Afroz, Rafia; Hassan, Mohd Nasir; Ibrahim, Noor Akma

    2003-06-01

    In the early days of abundant resources and minimal development pressures, little attention was paid to growing environmental concerns in Malaysia. The haze episodes in Southeast Asia in 1983, 1984, 1991, 1994, and 1997 imposed threats to the environmental management of Malaysia and increased awareness of the environment. As a consequence, the government established Malaysian Air Quality Guidelines, the Air Pollution Index, and the Haze Action Plan to improve air quality. Air quality monitoring is part of the initial strategy in the pollution prevention program in Malaysia. Review of air pollution in Malaysia is based on the reports of the air quality monitoring in several large cities in Malaysia, which cover air pollutants such as Carbon monoxide (CO), Sulphur Dioxide (SO2), Nitrogen Dioxide (NO2), Ozone (O3), and Suspended Particulate Matter (SPM). The results of the monitoring indicate that Suspended Particulate Matter (SPM) and Nitrogen Dioxide (NO2) are the predominant pollutants. Other pollutants such as CO, O(x), SO2, and Pb are also observed in several big cities in Malaysia. The air pollution comes mainly from land transportation, industrial emissions, and open burning sources. Among them, land transportation contributes the most to air pollution. This paper reviews the results of the ambient air quality monitoring and studies related to air pollution and health impacts.

  8. Swarm Counter-Asymmetric-Threat (CAT) 6-DOF Dynamics Simulation

    DTIC Science & Technology

    2005-07-01

    NAWCWD TP 8593 Swarm Counter-Asymmetric-Threat ( CAT ) 6-DOF Dynamics Simulation by James Bobinchak Weapons and Energetics...mathematical models used in the swarm counter- asymmetric-threat ( CAT ) simulation and the results of extensive Monte Carlo simulations. The swarm CAT ...Asymmetric-Threat ( CAT ) 6-DOF Dynamics Simulation (U) 6. AUTHOR(S) James Bobinchak and Gary Hewer 7. PERFORMING ORGANIZATION NAME(S) AND

  9. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  10. Toxicological Threats of Plastic

    EPA Pesticide Factsheets

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  11. External Threat Risk Assessment Algorithm (ExTRAA)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Powell, Troy C.

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind ofmore » r isk posed in a given situation using the radar plot method.« less

  12. Insider Threat Assessment: Model, Analysis and Tool

    NASA Astrophysics Data System (ADS)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  13. Attention to Threats and Combat-Related Posttraumatic Stress Symptoms

    PubMed Central

    Wald, Ilan; Degnan, Kathryn A.; Gorodetsky, Elena; Charney, Dennis S.; Fox, Nathan A.; Fruchter, Eyal; Goldman, David; Lubin, Gad; Pine, Daniel S.; Bar-Haim, Yair

    2015-01-01

    Importance Combat places soldiers at risk for post-traumatic stress disorder (PTSD). The excessive rates of PTSD and other adjustment disorders in soldiers returning home make it imperative to identify risk and resilience factors that could be targeted by novel therapeutic treatments. Objective To investigate the interplay among attention to threat, combat exposure, and other risk factors for PTSD symptoms in soldiers deployed to combat. Design and Setting Longitudinal prospective study of Israeli Defense Force infantry soldiers carried out in 2008 through 2010. Repeated measurements during a 1-year period included baseline and predeployment data collected in training camps and deployment data collected in the combat theater. Participants Infantry soldiers (1085 men; mean age,18.8 years). Main Outcome Measures Postcombat PTSD symptoms. Results Soldiers developed threat vigilance during combat deployment, particularly when they were exposed to high-intensity combat, as indicated by faster response times to targets appearing at the location of threat relative to neutral stimuli (P < .001). Threat-related attention bias also interacted with combat exposure to predict risk for PTSD (P <.05). Bias toward threat at recruitment (P <.001) and bias away from threat just before deployment (P < .05) predicted postcombat PTSD symptoms. Moreover, these threat-related attention associations with PTSD were moderated by genetic and environmental factors, including serotonin transporter (5-HTTLPR) genotype. Conclusions and Relevance Combat exposure interacts with threat-related attention to place soldiers at risk for PTSD, and interactions with other risk factors account for considerable variance in PTSD vulnerability. Understanding these associations informs research on novel attention bias modification techniques and prevention of PTSD. PMID:23407816

  14. Environmental Health: Threats and their Interactions

    PubMed Central

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurrence and the probable harm that they will cause. Some of the interactions are described, with ways of providing health care taking into account the threats and their interactions, and the paradox is emphasised that better health care in the developing world will further increase population growth followed by increased greenhouse gas emissions. Improved education for women and free and unlimited access to modern methods of contraception are vital. PMID:21572838

  15. Is air pollution causing landslides in China?

    NASA Astrophysics Data System (ADS)

    Zhang, Ming; McSaveney, Mauri J.

    2018-01-01

    Air pollution in China often exceeds "unhealthy" levels, but Chinese air is not only a threat from being breathed: the pollutants may also be causing fatal landslides. Very acid rain from severe air pollution falls widely in southwest China, where coal is a major energy source. We discuss where acid rain may provide an unsuspected link between mining and the fatal 2009 Jiweishan landslide in southwest China; it may have reduced the strength of a thin, calcareous, black sapropelic shale in Jiweishan Mountain by removing cementing carbonate minerals and sapropel matrix. Mining beneath the potential slide mass may not have directly triggered the landslide, but collapse of abandoned adits drained a perched aquifer above a regional black-shale aquiclude. Inflow of acid, oxygenated water and nutrients into the aquiclude may have accelerated the reduction of strength of the weakest rocks and consequently led to rapid sliding of a large rock mass on a layer of weathered shale left composed largely of soft, and slippery talc.

  16. Threat affects risk preferences in movement decision making

    PubMed Central

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  17. Threat affects risk preferences in movement decision making.

    PubMed

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  18. 77 FR 1672 - Threat Reduction Advisory Committee; Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Threat Reduction Advisory Committee; Notice of... committee meeting of the Threat Reduction Advisory Committee (hereafter referred to as ``the Committee.... FOR FURTHER INFORMATION CONTACT: Mr. William Hostyn, GS-15, DoD, Defense Threat Reduction Agency/SP...

  19. 75 FR 60430 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Threat Reduction... amended) the Department of Defense announces a meeting of the Threat Reduction Advisory Committee... Wright, Defense Threat Reduction Agency/AST, 8725 John J. Kingman Road, MS 6201, Fort Belvoir, VA 22060...

  20. Perceived control qualifies the effects of threat on prejudice.

    PubMed

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  1. Relationships Among Attention Networks and Physiological Responding to Threat

    PubMed Central

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  2. Does stereotype threat affect women in academic medicine?

    PubMed

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  3. Space Station crew safety alternatives study. Volume 2: Threat development

    NASA Technical Reports Server (NTRS)

    Raasch, R. F.; Peercy, R. L., Jr.; Rockoff, L. A.

    1985-01-01

    The first 15 years of accumulated space station concepts for initial operational capability (IOC) during the early 1990's were considered. Twenty-five threats to the space station are identified and selected threats addressed as impacting safety criteria, escape and rescue, and human factors safety concerns. Of the 25 threats identified, eight are discussed including strategy options for threat control: fire, biological or toxic contamination, injury/illness, explosion, loss of pressurization, radiation, meteoroid penetration, and debris.

  4. Sociocultural perspectives on threats, risks, and health

    Treesearch

    Patricia L. Winter; Jonathan W. Long; Frank K. Lake

    2014-01-01

    Sociocultural perspectives on threats, risks, and health are explored in this chapter. The authors begin with a discussion of the linkages between well-being in the Sierra Nevada ecosystem and public health and well-being to set the context of socioecological resilience. This is followed by a summary of how trust and confidence influence the management of threats and...

  5. When anticipation beats accuracy: Threat alters memory for dynamic scenes.

    PubMed

    Greenstein, Michael; Franklin, Nancy; Martins, Mariana; Sewack, Christine; Meier, Markus A

    2016-05-01

    Threat frequently leads to the prioritization of survival-relevant processes. Much of the work examining threat-related processing advantages has focused on the detection of static threats or long-term memory for details. In the present study, we examined immediate memory for dynamic threatening situations. We presented participants with visually neutral, dynamic stimuli using a representational momentum (RM) paradigm, and manipulated threat conceptually. Although the participants in both the threatening and nonthreatening conditions produced classic RM effects, RM was stronger for scenarios involving threat (Exps. 1 and 2). Experiments 2 and 3 showed that this effect does not generalize to the nonthreatening objects within a threatening scene, and that it does not extend to arousing happy situations. Although the increased RM effect for threatening objects by definition reflects reduced accuracy, we argue that this reduced accuracy may be offset by a superior ability to predict, and thereby evade, a moving threat.

  6. Impaired threat prioritisation after selective bilateral amygdala lesions

    PubMed Central

    Bach, Dominik R.; Hurlemann, Rene; Dolan, Raymond J.

    2015-01-01

    The amygdala is proposed to process threat-related information in non-human animals. In humans, empirical evidence from lesion studies has provided the strongest evidence for a role in emotional face recognition and social judgement. Here we use a face-in-the-crowd (FITC) task which in healthy control individuals reveals prioritised threat processing, evident in faster serial search for angry compared to happy target faces. We investigate AM and BG, two individuals with bilateral amygdala lesions due to Urbach–Wiethe syndrome, and 16 control individuals. In lesion patients we show a reversal of a threat detection advantage indicating a profound impairment in prioritising threat information. This is the first direct demonstration that human amygdala lesions impair prioritisation of threatening faces, providing evidence that this structure has a causal role in responding to imminent danger. PMID:25282058

  7. Unhealthy interactions: the role of stereotype threat in health disparities.

    PubMed

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  8. Unhealthy Interactions: The Role of Stereotype Threat in Health Disparities

    PubMed Central

    Burgess, Diana; Phelan, Sean M.; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors. PMID:23153125

  9. Threat effects on human oculo-motor function.

    PubMed

    Naranjo, E N; Cleworth, T W; Allum, J H J; Inglis, J T; Lea, J; Westerberg, B D; Carpenter, M G

    2017-09-17

    Neuro-anatomical evidence supports the potential for threat-related factors, such as fear, anxiety and vigilance, to influence brainstem motor nuclei controlling eye movements, as well as the vestibular nuclei. However, little is known about how threat influences human ocular responses, such as eye saccades (ES), smooth pursuit eye tracking (SP), and optokinetic nystagmus (OKN), and whether these responses can be facilitated above normal baseline levels with a natural source of threat. This study was designed to examine the effects of height-induced postural threat on the gain of ES, SP and OKN responses in humans. Twenty participants stood at two different surface heights while performing ES (ranging from 8° to 45° from center), SP (15, 20, 30°/s) and OKN (15, 30, 60°/s) responses in the horizontal plane. Height did not significantly increase the slope of the relationship between ES peak velocity and initial amplitude, or the gain of ES amplitude. In contrast height significantly increased SP and OKN gain. Significant correlations were found between changes in physiological arousal and OKN gain. Observations of changes with height in OKN and SP support neuro-anatomical evidence of threat-related mechanisms influencing both oculo-motor nuclei and vestibular reflex pathways. Although further study is warranted, the findings suggest that potential influences of fear, anxiety and arousal/alertness should be accounted for, or controlled, during clinical vestibular and oculo-motor testing. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.

  10. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    ERIC Educational Resources Information Center

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  11. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    PubMed Central

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  12. Protected areas in tropical Africa: assessing threats and conservation activities.

    PubMed

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  13. Air Monitoring of Emissions from the Fukushima Daiichi Reactor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McNaughton, Michael; Allen, Shannon P.; Archuleta, Debra C.

    2012-06-12

    In response to the disasters in Japan on March 11, 2011, and the subsequent emissions from Fukushima-Daiichi, we monitored the air near Los Alamos using four air-monitoring systems: the standard AIRNET samplers, the standard rad-NESHAP samplers, the NEWNET system, and high-volume air samplers. Each of these systems has advantages and disadvantages. In combination, they provide a comprehensive set of measurements of airborne radionuclides near Los Alamos during the weeks following March 11. We report air-monitoring measurements of the fission products released from the Fukushima-Daiichi nuclear-power-plant accident in 2011. Clear gamma-spectrometry peaks were observed from Cs-134, Cs-136, Cs-137, I-131, I132, Te-132,more » and Te-129m. These data, together with measurements of other radionuclides, are adequate for an assessment and assure us that radionuclides from Fukushima Daiichi did not present a threat to human health at or near Los Alamos. The data demonstrate the capabilities of the Los Alamos air-monitoring systems.« less

  14. Safety first: Instrumentality for reaching safety determines attention allocation under threat.

    PubMed

    Vogt, Julia; Koster, Ernst H W; De Houwer, Jan

    2017-04-01

    Theories of attention to emotional information suggest that attentional processes prioritize threatening information. In this article, we suggest that attention will prioritize the events that are most instrumental to a goal in any given context, which in threatening situations is typically reaching safety. To test our hypotheses, we used an attentional cueing paradigm that contained cues signaling imminent threat (i.e., aversive noises) as well as cues that allowed participants to avoid threat (instrumental safety signals). Correct reactions to instrumental safety signals seemingly allowed participants to lower the presentation rate of the threat. Experiment 1 demonstrates that attention prioritizes instrumental safety signals over threat signals. Experiment 2 replicates this finding and additionally compares instrumental safety signals to other action-relevant signals controlling for action relevance as cause of the effects. Experiment 3 demonstrates that when actions toward threat signals permit to avoid threat, attention prioritizes threat signals. Taken together, these results support the view that instrumentality for reaching safety determines the allocation of attention under threat. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  15. Attention Bias toward Threat in Pediatric Anxiety Disorders

    ERIC Educational Resources Information Center

    Roy, Amy Krain; Vasa, Roma A.; Bruck, Maggie; Mogg, Karin; Bradley, Brendan P.; Sweeney, Michael; Bergman, R. Lindsey; McClure-Tone, Erin B.; Pine, Daniel S.

    2008-01-01

    Attention bias towards threat faces is examined for a large sample of anxiety-disordered youths using visual probe task. The results showed that anxious individuals showed a selective bias towards threat due to perturbation in neural mechanisms that control vigilance.

  16. Age Differences in the Underlying Mechanisms of Stereotype Threat Effects

    PubMed Central

    Hess, Thomas M.

    2015-01-01

    Objectives. The goals of the present study were to (a) examine whether age differences exist in the mechanisms underlying stereotype threat effects on cognitive performance and (b) examine whether emotion regulation abilities may buffer against threat effects on performance. Method. Older and younger adults were exposed to positive or negative age-relevant stereotypes, allowing us to examine the impact of threat on regulatory focus and working memory. Self-reported emotion regulation measures were completed prior to the session. Results. Older adults’ performance under threat suggested a prevention-focused approach to the task, indexed by increased accuracy and reduced speed. The same pattern was observed in younger adults, but the effects were not as strong. Age differences emerged when examining the availability of working memory resources under threat, with young adults showing decrements, whereas older adults did not. Emotion regulation abilities moderated threat effects in young adults but not in older adults. Conclusions. The results provide support for the notion that stereotype threat may lead to underperformance through somewhat different pathways in older and younger adults. Future research should further examine whether the underlying reason for this age difference is rooted in age-related improvements in emotion regulation. PMID:24077743

  17. They Might be Giants: Small-Scale RPAs as a Threat to Air Base Defense and Air Power Projection

    DTIC Science & Technology

    2014-06-01

    experience on C-5, KC-10, and C-17 aircraft as well as multiple General Electric jet and turbofan engines. He takes command of the 730th Air Mobility...pneumatic and electric controls for stabilization and launched from a portable track. Once it arrived near the target, it would kill its engine, shed...airfield lie beyond or under the path of any interceptor’s bullets. To pose a metaphor, it is akin to using a sports car to chase a honeybee, but

  18. Bio-Terrorism Threat and Casualty Prevention

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  19. Counter Piracy Off Somalia; A Case for Applying the Comprehensive Approach Strategy

    DTIC Science & Technology

    2011-01-03

    operations conducted by HDMS ABSALON 15 comprise the threat of being captured , trialed and jailed for many years in another country. Finally a pirate...The first wave secured the open deck of the ship and the second wave breached into the bridge and took over control of the ship manoeuvres. In the...at this stage not able to take command of his own ship. The chock and stress he had been through had obviously had an impact on him. But after a

  20. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  1. Relationships among attention networks and physiological responding to threat.

    PubMed

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A; Shankman, Stewart A

    2017-02-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat - related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention - alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. The Bright Side of Threatened Narcissism: Improved Performance Following Ego Threat.

    PubMed

    Nevicka, Barbora; Baas, Matthijs; Ten Velden, Femke S

    2016-12-01

    Narcissistic individuals have highly positive self-views and overestimate their abilities. Consequently, they tend to react aggressively whenever they receive information that does not match their high self-views (ego threat). We argue that focusing on aggression merely portrays a one-sided view of narcissistic individuals and the manner in which they counter ego threats. We propose that following ego threat, narcissism can also fuel performance. In four studies, we measured nonclinical narcissism and allocated Dutch undergraduate university students (N 1  = 175, N 2  = 142, N 3  = 159, N 4  = 174) to either an ego threat or a no ego threat condition. Ego threat involved negative feedback (Studies 1-2) or threat to uniqueness (Studies 3-4). We measured participants' intentions to complete a challenging task (Study 1), their creative performance (Studies 2-3), and their performance on an anagram task (Study 4). Across Studies 1-3, we consistently found that following ego threat, higher nonclinical narcissism was associated with greater willingness to perform tasks that enabled demonstration of abilities and enhanced creative performance. These results were confirmed using a meta-analysis. However, anagram performance was not enhanced following ego threat. We provide additional analyses that might help explain this. Our findings thus reveal a more positive side to the way narcissistic individuals manage threats to their self-image. © 2015 Wiley Periodicals, Inc.

  3. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    ERIC Educational Resources Information Center

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  4. Biological warfare agents as threats to potable water.

    PubMed Central

    Burrows, W D; Renner, S E

    1999-01-01

    Nearly all known biological warfare agents are intended for aerosol application. Although less effective as potable water threats, many are potentially capable of inflicting heavy casualties when ingested. Significant loss of mission capability can be anticipated even when complete recovery is possible. Properly maintained field army water purification equipment can counter this threat, but personnel responsible for the operation and maintenance of the equipment may be most at risk of exposure. Municipal water treatment facilities would be measurably less effective. Some replicating (infectious) agents and a few biotoxins are inactivated by chlorine disinfection; for others chlorine is ineffective or of unknown efficacy. This report assesses the state of our knowledge of agents as potable water threats and contemplates the consequences of intentional or collateral contamination of potable water supplies by 18 replicating agents and 9 biotoxins known or likely to be weaponized or otherwise used as threats. PMID:10585901

  5. Characterization of potential security threats in modern automobiles: a composite modeling approach

    DOT National Transportation Integrated Search

    2014-10-01

    The primary objective of the work detailed in this report is to describe a composite modeling approach for potential cybersecurity threats in modern vehicles. Threat models, threat descriptions, and examples of various types of conceivable threats to...

  6. Check Six Begins on the Ground: Responding to the Evolving Ground Threat to U.S. Air Force Bases.

    DTIC Science & Technology

    1995-01-01

    Jalibah and Talil, destroying 29 aircraft in the process. See Rick Atkinson, Crusade: The Untold Story of the Persian Gulf War, New York: Houghton... Riordan , Air Base Ground Defense: Key Issues for the 1990s, Maxwell AFB, Ala.: Air War College Research Report, 1987. Nystrom, Charles W., Air Base...Press, "Salvadoran Rebels Hit Military Posts," Chicago Tribune, November 21,1990, p. 3. 86 "Check Six begins on the ground" Atkinson, Rick

  7. Does Stereotype Threat Affect Women in Academic Medicine?

    PubMed Central

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  8. Student Reports of Peer Threats of Violence: Prevalence and Outcomes

    ERIC Educational Resources Information Center

    Nekvasil, Erin K.; Cornell, Dewey G.

    2012-01-01

    Authorities in education and law enforcement have recommended that schools use a threat-assessment approach to prevent violence, but there is relatively little research on characteristics and outcomes of threats among students. The current study examined student reports of threat experiences in a sample of 3,756 high school students. Approximately…

  9. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    ERIC Educational Resources Information Center

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  10. Global threat to agriculture from invasive species.

    PubMed

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-05

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread.

  11. Global threat to agriculture from invasive species

    PubMed Central

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  12. Shape-based human detection for threat assessment

    NASA Astrophysics Data System (ADS)

    Lee, Dah-Jye; Zhan, Pengcheng; Thomas, Aaron; Schoenberger, Robert B.

    2004-07-01

    Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when monitoring open environments. Any moving objects including animals can falsely trigger the security system. Other security systems that utilize video equipment require human interpretation of the scene in order to make real-time threat assessment. Shape-based human detection technique has been developed for accurate early threat assessments for open and remote environment. Potential threats are isolated from the static background scene using differential motion analysis and contours of the intruding objects are extracted for shape analysis. Contour points are simplified by removing redundant points connecting short and straight line segments and preserving only those with shape significance. Contours are represented in tangent space for comparison with shapes stored in database. Power cepstrum technique has been developed to search for the best matched contour in database and to distinguish a human from other objects from different viewing angles and distances.

  13. “Hidden” threats to science education

    NASA Astrophysics Data System (ADS)

    Huntoon, J. E.; Buchanan, R.; Buhr, S. M.; Kirst, S.; Newton, S.; Van Norden, W.

    2012-04-01

    Many readers of Eos are involved with education. Most would agree that what happens at precollege levels will ultimately affect the geoscience profession; after all, future scientists are today's precollege students. While a growing number of scientists are working to improve the quality of precollege programs, only a few are addressing what we term the "hidden" threats to science education. Hidden threats have nothing to do with scientific content; rather, they result from social, political, and bureaucratic forces operating within and outside of schools and universities.

  14. Soldiers Under Threat: An Exploration of the Effect of Real Threat on Soldier’s Perceptions, Attitudes and Morale

    DTIC Science & Technology

    2009-01-01

    collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and... operations , it is imperative to understand the psychological and social dynamics that play a role in dealing with threat during international peace...their self- evaluation of operational readiness. So far studies on the effect of threat on soldiers’ attitudes have been conducted using the classic

  15. Evaluating and ranking the vulnerability of global marine ecosystems to anthropogenic threats.

    PubMed

    Halpern, Benjamin S; Selkoe, Kimberly A; Micheli, Fiorenza; Kappel, Carrie V

    2007-10-01

    Marine ecosystems are threatened by a suite of anthropogenic stressors. Mitigating multiple threats is a daunting task, particularly when funding constraints limit the number of threats that can be addressed. Threats are typically assessed and prioritized via expert opinion workshops that often leave no record of the rationale for decisions, making it difficult to update recommendations with new information. We devised a transparent, repeatable, and modifiable method for collecting expert opinion that describes and documents how threats affect marine ecosystems. Experts were asked to assess the functional impact, scale, and frequency of a threat to an ecosystem; the resistance and recovery time of an ecosystem to a threat; and the certainty of these estimates. To quantify impacts of 38 distinct anthropogenic threats on 23 marine ecosystems, we surveyed 135 experts from 19 different countries. Survey results showed that all ecosystems are threatened by at least nine threats and that nine ecosystems are threatened by >90% of existing threats. The greatest threats (highest impact scores) were increasing sea temperature, demersal destructive fishing, and point-source organic pollution. Rocky reef, coral reef, hard-shelf, mangrove, and offshore epipelagic ecosystems were identified as the most threatened. These general results, however, may be partly influenced by the specific expertise and geography of respondents, and should be interpreted with caution. This approach to threat analysis can identify the greatest threats (globally or locally), most widespread threats, most (or least) sensitive ecosystems, most (or least) threatened ecosystems, and other metrics of conservation value. Additionally, it can be easily modified, updated as new data become available, and scaled to local or regional settings, which would facilitate informed and transparent conservation priority setting.

  16. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    NASA Astrophysics Data System (ADS)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  17. Comparison of Health Impact of Air Pollution Between China and Other Countries.

    PubMed

    Tian, Linwei; Sun, Shengzhi

    2017-01-01

    Air pollution is the world's largest single environmental risk according to the World Health Organization (WHO), which caused around seven million deaths in 2012. Extensive epidemiological studies have been carried out worldwide to examine the health impacts of ambient air pollution, consistently demonstrating significant health impacts of ambient air pollution. Air pollution problem in China is especially serious; it has become the fourth biggest threat to the health of the Chinese people. In this review, we summarized existing literature, compared health impact of air pollution between China and other countries, and found substantial heterogeneity in the risk estimates of air pollution. The effect heterogeneities may be due to the differences in the characteristics of populations (e.g., the proportion of the elder population and people with preexisting diseases), exposure profile (e.g., air pollution concentrations and composition), and regional climate. Although the magnitude of relative risk estimates of air pollution is generally similar with that in other parts of the world, air pollution is one of China's most serious environmental health problems given the huge number of people exposed to high concentration levels of air pollution in China.

  18. Investigating Hypervigilance for Social Threat of Lonely Children

    ERIC Educational Resources Information Center

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  19. Reactivity to uncertain threat as a familial vulnerability factor for alcohol use disorder.

    PubMed

    Gorka, S M; Hee, D; Lieberman, L; Mittal, V A; Phan, K L; Shankman, S A

    2016-12-01

    When sober, problematic drinkers display exaggerated reactivity to threats that are uncertain (U-threat). Since this aversive affective state can be alleviated via acute alcohol intoxication, it has been posited that individuals who exhibit heightened reactivity to U-threat at baseline are motivated to use alcohol as a means of avoidance-based coping, setting the stage for excessive drinking. To date, however, no study has attempted to characterize the dispositional nature of exaggerated reactivity to U-threat and test whether it is a vulnerability factor or exclusively a disease marker of problematic alcohol use. The current investigation utilized a family study design to address these gaps by examining whether (1) reactivity to U-threat is associated with risk for problematic alcohol use, defined by family history of alcohol use disorder (AUD) and (2) reactivity to U-threat is correlated amongst adult biological siblings. A total of 157 families, and 458 individuals, participated in the study and two biological siblings completed a threat-of-shock task designed to probe reactivity to U-threat and predictable threat (P-threat). Startle potentiation was collected as an index of aversive responding. Within biological siblings, startle potentiation to U-threat [intraclass correlation (ICC) = 0.35] and P-threat (ICC = 0.63) was significantly correlated. In addition, independent of an individuals' own AUD status, startle potentiation to U-threat, but not P-threat, was positively associated with risk for AUD (i.e. AUD family history). This suggests that heightened reactivity to U-threat may be a familial vulnerability factor for problematic drinking and a novel prevention target for AUD.

  20. Solutions to the new threats to academic freedom?

    PubMed

    Tooley, Michael

    2014-05-01

    In my commentary on Francesca Minerva's article 'New Threats to Academic Freedom', I agree with her contention that the existence of the Internet has given rise to new and very serious threats to academic freedom. I think that it is crucial that we confront those threats, and find ways to eliminate them, which I believe can be done. The threats in question involve both authors and editors. In the case of authors, I argue that the best solution is not anonymous publication, but publication using pseudonyms, and I describe how that would work. In the case of editors, my proposal is a website that a number of journals would have access to, where papers that editors judge to be clearly worthy of publication, but whose publication seems likely to set off a firestorm of public and media protest, could be published without any indication of the journal that had accepted the paper for publication. © 2014 John Wiley & Sons Ltd.

  1. How Moral Threat Shapes Laypersons' Engagement With Science.

    PubMed

    Bender, Jens; Rothmund, Tobias; Nauroth, Peter; Gollwitzer, Mario

    2016-12-01

    Laypersons' engagement with science has grown over the last decade, especially in Internet environments. While this development has many benefits, scientists also face the challenge of devaluation and public criticism by laypersons. Embedding this phenomenon in social-psychological theories and research on value-behavior correspondence, we investigated moral threat as a factor influencing laypersons' engagement with science. Across three studies, we hypothesized and found that moral values shape the way laypersons evaluate and communicate about science when these values are threatened in a given situation and central to people's self-concept. However, prior research on the underlying mechanism of moral threat effects cannot fully rule out value salience as an alternative explanation. To close this gap, we situationally induced value salience while varying the degree of moral threat (Study 3). Our findings indicate that moral threat amplifies the influence of moral values on laypersons' evaluation of science above and beyond value salience. © 2016 by the Society for Personality and Social Psychology, Inc.

  2. Lithium battery fires: implications for air medical transport.

    PubMed

    Thomas, Frank; Mills, Gordon; Howe, Robert; Zobell, Jim

    2012-01-01

    Lithium-ion batteries provide more power and longer life to electronic medical devices, with the benefits of reduced size and weight. It is no wonder medical device manufacturers are designing these batteries into their products. Lithium batteries are found in cell phones, electronic tablets, computers, and portable medical devices such as ventilators, intravenous pumps, pacemakers, incubators, and ventricular assist devices. Yet, if improperly handled, lithium batteries can pose a serious fire threat to air medical transport personnel. Specifically, this article discusses how lithium-ion batteries work, the fire danger associated with them, preventive measures to reduce the likelihood of a lithium battery fire, and emergency procedures that should be performed in that event. Copyright © 2012 Air Medical Journal Associates. Published by Elsevier Inc. All rights reserved.

  3. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    USGS Publications Warehouse

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  4. Worker training for new threats: a proposed framework.

    PubMed

    Mitchell, Clifford S; Doyle, Mary L; Moran, John B; Lippy, Bruce; Hughes, Joseph T; Lum, Max; Agnew, Jacqueline

    2004-11-01

    In an effort to identify health and safety training needs for various groups of workers related to weapons of mass destruction, including chemical, biological, radiological, and nuclear weapons and high yield explosives (CBRNE), a conference, "Worker Training in a New Era: Responding to New Threats," was held at the Johns Hopkins Bloomberg School of Public Health in October 2002. Two questions were addressed: Which general skills and knowledge are common to all workers who might be exposed to terrorist threats from CBRNE weapons? What are the particular skills and knowledge relevant to these threats that are specific to workers in different sectors? Thirteen core components for pre- and post-event training were identified. Pre-event training applies to all workers. Post-event training applies to selected personnel including first responders, skilled support personnel, and other workers involved in these operations. Recommendations to improve worker safety training related to preparedness include: identify specific competencies for worker pre- and post-event training; coordinate Federal policy on worker training for CBRNE hazards; adopt federal guidelines or standards on worker training for new CBRNE threats, based on the competencies and coordinated Federal policy; conduct an inventory of training programs and other resources that could be used or adapted for use for new threats; and develop new training content and methods for pre- and post-event training to address specific competencies. Given the possibility for the introduction of CBRNE threats into the workplace, all workers need some training in the potential hazards involved: the individual worker's specific role in an emergency; incident command; activation of the emergency notification system; use of personal protective equipment (PPE); and safe evacuation of the workplace. While some occupational sectors have developed effective training related to these new threats, there is a need to develop, implement

  5. Multisensor data fusion for IED threat detection

    NASA Astrophysics Data System (ADS)

    Mees, Wim; Heremans, Roel

    2012-10-01

    In this paper we present the multi-sensor registration and fusion algorithms that were developed for a force protection research project in order to detect threats against military patrol vehicles. The fusion is performed at object level, using a hierarchical evidence aggregation approach. It first uses expert domain knowledge about the features used to characterize the detected threats, that is implemented in the form of a fuzzy expert system. The next level consists in fusing intra-sensor and inter-sensor information. Here an ordered weighted averaging operator is used. The object level fusion between candidate threats that are detected asynchronously on a moving vehicle by sensors with different imaging geometries, requires an accurate sensor to world coordinate transformation. This image registration will also be discussed in this paper.

  6. Exciting fear in adolescence: Does pubertal development alter threat processing?

    PubMed Central

    Spielberg, Jeffrey M.; Olino, Thomas M.; Forbes, Erika E.; Dahl, Ronald E.

    2014-01-01

    Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some) fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala), but also regions associated with reward pursuit (i.e., nucleus accumbens). These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues–which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences. PMID:24548554

  7. Parallel processing of general and specific threat during early stages of perception

    PubMed Central

    2016-01-01

    Differential processing of threat can consummate as early as 100 ms post-stimulus. Moreover, early perception not only differentiates threat from non-threat stimuli but also distinguishes among discrete threat subtypes (e.g. fear, disgust and anger). Combining spatial-frequency-filtered images of fear, disgust and neutral scenes with high-density event-related potentials and intracranial source estimation, we investigated the neural underpinnings of general and specific threat processing in early stages of perception. Conveyed in low spatial frequencies, fear and disgust images evoked convergent visual responses with similarly enhanced N1 potentials and dorsal visual (middle temporal gyrus) cortical activity (relative to neutral cues; peaking at 156 ms). Nevertheless, conveyed in high spatial frequencies, fear and disgust elicited divergent visual responses, with fear enhancing and disgust suppressing P1 potentials and ventral visual (occipital fusiform) cortical activity (peaking at 121 ms). Therefore, general and specific threat processing operates in parallel in early perception, with the ventral visual pathway engaged in specific processing of discrete threats and the dorsal visual pathway in general threat processing. Furthermore, selectively tuned to distinctive spatial-frequency channels and visual pathways, these parallel processes underpin dimensional and categorical threat characterization, promoting efficient threat response. These findings thus lend support to hybrid models of emotion. PMID:26412811

  8. Exploring the Structure of Human Defensive Responses from Judgments of Threat Scenarios

    PubMed Central

    Harrison, Laura A.; Ahn, Curie; Adolphs, Ralph

    2015-01-01

    How humans react to threats is a topic of broad theoretical importance, and also relevant for understanding anxiety disorders. Many animal threat reactions exhibit a common structure, a finding supported by human evaluations of written threat scenarios that parallel patterns of rodent defensive behavior to actual threats. Yet the factors that underlie these shared behavioral patterns remain unclear. Dimensional accounts rooted in Darwin’s conception of antithesis explain many defensive behaviors. Across species, it is also clear that defensive reactions depend on specific situational factors, a feature long emphasized by psychological appraisal theories. Our study sought to extend prior investigations of human judgments of threat to a broader set of threats, including natural disasters, threats from animals, and psychological (as opposed to physical) threats. Our goal was to test whether dimensional and specific patterns of threat evaluation replicate across different threat classes. 85 healthy adult subjects selected descriptions of defensive behaviors that indicated how they would react to 29 threatening scenarios. Scenarios differed with respect to ten factors, e.g., perceived dangerousness or escapability. Across scenarios, we correlated these factor ratings with the pattern of defensive behaviors subjects endorsed. A decision tree hierarchically organized these correlation patterns to successfully predict each scenario’s most common reaction, both for the original sample of subjects and a separate replication group (n = 22). At the top of the decision tree, degree of dangerousness interacted with threat type (physical or psychological) to predict dimensional approach/avoidance behavior. Subordinate nodes represented specific defensive responses evoked by particular contexts. Our ecological approach emphasizes the interplay of situational factors in evoking a broad range of threat reactions. Future studies could test predictions made by our results to help

  9. Threat perception in mild cognitive impairment and early dementia.

    PubMed

    Henry, Julie D; Thompson, Claire; Ruffman, Ted; Leslie, Felicity; Withall, Adrienne; Sachdev, Perminder; Brodaty, Henry

    2009-09-01

    Mild cognitive impairment (MCI) and dementia affect many aspects of emotion processing. Even though the ability to detect threat is a particularly important aspect of emotion processing, no study to date has assessed threat perception in either of these groups. The purpose of the present study was to test whether individuals with MCI (n = 38) and mild dementia (n = 34) have difficulty differentiating between faces and situations normatively judged to be either high or low in threat relative to age-matched controls (n = 34). To achieve this aim, all participants completed 2 danger rating tasks that involved viewing and rating high- and low-danger images. It was also assessed whether threat perception was related to cognitive functioning and emotion recognition. The results indicated that all 3 groups were accurately, and comparably, able to differentiate high from low-danger faces. However, the dementia group had difficulties differentiating high from low-danger situations, which reflected a bias to overattribute the level of threat posed by normatively judged nonthreatening situations. This difficulty was related to more general cognitive decline.

  10. The Air Force concentrating photovoltaic array program

    NASA Technical Reports Server (NTRS)

    Geis, Jack W.

    1987-01-01

    A summary is given of Air Force solar concentrator projects beginning with the Rockwell International study program in 1977. The Satellite Materials Hardening Programs (SMATH) explored and developed techniques for hardening planar solar cell array power systems to the combined nuclear and laser radiation threat environments. A portion of program dollars was devoted to developing a preliminary design for a hardened solar concentrator. The results of the Survivable Concentrating Photovoltaic Array (SCOPA) program, and the design, fabrication and flight qualification of a hardened concentrator panel are discussed.

  11. Adrenocortical responses to offspring-directed threats in two open-nesting birds.

    PubMed

    Butler, Luke K; Bisson, Isabelle-Anne; Hayden, Timothy J; Wikelski, Martin; Romero, L Michael

    2009-07-01

    Dependent young are often easy targets for predators, so for many parent vertebrates, responding to offspring-directed threats is a fundamental part of reproduction. We tested the parental adrenocortical response of the endangered black-capped vireo (Vireo atricapilla) and the common white-eyed vireo (V. griseus) to acute and chronic threats to their offspring. Like many open-nesting birds, our study species experience high offspring mortality. Parents responded behaviorally to a predator decoy or human 1-2m from their nests, but, in contrast to similar studies of cavity-nesting birds, neither these acute threats nor chronic offspring-directed threats altered plasma corticosterone concentrations of parents. Although parents in this study showed no corticosterone response to offspring-directed threats, they always increased corticosterone concentrations in response to capture. To explain these results, we propose that parents perceive their risk of nest-associated death differently depending on nest type, with cavity-nesting adults perceiving greater risk to themselves than open-nesters that can readily detect and escape from offspring-directed threats. Our results agree with previous studies suggesting that the hypothalamic-pituitary-adrenal axis, a major physiological mechanism for coping with threats to survival, probably plays no role in coping with threats to offspring when risks to parents and offspring are not correlated. We extend that paradigm by demonstrating that nest style may influence how adults perceive the correlation between offspring-directed and self-directed threats.

  12. A Model for Situation and Threat Assessment

    DTIC Science & Technology

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  13. Advanced insider threat mitigation workshop instructional materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, Philip; Larsen, Robert; O Brien, Mike

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  14. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, Shannon

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, andmore » proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.« less

  15. Interaction of threat and verbal working memory in adolescents.

    PubMed

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  16. ['Piracy of kowledge'--the role of a buccaneer-scientist in the knowledge circulation around diseases and drugs in the tropics].

    PubMed

    Snelders, Stephen

    2009-01-01

    Knowledge circulation in the seventeenth and eighteenth centuries was not only stimulated by the mutual interaction of trade and science. In the context of territorial expansion, war, and the activities of privateers and pirates, knowledge of diseases and drugs in the tropics was increased as well. An important part in this process was performed by so-called 'buccaneer-scientists': adventurers with medical and scientific backgrounds and/or interest who operated on the cultural borders in different parts of the hemisphere. The characteristics of this type of contributor to Early Modern knowledge circulation are explored and analyzed in the example of Scottish surgeon and pirate Lionel Wafer (c. 1660 - c. 1705). The buccaneer scientist had to share the passions of other scientists, resulting in accurate and detailed empirical observation; be able to judge the relevance of observations and 'facts'; be part of a context that stimulates these observations; be capable of describing of these observations; and be part of a network of dissemination of observations. His activities should have an important practical and pragmatic component stimulating trade, expansion and even piracy. And he should possess personal characteristics such as perseverance, a healthy constitution, and ruthlessness, to work and survive in a violent and traumatic environment. Wafer is typical for other 'buccaneer-scientists' of this period--not only pirates and privateers, but also physicians and natural explorers operating in other and more 'respectable' areas of the European overseas expansion.

  17. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to... PROTECTED VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as a...

  18. Small threat and contraband detection with TNA-based systems.

    PubMed

    Shaw, T J; Brown, D; D'Arcy, J; Liu, F; Shea, P; Sivakumar, M; Gozani, T

    2005-01-01

    The detection of small threats, such as explosives, drugs, and chemical weapons, concealed or encased in surrounding material, is a major concern in areas from security checkpoints to UneXploded Ordnance (UXO) clearance. Techniques such as X-ray and trace detection are often ineffectual in these applications. Thermal neutron analysis (TNA) provides an effective method for detecting concealed threats. This paper shows the effectiveness of Ancore's SPEDS, based on TNA, in detecting concealed liquid threats and differentiating live from inert mortar shells.

  19. Age differences in the underlying mechanisms of stereotype threat effects.

    PubMed

    Popham, Lauren E; Hess, Thomas M

    2015-03-01

    The goals of the present study were to (a) examine whether age differences exist in the mechanisms underlying stereotype threat effects on cognitive performance and (b) examine whether emotion regulation abilities may buffer against threat effects on performance. Older and younger adults were exposed to positive or negative age-relevant stereotypes, allowing us to examine the impact of threat on regulatory focus and working memory. Self-reported emotion regulation measures were completed prior to the session. Older adults' performance under threat suggested a prevention-focused approach to the task, indexed by increased accuracy and reduced speed. The same pattern was observed in younger adults, but the effects were not as strong. Age differences emerged when examining the availability of working memory resources under threat, with young adults showing decrements, whereas older adults did not. Emotion regulation abilities moderated threat effects in young adults but not in older adults. The results provide support for the notion that stereotype threat may lead to underperformance through somewhat different pathways in older and younger adults. Future research should further examine whether the underlying reason for this age difference is rooted in age-related improvements in emotion regulation. © The Author 2013. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  20. Evaluation and selection of security products for authentication of computer software

    NASA Astrophysics Data System (ADS)

    Roenigk, Mark W.

    2000-04-01

    Software Piracy is estimated to cost software companies over eleven billion dollars per year in lost revenue worldwide. Over fifty three percent of all intellectual property in the form of software is pirated on a global basis. Software piracy has a dramatic effect on the employment figures for the information industry as well. In the US alone, over 130,000 jobs are lost annually as a result of software piracy.

  1. IMPACTS OF BIOMASS BURNING EMISSIONS ON AIR QUALITY AND PUBLIC HEALTH IN THE UNITED STATES

    EPA Science Inventory

    Wildfire is a natural disaster that claims human life and property. While most attention has been paid to direct life and health threats, mostly to firefighters, this work focuses on the indirect impact of wildfires on the general population due to degraded air quality. Using an ...

  2. The NYC native air sampling pilot project: using HVAC filter data for urban biological incident characterization.

    PubMed

    Ackelsberg, Joel; Leykam, Frederic M; Hazi, Yair; Madsen, Larry C; West, Todd H; Faltesek, Anthony; Henderson, Gavin D; Henderson, Christopher L; Leighton, Terrance

    2011-09-01

    Native air sampling (NAS) is distinguished from dedicated air sampling (DAS) devices (eg, BioWatch) that are deployed to detect aerosol disseminations of biological threat agents. NAS uses filter samples from heating, ventilation, and air conditioning (HVAC) systems in commercial properties for environmental sampling after DAS detection of biological threat agent incidents. It represents an untapped, scientifically sound, efficient, widely distributed, and comparably inexpensive resource for postevent environmental sampling. Calculations predict that postevent NAS would be more efficient than environmental surface sampling by orders of magnitude. HVAC filter samples could be collected from pre-identified surrounding NAS facilities to corroborate the DAS alarm and delineate the path taken by the bioaerosol plume. The New York City (NYC) Native Air Sampling Pilot Project explored whether native air sampling would be acceptable to private sector stakeholders and could be implemented successfully in NYC. Building trade associations facilitated outreach to and discussions with property owners and managers, who expedited contact with building managers of candidate NAS properties that they managed or owned. Nominal NAS building requirements were determined; procedures to identify and evaluate candidate NAS facilities were developed; data collection tools and other resources were designed and used to expedite candidate NAS building selection and evaluation in Manhattan; and exemplar environmental sampling playbooks for emergency responders were completed. In this sample, modern buildings with single or few corporate tenants were the best NAS candidate facilities. The Pilot Project successfully demonstrated that in one urban setting a native air sampling strategy could be implemented with effective public-private collaboration.

  3. Epidemiology today: Mitigating threats to an ecosystem.

    PubMed

    Kreiger, Nancy

    2016-06-27

    Ecosystems comprise all the living and non-living things in a particular area (e.g., rain forest, desert), which interact and maintain equilibrium. Loss of equilibrium (e.g., clear-cutting trees in a rain forest) can mean the decline of the ecosystem, unless it is able to adapt to the new circumstances. The term "knowledge ecosystem" describes an approach to managing knowledge in a particular field; the components of this system include the people, the technological skills and resources, and information or data. Epidemiology can be thought of as a knowledge ecosystem and, like ecological systems, its existence can be threatened, from both internal and external forces that may alter its equilibrium. This paper describes some threats to the epidemiology knowledge ecosystem, how these threats came about, and what responses we can make that may serve to mitigate those threats.

  4. Superior Detection of Threat-Relevant Stimuli in Infancy

    ERIC Educational Resources Information Center

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  5. Political homogeneity can nurture threats to research validity.

    PubMed

    Chambers, John R; Schlenker, Barry R

    2015-01-01

    Political homogeneity within a scientific field nurtures threats to the validity of many research conclusions by allowing ideologically compatible values to influence interpretations, by minimizing skepticism, and by creating premature consensus. Although validity threats can crop in any research, the usual corrective activities in science are more likely to be minimized and delayed.

  6. Creating Safe Learning Zones: Invisible Threats, Visible Actions.

    ERIC Educational Resources Information Center

    2002

    This report is a follow-up to the first publication of the Child Proofing Our Communities Campaign, titled "Poisoned Schools: Invisible Threats, Visible Actions." The previous report looked at the problems of public schools built on contaminated land years ago, the trend of proposing new schools on contaminated land, and the threat of…

  7. Disease threats in Somalia.

    PubMed

    Laughlin, L W; Legters, L J

    1993-02-01

    During this time of war and famine in Somalia, disease threats are encyclopedic both for Somalis and visitors. Malnutrition will amplify the magnitude and severity of endemic tropical infectious diseases. Necessary crowding around life-saving food distribution centers could turn focal infectious disease outbreaks into large epidemics.

  8. Threat captures attention but does not affect learning of contextual regularities.

    PubMed

    Yamaguchi, Motonori; Harwood, Sarah L

    2017-04-01

    Some of the stimulus features that guide visual attention are abstract properties of objects such as potential threat to one's survival, whereas others are complex configurations such as visual contexts that are learned through past experiences. The present study investigated the two functions that guide visual attention, threat detection and learning of contextual regularities, in visual search. Search arrays contained images of threat and non-threat objects, and their locations were fixed on some trials but random on other trials. Although they were irrelevant to the visual search task, threat objects facilitated attention capture and impaired attention disengagement. Search time improved for fixed configurations more than for random configurations, reflecting learning of visual contexts. Nevertheless, threat detection had little influence on learning of the contextual regularities. The results suggest that factors guiding visual attention are different from factors that influence learning to guide visual attention.

  9. Iraqi adolescents: self-regard, self-derogation, and perceived threat in war.

    PubMed

    Carlton-Ford, Steve; Ender, Morten G; Tabatabai, Ahoo

    2008-02-01

    A year into the 2003 US-Iraq war, how were adolescents in Baghdad faring? Conflict-related events typically lower psychological well-being; in contrast, investment in and protection of threatened identities should lead to self-esteem striving and, presumably, better well-being. How threatened do Iraqi adolescents feel? Is their self-esteem related to their sense of threat? Do age, religion, ethnicity, and gender alter the link between perceived threat and self-esteem? We use data from 1000 randomly selected adolescents living in Baghdad during July 2004. Iraqi adolescents reported high levels of threat; those feeling more threatened reported higher levels of self-esteem. Social background correlates with both self-esteem and perceived threat, but controlling for social background does not eliminate the relationship between self-esteem and perceived threat. We interpret our results in light of theory and research concerning social identity, mortality threats, and war trauma.

  10. Threat Diversity Will Erode Mammalian Phylogenetic Diversity in the Near Future

    PubMed Central

    Jono, Clémentine M. A.; Pavoine, Sandrine

    2012-01-01

    To reduce the accelerating rate of phylogenetic diversity loss, many studies have searched for mechanisms that could explain why certain species are at risk, whereas others are not. In particular, it has been demonstrated that species might be affected by both extrinsic threat factors as well as intrinsic biological traits that could render a species more sensitive to extinction; here, we focus on extrinsic factors. Recently, the International Union for Conservation of Nature developed a new classification of threat types, including climate change, urbanization, pollution, agriculture and aquaculture, and harvesting/hunting. We have used this new classification to analyze two main factors that could explain the expected future loss of mammalian phylogenetic diversity: 1. differences in the type of threats that affect mammals and 2. differences in the number of major threats that accumulate for a single species. Our results showed that Cetartiodactyla, Diprotodontia, Monotremata, Perissodactyla, Primates, and Proboscidea could lose a high proportion of their current phylogenetic diversity in the coming decades. In contrast, Chiroptera, Didelphimorphia, and Rodentia could lose less phylogenetic diversity than expected if extinctions were random. Some mammalian clades, including Marsupiala, Chiroptera, and a subclade of Primates, are affected by particular threat types, most likely due solely to their geographic locations and associations with particular habitats. However, regardless of the geography, habitat, and taxon considered, it is not the threat type, but the threat diversity that determines the extinction risk for species and clades. Thus, some mammals might be randomly located in areas subjected to a large diversity of threats; they might also accumulate detrimental traits that render them sensitive to different threats, which is a characteristic that could be associated with large body size. Any action reducing threat diversity is expected to have a

  11. Pattern-Based Design of Insider Threat Programs

    DTIC Science & Technology

    2014-12-01

    also applied these models to develop best practices and technical controls for mitigating insider threat. In some cases of in- sider threat...departing insiders might take valuable IP with them. One set of practices and controls designed to reduce the risk of insider IP theft is based on case data...describing this set of practices and controls helps to balance the costs of monitoring employee behavior for suspicious actions against the risk of

  12. Exciting fear in adolescence: does pubertal development alter threat processing?

    PubMed

    Spielberg, Jeffrey M; Olino, Thomas M; Forbes, Erika E; Dahl, Ronald E

    2014-04-01

    Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some) fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala), but also regions associated with reward pursuit (i.e., nucleus accumbens). These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues--which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  13. Parental and Family Factors as Predictors of Threat Bias in Anxious Youth

    PubMed Central

    Blossom, Jennifer B.; Ginsburg, Golda S.; Birmaher, Boris; Walkup, John T.; Kendall, Philip C.; Keeton, Courtney P.; Langley, Audra K.; Piacentini, John C.; Sakolsky, Dara; Albano, Anne Marie

    2014-01-01

    The present study examined the relative predictive value of parental anxiety, parents' expectation of child threat bias, and family dysfunction on child's threat bias in a clinical sample of anxious youth. Participants (N = 488) were part of the Child/Adolescent Anxiety Multi-modal study (CAMS), ages 7–17 years (M = 10.69; SD = 2.80). Children met diagnostic criteria for generalized anxiety disorder, separation anxiety and/or social phobia. Children and caregivers completed questionnaires assessing child threat bias, child anxiety, parent anxiety and family functioning. Child age, child anxiety, parental anxiety, parents' expectation of child's threat bias and child-reported family dysfunction were significantly associated with child threat bias. Controlling for child's age and anxiety, regression analyses indicated that parents' expectation of child's threat bias and child-reported family dysfunction were significant positive predictors of child's self-reported threat bias. Findings build on previous literature by clarifying parent and family factors that appear to play a role in the development or maintenance of threat bias and may inform etiological models of child anxiety. PMID:25328258

  14. Identifying changing aviation threat environments within an adaptive Homeland Security Advisory System.

    PubMed

    Lee, Adrian J; Jacobson, Sheldon H

    2012-02-01

    A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.

  15. Personality and defensive reactions: fear, trait anxiety, and threat magnification.

    PubMed

    Perkins, Adam M; Cooper, Andrew; Abdelall, Maura; Smillie, Luke D; Corr, Philip J

    2010-06-01

    The revised Reinforcement Sensitivity Theory (rRST) of personality (Gray & McNaughton, 2000) maintains that trait individual differences in the operation of defensive systems relate to facets of human personality, most notably anxiety and fear. We investigated this theory in 2 separate studies (total N=270) using a threat scenario research strategy (Blanchard, Hynd, Minke, Minemoto, & Blanchard, 2001). Consistent with rRST, results showed that individuals with high fear questionnaire scores tended to select defensive responses entailing orientation away from threat (e.g., run away) and that fear-prone individuals also tended to perceive threats as magnified. The extent of this threat magnification mediated the positive association observed between fear and orientation away from threat. Overall, results suggest that interindividual variance in defensive reactions is associated with a variety of existing personality constructs but that further research is required to determine the precise relationship between personality and defensive reactions.

  16. Journal of Air Transportation, Volume 10, No. 3

    NASA Technical Reports Server (NTRS)

    Bowen, Brent D. (Editor); Kabashkin, Igor (Editor)

    2005-01-01

    The following topics are discussed: The Effects of Safety Information on Aeronautical Decision Making; Design, Development, and Validation of an Interactive Multimedia Training Simulator for Responding to Air Transportation Bomb Threats; Discovering the Regulatory Considerations of the Federal Aviation Administration: Interviewing the Aviation Rulemaking Advisory Committee; How to Control Airline Routes from the Supply Side: The Case of TAP; An Attempt to Measure the Traffic Impact of Airline Alliances; and Study Results on Knowledge Requirements for Entry-level Airport Operations and Management Personnel.

  17. 75 FR 68330 - Closed Meeting of the Threat Reduction Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Threat Reduction Advisory... advisory committee meeting of the Threat Reduction Advisory Committee (Hereafter referred to as ``the...: Contact Mr. Eric Wright, Defense Threat Reduction Agency/AST, 8725 John J. Kingman Road, MS 6201, Fort...

  18. Threat to future global food security from climate change and ozone air pollution

    NASA Astrophysics Data System (ADS)

    Tai, Amos P. K.; Martin, Maria Val; Heald, Colette L.

    2014-09-01

    Future food production is highly vulnerable to both climate change and air pollution with implications for global food security. Climate change adaptation and ozone regulation have been identified as important strategies to safeguard food production, but little is known about how climate and ozone pollution interact to affect agriculture, nor the relative effectiveness of these two strategies for different crops and regions. Here we present an integrated analysis of the individual and combined effects of 2000-2050 climate change and ozone trends on the production of four major crops (wheat, rice, maize and soybean) worldwide based on historical observations and model projections, specifically accounting for ozone-temperature co-variation. The projections exclude the effect of rising CO2, which has complex and potentially offsetting impacts on global food supply. We show that warming reduces global crop production by >10% by 2050 with a potential to substantially worsen global malnutrition in all scenarios considered. Ozone trends either exacerbate or offset a substantial fraction of climate impacts depending on the scenario, suggesting the importance of air quality management in agricultural planning. Furthermore, we find that depending on region some crops are primarily sensitive to either ozone (for example, wheat) or heat (for example, maize) alone, providing a measure of relative benefits of climate adaptation versus ozone regulation for food security in different regions.

  19. Investigating hypervigilance for social threat of lonely children.

    PubMed

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A

    2013-02-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution paradigm (Study 1), scores on the Children's Rejection-Sensitivity Questionnaire (Study 2), and visual attention to socially rejecting stimuli (Study 3). The participants were 185 children (11 years-7 months to 12 years-6 months), 248 children (9 years-4 months to 11 years-8 months) and 140 children (8 years-10 months to 12 years-10 months) in the three studies, respectively. Regression analyses showed that, with depressive symptoms covaried, there were quadratic relations between loneliness and these different measures of hypervigilance to social threat. As hypothesized, only children in the upper range of loneliness demonstrated elevated hostility to ambiguously motivated social exclusion, higher scores on the rejection sensitivity questionnaire, and disengagement difficulties when viewing socially rejecting stimuli. We found that very lonely children are hypersensitive to social threat.

  20. Exploring the function of selective attention and hypervigilance for threat in anxiety.

    PubMed

    Richards, Helen J; Benson, Valerie; Donnelly, Nick; Hadwin, Julie A

    2014-02-01

    Theoretical frameworks of anxiety propose that attentional biases to threat-related stimuli cause or maintain anxious states. The current paper draws on theoretical frameworks and key empirical studies to outline the distinctive attentional processes highlighted as being important in understanding anxiety. We develop a conceptual framework to make a distinction between two attentional biases: selective attention to threat and hypervigilance for threat. We suggest that these biases each have a different purpose and can account for the typical patterns of facilitated and impaired attention evident in anxious individuals. The framework is novel in its specification of the eye movement behavior associated with these attentional biases. We highlight that selective attention involves narrowing overt attention onto threat to ensure that these stimuli receive processing priority, leading to rapid engagement with task-relevant threat and delayed disengagement from task-irrelevant threat. We show that hypervigilance operates in the presence and absence of threat and involves monitoring for potential dangers via attentional broadening or excessive scanning of the environment with numerous eye movements, leading to improved threat detection and increased distraction from task-irrelevant threat. We conclude that future research could usefully employ eye movement measures to more clearly understand the diverse roles of attention in anxiety. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Attention bias to threat faces in severe mood dysregulation.

    PubMed

    Hommer, Rebecca E; Meyer, Allison; Stoddard, Joel; Connolly, Megan E; Mogg, Karin; Bradley, Brendan P; Pine, Daniel S; Leibenluft, Ellen; Brotman, Melissa A

    2014-07-01

    We used a dot-probe paradigm to examine attention bias toward threat (i.e., angry) and happy face stimuli in severe mood dysregulation (SMD) versus healthy comparison (HC) youth. The tendency to allocate attention to threat is well established in anxiety and other disorders of negative affect. SMD is characterized by the negative affect of irritability, and longitudinal studies suggest childhood irritability predicts adult anxiety and depression. Therefore, it is important to study pathophysiologic connections between irritability and anxiety disorders. SMD patients (N = 74) and HC youth (N = 42) completed a visual probe paradigm to assess attention bias to emotional faces. Diagnostic interviews were conducted and measures of irritability and anxiety were obtained in patients. SMD youth differed from HC youth in having a bias toward threatening faces (P < .01). Threat bias was positively correlated with the severity of the SMD syndrome and depressive symptoms; degree of threat bias did not differ between SMD youth with and without co-occurring anxiety disorders or depression. SMD and HC youth did not differ in bias toward or away from happy faces. SMD youth demonstrate an attention bias toward threat, with greater threat bias associated with higher levels of SMD symptom severity. Our findings suggest that irritability may share a pathophysiological link with anxiety and depressive disorders. This finding suggests the value of exploring further whether attention bias modification treatments that are effective for anxiety are also helpful in the treatment of irritability. © 2013 Wiley Periodicals, Inc.

  2. Mutuality and the social regulation of neural threat responding

    PubMed Central

    Coan, James A.; Kasle, Shelley; Jackson, Alice; Schaefer, Hillary S.; Davidson, Richard J.

    2014-01-01

    Recent studies have shown that the presence of a caring relational partner can attenuate neural responses to threat. Here we report reanalyzed data from Coan, Schaefer, and Davidson (2006), investigating the role of relational mutuality in the neural response to threat. Mutuality reflects the degree to which couple members show mutual interest in the sharing of internal feelings, thoughts, aspirations, and joys – a vital form of responsiveness in attachment relationships. We predicted that wives who were high (versus low) in perceived mutuality, and who attended the study session with their husbands, would show reduced neural threat reactivity in response to mild electric shocks. We also explored whether this effect would depend on physical contact (handholding). As predicted, we observed that higher mutuality scores corresponded with decreased neural threat responding in the right dorsolateral prefrontal cortex and supplementary motor cortex. These effects were independent of hand-holding condition. These findings suggest that higher perceived mutuality corresponds with decreased self-regulatory effort and attenuated preparatory motor activity in response to threat cues, even in the absence of direct physical contact with social resources. PMID:23547803

  3. The cyber threat landscape: Challenges and future research directions

    NASA Astrophysics Data System (ADS)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  4. 75 FR 522 - National Emission Standards for Hazardous Air Pollutants: Area Source Standards for Prepared...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... to what constitutes the generally available control technology or management practices for the area... area sources, pose the greatest threat to public health in the largest number of urban areas. EPA implemented this provision in 1999 in the Integrated Urban Air Toxics Strategy, (64 FR 38715, July 19, 1999...

  5. Air Asset to Mission Assignment for Dynamic High-Threat Environments in Real-Time

    DTIC Science & Technology

    2015-03-01

    39 Initial Distribution List 41 viii List of Figures Figure 2.1 Joint Air Tasking Cycle (JCS 2014). An iterative 120-hour cycle for planners within the...minutes of on- staion time, or “playtime”, with a total of two GBU -16 laser-guided bomb (LGB) and an Advanced Targeting Forward Looking Infrared (ATFLIR...proba- bility of survival against the SA-2 and SA-3 systems, respectively. A GBU -16 LGB has no standoff capability and 90%, 60%, and 70% probability of

  6. Influence of Threat and Serotonin Transporter Genotype on Interference Effects

    PubMed Central

    Jasinska, Agnes J.; Ho, S. Shaun; Taylor, Stephan F.; Burmeister, Margit; Villafuerte, Sandra; Polk, Thad A.

    2012-01-01

    Emotion-cognition interactions are critical in goal-directed behavior and may be disrupted in psychopathology. Growing evidence also suggests that emotion-cognition interactions are modulated by genetic variation, including genetic variation in the serotonin system. The goal of the current study was to examine the impact of threat-related distracters and serotonin transporter promoter polymorphism (5-HTTLPR/rs25531) on cognitive task performance in healthy females. Using a novel threat-distracter version of the Multi-Source Interference Task specifically designed to probe emotion-cognition interactions, we demonstrate a robust and temporally dynamic modulation of cognitive interference effects by threat-related distracters relative to other distracter types and relative to no-distracter condition. We further show that threat-related distracters have dissociable and opposite effects on cognitive task performance in easy and difficult task conditions, operationalized as the level of response interference that has to be surmounted to produce a correct response. Finally, we present evidence that the 5-HTTLPR/rs25531 genotype in females modulates susceptibility to cognitive interference in a global fashion, across all distracter conditions, and irrespective of the emotional salience of distracters, rather than specifically in the presence of threat-related distracters. Taken together, these results add to our understanding of the processes through which threat-related distracters affect cognitive processing, and have implications for our understanding of disorders in which threat signals have a detrimental effect on cognition, including depression and anxiety disorders. PMID:22590463

  7. THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E

    Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.

  8. Threats to the viability of California spotted owls

    Treesearch

    John J. Keane

    2017-01-01

    The California spotted owl (Strix occidentalis occidentalis) is a species of conservation concern owing to threats to its habitat and populations. Verner et al. (1992) first assessed the status of the California spotted owl "The California Spotted Owl: A technical Assessment of it’s current status" (CASPO) and identified four factors as either threats or...

  9. What is the wildland fire threat to homes?

    Treesearch

    Jack D. Cohen

    2000-01-01

    The threat of life and property losses related to wildfires is a significant issue for federal, state, and local fire and planning agencies who consider the mix of residential areas and wildlands. The wildland fire threat is part of the more general consideration of human development encroaching wildlands. The March, 2000 edition of the Journal of Forestry reflects...

  10. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    PubMed

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  11. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  12. Analyzing Cyber-Physical Threats on Robotic Platforms.

    PubMed

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  13. Stereotype threat reduces false recognition when older adults are forewarned.

    PubMed

    Wong, Jessica T; Gallo, David A

    2016-01-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information--a phenomenon attributed to stereotype threat--but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval.

  14. Quantifying anthropogenic threats to orchids using the IUCN Red List.

    PubMed

    Wraith, Jenna; Pickering, Catherine

    2018-04-01

    Orchids are diverse, occur in a wide range of habitats and dominate threatened species lists, but which orchids are threatened, where and by what? Using the International Union for Conservation of Nature Red List, we assessed the range and diversity of threats to orchids globally including identifying four threat syndromes: (1) terrestrial orchids in forests that are endemic to a country and threatened by illegal collecting; (2) orchids threatened by climate change, pollution, transportation and disturbance/development for tourism, and recreation activities, often in East Asia; (3) epiphytic orchids in Sub-Saharan Africa including Madagascar with diverse threats; and (4) South and Southeast Asia orchids threatened by land clearing for shifting agriculture. Despite limitations in the Red List data, the results highlight how conservation efforts can focus on clusters of co-occurring threats in regions while remaining aware of the trifecta of broad threats from plant collecting, land clearing and climate change.

  15. Threat driven modeling framework using petri nets for e-learning system.

    PubMed

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  16. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    PubMed Central

    Klonek, Florian E.; Güntner, Amelie V.; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI) — an intervention aimed at increasing intrinsic motivation — can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group). We coded agents verbal threats and recipients’ verbal expressions of motivation. Recipients also rated agents’ level of confrontation and empathy (i.e., cognitive reactions). As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients’ expressed motivation (i.e., reasons to change). Contrary to our expectations, we found no relation between change agents’ verbal threats and change recipients’ verbally expressed self-defenses (i.e., sustain talk). Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations. PMID:26257676

  17. Age Differences in Selective Memory of Goal-Relevant Stimuli Under Threat.

    PubMed

    Durbin, Kelly A; Clewett, David; Huang, Ringo; Mather, Mara

    2018-02-01

    When faced with threat, people often selectively focus on and remember the most pertinent information while simultaneously ignoring any irrelevant information. Filtering distractors under arousal requires inhibitory mechanisms, which take time to recruit and often decline in older age. Despite the adaptive nature of this ability, relatively little research has examined how both threat and time spent preparing these inhibitory mechanisms affect selective memory for goal-relevant information across the life span. In this study, 32 younger and 31 older adults were asked to encode task-relevant scenes, while ignoring transparent task-irrelevant objects superimposed onto them. Threat levels were increased on some trials by threatening participants with monetary deductions if they later forgot scenes that followed threat cues. We also varied the time between threat induction and a to-be-encoded scene (i.e., 2 s, 4 s, 6 s) to determine whether both threat and timing effects on memory selectivity differ by age. We found that age differences in memory selectivity only emerged after participants spent a long time (i.e., 6 s) preparing for selective encoding. Critically, this time-dependent age difference occurred under threatening, but not neutral, conditions. Under threat, longer preparation time led to enhanced memory for task-relevant scenes and greater memory suppression of task-irrelevant objects in younger adults. In contrast, increased preparation time after threat induction had no effect on older adults' scene memory and actually worsened memory suppression of task-irrelevant objects. These findings suggest that increased time to prepare top-down encoding processes benefits younger, but not older, adults' selective memory for goal-relevant information under threat. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  18. Using Motivational Interviewing to reduce threats in conversations about environmental behavior.

    PubMed

    Klonek, Florian E; Güntner, Amelie V; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals' self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI) - an intervention aimed at increasing intrinsic motivation - can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group). We coded agents verbal threats and recipients' verbal expressions of motivation. Recipients also rated agents' level of confrontation and empathy (i.e., cognitive reactions). As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients' expressed motivation (i.e., reasons to change). Contrary to our expectations, we found no relation between change agents' verbal threats and change recipients' verbally expressed self-defenses (i.e., sustain talk). Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  19. Armed Escort for Special Air Operations -- An Operational Concept

    DTIC Science & Technology

    1990-06-01

    ALTITUDE FIELDED SA-6 USSR 4-24 km semi-active tracked, non 50-12000 m 1967 radar homing amphibious SA-7 USSR .5-5 km infrared man-portable 15-4500 a 1966...developed nations. This study is based upon a Soviet-style, Third World threat. As the Soviet Union continues to modernize and field new air defense...warfare avionics, and other radar, laser, and infrared detection defeating systems. While these don’t guarantee survivability should the lift

  20. Active-passive bistatic surveillance for long range air defense

    NASA Astrophysics Data System (ADS)

    Wardrop, B.; Molyneux-Berry, M. R. B.

    1992-06-01

    A hypothetical mobile support receiver capable of working within existing and future air defense networks as a means to maintain essential surveillance functions is considered. It is shown how multibeam receiver architecture supported by digital signal processing can substantially improve surveillance performance against chaff and jamming threats. A dual-mode support receiver concept is proposed which is based on the state-of-the-art phased-array technology, modular processing in industry standard hardware and existing networks.

  1. A proposed framework to operationalize ESS for the mitigation of soil threats

    NASA Astrophysics Data System (ADS)

    Schwilch, Gudrun; Bernet, Lea; Fleskens, Luuk; Mills, Jane; Stolte, Jannes; van Delden, Hedwig; Verzandvoort, Simone

    2015-04-01

    Despite various research activities in the last decades across the world, many challenges remain to integrate the concept of ecosystem services (ESS) in decision-making, and a coherent approach to assess and value ESS is still lacking. There are a lot of different - often context-specific - ESS frameworks with their own definitions and understanding of terms. Based on a thorough review, the EU FP7 project RECARE (www.recare-project.eu) suggests an adapted framework for ecosystem services related to soils that can be used for practical application in preventing and remediating degradation of soils in Europe. This lays the foundation for the development and selection of appropriate methods to measure, evaluate, communicate and negotiate the services we obtain from soils with stakeholders in order to improve land management. Similar to many ESS frameworks, the RECARE framework distinguishes between an ecosystem and human well-being part. As the RECARE project is focused on soil threats, this is the starting point on the ecosystem part of the framework. Soil threats affect natural capital, such as soil, water, vegetation, air and animals, and are in turn influenced by those. Within the natural capital, the RECARE framework focuses especially on soil and its properties, classified in inherent and manageable properties. The natural capital then enables and underpins soil processes, while at the same time being affected by those. Soil processes, finally, are the ecosystem's capacity to provide services, thus they support the provision of soil functions and ESS. ESS may be utilized to produce benefits for individuals and human society. Those benefits are explicitly or implicitly valued by individuals and human society. The values placed on those benefits influence policy and decision-making and thus lead to a societal response. Individual (e.g. farmers') and societal decision making and policy determine land management and other (human) driving forces, which in turn affect

  2. Strategic threat management: an exploration of nursing strategies in the pediatric intensive care unit.

    PubMed

    Durso, Francis T; Ferguson, Ashley N; Kazi, Sadaf; Cunningham, Charlene; Ryan, Christina

    2015-03-01

    Part of the work of a critical care nurse is to manage the threats that arise that could impede efficient and effective job performance. Nurses manage threats by employing various strategies to keep performance high and workload manageable. We investigated strategic threat management by using the Threat-Strategy Interview. Threats frequently involved technology, staff, or organizational components. The threats were managed by a toolbox of multifaceted strategies, the most frequent of which involved staff-, treatment- (patient + technology), examination- (patient + clinician), and patient-oriented strategies. The profile of strategies for a particular threat often leveraged work facets similar to the work facet that characterized the threat. In such cases, the nurse's strategy was directed at eliminating the threat (not working around it). A description at both a domain invariant level - useful for understanding strategic threat management generally - and a description at an operational, specific level - useful for guiding interventions-- are presented. A structural description of the relationship among threats, strategies, and the cues that trigger them is presented in the form of an evidence accumulation framework of strategic threat management. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  3. Atmospheric pollutants in peri-urban forests of Quercus ilex: evidence of pollution abatement and threats for vegetation.

    PubMed

    García-Gómez, Héctor; Aguillaume, Laura; Izquieta-Rojano, Sheila; Valiño, Fernando; Àvila, Anna; Elustondo, David; Santamaría, Jesús M; Alastuey, Andrés; Calvete-Sogo, Héctor; González-Fernández, Ignacio; Alonso, Rocío

    2016-04-01

    Peri-urban vegetation is generally accepted as a significant remover of atmospheric pollutants, but it could also be threatened by these compounds, with origin in both urban and non-urban areas. To characterize the seasonal and geographical variation of pollutant concentrations and to improve the empirical understanding of the influence of Mediterranean broadleaf evergreen forests on air quality, four forests of Quercus ilex (three peri-urban and one remote) were monitored in different areas in Spain. Concentrations of nitrogen dioxide (NO2), ammonia (NH3), nitric acid (HNO3) and ozone (O3) were measured during 2 years in open areas and inside the forests and aerosols (PM10) were monitored in open areas during 1 year. Ozone was the only air pollutant expected to have direct phytotoxic effects on vegetation according to current thresholds for the protection of vegetation. The concentrations of N compounds were not high enough to directly affect vegetation but could be contributing through atmospheric N deposition to the eutrophization of these ecosystems. Peri-urban forests of Q. ilex showed a significant below-canopy reduction of gaseous concentrations (particularly NH3, with a mean reduction of 29-38%), which indicated the feasibility of these forests to provide an ecosystem service of air quality improvement. Well-designed monitoring programs are needed to further investigate air quality improvement by peri-urban ecosystems while assessing the threat that air pollution can pose to vegetation.

  4. Threats and Strategies to Counter Threats: Voices of Elementary School Foreign Language Learniers

    ERIC Educational Resources Information Center

    Rosenbusch, Marcia Harmon; Sorensen, Laurie

    2004-01-01

    The experience described by Kay Hoag, Advocacy Chair of the National Network for Early Language Learning (NNELL), exemplifies the threat of program elimination and/or cutbacks that elementary school foreign language programs across the nation experienced with increased frequency during the 2002-2003 academic year. Reports of these threats…

  5. Attentional bias towards health-threat information in chronic fatigue syndrome.

    PubMed

    Hou, Ruihua; Moss-Morris, Rona; Bradley, Brendan P; Peveler, Robert; Mogg, Karin

    2008-07-01

    To investigate whether individuals with chronic fatigue syndrome (CFS) show an attentional bias towards health-threat information. Attentional bias (AB) was assessed in individuals with CFS and healthy controls using a visual probe task which presented health-threat and neutral words and pictures for 500 ms. Self-report questionnaires were used to assess CFS symptoms, depression, anxiety, and social desirability. Compared to a healthy control group, the CFS group showed an enhanced AB towards heath-threat stimuli relative to neutral stimuli. The AB was not influenced by the type of stimulus (pictures vs. words). The finding of an AB towards health-threat information in individuals with CFS is supportive of models of CFS which underlie cognitive behavior therapy.

  6. Threats and changes affecting human relationships with wilderness: Implications for management

    Treesearch

    Robert G. Dvorak; William T. Borrie; Alan E. Watson

    2011-01-01

    For wilderness managers, the ability to recognize threats and changing conditions is vital. While these threats are typically associated with resource and social conditions, they can also be investigated relative to wilderness relationships. This paper explores how threats and changes may be affecting human relationships with wilderness and the possible implications...

  7. Air pollution and health in Sri Lanka: a review of epidemiologic studies.

    PubMed

    Nandasena, Yatagama Lokuge S; Wickremasinghe, Ananda R; Sathiakumar, Nalini

    2010-06-02

    Air pollution is increasingly documented as a threat to public health in most developing countries. Evaluation of current air quality levels, regulatory standards and scientific literature on outdoor and indoor air pollution, and health effects are important to identify the burden, develop and implement interventions and to fill knowledge gaps in Sri Lanka. PUBMED and Medline databases, local journals and conference proceedings were searched for epidemiologic studies pertaining to air pollution and health effects in Sri Lanka. All the studies pertaining to air pollution and health effects were considered. Sixteen studies investigated the association between exposure to ambient or indoor air pollution (IAP) and various health outcomes ranging from respiratory symptoms, low birth weight and lung cancers. Of the sixteen, three used a case control design. Half of the studies collected exposure data only through questionnaires. There were positive associations between air pollution and adverse health effects in all studies. Methodological limitations in most of the studies resulted in poor quantification of risk estimates. A limited number of epidemiological studies in Sri Lanka have investigated the health effects of air pollution. Based on findings of studies and reported air quality levels, air pollution may be considered a neglected public health problem in Sri Lanka.

  8. Mental Health Problems in Adolescence and the Interpretation of Unambiguous Threat

    PubMed Central

    Henry, Julie D.; Moses, Ernestina; Castellini, Julieta; Scott, James

    2015-01-01

    Aberrant threat perception has been linked to paranoia, anxiety and other mental health problems, and is widely considered to be a core, transdiagnostic feature of psychopathology. However, to date there has been only limited investigation of whether mental health problems are associated with a biased interpretation of stimuli that have explicit (as opposed to ambiguous) connotations of threat. In the present study, 41 adolescents diagnosed with a mental illness and 45 demographically matched controls were asked to provide danger ratings of stimuli normatively rated as being either low or high in potential threat. All participants were also asked to complete background measures of cognitive function, mental health and wellbeing. The results indicated that the two groups did not differ in their capacity to discriminate between low and high threat stimuli, nor did they differ in the absolute level of threat that they attributed to these stimuli. However, for the control group, the overall level of threat perceived in facial stimuli was correlated with two important indices of mental health (depression and anxiety). No associations emerged in the clinical group. These data are discussed in relation to their potential implications for the role of aberrant threat perception in transdiagnostic models of mental health. PMID:26039081

  9. Generalized Anxiety Disorder, worry and attention to threat: A systematic review.

    PubMed

    Goodwin, Huw; Yiend, Jenny; Hirsch, Colette R

    2017-06-01

    Among anxious populations, attention has been demonstrated to be preferentially biased to threatening material compared to neutral or other valenced material. Individuals who have high levels of trait worry, such as those with Generalized Anxiety Disorder (GAD), may be biased to threat but research has produced equivocal findings. This review aimed to systematically review the extant experimental literature to establish the current evidence of attentional bias to threat among trait worriers compared to healthy controls and other clinical populations. Twenty-nine published articles were included in the final review. There was strong evidence of a bias to threat among GAD patients compared to other groups and this was found across most experimental paradigms. Few studies had investigated this bias in non-clinical trait worriers. Among GAD patients this bias to threat was most strongly evidenced when visual threat material was in a verbal-linguistic format (i.e., words) rather than when in pictorial form (i.e., images or faces). The bias was also found across several domains of negative material, supporting the general nature of worry. Further research should look to examine the specific components of the threat bias in GAD, as well as investigating the bias to threat in trait worriers. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Tehran Air Pollutants Prediction Based on Random Forest Feature Selection Method

    NASA Astrophysics Data System (ADS)

    Shamsoddini, A.; Aboodi, M. R.; Karami, J.

    2017-09-01

    Air pollution as one of the most serious forms of environmental pollutions poses huge threat to human life. Air pollution leads to environmental instability, and has harmful and undesirable effects on the environment. Modern prediction methods of the pollutant concentration are able to improve decision making and provide appropriate solutions. This study examines the performance of the Random Forest feature selection in combination with multiple-linear regression and Multilayer Perceptron Artificial Neural Networks methods, in order to achieve an efficient model to estimate carbon monoxide and nitrogen dioxide, sulfur dioxide and PM2.5 contents in the air. The results indicated that Artificial Neural Networks fed by the attributes selected by Random Forest feature selection method performed more accurate than other models for the modeling of all pollutants. The estimation accuracy of sulfur dioxide emissions was lower than the other air contaminants whereas the nitrogen dioxide was predicted more accurate than the other pollutants.

  11. A simple strategy to reduce stereotype threat for orthopedic residents

    PubMed Central

    Gomez, Everlyne; Wright, James G.

    2014-01-01

    Background Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. Methods The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Results Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Conclusion Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR. PMID:24666454

  12. A simple strategy to reduce stereotype threat for orthopedic residents.

    PubMed

    Gomez, Everlyne; Wright, James G

    2014-04-01

    Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR.

  13. Future Infectious Disease Threats to Europe

    PubMed Central

    Suk, Jonathan E.

    2011-01-01

    We examined how different drivers of infectious disease could interact to threaten control efforts in Europe. We considered projected trends through 2020 for 3 broad groups of drivers: globalization and environmental change, social and demographic change, and health system capacity. Eight plausible infectious disease threats with the potential to be significantly more problematic than they are today were identified through an expert consultation: extensively drug-resistant bacteria, vector-borne diseases, sexually transmitted infections, food-borne infections, a resurgence of vaccine-preventable diseases, health care–associated infections, multidrug-resistant tuberculosis, and pandemic influenza. Preemptive measures to be taken by the public health community to counteract these threats were identified. PMID:21940915

  14. Emotion blocks the path to learning under stereotype threat

    PubMed Central

    Good, Catherine; Whiteman, Ronald C.; Maniscalco, Brian; Dweck, Carol S.

    2012-01-01

    Gender-based stereotypes undermine females’ performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback related negativity (FRN), P3a], as well as any subsequent sustained attention/arousal to that information [late positive potential (LPP)]. Learning was defined as success in applying tutorial information to correction of initial test errors on a surprise retest 24-h later. Under non-threat conditions, emotional responses to negative feedback did not curtail exploration of the tutor, and the amount of tutor exploration predicted learning success. In the stereotype threat condition, however, greater initial salience of the failure (FRN) predicted less exploration of the tutor, and sustained attention to the negative feedback (LPP) predicted poor learning from what was explored. Thus, under stereotype threat, emotional responses to negative feedback predicted both disengagement from learning and interference with learning attempts. We discuss the importance of emotion regulation in successful rebound from failure for stigmatized groups in stereotype-salient environments. PMID:21252312

  15. Emotion blocks the path to learning under stereotype threat.

    PubMed

    Mangels, Jennifer A; Good, Catherine; Whiteman, Ronald C; Maniscalco, Brian; Dweck, Carol S

    2012-02-01

    Gender-based stereotypes undermine females' performance on challenging math tests, but how do they influence their ability to learn from the errors they make? Females under stereotype threat or non-threat were presented with accuracy feedback after each problem on a GRE-like math test, followed by an optional interactive tutorial that provided step-wise problem-solving instruction. Event-related potentials tracked the initial detection of the negative feedback following errors [feedback related negativity (FRN), P3a], as well as any subsequent sustained attention/arousal to that information [late positive potential (LPP)]. Learning was defined as success in applying tutorial information to correction of initial test errors on a surprise retest 24-h later. Under non-threat conditions, emotional responses to negative feedback did not curtail exploration of the tutor, and the amount of tutor exploration predicted learning success. In the stereotype threat condition, however, greater initial salience of the failure (FRN) predicted less exploration of the tutor, and sustained attention to the negative feedback (LPP) predicted poor learning from what was explored. Thus, under stereotype threat, emotional responses to negative feedback predicted both disengagement from learning and interference with learning attempts. We discuss the importance of emotion regulation in successful rebound from failure for stigmatized groups in stereotype-salient environments.

  16. Disaster Preparedness: Biological Threats and Treatment Options.

    PubMed

    Narayanan, Navaneeth; Lacy, Clifton R; Cruz, Joseph E; Nahass, Meghan; Karp, Jonathan; Barone, Joseph A; Hermes-DeSantis, Evelyn R

    2018-02-01

    Biological disasters can be natural, accidental, or intentional. Biological threats have made a lasting impact on civilization. This review focuses on agents of clinical significance, bioterrorism, and national security, specifically Category A agents (anthrax, botulism, plague, tularemia, and smallpox), as well as briefly discusses other naturally emerging infections of public health significance, Ebola virus (also a Category A agent) and Zika virus. The role of pharmacists in disaster preparedness and disaster response is multifaceted and important. Their expertise includes clinical knowledge, which can aid in drug information consultation, patient-specific treatment decision making, and development of local treatment plans. To fulfill this role, pharmacists must have a comprehensive understanding of medical countermeasures for these significant biological threats across all health care settings. New and reemerging infectious disease threats will continue to challenge the world. Pharmacists will be at the forefront of preparedness and response, sharing knowledge and clinical expertise with responders, official decision makers, and the general public. © 2017 Pharmacotherapy Publications, Inc.

  17. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  18. The Threat Among Us: Insiders Intensify Aviation Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krull, Katie E.

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway formore » attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.« less

  19. Investigations of chemical warfare agents and toxic industrial compounds with proton-transfer-reaction mass spectrometry for a real-time threat monitoring scenario.

    PubMed

    Kassebacher, Thomas; Sulzer, Philipp; Jürschik, Simone; Hartungen, Eugen; Jordan, Alfons; Edtbauer, Achim; Feil, Stefan; Hanel, Gernot; Jaksch, Stefan; Märk, Lukas; Mayhew, Chris A; Märk, Tilmann D

    2013-01-30

    Security and protection against terrorist attacks are major issues in modern society. One especially challenging task is the monitoring and protection of air conditioning and heating systems of buildings against terrorist attacks with toxic chemicals. As existing technologies have low selectivity, long response times or insufficient sensitivity, there is a need for a novel approach such as we present here. We have analyzed various chemical warfare agents (CWAs) and/or toxic industrial compounds (TICs) and related compounds, namely phosgene, diphosgene, chloroacetone, chloroacetophenone, diisopropylaminoethanol, and triethyl phosphate, utilizing a high-resolution proton-transfer-reaction time-of-flight mass spectrometry (PTR-TOFMS) instrument with the objective of finding key product ions and their intensities, which will allow a low-resolution quadrupole mass spectrometry based PTR-MS system to be used with high confidence in the assignment of threat agents in the atmosphere. We obtained high accuracy PTR-TOFMS mass spectra of the six compounds under study at two different values for the reduced electric field in the drift tube (E/N). From these data we have compiled a table containing product ions, and isotopic and E/N ratios for highly selective threat compound detection with a compact and cost-effective quadrupole-based PTR-MS instrument. Furthermore, using chloroacetophenone (tear gas), we demonstrated that this instrument's response is highly linear in the concentration range of typical Acute Exposure Guideline Levels (AEGLs). On the basis of the presented results it is possible to develop a compact and cost-effective PTR-QMS instrument that monitors air supply systems and triggers an alarm as soon as the presence of a threat agent is detected. We hope that this real-time surveillance device will help to seriously improve safety and security in environments vulnerable to terrorist attacks with toxic chemicals. Copyright © 2012 John Wiley & Sons, Ltd.

  20. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)