Science.gov

Sample records for air piracy threats

  1. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  2. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  3. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  4. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  5. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  6. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  7. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  8. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  9. 49 CFR 1544.303 - Bomb or air piracy threats.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility,...

  10. 49 CFR 1546.301 - Bomb or air piracy threats.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the... carrier ensures that the pilot in command is advised immediately to take the emergency action...

  11. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    NASA Astrophysics Data System (ADS)

    Dabova, E. L.

    2013-11-01

    with other subsystems like South East Asia may have different approaches to global governance, international constitutional order, or particular cases such as the measure of infringement of human rights when targeting individuals suspected of terrorist links. Yet international law remains the key part of the Asian and global security regime. The hypothesis of this study is that the "void of governance" regime in territorial and international waters provides lucrative environment for developing terrorism, piracy, environmental degradation, and other criminal activities that pose untraditional threats to the regional security. This "void of governance" regime can be caused by either, or both, de jure or de facto insufficient control over particular marine territories.

  12. Contemporary threats and air pollution

    NASA Astrophysics Data System (ADS)

    Hopke, Philip K.

    It is now well understood that air pollution produces significant adverse health effects in the general public and over the past 60 years, there have been on-going efforts to reduce the emitted pollutants and their resulting health effects. There are now shifting patterns of industrialization with many heavily polluting industries moving from developed countries with increasingly stringent air quality standards to the developing world. However, even in decreasing concentrations of pollutants, health effects remain important possibly as a result of changes in the nature of the pollutants as new chemicals are produced and as other causes of mortality and morbidity are reduced. In addition, there is now the potential for deliberate introduction of toxic air pollutants by local armed conflicts and terrorists. Thus, there are new challenges to understand the role of the atmospheric environment on public health in this time of changing economic and demographic conditions overlaid with the willingness to indirectly attack governments and other established entities through direct attacks on the general public.

  13. Controlling Software Piracy.

    ERIC Educational Resources Information Center

    King, Albert S.

    1992-01-01

    Explains what software manufacturers are doing to combat software piracy, recommends how managers should deal with this problem, and provides a role-playing exercise to help students understand the issues in software piracy. (SR)

  14. Law, Pirates, and Piracy

    ERIC Educational Resources Information Center

    Middleton, Tiffany Willey

    2010-01-01

    Maritime piracy has increasingly been in the news, and in the courtroom, in recent years. This article presents an interview with international legal and overseas piracy expert Douglas Guilfoyle. In this interview, Guilfoyle discusses why piracy is a growing problem and some of the challenges it creates for the international community. He also…

  15. Analyzing Software Piracy in Education.

    ERIC Educational Resources Information Center

    Lesisko, Lee James

    This study analyzes the controversy of software piracy in education. It begins with a real world scenario that presents the setting and context of the problem. The legalities and background of software piracy are explained and true court cases are briefly examined. Discussion then focuses on explaining why individuals and organizations pirate…

  16. Design, Development, and Innovation of an Interactive Multimedia Training Simulator for Responding to Air Transportation Bomb Threats

    NASA Technical Reports Server (NTRS)

    Chung, Christopher A.; Marwaha, Shweta

    2005-01-01

    This paper describes an interactive multimedia simulator for air transportation bomb threat training. The objective of this project is to improve the air transportation sector s capability to respond to bomb threats received by commercial airports and aircraft. The simulator provides realistic training on receiving and responding to a variety of bomb threats that might not otherwise be possible due to time, cost, or operational constraints. Validation analysis indicates that the use of the simulator resulted in statistically significant increases in individual ability to respond to these types of bomb threats.

  17. Congress Seeks Tales of Piracy

    ERIC Educational Resources Information Center

    Read, Brock

    2007-01-01

    This month, leaders of two committees in the U.S. House of Representatives sent letters warning of an epidemic of online music and movie piracy to 19 colleges, singling out those schools that, in the eyes of entertainment-industry officials, have been unable to stop students from illegally downloading music and movies. Enclosed with each message…

  18. Deindividuation and Internet software piracy.

    PubMed

    Hinduja, Sameer

    2008-08-01

    Computer crime has increased exponentially in recent years as hardware, software, and network resources become more affordable and available to individuals from all walks of life. Software piracy is one prevalent type of cybercrime and has detrimentally affected the economic health of the software industry. Moreover, piracy arguably represents a rend in the moral fabric associated with the respect of intellectual property and reduces the financial incentive of product creation and innovation. Deindividuation theory, originating from the field of social psychology, argues that individuals are extricated from responsibility for their actions simply because they no longer have an acute awareness of the identity of self and of others. That is, external and internal constraints that would typically regulate questionable behavior are rendered less effective via certain anonymizing and disinhibiting conditions of the social and environmental context. This exploratory piece seeks to establish the role of deindividuation in liberating individuals to commit software piracy by testing the hypothesis that persons who prefer the anonymity and pseudonymity associated with interaction on the Internet are more likely to pirate software. Through this research, it is hoped that the empirical identification of such a social psychological determinant will help further illuminate the phenomenon. PMID:18721086

  19. A five states survivability model for missions with ground-to-air threats

    NASA Astrophysics Data System (ADS)

    Erlandsson, Tina; Niklasson, Lars

    2013-05-01

    Fighter pilots are exposed to the risk of getting hit by enemy fire when flying missions with ground-to-air threats. A tactical support system including a survivability model could aid the pilot to assess and handle this risk. The survivability model presented here is a Markov model with five states; Undetected, Detected, Tracked, Engaged and Hit. The output from the model is the probabilities that the aircraft is in these states during the mission. The enemy's threat systems are represented with sensor and weapon areas and the transitions between the states depend on whether or not the aircraft is within any of these areas. Contrary to previous work, the model can capture the behaviors that the enemy's sensor systems communicate and that the risk of getting hit depends on the enemy's knowledge regarding the aircraft's kinematics. The paper includes a discussion regarding the interpretation of the states and the factors that influence the transitions between the states. Further developments are also identified for using the model to aid fighter pilots and operators of unmanned aerial vehicles with planning and evaluating missions as well as analyzing the situation during flight.

  20. Digital Piracy: An Assessment of Consumer Piracy Risk and Optimal Supply Chain Coordination Strategies

    ERIC Educational Resources Information Center

    Jeong, Bong-Keun

    2010-01-01

    Digital piracy and the emergence of new distribution channels have changed the dynamics of supply chain coordination and created many interesting problems. There has been increased attention to understanding the phenomenon of consumer piracy behavior and its impact on supply chain profitability. The purpose of this dissertation is to better…

  1. UCAV path planning in the presence of radar-guided surface-to-air missile threats

    NASA Astrophysics Data System (ADS)

    Zeitz, Frederick H., III

    This dissertation addresses the problem of path planning for unmanned combat aerial vehicles (UCAVs) in the presence of radar-guided surface-to-air missiles (SAMs). The radars, collocated with SAM launch sites, operate within the structure of an Integrated Air Defense System (IADS) that permits communication and cooperation between individual radars. The problem is formulated in the framework of the interaction between three sub-systems: the aircraft, the IADS, and the missile. The main features of this integrated model are: The aircraft radar cross section (RCS) depends explicitly on both the aspect and bank angles; hence, the RCS and aircraft dynamics are coupled. The probabilistic nature of IADS tracking is accounted for; namely, the probability that the aircraft has been continuously tracked by the IADS depends on the aircraft RCS and range from the perspective of each radar within the IADS. Finally, the requirement to maintain tracking prior to missile launch and during missile flyout are also modeled. Based on this model, the problem of UCAV path planning is formulated as a minimax optimal control problem, with the aircraft bank angle serving as control. Necessary conditions of optimality for this minimax problem are derived. Based on these necessary conditions, properties of the optimal paths are derived. These properties are used to discretize the dynamic optimization problem into a finite-dimensional, nonlinear programming problem that can be solved numerically. Properties of the optimal paths are also used to initialize the numerical procedure. A homotopy method is proposed to solve the finite-dimensional, nonlinear programming problem, and a heuristic method is proposed to improve the discretization during the homotopy process. Based upon the properties of numerical solutions, a method is proposed for parameterizing and storing information for later recall in flight to permit rapid replanning in response to changing threats. Illustrative examples are

  2. Software Piracy in Research: A Moral Analysis.

    PubMed

    Santillanes, Gary; Felder, Ryan Marshall

    2015-08-01

    Researchers in virtually every discipline rely on sophisticated proprietary software for their work. However, some researchers are unable to afford the licenses and instead procure the software illegally. We discuss the prohibition of software piracy by intellectual property laws, and argue that the moral basis for the copyright law offers the possibility of cases where software piracy may be morally justified. The ethics codes that scientific institutions abide by are informed by a rule-consequentialist logic: by preserving personal rights to authored works, people able to do so will be incentivized to create. By showing that the law has this rule-consequentialist grounding, we suggest that scientists who blindly adopt their institutional ethics codes will commit themselves to accepting that software piracy could be morally justified, in some cases. We hope that this conclusion will spark debate over important tensions between ethics codes, copyright law, and the underlying moral basis for these regulations. We conclude by offering practical solutions (other than piracy) for researchers. PMID:25005342

  3. On the dynamics of stream piracy

    NASA Astrophysics Data System (ADS)

    Goren, L.; Willett, S. D.

    2012-04-01

    Drainage network reorganization by stream piracy is invoked repeatedly to explain the morphology of unique drainage patterns and as a possible mechanism inducing abrupt variations of sediment accumulation rates. However, direct evidence of stream piracy is usually rare, and is highly interpretation dependent. As a first step in assessing how probable capture events are and establishing the conditions that favor stream piracy versus the those that favor stable landscapes, we formulate analytically the physics of divide migration and capture events and study this formulation from a dynamical system point of view. The formulation is based on a one-dimensional topographic cross section between two channels that share a water divide. Two hillslope profiles diverge from the divide and drain into two fluvial bedrock tributaries, whose erosion rate is controlled by a stream power law. The rate of erosion at the bounding channels is thus a function of the upstream drainage area and local slope. A tectonically induced downward perturbation of the elevation of one of the bounding channels lowers the channel slope but at the same time increases the drainage area due to outward migration of the water divide. The changes in slope and area have opposing effect on the erosion rate at the bounding channels, so that the perturbation may either grow or be damped. We define the geomorphic and tectonic parameters that control the behavior of the system and find the regimes that lead to stable landscapes and to capture events.

  4. A parametric design of ceramic faced composite armor subject to air weapon threats

    NASA Astrophysics Data System (ADS)

    Guo, Y. N.; Sun, Q.

    2015-12-01

    By taking into consideration the two categories of military projectile threats to aircraft structures, an optimal layer configuration of ceramic faced composite armor was designed in this paper. Using numerical simulations and the same layer arrangement of ceramic, UHMWPE, and carbon fiber laminates, a parametric finite element model using LS-DYNA code was built. Several thickness combinations were analyzed in order to determine the final lightest configuration that is capable of supporting a high-speed impact load and HEI blast wave load, which implements a high anti-penetration design for aircraft armor. This configuration can be used to improve the anti-impact ability of aircraft structures as well as achieve a structure/function integration design that considers a lighter weight.

  5. A methodology for the evaluation of the turbine jet engine fragment threat to generic air transportable containers

    SciTech Connect

    Harding, D.C.; Pierce, J.D.

    1993-06-01

    Uncontained, high-energy gas turbine engine fragments are a potential threat to air-transportable containers carried aboard jet aircraft. The threat to a generic example container is evaluated by probability analyses and penetration testing to demonstrate the methodology to be used in the evaluation of a specific container/aircraft/engine combination. Fragment/container impact probability is the product of the uncontained fragment release rate and the geometric probability that a container is in the path of this fragment. The probability of a high-energy rotor burst fragment from four generic aircraft engines striking one of the containment vessels aboard a transport aircraft is approximately 1.2 {times} 10{sup {minus}9} strikes/hour. Finite element penetration analyses and tests can be performed to identify specific fragments which have the potential to penetrate a generic or specific containment vessel. The relatively low probability of engine fragment/container impacts is primarily due to the low release rate of uncontained, hazardous jet engine fragments.

  6. College Students; Justification for Digital Piracy: A Mixed Methods Study

    ERIC Educational Resources Information Center

    Yu, Szde

    2012-01-01

    A mixed methods project was devoted to understanding college students' justification for digital piracy. The project consisted of two studies, a qualitative one and a quantitative one. Qualitative interviews were conducted to identify main themes in students' justification for digital piracy, and then the findings were tested in a quantitative…

  7. Curbing International Piracy of Intellectual Property. Policy Options for a Major Exporting Country.

    ERIC Educational Resources Information Center

    Hoffman, Gary M.; Marcou, George T.

    This report of the International Piracy Project addresses three major topics: (1) The Costs and Complications of Piracy; (2) Rights Enforcement Today; and (3) Policy Options for Curbing Piracy. The first section discusses piracy of copyrights, patents, and other intellectual property, including economic losses and damage to the finances and…

  8. Evaluation of hybrid fusion 2+ approach for providing air-to-air situational awareness and threat assessment

    NASA Astrophysics Data System (ADS)

    Lee, Kangjin David; Wiesenfeld, Eric; Colony, Mike

    2006-05-01

    Modern combat aircraft pilots increasingly rely on high-level fusion models (JDL Levels 2/3) to provide real-time engagement support in hostile situations. These models provide both Situational Awareness (SA) and Threat Assessment (TA) based on data and the relationships between the data. This information represents two distinct classes of uncertainty: vagueness and ambiguity. To address the needs associated with modeling both of these types of data uncertainty, an innovative hybrid approach was recently introduced, combining probability theory and possibility theory into a unified computational framework. The goal of this research is to qualitatively and quantitatively address the advantages and disadvantages of adopting this hybrid framework as well as identifying instances in which the combined model outperforms or is more appropriate than more classical inference approaches. To accomplish this task, domain specific models will be developed using different theoretical approaches and conventions, and then evaluated in comparison to situational ground truth to determine their accuracy and fidelity. Additionally, the performance tradeoff between accuracy and complexity will be examined in terms of computational cost to determine both the advantages and disadvantages of each approach.

  9. Self-control, deviant peers, and software piracy.

    PubMed

    Higgins, George E; Makin, David A

    2004-12-01

    Tests of self-control theory have examined a substantial number of criminal behaviors, but no study has examined the correlation of low self-control with software piracy. Using data collected from 302 students in this university, this study examined the correlation of low self-control with software piracy and the moderating role of associating with deviant peers in this correlation. Low self-control correlated with software piracy more strongly for those who had high associations with deviant peers than for students with low associations with deviant peers. Analysis indicated differential links for lack of moral attitude in relation to software piracy and favorable attitudes for software piracy for varying association with deviant peers. PMID:15666930

  10. [Buenos Aires, between Eros and Thanatos. Prostitution as dysgenic threat (1930-1955)].

    PubMed

    Miranda, Marisa A

    2012-01-01

    This paper explores the medical-legal discourse around female prostitution that was articulated in Buenos Aires during the first decades of the 20th century. It focuses on the use of different ideological resources and on the policies and laws that were introduced to gain control over the sex trade and describes parallelisms between prostitution, disease and crime. In fact, the capital of Argentina was internationally known as a centre of prostitution and white slave trafficking, and Jewish participation in these activities allowed the consolidation of xenophobic theories. Medicine and law, among other disciplines, made important inputs into a simplified approach to this problem. PMID:22849217

  11. Threat to future global food security from climate change and ozone air pollution

    NASA Astrophysics Data System (ADS)

    Tai, Amos P. K.; Martin, Maria Val; Heald, Colette L.

    2014-09-01

    Future food production is highly vulnerable to both climate change and air pollution with implications for global food security. Climate change adaptation and ozone regulation have been identified as important strategies to safeguard food production, but little is known about how climate and ozone pollution interact to affect agriculture, nor the relative effectiveness of these two strategies for different crops and regions. Here we present an integrated analysis of the individual and combined effects of 2000-2050 climate change and ozone trends on the production of four major crops (wheat, rice, maize and soybean) worldwide based on historical observations and model projections, specifically accounting for ozone-temperature co-variation. The projections exclude the effect of rising CO2, which has complex and potentially offsetting impacts on global food supply. We show that warming reduces global crop production by >10% by 2050 with a potential to substantially worsen global malnutrition in all scenarios considered. Ozone trends either exacerbate or offset a substantial fraction of climate impacts depending on the scenario, suggesting the importance of air quality management in agricultural planning. Furthermore, we find that depending on region some crops are primarily sensitive to either ozone (for example, wheat) or heat (for example, maize) alone, providing a measure of relative benefits of climate adaptation versus ozone regulation for food security in different regions.

  12. Design considerations and performance characteristics of AirSentinel: a new UV-LIF bio-aerosol threat detection trigger

    NASA Astrophysics Data System (ADS)

    DeFreez, Richard; Merrill, Ezra; Albanna, Sam; Davis, Bert; Call, Charles

    2005-10-01

    AirSentinel® is a new low cost, compact ultraviolet-based light induced fluorescence (UV-LIF) bio-aerosol threat detection trigger. Earlier UV-LIF triggers, for example, FLAPS, BARTS, BAWS, Bioni, and BioLert, have used UV laser sources to induce fluorescence of biological aerosols. Two recent developments from the DARPA MTO SUVOS program, BAST and TAC-BIO, use UV LEDs for the same purpose, thereby broadening the term UV-LIF to mean laser or LED induced autofluorescence. All of these earlier triggers interrogate aerosols on a particle-by-particle basis on- the-fly. The major trade-off for these instruments is cost, size, and complexity versus counting efficiency (probability of detection) with the lower size end of the respirable range being most difficult to detect. AirSentinel® employs a different approach to UV-LIF detection: aerosol concentration by collection on a surface, surface interrogation, and surface rejuvenation prior to repeated concentration and interrogation cycles. Aerosol particle concentration via impaction on a surface addresses the issue of small particle counting efficiency since the fluorescence from the sum of the particles is the sum of the fluorescence signals from the collected particles, typically hundreds or thousands in number. Surface interrogation for a LIF signal is accomplished by illumination with a 280 nm and/or a 365 nm LED. As expected, test results show better relative detection performance using 280 nm excitation LEDs for bio-toxin simulants and somewhat better performance at 365 nm for standard Bacillus globigii spore targets. AirSentinel® beta technology is currently in long term testing in a number of public and other government buildings.

  13. Stream piracy in the Black Hills: A geomorphology lab exercise

    USGS Publications Warehouse

    Zaprowski, B.J.; Evenson, E.B.; Epstein, J.B.

    2002-01-01

    The Black Hills of South Dakota exhibits many fine examples of stream piracy that are very suitable for teaching geomorphology lab exercises. This lab goes beyond standard topographic map interpretation by using geologic maps, well logs, gravel provenance and other types of data to teach students about stream piracy. Using a step-by-step method in which the lab exercises ramp up in difficulty, students hone their skills in deductive reasoning and data assimilation. The first exercises deal with the identification of stream piracy at a variety of spatial scales and the lab culminates with an exercise on landscape evolution and drainage rearrangement.

  14. 49 CFR 1540.115 - Threat assessments regarding citizens of the United States holding or applying for FAA...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES... piracy or terrorism; (3) A threat to airline or passenger security; or (4) A threat to civil aviation... Federal Aviation Administration. Individual means an individual whom TSA determines poses a...

  15. 49 CFR 1540.115 - Threat assessments regarding citizens of the United States holding or applying for FAA...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES... piracy or terrorism; (3) A threat to airline or passenger security; or (4) A threat to civil aviation... Federal Aviation Administration. Individual means an individual whom TSA determines poses a...

  16. Widespread Piracy by Students Frustrates Developers of Computer Software.

    ERIC Educational Resources Information Center

    DeLoughry, Thomas J.

    1987-01-01

    Computer software producers view students' illegal copying of programs as lost revenue and feel powerless to stop the piracy. Some propose to change student attitudes about copying, others suggest reducing software prices, and still others are calling for prosecution. (MSE)

  17. Imperial boyhood: piracy and the play ethic.

    PubMed

    Deane, Bradley

    2011-01-01

    Representations of perpetual boyhood came to fascinate the late Victorians, partly because such images could naturalize a new spirit of imperial aggression and new policies of preserving power. This article traces the emergence of this fantasy through a series of stories about the relationship of the boy and the pirate, figures whose opposition in mid-Victorian literature was used to articulate the moral legitimacy of colonialism, but who became doubles rather than antitheses in later novels, such as R.L. Stevenson's "Treasure Island" and Joseph Conrad's "Lord Jim." Masculine worth needed no longer to be measured by reference to transcendent, universal laws, but by a morally flexible ethic of competitive play, one that bound together boyishness and piracy in a satisfying game of international adventure. PMID:22355829

  18. Magma Piracy in the Southern Mariana Backarc

    NASA Astrophysics Data System (ADS)

    Becker, N. C.; Fryer, P.; Martinez, F.; Stern, R. J.; Bloomer, S. H.

    2001-12-01

    Since 1997 the southern Mariana convergent margin system has been mapped with Hydrosweep, MR-1, and SeaBeam swath sonar systems on five cruises resulting in 168,500 km2 of bathymetry data and 186,800 km2 of sidescan data, revealing anomalous processes relative to the rest of the Mariana region. Most of the Mariana Arc is characterized by arc volcanism dominated by large, central volcanoes located at the boundary between a backarc basin with slow-spreading ridge morphology and a nonaccretionary forearc composed of Eocene volcanic arc rocks But southwest of Tracey Seamount, the southernmost large central arc volcano, the character of the arc and backarc changes dramatically. The arc volcanoes become small or nonexistent, but those that do occur lie along relict spreading fabric within the backarc basin. Furthermore, the spreading center appears to have an inflated, fast-spreading morphology, including dueling propagator fabric, and this southern backarc basin forms a shallow plateau overall. The spreading center then becomes less well-defined west of 143oE, and the volcanism appears to cease altogether west of 142oE in an area of amagmatic rifting, an observation supported by earthquake focal mechanisms and magnetics. The inflated morphology of the spreading axis, along with the absence or reduced size of nearby arc volcanoes suggests that arc magmas have been entrained into the backarc-spreading magmatic system. This "magma piracy" would result in arc magma being erupted at the backarc spreading center, therefore the backarc crust would be formed in part from arc magmas. Dredge samples from along the active ridge show compositions consistent with this suggestion. We suggest that this magma piracy has dominated the southern backarc basin for at least the last 3 m.y. since the robust spreading began. We suggest that the apparently higher magma production rate and the hybridized crust could account for the shallowness of the basin, as the more evolved arc-lavas would

  19. Biological Threats

    MedlinePlus

    ... Thunderstorms & Lightning Tornadoes Tsunamis Volcanoes Wildfires Main Content Biological Threats Biological agents are organisms or toxins that ... Centers for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may ...

  20. Removing the Threat in the Air: Teacher Transparency and the Creation of Identity-Safe Graduate Classrooms

    ERIC Educational Resources Information Center

    Tuitt, Franklin

    2008-01-01

    Through a qualitative investigation, the author examined the experiences of 12 Black graduate students to understand better the impact of stereotype threat (Steele, 1997a , 1999) and performance anxieties (Osborne, 2001) on their education in a traditionally white institution (TWI). The results of this study illustrate how some students enter the…

  1. Growth of desferrioxamine-deficient Streptomyces mutants through xenosiderophore piracy of airborne fungal contaminations.

    PubMed

    Arias, Anthony Argüelles; Lambert, Stéphany; Martinet, Loïc; Adam, Delphine; Tenconi, Elodie; Hayette, Marie-Pierre; Ongena, Marc; Rigali, Sébastien

    2015-07-01

    Due to the necessity of iron for housekeeping functions, nutrition, morphogenesis and secondary metabolite production, siderophore piracy could be a key strategy in soil and substrate colonization by microorganisms. Here we report that mutants of bacterium Streptomyces coelicolor unable to produce desferrioxamine siderophores could recover growth when the plates were contaminated by indoor air spores of a Penicillium species and Engyodontium album. UPLC-ESI-MS analysis revealed that the HPLC fractions with the extracellular 'resuscitation' factors of the Penicillium isolate were only those that contained siderophores, i.e. Fe-dimerum acid, ferrichrome, fusarinine C and coprogen. The restored growth of the Streptomyces mutants devoid of desferrioxamine is most likely mediated through xenosiderophore uptake as the cultivability depends on the gene encoding the ABC-transporter-associated DesE siderophore-binding protein. That a filamentous fungus allows the growth of desferrioxamine non-producing Streptomyces in cocultures confirms that xenosiderophore piracy plays a vital role in nutritional interactions between these taxonomically unrelated filamentous microorganisms. PMID:26183915

  2. Stream-piracy impact on the long-term evolution of the Meuse basin. Physical approach "modeling with GOLEM"

    NASA Astrophysics Data System (ADS)

    Benaichouche, A.; Stab, O.; Cojan, I.; Brulhet, J.; Tijani, M.; Tessier, B.

    2012-04-01

    Landscape evolution results of antagonistic processes. In the Paris basin (France): tectonic uplift seems to be globally balanced by river incision. But the dynamic equilibrium of the relief can be disturbed by other processes and singularities may appear. A remarkable example is observed in the Meuse basin (NE of France), where the river is actually perched at more than +50m above the surrounding valleys: the Marne valley to the west and the Moselle valley to the east. This special morphology is the result of several stream piracies (at the expense of the Meuse) which has interested numerous researchers since a long time (Davis 1895, Blache 1943, Lesson-Quinif 2001 & Le Roux Harmand 1997-2009…). The most important ones of these piracies are: 1) the well-known capture of the Haute-Moselle by a tributary of the Meurthe near Toul; 2) at the north-west, the capture of the river Aire by the Aisne. On-going evolution suggests that similar events can be expected in the long-term future. Where and when next streams piracies could occur, what consequences may be expected? Our approach is to simulate the dynamic evolution of the landscape with an improved version of GOLEM (Geomorphic / Orogenic Landscape Evolution Model - LEM), software developed by Tucker & Slingerland in 1994 (http://csdms.colorado.edu/wiki/Model:GOLEM). The LEM characterizes erosion by incorporating diffusion and advection equations whose parameters must be fixed, according to local conditions. First simulations for next millions years with « detachment-limited » mode, let us locate several potential captures of the Meuse river by tributaries of the Moselle, therefore inducing a complete reorganization of the hydrographic network. The results of the localizations agree with local topography/geometry analysis. The first capture induces the propagation of a knickpoint and a significant lowering of the upstream part of the Meuse's basin. Downstream of the capture, the orientation of the abandoned valley

  3. A novel anti-piracy optical disk with photochromic diarylethene

    NASA Astrophysics Data System (ADS)

    Liu, Guodong; Cao, Guoqiang; Huang, Zhen; Wang, Shenqian; Zou, Daowen

    2005-09-01

    Diarylethene is one of photochromic material with many advantages and one of the most promising recording materials for huge optical data storage. Diarylethene has two forms, which can be converted to each other by laser beams of different wavelength. The material has been researched for rewritable optical disks. Volatile data storage is one of its properties, which was always considered as an obstacle to utility. Many researches have been done for combating the obstacle for a long time. In fact, volatile data storage is very useful for anti-piracy optical data storage. Piracy is a social and economical problem. One technology of anti-piracy optical data storage is to limit readout of the data recorded in the material by encryption software. By the development of computer technologies, this kind of software is more and more easily cracked. Using photochromic diarylethene as the optical recording material, the signals of the data recorded in the material are degraded when it is read, and readout of the data is limited. Because the method uses hardware to realize anti-piracy, it is impossible cracked. In this paper, we will introduce this usage of the material. Some experiments are presented for proving its feasibility.

  4. Piracy in cyber space: consumer complicity, pirates and enterprise enforcement

    NASA Astrophysics Data System (ADS)

    Chaudhry, Peggy E.; Chaudhry, Sohail S.; Stumpf, Stephen A.; Sudler, Hasshi

    2011-05-01

    This article presents an overview of the growth of internet piracy in the global marketplace. The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer that downloading music, software, movies and the like, without compensation, is unethical. This awareness is critical for decreasing the demand for counterfeit goods in the virtual marketplace, where a consumer can exhibit a rogue behaviour with a limited fear of prosecution. We address the pyramid of internet piracy, which encompasses sophisticated suppliers/facilitators, such as the Warez group. Recent sting operations, such as Operation Buccaneer, are also depicted to highlight successful tactical manoeuvres of enforcement agencies. An overview of the Digital Millennium Copyright Act and the No Electronic Theft Act is included to debate the controversy surrounding this legislation. A discussion of enterprise enforcement mechanisms and novel anti-piracy technology for cyberspace is provided to reveal some of the tools used to fight the pirates, such as innovations in digital watermarking and NEC's recently announced video content identification technology. Enterprise information systems and its interdependence on the internet are also demanding new technologies that enable internet investigators to rapidly search, verify and potentially remove pirated content using web services. The quality of service of web services designed to efficiently detect pirated content is a growing consideration for new anti-piracy technology.

  5. What Do Computer Science Students Think about Software Piracy?

    ERIC Educational Resources Information Center

    Konstantakis, Nikos I.; Palaigeorgiou, George E.; Siozos, Panos D.; Tsoukalas, Ioannis A.

    2010-01-01

    Today, software piracy is an issue of global importance. Computer science students are the future information and communication technologies professionals and it is important to study the way they approach this issue. In this article, we attempt to study attitudes, behaviours and the corresponding reasoning of computer science students in Greece…

  6. Post-mating clutch piracy in an amphibian.

    PubMed

    Vieites, David R; Nieto-Román, Sandra; Barluenga, Marta; Palanca, Antonio; Vences, Miguel; Meyer, Axel

    2004-09-16

    Female multiple mating and alternative mating systems can decrease the opportunity for sexual selection. Sperm competition is often the outcome of females mating with multiple males and has been observed in many animals, and alternative reproductive systems are widespread among species with external fertilization and parental care. Multiple paternity without associated complex behaviour related to mating or parental care is also seen in simultaneously spawning amphibians and fishes that release gametes into water. Here we report 'clutch piracy' in a montane population of the common frog Rana temporaria, a reproductive behaviour previously unknown in vertebrates with external fertilization. Males of this species clasp the females and the pair deposits one spherical clutch of eggs. No parental care is provided. 'Pirate' males search for freshly laid clutches, clasp them as they would do a female and fertilize the eggs that were left unfertilized by the 'parental' male. This behaviour does not seem to be size-dependent, and some males mate with a female and perform clutch piracy in the same season. Piracy affected 84% of the clutches and in some cases increased the proportion of eggs fertilized, providing direct fitness benefits both for the pirate males and the females. Sexual selection--probably caused by a strong male-biased sex ratio--occurs in this population, as indicated by size-assortative mating; however, clutch piracy may reduce its impact. This provides a good model to explore how alternative mating strategies can affect the intensity of sexual selection. PMID:15372032

  7. Publishers Press Colleges To Stop Software Piracy by Their Students.

    ERIC Educational Resources Information Center

    Haworth, Karla

    1997-01-01

    Software piracy among college students is increasing, and the software publishing industry insists colleges are responsible for the activities of their computer nets' users. Colleges generally cooperate with publishers when their students are found infringing on copyrights. The Software Publishers Association is holding a University of Puget Sound…

  8. Small-Business Computing: Is Software Piracy Justified?

    ERIC Educational Resources Information Center

    Immel, A. Richard

    1983-01-01

    Presents several different perspectives on the copying of computer software (discs, tapes, etc.) in an attempt to determine whether such infringement of copyright, often called "software piracy," can ever be justified. Implications for both the hardware and software firms and the users are also discussed. (EAO)

  9. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  10. Stereotype Threat.

    PubMed

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate. PMID:26361054

  11. Environmental Threats at School

    ERIC Educational Resources Information Center

    Green, Twhanna

    2005-01-01

    Children can be exposed to dangerous chemicals and toxins in the most unlikely of places: Their schools. This brief article describes the types of threats that school environments pose to students' health, including such pollution and chemical exposures as lead, mercury, arsenic, molds, and poor indoor air quality. The article provides tips for…

  12. Software Piracy Forensics: The Need for Further Developing AFC

    NASA Astrophysics Data System (ADS)

    Baboo, S. Santhosh; Bhattathiripad, P. Vinod

    Among all the available approaches for software piracy forensics, one existing and exceptional approach is the theoretical frame work called AFC (Abstraction-Filtering-Comparison), an accepted approach in US courts for evaluating copyright infringement claims involving computer software. Through this paper, the authors would like to approach AFC in a threefold manner: One, to discuss the nature and efficacy of AFC; two, to recount some existing observations on it, and three, to identify areas, if any, where there is scope and need for appropriate modifications to further increase the efficacy and validate the legitimacy of the AFC approach, and in particular from the view point of a researcher who believes that software intelligence offered by the automated tools for software piracy investigation needs to be supplemented with manual intelligence for making the expert report more judiciary-friendly.

  13. Buried Treasure: Evolutionary Perspectives on Microbial Iron Piracy.

    PubMed

    Barber, Matthew F; Elde, Nels C

    2015-11-01

    Host-pathogen interactions provide valuable systems for the study of evolutionary genetics and natural selection. The sequestration of essential iron has emerged as a crucial innate defense system termed nutritional immunity, leading pathogens to evolve mechanisms of 'iron piracy' to scavenge this metal from host proteins. This battle for iron carries numerous consequences not only for host-pathogen evolution but also microbial community interactions. Here we highlight recent and potential future areas of investigation on the evolutionary implications of microbial iron piracy in relation to molecular arms races, host range, competition, and virulence. Applying evolutionary genetic approaches to the study of microbial iron acquisition could also provide new inroads for understanding and combating infectious disease. PMID:26431675

  14. Massive-scale video anti-piracy monitoring

    NASA Astrophysics Data System (ADS)

    Cadaret, Paul

    2008-04-01

    The author's recent participation in the Small Business Innovative Research (SBIR) program has resulted in the development of a patent pending technology that enables the construction of very large and fast artificial neural networks. Through the use of UNICON's CogniMax TM pattern recognition technology we believe that systems can be constructed that exploit the power of "exhaustive learning" for the benefit of certain types of challenging pattern recognition problems. The Viacom lawsuit against YouTube TM in early 2007 brought to light the magnitude of the video piracy problem and caused us to examine the associated technical challenges to determine whether our technology might enable an effective solution. This paper presents a theoretical study that describes how a massive-scale anti-piracy video pattern recognition system might be constructed using a large/fast Radial Basis Function (RBF) artificial Neural Network (NN) to enable a solution. Several daunting technical challenges exist. First, the amount of copyrighted video content that has been generated over time and now must be protected is enormous. Second, the activity level that is generally present on a large file-sharing site such as YouTube presents any pattern recognition system with a torrent of video content to inspect. Third, the concept of "fair-use" implies that an anti-piracy policy is not simply based on identifying a few copyrighted video frames. To determine system feasibility, this paper derives a set of example requirements for such a system, lays out a hypothetical anti-piracy data processing architecture, and evaluates the performance of the example system configuration.

  15. Piracy at Sea: Somalia an Area of Great Concern

    NASA Astrophysics Data System (ADS)

    Baniela, Santiago Iglesias

    In this paper, the author analyses piracy at sea in Somalia, to provide a general up-to-date vision of the problem which threatens the security of ships sailing in the Gulf of Aden. The pirates' modus operandi, the existing factors behind these punishable acts and the prevailing international response are analysed. Finally the paper reviews how the international community could act in order to tackle the problem with a view to its possible eradication.

  16. Spatial, Temporal and Spatio-Temporal Patterns of Maritime Piracy

    PubMed Central

    Marchione, Elio

    2013-01-01

    Objectives: To examine patterns in the timing and location of incidents of maritime piracy to see whether, like many urban crimes, attacks cluster in space and time. Methods: Data for all incidents of maritime piracy worldwide recorded by the National Geospatial Intelligence Agency are analyzed using time-series models and methods originally developed to detect disease contagion. Results: At the macro level, analyses suggest that incidents of pirate attacks are concentrated in five subregions of the earth’s oceans and that the time series for these different subregions differ. At the micro level, analyses suggest that for the last 16 years (or more), pirate attacks appear to cluster in space and time suggesting that patterns are not static but are also not random. Conclusions: Much like other types of crime, pirate attacks cluster in space, and following an attack at one location the risk of others at the same location or nearby is temporarily elevated. The identification of such regularities has implications for the understanding of maritime piracy and for predicting the future locations of attacks. PMID:25076796

  17. Heat Waves Are Health Threats

    MedlinePlus

    ... medlineplus/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and use air ... on: Heat Illness Recent Health News Related MedlinePlus Health Topics Heat Illness About MedlinePlus Site Map FAQs ...

  18. 41 CFR 128-1.5009 - Authorization for use of the Federal Bureau of Investigation anti-piracy warning seal.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... the Federal Bureau of Investigation anti-piracy warning seal. 128-1.5009 Section 128-1.5009 Public... Authorization for use of the Federal Bureau of Investigation anti-piracy warning seal. (a) Purpose. The Federal Bureau of Investigation (FBI) Anti-Piracy Warning Seal (“APW Seal”) is an official insignia of the...

  19. Intention to Commit Online Music Piracy and Its Antecedents: An Empirical Investigation

    ERIC Educational Resources Information Center

    Morton, Neil A.; Koufteros, Xenophon

    2008-01-01

    Online piracy of copyrighted digital music has become rampant as Internet bandwidth and digital compression technologies have advanced. The music industry has suffered significant financial losses and has responded with lawsuits, although online music piracy remains prevalent. This article developed a research model to study the determinants of…

  20. Student Digital Piracy in the Florida State University System: An Exploratory Study on Its Infrastructural Effects

    ERIC Educational Resources Information Center

    Reiss, Jeffrey

    2010-01-01

    Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institution's resources combined with the typical college student's lack of funds makes it more lucrative. Students…

  1. Software Piracy among College Students: A Comprehensive Review of Contributing Factors, Underlying Processes, and Tackling Strategies

    ERIC Educational Resources Information Center

    Liang, Zhili; Yan, Zheng

    2005-01-01

    This article reviewed empirical studies published in the past 30 years that examined software piracy among college students. It focused on three areas of study: (a) major factors that affect college students' intentions, attitudes, and moral intensity regarding software piracy, (b) various decision-making processes that underlie software piracy…

  2. Development of Novel Gas Brand Anti-Piracy System based on BP Neural Networks

    NASA Astrophysics Data System (ADS)

    Wang, L.; Zhang, Y. Y.; Ding, L.

    2006-10-01

    The Wireless-net Close-loop gas brand anti-piracy system introduced in this paper is a new type of brand piracy technical product based on BP neural network. It is composed by gas brand piracy label possessing gas exhalation resource, ARM embedded gas-detector, GPRS wireless module and data base of merchandise information. First, the system obtains the information on the special label through gas sensor array ,then the attained signals are transferred into ARM Embedded board and identified by artificial neural network, and finally turns back the outcome of data collection and identification to the manufactures with the help of GPRS module.

  3. Escape from bacterial iron piracy through rapid evolution of transferrin

    PubMed Central

    Barber, Matthew F.; Elde, Nels C.

    2015-01-01

    Iron sequestration provides an innate defense termed nutritional immunity, leading pathogens to scavenge iron from hosts. Although the molecular basis of this battle for iron is established, its potential as a force for evolution at host-pathogen interfaces is unknown. We show that the iron transport protein transferrin is engaged in ancient and ongoing evolutionary conflicts with TbpA, a transferrin surface receptor from bacteria. Single substitutions in transferrin at rapidly evolving sites reverse TbpA binding, providing a mechanism to counteract bacterial iron piracy among great apes. Furthermore, the C2 transferrin polymorphism in humans evades TbpA variants from Haemophilus influenzae, revealing a functional basis for standing genetic variation. These findings identify a central role for nutritional immunity in the persistent evolutionary conflicts between primates and bacterial pathogens. PMID:25504720

  4. Investigating the potential for "water piracy" in North East Greenland

    NASA Astrophysics Data System (ADS)

    Karlsson, Nanna B.; Dahl-Jensen, Dorthe

    2013-04-01

    The incorporation of subglacial processes in ice flow models remains a challenge while at the same time observational evidence increasingly underscores the important role liquid water plays in ice flow dynamics. One of the many problems ice flow models face (that also includes scarcity of data at the bed and the deformational properties of water-saturated sediments) is the different time-scales on which the processes operate. For example, observations indicate that subglacial water may be re-routed to a neighbouring ice stream in response to changes in surface elevation. This implies that ice flow models have to allow for changes in ice flow mode where, depending on the basal properties, the flow may be dominated by deformation or basal sliding. The re-routing of water between neighbouring ice streams is often termed "water piracy" and in this study we demonstrate that the potential for water piracy exists even in regions with very small surface elevation changes. We use a simple, vertically integrated, 2D-plane ice flow model based on the shallow ice flow approximation to model the large-scale changes in surface elevation of North East Greenland in response to gravity and mass balance. Considering time-scales of 100-500 years the model predicts changes in elevation of less than a metre per year which is in agreement with data from remote sensing. We then calculate the corresponding changes in hydrological pressure potential and use evidence from radio-echo sounding data to identify areas with basal melting and thus potential liquid water production. The corresponding change in hydrological pressure potential in response to the surface elevation changes is sufficient to divert the subglacial water to different pathways. This change in subglacial water pathways could be sufficient to change the ice flow mode from deformation to sliding and might initiate speed-up and/or slow-down of the ice streams at the margins of the basin.

  5. Air

    MedlinePlus

    ... do to protect yourself from dirty air . Indoor air pollution and outdoor air pollution Air can be polluted indoors and it can ... this chart to see what things cause indoor air pollution and what things cause outdoor air pollution! Indoor ...

  6. When Students Make Threats

    ERIC Educational Resources Information Center

    Kanan, Linda M.

    2010-01-01

    Much has been written about the use of threat assessment. Schools are encouraged to have threat assessment teams and a threat assessment process as part of a comprehensive safe schools effort. Encouraging and enabling all members of the school community to report possible threats in a timely manner is an essential component of an effective threat…

  7. Viral piracy: HIV-1 targets dendritic cells for transmission.

    PubMed

    Lekkerkerker, Annemarie N; van Kooyk, Yvette; Geijtenbeek, Teunis B H

    2006-04-01

    Dendritic cells (DCs), the professional antigen presenting cells, are critical for host immunity by inducing specific immune responses against a broad variety of pathogens. Remarkably the human immunodeficiency virus-1 (HIV-1) subverts DC function leading to spread of the virus. At an early phase of HIV-1 transmission, DCs capture HIV-1 at mucosal surfaces and transmit the virus to T cells in secondary lymphoid tissues. Capture of the virus on DCs takes place via C-type lectins of which the dendritic cell-specific intercellular adhesion molecule-3 (ICAM-3) grabbing nonintegrin (DC-SIGN) is the best studied. DC-SIGN-captured HIV-1 particles accumulate in CD81(+) multivesicular bodies (MVBs) in DCs and are subsequently transmitted to CD4+ T cells resulting in infection of T cells. The viral cell-to-cell transmission takes place at the DC-T cell interface termed the infectious synapse. Recent studies demonstrate that direct infection of DCs contributes to the transmission to T cells at a later phase. Moreover, the infected DCs may function as cellular reservoirs for HIV-1. This review discusses the different processes that govern viral piracy of DCs by HIV-1, emphasizing the intracellular routing of the virus from capture on the cell surface to egress in the infectious synapse. PMID:16611055

  8. Cyber threat metrics.

    SciTech Connect

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  9. News Piracy: Unfair Competition and the Misappropriation Doctrine. Journalism Monographs No. 56.

    ERIC Educational Resources Information Center

    Sullivan, Paul W.

    Unfair competition is a complex problem affecting all areas of American business, including the communications media. Piracy of material, an alarmingly widespread example of unfair competition, involves legal as well as ethical questions. This monograph uses the historical approach to trace the development of common-law precedent and trends and…

  10. 76 FR 55332 - Federal Bureau of Investigation Anti-Piracy Warning Seal Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-07

    ... Part 128-1 RIN 1110-AA32 Federal Bureau of Investigation Anti-Piracy Warning Seal Program AGENCY: Federal Bureau of Investigation (FBI), Justice. ACTION: Proposed rule. SUMMARY: The Federal Bureau of... be mailed to the Access Integrity Unit, Attn: Lori L. Bokey c/o Federal Bureau of......

  11. Breaks, Flows, and Other In-Between Spaces: Rethinking Piracy and Copyright Governance

    ERIC Educational Resources Information Center

    Wang, Shujen

    2006-01-01

    This article uses three case studies to examine the intersecting developments of technology, capitalism, and globalization through the contradictions and paradoxes of copyright governance and piracy. China is used as a case study to investigate the relations among the state, law, and global capitalism. (Contains 7 tables and 9 notes.)

  12. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  13. Passive automatic anti-piracy defense system of ships

    NASA Astrophysics Data System (ADS)

    Szustakowski, M.; Życzkowski, M.; Ciurapiński, W.; Karol, M.; Kastek, M.; Stachowiak, R.; Markowski, P.

    2013-10-01

    The article describes the technological solution for ship self-defense against pirate attacks. The paper presents the design solutions in the field of direct physical protection. All the solutions are connected with the latest optoelectronic and microwave systems and sensors to detect, recognize and the threat posed by pirates. In particular, tests of effectiveness and the detection-range of technology demonstrator developed by a team of authors were carried out.

  14. Long term monitoring of open-air monuments under threat: the case study of the "Tombs of the Kings" in Cyprus

    NASA Astrophysics Data System (ADS)

    Agapiou, A.; Lysandrou, V.; Hadjimitsis, D. G.; Alexakis, D. D.; Themistocleous, K.; Michaelides, S.

    2012-04-01

    Since antiquity, Cyprus has been a crossroad were various cultures, arts and ideas were deposited. This is evidenced by its huge archaeological residues spread all over the island. Open to air monuments are being exposed to environmental conditions and without any appropriate measures various deterioration factors may become disastrous. Monitoring Cultural Heritage (CH) Sites and Monuments in Cyprus is commonly based on site observations. However, this procedure which includes data collection, periodical observations and multivariate risk assessment analysis, is difficult to be accomplished with the traditional practices and methods, since it is time consuming and expensive. In contrast, new technologies like satellite sensing sensors and in situ measurements can successfully confront this problem by providing to the scientists an integrated and multi-layer monitoring system for vast areas simultaneously. The present paper describes the registration of deterioration processes in one of the most important archaeological areas in Cyprus, listed in the World's Cultural Heritage Sites, the so called "Tomb of the Kings" at Nea Pafos. This work is a part of the research programme "Managing Cultural Heritage Sites through Space and ground Technologies using Geographical Information Systems: A Pilot application at the archaeological sites of Paphos", funded by the Research Promotion Foundation of Cyprus. The project concerns the region of Paphos district in western Cyprus and it deals with cultural heritage sites managements using integrated space and ground technologies, aiming at risk assessment of the areas under examination. The paper presents the methodological framework of the project with some preliminary results for the long term monitoring of Cultural Heritage Sites based, not only in situ observations, but also on using new technologies such as satellite images for retrieving air pollution, laser scanner, thermo-cameras etc.

  15. Facing ambiguous threats.

    PubMed

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  16. Digital piracy: an examination of low self-control and motivation using short-term longitudinal data.

    PubMed

    Higgins, George E

    2007-08-01

    The purpose of the present study was to examine the link between low self-control, motivation, and digital piracy. This study used short-term longitudinal data (i.e., once a week for 4 weeks) from undergraduate students (n = 292) and latent trajectory analysis. The results of this study revealed that the students had significant variability in initial levels and rates of change in digital piracy. The results indicated that whether motivation was treated as a time-invariant or time-varying measure, it along with sex (i.e., being male) had a significant link with the initial levels of digital piracy and that sex and low self-control had links with the rate of change. These results are discussed, and policy implications are made. PMID:17711360

  17. Is Your School Sick? Five Threats to Healthy Schools.

    ERIC Educational Resources Information Center

    Grubb, Deborah; Diamantes, Thomas

    1998-01-01

    Examines the five major threats to healthy school buildings: sick building syndrome; health-threatening building materials; environmental hazards such as radon gas and asbestos; lead poisoning; and general indoor air quality. Discusses ways to assess and address them. (SR)

  18. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  19. Ancient woodlands: modern threats.

    PubMed

    Rackham, Oliver

    2008-01-01

    This review discusses the following adverse influences on long-established forests, wood-pastures, and savannas in Europe and other continents: destruction and fragmentation; depletion; pollution and eutrophication; fire and lack of fire; excessive shade; excessive numbers of deer; invasive species and cultivars; infilling of savanna; climate change; and globalization of plant diseases. Human influences on the world's mainland forests and savannas have been pervasive throughout the Holocene, to the extent that recovering 'virgin forest' becomes a somewhat nebulous conservation objective. Present and future threats arise both from increasing human activities and from withdrawal of the human activities that have shaped forests in the past. The severity of different threats depends on so many factors, especially the properties of different plants and animals, that generalization is impossible; however, in the long term, spread of pathogens is probably the most serious threat. PMID:18771472

  20. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  1. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  2. Threat Assessment Plans

    ERIC Educational Resources Information Center

    Pascopella, Angela

    2008-01-01

    With every new case of school violence, district leaders are urged to be proactive in hopes of averting potential violence. Experts say part of that proactive work comes from a threat assessment plan that every district should have. While every district that receives funds from the U.S. Department of Education for school safety is required to have…

  3. ThreatView

    SciTech Connect

    Shead, Timothy M.; Wylie, Brian

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seen in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.

  4. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    ;Table of Contents: Section I: The Regional Proliferation Challenge; Northeast Asia; The Middle East and North Africa; The Former Soviet Union: Russia, Ukrane, Kazakstan, And Belarus; South Asia; The International Threat: Dangers from Terrorism, Insurgencies, Civil Wars, And Organized Crime; Section II: Department of Defense Response; Technical Annex: Accessible Technologies; Glossary.

  5. The Population Threat

    ERIC Educational Resources Information Center

    McNamara, Robert S.

    1969-01-01

    In an address delivered at the University of Notre Dame, May 1969, Secretary McNamara discussed the threat of unmanageable population pressure which is undervalued and misunderstood by the general public. Unrestricted population growth will have catastrophic consequences unless it is dealt with rapidly and rationally. Copies from: Office of…

  6. Ethical Proactive Threat Research

    NASA Astrophysics Data System (ADS)

    Aycock, John; Sullins, John

    Through a provocative examination of the positive effects of computer security research on regular users, we argue that traditional security research is insufficient. Instead, we turn to a largely untapped alternative, proactive threat research, a fruitful research area but an ethical minefield. We discuss practices for ethical research and dissemination of proactive research.

  7. ThreatView

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seenmore » in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.« less

  8. 49 CFR 1548.15 - Access to cargo: Security threat assessments for individuals having unescorted access to cargo.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for... SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.15 Access to cargo: Security threat... must successfully complete a security threat assessment or comparable security threat...

  9. Subglacial lake matters: piracy on a divide between thawed and frozen bed

    NASA Astrophysics Data System (ADS)

    Carter, S. P.; Bougamont, M. H.; Christoffersen, P.; Fricker, H. A.; Lipscomb, W. H.; Price, S. F.

    2011-12-01

    The two most populated active subglacial lake districts in Antarctica, upper Kamb Ice Stream and lower Whillans Ice Stream, occur along boundaries between where temperature models predict net basal freezing and net basal accretion. This occurs in part due to a basal traction contrast, which creates a ridge in the ice surface and creates a pressure seal; this impedes the downstream movement of water until a subglacial lake flood occurs. Here we use a model for basal water routing, which incorporates subglacial floods and a realistic term for effective pressure, to explore the ability of these floods to provide water to areas of net basal accretion and thus maintain basal lubrication. We hypothesize that these floods can distribute sufficient water to most of the regions experiencing net basal freezing; the exception being those nearest to the lakes themselves, Discharge in these regions likely occurs via narrow subglacial conduits. Over time this will cause ice downstream of the dam to thicken and pre-flood lake levels to increase until water ultimately exits the lake via an alternate route i.e. water piracy. Once piracy occurs, water is no longer supplied along the former flowpath and ice stream shutdown accelerates. We conclude that the formation and quasi-periodic flooding of lakes at the basal melt/ basal freezing boundary is a critical process in accelerating ice stream shutdown.

  10. Cross-National Attitudes and Perceptions Concerning Software Piracy: A Comparative Study of Students from the United States and China

    ERIC Educational Resources Information Center

    Rawlinson, David R.; Lupton, Robert A.

    2007-01-01

    Students' attitudes and perceptions regarding the use of unlicensed software are important to educators and businesses. Students have a proven propensity to pirate software and other intellectual property. By understanding how attitudes and perceptions toward software piracy differ among university students in a cross-national context, educators…

  11. Airborne Particulate Threat Assessment

    SciTech Connect

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  12. 49 CFR 1515.9 - Appeal of security threat assessment based on other analyses.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the applicant for an HME or TWIC poses a security threat as provided in 49 CFR 1572.107. (2) TSA had determined that an air cargo worker poses a security threat as provided in 49 CFR 1540.205. (3) TSA had... firms poses a security threat as provided in 49 CFR 1549.109. (b) Grounds for appeal. An applicant...

  13. 49 CFR 1515.9 - Appeal of security threat assessment based on other analyses.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the applicant for an HME or TWIC poses a security threat as provided in 49 CFR 1572.107. (2) TSA had determined that an air cargo worker poses a security threat as provided in 49 CFR 1540.205. (3) TSA had... Determination of Threat Assessment and Immediate Revocation pursuant to 49 CFR 1572.21(d)(3). (3) If...

  14. 49 CFR 1515.9 - Appeal of security threat assessment based on other analyses.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the applicant for an HME or TWIC poses a security threat as provided in 49 CFR 1572.107. (2) TSA had determined that an air cargo worker poses a security threat as provided in 49 CFR 1540.205. (3) TSA had... Determination of Threat Assessment and Immediate Revocation pursuant to 49 CFR 1572.21(d)(3). (3) If...

  15. Pollution: a global threat.

    PubMed

    McCrink-Goode, Melissa

    2014-07-01

    Over the past several decades, several large-scale seemingly unrelated events have unfolded in all corners of the world. Within the oceans, coral reef systems have been facing unprecedented mass bleaching episodes, sea turtles worldwide are currently experiencing an epidemic in the form of fibropapilloma, and global phytoplankton populations have declined by 40%. Within the Earth's terrestrial systems, similar phenomena have appeared in the form of colony collapse disorder (CCD) currently devastating honey bee colonies, White Nose Syndrome decimating bat populations, and the chytrid fungus plaguing amphibian populations. On the surface these events appear to be unrelated yet at the root of each phenomenon there appears an underlying threat - pollution. This paper will investigate the commonality of these occurrences as well as investigate the current and potential solutions to the threat. PMID:24727071

  16. Proliferation: Threat and response

    SciTech Connect

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  17. Not All Threats Are Equal

    ERIC Educational Resources Information Center

    Surface, Jeanne L.

    2011-01-01

    School leaders must be fully prepared to respond to all types of threats that occur. In order to respond to threats most appropriately, the school needs to have a systematic approach that combines education, prevention, intervention, discipline, security, and crisis preparedness measures. All threats must be assessed carefully and swiftly,…

  18. Legal considerations in challenging external threats to Glacier National Park, Montana, USA

    NASA Astrophysics Data System (ADS)

    Keiter, Robert B.; Hubert, Wayne A.

    1987-01-01

    External threats to the environmental integrity of Glacier National Park, Montana, USA, fit into three categories: adverse land use practices adjacent to the Park, air pollution, and water pollution. This article identifies and evaluates the laws that Glacier National Park officials might rely upon to protect the Park against these external threats. The article also assesses the available scientific information relating to external threats, and it identifies additional information needed to establish a legal basis for challenging the threats.

  19. Combating emerging viral threats

    PubMed Central

    Bekerman, Elena; Einav, Shirit

    2015-01-01

    Synopsis Most approved antiviral therapeutics selectively inhibit proteins encoded by a single virus, thereby providing a “one drug-one bug” solution. As a result of this narrow spectrum of coverage and the high cost of drug development, therapies are currently approved for fewer than ten viruses out of the hundreds known to cause human disease. This perspective summarizes progress and challenges in the development of broad-spectrum antiviral therapies. These strategies include targeting enzymatic functions shared by multiple viruses and host cell machinery by newly discovered compounds or by repurposing approved drugs. These approaches offer new practical means for developing therapeutics against existing and emerging viral threats. PMID:25883340

  20. Ocean-sized threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    Jane Lubchenco, professor of marine biology and zoology at Oregon State University, and president-elect of the International Council for Science, said that scientists can do more than they currently are doing to clearly communicate to the public and to policy-makers those issues associated with the many ecological threats faced by the world's oceans. In doing so, scientists can overcome popularly-held misperceptions about the health of the world's oceans and thus, help protect the seas.“Science,” Lubchenco said, “has a huge role to play in informing [the public] what is happening and to guide the choice of solutions.

  1. New global viral threats.

    PubMed

    Erdem, Hakan; Ünal, Serhat

    2015-04-01

    Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have settled in Southeast Asia. This article focuses on the current situation and the future prospects of these potential infectious threats to mankind. PMID:25828274

  2. Threats to international science

    NASA Astrophysics Data System (ADS)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  3. Nutritional immunity. Escape from bacterial iron piracy through rapid evolution of transferrin.

    PubMed

    Barber, Matthew F; Elde, Nels C

    2014-12-12

    Iron sequestration provides an innate defense, termed nutritional immunity, leading pathogens to scavenge iron from hosts. Although the molecular basis of this battle for iron is established, its potential as a force for evolution at host-pathogen interfaces is unknown. We show that the iron transport protein transferrin is engaged in ancient and ongoing evolutionary conflicts with TbpA, a transferrin surface receptor from bacteria. Single substitutions in transferrin at rapidly evolving sites reverse TbpA binding, providing a mechanism to counteract bacterial iron piracy among great apes. Furthermore, the C2 transferrin polymorphism in humans evades TbpA variants from Haemophilus influenzae, revealing a functional basis for standing genetic variation. These findings identify a central role for nutritional immunity in the persistent evolutionary conflicts between primates and bacterial pathogens. PMID:25504720

  4. Molecular piracy: manipulation of the ubiquitin system by Kaposi's sarcoma-associated herpesvirus.

    PubMed

    Fujimuro, Masahiro; Hayward, S Diane; Yokosawa, Hideyoshi

    2007-01-01

    Ubiquitination, one of several post-translational protein modifications, plays a key role in the regulation of cellular events, including protein degradation, signal transduction, endocytosis, protein trafficking, apoptosis and immune responses. Ubiquitin attachment at the lysine residue of cellular factors acts as a signal for endocytosis and rapid degradation by the 26S proteasome. It has recently been observed that viruses, especially oncogenic herpesviruses, utilise molecular piracy by encoding their own proteins to interfere with regulation of cell signalling. Kaposi's sarcoma- associated herpesvirus (KSHV) manipulates the ubiquitin system to facilitate cell proliferation, anti-apoptosis and evasion from immunity. In this review, we will describe the strategies used by KSHV at distinct stages of the viral life-cycle to control the ubiquitin system and promote oncogenesis and viral persistence. PMID:17688306

  5. Categorizing threat : building and using a generic threat matrix.

    SciTech Connect

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  6. Recurrent dreams: Recurring threat simulations?

    PubMed

    Valli, K; Revonsuo, A

    2006-06-01

    Zadra, Desjardins, and Marcotte (2006) have made a valuable contribution to the empirical testing of the Threat Simulation Theory (TST) (Revonsuo, 2000a) in recurrent dreams. For the most part, their results are in accordance with the theory, while some findings seem to conflict with the predictions of TST. In our commentary, we consider some alternative ways to interpret the results, and we conclude that many prominent features of most recurrent dreams seem to be manifestations of a threat simulation function, leading to repeated rehearsal of threat perception and avoidance, but a minority of recurrent dreams seem to have origins unrelated to threat simulation. PMID:16019227

  7. Intentional cargo disruption by nefarious means: Examining threats, systemic vulnerabilities and securitisation measures in complex global supply chains.

    PubMed

    McGreevy, Conor; Harrop, Wayne

    2015-01-01

    Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined. PMID:25990978

  8. Linking Stereotype Threat and Anxiety

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  9. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  10. Threat Assessment in College Settings

    ERIC Educational Resources Information Center

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  11. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  12. Bio-threat microparticle simulants

    SciTech Connect

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  13. Psychoanalysis and the nuclear threat

    SciTech Connect

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  14. Threat expert system technology advisor

    NASA Technical Reports Server (NTRS)

    Kurrasch, E. R.; Tripp, L. R.

    1987-01-01

    A prototype expert system was developed to determine the feasibility of using expert system technology to enhance the performance and survivability of helicopter pilots in a combat threat environment while flying NOE (Nap of the Earth) missions. The basis for the concept is the potential of using an Expert System Advisor to reduce the extreme overloading of the pilot who flies NOE mission below treetop level at approximately 40 knots while performing several other functions. The ultimate goal is to develop a Threat Expert System Advisor which provides threat information and advice that are better than even a highly experienced copilot. The results clearly show that the NOE pilot needs all the help in decision aiding and threat situation awareness that he can get. It clearly shows that heuristics are important and that an expert system for combat NOE helicopter missions can be of great help to the pilot in complex threat situations and in making decisions.

  15. Information fusion: telling the story (or threat narrative)

    NASA Astrophysics Data System (ADS)

    Fenstermacher, Laurie

    2014-06-01

    Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.

  16. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    ERIC Educational Resources Information Center

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  17. Managing biosecurity threats in China.

    PubMed

    Huang, Yanzhong

    2011-03-01

    Compared to the extensive literature on bioterrorism and biosecurity in the United States, less analysis has been conducted on similar challenges in China. This article seeks to fill this void by providing an integrated and updated assessment of 3 major biosecurity threats China faces: biowarfare, bioterrorism, and biocrimes. An analysis of China's biosecurity threats and biodefense building suggest varying levels of risk associated with each threat type. First, a direct bioweapons attack on China is highly unlikely, although the threat of biowarfare cannot be simply written off. Second, potential perpetrators of bioterrorism have capabilities at their disposal for carrying out such attacks. While terrorist organizations in China do not have a strong interest in bioterrorism, the limited state capability to counter such a threat may increase the risk in the future. Third, unlike the threats of biowarfare and bioterrorism, potential perpetrators of biocrimes have both incentives and capabilities, and biocrimes can produce reactions far out of proportion to the actual number of casualties. Despite the distinct biosecurity challenges it faces, China has yet to articulate a differentiated and coherent strategy to effectively tackle the challenges. Assessing different types of biosecurity threats in terms of degrees of risk not only provides greater analytical clarity but also has important implications for the strategies required to manage the risks. PMID:21361794

  18. Interspecies modulation of bacterial development through iron competition and siderophore piracy

    PubMed Central

    Traxler, Matthew F.; Seyedsayamdost, Mohammad R.; Clardy, Jon; Kolter, Roberto

    2012-01-01

    Summary While soil-dwelling actinomycetes are renowned for secreting natural products, little is known about the roles of these molecules in mediating actinomycete interactions. In a previous co-culture screen, we found that one actinomycete, Amycolatopsis sp. AA4, inhibited aerial hyphae formation in adjacent colonies of Streptomyces coelicolor. A siderophore, amychelin, mediated this developmental arrest. Here we present genetic evidence that confirms the role of the amc locus in the production of amychelin and in the inhibition of S. coelicolor development. We further characterize the Amycolatopsis sp. AA4 - S. coelicolor interaction by examining expression of developmental and iron acquisition genes over time in co-culture. Manipulation of iron availability and/or growth near Amycolatopsis sp. AA4 led to alterations in expression of the critical developmental gene bldN, and other key down-stream genes in the S. coelicolor transcriptional cascade. In Amycolatopsis sp. AA4, siderophore genes were down-regulated when grown near S. coelicolor, leading us to find that deferrioxamine E, produced by S. coelicolor, could be readily utilized by Amycolatopsis sp. AA4. Collectively these results suggest that competition for iron via siderophore piracy and species-specific siderophores can alter patterns of gene expression and morphological differentiation during actinomycete interactions. PMID:22931126

  19. Interspecies modulation of bacterial development through iron competition and siderophore piracy.

    PubMed

    Traxler, Matthew F; Seyedsayamdost, Mohammad R; Clardy, Jon; Kolter, Roberto

    2012-11-01

    While soil-dwelling actinomycetes are renowned for secreting natural products, little is known about the roles of these molecules in mediating actinomycete interactions. In a previous co-culture screen, we found that one actinomycete, Amycolatopsis sp. AA4, inhibited aerial hyphae formation in adjacent colonies of Streptomyces coelicolor. A siderophore, amychelin, mediated this developmental arrest. Here we present genetic evidence that confirms the role of the amc locus in the production of amychelin and in the inhibition of S. coelicolor development. We further characterize the Amycolatopsis sp. AA4 - S. coelicolor interaction by examining expression of developmental and iron acquisition genes over time in co-culture. Manipulation of iron availability and/or growth near Amycolatopsis sp. AA4 led to alterations in expression of the critical developmental gene bldN, and other key downstream genes in the S. coelicolor transcriptional cascade. In Amycolatopsis sp. AA4, siderophore genes were downregulated when grown near S. coelicolor, leading us to find that deferrioxamine E, produced by S. coelicolor, could be readily utilized by Amycolatopsis sp. AA4. Collectively these results suggest that competition for iron via siderophore piracy and species-specific siderophores can alter patterns of gene expression and morphological differentiation during actinomycete interactions. PMID:22931126

  20. Global Threats to Child Safety.

    PubMed

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. PMID:26613687

  1. Bomb Threat Becomes Real News.

    ERIC Educational Resources Information Center

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  2. Heat Waves Are Health Threats

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and ... 2016 SATURDAY, July 2, 2016 (HealthDay News) -- Heat waves are more than uncomfortable, they can be deadly. ...

  3. Combating the Insider Cyber Threat

    SciTech Connect

    Greitzer, Frank L.; Moore, Andrew P.; Cappelli, Dawn M.; Andrews, Dee H.; Carroll, Lynn; Hull, Thomas D.

    2008-01-02

    This article represents a collaboration between PNNL, CERT/CMU, and AFRL that describes needs and related efforts by these institutions to develop technologies and approaches to counter cyber threats by insiders to informatin systems. The main focus of this article is on the need for effective training on insider threat to raise staff awareness and encourage organizations to adopt a more effective approach to identifying potential risks and take proactive steps to mitigate them.

  4. Late Quaternary stream piracy and strath terrace formation along the Belle Fourche and lower Cheyenne Rivers, South Dakota and Wyoming

    NASA Astrophysics Data System (ADS)

    Stamm, John F.; Hendricks, Robert R.; Sawyer, J. Foster; Mahan, Shannon A.; Zaprowski, Brent J.; Geibel, Nicholas M.; Azzolini, David C.

    2013-09-01

    Stream piracy substantially affected the geomorphic evolution of the Missouri River watershed and drainages within, including the Little Missouri, Cheyenne, Belle Fourche, Bad, and White Rivers. The ancestral Cheyenne River eroded headward in an annular pattern around the eastern and southern Black Hills and pirated the headwaters of the ancestral Bad and White Rivers after ~ 660 ka. The headwaters of the ancestral Little Missouri River were pirated by the ancestral Belle Fourche River, a tributary to the Cheyenne River that currently drains much of the northern Black Hills. Optically stimulated luminescence (OSL) dating techniques were used to estimate the timing of this piracy event at ~ 22-21 ka. The geomorphic evolution of the Cheyenne and Belle Fourche Rivers is also expressed by regionally recognized strath terraces that include (from oldest to youngest) the Sturgis, Bear Butte, and Farmingdale terraces. Radiocarbon and OSL dates from fluvial deposits on these terraces indicate incision to the level of the Bear Butte terrace by ~ 63 ka, incision to the level of the Farmingdale terrace at ~ 40 ka, and incision to the level of the modern channel after ~ 12-9 ka. Similar dates of terrace incision have been reported for the Laramie and Wind River Ranges. Hypothesized causes of incision are the onset of colder climate during the middle Wisconsinan and the transition to the full-glacial climate of the late-Wisconsinan/Pinedale glaciation. Incision during the Holocene of the lower Cheyenne River is as much as ~ 80 m and is 3 to 4 times the magnitude of incision at ~ 63 ka and ~ 40 ka. The magnitude of incision during the Holocene might be due to a combined effect of three geomorphic processes acting in concert: glacial isostatic rebound in lower reaches (~ 40 m), a change from glacial to interglacial climate, and adjustments to increased watershed area resulting from piracy of the ancestral headwaters of the Little Missouri River.

  5. Late Quaternary stream piracy and strath terrace formation along the Belle Fourche and lower Cheyenne Rivers, South Dakota and Wyoming

    USGS Publications Warehouse

    Stamm, John F.; Hendricks, Robert R.; Sawyer, J. Foster; Mahan, Shannon; Zaprowski, Brent J.; Geibel, Nicholas M.; Azzolini, David C.

    2013-01-01

    Stream piracy substantially affected the geomorphic evolution of the Missouri River watershed and drainages within, including the Little Missouri, Cheyenne, Belle Fourche, Bad, and White Rivers. The ancestral Cheyenne River eroded headward in an annular pattern around the eastern and southern Black Hills and pirated the headwaters of the ancestral Bad and White Rivers after ~ 660 ka. The headwaters of the ancestral Little Missouri River were pirated by the ancestral Belle Fourche River, a tributary to the Cheyenne River that currently drains much of the northern Black Hills. Optically stimulated luminescence (OSL) dating techniques were used to estimate the timing of this piracy event at ~ 22–21 ka. The geomorphic evolution of the Cheyenne and Belle Fourche Rivers is also expressed by regionally recognized strath terraces that include (from oldest to youngest) the Sturgis, Bear Butte, and Farmingdale terraces. Radiocarbon and OSL dates from fluvial deposits on these terraces indicate incision to the level of the Bear Butte terrace by ~ 63 ka, incision to the level of the Farmingdale terrace at ~ 40 ka, and incision to the level of the modern channel after ~ 12–9 ka. Similar dates of terrace incision have been reported for the Laramie and Wind River Ranges. Hypothesized causes of incision are the onset of colder climate during the middle Wisconsinan and the transition to the full-glacial climate of the late-Wisconsinan/Pinedale glaciation. Incision during the Holocene of the lower Cheyenne River is as much as ~ 80 m and is 3 to 4 times the magnitude of incision at ~ 63 ka and ~ 40 ka. The magnitude of incision during the Holocene might be due to a combined effect of three geomorphic processes acting in concert: glacial isostatic rebound in lower reaches (~ 40 m), a change from glacial to interglacial climate, and adjustments to increased watershed area resulting from piracy of the ancestral headwaters of the Little Missouri River.

  6. Phycodnavirus potassium ion channel proteins question the virus molecular piracy hypothesis.

    PubMed

    Hamacher, Kay; Greiner, Timo; Ogata, Hiroyuki; Van Etten, James L; Gebhardt, Manuela; Villarreal, Luis P; Cosentino, Cristian; Moroni, Anna; Thiel, Gerhard

    2012-01-01

    Phycodnaviruses are large dsDNA, algal-infecting viruses that encode many genes with homologs in prokaryotes and eukaryotes. Among the viral gene products are the smallest proteins known to form functional K(+) channels. To determine if these viral K(+) channels are the product of molecular piracy from their hosts, we compared the sequences of the K(+) channel pore modules from seven phycodnaviruses to the K(+) channels from Chlorella variabilis and Ectocarpus siliculosus, whose genomes have recently been sequenced. C. variabilis is the host for two of the viruses PBCV-1 and NY-2A and E. siliculosus is the host for the virus EsV-1. Systematic phylogenetic analyses consistently indicate that the viral K(+) channels are not related to any lineage of the host channel homologs and that they are more closely related to each other than to their host homologs. A consensus sequence of the viral channels resembles a protein of unknown function from a proteobacterium. However, the bacterial protein lacks the consensus motif of all K(+) channels and it does not form a functional channel in yeast, suggesting that the viral channels did not come from a proteobacterium. Collectively, our results indicate that the viruses did not acquire their K(+) channel-encoding genes from their current algal hosts by gene transfer; thus alternative explanations are required. One possibility is that the viral genes arose from ancient organisms, which served as their hosts before the viruses developed their current host specificity. Alternatively the viral proteins could be the origin of K(+) channels in algae and perhaps even all cellular organisms. PMID:22685610

  7. Threat image projection in CCTV

    NASA Astrophysics Data System (ADS)

    Neil, David; Thomas, Nicola; Baker, Bob

    2007-10-01

    Operators are key components in a Closed Circuit Television (CCTV) system, being the link between the system technology and its effective use. Operators' performance will largely determine the level of service provided by the system. There have been few studies testing operator performance, while much work has been done to test the performance of the technology. Previous work on CCTV operator performance carried out by the Home Office Scientific Development Branch (HOSDB) has used filmed video and subjects who knew they were undergoing testing, meaning subjects are likely to be concentrating harder on performing well. HOSDB believes that there is a need for a test that would be able to be routinely used in a CCTV control room throughout the course of a normal shift to provide management with operational performance data. Threat Image Projection (TIP) is routinely used in X-Ray baggage scanners to keep operators alert to possible threats. At random intervals, a threat target image is superimposed over the image of the baggage being screened. The operator then responds to this threat. A similar system could be used for CCTV operators. A threat image would be randomly superimposed over the live CCTV feed and the operator would be expected to respond to this.

  8. Escorting commercial aircraft to reduce the MANPAD threat

    NASA Astrophysics Data System (ADS)

    Hock, Nicholas; Richardson, M. A.; Butters, B.; Walmsley, R.; Ayling, R.; Taylor, B.

    2005-11-01

    This paper studies the Man-Portable Air Defence System (MANPADS) threat against large commercial aircraft using flight profile analysis, engagement modelling and simulation. Non-countermeasure equipped commercial aircraft are at risk during approach and departure due to the large areas around airports that would need to be secured to prevent the use of highly portable and concealable MANPADs. A software model (CounterSim) has been developed and was used to simulate an SA-7b and large commercial aircraft engagement. The results of this simulation have found that the threat was lessened when a escort fighter aircraft is flown in the 'Centreline Low' position, or 25 m rearward from the large aircraft and 15 m lower, similar to the Air-to-Air refuelling position. In the model a large aircraft on approach had a 50% chance of being hit or having a near miss (within 20m) whereas escorted by a countermeasure equipped F-16 in the 'Centerline Low' position, this was reduced to only 14%. Departure is a particularly vulnerable time for large aircraft due to slow climb rates and the inability to fly evasive manoeuvres. The 'Centreline Low' escorted departure greatly reduced the threat to 16% hit or near miss from 62% for an unescorted heavy aircraft. Overall the CounterSim modelling has showed that escorting a civilian aircraft on approach and departure can reduce the MANPAD threat by 3 to 4 times.

  9. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) Direct threat means a...

  10. The Social Construction of the Soviet Threat.

    ERIC Educational Resources Information Center

    Nathanson, Charles E.; Skelly, James M.

    For almost 40 years the perception of a Soviet threat has influenced much foreign and domestic political behavior in the United States. How to respond to the threat has been a subject of intense debate, but the reality of the threat has been taken for granted. Conviction about the reality of this threat dates back to George Kennan's long telegram…

  11. Comparative Environmental Threat Analysis: Three Case Studies.

    ERIC Educational Resources Information Center

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  12. Effect of slope failures on river-network pattern: A river piracy case study from the flysch belt of the Outer Western Carpathians

    NASA Astrophysics Data System (ADS)

    Baroň, Ivo; Bíl, Michal; Bábek, Ondřej; Smolková, Veronika; Pánek, Tomáš; Macur, Lukáš

    2014-06-01

    Landslides are important geomorphic agents in various mountainous settings. We document here a case of river piracy from the upper part of the Malá Brodská Valley in the Vsetínské Mts., Czech Republic (Rača Unit of the flysch Magura Group of Nappes, flysch belt of the Outer Western Carpathians) controlled by mass movement processes. Based on the field geological, geomorphological and geophysical data, we found out that the landslide accumulations pushed the more active river of out of two subparallel river channels with different erosion activity westwards and forced intensive lateral erosion towards the recently abandoned valley. Apart from the landslide processes, the presence of the N-striking fault, accentuated by higher flow rates of the eastern channel as a result of its larger catchment area, were the most critical factors of the river piracy. As a consequence of the river piracy, intensive retrograde erosion in the elbow of capture and also within the upper portion of the western catchment occurred. Deposits of two landslide dams document recent minimum erosion rates to be 18.8 mm.ky- 1 in the western (captured) catchment, and 3.6 mm.ky- 1 in the eastern catchment respectively. The maximum age of the river piracy is estimated to be of the late Glacial and/or the early Holocene.

  13. Bad Air For Children

    ERIC Educational Resources Information Center

    Kane, Dorothy Noyes

    1976-01-01

    Children are especially sensitive to air pollution and consequences to them maybe of longer duration than to adults. The effects of low-level pollution on children are the concern of this article. The need for research on the threat of air pollution to childrens' health is emphasized. (BT)

  14. Measuring Vulnerability to Stereotype Threat

    ERIC Educational Resources Information Center

    Barnard, Lucy; Burley, Hansel; Olivarez, Arturo; Crooks, Steven

    2008-01-01

    Introduction: In this study, we examined the psychometric properties of an instrument intended to measure vulnerability to stereotype threat. Method: We revised the instrument through assessing score reliability and then examined a domain specific model using confirmatory factor analyses. After examining the responses of the total sample…

  15. Hostile intelligence threat: US technology

    SciTech Connect

    Whitman, D.

    1988-11-01

    This publication outlines the hostile intelligence threat to U.S. industry and Western technology, including the operational capabilities of hostile intelligence services and their scientific and technological (S T) targets. Current intelligence strategies used against the United States are described and sources of information providing countermeasures guidance are listed. Points of contact for security and counterintelligence assistance are also included.

  16. Bomb Threats Taking Financial Toll

    ERIC Educational Resources Information Center

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  17. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  18. Stream capture and piracy recorded by provenance in fluvial fan strata

    NASA Astrophysics Data System (ADS)

    Mikesell, Leslie R.; Weissmann, Gary S.; Karachewski, John A.

    2010-03-01

    Stream capture and piracy in tectonically active regions have been described in geomorphic systems worldwide; however, few studies show the influence stream capture has on the rock record. We present an analysis of fluvial fan stratigraphy that developed as a result of multiple stream capture events, building a complex stratigraphic succession beneath the Lawrence Livermore National Laboratory (LLNL), California. The LLNL site is located in the southeast portion of the tectonically active Livermore Basin, a transpressional basin in the California Coast Ranges. Geomorphic evidence for this stream capture include: (1) the Arroyo Seco enters the basin from the south through an uplifted fault block, (2) south of this fault block lies an abandoned Arroyo Seco fluvial fan, (3) north of the fault block, in the Livermore Basin, Arroyo Seco built a 7-km 2 fluvial fan, apparently forcing the Arroyo Las Positas, a smaller stream that enters the basin from the east, northward around the Arroyo Seco fan, and (4) a knickpoint exists near the point of capture on Arroyo Seco. Stratigraphic evidence reflecting this shift in the Arroyo Seco position into the Livermore Basin was evaluated through a provenance study of 215 gravel units from 34 boreholes spaced evenly over the 2.6 km 2 LLNL site. The Arroyo Seco derives its sediment from both the Jurassic-Cretaceous Franciscan Assemblage and the Altamont Hills (which are comprised of Mesozoic Great Valley Group and Tertiary continental sediments). The Arroyo Las Positas drains only the Altamont Hills and thus lacks the Franciscan Assemblage-derived clasts. The origin of the individual gravel units was determined by the percentage of Franciscan Assemblage indicator pebbles (red chert, green chert and blueschist) in the samples. Through this analysis, we determined that high-percentage Franciscan Assemblage-derived clasts were present below a depth of approximately 35 m below the surface, low-percentage Franciscan Assemblage

  19. Environmental degradation and environmental threats in China.

    PubMed

    Wang, Ying

    2004-01-01

    The article presents a review of environmental degradation and its threats in China. Air pollution, water pollution, deforestation, soil degradation, sand depositing in dams, decaying urban infrastructure, and more and more hazards such as floods, landslides and soil erosion are major consequences of environmental degradation and are making tremendous loss both in life and property. Through investigation, the author found that poor air quality in the large cities; water pollution in the downstream of many rivers; the multiple problems of many mining areas; lack of access to fresh water; decaying sewage systems; and the disastrous impact of these environmental degradations on public health and agricultural products in many provinces is rather serious. Relationship of environmental degradation and natural hazards is close; more attention should be put in environmental degradation that may surpass economy progress if the trend continues. It is therefore imperative that Chinese government undertake a series of prudent actions now that will enable to be in the best possible position when the current environmental crisis ultimately passes. PMID:15887370

  20. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  1. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  2. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  3. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  4. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  5. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  6. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  7. 28 CFR 36.208 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) In determining whether an...

  8. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  9. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  10. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  11. 28 CFR 35.139 - Direct threat.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Direct threat. 35.139 Section 35.139... LOCAL GOVERNMENT SERVICES General Requirements § 35.139 Direct threat. (a) This part does not require a... activities of that public entity when that individual poses a direct threat to the health or safety of...

  12. Threat Assessment Teams Target School Crisis

    ERIC Educational Resources Information Center

    Stover, Del

    2005-01-01

    In this article, the author discusses the creation of a threat-assessment team to be utilized in order to analyze each threat and the usage of threat-assessment protocols for the purpose of guiding school administrators through a crisis. These are actually developed with the advice from the US Department of Education and the Secret Service. When a…

  13. Stereotype Threat, Test Anxiety, and Mathematics Performance

    ERIC Educational Resources Information Center

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  14. Identifying Separation Threats in Family Therapy.

    ERIC Educational Resources Information Center

    Argles, Paul

    1983-01-01

    Outlines the types of separation threats common in troubled families. Signs that threats are being used may include inappropriate clinging behavior, phobias, psychosomatic symptoms, and anxious attachment. Therapists may find other behaviors, often seen as problems in themselves, that are really reactions to perceived separation threats. (JAC)

  15. Eliminating the major tornado threat in Tornado Alley

    NASA Astrophysics Data System (ADS)

    Tao, R.

    2014-06-01

    The 2013 devastating tornadoes in Oklahoma, Illinois and other states in Tornado Alley raise an important question: Can we do something to eliminate the major tornado threats in Tornado Alley? Violent tornadoes in Tornado Alley start from the clash-between northbound warm air flow and southbound cold air flow. As there is no mountain in Tornado Alley ranging from west to east to weaken or block the air flows, some clashes are violent, creating vortex turbulence called supercells. These supercells are initially in horizontal spinning motion at the lower atmosphere and then tilt as the air turns to rise in the storm's updraft, creating a component of spin around a vertical axis. About 30% of supercells develop into tornadoes, causing tremendous damages. Here we show that if we build three east-west great walls in the American Midwest, 300 m high and 50 m wide, one in North Dakota, one passing Oklahoma to east and the third one in the south Texas and Louisiana, we will weaken or block such air mass clashes and therefore diminish the major tornado threat in the Tornado Alley forever. We may also first build such great walls locally at some areas with frequent devastating tornado outbreaks and then gradually extend them.

  16. Can We Eliminate the Major Tornado Threats in Tornado Alley?

    NASA Astrophysics Data System (ADS)

    Tao, R.

    2014-03-01

    The recent devastating tornado attacks in Oklahoma, Iowa, Nebraska, and South Dakota raise an important question: can we do something to eliminate the major tornado threats in Tornado Alley? Violent tornado attacks in Tornado Alley are starting from intensive encounters between the northbound warm air flow and southbound cold air flow. As there is no mountain in Tornado Alley ranging from west to east to weaken or block such air flows, some encounters are violent, creating instability: The strong wind changes direction and increases in speed and height. As a result, it creates a supercell, violent vortex, an invisible horizontal spinning motion in the lower atmosphere. When the rising air tilts the spinning air from horizontal to vertical, tornadoes with radii of miles are formed and cause tremendous damage. Here we show that if we build three east-west great walls in the American Midwest, 300m high and 50m wide, one in North Dakota, one along the border between Kansas and Oklahoma to east, and the third one in the south Texas and Louisiana, we will diminish the tornado threats in the Tornado Alley forever. We may also build such great walls at some area with frequent devastating tornado attacks first, then gradually extend it. This research is supported in part by a grant from US Naval Research Lab.

  17. The role of threats in animal cooperation

    PubMed Central

    Cant, Michael A.

    2011-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identify three factors—impact, accuracy and perception—that together determine the effectiveness of threats to induce cooperation. PMID:20798110

  18. Stereotype threat and female communication styles.

    PubMed

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed. PMID:21646549

  19. Evaluation of a landscape evolution model to simulate stream piracies: Insights from multivariable numerical tests using the example of the Meuse basin, France

    NASA Astrophysics Data System (ADS)

    Benaïchouche, Abed; Stab, Olivier; Tessier, Bruno; Cojan, Isabelle

    2016-01-01

    In landscapes dominated by fluvial erosion, the landscape morphology is closely related to the hydrographic network system. In this paper, we investigate the hydrographic network reorganization caused by a headward piracy mechanism between two drainage basins in France, the Meuse and the Moselle. Several piracies occurred in the Meuse basin during the past one million years, and the basin's current characteristics are favorable to new piracies by the Moselle river network. This study evaluates the consequences over the next several million years of a relative lowering of the Moselle River (and thus of its basin) with respect to the Meuse River. The problem is addressed with a numerical modeling approach (landscape evolution model, hereafter LEM) that requires empirical determinations of parameters and threshold values. Classically, fitting of the parameters is based on analysis of the relationship between the slope and the drainage area and is conducted under the hypothesis of equilibrium. Application of this conventional approach to the capture issue yields incomplete results that have been consolidated by a parametric sensitivity analysis. The LEM equations give a six-dimensional parameter space that was explored with over 15,000 simulations using the landscape evolution model GOLEM. The results demonstrate that stream piracies occur in only four locations in the studied reach near the city of Toul. The locations are mainly controlled by the local topography and are model-independent. Nevertheless, the chronology of the captures depends on two parameters: the river concavity (given by the fluvial advection equation) and the hillslope erosion factor. Thus, the simulations lead to three different scenarios that are explained by a phenomenon of exclusion or a string of events.

  20. Threat sensitivity in bipolar disorder.

    PubMed

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  1. Human collective reactions to threat.

    PubMed

    Dezecache, Guillaume

    2015-01-01

    A common assumption regarding mass emergency situations is that individuals in such contexts behave in a way that maximizes their likelihood to escape, at the expense, or with little concern for, the welfare and survival of their neighbors. Doing so, they might even compromise the effectiveness of group evacuation. This conception follows the views of early works on crowd psychology, a tradition born with Gustave Le Bon's The Crowd: a study of the Popular Mind, first published in 1895, and which has had a tremendous impact on scientific representations of people's behavior in mass emergency contexts. Indeed, this work has greatly contributed to the idea that, in such situations, people revert to a primitive, impulsive, irrational, and antisocial nature, causing the breakdown of social order. However, more empirically oriented studies have consistently reported little collective panic, as well as a great deal of solidarity and pro-social behavior during mass emergency situations. Because of institutional barriers, such views have remained largely unknown to cognitive psychologists. Yet these are important results in that they show that human individual and collective reactions to threat are primarily affiliative. Indeed, far from leading to the breakdown of the social fabrics, the presence of a common threat can strengthen social bonds. PMID:26263225

  2. Countering the Nuclear Terrorist Threat

    SciTech Connect

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  3. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    PubMed

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes. PMID:24345711

  4. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    PubMed Central

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  5. Potential threats to offshore platforms

    SciTech Connect

    Jenkins, B.M.

    1988-01-01

    Increasingly spectacular acts of terrorism have led to growing concern that terrorists will move beyond the symbols of society and directly attack its technological and industrial vulnerabilities. Offshore platforms have been frequently mentioned among the potential targets terrorists might attack. This concern, however, has not resulted in extensive research like that devoted to possible threats to nuclear facilities, which have also been frequently mentioned as possible future targets of terrorists. For one thing, offshore drilling does not invoke the fear inherent in the word nuclear, a fear that translates directly into heavy security for the nuclear industry. Neither does the construction of offshore platforms provoke anything like the kind of protest generated by the construction of nuclear facilities.

  6. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, L.; Pennock, D. J.; McKenzie, N. J.; Badraoui, M.; Chude, V.; Baptista, I.; Mamo, T.; Yemefack, M.; Singh Aulakh, M.; Yagi, K.; Hong, S. Young; Vijarnsorn, P.; Zhang, G.-L.; Arrouays, D.; Black, H.; Krasilnikov, P.; Sobocká, J.; Alegre, J.; Henriquez, C. R.; Mendonça-Santos, M. L.; Taboada, M.; Espinosa-Victoria, D.; AlShankiti, A.; AlaviPanah, S. K.; Elsheikh, E. A. E.; Hempel, J.; Camps Arbestain, M.; Nachtergaele, F.; Vargas, R.

    2015-12-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecure among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the SWSR report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  7. World's soils are under threat

    NASA Astrophysics Data System (ADS)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  8. Effect of evaluation threat on procrastination behavior.

    PubMed

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination. PMID:17703786

  9. Sensor-guided threat countermeasure system

    DOEpatents

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  10. DOE site-specific threat assessment

    SciTech Connect

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-07-12

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs.

  11. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema

    INL

    2009-09-01

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  12. Hidden Markov models for threat prediction fusion

    NASA Astrophysics Data System (ADS)

    Ross, Kenneth N.; Chaney, Ronald D.

    2000-04-01

    This work addresses the often neglected, but important problem of Level 3 fusion or threat refinement. This paper describes algorithms for threat prediction and test results from a prototype threat prediction fusion engine. The threat prediction fusion engine selectively models important aspects of the battlespace state using probability-based methods and information obtained from lower level fusion engines. Our approach uses hidden Markov models of a hierarchical threat state to find the most likely Course of Action (CoA) for the opposing forces. Decision tress use features derived from the CoA probabilities and other information to estimate the level of threat presented by the opposing forces. This approach provides the user with several measures associated with the level of threat, including: probability that the enemy is following a particular CoA, potential threat presented by the opposing forces, and likely time of the threat. The hierarchical approach used for modeling helps us efficiently represent the battlespace with a structure that permits scaling the models to larger scenarios without adding prohibitive computational costs or sacrificing model fidelity.

  13. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect

    INL

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  14. Shades of Threat: Racial Identity as a Moderator of Stereotype Threat

    ERIC Educational Resources Information Center

    Davis, Claytie, III; Aronson, Joshua; Salinas, Moises

    2006-01-01

    This study investigated Black racial identity attitudes as a moderator of intellectual performance in potentially stereotype threatening situations. Ninety-eight African American students were randomly assigned to one of three stereotype threatening conditions: low threat, medium threat, or high threat. Analyses confirmed a stereotype threat…

  15. The Nature of the Bioterrorism Threat

    SciTech Connect

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  16. Stereotype Threat, Identity Salience, and Spatial Reasoning

    ERIC Educational Resources Information Center

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups…

  17. Development of the Academic Stereotype Threat Inventory

    ERIC Educational Resources Information Center

    Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.

    2008-01-01

    The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…

  18. Bombs and Bomb Threats in the School

    ERIC Educational Resources Information Center

    Starkey, David J.; Starkey, John D.

    1977-01-01

    Bombs and the threat of bombing can leave school personnel faced by an explosive hazard without knowledge of what to do. Therefore, a preplanned response is necessary. Discusses four major stages of dealing with bombs and bomb threats. (Author/RK)

  19. Bomb Threats and Bomb Search Techniques.

    ERIC Educational Resources Information Center

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  20. The Smallpox Threat: The School Nurse's Role

    ERIC Educational Resources Information Center

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  1. [Counterfeit medicines: a growing threat].

    PubMed

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world. PMID:17286014

  2. Nuclear threats from small states

    SciTech Connect

    Kahan, J.H.

    1994-06-13

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  3. In Brief: Forecasting meningitis threats

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  4. Inferences from counterfactual threats and promises.

    PubMed

    Egan, Suzanne M; Byrne, Ruth M J

    2012-01-01

    We examine how people understand and reason from counterfactual threats, for example, "if you had hit your sister, I would have grounded you" and counterfactual promises, for example, "if you had tidied your room, I would have given you ice-cream." The first experiment shows that people consider counterfactual threats, but not counterfactual promises, to have the illocutionary force of an inducement. They also make the immediate inference that the action mentioned in the "if" part of the counterfactual threat and promise did not occur. The second experiment shows that people make more negative inferences (modus tollens and denial of the antecedent) than affirmative inferences (modus ponens and affirmation of the consequent) from counterfactual threats and promises, unlike indicative threats and promises. We discuss the implications of the results for theories of the mental representations and cognitive processes that underlie conditional inducements. PMID:22580411

  5. Repeated threat (without harm) in a living environment potentiates defensive behavior.

    PubMed

    Kim, D J; Anderson, B J

    2015-02-15

    Children exposed to neighborhood violence have higher rates of aggression, but it is unclear whether aggression is associated with threat, harm or the combination of factors. All animals, including humans, experience threat as they leave the safety of home and risk harm to gather resources (foraging). To better understand how selective environmental variables drive behavioral tendencies, we developed a semi-naturalistic living environment that includes the need to navigate across space to obtain resources. Rats were housed for three weeks in two tub cages, one with food and the other with water, both consistently available, but separated by a 91 cm long tunnel. After habituating for three days, half the rats (threat stress condition) received unpredictable threats (simultaneous puff of air with ferret dander, abrupt flash of light, and an abrupt sound) when crossing the central position of the tunnel (random order with p=0.25) for 21 days. During the manipulation, the threat stress rats crossed the tunnel less and exhibited risk assessment behaviors. After cessation of the treatment conditions, the threat stress group spent more time burying a rag with ferret dander odor and was more likely to bury, and spent more time burying a highly novel stimulus. There were no group differences in symptoms of depression, avoidance, or exploration. The results suggest that repeated threats without harm increase pre-emptive defense behaviors, a form of active coping, without affecting passive forms of coping. PMID:25446759

  6. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  7. Volume-holographic memory for laser threat discrimination

    NASA Astrophysics Data System (ADS)

    Delong, Mark L.; Duncan, Bradley D.; Parker, Jack H., Jr.

    1996-10-01

    Using conventional volume-holographic angle multiplexing in an Fe:LiNbO3 crystal, we have developed a compact laser threat discriminator, intended for aircraft integration, that optically detects laser spatial coherence and angle of arrival while simultaneously rejecting incoherent background sources, such as the Sun. The device is intended for a specific type of psychophysical laser attack against U.S. Air Force pilots, namely, third-world-country exploitation of inexpensive and powerful cw Ar-ion or doubled Nd:YAG lasers in the visible spectrum to blind or disorient U.S. pilots. The component does not solve the general tactical laser weapon situation, which includes identifying precision-guided munitions, range finders, and lidar systems that use pulsed infrared lasers. These are fundamentally different threats requiring different detector solutions. The device incorporates a sequence of highly redundant, simple black-and-white warning patterns that are keyed to be reconstructed as the incident laser threat, playing the role of an uncooperative probe beam, changes angle with respect to the crystal. The device tracks both azimuth and elevation, using a nonconventional hologram viewing system. Recording and playback conditions are simplified because nonzero cross talk is a desirable feature of this discriminator, inasmuch as our application requires a nonzero probability of detection for arbitrary directions of arrival within the sensor's field of view. The device can exploit phase-matched grating trade-off with probe-beam wavelength, accommodating wavelength-tunable threats, while still maintaining high direction-of-arrival tracking accuracy. .

  8. Insider threat to secure facilities: data analysis

    SciTech Connect

    Not Available

    1980-05-09

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

  9. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    SciTech Connect

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  10. Threat displays for final approach

    NASA Astrophysics Data System (ADS)

    Jennings, Chad Warren

    During periods of good visibility, airports can conduct Closely Spaced Parallel Approaches (CSPA) and simultaneously operate parallel runways separated by more than 750 feet. When visibility degrades to Instrument Meteorological Conditions (IMC) and pilots must fly exclusively by the instruments, the runway separation required to operate parallel runways increases to 3400 feet or more. For many airports around the country and the world this means the second runway must be closed and the airport operates at half capacity. To alleviate the delays caused by this capacity reduction many airports worldwide are planning to expand and build new runways. The projected cost of the ten largest airport projects in the United States is $8-16 Billion. Perhaps a less expensive solution can be found with innovative technology rather than real estate? This research presents the first ever design, implementation, and characterization of a synthetic vision display and the supporting flight system to attempt to achieve this solution. The display uses 3D graphics and an air to air datalink called Automatic Dependent Surveillance--Broadcast to present the pilot with the information necessary to aviate, navigate and monitor traffic. This thesis also documents the first series of flight experiments to test the applicability of synthetic vision displays to both runway incursion avoidance and CSPA. Finally, utilizing the results from the flight testing in a Monte Carlo analysis, the effect of deploying this display on minimum safe runway separation is calculated. It has been found that the minimum safe runway separation for IMC operation can safely be reduced to 1900 feet. If, in addition, significant changes are made in Air Traffic Control procedures for longitudinal aircraft spacing, the analysis shows that the display system presented herein will allow for runway separation of 1400 feet with no new restrictions on aircraft size or crosswind. Furthermore, with certain restrictions on

  11. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    PubMed Central

    Carels, Robert A.; Domoff, Sarah E.; Burmeister, Jacob M.; Koball, Afton M.; Hinman, Nova G.; Davis, Alan K.; Oehlhof, Marissa Wagner; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A.

    2013-01-01

    Objective The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method 216 adults completed an online survey. Participants’ mean age was 23.6 (SD 10.1; range 18–64) years and mean BMI was 31.6 (SD 7.5) kg/m2. Results Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Conclusion Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals’ susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes’ impact on cognitive and behavioral outcomes. PMID:23736227

  12. Heat Waves Pose Big Health Threats

    MedlinePlus

    ... news/fullstory_159744.html Heat Waves Pose Big Health Threats Kids, elderly among those at greatest risk, ... Illness Seniors' Health Recent Health News Related MedlinePlus Health Topics Child Safety Heat Illness Seniors' Health About ...

  13. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2010-01-08

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  14. Acid Rain: The Silent Environmental Threat.

    ERIC Educational Resources Information Center

    Zmud, Mia

    1992-01-01

    Describes the silent environmental threat posed by acid rain. Caused mainly by manmade pollutants, acid rain damages water and trees, decreases visibility, corrodes monuments, and threatens public health. The article includes guidelines for action. (SM)

  15. Children's Threats: When Are They Serious?

    MedlinePlus

    ... TV shows, movies, music, magazines, comics, books, video games, and Internet sites mental illness, such as depression, ... others are concerned? When a child makes a serious threat it should not be dismissed as just ...

  16. Intergroup threat gates social attention in humans.

    PubMed

    Chen, Yujie; Zhao, Yufang

    2015-02-01

    Humans shift their attention to follow another person's gaze direction, a phenomenon called gaze cueing. This study examined whether a particular social factor, intergroup threat, modulates gaze cueing. As expected, stronger responses of a particular in-group to a threatening out-group were observed when the in-group, conditioned to perceive threat from one of two out-groups, was presented with facial stimuli from the threatening and non-threatening out-groups. These results suggest that intergroup threat plays an important role in shaping social attention. Furthermore, larger gaze-cueing effects were found for threatening out-group faces than for in-group faces only at the 200 ms but not the 800 ms stimulus onset asynchrony (SOA); the specificity of the gaze-cueing effects at the short SOA suggests that threat cues modulate the involuntary component of gaze cueing. PMID:25716090

  17. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  18. Counter-terrorism threat prediction architecture

    NASA Astrophysics Data System (ADS)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  19. Space Station Program threat and vulnerability analysis

    NASA Technical Reports Server (NTRS)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  20. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  1. An Information Fusion Framework for Threat Assessment

    SciTech Connect

    Beaver, Justin M; Kerekes, Ryan A; Treadwell, Jim N

    2009-01-01

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  2. Nuclear Threat Intelligence, Surveillance, and Reconnaissance

    NASA Astrophysics Data System (ADS)

    Kuliasha, Michael

    2012-03-01

    The National Security Strategy states that the greatest threat to the American people is ``the pursuit of nuclear weapons by violent extremists and their proliferation to additional states.'' The Global Nuclear Detection Architecture (GNDA) addresses a key portion of that threat by focusing on detecting nuclear and radiological materials that are out of regulatory control within permissive operating environments. However, the force protection requirements of the Department of Defense (DoD) range across a wider mission space from permissive environments, where nuclear and radiological materials can be monitored while under regulatory control, to hostile environments where nuclear and radiological materials exist in defiance of international regulations and agreements. This wider range of operating environments and the inherent physics limitations on the range of radiation detection pose great challenges to radiation detection-focused approaches to nuclear threat detection. Consequently, DoD is in the process of defining an intelligence, surveillance, and reconnaissance approach to countering nuclear threats that considers the observable signatures of all elements that comprise a potential threat; information, funds, people, material, equipment, and infrastructure. This strategy represents a shift from radiation detection as the primary sensing modality to radiation detection as one of many sensing modalities, including the human dimension, with a heavy emphasis on data fusion. This presentation will describe the attributes of a layered sensing approach to nuclear threat detection, illustrate the approach with examples, define potential building blocks, and discuss technical challenges.

  3. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    PubMed

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat. PMID:19245886

  4. Stereotype threat in the classroom: dejection mediates the disrupting threat effect on women's math performance.

    PubMed

    Keller, Johannes; Dauenheimer, Dirk

    2003-03-01

    Research on stereotype threat, which is defined as the risk of confirming a negative stereotypic expectation about one's group, has demonstrated that the applicability of negative stereotypes disrupts the performance of stigmatized social groups. While it has been shown that a reduction of stereotype threat leads to improved performance by members of stigmatized groups, there is a lack of clear-cut findings about the mediating processes. The aim of the present study is to provide a better understanding of the mechanisms that stereotype threat causes in women working on mathematical problems. In addition, the study set out to test stereotype threat theory in a natural environment: high school classrooms. The experiment involved the manipulation of the gender fairness of a math test. The results indicate that the stereotype threat effect exists in this everyday setting. Moreover, it appears that dejection emotions mediate the effect of threat manipulation. PMID:15273014

  5. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  6. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  7. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... Assistant Program Manager, Attn: Federal Agency Comparability Check, Hazmat Threat Assessment...

  8. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    PubMed Central

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2013-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on one’s own abilities. The present experiments explored Black college students’ performance on diagnostic intelligence tests (Experiments 1 and 3) and women’s interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. PMID:23088232

  9. Impact of an interactive anti-speeding threat appeal: how much threat is too much?

    PubMed

    Panić, Katarina; Cauberghe, Verolien; De Pelsmacker, Patrick

    2011-05-01

    This study investigates the impact of an interactive television public-service announcement (PSA) containing an anti-speeding threat appeal on feelings of telepresence and behavioral intention. In a 2 × 2 × 2 between-subjects factorial design with 213 participants, the level of threat evoked by a traditional PSA, by the interactive part of the PSA (dedicated advertising location or DAL) and by the preceding program context are manipulated to be either low or high. The results support the assumptions of the Extended Parallel Processing Model with regard to the effect of the level of perceived threat and perceived efficacy in an interactive media environment, and the important role of telepresence as a processing variable. The results of the three-way interaction effect of threat evoked by the program, the PSA and the DAL on telepresence show that when the threat levels of the program and the PSA are both either low or high, exposure to the threatening information in the DAL does not generate a significantly higher feeling of telepresence. However, when a low-threat program is followed by a high-threat PSA, the threat level of the DAL has a positive effect on telepresence. The same trend is found with a high-threat program and a low-threat PSA, although the effect of the threat evoked by the DAL on telepresence is not significant at conventional levels. Finally, there is a positive effect of telepresence on the behavioral intention to reduce speeding, which is partly mediated by the viewer's perceived efficacy to follow the recommended behavior. PMID:21204691

  10. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under this...

  11. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart....

  12. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under this...

  13. Protecting SWIR cameras from laser threats

    NASA Astrophysics Data System (ADS)

    Donval, Ariela; Fisher, Tali; Lipman, Ofir; Oron, Moshe

    2013-06-01

    SWIR cameras offer the advantage of higher resolution and smaller optical systems than conventional mid and far infrared optical systems. With the ability of seeing at low illumination conditions at the near infrared region, it can provide the detection of covert lasers. The ability of laser detection introduces the risk of sensor damage when the laser power is above a certain threat level. Smart protection is therefore needed, that is transparent for low laser intensities and limit or block the high laser intensities, and is effective over a wide band of wavelengths. We developed an Optical Power Control (OPC) device that reduces laser power threat to a safe level for a variety of optical systems. The talk presents a novel technology for protection of SWIR cameras against laser threats.

  14. Left-Wing Extremism: The Current Threat

    SciTech Connect

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  15. Epidemiology today: Mitigating threats to an ecosystem.

    PubMed

    Kreiger, Nancy

    2016-01-01

    Ecosystems comprise all the living and non-living things in a particular area (e.g., rain forest, desert), which interact and maintain equilibrium. Loss of equilibrium (e.g., clear-cutting trees in a rain forest) can mean the decline of the ecosystem, unless it is able to adapt to the new circumstances. The term "knowledge ecosystem" describes an approach to managing knowledge in a particular field; the components of this system include the people, the technological skills and resources, and information or data. Epidemiology can be thought of as a knowledge ecosystem and, like ecological systems, its existence can be threatened, from both internal and external forces that may alter its equilibrium. This paper describes some threats to the epidemiology knowledge ecosystem, how these threats came about, and what responses we can make that may serve to mitigate those threats. PMID:27348106

  16. Insider Threat Assessment: Model, Analysis and Tool

    NASA Astrophysics Data System (ADS)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  17. Environmental Health: Threats and their Interactions

    PubMed Central

    Holdstock, Douglas

    2008-01-01

    Improvements in the provision of an acceptable standard of health care, particularly in the developing world, will be undermined by three ongoing processes: ongoing armed conflicts; the threat of global warming due to rising levels of greenhouse gases, particularly carbon dioxide emitted by developed countries; and by rapidly rising populations. The key features of these three threats are summarised, and it is shown that interactions between them increase both the likelihood of their occurrence and the probable harm that they will cause. Some of the interactions are described, with ways of providing health care taking into account the threats and their interactions, and the paradox is emphasised that better health care in the developing world will further increase population growth followed by increased greenhouse gas emissions. Improved education for women and free and unlimited access to modern methods of contraception are vital. PMID:21572838

  18. [The threat of snake and scorpion venoms].

    PubMed

    Płusa, Tadeusz; Smędzik, Katarzyna

    2015-09-01

    Venoms of snakes and scorpions pose a significant threat to the health and life of humans. The speed and range of their actions causes damage of the organ responsible for the maintenance of vital signs. Venomous snake venoms cause blood clotting disorders, tissue necrosis and hemolysis, and the release of a number of proinflammatory cytokines and impair antibody synthesis. Availability of antitoxins is limited and in the most cases supportive treatment is recommended. In turn, the venom of scorpions beside intestinal symptoms cause significant impairment of neuromuscular conduction, causing severe respiratory disorders. Action venom poses a particular threat to sensitive patients. The degree of threat to life caused by the venom of snakes and scorpions authorizes the treatment of these substances as a potential biological weapon. PMID:26449581

  19. On the special status of "ego threats".

    PubMed

    Schotte, D E

    1992-05-01

    This article comments on a recent article by Heatherton, Herman, and Polivy (1991) in which they suggest that ego threats are a prerequisite to affectively induced disinhibition of food intake in restrained eaters and current dieters. In contrast, the present review suggests that mood induction procedures that involve no apparent threat (e.g., viewing a frightening film) can also prompt disinhibition in restrained eaters. Thus, any mood induction procedure that does not directly physically threaten the S may disinhibit restrained eaters. It is concluded that recommendations to focus future research on ego threats are premature and may serve to obscure the mechanisms by which changes in affective state influence food intake in dieters. PMID:1507070

  20. Applications Using AIRS Data

    NASA Astrophysics Data System (ADS)

    Ray, S. E.; Pagano, T. S.; Fetzer, E. J.; Lambrigtsen, B.; Olsen, E. T.; Teixeira, J.; Licata, S. J.; Hall, J. R.; Thompson, C. K.

    2015-12-01

    The Atmospheric Infrared Sounder (AIRS) on NASA's Aqua spacecraft has been returning daily global observations of Earth's atmospheric constituents and properties since 2002. With a 12-year data record and daily, global observations in near real-time, AIRS data can play a role in applications that fall under many of the NASA Applied Sciences focus areas. For vector-borne disease, research is underway using AIRS near surface retrievals to assess outbreak risk, mosquito incubation periods and epidemic potential for dengue fever, malaria, and West Nile virus. For drought applications, AIRS temperature and humidity data are being used in the development of new drought indicators and improvement in the understanding of drought development. For volcanic hazards, new algorithms using AIRS data are in development to improve the reporting of sulfur dioxide concentration, the burden and height of volcanic ash and dust, all of which pose a safety threat to aircraft. In addition, anomaly maps of many of AIRS standard products are being produced to help highlight "hot spots" and illustrate trends. To distribute it's applications imagery, AIRS is leveraging existing NASA data frameworks and organizations to facilitate archiving, distribution and participation in the BEDI. This poster will communicate the status of the applications effort for the AIRS Project and provide examples of new maps designed to best communicate the AIRS data.

  1. [Assessing adolescents with school massacre threats].

    PubMed

    Lindberg, Nina; Sailas, Eila; Kaltiala-Heino, Riittakerttu

    2013-01-01

    School massacres have increased pressure on health-care authorities for assessing risk for severe violence. In acute situations, threat analysis focuses at thought processes and actions of adolescents presenting threat of violence, in order to assess to which extent the adolescent has progressed from thoughts to actions. Because of great variability in aggressive behavior, separate interventions for individual, family and other developmental surroundings are often needed. Structured risk-assessment in special health care is aimed for conducting decision making towards risk reduction and adequate help for adolescents at risk. PMID:24069639

  2. Traffic air quality index.

    PubMed

    Bagieński, Zbigniew

    2015-02-01

    Vehicle emissions are responsible for a considerable share of urban air pollution concentrations. The traffic air quality index (TAQI) is proposed as a useful tool for evaluating air quality near roadways. The TAQI associates air quality with the equivalent emission from traffic sources and with street structure (roadway structure) as anthropogenic factors. The paper presents a method of determining the TAQI and defines the degrees of harmfulness of emitted pollution. It proposes a classification specifying a potential threat to human health based on the TAQI value and shows an example of calculating the TAQI value for real urban streets. It also considers the role that car traffic plays in creating a local UHI. PMID:25461063

  3. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  4. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  5. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  6. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  7. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... pipeline integrity and use the threat identification in its integrity program? 192.917 Section 192.917....917 How does an operator identify potential threats to pipeline integrity and use the threat identification in its integrity program? (a) Threat identification. An operator must identify and evaluate...

  8. Defensive activation to (un)predictable interoceptive threat: The NPU respiratory threat test (NPUr).

    PubMed

    Schroijen, Mathias; Fantoni, Simona; Rivera, Carmen; Vervliet, Bram; Schruers, Koen; van den Bergh, Omer; van Diest, Ilse

    2016-06-01

    Potentially life-threatening interoceptive sensations easily engage the behavioral defensive system. Resulting fear and anxiety toward interoceptive threat are functionally distinct states that are hypothesized to play a prominent role in the etiology of panic disorder. The present study aimed to investigate whether fear- and anxiety-potentiated startle responses occur to predictable and unpredictable interoceptive threat, respectively. Therefore, we modified the NPU threat test (Schmitz & Grillon, ) and replaced the aversive electrocutaneous stimulus with an aversive interoceptive stimulus (a breathing occlusion, making it briefly impossible to breathe). Healthy participants (N = 48) underwent three instructed conditions. A visual cue signaled the occlusion in the predictable condition (P), whereas another cue was unrelated to the occurrence of the occlusion in the unpredictable condition (U). The safe condition (N) also had a visual cue, but no occlusion. Both fear- and anxiety-potentiated startle blink responses were observed in response to predictable and unpredictable respiratory threat, respectively. The current study presents and validates the NPU respiratory threat test (NPUr) as an ecologically valid paradigm to study both anxiety and fear in response to a panic-relevant interoceptive threat. The paradigm allows future testing of contextual generalization, investigation of different clinical groups, and more explicit comparisons of defensive responding to interoceptive versus exteroceptive threats. PMID:26879710

  9. Global threat to agriculture from invasive species.

    PubMed

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  10. The silent threat of low genetic diversity

    USGS Publications Warehouse

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  11. Diversity, Racial Threat and Metropolitan Housing Segregation

    ERIC Educational Resources Information Center

    DeFina, Robert; Hannon, Lance

    2009-01-01

    Previous studies have shown that as the percent black or percent Hispanic grows, that group's residential segregation from whites tends to increase as well. Typically, these findings are explained in terms of white discriminatory reaction to the perceived threat associated with minority population growth. The present analysis examines whether…

  12. The Asteroid Impact Threat: Decisions Upcoming

    NASA Astrophysics Data System (ADS)

    Schweickart, Russell L.

    The asteroid impact threat has likely been constant for the past three billion years. What has accelerated is our knowledge of the impact hazard, and in particular the population of near- Earth objects (NEOs), those asteroids and near-Earth comets whose orbits approach or cross that of the Earth. In the next 10-15 years we will know the orbits of over 300,000 NEOs of a size capable of destroying a major city on impact. Based on current data 97 Given that a NEO deflection campaign can be initiated using existing space technology the international community will shortly be confronted with the decision of whether action should be taken, when it should be taken and who should take such action. The Association of Space Explorers (ASE)* and its Panel on Asteroid Threat Mitigation is currently concluding a two year process leading to a recommended decision program on asteroid threat mitigation that will be submitted to the United Nations in 2009. UN member states will soon be looking to the scientific community for their inputs on this matter. This presentation is intended to provide basic information on the NEO threat and our ability to take preventive action, anticipating an increasing demand for scientific opinion on this issue from international political institutions. (*) The Association of Space Explorers is the profession international organization of astronauts and cosmonauts. See www.space-explorers.org.

  13. The Nature of the Terrorism Threat

    ERIC Educational Resources Information Center

    Goldstein, Evan R., Comp.

    2008-01-01

    This article describes how Bruce Hoffman and Marc Sageman, two prominent scholars of terrorism, square off over whether Al Qaeda remains the primary global terrorist threat. The dispute began in the pages of "Foreign Affairs," where Hoffman, a professor in the security-studies program at Georgetown University, wrote a withering review of Sageman's…

  14. Disgust, politics, and responses to threat.

    PubMed

    Inbar, Yoel; Pizarro, David

    2014-06-01

    We address two questions regarding the relationship between political ideology and responses to threatening or aversive stimuli. The first concerns the reason for the connection between disgust and specific political and moral attitudes; the second concerns the observation that some responses to threat (i.e., neuroticism/anxiety) are associated with a more left-wing political orientation. PMID:24970437

  15. 24 CFR 9.131 - Direct threat.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Direct threat. 9.131 Section 9.131 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF DISABILITY IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT...

  16. 25 CFR 11.402 - Terroristic threats.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Terroristic threats. 11.402 Section 11.402 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND... public inconvenience or in reckless disregard of the risk of causing such terror or inconvenience....

  17. The School Shooter: A Threat Assessment Perspective.

    ERIC Educational Resources Information Center

    O'Toole, Mary Ellen

    This paper presents a systematic procedure for threat assessment and intervention of school shooters. The model is designed to be used by educators, mental-health professionals, and law-enforcement agencies and is intended to help refine and strengthen the efforts of the National Center for the Analysis of Violent Crime. Its fundamental building…

  18. Shape threat detection via adaptive computed tomography

    NASA Astrophysics Data System (ADS)

    Masoudi, Ahmad; Thamvichai, Ratchaneekorn; Neifeld, Mark A.

    2016-05-01

    X-ray Computed Tomography (CT) is used widely for screening purposes. Conventional x-ray threat detection systems employ image reconstruction and segmentation algorithms prior to making threat/no-threat decisions. We find that in many cases these pre-processing steps can degrade detection performance. Therefore in this work we will investigate methods that operate directly on the CT measurements. We analyze a fixed-gantry system containing 25 x-ray sources and 2200 photon counting detectors. We present a new method for improving threat detection performance. This new method is a so-called greedy adaptive algorithm which at each time step uses information from previous measurements to design the next measurement. We utilize sequential hypothesis testing (SHT) in order to derive both the optimal "next measurement" and the stopping criterion to insure a target probability of error Pe. We find that selecting the next x-ray source according to such a greedy adaptive algorithm, we can reduce Pe by a factor of 42.4× relative to the conventional measurement sequence employing all 25 sources in sequence.

  19. Computer Security-Risks, Threats, and Safeguards.

    ERIC Educational Resources Information Center

    Ekhaml, Leticia

    2001-01-01

    Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)

  20. Proliferation: Threat and response (November 1997)

    SciTech Connect

    1997-11-01

    Table of Contents: The Regional Proliferation Challenge; Northeast Asia; South Asia; The Middle East and North Africa; Russia, Ukraine, Kazakhstan, and Belarus; The Transnational Threat; Department of Defense Response; Prevention; Protection; Acquisition; DOD Capabilities to Respond to NBC Terrorism; Conclusion; Technical Annex; Further Reading; and Glossary.

  1. Reactions to the Threat of Embarrassment.

    ERIC Educational Resources Information Center

    Miller, Rowland S.; Miller, Gale A.

    Embarrassment is an aversive state which occurs when the public image a person is trying to maintain during an interaction is abruptly discredited. When people are embarrassed, they try to salvage the situation by offering positive information about themselves to restore their endangered identities. To examine responses to the threat of impending…

  2. Threats and countermeasures for network security

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  3. Global threat to agriculture from invasive species

    PubMed Central

    Paini, Dean R.; Sheppard, Andy W.; Cook, David C.; De Barro, Paul J.; Worner, Susan P.; Thomas, Matthew B.

    2016-01-01

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread. PMID:27325781

  4. After Heart Attack, New Threat: Heart Failure

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_159007.html After Heart Attack, New Threat: Heart Failure 1 in 4 survivors develops this serious ... TUESDAY, May 24, 2016 (HealthDay News) -- Risk of heart failure appears high within a few years of ...

  5. Using the threat probability task to assess anxiety and fear during uncertain and certain threat.

    PubMed

    Bradford, Daniel E; Magruder, Katherine P; Korhumel, Rachel A; Curtin, John J

    2014-01-01

    Fear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e., "startle probes"). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g., neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion. PMID:25285398

  6. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect

    Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  7. A threat in the computer: the race implicit association test as a stereotype threat experience.

    PubMed

    Frantz, Cynthia M; Cuddy, Amy J C; Burnett, Molly; Ray, Heidi; Hart, Allen

    2004-12-01

    Three experiments test whether the threat of appearing racist leads White participants to perform worse on the race Implicit Association Test (IAT) and whether self-affirmation can protect from this threat. Experiments 1 and 2 suggest that White participants show a stereotype threat effect when completing the race IAT, leading to stronger pro-White scores when the test is believed to be diagnostic of racism. This effect increases for domain-identified (highly motivated to control prejudice) participants (Experiment 2). In Experiment 3, self-affirmation inoculates participants against stereotype threat while taking the race IAT. These findings have methodological implications for use of the race IAT and theoretical implications concerning the malleability of automatic prejudice and the potential interpersonal effects of the fear of appearing racist. PMID:15536243

  8. Piracy without Penalty.

    ERIC Educational Resources Information Center

    Foster, Andrea L.

    2003-01-01

    Outlines the confusion arising when public colleges invoke a constitutional shield when they are accused of pirating software. Some state institutions claim immunity under the 11th Amendment from prosecution for infringement of intellectual property. (SLD)

  9. Future Infectious Disease Threats to Europe

    PubMed Central

    Suk, Jonathan E.

    2011-01-01

    We examined how different drivers of infectious disease could interact to threaten control efforts in Europe. We considered projected trends through 2020 for 3 broad groups of drivers: globalization and environmental change, social and demographic change, and health system capacity. Eight plausible infectious disease threats with the potential to be significantly more problematic than they are today were identified through an expert consultation: extensively drug-resistant bacteria, vector-borne diseases, sexually transmitted infections, food-borne infections, a resurgence of vaccine-preventable diseases, health care–associated infections, multidrug-resistant tuberculosis, and pandemic influenza. Preemptive measures to be taken by the public health community to counteract these threats were identified. PMID:21940915

  10. Securing Infrastructure from High Explosive Threats

    SciTech Connect

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  11. Current nuclear threats and possible responses

    NASA Astrophysics Data System (ADS)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  12. Detecting underwater improvised explosive threats (DUIET)

    NASA Astrophysics Data System (ADS)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  13. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  14. The Concept of Identification in Threat Assessment.

    PubMed

    Meloy, J Reid; Mohandie, Kris; Knoll, James L; Hoffmann, Jens

    2015-06-01

    Identification is one of eight warning behaviors--superordinate patterns of accelerating risk--that are theorized to correlate with targeted violence, and have some empirical validation. It is characterized by one or more of five characteristics: pseudo-commando behavior, evidence of a warrior mentality, a close association with weapons or other military or law enforcement paraphernalia, wanting to imitate and often surmount previous attackers or assassins, or believing oneself to be an agent to advance a particular cause or belief system. The authors briefly explore the history of the psychology of identification, its current usage, and its application to threat assessment. Four cases are used to illustrate identification as both a process and a product, and a likely motive for targeted violence in some subjects. Its operational relevance for threat assessment is suggested. PMID:25728417

  15. Criteria air pollutants and toxic air pollutants.

    PubMed Central

    Suh, H H; Bahadori, T; Vallarino, J; Spengler, J D

    2000-01-01

    This review presents a brief overview of the health effects and exposures of two criteria pollutants--ozone and particulate matter--and two toxic air pollutants--benzene and formaldehyde. These pollutants were selected from the six criteria pollutants and from the 189 toxic air pollutants on the basis of their prevalence in the United States, their physicochemical behavior, and the magnitude of their potential health threat. The health effects data included in this review primarily include results from epidemiologic studies; however, some findings from animal studies are also discussed when no other information is available. Health effects findings for each pollutant are related in this review to corresponding information about outdoor, indoor, and personal exposures and pollutant sources. Images Figure 3 Figure 8 Figure 9 PMID:10940240

  16. Avian influenza: an emerging pandemic threat.

    PubMed

    Jin, Xian Wen; Mossad, Sherif B

    2005-12-01

    While we are facing the threat of an emerging pandemic from the current avian flu outbreak in Asia, we have learned important traits of the virus responsible for the 1918 Spanish influenza pandemic that made it so deadly. By using stockpiled antiviral drugs effectively and developing an effective vaccine, we can be in a better position than ever to mitigate the global impact of an avian influenza pandemic. PMID:16392727

  17. Bullying: a hidden threat to patient safety.

    PubMed

    Longo, Joy; Hain, Debra

    2014-01-01

    Patient safety is a crucial element for quality care in hemodialysis facilities. When evaluating possible threats to safety, an important factor to consider is the behavior of the healthcare staff. Inappropriate behaviors, such as bullying, have been associated with poor clinical outcomes. In addressing inappropriate behaviors, it is necessary to consider the role of the work environment. Healthy work environment initiatives provide a possible strategy to prevent and/or address the behaviors. PMID:24818452

  18. CAXSS: an intelligent threat-detection system

    NASA Astrophysics Data System (ADS)

    Feather, Thomas; Guan, Ling; Lee-Kwen, Adrian; Paranjape, Raman B.

    1993-04-01

    Array Systems Computing Inc. (ASC) is developing a prototype Computer Assisted X-ray Screening System (CAXSS) which uses state-of-the-art image processing and computer vision technology to detect threats seen in x-ray images of passenger carry-on luggage at national and international airports. This system is successful in detecting weapons including guns, knives, grenades, aerosol cans, etc. Currently, bomb detection is also being implemented; preliminary results using this bomb detector are promising.

  19. Matrix Characterization in Threat Material Detection Processes

    NASA Astrophysics Data System (ADS)

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-01

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, …) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1—contraband material in the sea containers, case 2—-explosives in soil (landmines), case 3—explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  20. Matrix Characterization in Threat Material Detection Processes

    SciTech Connect

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-10

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  1. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect

    Balatsky, Galya I.; Duggan, Ruth

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  2. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  3. SARS: An Emerging Global Microbial Threat.

    PubMed Central

    Hughes, James M.

    2004-01-01

    In March 2003, the Institute of Medicine published an update to its 1992 landmark report on emerging infections. The new report, Microbial Threats to Health: Emergence, Detection, and Response, describes the current spectrum of global microbial threats, factors affecting their emergence or resurgence, and measures that should be undertaken to effectively address them. Coincident with this publication came increasing reports of severe atypical pneumonia of unknown etiology among persons in southeast Asia. This new disease, designated severe acute respiratory syndrome (SARS), spread globally in a matter of weeks, infecting primarily close contacts of index patients (e.g., household members and healthcare workers caring for index patients) but also resulting in community transmission in some areas. An unprecedented worldwide collaborative effort was undertaken to determine the cause of the illness and implement prevention measures. A previously unrecognized coronavirus was identified as the causative agent, and health officials throughout the world struggled to implement measures to contain its spread, including isolation of suspect SARS cases and quarantine of exposed persons. The emergence of SARS is a timely reminder of the need to expect the unexpected and to ensure strong national and global public health partnerships when preparing for and responding to infectious diseases. Effectively addressing the threat of SARS will require enhanced global infectious disease surveillance, the development of rapid diagnostics, new therapies, and vaccines, implementation of aggressive evidence-based infection control strategies, and effective communication. Images Fig. 2 Fig. 3 PMID:17060979

  4. Stereotype Threat Reinterpreted as a Regulatory Mismatch

    PubMed Central

    Grimm, Lisa R.; Markman, Arthur B.; Maddox, W. Todd; Baldwin, Grant C.

    2008-01-01

    Research documents performance decrements resulting from the activation of a negative task-relevant stereotype. We combine a number of strands of work to identify causes of stereotype threat in a way that allows us to reverse the effects and improve the performance of individuals with negative task-relevant stereotypes. We draw on prior work suggesting that negative stereotypes induce a prevention focus, and other research suggesting that people exhibit greater flexibility when their regulatory focus matches the reward structure of the task. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks that have an explicit or implicit gains reward structure. We find flexible performance can be induced in individuals who have a negative task-relevant stereotype by using a losses reward structure. We demonstrate the interaction of stereotypes and the reward structure of the task using chronic stereotypes and GRE math problems (Experiment 1), and primed stereotypes and a category learning task (Experiments 2a and 2b). We discuss implications of this research for other work on stereotype threat. PMID:19159133

  5. Impact! - The Threat of Comets and Asteroids

    NASA Astrophysics Data System (ADS)

    Verschuur, Gerrit L.

    1997-12-01

    In Impact , Gerrit L. Verschuur offers an eye-opening look at the catastrophic collisions of comets and asteroids with our planet. Perhaps more important, he paints an unsettling portrait of the possibility of new collisions with earth, exploring potential threats to our planet and describing what scientists are doing right now to prepare for this frightening possibility. Every day something from space hits our planet, Verschuur reveals. In fact, about 10,000 tons of space debris fall to earth every year, mostly in meteoric form. But meteors are not the greatest threat to life on earth, the author points out. The major threats are asteroids and comets. The reader discovers that astronomers have located some 350 NEAs ("Near Earth Asteroids"), objects whose orbits cross the orbit of the earth. Comets, of course, are even more deadly. He discusses Comet Swift-Tuttle--"the most dangerous object in the solar system"--a comet far larger than the one that many scientists believe killed off the dinosaurs, due to pass through earth's orbit in the year 2126. In addition, the author describes the efforts of Spacewatch and other groups to locate NEAs, and evaluates the idea that comet and asteroid impacts have been an underrated factor in the evolution of life on earth. Whether discussing monumental tsunamis or the innumerable comets in the solar system, Impact will enthrall anyone curious about outer space, remarkable natural phenomenon, or the future of the planet earth.

  6. Bot armies as threats to network security

    NASA Astrophysics Data System (ADS)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  7. Mere effort and stereotype threat performance effects.

    PubMed

    Jamieson, Jeremy P; Harkins, Stephen G

    2007-10-01

    Although the fact that stereotype threat impacts performance is well established, the underlying process(es) is(are) not clear. Recently, T. Schmader and M. Johns (2003) argued for a working memory interference account, which proposes that performance suffers because cognitive resources are expended on processing information associated with negative stereotypes. The antisaccade task provides a vehicle to test this account because optimal performance requires working memory resources to inhibit the tendency to look at an irrelevant, peripheral cue (the prepotent response) and to generate volitional saccades to the target. If stereotype threat occupies working memory resources, then the ability to inhibit the prepotent response and to launch volitional saccades will be impaired, and performance will suffer. In contrast, S. Harkins's (2006) mere effort account argues that stereotype threat participants are motivated to perform well, which potentiates the prepotent response, but also leads to efforts to counter this tendency if participants recognize that the response is incorrect, know the correct response, and have the opportunity to make it. Results from 4 experiments support the mere effort but not the working memory interference account. PMID:17892331

  8. Linguistic threat activates the human amygdala

    PubMed Central

    Isenberg, N.; Silbersweig, D.; Engelien, A.; Emmerich, S.; Malavade, K.; Beattie, B.; Leon, A. C.; Stern, E.

    1999-01-01

    Studies in animals demonstrate a crucial role for the amygdala in emotional and social behavior, especially as related to fear and aggression. Whereas lesion and functional-imaging studies in humans indicate the amygdala’s participation in assessing the significance of nonverbal as well as paralinguistic cues, direct evidence for its role in the emotional processing of linguistic cues is lacking. In this study, we use a modified Stroop task along with a high-sensitivity neuroimaging technique to target the neural substrate engaged specifically when processing linguistic threat. Healthy volunteer subjects were instructed to name the color of words of either threat or neutral valence, presented in different color fonts, while neural activity was measured by using H215O positron-emission tomography. Bilateral amygdalar activation was significantly greater during color naming of threat words than during color naming of neutral words. Associated activations were also noted in sensory-evaluative and motor-planning areas of the brain. Thus, our results demonstrate the amygdala’s role in the processing of danger elicited by language. In addition, the results reinforce the amygdala’s role in the modulation of the perception of, and response to, emotionally salient stimuli. The current study further suggests conservation of phylogenetically older mechanisms of emotional evaluation in the context of more recently evolved linguistic function. PMID:10468630

  9. Toddlers’ Duration of Attention towards Putative Threat

    PubMed Central

    Kiel, Elizabeth J.; Buss, Kristin A.

    2010-01-01

    Although individual differences in reactions to novelty in the toddler years have been consistently linked to risk for developing anxious behavior, toddlers’ attention towards a novel, putatively threatening stimulus while in the presence of other enjoyable activities has rarely been examined as a precursor to such risk. The current study examined how attention towards an angry-looking gorilla mask in a room with alternative opportunities for play in 24-month-old toddlers predicted social inhibition when children entered kindergarten. Analyses examined attention to threat above and beyond and in interaction with both proximity to the mask and fear of novelty observed in other situations. Attention to threat interacted with proximity to the mask to predict social inhibition, such that attention to threat most strongly predicted social inhibition when toddlers stayed furthest from the mask. This relation occurred above and beyond the predictive relation between fear of novelty and social inhibition. Results are discussed within the broader literature of anxiety development and attentional processes in young children. PMID:21373365

  10. Asymmetric threat data mining and knowledge discovery

    NASA Astrophysics Data System (ADS)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  11. Stereotype Threat and Feedback Seeking in the Workplace.

    ERIC Educational Resources Information Center

    Roberson, Loriann; Deitch, Elizabeth A.; Brief, Arthur P.; Block, Caryn J.

    2003-01-01

    Among 166 African American managers, those who were the only minority-group member in their workgroup perceived more stereotype threat. Stereotype threat was related to indirect feedback seeking and discounting of supervisors' performance feedback. (Contains 41 references.) (SK)

  12. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  13. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.)...

  14. Zika Threat Calls for Extra Mosquito Protection This Summer

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_159168.html Zika Threat Calls for Extra Mosquito Protection This Summer ... THURSDAY, June 2, 2016 (HealthDay News) -- With the Zika threat growing in the United States, people need ...

  15. 75 FR 60430 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... technology security, combating weapons of mass destruction (WMD), chemical and biological defense, the future... level briefings on WMD threats, the Defense Threat Reduction Agency, and the status of the...

  16. Culture, Threat, and Mental Illness Stigma: Identifying Culture-Specific Threat among Chinese-American Groups

    PubMed Central

    Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G.; Saw, Anne; Wong, Gloria; Phelan, Jo C.

    2014-01-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one’s family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002–2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. PMID:23702210

  17. Space Station crew safety alternatives study. Volume 2: Threat development

    NASA Technical Reports Server (NTRS)

    Raasch, R. F.; Peercy, R. L., Jr.; Rockoff, L. A.

    1985-01-01

    The first 15 years of accumulated space station concepts for initial operational capability (IOC) during the early 1990's were considered. Twenty-five threats to the space station are identified and selected threats addressed as impacting safety criteria, escape and rescue, and human factors safety concerns. Of the 25 threats identified, eight are discussed including strategy options for threat control: fire, biological or toxic contamination, injury/illness, explosion, loss of pressurization, radiation, meteoroid penetration, and debris.

  18. Soil threats in Europe for the RECARE project

    NASA Astrophysics Data System (ADS)

    Stolte, Jannes; Tesfai, Mehretaeb; Oygarden, Lillian

    2015-04-01

    Soil is one of our most important natural resources that provides us with vital goods and services to sustain life. Nevertheless, soils functions are threatened by a wide range of processes and a number of soil threats have been identified in Europe. Although there is a large body of knowledge available on soil threats in Europe, the complexity and functioning of soil systems and their interaction with human activities, climate change, and ecosystem services (ESS), is still not fully understood. An extensive literature review was carried out by a group of experts on soil threats at the European level. In total, around 60 experts from the 17 case study sites of the RECARE project, were involved in the process of reviewing and drafting the report and 11 soil threats were identified. The objective of WP2 of the RECARE project was to provide an improved overview of existing information on soil threats and degradation at the European scale. These soil threats are soil erosion by water, soil erosion by wind, decline of organic matter (OM) in peat, decline of OM in minerals soils, soil compaction, soil sealing, soil contamination, soil salinization, desertification, flooding and landslides and decline in soil biodiversity. The final report of WP2 provides a comprehensive thematic information on the major soil threats of Europe with due attention given to the Driving force-Pressure-State-Impact-Response to soil threats. Interrelationships between soil threats, between soil threats and soil functions and between soil threats and Ecosystems Services are made, and will be presented. A synergy between the soil threats is made based on the given information in each of the chapters, where we tried to identify the interactions between the threats. We tried to identify in what way one threat acts as a threat for another threat. Also, the link between soil degradation and Ecosystem Services are identified. Again, based on the information given in each chapter, the major climate

  19. SEMINAR PUBLICATION: ORGANIC AIR EMISSIONS FROM WASTE MANAGEMENT FACILITIES

    EPA Science Inventory

    The organic chemicals contained in wastes processed during waste management operations can volatilize into the atmosphere and cause toxic or carcinogenic effects or contribute to ozone formation. Because air emissions from waste management operations pose a threat to human health...

  20. Gender, Stereotype Threat, and Anxiety: Psychophysiological and Cognitive Evidence

    ERIC Educational Resources Information Center

    Osborne, Jason W.

    2006-01-01

    Introduction: Claude Steele's stereotype threat hypothesis proposed that negative group stereotypes increase individual anxiety levels, hurting performance. However, the role of anxiety in stereotype threat has not been fully explored. This study examined the hypothesis that experimental manipulation of stereotype threat would influence real-time…

  1. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as a... position held or desired without posing a direct threat to the health or safety of the individual or...

  2. 75 FR 30002 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-28

    ... Office of the Secretary Federal Advisory Committee; Threat Reduction Advisory Committee AGENCY... the charter for the Threat Reduction Advisory Committee (hereafter referred to as the Committee). FOR... Acquisition, Technology and Logistics and the Director of the Defense Threat Reduction Agency on the...

  3. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as a... position held or desired without posing a direct threat to the health or safety of the individual or...

  4. Attention Training and the Threat Bias: An ERP Study

    ERIC Educational Resources Information Center

    O'Toole, Laura; Dennis, Tracy A.

    2012-01-01

    Anxiety is characterized by exaggerated attention to threat. Several studies suggest that this threat bias plays a causal role in the development and maintenance of anxiety disorders. Furthermore, although the threat bias can be reduced in anxious individuals and induced in non-anxious individual, the attentional mechanisms underlying these…

  5. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    ERIC Educational Resources Information Center

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  6. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  7. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  8. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  9. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  10. 49 CFR 1540.205 - Procedures for security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... TSA determines that the applicant meets the security threat assessment standards in 49 CFR 1540.201(c... the applicant does not meet the security threat assessment standards in 49 CFR 1540.201(c). The... standards in 49 CFR 1540.201(c) and may pose an imminent threat to transportation or national security,...

  11. Student Reports of Peer Threats of Violence: Prevalence and Outcomes

    ERIC Educational Resources Information Center

    Nekvasil, Erin K.; Cornell, Dewey G.

    2012-01-01

    Authorities in education and law enforcement have recommended that schools use a threat-assessment approach to prevent violence, but there is relatively little research on characteristics and outcomes of threats among students. The current study examined student reports of threat experiences in a sample of 3,756 high school students. Approximately…

  12. Death Threat and Death Concerns in the College Student.

    ERIC Educational Resources Information Center

    Tobacyk, Jerome; Eckstein, Daniel

    1980-01-01

    Thanatology students reported significantly lesser death threat and significantly greater death concerns. Trait anxiety was found to be a significant predictor of change in death threat in the Thanatology Group, with lesser anxiety associated with greater decline in death threat. (Author)

  13. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  14. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo: Security threat assessments for cargo personnel in the United States. 1546.213 Section 1546.213 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR...

  15. Legal Aspects of Asbestos Abatement. Responses to the Threat of Asbestos-Containing Materials in School Buildings.

    ERIC Educational Resources Information Center

    Olson, Kristin

    Exposure to asbestos in the air poses serious health threats, particularly to children. The use of asbestos in schools after World War II may have exposed millions of persons before regulations controlling asbestos use began appearing in the 1970s. Federal efforts to reduce exposure to asbestos have included passage of the Asbestos School Hazard…

  16. Assessing the threat of firearms: new threat formula, resources, and ontological linking algorithms

    NASA Astrophysics Data System (ADS)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay Metodiev

    2014-06-01

    The present work is part of an ongoing larger project.2, 3, 11, 12 The goal of this project is to develop a system capable of automatic threat assessment for instances of firearms use in public places. The main components of the system are: an ontology of firearms;1, 14 algorithms to create the visual footprint of the firearms,1, 14 to compare visual information,2, 3, 11, 12 to facilitate search in the ontology, and to generate the links between the conceptual and visual ontologies; as well as a formula to calculate the threat of individual firearms, firearms classes, and ammunition types in different environments. One part of the dual-level ontology for the properties of the firearms captures key visual features used to identify their type or class in images, while the other part captures their threat-relevant conceptual properties. The visual ontology is the result of image segmentation and matching methods, while the conceptual ontology is designed using knowledge-engineering principles and populated semi-automatically from Web resources. The focus of the present paper is two-fold. On the one hand, we will report on an update of the initial threat formula, based on the substantially increased population of the firearm ontology, including ammunition types and comparisons to actual incidents, and allowing for an overall more accurate assessment. On the other hand, the linking algorithms between the visual and conceptual ontologies are elaborated for faster transfer of information leading to an improvement in accuracy of the threat assessment.

  17. Application of the adaptive subspace detector to Raman spectra for biological threat detection

    NASA Astrophysics Data System (ADS)

    Russell, Thomas A.; Borchardt, Steven; Anderson, Richard; Treado, Patrick; Neiss, Jason

    2006-10-01

    Effective application of point detectors in the field to monitor the air for biological attack imposes a challenging set of requirements on threat detection algorithms. Raman spectra exhibit features that discriminate between threats and non-threats, and such spectra can be collected quickly, offering a potential solution given the appropriate algorithm. The algorithm must attempt to match to known threat signatures, while suppressing the background clutter in order to produce acceptable Receiver Operating Characteristic (ROC) curves. The radar space-time adaptive processing (STAP) community offers a set of tools appropriate to this problem, and these have recently crossed over into hyperspectral imaging (HSI) applications. The Adaptive Subspace Detector (ASD) is the Generalized Likelihood Ratio Test (GLRT) detector for structured backgrounds (which we expect for Raman background spectra) and mixed pixels, and supports the necessary adaptation to varying background environments. The structured background model reduces the training required for that adaptation, and the number of statistical assumptions required. We applied the ASD to large Raman spectral databases collected by ChemImage, developed spectral libraries of threat signatures and several backgrounds, and tested the algorithm against individual and mixture spectra, including in blind tests. The algorithm was successful in detecting threats, however, in order to maintain the desired false alarm rate, it was necessary to shift the decision threshold so as to give up some detection sensitivity. This was due to excess spread of the detector histograms, apparently related to variability in the signatures not captured by the subspaces, and evidenced by non-Gaussian residuals. We present here performance modeling, test data, algorithm and sensor performance results, and model validation conclusions.

  18. A resolution supporting enhanced maritime security in the Gulf of Guinea and encouraging increased cooperation between the United States and West and Central African countries to fight armed robbery at sea, piracy, and other maritime threats.

    THOMAS, 113th Congress

    Sen. Flake, Jeff [R-AZ

    2013-11-06

    01/07/2014 Resolution agreed to in Senate without amendment and with a preamble by Unanimous Consent. (consideration: CR S81-82; text as passed Senate: CR S81-82) (All Actions) Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:

  19. Air Pollution

    MedlinePlus

    Air pollution is a mixture of solid particles and gases in the air. Car emissions, chemicals from factories, dust, ... a gas, is a major part of air pollution in cities. When ozone forms air pollution, it's ...

  20. Air Pollution

    MedlinePlus

    Air pollution is a mixture of solid particles and gases in the air. Car emissions, chemicals from factories, ... Ozone, a gas, is a major part of air pollution in cities. When ozone forms air pollution, it's ...

  1. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    ERIC Educational Resources Information Center

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  2. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    ERIC Educational Resources Information Center

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  3. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    NASA Astrophysics Data System (ADS)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  4. Protection without detection: a threat mitigation technique

    NASA Astrophysics Data System (ADS)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  5. Sustaining earth: Response to the environmental threats

    SciTech Connect

    Angell, D.J.R.; Comer, J.D.; Wilkinson, M.L.N.

    1993-01-01

    This collection of 17 essays has a common theme of examining how politicians, industrialists, scientists, and the public are responding to the recommendations of the 1987 report by World Commission on Environment and Development and to the environmental degradation it highlighted. The book has six sections: background; threats to the environment; individuals, society, and sustainable development; national governments and sustainable development; the international community and sustainable development; conclusions. Insights into the ways in which members of the international political and scientific establishments define and seek to address global environments are best represented.

  6. Lyssaviruses and Bats: Emergence and Zoonotic Threat

    PubMed Central

    Banyard, Ashley C.; Evans, Jennifer S.; Luo, Ting Rong; Fooks, Anthony R.

    2014-01-01

    The continued detection of zoonotic viral infections in bats has led to the microbial fauna of these mammals being studied at a greater level than ever before. Whilst numerous pathogens have been discovered in bat species, infection with lyssaviruses is of particular significance from a zoonotic perspective as, where human infection has been reported, it is invariably fatal. Here we review the detection of lyssaviruses within different bat species and overview what is understood regarding their maintenance and transmission following both experimental and natural infection. We discuss the relevance of these pathogens as zoonotic agents and the threat of newly discovered viruses to human populations. PMID:25093425

  7. The threat of nuclear war: Some responses

    PubMed Central

    Marcattilio, A. J. M.; Nevin, John A.

    1986-01-01

    The possibility of nuclear holocaust threatens the very existence of the world community. Biologists, earth scientists, educators, lawyers, philosophers, physicists, physicians, and social scientists have addressed the problem from their special perspectives, and have had substantial impact on the public. Behavior analysts, however, have not as a whole contributed a great deal to the goal of preventing nuclear catastrophe. We argue that the threat of nuclear war is primarily a behavioral problem, and present an analysis of that problem. In addition, we address the difficulty of implementing behavioral interventions that would contribute to the survival of the World. PMID:22478648

  8. Assessing the global threat from Zika virus.

    PubMed

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled. PMID:27417495

  9. Acoustic and optical multi-sensor threat detection system for border patrol against aerial threats

    NASA Astrophysics Data System (ADS)

    Alsawadi, Motasem S.; Ismail, Ahmad; Al-Azem, Badeea F.; El-Desouki, Munir M.; Alghamdi, Sultan; Alghamdi, Mansour

    2012-10-01

    Saudi Arabia has borders covering over 4,300 km that are shared with seven countries. Such large borders pose many challenges for security and patrol. Thermal imagers are considered the most reliable means of threat detection, however, they are quite costly, which can prevent using them over large areas. This work discusses a multi-sensor acoustic and optical implementation for threat detection as an effort to reduce system cost. The acoustic sensor provides position and direction recognition by using a four microphone setup. The data analysis of field tests will be discussed in this work.

  10. Mitigation Policy Scenario of Space Debris Threat Related with National Security

    NASA Astrophysics Data System (ADS)

    Herdiansyah, Herdis; Frimawaty, Evy; Munir, Ahmad

    2016-02-01

    The development of air space recently entered a new phase, when the space issues correlated with the future of a country. In past time, the space authorization was related with advancing technology by many space mission and various satellite launchings, or it could be said that who ruled technology will rule the space. Therefore, the numerous satellites in the space could be a threat for the countries which are mainly located in the path of the satellite, especially in the equatorial region including Indonesia. This study aims to create a policy scenario in mitigating the threat of space debris. The results showed that although space debris was not threatened national security for now, but the potential and its impact on the future potentially harmful. The threats of orbit circulation for some experts considered as a threat for national security, because its danger potential which caused by space debris could significantly damage the affected areas. However, until now Indonesia has no comprehensive mitigation strategy for space matters although it has been ratified by the United Nations Convention.

  11. In Brief: Threats to species continue

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2009-11-01

    Of 47,677 assessed species, 17,291 are threatened with extinction, according to the latest update of the Red List of Threatened Species issued by the International Union for Conservation of Nature (IUCN) on 3 November. The list indicates that amphibians are the most threatened group of species known to date, with 1895 (nearly 30%) of 6285 amphibians in danger of extinction. Thirty-nine are already extinct or extinct in the wild, 484 are critically endangered, 754 are endangered, and 657 are vulnerable, according to IUCN. Under threat are 21% of mammals, 30% of amphibians, 12% of birds, 28% of reptiles, 37% of freshwater fishes, 70% of plants, and 35% of invertebrates assessed to date. “We have only managed to assess 47,663 species so far; there are many more millions out there which could be under serious threat,” according to IUCN Red List Unit Manager Craig Hilton-Taylor. For more information, visit http://www.iucnredlist.org.

  12. Identifying chemicals that are planetary boundary threats.

    PubMed

    MacLeod, Matthew; Breitholtz, Magnus; Cousins, Ian T; de Wit, Cynthia A; Persson, Linn M; Rudén, Christina; McLachlan, Michael S

    2014-10-01

    Rockström et al. proposed a set of planetary boundaries that delimit a "safe operating space for humanity". Many of the planetary boundaries that have so far been identified are determined by chemical agents. Other chemical pollution-related planetary boundaries likely exist, but are currently unknown. A chemical poses an unknown planetary boundary threat if it simultaneously fulfills three conditions: (1) it has an unknown disruptive effect on a vital Earth system process; (2) the disruptive effect is not discovered until it is a problem at the global scale, and (3) the effect is not readily reversible. In this paper, we outline scenarios in which chemicals could fulfill each of the three conditions, then use the scenarios as the basis to define chemical profiles that fit each scenario. The chemical profiles are defined in terms of the nature of the effect of the chemical and the nature of exposure of the environment to the chemical. Prioritization of chemicals in commerce against some of the profiles appears feasible, but there are considerable uncertainties and scientific challenges that must be addressed. Most challenging is prioritizing chemicals for their potential to have a currently unknown effect on a vital Earth system process. We conclude that the most effective strategy currently available to identify chemicals that are planetary boundary threats is prioritization against profiles defined in terms of environmental exposure combined with monitoring and study of the biogeochemical processes that underlie vital Earth system processes to identify currently unknown disruptive effects. PMID:25181298

  13. Deterring regional threats from nuclear proliferation

    SciTech Connect

    Spector, L.S.

    1992-03-12

    The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

  14. Passive acoustic threat detection in estuarine environments

    NASA Astrophysics Data System (ADS)

    Borowski, Brian; Sutin, Alexander; Roh, Heui-Seol; Bunin, Barry

    2008-04-01

    The Maritime Security Laboratory (MSL) at Stevens Institute of Technology supports research in a range of areas relevant to harbor security, including passive acoustic detection of underwater threats. The difficulties in using passive detection in an urban estuarine environment include intensive and highly irregular ambient noise and the complexity of sound propagation in shallow water. MSL conducted a set of tests in the Hudson River near Manhattan in order to measure the main parameters defining the detection distance of a threat: source level of a scuba diver, transmission loss of acoustic signals, and ambient noise. The source level of the diver was measured by comparing the diver's sound with a reference signal from a calibrated emitter placed on his path. Transmission loss was measured by comparing noise levels of passing ships at various points along their routes, where their distance from the hydrophone was calculated with the help of cameras and custom software. The ambient noise in the Hudson River was recorded under varying environmental conditions and amounts of water traffic. The passive sonar equation was then applied to estimate the range of detection. Estimations were done for a subset of the recorded noise levels, and we demonstrated how variations in the noise level, attenuation, and the diver's source level influence the effective range of detection. Finally, we provided analytic estimates of how an array improves upon the detection distance calculated by a single hydrophone.

  15. Prefrontal control of attention to threat.

    PubMed

    Peers, Polly V; Simons, Jon S; Lawrence, Andrew D

    2013-01-01

    Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g., trait anxiety) and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink (AB) following threat-related targets. Moreover, we demonstrate that activity in dorso-lateral prefrontal cortex (DLPFC), is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience. PMID:23386824

  16. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    ERIC Educational Resources Information Center

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  17. Users Guide for the Anvil Threat Corridor Forecast Tool V1.7.0 for AWIPS

    NASA Technical Reports Server (NTRS)

    Bauman, William H., III

    2007-01-01

    landing facilities at the Kennedy Space Center (KSC) and Cape Canaveral Air Force Station (CCAFS) and beyond. The anvil clouds were generated around 1930 UTC (1430 EDT) by thunderstorm activity over central Florida and transported 90 n mi east-northeastward within 2 hours, as diagnosed by the anvil forecast tool. Phase III, delivered in February 2003, built upon the results of Phase II by enhancing the Anvil Threat Sector Tool with the capability to use national model forecast winds for depiction of potential anvil lengths and orientations over the KSC/CCAFS area with lead times from 3 through 168 hours (7 days). In September 2003, AMU customers requested the capability to use data from the KSC 50 MHz Doppler Radar Wind Profiler (DRWP) in the Anvil Threat Sector Tool and this capability was delivered by the AMU in December 2003. In March 2005, the AMU was tasked to migrate the MIDDS Anvil Threat Sector Tool capabilities onto the Advanced Weather Interactive Processing System (AWIPS) as the Anvil Threat Corridor Forecast Tool.

  18. Recent advances in the development of a novel aerosol sorting and deposition system for bio-threat sensing applications

    NASA Astrophysics Data System (ADS)

    Pletcher, Timothy; McGinn, Joseph; Keller, David; Huston, Alan; Eversole, Jay; Sivaprakasum, Vasanthi

    2007-10-01

    Sarnoff Corporation and the Naval Research Laboratory, through support of the U.S. Department of Homeland Security, are developing an automated, high throughput bio-aerosol physical enrichment system designed for use as part of a biological-threat protection system. The Biological Aerosol-Capture-Enrichment (BioACE) system is a bio-aerosol collection system that combines three unique technologies to create physically enriched aerosol samples that can be subsequently interrogated by any number of bio-threat detection systems for the presence of threat agents. An air-to-air concentrator uses an inertial separation technique to highly concentrate an aerosol sample presented to a dual wavelength ultra-violet laser induced fluorescence (UVLIF) optical trigger used to discriminate potential threat particles from non-threat particles conveyed in a collimated particle stream. This particle classification information is used to trigger an electrostatic deposition mechanism to deposit only those particles determined to be potential bio-threats onto a stainless steel substrate. Non-threat particles are discarded with the exiting airflow. The goal for the most recent development effort has been the integration and optimization of these technologies into a unit capable of producing highly enriched particulate samples from ambient air containing variable background aerosol loading and type. Several key technical and engineering challenges were overcome during the course of this development including a unique solution for compensating particle velocity dispersion within the airflow, development of a real-time signal acquisition and detection algorithm for determining material type on a particle by particle basis at rates greater than 2000 particles per second, and the introduction of a robust method for transferring deposited particulate into a 50ul wet sample suitable for most advanced bio-detection techniques. This paper will briefly describe the overall system architecture and

  19. ['Piracy of kowledge'--the role of a buccaneer-scientist in the knowledge circulation around diseases and drugs in the tropics].

    PubMed

    Snelders, Stephen

    2009-01-01

    Knowledge circulation in the seventeenth and eighteenth centuries was not only stimulated by the mutual interaction of trade and science. In the context of territorial expansion, war, and the activities of privateers and pirates, knowledge of diseases and drugs in the tropics was increased as well. An important part in this process was performed by so-called 'buccaneer-scientists': adventurers with medical and scientific backgrounds and/or interest who operated on the cultural borders in different parts of the hemisphere. The characteristics of this type of contributor to Early Modern knowledge circulation are explored and analyzed in the example of Scottish surgeon and pirate Lionel Wafer (c. 1660 - c. 1705). The buccaneer scientist had to share the passions of other scientists, resulting in accurate and detailed empirical observation; be able to judge the relevance of observations and 'facts'; be part of a context that stimulates these observations; be capable of describing of these observations; and be part of a network of dissemination of observations. His activities should have an important practical and pragmatic component stimulating trade, expansion and even piracy. And he should possess personal characteristics such as perseverance, a healthy constitution, and ruthlessness, to work and survive in a violent and traumatic environment. Wafer is typical for other 'buccaneer-scientists' of this period--not only pirates and privateers, but also physicians and natural explorers operating in other and more 'respectable' areas of the European overseas expansion. PMID:22586761

  20. COAMPS Application to Global and Homeland Security Threat Problems

    SciTech Connect

    Chin, H S; Glascoe, L G

    2004-09-14

    Atmospheric dispersion problems have received more attention with regard to global and homeland security than their conventional roles in air pollution and local hazard assessment in the post 9/11 era. Consequently, there is growing interest to characterize meteorology uncertainty at both low and high altitudes (below and above 30 km, respectively). A 3-D Coupled Ocean Atmosphere Prediction System (COAMPS, developed by Naval Research Laboratory; Hodur, 1997) is used to address LLNL's task. The objective of this report is focused on the effort at the improvement of COAMPS forecast to address the uncertainty issue, and to provide new capability for high-altitude forecast. To assess the atmospheric dispersion behavior in a wider range of meteorological conditions and to expand its vertical scope for the potential threat at high altitudes, several modifications of COAMPS are needed to meet the project goal. These improvements include (1) the long-range forecast capability to show the variability of meteorological conditions at a much larger time scale (say, a year), and (2) the model physics enhancement to provide new capability for high-altitude forecast.

  1. Portable Integrated Wireless Device Threat Assessment to Aircraft Radio Systems

    NASA Technical Reports Server (NTRS)

    Salud, Maria Theresa P.; Williams, Reuben A. (Technical Monitor)

    2004-01-01

    An assessment was conducted on multiple wireless local area network (WLAN) devices using the three wireless standards for spurious radiated emissions to determine their threat to aircraft radio navigation systems. The measurement process, data and analysis are provided for devices tested using IEEE 802.11a, IEEE 802.11b, and Bluetooth as well as data from portable laptops/tablet PCs and PDAs (grouping known as PEDs). A comparison was made between wireless LAN devices and portable electronic devices. Spurious radiated emissions were investigated in the radio frequency bands for the following aircraft systems: Instrument Landing System Localizer and Glideslope, Very High Frequency (VHF) Communication, VHF Omnidirectional Range, Traffic Collision Avoidance System, Air Traffic Control Radar Beacon System, Microwave Landing System and Global Positioning System. Since several of the contiguous navigation systems were grouped under one encompassing measurement frequency band, there were five measurement frequency bands where spurious radiated emissions data were collected for the PEDs and WLAN devices. The report also provides a comparison between emissions data and regulatory emission limit.

  2. MCNPX improvements for threat reduction applications

    SciTech Connect

    Waters, Laurie S; Durkee, Joe W; Elson, Jay S; Esch, Ernst I; Fensin, Michael L; Hendricks, John S; Holloway, Shannon T; James, Michael R; Jason, Andrew; Johns, Russell C; Johnson, M William; Kawano, Toshihiko; Mckinney, Gregg W; Moller, Peter; Pelowitz, Denise B

    2008-01-01

    The DHS Domestic Nuclear Detection Office (DNDO) is funding a multiyear program of improvements for the MCNPX{sup TM} Monte Carlo radiation-transport code. Additional work is underway for the DTRA Active Interrogation programs. Enhancements contained in the current MCNPX 2.6.0 RSICC release will be presented, including stopped-muon physics, delayed neutron and photon generation and automatic generation of source photons. Preliminary benchmarking comparisons with data taken with a PSI muon beam will be discussed. We will also describe current improvements now underway, including Nuclear Resonance Fluorescence, pulsed sources, and others. We will also describe very new work begun on a Threat-Reduction user inferface, designed to simplify the setup of TR-related calculations, and introduce standards into geometry, sources and backgrounds.

  3. Monitoring Technologies for Mitigating Insider Threats

    NASA Astrophysics Data System (ADS)

    Bowen, Brian M.; Salem, Malek Ben; Keromytis, Angelos D.; Stolfo, Salvatore J.

    In this chapter, we propose a design for an insider threat detection system that combines an array of complementary techniques that aims to detect evasive adversaries. We are motivated by real world incidents and our experience with building isolated detectors: such standalone mechanisms are often easily identified and avoided by malefactors. Our work-in-progress combines host-based user-event monitoring sensors with trap-based decoys and remote network detectors to track and correlate insider activity. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. We identify several challenges in scaling up, deploying, and validating our architecture in real environments.

  4. Threat detection system for intersection collision avoidance

    NASA Astrophysics Data System (ADS)

    Jocoy, Edward H.; Pierowicz, John A.

    1998-01-01

    Calspan SRL Corporation is currently developing an on- vehicle threat detection system for intersection collision avoidance (ICA) as part of its ICA program with the National Highway Transportation Safety Administration. Crash scenarios were previously defined and an on-board radar sensor was designed. This paper describes recent efforts that include the development of a simulation of a multitarget tracker and collision avoidance algorithm used to predict system performance in a variety of target configurations in the various ICA crash scenarios. In addition, a current headway radar was mounted on the Calspan Instrumented Vehicle and in-traffic data were recorded for two limited crash scenarios. Warning functions were developed through the simulation and applied to the recorded data.

  5. Bioterrorism as a public health threat.

    PubMed Central

    Henderson, D. A.

    1998-01-01

    The threat of bioterrorism, long ignored and denied, has heightened over the past few years. Recent events in Iraq, Japan, and Russia cast an ominous shadow. Two candidate agents are of special concern--smallpox and anthrax. The magnitude of the problems and the gravity of the scenarios associated with release of these organisms have been vividly portrayed by two epidemics of smallpox in Europe during the 1970s and by an accidental release of aerosolized anthrax from a Russian bioweapons facility in 1979. Efforts in the United States to deal with possible incidents involving bioweapons in the civilian sector have only recently begun and have made only limited progress. Only with substantial additional resources at the federal, state, and local levels can a credible and meaningful response be mounted. For longer-term solutions, the medical community must educate both the public and policy makers about bioterrorism and build a global consensus condemning its use. PMID:9716981

  6. Females that experience threat are better teachers

    PubMed Central

    Kleindorfer, Sonia; Evans, Christine; Colombelli-Négrel, Diane

    2014-01-01

    Superb fairy-wren (Malurus cyaneus) females use an incubation call to teach their embryos a vocal password to solicit parental feeding care after hatching. We previously showed that high call rate by the female was correlated with high call similarity in fairy-wren chicks, but not in cuckoo chicks, and that parent birds more often fed chicks with high call similarity. Hosts should be selected to increase their defence behaviour when the risk of brood parasitism is highest, such as when cuckoos are present in the area. Therefore, we experimentally test whether hosts increase call rate to embryos in the presence of a singing Horsfield's bronze-cuckoo (Chalcites basalis). Female fairy-wrens increased incubation call rate when we experimentally broadcast cuckoo song near the nest. Embryos had higher call similarity when females had higher incubation call rate. We interpret the findings of increased call rate as increased teaching effort in response to a signal of threat. PMID:24806422

  7. Females that experience threat are better teachers.

    PubMed

    Kleindorfer, Sonia; Evans, Christine; Colombelli-Négrel, Diane

    2014-05-01

    Superb fairy-wren (Malurus cyaneus) females use an incubation call to teach their embryos a vocal password to solicit parental feeding care after hatching. We previously showed that high call rate by the female was correlated with high call similarity in fairy-wren chicks, but not in cuckoo chicks, and that parent birds more often fed chicks with high call similarity. Hosts should be selected to increase their defence behaviour when the risk of brood parasitism is highest, such as when cuckoos are present in the area. Therefore, we experimentally test whether hosts increase call rate to embryos in the presence of a singing Horsfield's bronze-cuckoo (Chalcites basalis). Female fairy-wrens increased incubation call rate when we experimentally broadcast cuckoo song near the nest. Embryos had higher call similarity when females had higher incubation call rate. We interpret the findings of increased call rate as increased teaching effort in response to a signal of threat. PMID:24806422

  8. When threats foreign turn domestic: Two ways for distant realistic intergroup threats to carry over into local intolerance.

    PubMed

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2015-09-01

    In times of economic downturn, perceived realistic intergroup threats (e.g., labour competition) often dominate political and media discourse. Although local outgroups (e.g., local immigrants) can be experienced as sources of realistic threats, we propose that such threats can also be perceived to be caused by distant outgroups (e.g., European Union members perceiving Greece to threaten their economies) and that such distant threats can carry over into local intolerance (e.g., increasing intolerance towards local immigrant groups). We predicted and found in two studies that perceived distant realistic threats carried over into local intolerance via two different pathways. First, direct reactions towards the distant outgroup can generalize to culturally similar local outgroups (the group-based association pathway). Secondly, Study 2 indicated that when the distant threat was attributed to stereotypical outgroup traits (e.g., being lazy), distant realistic threats activated local realistic threats, which subsequently influenced local intolerance (the threat-based association pathway). Taken together, our studies indicate that perceived realistic threats foreign can turn domestic, but in two different ways. PMID:25491910

  9. Terror threat perception and its consequences in contemporary Britain.

    PubMed

    Goodwin, Robin; Willson, Michelle; Gaines, Stanley

    2005-11-01

    The terrorist attacks of 9/11, and subsequent terrorist acts around the world, have alerted social psychologists to the need to examine the antecedents and consequences of terrorist threat perception. In these two studies, we examined the predictive power of demographic factors (age, gender, location), individual values and normative influences on threat perception and the consequences of this perception for behavioural change and close relationships. In Study 1 (N = 100), gender, benevolence values and normative influences were all correlates of threat perception, whilst sense of personal threat was correlated with increased contact with friends and family. In Study 2 (N = 240) age, gender, location, and the values of openness to change and hedonism, all predicted threat perception, which, in turn, predicted behavioural change and relationship contact. Such findings point to the important role social psychologists should play in understanding responses to these new terrorist threats. PMID:16248932

  10. An Overview of Non-traditional Nuclear Threats

    SciTech Connect

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  11. Air Abrasion

    MedlinePlus

    ... delivered directly to your desktop! more... What Is Air Abrasion? Article Chapters What Is Air Abrasion? What Happens? The Pros and Cons Will I Feel Anything? Is Air Abrasion for Everyone? print full article print this ...

  12. Stereotype threat in salary negotiations is mediated by reservation salary.

    PubMed

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. PMID:21077905

  13. Stereotype Threat Alters the Subjective Experience of Memory.

    PubMed

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects. PMID:27120561

  14. Out-Group Mating Threat and Disease Threat Increase Implicit Negative Attitudes Toward the Out-Group Among Men

    PubMed Central

    Klavina, Liga; Buunk, Abraham P.; Pollet, Thomas V.

    2011-01-01

    We investigated if perceiving an out-group as a threat to one's mating opportunities enhanced the implicit negative attitudes toward that out-group. In addition, we examined the moderating effect of disease threat on the relationship between an out-group mating threat and implicit negative attitudes toward that out-group. In Experiment 1, an out-group mating threat led to stronger implicit negative out-group attitudes as measured by the Implicit Association Test, but only for men with high chronic perceived vulnerability to disease. No such effects were found among women. In Experiment 2, men in the out-group mating threat condition who were primed with disease prevalence showed significantly stronger implicit negative attitudes toward the out-group than controls. Findings are discussed with reference to the functional approach to prejudice and sex-specific motivational reactions to different out-group threats. PMID:21687447

  15. 19 CFR 122.183 - Denial of access.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) Improper transportation of a hazardous material (49 U.S.C. 46312); (iv) Aircraft piracy in the special...) Conveying false information and threats (49 U.S.C. 46507); (ix) Aircraft piracy outside the special...

  16. 19 CFR 122.183 - Denial of access.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) Improper transportation of a hazardous material (49 U.S.C. 46312); (iv) Aircraft piracy in the special...) Conveying false information and threats (49 U.S.C. 46507); (ix) Aircraft piracy outside the special...

  17. Threats to sandy beach ecosystems: A review

    NASA Astrophysics Data System (ADS)

    Defeo, Omar; McLachlan, Anton; Schoeman, David S.; Schlacher, Thomas A.; Dugan, Jenifer; Jones, Alan; Lastra, Mariano; Scapini, Felicita

    2009-01-01

    We provide a brief synopsis of the unique physical and ecological attributes of sandy beach ecosystems and review the main anthropogenic pressures acting on the world's single largest type of open shoreline. Threats to beaches arise from a range of stressors which span a spectrum of impact scales from localised effects (e.g. trampling) to a truly global reach (e.g. sea-level rise). These pressures act at multiple temporal and spatial scales, translating into ecological impacts that are manifested across several dimensions in time and space so that today almost every beach on every coastline is threatened by human activities. Press disturbances (whatever the impact source involved) are becoming increasingly common, operating on time scales of years to decades. However, long-term data sets that describe either the natural dynamics of beach systems or the human impacts on beaches are scarce and fragmentary. A top priority is to implement long-term field experiments and monitoring programmes that quantify the dynamics of key ecological attributes on sandy beaches. Because of the inertia associated with global climate change and human population growth, no realistic management scenario will alleviate these threats in the short term. The immediate priority is to avoid further development of coastal areas likely to be directly impacted by retreating shorelines. There is also scope for improvement in experimental design to better distinguish natural variability from anthropogenic impacts. Sea-level rise and other effects of global warming are expected to intensify other anthropogenic pressures, and could cause unprecedented ecological impacts. The definition of the relevant scales of analysis, which will vary according to the magnitude of the impact and the organisational level under analysis, and the recognition of a physical-biological coupling at different scales, should be included in approaches to quantify impacts. Zoning strategies and marine reserves, which have not

  18. Cyclone: A close air support aircraft for tomorrow

    NASA Technical Reports Server (NTRS)

    Cox, George; Croulet, Donald; Dunn, James; Graham, Michael; Ip, Phillip; Low, Scott; Vance, Gregg; Volckaert, Eric

    1991-01-01

    To meet the threat of the battlefield of the future, the U.S. ground forces will require reliable air support. To provide this support, future aircrews demand a versatile close air support aircraft capable of delivering ordinance during the day, night, or in adverse weather with pin-point accuracy. The Cyclone aircraft meets these requirements, packing the 'punch' necessary to clear the way for effective ground operations. Possessing anti-armor, missile, and precision bombing capability, the Cyclone will counter the threat into the 21st Century. Here, it is shown that the Cyclone is a realistic, economical answer to the demand for a capable close air support aircraft.

  19. The Practice of Campus-Based Threat Assessment: An Overview

    ERIC Educational Resources Information Center

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  20. Student Threat Assessment in Memphis City Schools: A Descriptive Report

    ERIC Educational Resources Information Center

    Strong, Ken; Cornell, Dewey

    2008-01-01

    Threat assessment has been widely recommended as a violence prevention approach for schools, but there are few reports of its implementation. Memphis City Schools adapted the Virginia threat assessment guidelines (Cornell & Sheras, 2006) for use by a centralized team serving 194 schools and a student population of 118,000. This article describes…

  1. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... the best of my knowledge and belief and is provided in good faith. I understand that a knowing and... threat assessment conducted for the Free and Secure Trade (FAST) program administered by U.S. Customs...

  2. 49 CFR 1540.203 - Security threat assessment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... check conducted by TSA. (2) A security threat assessment conducted under 49 CFR part 1572 for the... belief and is provided in good faith. I understand that a knowing and willful false statement, or an... threat assessment conducted for the Free and Secure Trade (FAST) program administered by U.S. Customs...

  3. An examination of stereotype threat effects on girls' mathematics performance.

    PubMed

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias. PMID:23356523

  4. A Stereotype Threat Account of Boys' Academic Underachievement

    ERIC Educational Resources Information Center

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged…

  5. Investigating Hypervigilance for Social Threat of Lonely Children

    ERIC Educational Resources Information Center

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  6. Threat-Related Attentional Bias in Anxious Youth: A Review

    ERIC Educational Resources Information Center

    Puliafico, Anthony C.; Kendall, Philip C.

    2006-01-01

    The research literature suggests that children and adolescents suffering from anxiety disorders experience cognitive distortions that magnify their perceived level of threat in the environment. Of these distortions, an attentional bias toward threat-related information has received the most theoretical and empirical consideration. A large volume…

  7. Threat Level High (School): Curriculum Reform with Violence in Mind

    ERIC Educational Resources Information Center

    Hawkes, T. Elijah; Twemlow, Stuart W.

    2015-01-01

    When school communities are troubled by violence, or threats of violence, at the hands of young people, educators have an opportunity to learn about aggression and adolescent identity development. A disturbing threat incident provides the point of departure for this principal's reflection on how high school curriculum can better meet the identity…

  8. Research in Review. Children Living with the Nuclear Threat.

    ERIC Educational Resources Information Center

    Reifel, Stuart

    1984-01-01

    Reviews the literature on children and the threat of nuclear war, focusing on four areas: awareness of nuclear weapons, fear of the bomb, influences on personality, and denial of the threat. The research is briefly critiqued, and implications for early childhood are drawn. (RH)

  9. A Developmental Perspective on the Virginia Student Threat Assessment Guidelines

    ERIC Educational Resources Information Center

    Cornell, Dewey G.

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed to help multidisciplinary school-based teams use a decision tree to evaluate student threats and take appropriate preventive action. A main goal of this approach is to allow school-based teams to recognize and respond to the developmental complexities of children and adolescents…

  10. Creating Safe Learning Zones: Invisible Threats, Visible Actions.

    ERIC Educational Resources Information Center

    2002

    This report is a follow-up to the first publication of the Child Proofing Our Communities Campaign, titled "Poisoned Schools: Invisible Threats, Visible Actions." The previous report looked at the problems of public schools built on contaminated land years ago, the trend of proposing new schools on contaminated land, and the threat of toxic…

  11. Bio-threat preparedness: Need for a paradigm shift

    PubMed Central

    Jindal, A.K.; Roy, Kaushik

    2014-01-01

    India of late has been vulnerable to Chemical, Biological, Radiological and Nuclear (CBRN) threat, on account of its unique geographic position. Biological threat is an imminent threat in the hands of a terrorist. The public health system of our country is overburdened due to its present role and bio-attack response is not a priority area. This paper suggests that as the prime focus is on the CR and N threats in the integrated CBRN preparedness strategy and that specialized and technical forces are needed to deal with a bio-threat; hence there is a need for a paradigm shift in policy. The emerging field of bio-threat needs to be delinked from the joint family of ‘CBRN’, with consequent structural and functional changes. A separate specialized cadre needs to be formed for dealing with bio-threat, created from the pool of doctors and non-medical scientists from the AFMS and the DRDO. Structural changes are needed in the organization, to bring in the resources of NCDC, New Delhi for enhanced disease surveillance capacity and creation of a bio-threat mitigation node in the AFMC, Pune. PMID:24843207

  12. Resistance in Supervision: A Response to Perceived Threat.

    ERIC Educational Resources Information Center

    Liddle, Becky J.

    1986-01-01

    Discusses supervisee resistance as a defensive response to perceived threat. Coping strategies which interfere with the learning process are seen as resistance. Enumerates various forms of resistant behavior; explores possible sources of threat that may arouse these behaviors, and proposes a step-by-step model for dealing with resistance in…

  13. Protected areas in tropical Africa: assessing threats and conservation activities.

    PubMed

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  14. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    PubMed Central

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  15. Soviet military power: an assessment of the threat

    SciTech Connect

    Not Available

    1988-01-01

    Contents include: the nature of the Soviet threat--Soviet national-security policies; Soviet foreign policy under Gorbachev; military resources allocation; Soviet strategic programs and space forces; Soviet conventional forces; an assessment of the threat--the strategic balance; regional and functional balances; research and development: the technological competition; collective security: our risks and responsibilities.

  16. 49 CFR 1572.5 - Standards for security threat assessments.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Standards for security threat assessments. 1572.5 Section 1572.5 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT...

  17. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Fees for security threat assessment. 1540.209 Section 1540.209 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Security Threat Assessments...

  18. 49 CFR 1572.5 - Standards for security threat assessments.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Standards for security threat assessments. 1572.5 Section 1572.5 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT...

  19. Does Manipulating Stereotype Threat Condition Change Performance Goal State

    ERIC Educational Resources Information Center

    Simmons, Cecil Max

    2010-01-01

    This study tested whether the Stereotype Threat effect is mediated by achievement goals, in particular performance-avoidance goals. Threat level was altered before a difficult math test to observe how the endorsement by females of various achievement goal dimensions was affected. 222 people (96 females) in a pre-calculus class at a Mid-Western…

  20. 49 CFR 1540.209 - Fees for security threat assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Fees for security threat assessment. 1540.209 Section 1540.209 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES Security Threat Assessments...

  1. Is Academic Freedom a Threat to Teaching Introductory Science?

    ERIC Educational Resources Information Center

    French, Donald P.

    2005-01-01

    Graves (2005) suggested that academic freedom might impede efforts to improve institutional performance and achieve the goals set for learning outcomes, cost efficiency, and preparing students for the workplace. The author's initial response to threats to academic freedom and calls for efficiency is to bristle, because he views these as threats to…

  2. Western threat perceptions: Implications for NATO nuclear planning

    SciTech Connect

    Thoemmes, E.H.

    1988-01-01

    The relationship between NATO's perception of the Soviet threat and its military strategy and nuclear planning are examined. In particular, two mutually interactive relationships are assessed: (1) the extent to which NATO strategy and nuclear planning have been shaped by the objective Soviet threat, as opposed to subjective and internal factors; and (2) the extent to which NATO's perception and definition of that threat has been determined or influenced by Western preferences and constraints, i.e, by what NATO can or is willing to do in response. The Soviet threat per se is not examined; the threat is evaluated only in the context of NATO perceptions and planning. Nevertheless, since the nature of the Soviet threat has long been the subject of great debate, a variety of contending interpretations are assessed. This dissertation empirically evaluates a set of propositions derived from the historical record. Part One provides the historical context, reviewing chronologically the emergence of NATO's strategy, assumptions for war, and perceptions of the Soviet threat. Part Two focuses on the current NATO planning environment, Western perceptions, and contending interpretations of the Soviet threat.

  3. Lack of Stereotype Threat at a Liberal Arts College

    ERIC Educational Resources Information Center

    Rivardo, Mark G.; Rhodes, Michael E.; Klein, Brandi

    2008-01-01

    Stereotype threat has been demonstrated to reduce the performance of stereotyped individuals in the threatened domain (Steele & Aronson, 1995). This study attempted to replicate the finding that stereotype threat instruction can erase the performance deficit women experience in math performance (Johns, Schmader, & Martens, 2005) and to further…

  4. Superior Detection of Threat-Relevant Stimuli in Infancy

    ERIC Educational Resources Information Center

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  5. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense... Public Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT... REGARDING INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense....

  6. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  7. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  8. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  9. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor...

  10. 41 CFR 60-741.22 - Direct threat defense.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 1 2011-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor...

  11. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense... Public Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT... MEDAL VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  12. 41 CFR 60-250.22 - Direct threat defense.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 1 2013-07-01 2013-07-01 false Direct threat defense... Public Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT... PROTECTED VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  13. 41 CFR 60-300.22 - Direct threat defense.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 1 2012-07-01 2009-07-01 true Direct threat defense. 60... Contracts OFFICE OF FEDERAL CONTRACT COMPLIANCE PROGRAMS, EQUAL EMPLOYMENT OPPORTUNITY, DEPARTMENT OF LABOR... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  14. An Integrated Process Model of Stereotype Threat Effects on Performance

    ERIC Educational Resources Information Center

    Schmader, Toni; Johns, Michael; Forbes, Chad

    2008-01-01

    Research showing that activation of negative stereotypes can impair the performance of stigmatized individuals on a wide variety of tasks has proliferated. However, a complete understanding of the processes underlying these stereotype threat effects on behavior is still lacking. The authors examine stereotype threat in the context of research on…

  15. Countering GPS jamming and EW threat

    NASA Astrophysics Data System (ADS)

    Pereira, Carlos M.; Rastegar, J.; McLain, Clifford E.; Alanson, T.; McMullan, Charles; Nguyen, H.-L.

    2007-09-01

    Efforts at the U.S. Army Research, Development and Engineering Center (ARDEC) at Picatinny, New Jersey are focused on developing methods to counter GPS jamming and electronic warfare (EW) threat by eliminating GPS dependency entirely. In addition, the need for munitions cost reduction requires alternatives to expensive high-grade inertia components. Efforts at ARDEC include investigations of novel methods for onboard measurement of munitions full position and angular orientation independent of GPS signals or high-grade inertia components. Currently, two types of direct angular measurement sensors are being investigated. A first sensor, Radio Frequency Polarized Sensor (RFPS), uses an electromagnetic field as a reference. A second sensor is based on magnetometers, using the Earth magnetic field for orientation measurement. Magnetometers, however, can only provide two independent orientation measurements. The RFPS may also be used to make full object position and angular orientation measurement relative to a reference coordinate system, which may be moving or stationary. The potential applications of novel RFPS sensors is in providing highly effective inexpensive replacement for GPS, which could be used in a "Layered Navigation" scheme employing alternate referencing methods and reduce the current dependency on GPS as a primary reference for guided gun-fired munitions. Other potential applications of RFPSs is in UAVs, UGVs, and robotic platforms.

  16. Integrated optic chip for laser threat identification

    NASA Astrophysics Data System (ADS)

    McAulay, Alastair D.

    2010-04-01

    In this conference last year, we proposed free-space gratings, Fizeau interferometers and wavefront estimation for detecting the different lasers deployed in the battlefield for range finding, target designation, communications, dazzle, location of targets, munitions guidance, and destruction. Since last year, advanced laser weapons of the electron cyclotron type, are in development, such as the free-electron laser, that are tunable and can, unlike conventional bound-electron state lasers, be used at any wavelength from microwaves to soft X-rays. We list the characteristics of the nine dominant laser weapons because we assume that the free-electron lasers will initially use one of the current threat wavelengths because of availability of components and instrumentation. In this paper we replace the free-space grating with a higher performing array waveguide grating integrated optic chip, similar to that used in telecommunications, because integrated circuits are more robust and less expensive. It consists of a star coupler that fans out amongst waveguides of different length followed by a star coupler that focuses different wavelengths to different outputs in order to separate them. Design equations are derived to cover a range of frequencies at specific frequency spacing relevant to this application.

  17. Superluminous supernovae: no threat from eta Carinae.

    PubMed

    Thomas, Brian C; Melott, Adrian L; Fields, Brian D; Anthony-Twarog, Barbara J

    2008-02-01

    Recently, Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of approximately 10(44) Joules. It was proposed that the progenitor may have been a massive evolved star similar to eta Carinae, which resides in our own Galaxy at a distance of about 2.3 kpc. eta Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given that its rotation axis is unlikely to produce a gamma-ray burst oriented toward Earth, eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We have found that, given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over approximately 10(4) y and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae-e-ndocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous" for other reasons. However, due to reddening and extinction by the interstellar medium, eta Carinae is unlikely to trigger such effects to any significant degree. PMID:18199005

  18. Gonococcal endocarditis: an ever-present threat

    PubMed Central

    Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society’s poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient’s clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  19. Gonococcal endocarditis: an ever-present threat.

    PubMed

    de Campos, Fernando Peixoto Ferraz; Kawabata, Vitor Sérgio; Bittencourt, Márcio Sommer; Lovisolo, Silvana Maria; Felipe-Silva, Aloísio; de Lemos, Ana Paula Silva

    2016-01-01

    The incidence of severe complications of the Neisseria gonorrhoeae infection has presented variations over recent decades since the advent of penicillin. Gonococcal endocarditis (GE) still remains an ever-present threat afflicting the society's poor and sexually active young population. This entity frequently requires surgical intervention and usually exhibits a poor outcome. The interval between the onset of symptoms and the diagnosis does not usually exceed 4 weeks. One of the characteristics of GE is a proclivity for aortic valve involvement with large vegetation and valve ring abscess formation. The authors report the case of a young man with a 2-week history of fever, malaise, weakness, and progressive heart failure symptoms, who had no previous history of genital complaints or cardiopathy. The physical examination was consistent with acute aortic insufficiency, which was most probably of an infectious origin. The echocardiogram showed thickened aortic cusps and valve insufficiency. After hospital admission, the patient's clinical status worsened rapidly and he died on the second day. The autopsy findings disclosed aortic valve destruction with vegetation and a ring abscess besides signs of septic shock, such as diffuse alveolar damage, acute tubular necrosis, and zone 3 hepatocellular necrosis. The blood culture isolated N. gonorrhoeae resistant to penicillin and ciprofloxacin. The authors call attention to the pathogen of this particular infectious endocarditis, and the need for early diagnosis and evaluation by a cardiac surgery team. PMID:27547739

  20. Superluminous Supernovae: No Threat from Eta Carinae

    NASA Astrophysics Data System (ADS)

    Thomas, Brian; Melott, A. L.; Fields, B. D.; Anthony-Twarog, B. J.

    2008-05-01

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of 1044 Joules. It was proposed that the progenitor may have been a massive evolved star similar to η Carinae, which resides in our own galaxy at a distance of about 2.3 kpc. η Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma-Ray Burst oriented toward the Earth, η Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over 104 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae, endocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous” for other reasons. However, due to reddening and extinction by the interstellar medium, η Carinae is unlikely to trigger such effects to any significant degree.

  1. Space Shuttle MMOD Threat Mitigation Techniques

    NASA Technical Reports Server (NTRS)

    Hyde, J. L.; Christiansen, E. L.; Lear, D. M.; Kerr, J. H.

    2008-01-01

    Prior to each shuttle mission, threat assessments are performed to determine the risk of critical penetration, payload bay door radiator tube leak and crew module window replacement from Micrometeoroid and Orbital Debris (MMOD). Mission parameters, such as vehicle attitude, exposure time and altitude are used as inputs for the analysis. Ballistic limit equations, based on hypervelocity impact testing of shuttle materials are used to estimate the critical particle diameters of the outer surfaces of the vehicle. The assessments are performed using the BUMPER computer code at the NASA/JSC Hypervelocity Impact Technology Facility (HITF). The most critical involves the calculation of Loss of Crew and Vehicle (LOCV) risk. An overview of significant MMOD impacts on the Payload Bay Door radiators, wing leading edge reinforced carbon-carbon (RCC) panels and crew module windows will be presented, along with a discussion of the techniques NASA has implemented to reduce the risk from MMOD impacts. This paper will describe on-orbit inspection of the RCC regions and the methods used discern hypervelocity impact damage. Impact damage contingency plans and on-orbit repair techniques will also be discussed. The wing leading edge impact detection system (WLEIDS) and it s role in the reduction of on-orbit risk reduction will be presented. Finally, an analysis of alternative shuttle flight attitudes on MMOD risk will be demonstrated.

  2. Space Shuttle MMOD Threat Mitigation Techniques

    NASA Technical Reports Server (NTRS)

    Hyde, Justin L.; Christiansen, Eric L.; Kerr, James H.

    2007-01-01

    Prior to each shuttle mission, threat assessments are performed to determine the risk of critical penetration, payload bay door radiator tube leak and crew module window replacement from Micrometeoroid and Orbital Debris (MMOD). Mission parameters, such as vehicle attitude, exposure time and altitude are used as inputs for the analysis. Ballistic limit equations, based on hypervelocity impact testing of shuttle materials are used to estimate the critical particle diameters of the outer surfaces of the vehicle. The assessments are performed using the BUMPER computer code at the NASA/JSC Hypervelocity Impact Technology Facility (HITF). The most critical involves the calculation of Loss of Crew and Vehicle (LOCV) risk. In recent years, NASA has implemented several techniques to reduce the risk to the Shuttle from MMOD impacts. This paper will describe on-orbit inspection of the reinforced carbon-carbon (RCC) regions and the methods used discern hypervelocity impact damage. Impact damage contingency plans and on-orbit repair techniques will also be discussed. The wing leading edge impact detection system (WLEIDS) and it's role in the reduction of on-orbit risk reduction will be presented. Finally, an analysis of the effectivity of alternative shuttle flight attitudes on MMOD risk will be demonstrated.

  3. [Chikungunya fever - A new global threat].

    PubMed

    Montero, Antonio

    2015-08-01

    The recent onset of epidemics caused by viruses such as Ebola, Marburg, Nipah, Lassa, coronavirus, West-Nile encephalitis, Saint Louis encephalitis, human immunodeficiency virus, dengue, yellow fever and Venezuelan hemorrhagic fever alerts about the risk these agents represent for the global health. Chikungunya virus represents a new threat. Surged from remote African regions, this virus has become endemic in the Indic ocean basin, the Indian subcontinent and the southeast of Asia, causing serious epidemics in Africa, Indic Ocean Islands, Asia and Europe. Due to their epidemiological and biological features and the global presence of their vectors, chikungunya represents a serious menace and could become endemic in the Americas. Although chikungunya infection has a low mortality rate, its high attack ratio may collapse the health system during epidemics affecting a sensitive population. In this paper, we review the clinical and epidemiological features of chikungunya fever as well as the risk of its introduction into the Americas. We remark the importance of the epidemiological control and mosquitoes fighting in order to prevent this disease from being introduced into the Americas. PMID:25087211

  4. The concept of leakage in threat assessment.

    PubMed

    Meloy, J Reid; O'Toole, Mary Ellen

    2011-01-01

    Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings. PMID:21710573

  5. Personality and defensive reactions: fear, trait anxiety, and threat magnification.

    PubMed

    Perkins, Adam M; Cooper, Andrew; Abdelall, Maura; Smillie, Luke D; Corr, Philip J

    2010-06-01

    The revised Reinforcement Sensitivity Theory (rRST) of personality (Gray & McNaughton, 2000) maintains that trait individual differences in the operation of defensive systems relate to facets of human personality, most notably anxiety and fear. We investigated this theory in 2 separate studies (total N=270) using a threat scenario research strategy (Blanchard, Hynd, Minke, Minemoto, & Blanchard, 2001). Consistent with rRST, results showed that individuals with high fear questionnaire scores tended to select defensive responses entailing orientation away from threat (e.g., run away) and that fear-prone individuals also tended to perceive threats as magnified. The extent of this threat magnification mediated the positive association observed between fear and orientation away from threat. Overall, results suggest that interindividual variance in defensive reactions is associated with a variety of existing personality constructs but that further research is required to determine the precise relationship between personality and defensive reactions. PMID:20573136

  6. Instantaneous threat escape and differentiated refuge demand among zooplankton taxa.

    PubMed

    Hansson, Lars-Anders; Bianco, Giuseppe; Ekvall, Mikael; Heuschele, Jan; Hylander, Samuel; Yang, Xi

    2016-02-01

    Most animals, including aquatic crustacean zooplankton, perform strong avoidance movements when exposed to a threat, such as ultraviolet radiation (UVR). We here show that the genera Daphnia and Bosmina instantly adjust their vertical position in the water in accordance with the present UVR threat, i.e., seek refuge in deeper waters, whereas other taxa show less response to the threat. Moreover, Daphnia repeatedly respond to UVR pulses, suggesting that they spend more energy on movement than more stationary taxa, for example, during days with fluctuating cloud cover, illustrating nonlethal effects in avoiding UVR threat. Accordingly, we also show that the taxa with the most contrasting behavioral responses differ considerably in photoprotection, suggesting different morphological and behavioral strategies in handling the UVR threat. In a broader context, our studies on individual and taxa specific responses to UVR provide insights into observed spatial and temporal distribution in natural ecosystems. PMID:27145603

  7. Unhealthy Interactions: The Role of Stereotype Threat in Health Disparities

    PubMed Central

    Burgess, Diana; Phelan, Sean M.; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors. PMID:23153125

  8. Perceived control qualifies the effects of threat on prejudice.

    PubMed

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. PMID:24006898

  9. Identifying key conservation threats to Alpine birds through expert knowledge.

    PubMed

    Chamberlain, Dan E; Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  10. Identifying key conservation threats to Alpine birds through expert knowledge

    PubMed Central

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  11. Coupling measurement and lightning threat assessment report for Pantex Cell 12-44-1

    SciTech Connect

    Anderson, R; Ong, M.

    1998-09-01

    This report is the first of a series that will quantify the lightning threat to the Pantex Plant where high-risk operations occur. More information can be found in the report written by the Lightning Protection Team [1] and Sandia National Laboratory documents. Low-power RF coupling measurements were completed on Cell 12-44-1 in May 1998. These measurements quantify the voltage and current levels that could leak into the cell from possible lightning strike points. Cell 1 is representative of the most leaky class of cells at Pantex because the floor was not intentionally electrically connected to the walls. From the measurement data, linear models were developed. These transfer functions allow us to calculate the effect in the cell from the much higher power lightning threat. Two types of coupling paths were characterized: (1) external ventilation stack to cell interior and (2) cell ceiling to other cell elements. For the maximum lightning threat [2], an estimate of the maximum cell-to-floor voltage is 150 kV. The extrapolated voltage levels at normal working heights are lower. The potential between the air duct and the electro-static ground is estimated to be 4 kV. A secondary goal was to compare results with Sandia as a quality control check. While the estimated maximum ceiling-to-floor voltages are similar, the comparison was limited by high-frequency resonances on the drive wire.

  12. Coupling measurement and lightning threat assessment report for Pantex Cell 12-44-1

    SciTech Connect

    Ong, Mike; Anderson, Robert

    1998-09-01

    This report is the first of a series that will quantify the lightning threat to the Pantex Plant where high-risk operations occur. More information can be found in the report written by the Lightning Protection Team [1] and Sandia National Laboratory documents. Low-power RF coupling measurements were completed on Cell 12-44-1 in May 1998. These measurements quantify the voltage and current levels that could leak into the cell from possible lightning strike points. Cell 1 is representative of the most "leaky" class of cells at Pantex because the floor was not intentionally electrically connected to the walls. From the measurement data, linear models were developed. These transfer functions allow us to calculate the effect in the cell from the much higher power lightning threat. Two types of coupling paths were characterized: (1) external ventilation stack to cell interior and (2) cell ceiling to other cell elements. For the maximum lightning threat [2], an estimate of the maximum cell-to-floor voltage is 150 kV. The extrapolated voltage levels at normal working heights are lower. The potential between the air duct and the electro-static ground is estimated to be 4 kV. A secondary goal was to compare results with Sandia as a quality control check. While the estimated maximum ceiling-to-floor voltages are similar, the comparison was limited by high-frequency resonances on the drive wire.

  13. Babesiosis and heartwater: threats without boundaries.

    PubMed

    Wagner, G Gale; Holman, Patricia; Waghela, Surya

    2002-11-01

    Suppose one of your clients from southern Florida starts talking about cattle egrets while you are vaccinating her cat. It seems she found a nearly dead egret near the cattle pen a few days ago, picked it up, and noticed a number of what looked like small ticks on the legs. Or, suppose you are called out to a small dairy in central Texas to look at some cows that are feverish and anemic. The first animal you examine has a few brown ticks attached just under the tail. Finally, perhaps you are looking at a lame tortoise for a reptile fancier, a new client, and find a large, colorful tick on a hind leg, well up under the shell. Ring any bells? Egrets are great hosts for the immature stages of Amblyomma ticks and have been captured and marked in the eastern Caribbean, then recaptured in the Florida Keys. Those cattle ticks in Texas might be acaricide-resistant Boophilus ticks that originated in Mexico. The Amblyomma tick on the tortoise could well have "hitch-hiked" all the way from South Africa. By now you remember that both Amblyomma and Boophilus ticks are efficient vectors of two tickborne diseases in this hemisphere, heartwater (in the case of Amblyomma) and babesiosis (transmitted by Boophilus ticks). Both of these diseases are exotic to the United States, and because our livestock are considered to be totally susceptible, an introduced infection could result in high initial death losses (approximately 70%); thus, both the ticks and the diseases pose immediate threats to the health and economic security of United States animal industries. Most importantly, you, whether as a small animal or large animal practitioner, are the first line of defense against such exotic diseases and their vectors. PMID:12442575

  14. Recognizing the real threat of biological terror.

    PubMed Central

    Wenzel, Richard P.

    2002-01-01

    Weapons of mass destruction can be used to harm and terrorize populations. Such weapons include those with chemical, nuclear or biological properties. Obviously computer viruses can add additional barriers to a quick response. The most effective, least costly and greatest threats are biologicals. Biological terror is not new, and biological weapons have been used for centuries. However, as a result of modern technology, the risks are greater now and the outcomes more terrible. Today they include live pathogens, various toxins, and theoretically "bioregulators"--biochemicals affecting cell signaling. Altered cell signaling could be used to induce apoptosis-cell death, or a heightened outpouring of cytokines mimicking overwhelming sepsis, or even an intracellular, biochemical "strike" causing cellular paralysis. Biological weaponeers now have the frightening ability to alter the genetic makeup of pathogens, rendering them resistant not only to available antibiotic therapy but also to currently effective vaccines. In dark corners of some fringe groups, bioweaponeers are searching for the capability of designing pathogens that target specific races, by virtue of discriminating ligands (1). The resulting morbidity and mortality from use of any biological weapons will be accompanied by chaos, governmental and social instability, panic, an extraordinary utilization of available resources, and an ongoing epidemic of sleepless nights (2,3). Herein I will review some of the issues and some of the currently available biological weapons. The major goal is to highlight the clinical presentations of patients with infections that could be used as biological weapons. Images Fig. 1 Fig. 2 Fig. 3 Fig. 4 PMID:12053717

  15. Chemical-Sensing Cables Detect Potential Threats

    NASA Technical Reports Server (NTRS)

    2007-01-01

    Intelligent Optical Systems Inc. (IOS) completed Phase I and II Small Business Innovation Research (SBIR) contracts with NASA's Langley Research Center to develop moisture- and pH-sensitive sensors to detect corrosion or pre-corrosive conditions, warning of potentially dangerous conditions before significant structural damage occurs. This new type of sensor uses a specially manufactured optical fiber whose entire length is chemically sensitive, changing color in response to contact with its target, and demonstrated to detect potentially corrosive moisture incursions to within 2 cm. After completing the work with NASA, the company received a Defense Advanced Research Projects Agency (DARPA) Phase III SBIR to develop the sensors further for detecting chemical warfare agents, for which they proved just as successful. The company then worked with the U.S. Department of Defense (DoD) to fine tune the sensors for detecting potential threats, such as toxic industrial compounds and nerve agents. In addition to the work with government agencies, Intelligent Optical Systems has sold the chemically sensitive fiber optic cables to major automotive and aerospace companies, who are finding a variety of uses for the devices. Marketed under the brand name Distributed Intrinsic Chemical Agent Sensing and Transmission (DICAST), these unique continuous-cable fiber optic chemical sensors can serve in a variety of applications: Corrosive-condition monitoring, aiding experimentation with nontraditional power sources, as an economical means of detecting chemical release in large facilities, as an inexpensive "alarm" systems to alert the user to a change in the chemical environment anywhere along the cable, or in distance-resolved optical time domain reflectometry systems to provide detailed profiles of chemical concentration versus length.

  16. Stereotype threat can both enhance and impair older adults' memory.

    PubMed

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses. PMID:24150969

  17. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    PubMed Central

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2013-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat. PMID:22746674

  18. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  19. Manipulating cardiovascular indices of challenge and threat using resource appraisals.

    PubMed

    Turner, Martin J; Jones, Marc V; Sheffield, David; Barker, Jamie B; Coffee, Peter

    2014-10-01

    Challenge and threat reflect two distinct psychophysiological approaches to motivated performance situations. Challenge is related to superior performance in a range of tasks compared to threat, thus methods to promote challenge are valuable. In this paper we manipulate challenge and threat cardiovascular reactivity using only resource appraisals, without altering perceived task demands between challenge and threat conditions. Study 1 used a competitive throwing task and Study 2 used a physically demanding climbing task. In both studies challenge task instructions led to challenge cardiovascular reactivity and threat task instructions led to threat cardiovascular reactivity. In Study 1, participants who received challenge instructions performed better than participants who received threat instructions. In Study 2, attendance at the climbing task did not differ across groups. The findings have implications for stress management in terms of focusing on manipulating appraisals of upcoming tasks by promoting self-efficacy and perceived control and focusing on approach goals. Future research could more reliably assess the influence of similar task instructions on performance. PMID:25036595

  20. Prefrontal inhibition of threat processing reduces working memory interference

    PubMed Central

    Clarke, Robert; Johnstone, Tom

    2013-01-01

    Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM) task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modeling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesized that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat-related interference. PMID

  1. THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS

    SciTech Connect

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E

    2009-01-01

    Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.

  2. A Physicist Looks at the Terrorist Threat

    NASA Astrophysics Data System (ADS)

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  3. Threat from Rubble-Pile Asteroids

    NASA Astrophysics Data System (ADS)

    Schultz, P. H.

    2015-12-01

    Artemieva, 2004]. The "needle model" for the Carancas meteorite entry, however, raises questions about this lower limit for threats by rubble-pile asteroids, e.g., Itokawa. Consequently, we modeled the fate of a rubble-pile entering earth's atmosphere using GEODYN, an Eulerian code with adaptive mesh refinement (Antoun et al., 2001).

  4. Air resources

    SciTech Connect

    1995-10-01

    This section describes the ambient (surrounding) air quality of the TVA region, discusses TVA emission contributions to ambient air quality, and identifies air quality impacts to human health and welfare. Volume 2 Technical Document 2, Environmental Consequences, describes how changes in TVA emissions could affect regional air quality, human health, environmental resources, and materials. The primary region of the affected environment is broadly defined as the state of Tennessee, as well as southern Kentucky, western Virginia, southern West Virginia, western North Carolina, and northern Georgia, Alabama, and Mississippi. This area represents the watershed of the Tennessee River and the 201 counties of the greater TVA service area. Emissions from outside the Tennessee Valley region contribute to air quality in the Valley. Also, TVA emissions are transported outside the Valley and have some impact on air quality beyond the primary study area. Although the study area experiences a number of air quality problems, overall air quality is good.

  5. Driving Less for Better Air: Impacts of a Public Information Campaign

    ERIC Educational Resources Information Center

    Henry, Gary T.; Gordon, Craig S.

    2003-01-01

    In the wake of the 1990 amendments to the Clean Air Act, localities across the United States initiated public information campaigns both to raise awareness of threats to air quality and to change behavior related to air pollution by recommending specific behavioral changes in the campaign messages. These campaigns are designed to reduce the health…

  6. Air Pollution.

    ERIC Educational Resources Information Center

    Gilpin, Alan

    A summary of one of our most pressing environmental problems, air pollution, is offered in this book by the Director of Air Pollution Control for the Queensland (Australia) State Government. Discussion of the subject is not restricted to Queensland or Australian problems and policies, however, but includes analysis of air pollution the world over.…

  7. How Feelings of Stereotype Threat Influence Older Adults’ Memory Performance

    PubMed Central

    Chasteen, Alison L.; Bhattacharyya, Sudipa; Horhota, Michelle; Tam, Raymond; Hasher, Lynn

    2006-01-01

    The purpose of the present research was to explore the role of stereotype threat as a mediator of older people’s memory performance under different instructional sets. In three studies, younger and older participants completed a memory test that was either framed as a memorization or as an impression formation task. Across these studies, memory performance was greater for younger than for older adults and was higher in the impression formation than memorization condition, but was not different for older adults in the two instruction conditions. These results also showed that age differences in memory performance were mediated by participants’ feelings of stereotype threat, such that age was positively related to stereotype threat and stereotype threat was negatively related to memory performance. These data demonstrate that concerns about being negatively stereotyped influence age differences in memory performance, and that the effects of these feelings on performance are not easily reduced by reframing the task instructions. PMID:16036721

  8. Mediators of Stereotype Threat among Black College Students.

    PubMed

    Massey, Douglas S; Owens, Jayanti

    2014-04-01

    We hypothesize that the manner in which stereotype threat affects college grade achievement is mediated by institutional context as well as individual characteristics. Drawing on a sample of black students from the National Longitudinal Survey of Freshmen we find weak and inconsistent evidence that institutional characteristics influence the operation of stereotype threat. We find more consistent evidence to indicate that the effect of stereotype threat is conditioned by individual factors such as skin color, multiracial origins, and an integrated upbringing. Most of the effect on grade achievement occurs through the internalization pathway, in which the internalization of negative stereotypes leads to disinvestment manifested by a reduction in academic effort. The reduction in work effort, in turn, lowers grades. We also find evidence that immigrant origin confers protection from the negative effects of stereotype threat through both internalization and externalization mechanisms, though the ultimate effect of grade achievement is rather small. PMID:24860201

  9. Impaired threat prioritisation after selective bilateral amygdala lesions

    PubMed Central

    Bach, Dominik R.; Hurlemann, Rene; Dolan, Raymond J.

    2015-01-01

    The amygdala is proposed to process threat-related information in non-human animals. In humans, empirical evidence from lesion studies has provided the strongest evidence for a role in emotional face recognition and social judgement. Here we use a face-in-the-crowd (FITC) task which in healthy control individuals reveals prioritised threat processing, evident in faster serial search for angry compared to happy target faces. We investigate AM and BG, two individuals with bilateral amygdala lesions due to Urbach–Wiethe syndrome, and 16 control individuals. In lesion patients we show a reversal of a threat detection advantage indicating a profound impairment in prioritising threat information. This is the first direct demonstration that human amygdala lesions impair prioritisation of threatening faces, providing evidence that this structure has a causal role in responding to imminent danger. PMID:25282058

  10. College Leaders Wrestle with How to Prepare for Unknown Threats

    ERIC Educational Resources Information Center

    Selingo, Jeffrey

    2008-01-01

    This article describes how colleges are seeking the best ways to respond to dangerous incidents like the shootings that occurred at Virginia Tech, and how best to alert people on their campuses to various threats to public safety and emergencies.

  11. Cognitive and physiological antecedents of threat and challenge appraisal.

    PubMed

    Tomaka, J; Blascovich, J; Kibler, J; Ernst, J M

    1997-07-01

    Cognitive appraisal theories of stress and emotion propose that cognitive appraisals precede physiological responses, whereas peripheralist theories propose that physiological arousal precedes cognitive processes. Three studies examined this issue regarding threat and challenge responses to potential stress. Study 1 supported cognitive appraisal theory by demonstrating that threat and challenge cognitive appraisals and physiological responses could be elicited experimentally by manipulating instructional set. Studies 2 and 3, in contrast, found that manipulations of physiological response patterns consistent with challenge and threat did not result in corresponding changes in cognitive appraisal. Appraisals in Study 3, however, were related to subjective pain independent of the physiological manipulation. These studies suggest a central role for cognitive appraisal processes in elicitation of threat and challenge responses to potentially stressful situations. PMID:9216079

  12. Threat sensitivity, incentive sensitivity, and the experience of relief.

    PubMed

    Carver, Charles S

    2009-02-01

    Relief is a positively valenced affect that occurs when a threat is removed or avoided. Among dimensional theories, this experience is accounted for by appealing to one of two different self-regulatory systems. Some hold that an approach system is responsible for all types of positively valenced affect, including this one. Others hold that an avoidance system is responsible for this particular positive affect. Two studies are reported (total N=422) that examined this issue, using a method in which individual differences in overall threat sensitivity and incentive sensitivity were assessed and related to responses to relief-related hypothetical scenarios. Threat sensitivity was the strongest positive correlate of relief in both studies. Reward responsiveness also related positively (independently) to relief. Fun seeking related inversely to relief. Discussion centers on theoretical implications of the findings for viewing effects of threat sensitivity, and on relations between dimensional and appraisal-based views of affective experience. PMID:19076994

  13. Solutions to the new threats to academic freedom?

    PubMed

    Tooley, Michael

    2014-05-01

    In my commentary on Francesca Minerva's article 'New Threats to Academic Freedom', I agree with her contention that the existence of the Internet has given rise to new and very serious threats to academic freedom. I think that it is crucial that we confront those threats, and find ways to eliminate them, which I believe can be done. The threats in question involve both authors and editors. In the case of authors, I argue that the best solution is not anonymous publication, but publication using pseudonyms, and I describe how that would work. In the case of editors, my proposal is a website that a number of journals would have access to, where papers that editors judge to be clearly worthy of publication, but whose publication seems likely to set off a firestorm of public and media protest, could be published without any indication of the journal that had accepted the paper for publication. PMID:24724539

  14. Reassessing Biological Threats: Implications for Cooperative Mitigation Strategies

    PubMed Central

    Galloway, Summer Elise; Petzing, Stephanie Rachel; Young, Catharine Grace

    2015-01-01

    Multiple factors ranging from globalization to ecosystem disruption are presenting the global community with evolving biological threats to local, national, and global security that reach beyond the realm of traditional bioweapon threats. As a result, mitigation strategies have adapted necessarily to the increased diversity of biological threats. In general, response and preparedness strategies have largely shifted from being primarily reactive to traditional biological weapons to more proactive in nature. In this review, we briefly explore biological threats through a wider aperture, to embrace a greater appreciation of viral pathogens, antimicrobial resistance, and agricultural pathogens, and their potential to cause civil, economic, and political devastation. In addition, we discuss current mitigation strategies codified by the Global Health Security Agenda and the One Health paradigm as well as some of the available tools to assist with their sustainable implementation. PMID:26649289

  15. Contamination threats to critical surfaces from handling and storage practices.

    NASA Technical Reports Server (NTRS)

    Poehlmann, H. C.; Manning, R. R.; Jackman, R. W.

    1972-01-01

    Review of the procedures and results of a program designed to remove the threat of sources of molecular and particulate contamination of critical optical, electrical, and mechanical elements in spacecraft. The results of recent contamination-probing thermal-vacuum tests indicate that some of the materials and practices commonly used to protect critical surfaces from molecular or particulate contamination can themselves represent significant threats. These contamination sources include clean-room and clean-tent materials, gloves, tissues, and covering or packaging materials. Mass and infrared spectral analyses of these materials and the environments and instruments exposed to them show that the contaminants are mostly plasticizers, slip or antistatic agents, and binders used in the manufacture of these products. Products of particular threat include vinyl gloves, boots, clean-tent walls, and some polyethylene sheets and bags. Techniques for reducing these threats are discussed.

  16. Description of a stressful encounter: appraisal, threat, and challenge.

    PubMed

    Burns, K R; Egan, E C

    1994-01-01

    The purpose of this study was to examine a potentially stressful event for students, the midterm examination, using the Lazarus transactional stress model. At two time periods during an academic term, 50 students responded to questionnaires focused on the midterm examination and its outcome. Responses were used to identify changes in appraisals, personal stakes, perceptions of threat and challenge; to determine these variables' relations to each other and to the examination grade; and to determine the best predictors of threat, challenge, and grade. Results indicated that threat and challenge perceptions were the only variables that changed as the situation evolved; they were negatively correlated. The best predictor of threat and challenge was control, while the only variable that correlated with grade was harm. PMID:8133331

  17. The cyber threat landscape: Challenges and future research directions

    NASA Astrophysics Data System (ADS)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  18. Little Threat of Zika Spread from Rio Olympics

    MedlinePlus

    ... gov/news/fullstory_160051.html Little Threat of Zika Spread From Rio Olympics: Study Because it's winter ... in Brazil are not likely to contract the Zika virus during their stay or bring it back ...

  19. How feelings of stereotype threat influence older adults' memory performance.

    PubMed

    Chasteen, Alison L; Bhattacharyya, Sudipa; Horhota, Michelle; Tam, Raymond; Hasher, Lynn

    2005-01-01

    The purpose of the present research was to explore the role of stereotype threat as a mediator of older people's memory performance under different instructional sets. In three studies, younger and older participants completed a memory test that was either framed as a memorization or as an impression formation task. Across these studies, memory performance was greater for younger than for older adults and was higher in the impression formation than memorization condition, but was not different for older adults in the two instruction conditions. These results also showed that age differences in memory performance were mediated by participants' feelings of stereotype threat, such that age was positively related to stereotype threat and stereotype threat was negatively related to memory performance. These data demonstrate that concerns about being negatively stereotyped influence age differences in memory performance, and that the effects of these feelings on performance are not easily reduced by reframing the task instructions. PMID:16036721

  20. RESPONDING TO THREATS AND INCIDENTS OF INTENTIONAL DRINKING WATER CONTAMINATION

    EPA Science Inventory

    All drinking water systems have some degree of vulnerability to contamination, and analysis shows that it is possible to contaminate drinking water at levels causing varying degrees of harm. Furthermore, experience indicates that the threat of contamination, overt or circumstant...

  1. Biological warfare agents as threats to potable water.

    PubMed Central

    Burrows, W D; Renner, S E

    1999-01-01

    Nearly all known biological warfare agents are intended for aerosol application. Although less effective as potable water threats, many are potentially capable of inflicting heavy casualties when ingested. Significant loss of mission capability can be anticipated even when complete recovery is possible. Properly maintained field army water purification equipment can counter this threat, but personnel responsible for the operation and maintenance of the equipment may be most at risk of exposure. Municipal water treatment facilities would be measurably less effective. Some replicating (infectious) agents and a few biotoxins are inactivated by chlorine disinfection; for others chlorine is ineffective or of unknown efficacy. This report assesses the state of our knowledge of agents as potable water threats and contemplates the consequences of intentional or collateral contamination of potable water supplies by 18 replicating agents and 9 biotoxins known or likely to be weaponized or otherwise used as threats. PMID:10585901

  2. Lightning threat warning system at the Tonopah Test Range

    SciTech Connect

    Smith, R

    1992-07-01

    This report documents the lightning threat warning system at the Tonopah Test Range and the technology it uses. The report outlines each of the system's individual components and the information each contributes.

  3. Threat, prejudice and the impact of the riots in England.

    PubMed

    de Rooij, Eline A; Goodwin, Matthew J; Pickup, Mark

    2015-05-01

    This paper examines how a major outbreak of rioting in England in 2011 impacted on prejudice toward three minority groups in Britain: Muslims, Black British and East Europeans. We test whether the riots mobilized individuals by increasing feelings of realistic and symbolic threat and ultimately prejudice, or whether the riots galvanized those already concerned about minorities, thus strengthening the relationship between threat and prejudice. We conducted three national surveys - before, after and one year on from the riots - and show that after the riots individuals were more likely to perceive threats to society's security and culture, and by extension express increased prejudice toward Black British and East European minorities. We find little evidence of a galvanizing impact. One year later, threat and prejudice had returned to pre-riots levels; however, results from a survey experiment show that priming memories of the riots can raise levels of prejudice. PMID:25769873

  4. Understanding and managing human threats to the coastal marine environment.

    PubMed

    Crain, Caitlin M; Halpern, Benjamin S; Beck, Mike W; Kappel, Carrie V

    2009-04-01

    Coastal marine habitats at the interface of land and sea are subject to threats from human activities in both realms. Researchers have attempted to quantify how these various threats impact different coastal ecosystems, and more recently have focused on understanding the cumulative impact from multiple threats. Here, the top threats to coastal marine ecosystems and recent efforts to understand their relative importance, ecosystem-level impacts, cumulative effects, and how they can best be managed and mitigated, are briefly reviewed. Results of threat analysis and rankings will differ depending on the conservation target (e.g., vulnerable species, pristine ecosystems, mitigatable threats), scale of interest (local, regional, or global), whether externalities are considered, and the types of management tools available (e.g., marine-protected areas versus ecosystem-based management). Considering the cumulative effect of multiple threats has only just begun and depends on spatial analysis to predict overlapping threats and a better understanding of multiple-stressor effects and interactions. Emerging conservation practices that hold substantial promise for protecting coastal marine systems include multisector approaches, such as ecosystem-based management (EBM), that account for ecosystem service valuation; comprehensive spatial management, such as ocean zoning; and regulatory mechanisms that encourage or require cross-sector goal setting and evaluation. In all cases, these efforts require a combination of public and private initiatives for success. The state of our ecological understanding, public awareness, and policy initiatives make the time ripe for advancing coastal marine management and improving our stewardship of coastal and marine ecosystems. PMID:19432644

  5. Risk assessment as an evolved threat detection and analysis process.

    PubMed

    Blanchard, D Caroline; Griebel, Guy; Pobbe, Roger; Blanchard, Robert J

    2011-03-01

    Risk assessment is a pattern of activities involved in detection and analysis of threat stimuli and the situations in which the threat is encountered. It is a core process in the choice of specific defenses, such as flight, freezing, defensive threat and defensive attack, that counter the threat and minimize the danger it poses. This highly adaptive process takes into account important characteristics, such as type and location (including distance from the subject) of the threat, as well as those (e.g. presence of an escape route or hiding place) of the situation, combining them to predict which specific defense is optimal with that particular combination of threat and situation. Risk assessment is particularly associated with ambiguity either of the threat stimulus or of the outcome of available defensive behaviors. It is also crucial in determining that threat is no longer present, permitting a return to normal, nondefensive behavior. Although risk assessment has been described in detail in rodents, it is also a feature of human defensive behavior, particularly in association with ambiguity. Rumination may be a specifically human form of risk assessment, more often expressed by women, and highly associated with anxiety. Risk assessment behaviors respond to drugs effective against generalized anxiety disorder; however, flight, a dominant specific defense in many common situations, shows a pharmacological response profile closer to that of panic disorder. Risk assessment and flight also appear to show some consistent differences in terms of brain regional activation patterns, suggesting a potential biological differentiation of anxiety and fear/panic systems. An especially intriguing possibility is that mirror neurons may respond to some of the same types of situational differences that are analyzed during risk assessment, suggesting an additional functional role for these neurons. PMID:21056591

  6. The bio-terrorism threat and casualty prevention.

    SciTech Connect

    Noel, William P.

    1999-10-01

    The bio-terrorism threat has become the 'poor man's' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  7. Does stereotype threat affect women in academic medicine?

    PubMed

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  8. Exciting fear in adolescence: Does pubertal development alter threat processing?

    PubMed Central

    Spielberg, Jeffrey M.; Olino, Thomas M.; Forbes, Erika E.; Dahl, Ronald E.

    2014-01-01

    Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some) fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala), but also regions associated with reward pursuit (i.e., nucleus accumbens). These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues–which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences. PMID:24548554

  9. A Bayesian belief network of threat anticipation and terrorist motivations

    NASA Astrophysics Data System (ADS)

    Olama, Mohammed M.; Allgood, Glenn O.; Davenport, Kristen M.; Schryver, Jack C.

    2010-04-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  10. An implementation-independent threat model for group communications

    NASA Astrophysics Data System (ADS)

    Hester, Jason; Yurcik, William; Campbell, Roy

    2006-04-01

    The importance of group communications and the need to efficiently and reliably support it across a network is an issue of growing importance for the next decade. New group communication services are emerging such as multimedia conferencing/groupware, distributed interactive simulations, sensor fusion systems, command and control centers, and network-centric military applications. While a succession of point-to-point unicast routes could provide group communications, this approach is inherently inefficient and unlikely to support the increased resource requirements of these new services. There is the lack of a comprehensive process to designing security into group communications schemes. Designing such protection for group communications is best done by utilizing proactive system engineering rather than reacting with ad hoc countermeasures to the latest attack du jour. Threat modeling is the foundation for secure system engineering processes because it organizes system threats and vulnerabilities into general classes so they can be addressed with known protection techniques. Although there has been prior work on threat modeling primarily for software applications, however, to our knowledge this is the first attempt at implementation-independent threat modeling for group communications. We discuss protection challenges unique to group communications and propose a process to create a threat model for group communication systems independent of underlying implementation based on classical security principles (Confidentiality, Integrity, Availability, Authentication, or CIAA). It is our hope that this work will lead to better designs for protection solutions against threats to group communication systems.

  11. Policing of reproduction by hidden threats in a cooperative mammal.

    PubMed

    Cant, Michael A; Nichols, Hazel J; Johnstone, Rufus A; Hodge, Sarah J

    2014-01-01

    The evolution of cooperation in animal and human societies is associated with mechanisms to suppress individual selfishness. In insect societies, queens and workers enforce cooperation by "policing" selfish reproduction by workers. Insect policing typically takes the form of damage limitation after individuals have carried out selfish acts (such as laying eggs). In contrast, human policing is based on the use of threats that deter individuals from acting selfishly in the first place, minimizing the need for damage limitation. Policing by threat could in principle be used to enforce reproductive suppression in animal societies, but testing this idea requires an experimental approach to simulate reproductive transgression and provoke out-of-equilibrium behavior. We carried out an experiment of this kind on a wild population of cooperatively breeding banded mongooses (Mungos mungo) in Uganda. In this species, each group contains multiple female breeders that give birth to a communal litter, usually on the same day. In a 7-y experiment we used contraceptive injections to manipulate the distribution of maternity within groups, triggering hidden threats of infanticide. Our data suggest that older, socially dominant females use the threat of infanticide to deter selfish reproduction by younger females, but that females can escape the threat of infanticide by synchronizing birth to the same day as older females. Our study shows that reproduction in animal societies can be profoundly influenced by threats that remain hidden until they are triggered experimentally. Coercion may thus extend well beyond the systems in which acts of infanticide are common. PMID:24367092

  12. Preliminary thoughts concerning potential US Army threats/roles

    SciTech Connect

    Greene, R.A.; Solomon, K.A.; Miles, J.T.

    1991-06-01

    The rate at which the current world military/political perspective is changing demands consideration of a broader spectrum of potential threats then has been the case for the past few decades--during which the Soviet Union was the preeminent threat. Seemingly overnight, the cold war ceased, the requirement for massive U.S. military counters to the Soviet Union forces faded, and an era of constant (obvious) military threat disappeared. This situation has in turn been revolutionized by the Iraq invasion of Kuwait and the U.S. response. The paper addresses part of the problem facing military planners by defining a spectrum of threats that typify those the U.S. Army might face over the next decade or two. The purpose of the threat set is to support the evaluation of the effectiveness and usefulness, to the U.S. Army, of advanced technologies. The set of threats is intended to provide a complete set of characteristics rather then to be a complete list of the possibilities; it is illustrative rather than exhaustive. Although largely completed before the war with Iraq started, its content is still valid in that its purpose is to provide a framework for thinking about future U.S. Army technology needs.

  13. Neuroimaging the temporal dynamics of human avoidance to sustained threat.

    PubMed

    Schlund, Michael W; Hudgins, Caleb D; Magee, Sandy; Dymond, Simon

    2013-11-15

    Many forms of human psychopathology are characterized by sustained negative emotional responses to threat and chronic behavioral avoidance, implicating avoidance as a potential transdiagnostic factor. Evidence from both nonhuman neurophysiological and human neuroimaging studies suggests a distributed frontal-limbic-striatal brain network supports avoidance. However, our understanding of the temporal dynamics of the network to sustained threat that prompts sustained avoidance is limited. To address this issue, 17 adults were given extensive training on a modified free-operant avoidance task in which button pressing avoided money loss during a sustained threat period. Subsequently, subjects underwent functional magnetic resonance imaging while completing the avoidance task. In our regions of interest, we observed phasic, rather than sustained, activation during sustained threat in dorsolateral and inferior frontal regions, anterior and dorsal cingulate, ventral striatum and regions associated with emotion, including the amygdala, insula, substantia nigra and bed nucleus of the stria terminalis complex. Moreover, trait levels of experiential avoidance were negatively correlated with insula, hippocampal and amygdala activation. These findings suggest knowledge that one can consistently avoid aversive outcomes is not associated with decreased threat-related responses and that individuals with greater experiential avoidance exhibit reduced reactivity to initial threat. Implications for understanding brain mechanisms supporting human avoidance and psychological theories of avoidance are discussed. PMID:24095880

  14. A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations

    SciTech Connect

    Olama, Mohammed M; Allgood, Glenn O; Davenport, Kristen M; Schryver, Jack C

    2010-01-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  15. Managing Threats against Control in Old Age: A Narrative Inquiry

    PubMed Central

    Black, Helen K.; Santanello, Holly R.; Caruso, Christa J.

    2014-01-01

    Background The desire to retain personal control over self and life circumstances continues into old age; it exists in tension with late-life vulnerabilities. Objectives This article investigates how elders respond to threats against control in light of changes surrounding health and identity. Methods Community-dwelling African-American (n = 10) and European-American elders (n = 10), aged 70 years and older, with varied self-reported health statuses were qualitatively interviewed. Open-ended interviews explored elders’ perceptions of control and threats to control in older age. Results Three themes linked elders’ responses to threats to control. Elders: (a) proactively monitored physical and mental health; (b) maintained roles that shaped important aspects of identity, and (c) fostered personal growth and development by generative practices. Responses of participants who had difficulty countering threats to control are also offered. Discussion This study shows that the construct of control is not abstract; it is interpreted and applied by elders in the contexts of everyday life. Respondents used personal resources honed throughout the life course to respond to threats to control. Elders viewed control as a cultural construct with nuanced meanings that recalled past roles and current changes that occur with age. Suggestions are offered for how health professionals can assist elders with the cognitive and emotional tasks required to deal with threats to personal control surrounding health and identity. PMID:24165219

  16. Does Stereotype Threat Affect Women in Academic Medicine?

    PubMed Central

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  17. Evidence for stasis and not genetic piracy in developmental expression patterns of Branchiostoma lanceolatum and Branchiostoma floridae, two amphioxus species that have evolved independently over the course of 200 Myr.

    PubMed

    Somorjai, Ildiko; Bertrand, Stéphanie; Camasses, Alain; Haguenauer, Anne; Escriva, Hector

    2008-12-01

    Cephalochordates, the most basal extant group in the phylum Chordata, are represented chiefly by about 20 species of the genus Branchiostoma, commonly called amphioxus or lancelets. In recent years, insights into the evolutionary origin of the vertebrates have been gained from molecular genetic studies during the development of three of these amphioxus species (Branchiostoma floridae in North America, Branchiostoma lanceolatum in Europe, and Branchiostoma belcheri in East Asia). In spite of an estimated divergence time of 100-200 Myr among these species, all three are remarkably similar morphologically, and students of amphioxus have tacitly assumed that such resemblances arise during ontogeny from nearly identical networks of developmental genes. We felt that this assumption needed to be reexamined because instances are known--even in comparisons of closely related species--where characters seeming homologous on the basis of morphology actually develop under the control of conspicuously divergent genetic programs (a phenomenon termed "genetic piracy"). In the present work, we tested the hypothesis that morphological similarities reflect strict conservation of developmentally important genes' expression patterns in order to assess whether the developmental genetics of different amphioxus species show evidence of genetic piracy. To these ends, we cloned 18 genes implicated in different developmental functions in B. lanceolatum and compared their gene expression patterns with the known expression patterns of their orthologous genes in B. floridae. We show that, for the most part, conservation of gene expression parallels that of morphology in these two species. We also identified some differences in gene expression, likely reflecting experimental sensitivity, with the exception of Pax1/9, which may result from true developmental specificities in each amphioxus species. Our results demonstrate that morphological conservation reflects stasis in developmental gene

  18. Alcohol Stress Response Dampening during imminent vs. distal, uncertain threat

    PubMed Central

    Hefner, Kathryn R.; Moberg, Christine A.; Hachiya, Laura Y.; Curtin, John J.

    2014-01-01

    Research indicates that fear and anxiety are distinct processes with separable neurobiological substrates. Predictable vs. unpredictable shock administration has been used to elicit fear vs. anxiety, respectively. Recent research has demonstrated that alcohol may reduce anxiety but not fear. However, previous manipulations of predictability have varied both probability and temporal uncertainty of shock threat, leaving unresolved questions regarding which stimulus characteristics elicit anxiety and are sensitive to alcohol stress response dampening (SRD). We developed a novel paradigm to closely parallel basic research in animals that systematically varied temporal uncertainty of threat while holding threat probability constant. Intoxicated (0.08% target BAC), placebo, and no-alcohol control participants viewed a series of visual threat cues. Certain cue duration (5 seconds) blocks were equivalent to predictable shock blocks eliciting fear in earlier research. Uncertain cue duration (5, 20, 50 or 80 second, intermixed) blocks introduced temporal uncertainty regarding impending shock to elicit anxiety. Startle potentiation relative to matched cue periods in no-shock blocks provided the primary measure of affective response. All threat cues produced robust startle potentiation. Alcohol reduced startle potentiation during the first 5 seconds of threat cue presentation in uncertain but not certain duration blocks. Alcohol also reduced startle potentiation at later times among longer uncertain duration cues, suggesting that alcohol SRD persisted. Trait negative emotionality and binge drinking status moderated alcohol SRD magnitude during uncertain threat. These translational findings corroborate previous reports regarding distinct substrates of fear vs. anxiety, and have implications for both alcoholism etiology and comorbidity with anxiety disorders. PMID:24016014

  19. Threat affects risk preferences in movement decision making

    PubMed Central

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  20. Effects of threat management interactions on conservation priorities.

    PubMed

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. PMID:26171646

  1. Stereotype threat reduces false recognition when older adults are forewarned.

    PubMed

    Wong, Jessica T; Gallo, David A

    2016-05-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information-a phenomenon attributed to stereotype threat-but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval. PMID:26218527

  2. If it bleeds, it leads: separating threat from mere negativity.

    PubMed

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. PMID:24493851

  3. Mutuality and the social regulation of neural threat responding

    PubMed Central

    Coan, James A.; Kasle, Shelley; Jackson, Alice; Schaefer, Hillary S.; Davidson, Richard J.

    2014-01-01

    Recent studies have shown that the presence of a caring relational partner can attenuate neural responses to threat. Here we report reanalyzed data from Coan, Schaefer, and Davidson (2006), investigating the role of relational mutuality in the neural response to threat. Mutuality reflects the degree to which couple members show mutual interest in the sharing of internal feelings, thoughts, aspirations, and joys – a vital form of responsiveness in attachment relationships. We predicted that wives who were high (versus low) in perceived mutuality, and who attended the study session with their husbands, would show reduced neural threat reactivity in response to mild electric shocks. We also explored whether this effect would depend on physical contact (handholding). As predicted, we observed that higher mutuality scores corresponded with decreased neural threat responding in the right dorsolateral prefrontal cortex and supplementary motor cortex. These effects were independent of hand-holding condition. These findings suggest that higher perceived mutuality corresponds with decreased self-regulatory effort and attenuated preparatory motor activity in response to threat cues, even in the absence of direct physical contact with social resources. PMID:23547803

  4. If it bleeds, it leads: separating threat from mere negativity

    PubMed Central

    Boshyan, Jasmine; Adams, Reginald B.; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F.

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. PMID:24493851

  5. Air Pollution.

    ERIC Educational Resources Information Center

    Fox, Donald L.

    1989-01-01

    Materials related to air pollution are reviewed for the period January 1987, to October 1988. The topics are pollution monitoring, air pollution, and environmental chemistry. The organization consists of two major analytical divisions: (1) gaseous methods; and (2) aerosol and particulate methods. (MVL)

  6. Air Pollution.

    EPA Science Inventory

    Air quality is affected by many types of pollutants that are emitted from various sources, including stationary and mobile. These sources release both criteria and hazardous air pollutants, which cause health effects, ecological harm, and material damage. They are generally categ...

  7. Amygdala lesions in rhesus macaques decrease attention to threat

    PubMed Central

    Dal Monte, Olga; Costa, Vincent D.; Noble, Pamela L.; Murray, Elisabeth A.; Averbeck, Bruno B.

    2015-01-01

    Evidence from animal and human studies has suggested that the amygdala plays a role in detecting threat and in directing attention to the eyes. Nevertheless, there has been no systematic investigation of whether the amygdala specifically facilitates attention to the eyes or whether other features can also drive attention via amygdala processing. The goal of the present study was to examine the effects of amygdala lesions in rhesus monkeys on attentional capture by specific facial features, as well as gaze patterns and changes in pupil dilation during free viewing. Here we show reduced attentional capture by threat stimuli, specifically the mouth, and reduced exploration of the eyes in free viewing in monkeys with amygdala lesions. Our findings support a role for the amygdala in detecting threat signals and in directing attention to the eye region of faces when freely viewing different expressions. PMID:26658670

  8. A stereotype threat account of boys' academic underachievement.

    PubMed

    Hartley, Bonny L; Sutton, Robbie M

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged 7-8 years (n = 162) that boys tend to do worse than girls at school. This manipulation hindered boys' performance on a reading, writing, and math test, but did not affect girls' performance. Study 3 counteracted stereotype threat, informing children aged 6-9 years (n = 184) that boys and girls were expected to perform similarly. This improved the performance of boys and did not affect that of girls. PMID:23402479

  9. Community Violence Exposure, Threat Appraisal, and Adjustment in Adolescents

    PubMed Central

    Kliewer, Wendy; Sullivan, Terri N.

    2008-01-01

    Validity data are presented for a new measure of threat appraisals in response to community violence. Adolescents (N=358; 45% male; 91% African American, M=12.10 years, SD=1.63) and their maternal caregivers participated in two waves of a longitudinal interview study focused on the consequences of exposure to community violence. Structural equation modeling revealed that a six-factor correlated model best fit the data, indicating that the six subscales of the threat appraisal measure represent distinct but related constructs. The factor structure was invariant across age and gender. Exposure to violence was associated prospectively with caregiver- and adolescent-rated adjustment problems. Each of the six threat appraisals mediated links between exposure to violence at Wave 1 and adolescent-rated internalizing adjustment problems 1 year later. PMID:18991135

  10. Amygdala lesions in rhesus macaques decrease attention to threat.

    PubMed

    Dal Monte, Olga; Costa, Vincent D; Noble, Pamela L; Murray, Elisabeth A; Averbeck, Bruno B

    2015-01-01

    Evidence from animal and human studies has suggested that the amygdala plays a role in detecting threat and in directing attention to the eyes. Nevertheless, there has been no systematic investigation of whether the amygdala specifically facilitates attention to the eyes or whether other features can also drive attention via amygdala processing. The goal of the present study was to examine the effects of amygdala lesions in rhesus monkeys on attentional capture by specific facial features, as well as gaze patterns and changes in pupil dilation during free viewing. Here we show reduced attentional capture by threat stimuli, specifically the mouth, and reduced exploration of the eyes in free viewing in monkeys with amygdala lesions. Our findings support a role for the amygdala in detecting threat signals and in directing attention to the eye region of faces when freely viewing different expressions. PMID:26658670

  11. Psychological Effects of the Threat of Nuclear War

    PubMed Central

    Kiraly, S. J.

    1986-01-01

    Systematic studies are emerging on the prevailing harmful psychological effect of the threat of nuclear war. The most recent surveys have identified populations which are particularly vulnerable. Anxiety was found to be a factor in criminal behavior, and threat of nuclear war to be a factor in anxiety. Psychiatric morbidity has been correlated with work deprivation and threat of annihilation. Many studies have focused on children, finding that anxiety about social issues is high, but that cynicism and apathy set in rapidly. Conclusions from such studies show that denial and avoidance are some of the worst results, since they are a barrier to meaningful reaction. The most vulnerable groups are children, adolescents, the unemployed, and those responsible for the welfare of others. Appropriate action is seen to be acknowledgement of fear and disillusionment as valid feelings, education towards a stronger sense of reality, and mobilization of goal-directed activity. PMID:21274254

  12. Suffering and Generativity: Repairing Threats to Self in Old Age

    PubMed Central

    de Medeiros, Kate

    2009-01-01

    Suffering is a powerful experience that can be difficult to articulate. Suffering differs from pain alone and includes an individual’s awareness of a threat to self through death, loss of identity, or uncertaintly of the meaningfulness of one’s life. In response to this threat, generative acts, especially creative expressions imbued with the self, may act as a means to repair the self in crisis. The case of Mr. A., an 85-year old man in good health, illustrates how various artistic pieces he created – a wooden dog and several poems -- helps him to restore a “fading” self. For Mr. A, the idea of “fading away” or becoming weaker and less useful until eventually disappearing is a major source of personal suffering. Through his art, he creates unique, interactive and tangible entities that can outlive his physical body and help him reclaim or repair threats to selfhood. PMID:20161268

  13. Stereotype Threat and College Academic Performance: A Latent Variables Approach*

    PubMed Central

    Owens, Jayanti; Massey, Douglas S.

    2013-01-01

    Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using summed indicators and predicted relationships modeled using ordinary least squares. Using the National Longitudinal Survey of Freshman, this study overcomes previous methodological shortcomings by developing a latent construct model of stereotype threat. Theoretical constructs and equations are estimated simultaneously from multiple indicators, yielding a more reliable, valid, and parsimonious test of key propositions. Findings additionally support the view that social stigma can indeed have strong negative effects on the academic performance of pejoratively stereotyped racial-minority group members, not only in laboratory settings, but also in the real world. PMID:23950616

  14. The threat of disease increases as species move toward extinction.

    PubMed

    Heard, Matthew J; Smith, Katherine F; Ripp, Kelsey J; Berger, Melanie; Chen, Jane; Dittmeier, Justin; Goter, Maggie; McGarvey, Stephen T; Ryan, Elizabeth

    2013-12-01

    At local scales, infectious disease is a common driver of population declines, but globally it is an infrequent contributor to species extinction and endangerment. For species at risk of extinction from disease important questions remain unanswered, including when does disease become a threat to species and does it co-occur, predictably, with other threats? Using newly compiled data from the International Union for Conservation of Nature (IUCN) Red List, we examined the relative role and co-occurrence of threats associated with amphibians, birds, and mammals at 6 levels of extinction risk (i.e., Red List status categories: least concern, near threatened, vulnerable, endangered, critically endangered, and extinct in the wild/extinct). We tested the null hypothesis that the proportion of species threatened by disease is the same in all 6 Red List status categories. Our approach revealed a new method for determining when disease most frequently threatens species at risk of extinction. The proportion of species threatened by disease varied significantly between IUCN status categories and linearly increased for amphibians, birds, and all species combined as these taxa move from move from least concern to critically endangered. Disease was infrequently the single contributing threat. However, when a species was negatively affected by a major threat other than disease (e.g., invasive species, land-use change) that species was more likely to be simultaneously threatened by disease than species that had no other threats. Potential drivers of these trends include ecological factors, clustering of phylogenetically related species in Red List status categories, discovery bias among species at greater risk of extinction, and availability of data. We echo earlier calls for baseline data on the presence of parasites and pathogens in species when they show the first signs of extinction risk and arguably before. La Amenaza de Enfermedades Incrementa a Medida que las Especies se

  15. Extinction during reconsolidation of threat memory diminishes prefrontal cortex involvement

    PubMed Central

    Schiller, Daniela; Kanen, Jonathan W.; LeDoux, Joseph E.; Monfils, Marie-H.; Phelps, Elizabeth A.

    2013-01-01

    Controlling learned defensive responses through extinction does not alter the threat memory itself, but rather regulates its expression via inhibitory influence of the prefrontal cortex (PFC) over amygdala. Individual differences in amygdala–PFC circuitry function have been linked to trait anxiety and posttraumatic stress disorder. This finding suggests that exposure-based techniques may actually be least effective in those who suffer from anxiety disorders. A theoretical advantage of techniques influencing reconsolidation of threat memories is that the threat representation is altered, potentially diminishing reliance on this PFC circuitry, resulting in a more persistent reduction of defensive reactions. We hypothesized that timing extinction to coincide with threat memory reconsolidation would prevent the return of defensive reactions and diminish PFC involvement. Two conditioned stimuli (CS) were paired with shock and the third was not. A day later, one stimulus (reminded CS+) but not the other (nonreminded CS+) was presented 10 min before extinction to reactivate the threat memory, followed by extinction training for all CSs. The recovery of the threat memory was tested 24 h later. Extinction of the nonreminded CS+ (i.e., standard extinction) engaged the PFC, as previously shown, but extinction of the reminded CS+ (i.e., extinction during reconsolidation) did not. Moreover, only the nonreminded CS+ memory recovered on day 3. These results suggest that extinction during reconsolidation prevents the return of defensive reactions and diminishes PFC involvement. Reducing the necessity of the PFC–amygdala circuitry to control defensive reactions may help overcome a primary obstacle in the long-term efficacy of current treatments for anxiety disorders. PMID:24277809

  16. Threats to social identity can trigger social deviance.

    PubMed

    Belmi, Peter; Barragan, Rodolfo Cortes; Neale, Margaret A; Cohen, Geoffrey L

    2015-04-01

    We hypothesized that threats to people's social (i.e., group) identity can trigger deviant attitudes and behaviors. A correlational study and five experiments showed that experiencing or recalling situations associated with the devaluation of a social identity caused participants to endorse or engage in deviant actions, including stealing, cheating, and lying. The effect was driven by the tendency to construe social identity threats not as isolated incidents but as symbolic of the continuing devaluation and disrespectful treatment of one's group. Supplementing sociological approaches to deviance and delinquency, the results suggest the relevance and utility of a social-psychological account. PMID:25713172

  17. Extending the amygdala in theories of threat processing

    PubMed Central

    Fox, Andrew S.; Oler, Jonathan A.; Tromp, Do P.M.; Fudge, Julie L.; Kalin, Ned H.

    2015-01-01

    The central extended amygdala is an evolutionarily conserved set of interconnected brain regions that play an important role in threat processing to promote survival. Two core components of the central extended amygdala, the central nucleus of the amygdala (Ce) and the lateral bed nucleus of the stria terminalis (BST) are highly similar regions that serve complimentary roles by integrating fear- and anxiety-relevant information. Survival depends on the central extended amygdala's ability to rapidly integrate and respond to threats that vary in their immediacy, proximity, and characteristics. Future studies will benefit from understanding alterations in central extended amygdala function in relation to stress-related psychopathology. PMID:25851307

  18. Meteoroids and Meteor Storms: A Threat to Spacecraft

    NASA Technical Reports Server (NTRS)

    Anderson, B. Jeffrey

    1999-01-01

    Robust system design is the best protection against meteoroid damage. Impacts by small meteoroids are common on satellite surfaces, but impacts by meteoroids large enough to damage well designed systems are very rare. Estimating the threat from the normal meteoroid environment is difficult. Estimates for the occasional "storm" are even more uncertain. Common sense precautions are in order for the 1999 Leonids, but wide-spread catastrophic damage is highly unlikely. Strong Leonid showers are also expected in 2000 and 2001, but these pose much less threat than 1999.

  19. US policy and the Iranian threat. Final report

    SciTech Connect

    Kerstanski, P.

    1995-02-01

    Topics include `dual containment` as it affects Iran, international community thoughts; external pressures being applied on Clinton administration; conventional arms buildup from threat it poses to GCC. Israel and U.S.; external threat poised against a weakened Iran; dangers Iran`s unconventional weapons program pose to GCC, Israel. Iraq and West; why Iran believes such a program is essential to its existence; capability of Iran to export its terrorist and revolutionary zeal. Iran overcoming odds on its domestic front; U.S. - GCC relationship and GCC - Iranian relationship and questioned policy of excluding Iran from regional security agreements.

  20. The globalization of public health, I: Threats and opportunities.

    PubMed Central

    Yach, D; Bettcher, D

    1998-01-01

    The globalization of public health poses new threats to health but also holds important opportunities in the coming century. This commentary identifies the major threats and opportunities presented by the process of globalization and emphasizes the need for transnational public health approaches to take advantage of the positive aspects of global change and to minimize the negative ones. Transnational public health issues are areas of mutual concern for the foreign policies of all countries. These trends indicate a need for cross-national comparisons (e.g., in the areas of health financing and policy development) and for the development of a transnational research agenda in public health. PMID:9585736

  1. The Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear material (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. A discussion of the Safeguards Evaluation Method is presented in this paper.

  2. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  3. Stereotype Threat in Classroom Settings: The Interactive Effect of Domain Identification, Task Difficulty and Stereotype Threat on Female Students' Maths Performance

    ERIC Educational Resources Information Center

    Keller, Johannes

    2007-01-01

    Background: Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths…

  4. Advances in Linked Air Quality, Farm Management and Biogeochemistry Models to Address Bidirectional Ammonia Flux in CMAQ

    EPA Science Inventory

    Recent increases in anthropogenic inputs of nitrogen to air, land and water media pose a growing threat to human health and ecosystems. Modeling of air-surface N flux is one area in need of improvement. Implementation of a linked air quality and cropland management system is de...

  5. "Advances in Linked Air Quality, Farm Management and Biogeochemistry Models to Address Bidrectional Ammonia Flux in CMAQ"

    EPA Science Inventory

    Recent increases in anthropogenic inputs of nitrogen to air, land and water media pose a growing threat to human health and ecosystems. Modeling of air-surface N flux is one area in need of improvement. Implementation of a linked air quality and cropland management system is de...

  6. Protecting civil aircraft from the MANPAD threat: is this a practical scenario?

    NASA Astrophysics Data System (ADS)

    Taylor, William

    2005-11-01

    This paper has been written as a key note address and backdrop to the 2005 SPIE Technologies for Optical Countermeasures II Conference. The paper uses as a topic the problem of protecting civil aircraft from the Man Portable Air Defence missile Systems (MANPADS). The paper examines the economic background of the airline industry and the effects such a successful attack could have. It then addresses the various motives, means, and opportunities that the terrorists have to use MANPADS to progress attacks against civil aircraft. In reviewing the various mitigation options available to defeat or deny MANPAD engagements, the paper identifies key technology areas available for exploitation. It then focuses on the optical countermeasure technologies used in providing aircraft platform self protection. Finally, the paper summarises and concludes that whilst a lot has and can be done to militate against the MANPAD threat there is not yet an exportable, affordable and robust countermeasures technology for large scale commercial systems and operations.

  7. Global threats from invasive alien species in the twenty-first century and national response capacities.

    PubMed

    Early, Regan; Bradley, Bethany A; Dukes, Jeffrey S; Lawler, Joshua J; Olden, Julian D; Blumenthal, Dana M; Gonzalez, Patrick; Grosholz, Edwin D; Ibañez, Ines; Miller, Luke P; Sorte, Cascade J B; Tatem, Andrew J

    2016-01-01

    Invasive alien species (IAS) threaten human livelihoods and biodiversity globally. Increasing globalization facilitates IAS arrival, and environmental changes, including climate change, facilitate IAS establishment. Here we provide the first global, spatial analysis of the terrestrial threat from IAS in light of twenty-first century globalization and environmental change, and evaluate national capacities to prevent and manage species invasions. We find that one-sixth of the global land surface is highly vulnerable to invasion, including substantial areas in developing economies and biodiversity hotspots. The dominant invasion vectors differ between high-income countries (imports, particularly of plants and pets) and low-income countries (air travel). Uniting data on the causes of introduction and establishment can improve early-warning and eradication schemes. Most countries have limited capacity to act against invasions. In particular, we reveal a clear need for proactive invasion strategies in areas with high poverty levels, high biodiversity and low historical levels of invasion. PMID:27549569

  8. Global threats from invasive alien species in the twenty-first century and national response capacities

    PubMed Central

    Early, Regan; Bradley, Bethany A.; Dukes, Jeffrey S.; Lawler, Joshua J.; Olden, Julian D.; Blumenthal, Dana M.; Gonzalez, Patrick; Grosholz, Edwin D.; Ibañez, Ines; Miller, Luke P.; Sorte, Cascade J. B.; Tatem, Andrew J.

    2016-01-01

    Invasive alien species (IAS) threaten human livelihoods and biodiversity globally. Increasing globalization facilitates IAS arrival, and environmental changes, including climate change, facilitate IAS establishment. Here we provide the first global, spatial analysis of the terrestrial threat from IAS in light of twenty-first century globalization and environmental change, and evaluate national capacities to prevent and manage species invasions. We find that one-sixth of the global land surface is highly vulnerable to invasion, including substantial areas in developing economies and biodiversity hotspots. The dominant invasion vectors differ between high-income countries (imports, particularly of plants and pets) and low-income countries (air travel). Uniting data on the causes of introduction and establishment can improve early-warning and eradication schemes. Most countries have limited capacity to act against invasions. In particular, we reveal a clear need for proactive invasion strategies in areas with high poverty levels, high biodiversity and low historical levels of invasion. PMID:27549569

  9. Air Pollution

    MedlinePlus

    ... tobacco smoke. How is air pollution linked to climate change? While climate change is a global process, it ... ozone levels are also a concern. Impacts of Climate Change on Human Health in the United States: A ...

  10. Air Apparent.

    ERIC Educational Resources Information Center

    Harbster, David A.

    1988-01-01

    Explains the principle upon which a barometer operates. Describes how to construct two barometric devices for use in the classroom that show air's changing pressure. Cites some conditions for predicting weather. (RT)

  11. Stereotype Threat among Schoolgirls in Quasi-Ordinary Classroom Circumstances

    ERIC Educational Resources Information Center

    Huguet, Pascal; Regner, Isabelle

    2007-01-01

    There is ample evidence today in the stereotype threat literature that women and girls are influenced by gender-stereotyped expectations on standardized math tests. Despite its high relevance to education, this phenomenon has not received much attention in school settings. The present studies offer the 1st evidence to date indicating that middle…

  12. Stereotype Threat and Women's Performance in Physics

    ERIC Educational Resources Information Center

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  13. Chronic illness in the workplace: stigma, identity threat and strain.

    PubMed

    McGonagle, Alyssa K; Barnes-Farrell, Janet L

    2014-10-01

    Chronic illness affects a large and growing number of workers in the United States and globally. Stigmatization (devaluation) at work based on chronic illness may be stressful for individuals and therefore may lead to negative psychological consequences (i.e. strains). In order to better understand stressful experiences of stigma for workers with chronic illnesses, a model of stigma-related identity threat (perceptions that one is at risk of being treated negatively at work because of chronic illness) was tested on a sample of 203 working adults with chronic illnesses. The following variables related to workers' perceptions of chronic illness-related identity threat: workers' boundary flexibility (flexibility in managing their work and life), their meta-perceptions of devaluation (perceptions of others' devaluation of them based on illness) and their job self-efficacy (feelings of confidence related to performing their job). In turn, perceptions of identity threat related to both feelings of psychological strain and (lower levels of) perceived work ability. Surprisingly, neither stigma centrality (how fundamental illness is to one's identity) nor supervisor support related to workers' identity threat perceptions. PMID:23955842

  14. Preparatory meeting of the National Commission on Nuclear Threat

    SciTech Connect

    1997-12-31

    The Keystone Center convened a preparatory meeting on May 13--14, 1997, as part of The Center`s efforts to convene the National Commission on Nuclear Threat. The National Commission on Nuclear Threat will be convened in order to develop a compelling assessment of nuclear threats that face the US and the world in the post-Cold War context. This assessment will also focus on the interrelation of many of the issues and look for ways in which to foster greater understanding of these issues by both policymakers and the public. The agenda for the preparatory meeting was structured to allow for brief presentations followed by reactions and discussion from all the participants on the following topics: (1) The Future of Nuclear Weapons; (2) The Disposition of the Reduced Nuclear Weapons and Fissile Material; (3) The Nuclear Terrorist Threat; (4) The Status of Nuclear Proliferation; (5) The Concept of Strategic Escrow; and (6) What Does the Country and its Leaders Need to Know and How Can the Commission Help Answer These Questions. The following meeting summary follows the order of these topics, beginning with a review of Introductory Comments.

  15. Fearful faces heighten the cortical representation of contextual threat

    PubMed Central

    Wieser, Matthias J.; Keil, Andreas

    2015-01-01

    Perception of facial expressions is typically investigated by presenting isolated face stimuli. In everyday life, however, faces are rarely seen without a surrounding visual context that affects perception and interpretation of the facial expression. Conversely, fearful faces may act as a cue, heightening the sensitivity of the visual system to effectively detect potential threat in the environment. In the present study, we used steady-state visually evoked potentials (ssVEPs) to examine the mutual effects of facial expressions (fearful, neutral, happy) and affective visual context (pleasant, neutral, threat). By assigning two different flicker frequencies (12 vs. 15 Hz) to the face and the visual context scene, cortical activity to the concurrent stimuli was separated, which represents a novel approach to independently tracking the cortical processes associated with the face and the context. Twenty healthy students viewed flickering faces overlaid on flickering visual scenes, while performing a simple change-detection task at fixation, and high-density EEG was recorded. Arousing background scenes generally drove larger ssVEP amplitudes than neutral scenes. Importantly, background and expression interacted: When viewing fearful facial expressions, the ssVEP in response to threat context was amplified compared to other backgrounds. Together, these findings suggest that fearful faces elicit vigilance for potential threat in the visual periphery. PMID:24125792

  16. As Threats of Violence Escalate, Primate Researchers Stand Firm.

    ERIC Educational Resources Information Center

    Schneider, Alison

    1999-01-01

    Scientists doing research on primates are increasingly being subjected to threats and acts of violence from animal rights groups. The intimidation has resulted in many laboratories taking extensive security measures. Some scientists claim, however, that there is no surrogate for animal research in understanding human diseases. There are fears that…

  17. Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon

    PubMed Central

    Jones, Robert; Wills, Brandon; Kang, Christopher

    2010-01-01

    Chlorine gas represents a hazardous material threat from industrial accidents and as a terrorist weapon. This review will summarize recent events involving chlorine disasters and its use by terrorists, discuss pre-hospital considerations and suggest strategies for the initial management for acute chlorine exposure events. PMID:20823965

  18. Perceived threat predicts the neural sequelae of combat stress

    PubMed Central

    van Wingen, G A; Geuze, E; Vermetten, E; Fernández, G

    2011-01-01

    Exposure to severe stressors increases the risk for psychiatric disorders in vulnerable individuals, but can lead to positive outcomes for others. However, it remains unknown how severe stress affects neural functioning in humans and what factors mediate individual differences in the neural sequelae of stress. The amygdala is a key brain region involved in threat detection and fear regulation, and previous animal studies have suggested that stress sensitizes amygdala responsivity and reduces its regulation by the prefrontal cortex. In this study, we used a prospective design to investigate the consequences of severe stress in soldiers before and after deployment to a combat zone. We found that combat stress increased amygdala and insula reactivity to biologically salient stimuli across the group of combat-exposed individuals. In contrast, its influence on amygdala coupling with the insula and dorsal anterior cingulate cortex was dependent on perceived threat, rather than actual exposure, suggesting that threat appraisal affects interoceptive awareness and amygdala regulation. Our results demonstrate that combat stress has sustained consequences on neural responsivity, and suggest a key role for the appraisal of threat on an amygdala-centered neural network in the aftermath of severe stress. PMID:21242990

  19. Beyond Performance: A Motivational Experiences Model of Stereotype Threat

    ERIC Educational Resources Information Center

    Thoman, Dustin B.; Smith, Jessi L.; Brown, Elizabeth R.; Chase, Justin; Lee, Joo Young K.

    2013-01-01

    The contributing role of stereotype threat (ST) to learning and performance decrements for stigmatized students in highly evaluative situations has been vastly documented and is now widely known by educators and policy makers. However, recent research illustrates that underrepresented and stigmatized students' academic and career motivations are…

  20. Major Threats to Environmental Quality in North America.

    ERIC Educational Resources Information Center

    Vogl, Robert; And Others

    1986-01-01

    Reports study findings of environmental educators' opinions on issues which pose threats to environmental quality in North America and the status of the availability of educational materials for the issues. Identified as priority items were hazardous wastes management, water contamination, and acid deposition. Compares responses of American and…

  1. The Threat of Abuse: Problems in Aggression and Individuality.

    ERIC Educational Resources Information Center

    Steele, Carolyn I.

    1979-01-01

    Describes cases of adults whose early developmental years were marked by constant threat of parental abuse and who manifest, as adults, an inability to tolerate aggression or to develop close relationships. Uses Mahler's separation-individuation process framework to provide an understanding of the early foundations of these adults' problems. (SS)

  2. Predictors of Collegiate Student-Athletes' Susceptibility to Stereotype Threat

    ERIC Educational Resources Information Center

    Feltz, Deborah L.; Schneider, Richard; Hwang, Seunghyun; Skogsberg, Nikolaus J.

    2013-01-01

    The present investigation sought to determine the extent to which collegiate student-athletes are susceptible to stereotype threat and the factors that predict it. We proposed a structural equation model (SEM) by which a perceived coach's positive regard for an athlete's academic ability, athletic identity, and academic identity predicts the…

  3. Assessing Threats of School Violence: Implications for Counselors

    ERIC Educational Resources Information Center

    Daniels, Jeffrey A.

    2002-01-01

    The author describes important considerations when assessing students' threats made at schools. In a recent article, M. Reddy et al. (2001) presented 4 approaches to assessing the risk of school violence. They submitted important issues and problems with 3 commonly used approaches and suggested a 4th approach as an alternative. Implications for…

  4. Threat assessment using visual hierarchy and conceptual firearms ontology

    NASA Astrophysics Data System (ADS)

    Arslan, Abdullah N.; Hempelmann, Christian F.; Attardo, Salvatore; Blount, Grady Price; Sirakov, Nikolay Metodiev

    2015-05-01

    The work that established and explored the links between visual hierarchy and conceptual ontology of firearms for the purpose of threat assessment is continued. The previous study used geometrical information to find a target in the visual hierarchy and through the links with the conceptual ontology to derive high-level information that was used to assess a potential threat. Multiple improvements and new contributions are reported. The theoretical basis of the geometric feature extraction method was improved in terms of accuracy. The sample space used for validations is expanded from 31 to 153 firearms. Thus, a new larger and more accurate sequence of visual hierarchies was generated using a modified Gonzalez' clustering algorithm. The conceptual ontology is elaborated as well and more links were created between the two kinds of hierarchies (visual and conceptual). The threat assessment equation is refined around ammunition-related properties and uses high-level information from the conceptual hierarchy. The experiments performed on weapons identification and threat assessment showed that our system recognized 100% of the cases if a weapon already belongs to the ontology and in 90.8% of the cases, determined the correct third ancestor (level concept) if the weapon is unknown to the ontology. To validate the accuracy of identification for a very large data set, we calculated the intervals of confidence for our system.

  5. Threats to Feminist Identity and Reactions to Gender Discrimination.

    PubMed

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists (M age  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed. PMID:23606785

  6. The threat of Marek's disease virus is expanding

    Technology Transfer Automated Retrieval System (TEKTRAN)

    In the face of continuing new and emerging disease threats to birds, the poultry industry needs to be vigilant and will probably need to incorporate additional strategies to prevent future outbreaks and ensure food safety. Genetic resistance to disease is an attractive solution to augment current co...

  7. Collective Threat, Trust, and the Sense of Personal Control

    ERIC Educational Resources Information Center

    Ross, Catherine E.

    2011-01-01

    A threatening and dangerous neighborhood may produce distressing emotions of anxiety, anger, and depression among the individuals who live there because residents find these neighborhoods subjectively alienating. The author introduces the idea that neighborhood disorder indicates collective threat, which is alienating--shaping perceptions of…

  8. The redbay ambrosia beetle, Xyleborus glabratus: A threat to avocado

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Laurel wilt (LW) is a disease caused by Raffaelea sp., a fungal symbiont associated with the recently-introduced redbay ambrosia beetle (RAB), Xyleborus glabratus. Impact of RAB as a vector of the disease to avocado is a threat to avocado production in the U.S. Since 2006, we have a) tested suscepti...

  9. Suitable Enemies? Governmentality of Youth: Youth as a Threat

    ERIC Educational Resources Information Center

    Ostrowicka, Helena

    2012-01-01

    This article is a contribution to the discourse of politics towards (for) youth, which the author defines as the "cultural politics of risk". The article begins with scientific representations of youth as a threat, as a group inclined to engage in risky behaviours. It then focuses on theoretical approaches called the "risk paradigm", providing a…

  10. Response of School Personnel to Student Threat Assessment Training

    ERIC Educational Resources Information Center

    Allen, Korrie; Cornell, Dewey; Lorek, Edward; Sheras, Peter

    2008-01-01

    School safety has become an important area of concern for school improvement. This study examined the effects of staff training as means of improving school responses to student threats of violence. A multidisciplinary sample of 351 staff from 2 school divisions completed pre-post training surveys as part of a 1-day training program using the…

  11. Laser Remediation of Threats Posed by Small Orbital Debris

    NASA Technical Reports Server (NTRS)

    Fork, Richard L.; Rogers, Jan R.; Hovater, Mary A.

    2012-01-01

    The continually increasing amount of orbital debris in near Earth space poses an increasing challenge to space situational awareness. Recent collisions of spacecraft caused abrupt increases in the density of both large and small debris in near Earth space. An especially challenging class of threats is that due to the increasing density of small (1 mm to 10 cm dimension) orbital debris. This small debris poses a serious threat since: (1) The high velocity enables even millimeter dimension debris to cause serious damage to vulnerable areas of space assets, e.g., detector windows; (2) The small size and large number of debris elements prevent adequate detection and cataloguing. We have identified solutions to this threat in the form of novel laser systems and novel ways of using these laser systems. While implementation of the solutions we identify is challenging we find approaches offering threat mitigation within time frames and at costs of practical interest. We base our analysis on the unique combination of coherent light specifically structured in both space and time and applied in novel ways entirely within the vacuum of space to deorbiting small debris. We compare and contrast laser based small debris removal strategies using ground based laser systems with strategies using space based laser systems. We find laser systems located and used entirely within space offer essential and decisive advantages over groundbased laser systems.

  12. Uncovering Embedded Face Threat Mitigation in Landscape Architecture Critique Feedback

    ERIC Educational Resources Information Center

    Housley Gaffney, Amy L.

    2015-01-01

    Receiving public feedback on academic work may threaten students' face, particularly when such feedback is critical. One way that feedback may be cushioned is through face-threat mitigation techniques. I analyzed the use of such techniques in the feedback given by faculty and professionals to landscape architecture students as preparation for…

  13. Degrees of Integrity: The Threat of Corruption in Higher Education

    ERIC Educational Resources Information Center

    Chapman, David W.; Lindner, Samira

    2016-01-01

    Corruption in higher education is the focus of growing international concern among governments, educators, students, and other stakeholders. Those working in higher education institutions now face a unique convergence of pressures that is creating a heightened threat to the integrity of the higher education enterprise worldwide. This paper draws…

  14. Anticipation of interoceptive threat in highly anxiety sensitive persons.

    PubMed

    Melzig, Christiane A; Michalowski, Jaroslaw M; Holtz, Katharina; Hamm, Alfons O

    2008-10-01

    Anticipatory anxiety plays a major role in the etiology of panic disorder. Although anticipatory anxiety elicited by expectation of interoceptive cues is specifically relevant for panic patients, it has rarely been studied. Using a population analogue in high fear of such interoceptive arousal sensations (highly anxiety sensitive persons) we evaluated a new experimental paradigm to assess anticipatory anxiety during anticipation of interoceptive (somatic sensations evoked by hyperventilation) and exteroceptive (electric shock) threat. Symptom reports, autonomic arousal, and defensive response mobilization (startle eyeblink response) were monitored during threat and matched safe conditions in 26 highly anxiety sensitive persons and 22 controls. The anticipation of exteroceptive threat led to a defensive and autonomic mobilization as indexed by a potentiation of the startle response and an increase in skin conductance level in both experimental groups. During interoceptive threat, however, only highly anxiety sensitive persons but not the controls exhibited a startle response potentiation as well as autonomic activation. The anticipation of a hyperventilation procedure thus seems a valid paradigm to investigate anticipatory anxiety elicited by interoceptive cues in the clinical context. PMID:18723161

  15. Regulation in a Brave New World: Safeguarding against Subversive Threats

    ERIC Educational Resources Information Center

    Hornosty, Jason

    2011-01-01

    Biotechnology is a rapidly advancing science that has the potential to revolutionize medicine and transform human abilities. Accompanying these positives are an underdiscussed category of threats to principles of human rights and equality. Although any technology might be used to inegalitarian ends, biotechnology has the capacity to beget…

  16. Chlorine gas: an evolving hazardous material threat and unconventional weapon.

    PubMed

    Jones, Robert; Wills, Brandon; Kang, Christopher

    2010-05-01

    Chlorine gas represents a hazardous material threat from industrial accidents and as a terrorist weapon. This review will summarize recent events involving chlorine disasters and its use by terrorists, discuss pre-hospital considerations and suggest strategies for the initial management for acute chlorine exposure events. PMID:20823965

  17. Not so Simple: The Threats to Leadership Sustainability

    ERIC Educational Resources Information Center

    Bottery, Mike

    2016-01-01

    This article begins by examining the possible meanings of "sustainability," and argues that most meanings are prescriptive rather than descriptive in nature: they tend, either overtly or covertly, to recommend the particular end-states that writers desire. The article then looks at the threats to leadership sustainability, suggesting…

  18. Threats to the Professional Understanding of Assessment Error

    ERIC Educational Resources Information Center

    Newton, Paul E.

    2005-01-01

    A case study investigation was undertaken to identify threats to the professional understanding of assessment error which arise from accounts presented within the education press. Through a predominantly qualitative analysis of articles published in a leading education newspaper, during 2002 and 2003, it explored how assessment agencies in England…

  19. Mass Media Use by College Students during Hurricane Threat

    ERIC Educational Resources Information Center

    Piotrowski, Chris

    2015-01-01

    There is a dearth of studies on how college students prepare for the threat of natural disasters. This study surveyed college students' preferences in mass media use prior to an approaching hurricane. The convenience sample (n = 76) were from a university located in the hurricane-prone area of the central Gulf of Mexico coast. Interestingly,…

  20. Immunity to Popular Stereotypes of Aging? Seniors and Stereotype Threat

    ERIC Educational Resources Information Center

    Horton, Sean; Baker, Joseph; Pearce, William; Deakin, Janice M.

    2010-01-01

    Previous research suggests that seniors' short-term performance is affected by stereotype threat--defined as a situation in which an individual is at risk of confirming a negative characterization about one's group. The current study attempted to replicate and extend these findings to areas of cognitive and physical functioning considered…